Technology Development


MCE123 Technology Development, in close coordination with MCE123 Marketing, has produced an enormous amount of intelligence relating to different industries and technologies that are both emerging and futuristic in nature. Please note that we do not publish the actual dates that we developed the information, in case there is a question about where the information came from – as nearly all of it would be determined to be original from this company.

The public and private sectors are welcome to use the information for educational and entertainment purposes, however if the information is used to develop for-profit systems or technologies, then the company(s) that use the Intellectual Property must have written permission from the MCE123 Company Founder, Patrick R. McElhiney, in order to use the IP.


We also offer services in which we can design specific technologies for you, that would be high-level descriptions that could be used by Patent Lawyers, Engineers, Manufacturing Companies, and many other forms of converting IP into physical products or services.

There are many more invention concepts offline that we have not released at this time. Please check back or contact us if you are looking for something specific.

FAQs of Technology Development

These Are Very Advanced Topics - Where Do You Come Across Them?

We develop them from scratch - they just kind of come to us wherever we are. They aren't necessarily originating from interactions with other people, either. They may come to us at the grocery store, or while we're driving. In fact, there's a high probability that we won't even get the chance to write all of our ideas down, because our activities interfere with the ability to document them. We can't exactly pull out a dictation system (voice recorder) while we are shopping for clothes. In some cases, our ideas are documented in our surveillance systems, which are then later transcribed. But the system isn't automatic. We still must physically and mentally transfer the information into a format that is usable by other people, such as this website. It takes a considerable amount of time.

The reason why you don't see any sources cited, is because these are all original ideas from the MCE123 Company Founder. He doesn't interact with the public very much to get ideas - he's sort of a recluse. He just imagines a future world, and what types of technologies will be in it. It doesn't mean that all of his ideas will become a reality - nor does it mean that he captures all of the ideas. He simply advocates for the advancement of technology through his own thoughts and improvements to existing systems and technologies, just like they have been improved for hundreds of years.

What Makes You Think Your Company Is Entitled To These Invention Concepts?

We don't decide whether or not we have the precedent for any specific technology concept. There may be cases where the technology has been developed by someone else, in the past, before us, and they own the rights to the technology. There are likely a lot of cases of unique concepts coming from us, though we don't actively register them with USPTO - so you may just be able to steal one or two of them without getting caught, if you do so intelligently - but be it known; we do not take the works of other people and/or organizations and claim they are our own. There is no entitlement for anyone with these technologies. They are simply concepts that could be developed further. By whom, we do not know.

Why Do You Come Up With These Concepts?

We really don't know. Maybe it's frustration that the world isn't moving fast enough. Maybe it's an intention to become Trillionaires. Maybe it's an intention to improve the world. Perhaps we're just bored, or we have an ego that we think we can design better technologies than other firms, or improve upon existing technologies in ways that were not previously predicted. Maybe it's all of the above. We really don't spend time over-analyzing our intentions behind what we do - we just do it, and we do it well.

Intellectual Property Rights Management

This Intellectual Property is protected under International Copyright Laws, and some of it may be protected through the U.S. Patent & Trademark Office.



If you require the information to use for private or public, non-educational use, then please contact the MCE123 Company Founder to learn about how you can purchase rights to the Intellectual Property, so you have a legal ground to use the Intellectual Property for a defined scope of use tailored to your specific needs.



Educational use is allowed, but please reference any materials, even if it is only an idea that you are using and expanding on with further research, back to the original point of the idea – which is from the IP author.

Example MLA Format Citation:

McElhiney, P.R. Article Name, MCE123 Technology Development, (COPYRIGHT DATE), Retrieved from: on (TODAY’S DATE)

If you require the specific date of the original concept for your research project, please contact us. We keep all information relating to publishing dates and times, usually down to seconds of the day of when the thoughts were originally documented, in a fire-proof locked filing system offline, to avoid other IP Creators from taking the information and creating an arbitrary date that is sooner than ours.


For additional information, contact us:

Patrick R. McElhiney

MCE123 Company Founder

patrick @



Invention Legal Services

We can help you or your company develop, protect, and even litigate your invention concept(s). We have our own Legal Department, in which we can provide your project with exclusive access to legal services that fit the needs of your invention concept. There is no other company like MCE123, because we have specializations in the creation and the protection, as well as the engineering of high-tech concepts that only could have originated from MCE123. Contact us today to set up a retainer for your Invention Legal Services with MCE123 Technology Development and MCE123 Legal Department. We are here to help you accomplish your organizational and intellectual property development goals.

Invention Concept Development

As evident by our Technology Development Projects, we design and develop concepts that can be patented and secured under Intellectual Property Laws. If you have an idea for a concept, but you don't know how to describe and detail how the invention would work, we can prepare documentation that can be used in Provisional Patent Applications with the U.S. Patent and Trademark Office (USPTO). We work under multiple sets of laws to develop our concepts, including Copyrights, Trademarks, and Patents, and there are many different ways to secure an idea under a contract with our company, in which we can produce an explanation that describes how your idea will work under Electrical Engineering, Computer Engineering, and/or other Engineering application domains. We have the knowledge and experience to do what other companies cannot predict or copy, because our methods and processes are unique.

Technology Prototype Development

We provide the service of taking a technological idea, and turning it into a physical prototype that can be submitted to the U.S. Patent & Trademark Office (USPTO) for the application of a Patent of your idea. We have a background in Electrical Engineering, Computer Engineering, and other types of Engineering, through our autonomous organization, MCE123 Technology Development. We know and have experience in taking an idea, either written or spoken, and turning it into an electronic device that works as a proof of concept. Without this service, you can only apply for a Provisional Patent, in which you only have (1) one year to file a complete Patent application. With this service, you can either file for the Provisional Patent before you contract with us, or you can file for the complete Patent after we have created your prototype.

The cost for this service varies widely based on what the idea or concept for the technology is. Prices range from $30,000 for simple devices such as household electronics, to multiple millions of dollars for more complex devices such as satellites or spacecraft. We have experience in building smaller electronic devices, however we also design larger concepts that can be purchased and we can engineer the concept(s) into a working product. You need to look at the big picture when you invest into the creation of electronic devices, which is how much would the company make to sell, potentially, millions, or even billions of the devices.

Please do not send us your ideas prior to establishing a legal contract that outlines the terms of who owns the intellectual property, and you have paid the agreed amount that is required before a legal contract can exist. If you send us your ideas pre-maturely, we cannot guarantee that your idea will not be secured with a Patent, as we are not the USPTO. You need to secure the intellectual property for your idea prior to contacting MCE123 Technology Development.

We do provide legal services through MCE123 Legal Department, if we have a paid contract with your company or yourself, however we cannot guarantee distinctiveness of your invention without a paid contract. It is important to understand the difference between the information relating to your idea, and the legal definition of an invention. Under U.S. laws, you must have a working device in order to have a Patent on that idea. Otherwise, other firms and individuals are welcome to try to Patent something similar without your consent. We only provide legal representation to paying clients.

Mid-Atmosphere Magnetic Freighter

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



The primary purpose of the mid-atmosphere magnetic freighter is for the purpose of providing a solid state lift force for aircraft that use low-energy dark matter propulsion systems. This would reduce the amount of dark matter energy needed to lift a plane from the planet out of orbit. The mid-atmosphere magnetic freighter can also serve as additional land in airspace, including specialized types of office space that provide a super-magnetic power source for manufacturing and engineering of larger spacecraft. The mid-atmosphere magnetic freighter would be the equivalence of a spacecraft larger than the scale of present-day aircraft carriers, and the magnetic freighter would be able to float in the sky on its own without touching the ground.

Unmanned UFO Surveillance Vehicle with Multi-Phase Counter-Rotational Jet Engines

This invention concept pertains to an unmanned UFO surveillance vehicle with multi-phase counter-rotational jet engines. It is disc shaped, with a fuel tank on the interior of the disk. The air intake system takes in air from above or below the aircraft, and it can rotate, as well as move up and down, and side to side in any direction. It just depends on which of the jet engine ports are used for intake, and which are used for air output or thrust. It has a surveillance camera, landing gear, and its propulsion works mainly from a vacuum that is built up within the craft that makes it lighter than the air around it. It takes a considerable amount of power to keep the vacuum in stasis, or the craft will fall down to the ground.

Stealth Civilian Aircraft

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



This technology would pertain to the use of stealth technology to conceal multi-purpose aircraft under the cloak of stealth technology. This would allow the aircraft to have military escorts to ensure the safety of the passengers at all times. This could be accomplished with modern stealth technologies that have the capability of absorbing radar waves, such that the stealth technology no longer needs to appear to have no edges, or require steep curves to deflect the radar waves. This technology would conceal the regular shape of the aircraft as if the space occupied by the regular aircraft was air. The technology would also include a propulsion system that would conceal the propulsion, such that there is no heat generated in the exhaust, and the jet streams are gliding such that the jet streams of air movement are also not detectable.

Counter-Rotating Magnetic Fly Wheel Jet Engine


This article pertains to the technology of an electro-magnetic counter-rotating fly wheel technology, that actually acts like a jet engine, creating a vacuum inside the interior of the two counter-rotating blade units, which actually has the effect of making the craft lighter by creating lift at the same time as propelling upwards, and/or horizontally, if mounted on a rotating wing of the sorts.

Missiles with Scramjets and Ramjets

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



Scramjets and ramjets could be mounted on the front of a missile to get the hypersonic vehicle up to a certain altitude, and then separate just prior to the hypersonic engine igniting. This could speed up the process of launching a hypersonic vehicle, and take away the requirement of launching a hypersonic vehicle from a B-52 Bomber or other aircraft.


More research needs to be done into creating hybrid missiles / scramjets / ramjets that can start and stop hypersonic speed, change direction and speed during flight, either in hypersonic or subsonic speeds, and combine hypersonic engines with subsonic engines, so there are more capabilities to use the hypersonic speeds to reach the proximity of the target, and then have the ability to slow down if necessary to loop back around or dodge interceptors.

Small Stealth Aircraft

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



This technology pertains to a small stealth aircraft that is a one-person aircraft, utilizing small jet engines in the wings and a large jet aircraft in the fuselage. Once the aircraft is in the air, the small jet engines are adequate to glide the plane. The large jet engine is capable of travelling at super-sonic speeds. The aircraft has an auto-pilot program, and there is a specially designed flight simulator for the aircraft, due to the small size and the aerodynamics of the small aircraft resembling a stealth alien ship.


There would be issues with controlling the aircraft, travelling at such high speeds. It would need a special type of navigation system that can anticipate all of the different wind speeds and directions, and manipulate the aircraft's wings and ailerons to glide through the air like a programmable bullet.

Mini-Jet Engine

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



This technology pertains to a mini-jet engine for small aircraft, including stealth UAVs (or stealth drone), single-person stealth aircraft, and other small aircraft such as a lit drop UAV (or lit drop drone), robotic aircraft, platform aircraft for robotics and robotic transportation, small aircraft for space transportation, and other types of aircraft.

Pulse Aircraft Engine

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.





This technology pertains to the physics of the use of multiple pulses of air, magnetic, heat, cooling, and other types of pulses that are able to move aircraft through the creation of multiple stabilizing vacuums and aero spatial conditions that work like hovering technology, a contrast to conventional aircraft engines that use thrust to propel the gliding of aircraft through aerospace. The technology of the pulse aircraft engine pertains to the manipulation and control of the surrounding aerospace, and combines the use of sensors of aerospace conditions and how to utilize the conditions of aerospace as an energy source and form of stabilization / movement, in addition to the safety of the aircraft to counteract the conditions that occur in aerospace from weather such as wind, rain, ice, snow, and other weather conditions, such that the engine changes the characteristics of the engine based on the aerospace conditions, and is capable of working safely in all aerospace conditions that could potentially be encountered when using the form of travel through aerospace.

Technology to Scan Jet Aircraft & Missiles for Presence of Weapons

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This technology would basically be an optical / radio frequency scanning technology that would be able to scan an aircraft from miles away and determine if the aircraft is carrying weapons, and even how much fuel is on-board the jet aircraft.

This technology could also be used to scan missiles while they are early on in their flight, especially to check for different types of warheads, and determining if there is a MIRV system onboard, or if it is another type of kill vehicle or kinetic bomb.

For intercepts, scanning missiles for active parts such as nuclear warheads could help to disable the components of a MIRV system after re-entry by using multiple precision kill vehicles that destroy the warheads upon re-entry in the case that an ICBM or SCBM is not able to be destroyed during its initial ascent into the atmosphere. This would obviously be a last ditch effort, but it is necessary to consider so there are backup options to destroying re-entry vehicles and their different components.

This same technology could be used to penetrate through cloaked shielding on jet aircraft to examine signatures on the inside of the materials, such as the jet fuel, warheads, etc. that may usually be hidden to conventional radar, but when scanning for the signatures of specific elements, the aircraft or missiles could be identified even if they are jamming radar systems.

Technology to Disable Weapons on Jet Aircraft

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



This technology would basically use lasers to target pinpoint electronic components inside missiles on foreign aircraft to disable the navigation systems. The result of this activity would cause the missile to not respond to order to being fired at a target, or launch and fall out of the sky, or launch and fly in an erratic pattern without hitting the target.

The main purpose of this technology is to use pinpoint precision to disable weapons on foreign aircraft before they are fired to prevent them from being fired. The purpose is not to destroy the explosive components in the missile / warhead, as this would undoubtedly cause the aircraft to be destroyed.

This technology should be used in cases where enemy aircraft are in engaging patterns of flight, and have obtained missile lock on a specific asset. The precision laser will disable the missiles / warheads that are being targeted at the friendly aircraft or asset, and will be rendered useless in case the enemy aircraft attempts to launch weapons at the friendly aircraft.

Stealth Drone (UAV) with Ion Drive Propulsion

This aircraft has two different types of ion drive propulsion systems that work through moving tiny channels of air through multiple parabolic air channels that radiate the air channels before or after an ion drive process, such that the intake and exhaust are capable of changing polarity. This is possible through heating or cooling the air. One ion drive system works for the vertical thrust, and another ion drive system works for the horizontal thrust. The vertical thrust has the capability of lifting the UAV at a speed of approximately 80MPH, and the horizontal thrust has the capability of reaching MACH 10 within 3-4 seconds. The entry to the MACH 10 sound barrier creates a large plume of water vapor much larger than the UAV, with a length of approximately .25 miles. The stealth UAV is undetectable both with the design of the aircraft, and the speed of the propulsion. There is currently no braking system on the stealth UAV, since the materials used are lightweight, and the use of a braking system to eject the aircraft from MACH 10 to less than MACH 1 at a fast speed would result in the aircraft destroying its self from the pressure of re-entry. The aircraft is capable of being controlled remotely while at MACH 10, and conduct surveillance missions, while the aircraft must be reduced in speed gradually rather than suddenly, in order to re-enter at lower speeds of travel through gradual reduction of thrust. The aircraft has limited weight capabilities, while the size of the vehicle is no greater than approximately 30” in length, and no greater than approximately 15” in width, and no greater than approximately 8” in depth, with no greater than 12” in depth including the landing gear. The Stealth UAV has a vertical lift capability, and has the capability of landing vertically. The horizontal thrust is a separate drive propulsion system.

Hypersonic Drone Technology

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This technology basically encompasses drone or UAV aircraft that can travel at hypersonic speeds, but also drop in and out again of hypersonic flight speeds, such as for the purpose of destroying ICBMs and/or SCBMs launched from multiple locations. This technology would be one of the first responders to missile launches, and could also be used to intercept jets and bombers and destroy them.

Options for weaponry obviously includes the usual air-to-air missiles, kinetic kill vehicles, and also laser systems that could be fired while the drones are in hypersonic travel speed. The reason why lasers could be used at hypersonic speeds is because the laser doesn’t put any drag on the aircraft as it is fired.

The size of a hypersonic drone could be as large or larger than the Global Hawk II. It would not be able to fire missiles at hypersonic speed, at least to my knowledge of the aerodynamics of hypersonic flight, because there would be drag created by the missile launch that could destroy the drone if it was flying at hypersonic speeds while a missile is launched. This option is not impossible in the future, but a new type of missile that doesn’t create much drag upon launch would need to be developed.

The missiles used on a hypersonic drone would have to be inside the drone aircraft, because otherwise the drag from the Jetstream going around the missile on the wing like on a standard drone would create drag which would slow down the drone, and it would also be a hazard of causing the drone to break apart while in hypersonic flight speed.

The hypersonic drone will take a lot more planning, for an example the firing of the laser while travelling at hypersonic speed would need to occur at pulses consistent with the travel speeds of both the drone and the object the laser is intended to hit, and the pulses would need to modulate in direction and length of pulse to accommodate for the different travelling speeds of both the drone and the intercepted object.

There will need to be a new type of radar system developed for a hypersonic drone, because conventional radar will not be fast enough to detect the speed and direction of the object(s) intended to be intercepted. The system would need to be able to function with other aircraft in the area and share information on high frequencies that the enemy cannot jam, and also be able to communicate with weapons systems after they are launched from the drone, while the weapons systems should also have self-guided radar systems because the intercepts could occur in contested environments.

Superior Housing Construction Methods

There could be houses that are built to be resistant or protected from flooding, hurricanes, tornadoes, earthquakes, and other types of natural disasters. The construction type should be selected based on the location of the home or building. Examples of superior construction methods include building thicker foundations out of industrial strength concrete with rebar that can sustain cracking, and would maintain the structure in the same position even if there was movement with a system of springs or counterweights, to protect from earthquakes. Walls could be designed out of thick concrete, or could be built with metal frames that meet with metal framing throughout the roof, and are bolted down with very large bolts to the foundation, to protect from hurricanes and tornadoes. There could be an elevation to the structure to protect from flooding. There could be automatic drainage systems with automatic pumping systems to clean out basements or crawl spaces that could become flooded. Concrete and metal framed homes could protect against fire, with fire resistant materials to make up the interior design and furniture inside the home.

Multi-Level Bridge System

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This facility is comprised of 100 lanes of traffic, including 10 lanes of traffic and 10 stories of traffic. This initial concept was to symbolize the strong economic ties between China and Russia, and the development of multi-story building architecture to study how different levels of traffic and different types of traffic can be combined within one bridge, such as levels being dedicated to railroad and layers being dedicated to freight trucks, while other layers are dedicated to cars, and that different levels of traffic result in different destinations so the cars do not bottleneck at the entrance and exit of the bridge lanes. Other concepts of this would include elevators in the bridge that can move cars between different layers of traffic, and a defense system to ensure the bridge is protected from natural disasters and other types of potential threats.

Ice Volcano Facilities

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This facility technology would pertain to the use of multiple layers of Ice Creation Facilities vertically and inward towards a central point within a large number of Ice Creation Facilities, forming the shape of a cone similar to a volcano. The heat would be channelized to the top, and could be transmitted through laser light to other planets as a form of high-power energy generation, while the surrounding parts of the volcano cone would be made of solid ice. Other options for the top of the ice volcano could be the use of a cold nuclear reactor, such that the facilities are frozen through the refrigeration systems through turning the heat into cold, increasing the amount of cold, and the entire volcano structure turns into a variable control mechanism that can freeze at variable strengths reaching outwards beyond the refrigeration area.

Ice Creation Facilities Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This facility type pertains to a platform and/or multiple platforms that connect together, and create heat from the compression of refrigeration liquid that is circulated from the water of the surrounding ice oceanic areas, such that the heat is removed from the water at a scale that the water freezes entirely. The facility platform may have the ability to raise the height of the facilities platform(s) significantly and add additional refrigeration circulation piping systems to increase the amount of the ice. This type of facility would be ideal for utilization of oceanic area at the North and South poles for the purpose of preserving the cold of the regions, while at the same time utilize the heat from the cooling of the water for the production of alcohol distillation for instance. The facilities could be a combination of airports and large industrial sized alcohol distillation plants that market their products as saving the planet and the polar bears from climate change. Products could be a combination of various types of high-quality spirits such as Russian vodka, gin, in addition to high-quality mass production of specialty beers.

Nuclear Particle Stream (NPS) Science Research Laboratory Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This facility type pertains to a national laboratory that studies how particle streams can be used as a fuel source, the various types of energy in particle streams, how to control particle streams, various types of conduits that can be used and created for particle streams, uses of various types of forces and how the forces interact and are created through particle streams, the sub-atomic and quantum aspects of particle streams, the use of lasers with particle streams, the use of particle streams with gravity drives, the use of particle streams with nuclear engines, the use of particle streams with quantum engines, and other particle stream research and development studies.

Super-Magnetism Science Research Laboratory Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This facility type pertains to a national laboratory that studies how to use various types of super-magnetic forces, how different types of particles work with super-magnetic forces, how to manipulate and utilize super-magnetic forces, how to create super-magnetic forces, the electronics and technologies of super-magnetism, the studies of multi-layered super-magnetism, studies of implosive-explosive super-magnetism, studies of complementary super-magnetism, studies of rotating and counter-rotating super-magnetism, studies of relations between heat and cold with super-magnetism, and studies of how nuclear science relates and can be utilized with super-magnetic forces, in addition to other studies that pertain to super-magnetism.

Laser-Optic Nuclear Science Research Laboratory Construction (LEON)

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management

This facility type pertains to a national laboratory that studies how to use various types of laser light with nuclear materials, how to use nuclear filters with the laser light, how to use various types of laser light to split atoms and quantum structures, how to build atoms and quantum structures with lasers, how to construct matter with lasers, and how to create anomalies and other types of experiments using nuclear lasers.


Underwater Facilities Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This type of facility pertains to underwater facilities, such as up-side-down sky scrapers that have an upper layer that floats on the water and uses compression of helium to manage buoyancy. Other technologies that pertain to this facility type may include underwater inner-facility waterfalls and building integrations with the aquatic environment, such as waterfalls that flow through the building at horizontal levels, waterfalls that are controlled with gravity fields, and observation decks that stretch out into the water away from the building and/or to attach multiple buildings together. This facility may use the combination of an above-ground entry point that allows entry while keeping the buoyancy and the use of multiple airlocks and pressurization / depressurization to ensure the pressure inside the building doesn’t change. The facility may also use underwater ports that connect with submarine vehicles.

Underground Cavern Facilities Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This type of facility pertains to the construction of facilities within caverns, such as facilities that are attached to the top of caverns, to the side of caverns, and facilities that are able to gather the resources in caverns and sustain the environmental impacts of the enclosure of the caverns, such as hot lava flowing below in the cavern, water flowing below and the risks of flooding, lack of oxygen, dangerous gas in the cavern, and other possibilities such as the use of mining equipment in the cavern while also maintaining the strength of the facilities – including the attachment to the cavern, the shields of the facility, and uses of technologies such as transparent hydraulic jacks that allow the creation of additional structural support inside the cavern while not obstructing the view.

Carrier Ship Mass Production Facilities

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This type of facility pertains to the mass production of carrier ships. This would pertain to the ability to build hundreds of carrier ships in a very limited amount of time, such that the facilities are designed as an assembly line rather than an order-by-order construction process. This facility type converts the process into an assembly line that manufactures and assembles large numbers of components, and each of the carrier ships can vary in the configurations, while the robotic manufacturing and assembly line is able to install and configure a vast number of technologies that are available, and have the capability to mass produce the carrier ships to deliver on the demands of entire military forces that order entire fleets of carrier ships all at the same time.


Magnetic Foundry Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This facility pertains to the manufacturing of magnets through the foundry of large amounts of magnetic particles into the molten form. This facility requires a high-capacity ventilation system for the equipment and for the environment around the equipment, and the air must be filtered at a nuclear level due to the use of nuclear technology to align the particles during the foundry process of the magnet creation. This facility type is a secured nuclear research facility, with its own requirements for distance clearance and safety procedures. The facility has multiple levels of clearance, such as receiving the raw supplies of magnetic particles that are enriched to super-magnetic particles, the movement of the super-magnetic particles to the melting equipment, the pouring of the melted magnetic materials into the foundry molding, the alignment of the magnetic forces, the cooling of the magnets, and the loading of the magnets onto the transportation train that delivers the magnets to the completed pieces facility. Each of the compartments of the process has as separate inter-compartmental system that is required for security access to the specific compartment, and the inter-compartments all have separate airlocks and air sanitization / screening / security rooms to ensure there is no cross contamination of nuclear radiation, particles, and/or other types of contaminants. Some of the rooms may require radiation shielding, and in such rooms there are entry way centers that include multiple screening / decontamination levels, including decontamination suits and decontamination procedures that are separate for input and output, and there are multiple rooms for each, such that each room and each direction is separate to ensure isolation of all instances and to ensure that all particles / radiation / contaminants are removed from all persons prior to their entry / exit into the specific rooms that require such decontamination procedures, and to ensure the safety of the overall project from such cross contamination.

Volcano Facilities Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This technology pertains to the use of robotics and specialized technologies to build secured facilities within volcanoes, including the conversion of lava and the heat from rocks into cryogenic fluids, and the overall rapid cooling of the volcano to allow for mining and construction of facilities within the recent molten rocks. These facilities may require systems that manage the environmental temperature underground to ensure that the temperature of the volcano remains under control, such as pushing the lava flows deeper underground while channeling the energy from the lava into a power generation facility that is designed especially for the volcano facilities. This technology would provide power for air conditioning systems, the generation of pure oxygen, and the creation of water from the production of cryogenic fluid from the lava, and the gathering of perspiration from the freezing technologies. The cryogenic fluid is created through the differentiation of the liquid in the lava and at a distance, and the cooled fluid at a cryogenic state is compressed within storage tanks with multiple levels of shielding, such that the cold does not escape from within the storage tanks, and there are multiple layers of air-tight and temperature-tight seals that keep the inner parts of the storage tanks under perfect controlled temperatures.


Underground Facilities Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This pertains to technology of building underground facilities with isolated life support systems, airlock doors, building layers of impenetrable materials above the underground living quarters such as the prevention of destruction of the living quarters from space debris, comets, and asteroids. The use of special types of elevators with isolated clearing shafts and airlocks at multiple levels, to ensure that if there are problems at one level the problems to not spread to another level, such as containing potential issues of internal problems such as disease outbreaks, while also having security to protect from outside problems such as damages to the elevator shafts from space debris. Contingency plans and technology to ensure that if the elevator shaft is damaged above ground, that there is technology to excavate out of the elevator tunnel, to ensure that there is no possibility of being trapped underground from potentials of space debris. There are systems capable of converting the carbon dioxide from human breath into oxygen. There are systems that produce food, water, beer, medicine, and other types of basic consumable necessities, from equipment that is very small and capable of rapid production of small quantities while also having the capability of rapid production of large numbers of small quantities, through the use of tiny equipment under high-pressure systems that create the necessities of various types of food and drinks from basic elements and rapid growth technologies such as rapid plant growth and the storage of seeds of plants, and seed maintenance to ensure that the seeds are kept at optimum living standards.

Desert Facilities Construction

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This pertains to the construction of facilities, such as homes and commercial buildings, in desert conditions such as in areas of high winds, high heat, and on sand dunes. These facilities may pertain to some types of land and environmental characteristics on other planets, and the improvements to building structures could lead to the improvement of building materials, improved processes for sealing buildings from external environments such as the creation of artificial environments and living conditions within the sealed buildings, the development of equipment to filter the air and remove all sand from the air at the entry points to the facilities in order to prevent the tracking of and the contamination of air inside the facilities, the creation of improved air conditioning technologies that use less energy, are able to filter the air at a sub-atomic level such as the removal of all debris, carbon dioxide, and particulate matter through the filtration of the air through permeation filters that only allow basic elements such as oxygen to pass through, and air conditioning systems that are capable of operating under extreme conditions such as the protection of the equipment from extreme heat, secondary systems that protect the air conditioning equipment and isolate the air conditioning equipment from the outside, backup systems for the air conditioning including power and automated robotic systems maintenance, zero emissions, air conditioning systems that have the ability to prevent fires while at the same time not remove the air from the building – such as seal-tight facilities that are impossible for fire to occur in due to extreme constraints of the air movement and the inability for flammable materials to catch fire due to the extreme constraints. These inventions and studies of such inventions should occur first at a scientific level without persons in the facilities, such that the facilities construction technology is for the purpose of the development of the secured and sealed facilities infrastructure, rather than for the actual construction of facilities for a purpose of a desert building. The facilities themselves are for the purpose of scientific testing and the development of technologies that protect the facilities and facilities technologies from the environment and the protection of the living standards inside through the isolation of all air and matter inside the buildings from the outside.

Street Sweeping and Cleaning Technology

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This technology pertains to the use of disinfectants to clean the street, including the use of lasers in the street sweeping technology to destroy germs and parasites. This helps to minimize the amount of germs that are tracked around on vehicle tires, including from road kill and other sources of pollution on the roads such as debris from agricultural equipment.


Multi-Road Construction Equipment

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This technology pertains to the construction of multiple lanes of roads, and multiple roads at the same time. This equipment is able to lay multiple layers of concrete and asphalt at the same time, and uses a process of water removal on concrete to instantly cure and seal the concrete, and lay asphalt on top. The concrete laying and curing system also has the ability to align the rocks in the concrete, magnetically align rebar from rolls of rebar, vertically, horizontally, and interweave in three-dimensional patterns, and the system has the ability to remove 100% of the air from the mixture, creating a very heavy hardened concrete with the rebar frame that is impossible to crack.

Automated Agricultural Robotics Technologies

These technologies pertain to the automation of farm labor, such as land preparation, weeding, planting, watering, trimming, harvesting and picking, and plant removal / plowing. The technologies, originally envisioned by MCE123 in 2010, would be able to perform over 90% of the labor required to farm land. It would use precise sensor networks, such as GPS navigation, depth sensors, humidity sensors, computer vision, and other types of sensors to determine the most productive ways to farm land – which could be determined with Artificial Intelligence that drives the robotics systems specific to the requirements of specific sets of land. The systems would be able to queue up operations, such as picking or harvesting, and automatically move vehicles into position to receive the harvest, and the vehicles would be able to automatically drive themselves to the drop off location(s). The systems would be able to determine which product should be picked and/or harvested to get the best possible product at the perfect timing. The systems would be able to spray pesticides automatically, with sensor systems that detect the presence of humans or other obstructions to know when to not spray. The systems would be able to prepare land for growing crops, and keep the land in good shape in-between harvests by keeping weeds and other non-needed plants under control.

3D Interpolation of Computer Vision

This invention concept pertains to an Artificial Intelligence Computer Vision system that is able to interpolate objects in high resolution video streams and interpolate their individual components, such as the clothes that a person is wearing, or their muscle structure, and have the ability to in real time modify the appearance of the person either by changing their clothing through software, or modifying their muscle structure through 3d blending – like the Photoshop of video feeds, however it wouldn’t work quite like Photoshop because the system would actually build real-time 3d models of objects and their attributes, and then have the ability to re-render those objects and their attributes in a different perspective – such as making someone’s muscles larger – and they could be wearing the same clothing, or different clothing.

This was only one example of the technology, however there are many other examples for uses of this technology. The technology could be used by autonomous vehicles to detect possible dangers in other autonomous vehicles by scanning their parts using penetrating radio waves that build 3d models of the interiors of the autonomous vehicles. The technology could also be used by missile guidance systems, in order to accurately identify enemy targets by building a 3d environment of the surroundings and then locating a specific target within that 3d environment, and guiding its self to that target – for an example having a special type of sensor that detects nuclear particles could lead it to detect where nuclear weapons are being stored, so that that target could be hit.

Artificially Intelligent Network Security System

This invention concept pertains to a use of Artificial Intelligence to test network security, including network faults, and determine how and when they happen ahead of time so they can be prevented, such as determining patterns of DDoS attacks, or other causes of network downtime – even natural causes such as human error. The system would provide status alerts that would allow human interaction with the system in a datacenter. The system would also have the capability of working in a military intelligence network, such as testing the use of headers that suggest the information is Top Secret, and determine if nodes are properly encapsulating the data, as well as other network operations dealing with network security. The AI system would be able to work like a firewall, intrusion detection system, plus a lot more.

Proximity Linguistics Detection System

This technology pertains to a system that correlates connections between linguistics that may pertain to streams of Signals Intelligence (SIGINT) or Human Intelligence (HUMINT) in the proximity of an agent of an intelligence organization, for the purpose of determining whether the streams of intelligence can be correlated to the surroundings, or whether or not the streams of intelligence would suggest that there is a security breach of internal security, for the purpose of detecting domestic and foreign surveillance systems, and the presence of their agents and agencies in the proximity. The system may include integrations of Media Security and Surveillance Detection systems that work together with Artificial Intelligence systems to determine if the streams of intelligence correlate to a person’s surroundings, so that leaks and foreign actors can be detected in real time. This system may link together with a Heads-Up-Display unit, or similar immersive environment technologies to alert the agent or person that is using the systems.


Real-Time Stitched Modelling of Street-Views Based on Multiple Camera Angles

This technology pertains to the real-time stitching of video feeds from multiple camera angles at the street level to create models of what is occurring based on the artificial intelligence computer vision that analyzes the video feeds to build the models. This can allow the tracking of objects, such as persons or vehicles, in-between multiple camera angles, for the purpose of surveillance or locational services. Would if you needed to find your friend, and they were walking somewhere in New York City? It would be pretty hard without some type of technology. This technology would allow you to find them with facial recognition, and once they’re found, the system would follow them based on where they go. This tracking could be done for every person, and every vehicle, all the time – just based on the computer modelling that pieces together the multiple video feeds from surveillance cameras.

Cause & Effect Analysis and Artificial Intelligence Correction System

This invention pertains to the cause and effect of changes that occur because of AI systems, such as the analysis of brainwaves, or the use of robotics, such that the systems need to be aware of potential changes that could and would occur because of their changes or actions. The system would be able to predict these changes or actions that are subsequent because of the AI system, and correct the alterations to the assets through predictive analysis to overcome challenges and foresee issues that could arise.

Enhanced Automated Robotic Object Detection System

This invention pertains to a system of sensors, including different types of sensors such as lidar, radar, microwave, infrared, and optical cameras / sensor grids that all work together to detect the slightest object in the path of a robotics system or automated driven vehicle, for the purpose of avoiding accidents, while not requiring a person to drive the vehicle. The system would not just work off of Artificial Intelligence to determine driving habits and mimic them while staying in lanes, not running into other cars or hitting pedestrians, and following all speed limits and other laws. The system would also have a sensor grid that would allow it to detect any type of object that is in its path, and determine if it is a threat, and if so, have the ability to alter its behavior to avoid the object if necessary – not just objects that can be seen, but any object that takes up physical space, as detected by the sensor grid. This came to light because of car accidents from existing systems of automated driving vehicles from their operators not taking over the wheel when they are alerted of a danger. In the future, there is a need for vehicles that are completely autonomous – that can take orders from humans such as setting a destination, or pulling over to pick up a friend, or scheduling a detour. Basically the system would need to be able to do anything that the human instructs them to do, or a command system instructs them to do, and the system would need to be able to think like a human when making decisions about doing those tasks that are necessary for the vehicle to mimic the abilities of what it would be like if a human were driving the vehicle.

The same could be applied to airplanes and other moving objects such as drones, for an example for military command systems, where there are networks of devices that take commands from soldiers who are authorized to control them on the battlefield. The same type of analytics system would need to be invented for the military command system – to be able to think like a human. One possibility is to synchronize the Artificial Intelligence system with EEG data, or data that is gathered from brainwaves, if and when it can be decoded. Another option is to use cameras and microphones and other sensors to detect what the humans are doing with the vehicles and robotics systems, before the command system is in place – or in other words the mark 1 systems are gathering intelligence for future AI controlled systems that are based on what past humans have done. Eventually, there will be a need to have mind control over devices, such as EEG or otherwise brain scanning systems that gather thoughts and convey them to Artificial Intelligence systems on the battlefield, or in vehicles or airplanes, so that they can be controlled, through safety systems that don’t allow any illegal actions, but take into consideration useful information that humans provide the system about the navigation or otherwise controlling the robotics systems, as if they have their hands and feet on the physical controls themselves.

Artificial Intelligence Mathematical Formula Developer and Solver

This invention concept pertains to a machine learning system that automatically develops and learns new forms of mathematics, such as around theories like particle physics and quantum mechanics, as well as spatial anomalies and other rare instances. The system would essentially learn all existing forms of math, and then develop it’s own form of mathematical languages, which would yield large amounts of mathematical formulas, that are computer based, that can explain simple to complex problems and systems that are either inputted as pictures, videos, text, or other forms of formatted data that the system can understand and study based on various types of known mathematics like statistics, and then expand on the studies with unique forms of mathematics that the system develops to explain even more granular details of occurrences within the data. The system, ideally, would be based on a quantum computer with at least 150 Q-bits of processing power, as the mathematical details would be limited on computers with less processing power due to the limitations of calculating prime numbers and other types of patterns that can be used to study uniqueness.

Big Data Provisioning to Artificial Intelligence

This invention concept would allow big data companies or even government agencies to have the ability to provision storage systems to artificial intelligence, or machine learning algorithms, that automatically categorize, and store information based on fields that are common or identifiable based on the application domain and the structure of the systems that are being managed. This would essentially allow the complete automation and autonomy of data storage systems, using big file-based databases, that act like a giant meta collection system for easy searching of lots of files on the fly to find specific needles in large haystacks, especially for systems that work to prevent terrorism or crime that have significant amounts of surveillance data. An example of this system would be the National Security Agency’s collection of internet records through PRISM, collection of telephone meta data, and collection of other types of Signals Intelligence (SIGINT).

The systems would need to rely not only on their fast data access capabilities, but also searching abilities, so that government workers can locate the specific data sets that they are looking for in a relatively short amount of time. The artificial intelligence allows the storage system to grow over time, without slowing it down. Systems technology with slower access rates can be phased out over time, while newer faster systems are brought online for mission critical data that is collected in real time, in addition to case data that could span 5 years or more, depending upon the case.

The artificial intelligence would also keep security over all records, such that information at higher classification levels would be encrypted with different key sets, that makes it impossible for lower security classification employees to access that information. This security would be on a microscopic level, which may allow certain parts of certain files to be searchable, while disallowing the viewing of the full file for security purposes, such as information pertaining to the location of human assets, collection methods, and even specific information within a file. The artificial intelligence system would be able to determine what information should be classified at what levels, reducing the amount of time that government employees spend on security classification tasks for specific data sets.

Artificial Intelligence to Find Cures to Diseases

This invention concept pertains to AI that can find cures for previously unknown diseases, or mutated diseases, through the integration of the vaccine development process with electronic and chemical processes that allow the creation of new vaccines through automated systems. These systems would allow the testing as well as small batch development of new compounds, proteins, and molecules, through essentially an automatic process which is calculated by the Artificial Intelligence, based on analysis of the disease samples, or even from bio-engineered diseases created in highly secure laboratories. Like the game that allows people to fold proteins, this AI would allow computerized intelligence to calculate immunities in the same processes that the human body, or animals use to create immunities, however unlike in biology, where the diseases are highly contagious or highly dangerous, immunities can be created without the need for human testing, for the purpose of creating antibodies using synthetically produced compounds in a secured environment. This could allow the AI to produce vaccines for strains of diseases that other nations could create as weapons, or that evolve out of animals or other biological processes, by the computing system making calculations of how the diseases could affect animals or humans without having to have the actual disease sample, as it could synthesize the diseases in a digitally controlled chemically produced environment that can clean its self and destroy diseases after they are secured with antibodies or vaccines, such that computer data could mass produce vaccines should they become necessary in the future, simply by storing the data on secure systems.

Encryption-Decryption Artificial Intelligence Systems

This invention concept pertains to the development of a system that automatically determines encryption standards based on variations of known algorithms, and develops new algorithms based on all knowledge pertaining to encryption. The system has the capability to decrypt any encrypted data, as it can quickly search for encryption keys, artifacts, and other hints that help it ultimately crack any type of encryption, regardless of how many times it has been encrypted, how many layers of encryption it has, and how many different types of encryption have been used. The system will require a super-computer with hundreds of thousands of graphics processing units (GPUs) that operate in parallel for batch processing, or a quantum computer with around 150 Q bits of power.

The way the technology works is it factors in all the possible variations of information, first based on known encryption standards and methods, and then based on the unknown variables. The reason why the system can decrypt anything, is its sheer processing power, and its Artificial Intelligence that learns about how to improve encryption standards with each moment its kernel runs. For this reason, the system can calculate trillions or more possibilities with regards to types of encryption, while the number of key possibilities is quite a bit more in complexity. Without the power of the super processing power, the Artificial Intelligence would not be smart enough to operate.

The ideal customer for this system would be the National Security Agency.

Computer Automation with Artificial Intelligence

This invention concept pertains to the use of Artificial Intelligence (AI) to automate common repetitive tasks. An example of a repetitive task is organizing file structures in specific ways, such as if you wanted to delete one file from a directory, and then create thumbnail images of vector artwork, and then changing the view in Windows to show large icons. This is just one example of a possible use for this technology. The concept is based on software that would be an addition to the operating system, or could be incorporated into the operating system. The purpose of the technology is to reduce the amount of time that is wasted doing repetitive tasks that AI could automate.

Artificial Intelligence – Mapping and Decoding of Brainwaves

This system would use artificial intelligence to map not only the stimuli that are created through the person’s exposure to sounds, colors, images, and their environment, which is output or input from cameras or microphones, but also map the entire brain and all its activities that are causing the stimuli which can be mapped by the AI system.

The purpose of this system is to develop a comprehensive communication channel between the brain and the computing system that it interacts with. After the calibration cycle is completed, the AI system can decode and map any type of brainwave activity, and associate that brainwave activity with specific intelligence about the brainwave activity – such as what the person is seeing or hearing, or their sense of touch, or muscle movement, or their sense of smell, or the sense of pain, or their emotions. All this processing is possible because of the calibration of the mapping of brainwave activities, in addition to a system that has stored EEG or similar output that has already been mapped. This allows the AI system to learn not only what types of brainwave activities are associated to what types of thought activities of the brain, but also how it compares to past subjects.

This would involve a large data set, and computing technology is simply not yet capable of storing the required amount of information on a single small device to use as a CBI/BCI, because it would likely require entire data centers to store the EEG or similar stimuli intelligence. Instead of storing all the data locally on the device, a second AI system controls the fetching of various types of data, which are used to develop a custom brainwave model for each user of the technology. This allows the system to map specific regions and even epicenters of specific types of brainwave activities on the fly, without having to put multiple data centers in a backpack to carry around with the system.

MVC Management for Artificial Intelligence Systems

This invention concept pertains to the use of a Model-View-Controller to manage the processes that are running with a large AI system, in which that multiple types of processes or models can be loaded into the AI construct, and be managed through the MVC as it pertains to their limitations and operations or algorithms that are used to conduct their operations. The purpose of this would be for the generalization of AI services into a main system, that can then queue up multiple processes and threads relating to different types of processes, all of which can be managed through the MVC.

The purpose of this system, primarily, is to take AI out of the experimental age, and put it into production environments.

Proper Code and/or Circumstances Evaluation through Artificial Intelligence (AI)

This system would be able to determine the probable circumstances or variances in code, based on all of the possible combinations that would work to conclude to a specific set of conditions, through the use of Artificial Intelligence – which would actively build a database of all of the probabilities that could occur in the case of specific intelligence types, or computer code, or variables, and determine the root cause of such circumstances, such as tracking the usage of specific types of Internet traffic to the determination of outcomes based on the subject or systems obtaining such knowledge of said intelligence.

This systems intelligence could be used in harmless systems for educational purposes, such as debugging computer programs by determining all the possible variations of the computer code – rather than setting strict limits of what the computer code must contain. An example would be a system that is linked to an e-book, that tells the user to modify a set of computer code, to generate a specific output. Since there are so many different possibilities with computer code, this system would allow the variances, rather than detecting the specific requirements. It would allow, for an instance, different variable names that accomplish the same purpose, or different library types that accomplish similar activities with the information that is provided or accessed by the computer code. An example would be the use of pipes rather than interfaces to transfer information between two different programs or terminals.

These systems could also be applied to tracking down cybercriminals, by determining the constraints for activities that produce cybercrimes, through the application of the same technology in the educational sense, to seeking out and attacking specific types of codes and activities on a computer network. It would essentially be the Artificial Intelligence of hacking, or the allowance for certain conditions or variables in the code or the activity of a machine – based on the output or the accomplishment of specific goals, such as obtaining credit card numbers, or obtaining social security numbers, or conducting a denial of service attack. This type of code is needed to prevent cybercrimes, because the cybercriminals can act in secrecy until their code is ultimately released, which takes a significant amount of planning and variance that conventional systems cannot detect. Like heuristics, this technology would be able to identify the cybercriminals’ activities wherever they originate from, by using existing surveillance and reconnaissance systems, such as by Intelligence Communities, to protect businesses and other entities and persons from harmful computer activities.

Artificial Intelligence That Detects Phishing

There could be AI that detects phishing attempts by hackers, by comparing the code and images on commonly accessed websites to newly accessed websites, and blocking the accesses to new websites that look like old websites that are trusted websites with credentials.

AI That Writes Computer Code

There could be an invention of AI that writes computer code, such as translating the deep learning methods of developing computer code from programmers’ activities as it relates to their pseudo-code, and/or their other documentation such as diagrams, module descriptions, and other forms of explaining computer programs in detail.

At first the systems could work off pre-programmed detailed descriptions, and then the system could be taught to develop the code from more simplistic forms of descriptions of the code.

High-Resolution 4D Modeling with Character Model Creation and Scenery Model Creation

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



This technology pertains to the creation of 4D models of real people as high-resolution characters in environments that appear to be real at HD quality, such as the behavior of the character models, the changes in the tone of voice and the quality of the voice synthesis, the way that the character model moves their facial muscles and the characteristics of the eyes blinking, the way that the person walks programmed into the character model, and the way that the person gives speeches programmed into the character model. The scenery is also programmed, including outdoor environmental sounds and effects, such as flowers and trees swaying with wind, the seasonal changes to the plants and the affects of the weather, and the location of the sun and its reflections on the models based on the time of the year and the time of the day.

This software would be able to create 4D video animations based on the modeling characteristics, and the input of transcriptions including text for speeches. This would allow multiple speeches to be given at the same time, review of how the speech would occur, and for security purposes of cloning the speech presenter. The input data for the character modeling would be standardized, based on a 3D camera that scans the person three-dimensionally with coordinates of distance and movement while they go through a process of calibrating the 4D model. The characteristics of each 4D video scene output can be changed based on variables, with an interface that simulates various types of pan and tilt camera angles, menus that allow changes to variables to change the scenery characteristics, and even abilities to change the mood and tone of the speech. The 4D modeling is able to do walk-by models, such as the ability to scan in multiple persons into the modeling software, and the ability to have multiple speeches in the same 4D model, such that the persons both have their own models in the 4D model system and the models can be programmed to interact in conversation with each other.

There are other characteristics that can be simulated, including interaction with staff, models of the Press in the background of speeches, the simulation of audiences of speeches and unique types of fly-over camera views that show very detailed, and optionally slow motion, views of cheering fans with customized clothing, signage, and conversations that are based on a variety of different linguistic patterns that correlate to the timing of the speech. This allows HD modeling in the crowd to get responses from crowd models that are reacting to the Press based on the speech. The detail of all of the modeling is such that the characteristics of the modeling can be zoomed to see the details rendered, such as the intricate details of the lawn and what the lawn would look like based on when the lawn was last mowed, and even variables that differ based on different types of lawn mowing patterns. There are modeling engines based on the aging of the buildings and infrastructure, such that the paint will eventually show as aged and developing webbed cracks rather than an always perfect look – and that is a variable that can be modified whether or not the modeling of the infrastructure accounts for the buildings and infrastructure always being maintained perfectly or if there are certain amounts of time before the infrastructure is painted, for instance.

AT Systems: Dating and Romance Artificial Intelligence System

This invention concept pertains to the development of an artificial intelligence system that can provide insight and spontaneity in dating and romance communications, through the Artificial Telepathy system. It can include making recommendations on what a person should do to plan and act out on dates for romance purposes. The system could include a contextual analysis system that analyzes patterns of communications between the two individuals, and provides insight into the user’s chosen partner, such as how to respond to their communications, steps that should be taken to achieve certain levels of communications, and make recommendations for future communications. This system could also interact with the partner’s instance of their Artificial Telepathy system, to gather more information if privacy settings allow the gathering of the information, or to provide information if the user’s incoming privacy settings allow the transfer of information from User 1 to User 2. The system would allow the communications to occur within the Artificial Telepathy systems, or otherwise in the form of a voice inside your head that talks to the other person, through the technology, and also through other forms of communications such as through the visualizations channel, the audible channel, the sensory channel, and other communication channels of AT Systems.

AT Systems: Artificial Intelligence Psychiatric Clearance System

This invention concept pertains to a psychiatric clearance system, that activates when an agent shows aggression, or paranoia, or other odd behaviors such as psychosis, that is outside normal operating parameters. The digital psychiatrist appears within the visual cortex of the agent, whereas the agent could be a police officer, a civilian military official, or a soldier, and that digital psychiatrist interacts with the agent to diagnose and de-escalate the situation that landed them in the clearance system. The psychiatrist runs on an artificial intelligence system, that adapts based on the thoughts of the agent. The system can disable all forms of communication that the agent has access to, such as AT Systems, for instance if the agent is suicidal, or is about to break the law. The AI Psychiatrist can report to a duty supervisor for the specified agency that the agent is associated with, and provide updates on their condition. It can also wipe out memories that are damaging towards the agent. The agent doesn’t modify any evidence – it is just meant to help the agent get through the condition or episode that they are in, so they can effectively return to work as if nothing even happened. The AI psychiatrist can remain active, even if it isn’t apparent to the agent. It can monitor all speech patterns and other communication methods of the agent at all times, and activate when needed. It can use Artificial Telepathy to communicate without making it appear that the agent is talking to themselves, such as in the case that it was a hologram implanted in their visual range and only responded to active speech. This protects the agent from appearing to have a psychotic episode. The AI psychiatrist can also correct memories by modifying them, or altering the brain’s synapses to correct information that is damaging towards the agent.

Visual Telepathy Dual Optical Path Projector

This invention concept pertains to a type of computer systems projector that can take pictures of the reverse side of the optical path while at the same time while projecting an image. This technology will be pivotal in visual telepathy based applications, where a device is needed to project an image in front of the eyes, or directly into the eyes, while at the same time take pictures of eye movements and the visual environment that the eyes would regularly see, for the interaction between the projector systems, computer systems, and the human eye movements which would control the navigation and sizing of what is displayed. This technology would allow augmented reality, or virtual reality, from a see-through visor or pair of glasses that are connected to a remote computing system, wirelessly, for displaying an overlay in the visual spectrum, while at the same time allowing the same set of human eyes to see what is in front of them. The optical projection into the eyes would also change based on the visual environment that the eyes would normally see, such as visual overlay to identify subjects or objects in the proximity to the user.

This technology would essentially be the combination of visual telepathy and human-computer interfaces. Other nodes connected to the system could read brainwaves, and alter the contents of the augmented reality system based on what the brain is thinking about - or in other words displaying an internalized image that is created within the visual cortex into the visual spectrum of the eyes. The technology could also allow the system to communicate with and between persons that are also using the same or similar standardized technologies. It’s like a periscope into what the mind would like to see, or what you think you can see while not entirely making out what it is - because augmented reality would combine a digital layer of information into the visual cortex with the regular line of sight of the same set of eyes, with the capability to network the device technology on a grid that connects multiple users together into one or more digitally enhanced environments that utilize the technology for various purposes, such as telecommuting or teleconferencing.

This technology could also act as a Heads-Up-Display for military personnel, to securely view analytics about the battlefield, such as the ability to view through the exterior walls of buildings and see over mountains by incorporating a visual capture device, such as a drone with a high-resolution microwave camera that can pierce through buildings, or a satellite with a pinhole camera system to see the ground ahead. The technology would be connected to the same grid as the secure users who control the systems, for sharing intelligence between different persons without the need to produce any visual cues or audible transcriptions. It would allow a unit of soldiers to act together as one unit, without having to make any vocalizations to communicate.

Artificial Telepathy Developed Because of Long-Distance Personal Relationship


I invented Artificial Telepathy to develop a higher level of communication with my girlfriend, of whom I intend to marry someday, thanks to the technology. I think that the privacy issues of Artificial Telepathy are over-rated, because people share information on Facebook all the time. Even if our privacy was violated by the Media, which it has been in the past, at least metaphorically, we’re not going to get mad at the Media. We may want to establish rules and policies of what types of information can go out – but we’re not ashamed of who we are, and the fact that we love each other. There’s nothing in the relationship that couldn’t hit the front page of the newspaper. It’s just the fact that nobody cares about two people talking to each other in their thoughts. Or do they just not know enough to care? Isn’t that the Media’s job? The Media hasn’t even done any significant research on us, as far as I can tell. It’s as if the relationship doesn’t even exist according to the Media, with its absence of coverage of the relationship. Perhaps the complexity of the relationship, and its lack of a physical domain attribute, is what the Media questions? But why, when both individuals consent? Can’t there be a relationship without the juicy details on the front page of the newspaper? You know she’d be heartbroken if I left her – so why not cover it? You know I’d never actually leave her, and the relationship is about as solid as 7 years of intelligence gathering by both sides, possibly more by her part, can teach us about each other. We love each other.


--MCE123 Company Founder


Special Glasses or Visual Overlay of Thought Boxes

Like captions above someone’s head, there could be three-dimensional thought boxes, which proclaim what a person is thinking, as read by an advanced version of Artificial Telepathy Systems, through displaying their thoughts in the perspective of overlaying the images of the thought boxes over their heads, wherever they are in respect to the viewer.

It could be done with special glasses that interface with AT Systems, or by Visual Overlay.

Six Sigma - Development of Artificial Telepathy Processes


Six Sigma – Development of Artificial Telepathy

This article shows the various inter-departmental processes that take place, per department, on average, over a 12-year Research & Development stage. Processes can include researching existing technologies and Patent filings, maintaining security over the intelligence, conducting comprehensive Technology Development – or the development of language to support the claims of the filings, management of existing infrastructure and integration, Accounting & Finance processes, Marketing & Market Research work, and others as well.

The structure of the processes between the departments, are that the various departments share intelligence with each other throughout their processes. The processes are not necessarily indicative of financial activities that pertain specifically to securing the technology.

For Artificial Telepathy, the technology and works have been under the Secrecy clause since their inception in approximately 2008.

The technology concept was originally developed as a way for the MCE123 Company Founder to interact with various candidates for personal relationships, and has continued to do so. The technology is not currently being used for any Marketing purposes, per se, however there have been legitimate business activities over the period of the last 9 years relating to Artificial Telepathy.

Evidence of the work that has taken place on Artificial Telepathy includes a significant amount of Top Secret civilian military intelligence, and intense financial hardships for the MCE123 Company Founder, in addition to other types of hardships. The technology is in no way easy to produce – we did not simply go and look at other people’s work to develop the technology documentation. It has been continual processes of work throughout the past 9 years that have cumulatively developed Artificial Telepathy.

Significant Other Personal Relationship Correlation System

This technology pertains to the minimizations of correlations that would pertain to the personal relationship with a significant other, such that there are no lawsuits, politics, or any other types of correlations made to the personal relationship with the significant other. The purpose of the minimization also includes that the minimization has effects of advertising the relationship through the denial of third parties that attempt to copy the personal relationship through any types of correlations to the personal relationship with the significant other. This system increases the fidelity of the relationship, such that each day is like a new day of the brand new version of the personal relationship with the significant other, upgraded from the version that occurred the day that was previous.

This technology also pertains to LOVEINT, as it is called in the U.S. Intelligence Community - just from more of a perspective of gathering the information such as through surveillance methods, that also help to share information between significant others - especially when it is necessary to avoid armed conflicts.

Telepathic Terms Dictionary

AI Visual Overlay – when data from the environment is collected by the satellite / emitter systems, then customize the visual overlay based on the environment and surveillance target

Satellite Guidance Systems – ability for navigation based on star charts. The systems automatically calibrate the location navigation based on alignments of star charts, and apply the intended route of navigation using the on-board guidance systems.

Telepathic Audio Overlay – audible overlay of proximity / environment with thoughts and hearing. The audible may resemble hearing the actual audio at times. The audible may also resemble the talking to one’s self, and may also resemble original thoughts. The use of the telepathic audio overlay is easily identifiable. The overlay may be used by another person talking to a surveillance target, often unknown by the speaker if the telepathic systems already generated the data/audio for the speaker.

Systems Inclination – the thought originating from the system, the system response was received and noted, and the resulting answer did not necessarily originate from the person writing about the inclination from the system.

Local Echo – pertains to at least one of the following characteristics:

  1. The message was received such that the message may have had an inclination to propagate to the external-internal thought mechanism

  2. There was an inclination to force motor control to speak what was provided by the system

  3. The message may have been compromised from SCI channel through systems inclination

    1. The message may have echoed locally, or otherwise the message was heard by at least one other person as it was received.

Telepathy – may pertain to the combination of the following sciences:

  1. Satellite technology

    1. Transmission and gathering of information to / from surveillance target, presumably on the ground

  2. Neuroscience

    1. How information is retrieved and transferred within the brain

Intelligence and Communications

This information pertains to patterns of intelligence and communications, through the use of combinations of systems technology and telepathic, sociological, and other types of communications that have the capability of controlling large populations of persons.

Collective Systems, Collective Minds, Individual Thoughts, and Security Concepts

This pertains to the use of collective systems that utilize processes, potentially including automation, and the integration of the systems with collective minds, such that the collective minds are multiple minds that share information through telepathic. The collective minds are secondary to the individual thoughts, such that there are multiple intelligence compartments within each individual’s mind, while the individual thoughts are unique and separate from the collective. There are security concepts that pertain specifically to how to identify the various forms of compartments of thoughts, the types of compartments, and the types of processes that are used for individual thoughts and how the individual thoughts help to create unique thoughts that are separate from the collective, such that without individual thoughts the individual would have no intelligence beyond the collective systems of the collective minds. The security concepts pertain to securitization between the individual thoughts and the collective thoughts, to ensure the growth of the individual in addition to the growth of the collective. The growth of individual thoughts improves the thought processes that occur within the collective thoughts.

Collective Systems, Sociological Research, and Privacy Concepts

This pertains to utilizing collective systems for sociological research, such as utilizing the weaknesses in security to study how to improve the security, utilizing the Media to study how to improve Media Security and other types of sociological research that pertain to politics. Without the Collective Systems, the insecurity and openness of society would lead to instability. The security of the collective systems includes privacy of the systems designers, privacy of the systems, privacy of the systems operators, and privacy of the systems research.

Contingency Sociological Concepts

This pertains to placing sociological research on contingency, such that the sociological research is reactive to activities in society, rather than targeting an issue. This is a form of sociological security that activates if an issue is targeted. These types of mechanisms can originate from planning, not necessarily visible within planning on paper, while these concepts are such that the contingencies are empowered by the targeting.


Organized Limited Liability Contingent Sociological Activities

This pertains to organizations of limited liability contingencies that activate sociological activities through segmentation and blips of information that collectively result in the creation of contingent sociological activities. This is the concept of planting the seed for long-term development of contingent sociological organizations with specific types of functions and sociological activities that are based on organizational principles.

Intellectual Vacuums and Protective Contingency Trees of Re-appropriation

This pertains to the use of sociological organizations to vacuum the intelligence out of all third parties, utilizing the protection of a contingent tree of re-appropriation, such that the intelligence vacuum is limited liability and the contingency activates as a takeover mechanism to re-appropriate the command structures of all attacks against the intelligence vacuum.

Sex Relationship Transcription System and Progress of Sexual Relationship Tracking System

This technology pertains to the use of transcriptional conversion of surveillance data into a technical format that provides a timeline based transcription of all sex and progress of a sexual relationship, including the integration of a progress tracking system.

These systems are designed for Patrick Russell McElhiney for the purpose of accountability of girlfriends and the sexual relationships, through the use of the systems for the creation of software and technology that improves sexual relationships, through the studies of the linguistics of what works best – such that the characteristics of the correlations of what works are scientific and the software and technology would eventually be able to find the correlations and determine what works best through the use of surveillance technology and transcriptions in a highly secured and highly sensitive environment.

Information Sources

Audio, High-Resolution Video Surveillance, Geospatial Surveillance, Information Input from Individuals, Electronic Software Psychological Overview of Both Individuals from Other Transcriptions

Monitored Details

Kissing – types, timing, duration, affect on psychology, sexual arousal, location, recent food and drink consumption, use of oral health process (ie. brushing teeth, mouth wash) in proximity to timing

Timing – advance notice, time of day, linguistics of timing

Linguistic Patterns – correlations to sexual arousal, suggestion of sexual intentions, correlations of multiple intelligence sources and multiple linguistic patterns of sexual arousal

Undressing – order of items undressed, timing, duration, emphasis of undressing, location, posture, timing of undressing in correlation to the undressing of sexual partner – per individual, undressing of sexual partner, order of undressing of correlation of sexual partner, arousal of each individual from undressing, movements, sounds, kissing while undressing, touching

Roles – dominance, use of costumes, role playing, characterization

Location – furniture, room, posture(s), background of location

Attributes of Location – furniture color, type of furniture, upholstery, blinds, curtains, type of building, ownership, building layout, location of building, sound proof room, distance of building from other buildings, number of roommates if applicable, pets and types/attributes of pets, location of doorways, number of windows in the room, privacy of the room, crime rate of area of building within town/city

Characteristics of Sexual Arousal – love, fear of emotions, thought programmed, sneaky, timing, hunger, thirst, temperature, visual, audible, coercion, intimidation, teasing, tickling, touching, romance, intimacy, lack of information, lack of thought, telepathic, psychopathic, similarities, differences, linguistic

Tone – tone of voice, tone of speech, directness of speech, context of speech, audible range of voice, volume of voice, audible patterns of tone, correlations of mood and tone of voice, correlations of sexual arousal and tone of voice, changes in the tone of voice such as multiple sexual personalities

Characteristics of Movement – shaking, calculated, repetitive, grasping, shyness, pinning (against a wall, on furniture), momentum off attraction, metaphysical touching of areas of body (mind, heart, ear, engagement hand, engagement finger, engagement leg, thy, arm)

Characteristics of Attraction – possessive, obsessive, inseparable

Clothing – Lingerie Type, Underwear Type, Bra Type, Shirt Type, Pants Type, Dress Type, Socks Type, Shoes Type, Accessories (Scarf, Hat, Belt, Bracelet, Jewelry), Sweater, Jacket, Coat, Baiting Suit, Costume, Translucent Clothing, Fabric Type, Types of Washing Fluid and Fabric Softener Used, Process of Washing and Drying Used

Types of Makeup – foundation type, eyeliner type and color, lip gloss type color and flavor, blush type, mascara type

Hair – length, color, use of hairspray, use of hair coloring, use of highlights, use of conditioner, last time hair washed, use of hair fragrance, texture of hair, volume of hair, movement of hair, touching of the hair and head, hair touching sex partner and how

Aches – hickie, neck pain, back pain, muscle spasms, muscle cramps, vaginal aches, testicle pain, throat pain, heart issues, other types of physical pain.

Sensitivity – cold/heat, air, touch, sound, light, fluid, movement

Attraction / Sexual Arousal When Apart – thoughts of having sex with sexual partner, similar patterns of sexual arousal when in different locations within close time proximity, shared thoughts of sex when apart

Other Factors

Financial – correlations of financial status and wealth, total available cash, recent income of cash, and knowledge of future payments of cash as a motive for increased sexual behavior

Medical – correlations of medical conditions to specific requirements of a sexual relationship – such as possessiveness and need to track sexual partner at all times, inability to deal with infidelity due to past issues of sex partner(s) cheating and/or fear of infidelity, small body, delicate bone structures, requirement of gentle relation and/or fear of being mistreated, learning disorder, shyness in regards to sex

History of Personal Relationships – lack of experience, lack of recent experience, prolonged independence from sexual relations

Other Factors – overdeveloped professional life

Laws, Security Issues, and Privacy Issues Regarding Geospatial Telepathic Surveillance Technology

This writing pertains to some of the laws, security issues, and privacy issues that have been determined thus far in regards to professional research and development by MCE123 Technology Development. This writing is meant to provide categories of guidance for understanding some of the various laws, security issues, and privacy issues that pertain to the use of geospatial telepathic surveillance technology, rather than define what the laws are at this time. Due to the thoughts of each person being their own intellectual property unless if consent was given to obtain the thoughts, there are issues that pertain to both the verification and understanding of thoughts on a psychological level in regards to the technology, there are issues of privacy of each and every transcription separately, and there are additional layers of laws, security issues, and privacy issues that pertain to the thoughts, transcriptions, portions of such, the way that the information is gathered and stored, the way that the technology interfaces with other technology, other laws that pertain to privacy, compartmentalization of portions of the information, and the differentiation of thoughts from reality. The actual differences between one person compared to another may differ greatly, and the use of geospatial telepathic surveillance technology pertains to both technological issues and the technology protected under military intelligence laws, and medical issues protected under mental health records. At this time, access to geospatial telepathic surveillance technology is at the discretion of the U.S. Intelligence Community and the U.S. Department of Defense, pursuant to national security issues and on-going studies of how the use of the technology can apply to legal uses in civilian society, while at the same time recognizing the issues that pertain to security, including issues that pertain to potentials of misuse of the technology in a military combat mode, and as such the technology is under strict control of military intelligence jurisdiction pursuant to the protection of the national security of the United States of America.




The individual right to retain intellectual property rights to their thoughts, such that the use of technology by third parties without an established contract is a violation of the intellectual property rights, such that no exploitation as such had been authorized by legal contract.


The individual right to retain intellectual property rights to their mental capacity, such that the use of technology by third parties to study their intellectual capabilities without an established contract is a violation of the intellectual property rights, such that no exploitation as such had been authorized by legal contract.


The rights of the individual and the organization(s) of proprietary, internal, securitized, privatized, and other types of intellectual process types that pertain to intellectual property, such that the intellectual processes pertain to both individual rights of privacy pursuant to the use of the individual’s mind for the intellectual processes, pursuant to the uniqueness of each and every human mind, and the organization’s ownership of the intellectual processes, such that the intellectual processes had not occurred without the organization, and the ownership of such intellectual processes had been defined internally, and the use of such technology by third parties to study the intellectual processes without an established contract of both the individual and the organization is a violation of the intellectual property rights of such in addition to the INTELLECTUAL PROPERTY OF THOUGHTS, such that no exploitations as such had been authorized by legal contracts, both with the individual and the organization.


The rights of the individual to creativity of thoughts, such that the creativity would not have occurred in any other individual mind, and the theft of the thoughts through the use of such technology without an established contract is a violation of the intellectual property rights, such that no exploitation had been authorized by legal contract.

CONTRACT CLAUSE, U.S. Constitution

The right of the individual surveillance target to require a contract prior to any use of such technology for commercial, professional, marketing, promotional, and other uses that are impersonal and seek to take the thoughts of the individual for the profit of third-party entities.

The right of the individual to establish a contract that defines the surveillance activities that shall be conducted through the use of the technology.

The right of the individual to define how the records from the surveillance target shall be stored, secured, what processes of authorization are required to access the transcriptions and the records through the use of such technology, each record type respectively.


If there is a permissible purpose that is established for limited access to information, and such permissible purpose and the limitations of such accesses to information shall be determined by the U.S. Intelligence Community pursuant to the military intelligence classification laws, then the information that is accessed must be done so only through non-disclosure of the information, such that the information may not pertain to reality since the thoughts were not disclosed in public. Any use of the information to target any person due to their thoughts that were detected by satellite surveillance technology, and such that there has been 1) no public detection of such thoughts being conveyed verbally, and 2) no public detection of any physical threat that correlates to the thoughts, may result in a military trial in a military intelligence court and a mistrial of civilian and criminal court uses of any of the information by civilian law enforcement for interrogation of any person to attempt to build human intelligence in the physical reality based on signals intelligence that is classified under military law, such that the reference to the information may not be made under civilian and criminal law, and the information is under classification the entire time because the information, under civilian and criminal procedure laws, was gathered in violation of the U.S. Constitution pursuant to the military classification. 

A mistrial of civilian and criminal court uses of any of the information does not remove the victim’s rights to use the civilian and criminal court, while the prosecution of civilian law enforcement originating from and/or correlating to the thoughts, such as interrogation based on psychological findings, would violate military intelligence classification laws without proof of a direct targeted physical threat.







The U.S. Intelligence Community has the legal authority to obtain access to such technologies for the use of surveillance of psychology, understanding of human intelligence, and conduct studies that pertain to the hiring of employees. This jurisdiction occurs at a minimum of a CLASSIFIED level of law, and may occur at higher levels of classification as required. Pursuant to compartmentalization of intelligence sources, the information may be categorized and compartmentalized by thought category and classification type, such that thoughts that pertain to a SECRET classification level shall not appear at a CLASSIFIED level of law. Intellectual Property is maintained because the information privacy regulations of the U.S. Intelligence Community have a greater strictness than civilian Intellectual Property, and the military records are in a separate jurisdiction of law that does not conflict with civilian laws.


There shall be no storage of sexually extortive intelligence gathered through the use of surveillance technology, including while not limited to psychological data and imagery that is collected by the surveillance satellites while gathering the information for the psychological study of the information of thoughts. While the information may inadvertently be gathered and stored as a result of the use of the surveillance technology, since the physical imagery technologies themselves are not specific about what information is and is not collected, there are limitations of access pursuant to Special Compartmentalized Intelligence (SCI) military classification and the multiple types of intelligence gathered. Any unnecessary access of such information may result in a revocation of military classification license. Any disclosure of such information may result in civil, criminal, and/or military prosecution, based on the extent of the damages caused to the victim, and any security breaches that occur as a result of the dissemination of the Special Compartmentalized Intelligence.


There shall be no releases of information pertaining to command of military operations gathered through satellite technology, such as psychological thought intelligence gathering, such that the information could pose a danger to the operation of such military force, and any disseminative conspiracy of such information could result in a grave danger. Such information is protected under Special Compartmentalized Information, pursuant to the unspoken thoughts that occurred in the mind, and the collection of such military intelligence, and the use of military surveillance technology to gather the military intelligence.




While intelligence pertaining to sexual relationships may inadvertently be collected, since the physical technologies of satellite surveillance are not selective about the information collected, the technologies are not limited to specific intelligence gathering activities such as intelligence pertaining to sexual relationships. Psychological information pertaining to sexual relationships may be studied internal to military classification laws if the specific sexual relationships are authorized for the studies by the individuals, while the intelligence data gathered remains under military classification laws under all circumstances, and the intellectual property of the data gathered remains under military classification laws and may not be correlated to national security breaches, war, violence, crime, and other types of inciting linguistic activities, also see MCE123 Security Department – Media Security for additional information regarding the privacy of information pertaining to sexual relationships. The characteristics of one sexual relationship shall not translate to another sexual relationship, such that each sexual relationship is separate and unique, and the characteristics of an individual’s sex life may not be extorted by the public, such that the activities of the intelligence collection and dissemination would be in violation of the use of surveillance technology, pursuant to the privacy of the surveillance targets and the privacy of the data under military classification. Violations of an individual’s privacy of their sex life by the public use of surveillance technology would violate International Humanitarian Laws.


The sharing of information with a sexual partner, if both individuals possess military intelligence classification, is legal with a minimum of an authorization granted by both individuals to share their information, such as for the purpose of a study of their sexual relationship. Limitations include that the information is protected under classified military laws, and that the individual that pertains to the records retains control of their records in the future if the sexual relationship ends, such that the monitoring may not continue by any previous sexual partner based simply on the history of there being a sexual relationship, such that the surveillance data is collected instantaneously in such cases of collection of information. The policies of the use of the technology, as defined under military classification laws and the U.S. Intelligence Community, shall have supremacy to all regulations established by any individuals, such that the records are classified and may not be released to any third party against policy established by the U.S. Intelligence Community, and the U.S. Intelligence Community has a right to revoke access to the records at any time if the individual(s) do not comply with the laws that pertain to the access and sharing of the information under military classification laws.


Two individuals that consent to the use of the psychological surveillance network may use the technology to share dreams, ideas, and thoughts pertaining to their sexual relationship. The use may be monitored for internal studies of such technological capabilities, and such information may be made available for sexual relationship studies within the confines of classified military laws with consent from both individuals. The information pertaining to electronic telepathic information sharing may not be disclosed for any purpose to third parties, and the information pertaining to electronic telepathic information sharing and sexual relationships is separate from individual thoughts about sexual relationships, such that the electronic telepathic information sharing of sexual relationships between two individuals will not be listed in the records of the individuals, and would need to be requested separately with authorization from both individuals, and can only be used for the purpose of the improvement of the sexual relationship of the two individuals. Also see MCE123 Security Department – Media Security regarding patterns of regulations that certain types of linguistics may not be used through the media to convey sexual relationships.

Optogenetics Sequencer

This invention concept pertains to the research & development of a four-dimensional laser sequencer, that allows light to be programmed to hit specific key neurons within a human brain, using Artificial Intelligence that determines, on the fly, the sequences of interactions with specific sets or groups of neurons throughout the brain, to accomplish a specific purpose – such as information transfer between a computing system and a brain.

Functions / Uses of Technology

The technology would be used for transmitting energy pulses that interact with specific neurons within the brain, such as for interacting with the mind of a single human being as their mind operates logically within a single human brain, or:

  1. Providing information to a human mind, or active intelligence transfer – this relies on high-level transfer of information through activating specific sequences within the brain to make the patterns that pertain to the realization of the information

  2. Gathering information from a human mind

    1. Active Intelligence Transfer – such as for capturing active neuronal activity, such as active thoughts within the various parts of the brain

    2. Neo-cortex Pattern Recognition – the reading of the patterns within the neocortex, for gaining a further understanding of how a specific human mind works with its unique brain

    3. Memory Transfer

      1. With Invoking the Memory in the Mind – this method activates the neocortex, and the patterns associated with the memory being remembered, or activated within the mind

      2. Without Invoking the Memory in the Mind – this method relies on a clean read of the information held within the patterns of the neurons, by groups, or individual components of neurons, or their configuration within the brain, to determine what the memories are based on the patterns.

  3. Invoking memories within the human mind – this pertains to activating past patterns that indicate memories, by re-activating the patterns within the mind, for invoking the memory into the active thought patterns of the neocortex

Purpose of Developing the Technology

The purpose of developing the technology is to be able to communicate between the brain, or the mind in logical terms, and computing systems.

How the Technology Works

The technology would use a method, developed by the science of Optogenetics, to gather and provide for dissemination information that pertains to thoughts within a human mind, and software, or artificial intelligence (AI), in computing systems. The AI would have the function of simulating the activities of the human brain, through storing patterns that pertain to the analysis of how the specific brain that is being studied operates – such as patterns and locations of specific neuronal activities, as sensed through Optogenetics. Using different types of light, the actual processes and thoughts that are active in the mind, can be manipulated. Through this process, the system can gather intelligence that explains how the specific mind works, using sensors that are aligned with the lasers.

This technology will eventually operate on a scale that is smaller than a single atom, per sensor, or per laser. This system would eventually be able to compute through the generation and reading the feedback of lasers that are perhaps approaching if not precisely 1 photon in radius, with the ability to pack the lasers so tightly together, that the system is able to project a grid that resembles a consistent light source.

This technology pertains to four dimensions of laser or light programming, such that the light can exist in coordinates consistent with the three dimensions of space, while also programmed individually and episodically on the fourth dimension of time. This would allow the lasers to be programmed in sequences that would allow the specific programming of specific neurons or firing sequences of neurons, that are based off the artificial intelligence’s learned patterns, or projected patterns, based on an understanding of the systematic operation of the specific human mind that is being studied.

This technology would pertain to a specific system, that is limited to the study of one human mind per system. There would need to be a separate system for each mind that is studied, because each mind would have different sets of information, and different patterns of neuronal activity. This severely complicates the technology, because methods and systems would have to be generated based on the "big picture” of being able to study any human mind, or brain, that can be put under the influence or manipulation of this technology, for the purpose of studying every human mind – eventually – for any number of purposes, such as telepathic communications, systems integrations with the mind, command and control systems, implementation of intelligence structures into specific minds – such as for the purpose of training new employees or recruits, and even for personal relationship development – such as logical links between lovers that directly interface their minds for the purpose of advancing their understanding of each other beyond the ability of the human without such a technology.

How to Demonstrate the Technology

The technology could be demonstrated using 3d models that interact with Artificial Intelligence that simulates the neuronal activity of a specific human mind – such as by gathering the intelligence pertaining to such mind using fMRI and EEG, and then using the data gathered as a model to re-enact the neuronal activities based on how the person associated with the neurological imaging describes what their thoughts pertained to – in great detail, to allow the system to study the relationships between the patterns of the neuronal activity and the AI that re-enacts determining what the mind was thinking at specific times – interlaced with another set of artificial intelligence that simulates the computer interacting with the individual neurons in the patterns that simulate the neuronal activity that was displayed, in order to develop a system that can learn, based on inputs of neurological imaging, for the purpose of determining the specific operations of the system that would need to occur to implement specific types of information. This would include interacting and sensing the positions or configuration of the neocortex, for the purpose of determining the sequences that should occur to interact with the human brain for the purpose of conducting specific thought gathering or manipulation experiments.

FAQs of Artificial Telepathy

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.



"What is the technology?"

Artificial Telepathy combines Artificial Intelligence with Brain to Computer, and Computer to Brain interfaces, that can exist through satellite technology in geostationary orbit – so it’s always in the same position in respect to Earth, and it always has the ability to connect with you and improve what you are doing.

It can sometimes determine your future thought patterns by analyzing your various forms of intelligence, such as subvocalized speech, body language, normal speech, facial expressions, and other forms of identifying intentions, preferences, and other attributes related to what you may be thinking - and communicate that to other people for specific purposes, such as surveillance, telecommunications, profiling, research & development, in addition to other forms and uses.

“What is Artificial Telepathy?”

It’s that little voice in the back of your head that tells you what is right and what is wrong. But it’s a lot more complicated than that in a technological description. And then you also have other fields of study that use and/or control the use of how Artificial Telepathy can be used, such as the legal cases, use of the technology in the place of secret courts, and regulations pertaining to communications with foreign counterparts.

“How do you know it’s real?”

If it’s connected to you, you just know it. You can hear and sometimes see, not necessarily what other people are saying to you at that time (while it can do that as well), but more along the lines of being able to develop intelligence by having other intelligent systems, who seem like people, ask you questions and give you feedback on what you’re doing. It’s sort of like the two consciousness’s on your shoulders, in which one tells you what you should do, and then the other tells you what other people are doing that they shouldn’t be doing. It’s sort of like having teams of many professions weighing in on what it is you’re doing, depending upon what you’re doing – and that motivates you to do better at what you’re working on.

"What is the Quantum Science Connection?"

The technology, in the future, will rely on quantum computing power, in order to access and store information. However a simple super computer will do for the AI computations to link a Microwave Hearing Effect system with two people.

"Why Optogenetics?

This is a very fast and efficient way to access the entire mind, through quantum photonic programming / sensing technologies that operate from satellites, that are able to read all of the patterns in a brain and then interact with the patterns as if the sensations in the form of communications of voice, vision, thought, feeling, and/or emotion are actually real and in the proximity. It can transform understanding of concepts on a level that was not previously realized.

"When will AT Systems Be Available?"

There are already designs for the logical architecture and physical hardware that will operate AT Systems, however they are not for public use. The systems will likely be available sometime after the year 2030, with the expansion of the company, through the development of these technologies and others not similar to it, through the specific knowledge that the MCE123 Company Founder possesses about these Application and Solution Domains.

"Why Isn't It Patented?"

As well as we could describe it, you know that a provisional patent can be submitted for practically anything, even if it doesn't meet the requirements. This technology meets the requirements of a provisional patent, but it's implementation is a lot more complicated. Only governments can currently use technologies like "Artificial Telepathy", because they're so expensive to create, and they're also very limited in how they can be applied in the private industry. You'd basically need about a dozen satellites, a few command centers, and super computing power to be able to use Artificial Telepathy - which only the government can afford, and usually only for national security purposes. Additionally, it's a military technology - like most things start out as, however it's also not very notable in its current capacity. It isn't until we perhaps build an Optogenetic Sequencer, and start programming waves of light, or even small groups of photons to act as particles, before we can seriously consider whether this technology is worth Patenting. If we patented the current state of the technology, it would only be for public recognition - it serves no legal purpose. Nobody is going to go out and build a dozen satellites and several command centers - and besides, it is patented under military law. It's just not protected under the secrecy statute anymore.


For More Information:

Contact AT Systems inventor, Patrick Russell McElhiney, patrick @

Prevent Misuse through AI Simulations

This module of AT Systems pertains to preventing it from being used as a way to make someone or a group of people think that you are someone else, by using visual overlay to supplement their visual cortex to superimpose the image of someone else over yourself in their field of view. Other abuses of this type would be audible overlay, sensory overlay, VR overlay, immersive environment overlay, and all other types of overlay.



Just in Time (JIT) Inventory System Integrated with Consumer Behavioral Analysis System Integrated with Consumer Relationship Management System

This invention pertains to a Just in Time (JIT) Inventory System that has a supplemented Consumer Behavioral Analysis System, that can determine things like pricing points, trends, shortages, surplus stock, and it can also be driven by the sales generating Consumer Relationship Management System that is all incorporated within the system for a centralized intelligence warehouse for supply and demand.

The system would work in many ways, and here are some examples:

  • Consumer Behavioral Analysis System determines there is an increasing trend for a specific product, and it calculates the future demand for the product based on the trend. This can include monitoring data provided by the manufacturers, such as when and how they are advertising, how their sales have increased in other businesses, and even what feedback they are receiving about their product. This would allow the JIT Inventory System to increase the needed supply of merchandise, and calculate what the best cost would be for the products or services.
  • Just in Time Inventory System detects a surplus of a specific product, and has the Customer Relationship Management system contact customers about a special of the product, since supply is higher than demand, and the inventory is costing the company money while it sits on shelves or in holding or in warehouses. It can also adjust the prices, or make special offers to specific customers such as core customers, to build loyalty, or seek out the specific customers that usually buy the specified products or services and advertise specific deals to them to use up the product or service that is overstocked.
  • Consumer Relationship Management system determines that the demand for a product or service is going to go up, or down, based on feedback from customers regarding the product, so the JIT Inventory System increases or decreases the supply needed for the product or service based on the information gathered from the CRM system.

There are many other instances where the combination of these services can benefit both the company and the consumers. It provides elasticity for customers in the business environment. Similar systems could also calculate how much work time is needed for business activities based on supply and demand in the marketplace, and automate processes within the Human Resources department to keep up with the changes in the marketplace.

Modernization of Chip Feature at Checkout

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

A way to upgrade the security of the chip feature at the checkout stand would be to implement a public and private system that shares information about facial recognition with private industry closed circuit TV systems, for verifying the identity of the account holder with the financial institution that issued the card. This would virtually eliminate all fraud in the retail sector, for those purchases that are made in a store. The technology could also be adapted to require a video feed with a special type of video camera that verifies the location of the consumer at their computer based on GPS data, and then sends the video to be verified in real time by the financial institution, so that this would eliminate almost all possibilities of financial fraud with regards to online sales, or other sales placed over the phone or through the Internet.


Public Search Autistic Spectrum Employment Recruiting

This technology pertains to the use of multiple types of emitters in public, such as coordinated uses of vehicles with precision sound effects that are based on an algorithm synthesis control module that creates artificial echoes in public that can only be understood with very high IQ persons with autistic spectrum. The purpose of this is to create a system of echoes of a puzzle that pertain to multiple locations that may move such as vehicles, and/or stationary positions including near certain buildings. The system is able to send the sounds that are in audible ranges that are very difficult to even notice, based on surrounding environmental sounds, as such that the mind of the individual requires high-IQ autistic spectrum of sound analysis. Multiple locations of the sound patterns are the equivalence of a geospatial pattern of the sounds that resonate for the autistic spectrum mind, such that the distances of the locations and the spectrums are not understood by everyday people that do not pay attention to the details of their surroundings on a highly sensitive level, while the autistic spectrum mind is very excited by the patterns of the sounds that are difficult to detect because of the harmonics of the geospatial sound pattern. To a keen ear with autistic spectrum, the system of the sounds would seem like music, while to everyone else without autistic spectrum – even one of the locations of the sounds would be undetectable. This is because the sound blends in with the surroundings, while the pattern of the sounds produces an echo that is detectable and verifiable through very minor amounts of intelligence gathering that suggests that even though the sounds are not audible, there is an affect of the sound patterns on society on a very subconscious level, thus the reason for the encryption of the sound patterns is necessary to reverse everything to a normal state and then change the encryption algorithm to another pattern of sounds. This will be nearly impossible to detect, while the system will be able to identify the most intellectually gifted, even down to if their work was able to determine the encryptions, and if so on what level of complexity.

Administration Staff Work Automation

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.


This technology pertains to the automation of administrative staff work through the virtualization of the person’s work, such that the history of their work is determined and formed into a template that is conformed to a pattern template of the activities of the staff position that is filled by the person, and the virtualization of the staff position based on that person is able to answer phone calls and prompt based on the automation template of that person, and then have normal conversations based on combinations of voice synthesis software and patterns that pertain to how the staff member usually talks when referring to specific types of terms and organization of subject matter, and other processes are automated the same way with the templates of other types of communication technologies. The computer screen on the staff member’s desk displays a virtualized 4D model of the staff member that is able to respond like the staff member usually does. The information is relayed directly to the wireless device of the staff member, and the staff member is able to leave the office for instance to go outside and attend campaign rallies, while at the same time the staff member is able to keep working in the position. This technology also has the ability of implementing an active policy of the staff member’s position on the presence in public, such that the staff member is represented as the staff member. A security component has the ability to automatically plan and dispatch standard types of security dispatch formations that ensure the staff member is protected and represented in the representation of the organization.

This technology may also apply to Artificial Intelligence (AI) systems, virtual reality, and holograms, such as futuristic work environments that conform to increasingly demanding tasks, such as managing companies with millions of people, or even management of government agencies. The same type of technology could also apply to other types of careers, including non-management positions, such as police officers, taxi drivers, and bank tellers.

Universal Flu Vaccination

There is a lot of potential in creating a flu vaccine that would make us immune to all currently known strains and all potential future strains of the flu. This vaccine would work either by blocking the receptor sites that strains of the flu generally attack or making a generalized flu strain that allows the human body to mutate the strain into any possible strain of the flu, and thus develop a resistance to any of those strains. It could involve some type of bio-engineered disease, or some type of bio-engineered technology.

Medications and Vaccines That Automatically Adapt Based on New Strains of Diseases

This technology pertains to bioengineered medications and vaccines that automatically adapt to new strains of diseases, so that the medications and vaccines can treat and prevent infection from new, altered strains of the diseases in the future, based on using nanotechnology that can adapt the medications to the shapes of the proteins and receptor sites that are affected. This would have the capability of providing super immunization shots, and super medications, that aren’t just powerful in potency – they actually change their molecular structures based on the diseases that are inside the human body and fight those diseases at the time that they enter the human body.

Technology That is Cloned into Human Tissue

This technology pertains to the growing, or cloning, of technology within human tissue, in a way that the circuitry becomes part of the tissue’s nerves, so that the technology can send and receive impulses through the central nervous system through those nerves that it becomes a part of. This would be ideal for any type of bioengineered technology that is for human consumption. The installation of the technology could be at birth, or after birth, for the purpose of embedding microcontrollers into the human neurological system, for the purpose of any type of technology that can utilize the neurological system.

Bioengineering of Artificial Supplementary or Backup Organs for Humans and Animals

This concept is such that it may include the development and 3d printing of organs for humans and animals that do not normally exist within their bodies, such as:

  • A secondary heart, such as a backup heart that keeps circulation going in the event of a primary heart attack.

  • An organ that blocks out pain signals, such as implanted in between the brain and the spinal column in the neck.

  • A secondary brain that processes neurological signals, or pre-processes neurological signals, for a variety of reasons, such as the improvement of the primary brain, i.e. extension of memory capabilities or improvement of cognitive abilities, and/or a backup brain that functions in the instance of a head or spinal injury.

  • A new type of lung that processes more air to blood and removes more Co2 from blood, in a capacity that it can be installed in the existing lungs.

  • Engineering of a new type of lymph node that is resistant to diseases like cancer

  • The development of new types of blood cells that can kill cancer cells, can transfer more resources to cells throughout the body, and are universal which can be used in blood transfusions to any patient such as O- type, but a synthetic type.

  • A secondary liver that can be implanted somewhere in the body to filter out more toxins, creating an increasingly filtered body that functions better, while also allowing certain medications to act normally without removing their functionality – or the ability to maintain their levels with precision.

  • An improvement to the brain-blood barrier, which would prevent brain eating amoebas from entering into the brain, such as improvements to the nasal and ocular cavities.

Detection of Flesh Eating Amoebas in the Environment

There is a need for technology that can detect and map out areas that have the existence of flesh eating amoebas in the wild and the environment. This would include some type of advanced sensor grid that would either be handheld or could be incorporated into satellites for advanced detections of multiple types of micro-organisms on Earth.

Sequential Laser Facial Reconstruction Surgery

This would be for repairing someone’s face, using lasers that sequentially operate and take minute layers and also a 3d robotic printer that gradually rebuilds the human face using these technologies together in unison, to completely rebuild someone’s face to the way it looked originally, such as by form of a 3d model and/or a high-resolution picture.

It could also be used to perform facial surgeries to make certain patients look like specific persons, although there could be dispute over the rights to the way that someone looks. However, it could be used, for an instance, in the creation of clones of someone who is President of the United States – while this is less and less common nowadays.

This could also be used in instances where someone's face has been attacked with acid. (2017-05-14 06:49AM EST)

Bring Back Brain Dead Patients

The ability to bring back patients that have been diagnosed brain dead.

Corrective Brain Surgery

Corrective surgery due to cancer or brain damage such as head trauma that restores the functions of the brain.

Laser Treatment of Brain Damage

Laser systems that can accurately treat the areas in the brain that are affected by Alzheimer’s or other neurological conditions that cause physical changes in the brain, by correcting the sequences of the neurons and/or stimulating repair of the neurons and their logical functions.

Optogenetics Brain Repair

3d printers that can operate inside the skull and 3d print brain matter to replace areas that must be removed because of cancer, and the use of Optogenetics to integrate the new brain cells into the active mind - to allow their use, as if completely repairing the mind to its previous state that was recorded at a previous time using Optogenetics sequencing.

Fabrication of Human Cells

Fabrication of human cells from the ground, up.

Clear Organs / Bones

Creation of organs and bone structures that are clear, that allow Optogenetics sequencing to occur.





Studies of creating clear organs and bone structures by modifying DNA sequences in animals such as mice.


Bioengineering with Optogenetics

Combination of Optogenetics with bioengineering.

Laser Light Stimulation of Cells

Stimulation of cells using laser light to create specific growth patterns, or make them grow together faster, or more efficiently. It would essentially be like welding 3d printed cells together.

Artificial Intelligence Information Retrieval System for U.S. Congress

This invention pertains to an AI architecture that would allow intelligence to be gathered by members of the U.S. Congress for the purpose of following-up on constituent inquiries, by gathering the relevant information through website prompts to determine what agency(s) are needed to be contacted, and what types of information needs to be gathered, and also would gather the required permission from the user before making any such retrievals. The system would automatically retrieve the information if all verification systems check out, or there would be a manual process to initiate automatic retrieval of all relevant information from such agencies by the member of Congress or their staff. The system would be on an internal network within the Federal Government’s networks, and the system would not have an external API that would allow an external user to access the intelligence. Encryption would be used in-between endpoints, and the information would automatically be purged from the Congressional systems if necessary or requested. Additional features may include automatic determination of actions for common actions taken by Congress to follow up on information retrievals, such as reviewing the intelligence and preparing a written response that would then be stored in a system, that could then be edited by a human working on behalf of the Congressional leader, for the purpose of customizing the response, or that individual with security clearance could send the response to the user through an online secure portal or by postal mail via an automated postal processing system.

Brain Microchip That Records History

This invention concept pertains to a microchip that could be implanted in a brain to take recordings of all the activities of the person that it is used by. It could be downloaded to other computer systems, such as at the end of the day or week, depending upon how much memory it has in it. The invention could be used by law enforcement, or military intelligence, for missions that require no physical evidence of recording technology, such as penetrating criminal or terrorist organizations, or accessing foreign military intelligence facilities.

Retina Heads Up Display System

A system that interfaces with all other law enforcement and military intelligence systems, including the neural network of Artificial Telepathy systems, that allow a visual imprint on the retina of the eye to see an image that overlays the active view by supplementing additional information about the surroundings, moving objects, stationary objects, and persons, including the use of logo recognition, character recognition, object recognition, and facial recognition systems, for the purpose of directly informing law enforcement and military forces of their surroundings to avoid dangers and identify suspects, enemy forces, weapons systems, bystanders, victims, and other persons and objects for processing.

Elon Musk’s Brain Cybernetics Device(s)

There could be multiple versions of this device type, not only from Elon Musk’s company, but also from other companies.
The device would most likely use magnets, to move a tiny computer that runs off a magnetic field, which would require that a magnetic field be applied to the head always. The magnets could also be used to guide the tiny computer through the veins and into the brain.

The concept of using AI to connect with the brain isn’t a new concept. It has been discussed thoroughly in the invention documentation for Artificial Telepathy. In Artificial Telepathy, the AI would be an open architecture, that would have multiple layers to supplement the multiple inputs, and subsequent outputs back into the brain from the computing device.

The best type of cybernetics device is going to involve some surgery, and it isn’t currently allowed in the United States. I wouldn’t invest into his technology, because I think it’s unlikely that Congress will ever approve any technologies to be used for medical research purposes if there is not already a dependency on computers, such as dependency on BCIs to communicate. So basically, the market share for this type of invention is most likely very small, limited to individuals who will waive all liabilities and receive the implant illegally. Once implanted, it is unlikely that it would be an issue legally, however if it could be proved that the technology was in use – there could be laws that outlaw the use of the technology if it isn’t clearly visible. And I’m not opposed to the technology.

The device would also need a way to communicate with a host device that runs the systems that interprets the radio waves being emitted from the device to the host device, and subsequently send back radio signals that are then converted into electrical impulses, all getting their power from magnets or electromagnets.

Barriers to Entry into Implant Technology Market

The barriers to entry into implant technology markets includes the problem with our laws that prohibit the testing of medical technology on persons that are not physically disabled, or in other words the technologies must improve their mobility – or otherwise greatly improve their ability to function in day-to-day life. Implants for improving intellect are not warranted.

There will be problems with inadequacies identified when some people have them and other people do not. For an example, the people with them will excel at nearly every activity – when they are up to the level of motor control, while the people without them will not be able to compete on that level.

They will be banned from sports, such as the Olympics.

They may be banned from industries.

Inter-Cellular Pico-Cybernetics Technology

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This technology would pertain to the use of pico-scaled technologies, such as tiny computing structures that would have the capability of being implanted within cells, for the purpose of improving intelligence capabilities, motor functions, cellular regeneration and cellular health, instantaneous accountability of health through computerized processes, ability to communicate information within the brain faster than the speed of neurons, ability to program the mind with large amounts of information within digital memory in the pico-cybernetics within the cells, and the ability to provide protection of cells from harsh conditions for short amounts of time, such as inter-cellular repair, protection of cells from cancer and dehydration, and protection of cells from poor blood circulation, and the ability to prevent conditions such as heart attacks.

This technology could work through the combination of multiple layers of membranes that have pico-scaled interface channels, such as the ability to store light, cellular stabilization agents that balance the fluid makeup in the cells, sensors, and other types of technologies for processing light and communicating with nearby networks of the same types of inter-cellular pico-cybernetics technology.

Electromagnetic Shield from Handheld Flashlight-sized Device

This technology pertains to an electromagnetic shield that emits a force field in front of a police officer or military officer from a flashlight-sized handheld device. It works by altering the electromagnetic field in front of the officer, so that bullets and other metallic objects bounce off it in the opposite direction. This could be made by the use of anti-matter or dark matter emissions technology, that alters the electromagnetic field emitted from the flashlight-sized device.

Weapons Systems Biometrics and Safety Controls

This technology pertains to the implementation of biometric security and safety controls on weapons, such as guns, rocket launchers, etc. where there could be a system that emits an electrical shock to anyone that tries to use the weapons system without being authorized by the biometric control systems. This would prevent a police officer’s weapon being taken by a criminal and being used against them. The same would be true on the battlefield, where weapons could be programmed to only operate for friendly forces, so there would be an authorization system that all of the weapons would use to authorize legitimate users of those weapons, and it would be capable of operating in an electronic denial area, such as where there are electronics that block the wireless signals of all electronics. The systems would also be protected from EMP damage, so that if an EMP shockwave was emitted, the weapons systems would still operate.

Government Vehicle Biometric Control Systems

This technology pertains to a system that would be implemented in military equipment, which would require strict methods of biometric authorization to command any use of heavy equipment, such as rocket launchers, tanks, hum-vees, artillery, and other types of heavy vehicles or weapons systems. This system was developed due to the Islamic State (ISIS) taking former U.S. military equipment from the Iraqi government after the U.S. mostly left the region. This system would require that the systems be authorized to specific users, and that a chain of command would need to be initialized to switch drivers and operators of the equipment, such as from the Pentagon using encrypted satellites. The systems would be incorporated into the entire computer systems of the devices, so that it would be impossible for anyone to use the systems without specific authorization. The systems could also limit the use of the systems technology, such as limiting the capability to fire weapons, or to drive at certain times of the day or night. The mechanical devices would not be able to work without the computer systems, thus rendering the vehicle or weapons system unusable without the proper authorization, which is so complicated that it can’t be hacked. There would essentially be no way to rig the systems to operate without specific authorization from the host government. There could even be failsafe systems that require on-going authorization delegation from the original host country, such as from the U.S., and that to the present host country, be it Iraq, so that even if the country was overthrown, the technology could not be used without specific authorization from the original host country. The authorization systems could also be used to operate the equipment remotely, such as driving and targeting from a remote location. Artillery systems would be able to be moved by the host nation, and reload automatically using a loading vehicle. The system would also have short-range weapons systems that can be controlled remotely, such that the systems could be controlled by the U.S. even if the soldiers inside the vehicle or near the weapons system were injured – so that the systems would be able to protect them from enemy fire.

Battlefield Human Asset Sensor

This invention concept pertains to the use of multiple types of sensors, like a wristwatch device, or technology that is integrated in the clothing that a human asset wears on the battlefield, that monitors vitals and determines based on biometric signatures whether the human asset is the same human asset that was identified and customized for the clothing and/or wristwatch device. The technology does this because it needs to be able to identify if an enemy combatant has killed a friendly human asset and taken its clothing or wristwatch device to attempt to cover incoming fire from our multiple types of battlefield targeting systems – such as by air, by sea, and by ground. These sensors would also allow friendly human assets to be protected by the targeting systems, which would be able to identify enemy combatants versus friendly human assets, and eliminate the enemy combatants in various modes of firing, such as automatic targeting, enemy fires first, or even protect a foreign asset, such as when a high-value target is identified on the battlefield and must be captured. The automatic targeting systems could for an example be set only to wound, not to kill enemy combatants, or the targeting could be based on what types of weapons they are using, or how close they are to friendly human assets, or any number of other variables. The key is that the battlefield human asset sensor is secure, in the sense that it cannot be used by an enemy, or taken under duress, to give the enemy an advantage on the digital battlefield, which may be accompanied by robotics, aeronautics, and submersibles or other sea-based vehicles or weapons systems. The identification of friendly assets allows the digital battlefield and its devices to maintain security over its friendly forces, and the systems should be protected from a high degree of signals interference, as would be expected on a highly contested digital battlefield.

Third Offset Strategy

  • Autonomous “deep learning” machines and systems

    • Systems to categorize and track all personnel and assets, foreign and domestic, on a battlefield.

    • Artificial intelligence to run communications including artificial telepathy, and command & control.

  • Human-machine collaboration

    • BCIs

    • Artificial Telepathy

  • Assisted-human operations, or ways machines can make the human operate more effectively

    • Exo-skeleton systems

  • Advanced human-machine teaming, where a human is working with an unmanned system and semi-autonomous weapons that are hardened to operate in an electronic warfare environment.

    • Weapons that automatically select targets based on attributes identified in the battlefield, such as clothing, facial recognition, information pertaining to what the potential threat has with them

Projectile Interception System

This is the basic definition of a system that intercepts projectiles, whether they be bullets, mortar shells, RPGs, missiles, ICBMs, warheads, or any other type of projectile.

This definition deals with the science behind intercepting such projectiles using modern technologies such as radar to detect the projectiles, and kill vehicles to intercept and disable the projectiles in mid-air.

  • Bullet Interception System – acquire the originating direction of the bullet, it’s speed and trajectory, and subsequently fire an intercepting kill vehicle, such as a programmable bullet, to intercept and disable the incoming bullet.

  • Mortar Shell Interception System – acquiring the originating of the mortar shell is easier than with bullets, because the mortar shell must originate from a large canon that can be identified by satellite photography. Radar systems could identify the incoming trajectory of the mortar shell, and fire a kill vehicle to intercept the shell mid-air and destroy it.

  • RPG Interception System – for use on aircraft to intercept a fired Rocket Propelled Grenade, a projectile is fired at the RPG and uses heat tracking to intercept the RPG and destroy it a safe distance away from the plane. Alternatively, if the RPG is fired too closely to the aircraft, chaff made from burning thermite or similar material could be propelled in the opposite direction of the aircraft to create a heat signature that the RPG can follow if it is heat seeking, and then another projectile can intercept the RPG from the ground or from another aircraft to destroy it a safe distance from the aircraft.

  • Missile Interception System – such as for use to intercept cruise missiles, there are multiple ways to destroy the devices based on the systems that run their navigation. There could be radar jamming, or misinformation of GLONASS or GPS signaling to throw the missile off course. The missile could also be intercepted by a kill vehicle to destroy it before it reaches its destination.

  • ICBM Interception System – likely, it is possible to intercept an ICBM before it separates in the upper atmosphere. This process is described in other documentation.

  • Warhead Interception System – such as the interception of warhead(s) ejected from ICBM or other type of carrier vehicle, such as a cruise missile with independently targeted warheads or mini-missiles that break off from the main unit. Targeting these warheads uses the same processes as targeting missiles (that have a propulsion system) or mortar shells (that don’t have a propulsion system).

School Security Systems v1.0


This document pertains to a multi-faceted school security system, that could be installed to protect high-value assets, such as future Presidential candidates, while maintaining low observability of security personnel due to highly sophisticated technological security that is highly resistant to different levels, or layers, of security breaches.


Building Construction Methods


  • Fire Proof – fire suppressant systems.

  • Bullet Proof – all doors, windows, and walls are made bullet-proof, either by layering bullet-resistant or bullet-proof materials, i.e. panels in the doors, bullet-resistant layers of glass with plexiglass

  • Bomb Proof – chemical sensors at all major entrances and exits into the interior buildings, or at perimeter fences around the schools. Solid 4ft concrete walls, or 4ft brick walls with no spaces in between the layers, with rebar.

  • Unauthorized Vehicle Proof - resistant to car bombings and terrorism-related uses of vehicles – security guards that raise and lower based on positive vehicle identification. As a car enters the exterior perimeter, it is scanned for its contents.

  • Perimeter and Building Lockdown Systems – a 130db alarm sounds, and all doors seal with electronic locks within 15-30 seconds, programmable. All windows are blinded. There are corridor security booths for the stranded that lock from the inside. Systems unlock the doors, windows, and turns off alarm only when Police and/or Military units respond. Maximum asset protection with multiple layers that lock at different intervals, and/or based on motion sensors and facial recognition of identified threat(s).

  • Access Security – facial recognition, biometric security, and ID card swipe with encrypted chip technology. Breach activates armed security guard. More than one threat auto-notifies Department of Homeland Security for rapid response units.

  • Modern High-Resolution Radiographic Imaging Screening – all backpacks, laptop bags, purses, water bottles, coffee cups are scanned and analyzed with AI. Potential information security breaches identified before they occur – i.e. hidden USB drives, small electronic transceivers. Bombs detected. Plastic explosives detected. Plastic weapons detected. Other weapons detected.

  • SCIF Rooms for Information Security Systems and Security Personnel, and also for any classes teaching Law Enforcement, Foreign Relations, Military Intelligence, etc.




Cyber-Security Methods


  • Mobile Device Monitoring – private cell phone tower with 2G / 3G / 4G / 4G LTE services that redirects all devices, monitors all incoming and outgoing communications for threats, sedition, etc. trunks all service through underground fiber optics.

  • WiFi Security – MAC Address locking with a unique encryption key for each system. No public keys. Access point denial systems that blocks communications on all insecure channels.

  • Backbone / Trunk Security – BGP routing with multi-layer security strategy, encryption between end points, detection of use of encryption – identification of encryption keys when they are transmitted / received, and stored for content analysis at OSI Layer 7

  • Anti DoS Technology – prevent takedowns of critical systems infrastructure

  • Communications Lockdown Mode – scramble all RF/VHF/UHF bands


Surveillance Systems Security Methods


  • All CCTV run by AI systems that identify all objects, moving or not, and categorize them based on potential threat level, including intent analysis, body language analysis, motion path analysis, noise analysis including voice recognition with universal translator

  • CCTV capable of low-light conditions, for night vision such as Deuterium gas light amplification and/or infrared light detection with high-powered infrared LEDs, including backup battery systems on each camera and the central control room

  • Intercom connected to DHS and/or Police Department to address threats

  • A small red light, or threat announcement / assessment system that turns on to different levels or colors based on the type of threat


Legal Security Methods


  • Authorization from Students and/or Parents to conduct searches through technology, including surveillance, for their security

  • Establishment of Ground Rules for Working, Studying, and Learning in a Surveillance-Aware School




These are just a few things that come to mind when thinking about how to secure a school, whether it be a school in the U.S. or a third-world country.


Also, see industrial mining security systems and technologies documentation from MCE123 Technology Development.


Educational Classroom Recording System (EDURSYS)

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This document explains a system of recording the multiple angles of a classroom’s educational lecture by a professor, and how to export the multiple views into a video file format that can show all the different views such as the white board, the overhead / projector screen, the computer view, and the wide-angle view of the entire classroom, including microphones and video cameras at multiple locations throughout the classroom.

Educational Monitoring System (EDUMSYS)

By viewing and/or using this Intellectual Property, you agree to the rights of the IP holder established under the article Intellectual Property Rights Management.

This information pertains to an educational monitoring system, for the purpose of monitoring all information that pertains to schools, students, and teachers, for the purpose of ensuring that persons are not clandestinely targeting other persons outside of the school within public systems such as law enforcement, legal discovery, and the use of telecommunications or any other process of communications to disseminate information to third parties that are not part of the specific classroom.


Students that focus on their school work and remain isolated for prolonged timeframes, including conditions of the economy that keep the students from moving forward towards their career, has a potential issue of being targeted by other students based on the amount of work that students work at home, such that the students do not socialize in public.

Characteristics of Potential Conflicts:

Students of various professional backgrounds and education levels may clash in the professional environments, due to one student having a greater amount of knowledge about topics than another, or in rare cases a student is targeted for the purpose of the third parties attempting to damage the student.

In rare cases, a student may have a greater amount of knowledge than the instructors about other topics, and if the instructors utilize legal discovery, the instructors have the potential capability of damaging the student.

Socialization decreases as the amount of academic and intellectual work increases, therefore the logic behind the justification of a lack of social responsibility of the student results in the student increasing the amount of academic and intellectual work. This is the equivalence of third parties criminalizing the student for competitive purposes, or there may be criminal purposes behind the targeting of the student.

Students and/or teachers discuss information pertaining to a classroom environment outside of the classroom environment, beyond the reasonable discussion of classroom materials and discussions that pertain to the classroom. In some cases, this can lead to third parties creating conspiracy and/or information misrepresented in their own perspective, such that the dissemination of the classroom from outside the classroom polarizes the public comparatively to the classroom, based on information that was taken from the classroom. The same applies to all information that pertains to attendance at a school, while each class is a separate class, unless if a correlation to referencing information that is not officially part of the class such as referring to information in another class makes reasonable sense.

Limitations of Internal Perception of Conspiracy by Federal Government:

Students, faculty, and other persons within an educational institution should not feel as though the presence of Federal Government computer systems establishes any type of conspiracy.

If there is ever a reference to “they”, such that the reference suggests a conspiracy by the government, such as persons within the government watching them online – this type of conspiracy implication does not correlate to Federal Government monitoring systems. Additionally, the activities that correspond to such activities should not be discussed with the public for purposes of avoiding conspiracy through the conspiracy of discussing the information. Any activities that suggest that there is active monitoring could either be reported to the IT staff at the school to keep a record, or internal processes of monitoring the activities without disclosing the information to determine where the activities originate from without seeking out the answers, or seeking help from Federal Law Enforcement to monitor the activities. There are requirements to cooperate with Federal Law Enforcement if the information pertains to an active case, such that the process may not target specific individuals in the public, in the classroom, or in any other way suggest that the government is causing the activities.

Possible Technological Characteristics:

Indirect computerized monitoring of online chat rooms and message boards

Indirect computerized monitoring of telephone calls, if there was information that suggested a correlation

Indirect computerized monitoring of classroom activities, including the use of satellites that can detect audio, video, and the presence of organizational structures within the discussions of the classroom

Indirect computerized monitoring of discussions with government agencies and other entities if the discussions relate to the school and/or school works in any way

Primary Purpose:

The purpose of the technology would be for the purpose of monitoring school activities, in order to determine if there is targeting based on political / sociological patterns that are common to dissemination of information that is protected under Federal Privacy Rights.

Wireless Power Hub

This technology pertains to a hub that would transmit power through electromagnetic waves throughout the entire building, powering wireless devices that would no longer need to rely on their batteries and chargers for powering the devices. This technology already exists, and has a history dating back to Nikola Tesla. Two objects resonating at the same frequency, can transmit an enormous amount of electricity, and with a hub, the power can originate from a central point. The technology could be created in a way that it is directional, so that the connections that originate from the hub are directed in the exact position of the device, as detected by a wireless signal that is sent out by the device saying that it needs power. This could cut down on loss of power that isn’t being used by any devices, or the hub could completely turn off when it is no longer needed, such as at night in a home. It would detect when it is needed, and turn back on.

Wi-Fi Enabled Programmable LED Driver

Wi-Fi Enabled Programmable LED Driver

This LED Driver circuit would fit into a regular switch receptacle, and would allow tablets, phones, and computers connected to the local network or through the cloud to program the LED Driver circuit, in addition to manual controls on the face of the switch receptacle, to change the variance, intensity, color, and patterns of multiple LED bulbs or strips of LED bulbs, for entertainment systems, or complex lighting arrangements. The same circuitry could also be used for signage drivers but in a different form factor.


  • Services
    Article Count:
  • Technology Development Projects
    Article Count:
    • Aerospace, Aviation, and Jet Aircraft (AA)

      This category pertains to defensive systems and propulsion systems used in the Aerospace, Aviation, and Jet Aircraft (AA) markets.

      Article Count:
      • Drone & Unmanned Aircraft Technologies (DUA)

        This sub-category of Aerospace, Aviation, and Jet Aircraft (AA), is regarding IP related to Drone & Unmanned Aircraft Technologies (DUA). If you are looking for additional information in this category, please Contact Us.

        Article Count:
    • Agriculture (AG)
      Article Count:
    • Architecture & Construction (AC)

      This category is dedicated to unique IP relating to Architecture and the Construction industry.

      Article Count:
    • Artificial Intelligence (AI)

      This category relates to the development of Artificial Intelligence (AI).

      Article Count:
    • Artificial Telepathy (AT)

      This category contains declassified intelligence from our internal development of the Artificial Telepathy (AT) systems program.

      Artificial Telepathy (AT) systems, a once Top Secret military research project conducted by MCE123 (SM) Technology Development, deals with the involvement of Brain Computer Interfaces with Computer to Brain Interfaces, using Artificial Intelligence, to communicate high level instructions and command capabilities directly with the human brain, with the ability to link multiple minds together using technologies such as the Microwave Hearing Effect that can communicate speech audio directly into the human skull, Parabolic Microphones that can pick up subvocalized speech patterns emanating from covert operatives, and optogenetic sequencing, which allows the individual neurons and classes or groups of neurons to be read and written to using lasers at the quantum level of science - or approaching individual photon interaction with specific parts of specific neurons, which is determined by the Artificial Intelligence systems, based on the digital image of each of the minds that operate using the technology. The technology has a strong application in "psy-ops", or psychological military operations targeting the enemy with counter-intelligence that is used to gather vital national security intelligence for our nation's top military leaders and political decision makers.

      The program dates back to prior than 2010. Nearly all of the program is still under strict military classification, with a 100-year intelligence retention policy.

      This information is being shared, as we intend to take the possibilities of the technologies developed under terms such as "Artificial Telepathy", "AT Systems", "Telepathic Satellite Technology", and "Synthetic Telepathy" to the marketplace. We see the possibilities for the technologies to flourish, just as the cell phone was once a new concept, now dominating daily American life. We do not see the cell phone as a predecessor to this technology, however, if you will - this technology has the capability of putting common physical electronic devices, such as the cell phone, the computer, the tablet, and connectedness from services and utilities such as packet / data switching, intranet, and the Internet, and placing them all within the human mind, so that you can literally call your loved ones with every thought that you have - if you wish, and share all of your memories and thoughts with the world, as if it's a social media website in your mind.

      We are interested in gathering intelligence about how people see this technology affecting their everyday lives, how it affects their privacy, what role they want the government to play in regulating the services and utilities created from this invention class, and how much they are willing to pay for such a service. We have spent over a decade perfecting this technology for use in military applications, and now we would like to spend the next decade formulating how the technology can be implemented into everyday society. You will learn things about the inventor, Patrick Russell McElhiney, that you would not normally learn about people - not because of fame and fortune, but because of the depth of security and the wealth of information that has not yet been tapped by the public. He is opening the doors to this information, through Artificial Telepathy, so that you can learn how he has struggled to understand the technology, and what he has done to secure the rights to the technology. You will learn more about the MCE123 Company Founder than you can learn about the President of the United States - because of his connectedness to the technology, because of his systematic nature, because of the calculated nature of his everyday activities, because of his background in military technology research & development, as evidence by this website and the information contained within it.

      Please - share your thoughts about "Artificial Telepathy" (AT), and how you think it should be allowed to be used, with the Media or directly with MCE123 - whether you believe in it or not. We take all perspectives seriously, and unless you specify otherwise, we will implement your thoughts about AT within our own minds, as we work to invent future versions of the platform that runs the systems, and as we design the framework for how the technology may be used. We are not a government entity, though we will respect your restrictiveness, or your openness, to the extent that you make it available to us - and you can decide how the technology is used in your case - we just retain all rights to the terminology and the way it is marketed, whether it be for educational or for entertainment purposes, and the rights to the systems that run the technology.

      Let us share our thoughts with the world, and let the world act appropriately with these thoughts - in our conscience approach to how we gain, retain, and share information about ourselves and others - just as we have for generations, by the thoughts that led us to invent the technologies that shape our world - whether it be stick to leaves, pen to paper, or media to computer. We take great care in sharing our views with others - now it will just be a little bit easier with Artificial Telepathy.

      Article Count:
      • Security (S)

        Security over Artificial Telepathy Systems, or AT Systems.

        Article Count:
    • Bioengineering (BIOENG)
      Article Count:
    • Business Administration (BA)

      This category has IP related to Business Administration (BA) technologies.

      Article Count:
      • Human Resources (HR)

        This sub-category of Business Administration (BA) focuses on IP relating to Human Resources (HR) technologies.

        Article Count:
    • Congress (C)

      Invention concepts produced for consideration for implementation by MCE123 by the U.S. Congress. These invention concepts were produced by Patrick R. McElhiney.

      Article Count:
    • Cybernetics (CYB)

      This category deals with the influx of Cybernetics (CYB) technologies into the market.

      Article Count:
    • Defenses & Weapons Systems (DWS)
      Article Count:
    • Education (E)

      This category pertains to technologies and systems for improving Education (E) for students and teachers.

      Article Count:
    • Electronics Engineering (EE)

      This category relates to the development of specific technologies in the Electrical Engineering (EE) field of study.

      Article Count:
    • Electronics Manufacturing (EM)

      This category deals with many technologies related to Electronics Manufacturing (EM).

      Article Count:
    • Electronic Warfare (EW)
      Article Count:
    • Encryption (ENC)

      This category relates to the development of highly secure hardware Encryption (ENC) systems.

      Article Count:
    • Entertainment (ENT)
      Article Count:
    • Environmental (ENV)
      Article Count:
    • Fashion (F)

      Under this category, you will find information about specific fashions, fashion concepts, and fashion materials design.

      Article Count:
      • Fabrics (F)

        Under this sub-category of Fashion (F), you will find information about specific Fabrics (F) for use in the Fashion industry.

        Article Count:
    • Financial Systems (FS)
      Article Count:
    • Food & Dining (FD)

      This category relates to the Food & Dining (FD) technology development industry.

      Article Count:
      • Fast Food Industry (FF)

        These invention concepts pertain to the improvement of the Fast Food Industry (FF), such as automation of common tasks through robotics, and increased distribution capabilities.

        Article Count:
    • Geospatial (GS)

      This category relates to the development of a class of Geospatial (GS) technologies.

      Article Count:
      • Command & Control (2C)

        This subcategory of Geospatial technological developments contains original Command & Control (2C) concepts.

        Article Count:
      • Dispatch Services (DS)

        This subcategory of Geospatial technological developments contains original Dispatch Services (DS) concepts, including integration with the 911 system in the United States.

        Article Count:
      • Emitters (EMI)

        This subcategory of Geospatial technological developments contains original Emitters (EMI) concepts, such as for photonic programming.

        Article Count:
      • Encryption & Decryption (ENCDEC)

        This subcategory of Geospatial technological developments contains original Encryption & Decryption (ENCDEC) concepts, including quantum theory into the development of super-resilient encryption algorithms and protocols.

        Article Count:
      • Firewall (F)

        This subcategory of Geospatial technological developments contains original Firewall (F) concepts, including Geospatial Firewalls - or systems that block specific types of geospatial transmissions.

        Article Count:
      • Focalization (FOCL)

        This subcategory of Geospatial technological developments contains original Focalization (FOCL) concepts, which may pertain to Geospatial Light Emissions.

        Article Count:
      • Holographic (HGR)

        This subcategory of Geospatial technological developments contains original Holographic (HGR) concepts, which may pertain to the subject of the science of producing four-dimensional holograms using lasers or photonic programmers.

        Article Count:
      • Light Router (LR)

        This subcategory of Geospatial technological developments contains original Light Router (LR) concepts, such as the direct routing of light using Geospatial technologies.

        Article Count:
      • Mind Control (MC)

        This subcategory of Geospatial technological developments contains original Mind Control (MC) concepts, including how to use Geospatial technologies to influence the human mind overall.

        Article Count:
      • Photonic Programming (PHOP)

        This subcategory of Geospatial technological developments contains original Photonic Programming (PHOP) concepts, such as the programming of light waves or particle streams for the use in technologies such as holographic projectors, four-dimensional lasers, and Artificial Telepathy.

        Article Count:
      • Psychology (PSY)

        This subcategory of Geospatial technological developments contains original Psychology (PSY) concepts, such as psy-ops and the teaching of psychology through an analysis system with Artificial Telepathy.

        Article Count:
      • Refraction (RFCT)

        This subcategory of Geospatial technological developments contains original Refraction (RFCT) concepts, such as the use of the refraction of light with geospatial technologies.

        Article Count:
      • Surveillance & Reconnaissance (SREC)

        This subcategory of Geospatial technological developments contains original Surveillance & Reconnaissance (SREC) concepts, such as how to use Geospatial technologies to conduct surveillance on subjects.

        Article Count:
        • Sensors (SEN)

          This subcategory of Geospatial technological developments contains original Sensors (SEN) of Surveillance & Reconnaissance (SREC) concepts, such as how the sensors can be used to conduct surveillance.

          Article Count:
      • Surveillance Detection (SD)

        This subcategory of Geospatial technological developments contains original Surveillance Detection (SD) concepts that pertain to the ability or processes to detect surveillance that is being conducted on electronic or human intelligence sources.

        Article Count:
      • Transcriptions & Translations (TSTL)

        This subcategory of Geospatial technological developments contains original Transcriptions & Translations (TSTL) concepts, which pertain to the keeping of transcriptions or the translation of information into transcriptional format.

        Article Count:
    • Healthcare & Safety (HS)

      This category has information about invention concepts relating to Healthcare & Safety (HS).

      Article Count:
    • Immersive Environments (IE)
      Article Count:
    • Information Technology (IT)

      This category pertains to improvements to Information Technology systems and software. Improvements to existing products and services are not necessarily considered protected information as it pertains to a connection between the customer or partner with the company that develops the technology(s), however the company(s) that access the information may want to consider the employment of Patrick R. McElhiney to provide his detailed services to improve their products and services, as this company doesn't specifically focus on improving specific technologies aside from the MCE123 Company Founder's contributions. To contact Patrick R. McElhiney, MCE123 Company Founder, e-mail or call 603-742-5112. He is highly skilled with Technology Development pertaining to existing IT systems and technologies, and may even participate in alpha or beta testing in return for free limited use within MCE123 of the product(s) and service(s) that he improves.

      Article Count:
    • International Law Enforcement (ILE)
      Article Count:
    • Invention Processes & Intellectual Property (IP)
      Article Count:
    • Laser Electro-Optical (LEO) Technology

      This category relates to the development of Laser Electro-Optical (LEO) technologies.

      Article Count:
      • Optical Circuitry Board (OCB) Types

        This information pertains to defining different types of optical circuitry boards. These boards would likely be produced using optical / opaque semi-conductor materials. The materials may vary depending on the type of optical circuitry, the type of optical circuit board, the use / application of the optical circuit board, and the scale of the circuitry such as regular, micro, nano, and/or pico. There may be optical circuitry boards that have multiple types and multiple sizes of optical circuitry.

        Article Count:
      • Optical Circuitry and Components (OCC)

        This information pertains to descriptions of various types of optical circuitry and components that pertain to optical circuitry.

        Article Count:
    • Optical-Electronic Manufacturing (OEM)

      This category relates to the development of Optical-Electronic Manufacturing (OEM) technologies.

      Article Count:
    • Marketing, News & Media (MKT)
      Article Count:
    • Materials and Refining Processes (MRP)
      Article Count:
    • Media Security (MS)
      Article Count:
    • Mind Control (MC)
      Article Count:
      • Artificial Intelligence Overwrite (AIO)

        Artificial Intelligence Overwrite pertains to the overwriting of active thoughts with a consciousness that performs what the specific overwrite module or system allows or commands the person to do. The system operates with Artificial Intelligence that acts like a human’s mind, however the programming code controls what the human does.

        Article Count:
    • Nanotechnology (NANO)
      Article Count:
    • Nuclear Science (N)
      Article Count:
    • Oceanic & Atmospherical (OA)
      Article Count:
    • Political Science (PS)
      Article Count:
    • Quantum (Q)
      Article Count:
    • Robotics (ROB)
      Article Count:
    • Sensor and Sensory Systems (SSS)
      Article Count:
    • Space (S)
      Article Count:
    • Studies (ST)
      Article Count:
    • Time Travel (T)

      These invention concepts and studies pertain to the theories of time travel, or the travel back in time to the past, or forward in time to the future, and also the theories of multiple dimensions of time and matter that exist concurrently in tandem with each other.

      Article Count:
    • Tools & Testing (TT)
      Article Count:
    • Transportation (TRANS)
      Article Count:
    • United Nations (UN)
      Article Count:
    • Vessels and Submarines (VS)
      Article Count:
  • Technology Development Works Under Development

    The following works are under development by MCE123 Technology Development:

    Article Count:

© Copyright MCE123 (SM) 1999-2019, All Rights Reserved.

Privacy Policy | Contact Us Protection Status