This technology combines multiple encrypted communications into a tunnel that passes through a high-pass military encryption-decryption mode that makes it impossible to retrieve the information through any legal process of discovery outside of SCI military intelligence jurisdictions. The reason is that multiple particle physics timing computers would be needed to decrypt the channelized encryptions. One side of the communication would only be one side of the communication, such that even if the other side of the communication is specified, the confidentiality and SCI clearance make it impossible to pull up the other side from either side. Through this process of militarized encryption-decryption channels, even if a third party pulled up one side of the communications and was able to determine what one side meant, that third party is unable to manipulate the other side of the communications. This legally, through strategic militarization of the encrypted communications, destroys all attempts of extortion where the attempts occur, due to inadequate information, and the intelligence community defers the third party that attempts the extortion on grounds of intellectual property theft. This makes it impossible for third parties to strategically take intellectual property and hold the intellectual property as a contingency to destroy the reputation of the creator and owner, such as if the creator and owner of the intellectual property moves forward. Rather than negatively affecting the original creator and owner of the intellectual property due to the theft, the third-party that takes the information and tries to use it is negatively affected through other systematic processes that overwhelm the third party through linguistic identification of their theft of the intellectual property.
- Patrick R. McElhiney
- Encryption (ENC)