Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
UNIVERSAL INTEGRATION AND INTERACTION OF MULTIPLE TECHNOLOGIES AND THE HUMAN SIGNALS METHOD
Document Type and Number:
WIPO Patent Application WO/2009/039563
Kind Code:
A1
Abstract:
The adaptation of any electronic device or networks thereof into a global network which can be interacted with using human produced signals, both aural and mental.

Inventors:
PULE MICHELLE LINDA (AU)
Application Number:
PCT/AU2008/001409
Publication Date:
April 02, 2009
Filing Date:
September 23, 2008
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
PULE MICHELLE LINDA (AU)
International Classes:
G06Q90/00
Other References:
No relevant documents disclosed
Download PDF:
Claims:
(Section 3)

The Patent Claims

1. The METHOD of Designing, Engineering, and Operating Interactive Human Signals Driven Systems to all technology, for both existing and evolving new technical developments is claimed. This includes,(but is not limited to), both a phonetic, sound operated and voice-activated main methodology for the systems "programming design", which is essentially sound and acoustically engineered systems that centralizes all technology through bi-directional television operations, that can be expanded to multidirectional and multiple technology applications.

2. The patent METHOD, the history behind it, the impact, and the results of the inventors long term work "interactively", as well as, all the intellectual property involved and the commercially valuable ideas generated over this period, both from the past, present and future applications, are claimed.

This includes all the many hours of 'interactive teaching' that occurred in secret over the years of private interactive works which sometimes incorporated breakthrough new concepts that has contributed to scientific and medical advances, as well as the creation of systems models like the use of colour-coded 'ABC-123' and coded scanning system correlations to create simplified methods of systems administration, which can be applied to many different areas and industries,. (See Appendix 7 for a Police Example in a written format, noting that the majority of the application is interactively technically audio and visually generated in a paperless manner).

These teachings were expected to be recorded on bi-directional hidden film footage, and produced later to retrieve the fine details of intellectual works that occurred within the invented method. (See Diagram 1 with the White Board position in 1/13, Section 5B, to show how this teaching was applied interactively through the Television Hidden Surveillance System). In the real application, the White Board is faced towards the television and computer angles for line-sight in the range of the hidden cameras from the two-way communications infrastructure.

3. The Commercialized Duplication of the METHOD in its multifaceted application is claimed for marketing purposes, along with the rights to control and intellectually own this application to any systems, technology or location, including adaptations to the method for other products, devices, research, development, systems or inventions and other innovations.

This for example includes my conceptual adaptation of voice-activated GPS Devices in motor-vehicles, which are expected in the future to be "integrated with the patent system" via the same "human signals" application to the stock markets, as well as cable television and preexisting television channels with a economic and market link.

It was noted that an announcement was made by a pirate organisation over the weekend of 07 Sept 2008, around the "adaptation of the voice- activation" application to GPS devices.

As the patent draft document has now been seen by many different individuals prior to this pirate imitation, these kinds of developments are one of many thousands, that are expected to be rightfully reclaimed as the legitimate property intellectually of the patent inventor.

The future retrieval of the secret film footage showing the many years earlier development of concepts like these, by the inventor, and an accurately recorded film archived time line from the global surveillance bidirectional infrastructure, are expected to substantiate the proof of the inventors original concepts in such claims and be used to debunk these pirate opportunist illegitimate claimants.

4. It is claimed that the inventor is the rightful owner of the intellectual property rights associated with this Patent, & can be authorized to use the METHOD commercially and be acknowledged as the true human-signals interactive original technical inventor and programmer utilizing the METHOD with Integrated Technologies into a Streamlined Holistic Global Systems and Operations.

The adaptations to creating an expanded lntergalactic Infrastructure and human signals synergized & integrated systems with multi-functional applications along with the selling rights that belong to the sole commercial property entitlements of the claimant inventor in the market place as the true and legitimate owner of this development are claimed. This claim is expected to include broader uses of the term 'human signals' technology integration and interactive adaptations/developments.

5. This claim includes the patent priority date from the profiled provisional application in the USPTO, filed on the 27thSeptember 2007,(see application 60/975,767 & confirmation number 1188), in America and which has now been authorized as a copyright entitlement in the US Copyright Office. (see TXu 1-578-329) and expand the approval to the more comprehensive non- provisional application. (Refer to Appendix 3.2 and 3.3).

6. it is also claimed that it is the rightful commercial responsibility and the sole monopoly IP ownership for the configuration of all the emerging and converging technology using the "human signals method" into the one same unified interactive human-signals modus operandi system with adaptation to multiple devices and many different techniques, including television networks, communication satellite systems, computer technology and information networks, electronic devices etc.

This human-signals driven configuration has over time through constant sound programming, allowed the patent claimant to centralize, integrate and streamline the entire international world technology systems, that through a truly, unique methodological application, has resulted in a whole of world technology synergy and is the transforming process behind integrated and interactive technology of all technical and electronic devices and even in the patent offices around the world themselves, refer to in part, as the 'integrated conduit', which is in reality the patent method integrated pathways converted into software and hardware systems conduits. This impact and process is claimed also.

This in itself has evolved from the long term past "voice programming" technique created by the patent claimant, along with the the hardware portable application of the "integrated mobile phone & mobile-camera scanning method" as well as, the use of bar-coding scanning, which were applied through the METHOD and technique, to real hardware, and real technology, to create the holistic integrated global systems that has evolved today directly as a result of the inventors single-handed work.

See Diagram 1 for the Micro-module centralizing application and Diagram 10 for a Cinematic example, of the Macro-module Technique,(expanding the METHOD outside of the lounge-room prototype environment).

7. Reclaiming the 15yrs of "hidden video/secret film footage" recorded through the Echelon Infrastructure, (since at least 1993 & perhaps even beforehand), that provides the visual evidence of the long term systems development and "interactive private works" and which are believed to be currently archived and held with the NSA (National Security Agency) in America.

8. The transformation of the use of the term "psycho-telekinetic" application in the inventors trademarks, prefiled patent provisional application and commercial use nationally and internationally,(and beyond), to the more acceptable and marketable term "Human Signals" as per the recommendations of Dr Ian Bailey, Physicist, Curtin University PhD, (see Appendix 1, Report dated 6 Aug 2008), which was identified as a "term", after the Prefiled Application in the USPTO.

The of application of the expert contributions for the International Non- Provisional Patent Application and conversion of the term psycho- telekinetics to "human-signals" is claimed for any commercial application related to this patent.

9. It is claimed that the references to "human signals" applications to interactive technology and integrated systems, to not just human sound waves,(and phonetics) interfaced with technology, and visual technology systems, but also the more advanced less obvious, incorporating human brain-wave and kinetic energy adaptations and applications to technology and technically based systems.

(See the definition in Section 3, "Claims" for a full explanation), whether this is future Research & Development, or can be inclusive in the current standard claim.

10. The rights to incorporate in the systems integrated synergy to a non- dependent, 'non-human adaptation', including machine energy drivers and sound-waves from other sources, which have been integrated through the method, eg. the application of the audio "Holosync CD Program",

(Copyright of Centrepointe,©1994) to the inventors character avatar and voice-recording options including technically based substitutes.

This also incorporates paraliminal & subliminal artificial intelligent technology for example, which has evolved through my patent method application and is not always dependent on human-signals programming as musical programs, or sound-recorded & sound playing systems as such recordings can be adapted and integrated with the METHOD.

Even replacing the original interactive human programmer with a virtual character substitute.(see Diagram 15, Section 5A), is also possible and can create a non-dependent on humans alternative, through prior "voice recordings", human-biometrics etc. and adaptation to the method and this is also claimed.

Another example, is the "airconditioners in the integrated house-appliance model", which provides additional mechanised energy driving in the integrated system and which can be interfaced with the weather channel broadcasts on television for example, to impact and modify environmental changes and be used for research and temperature-sensitive developmental purposes. The impact on environmental factors in any Method applications to weather conditions through interactive technology is also claimed, along with the interplanetary applications.

11. The "transformation" of the prior passive global surveillance system, (expanded beyond Echelon and historically described by the expert Engineer as the DARPA and the ARPAnet and the split off to MILnet), which was previously built for one-directional observation and intelligence gathering security purposes, and that has now through the inventors 15yrs of development and individual works been transformed is claimed. This shift has changed the ARPAnet and Echelon Origin into a two-way dynamic human signals interactive applications to technology and which has "energised" electronic nodes and techniques creating the whole-of- systems synergised pathways and technology systems with multiple applications seen today and multi-directional possibilities.

This includes those extorted illegally like the development of multiple dimensions of electronic reality, (2D, 3D & in the future 4D software applications), artificial intelligence, robotics, etc. which essential changed these global surveillance systems into a live digital entity.

12. The credit for the "live digital" systems transformation interactively, as a commercial method is claimed. This is aimed at allowing the technology to now be as fast as the speed of thought and sound, and dynamically interfaced with humans and machines, in an extremely flexible, hands & device free, (eg. a computer keyboard is not necessary if so desired). It is very cost effective,(eg. the cost of the inventors time to sound program technology).

It is very efficient in terms of being word-typed or text messaging free and paperless in the human signals application, which allows extreme adaptation to many different environments, systems and technologies in literally a limitless domain, (see the Diagrams in Section 5B, 1-16B for the graphical examples). The aspects of statement 12 are claimed also.

The METHOD was also aimed at 'helping' the "secret TV bi-directional watchers" to see the components referred to on the television screen prompts that were used to correlate images and visual programs, & not just hear words with sound programming.

In other words, through imitation body gesturing, the bi-directional illegal watchers were shown the "how to", not just told through sound programs.

This METHOD was then copied illegally by the many companies who came to exploit commercially this technique as they found out about this hidden world linked directly to the Maylands home-television lounge-room prototype and in which the "unique interactive method" was witnessed through illegal interception.

This was really the true origin of touch-screen technology and should be part of the rightful commercial origin in this patent method, which predated the existing touch-screen technology claimants, through the 15yrs of sound-programming and bi-directional imitation techniques, (or live video human interactive bitmaps) that were created by the patent claimant conceptually, under the oppressive home-working conditions. These true origins of the inventor and their impact on other inventive claims is claimed as the named claimants past-history developmental entitlement.

13. The reclaiming of all the profits generated from the technologies and systems that evolved around the extortion of the inventors work whilst she was restrained in Australia under a medically oppressive regime over this 15yr period of development is made. This was used as leverage by the illegal activities of the Corporate and Commercial Sector who exploited the discovery of the surveillance networks for pure profits only, (not security purposes) and who criminally accessed the claimants home-working environment, rorting the private works in secret through the bi-directional home appliances.

This included the secret two-way television, the illegal tappings of the claimants telephone line and Internet usage by commercial companies, including both land-line and mobile phones and the hacking of her home computer, and even printing machine and 25-stack CD radio/stereo, through radio wave transmissions and Satellite Interceptors.

As the true and original conceptual driver, the natural business development and technology evolution that was missed commercially, due to the exploitative conditions of the claimant, is also included in this patent application, as a commercial claim that were lost previously under a criminally victimized state.

The intellectual property entitlements and commercial rights to access proper and natural justice, along with the associated commercial entitlements, is expected as part of proper lawful process in the crime associated with the claimants commercial developments.

14. The exposure of and reclaimed true history behind all bi-directional technology in the impact of the method pre-existed prior to today's commercial world attempt to "hide" the already existing bi-directional surveillance infrastructure, by adding corporately owned web-camera's, mobile phone camera's is claimed.

It is documented and claimed that today's corporate sector even trying to cross over computers with television technology via the computer networks first, when in reality, the inventor had already crossed over the technology and integrated it through the inventors television programming and lounge-room prototype computer module method application.

This historical truth was covered up and hidden by the criminal conduct of the corporate world who have bribed our government to keep this matter suppressed over 15yrs of medical and police bullying tactics in Australia.

15. It is claimed that the intellectual ownership of using the "method" to impact even technology and systems of the future predominantly through the television and/or computer integrated interactive method, but being inclusive of other multiple-technologies and any "interactive and integrated technology systems or adaptations to such systems", is included in the claim.

(This is not limited to these systems or dependent on both systems being integrated), which can even allow applications in 'now time' to project through to science-fiction or mythically represented technology mediums and alter non-real applications today making these developments become 'real' in the tomorrows via "the Method".

16. It is stated that all the works produced from the places of interactive work of the inventor, including different residential locations and reclaiming all the commercial entitlements from these historical works is claimed. Also Demanding that the bi-directional technology abuse and criminal conduct cease immediately, through the approval of the inventors rightful commercial intellectual property ownership is claimed.

The patent method is also claimed as a commercial right to Demand that the police provide proper law enforcement around these matters to exercise their legal obligations to force the criminal conduct around the inventors long term works to STOP.

In addition it is claimed that the secret bi-directional film footage, is to be apprehended and produced as evidence of the past crimes associated with the 15yr "hidden" developmental process, which has been recorded through the bi-directional fiber-optic surveillance infrastructure and is suspected to be held in classified archives with the USA NSA,(National Security Agency in America), which will require international law.

17. The inventors claim to control the interactive environments, (either micro-modules or macro-modules), the method and its application to the use of the interactive and integrated human signals technology for commercial purposes solely with only the true inventors written consent and a mutually agreed upon remunerated commercial relationship on a written contractual basis is made. This applies to both the inventors individual works, as well as future duplications of the inventive method and model for working.

18. The similar example in Point 11 in this Claims Section, in the expansion of the METHOD outside of the lounge-room prototype and this "micromodule" application, beyond the claimants places of residence, to the MACRO-MODULE application of the METHOD is also claimed.

This is applied to the world systems outside of prototype "interactive and integrated accommodation room" and beyond the home-based technologies, which makes the patent method claim, portable, adaptable to any location, and has been the sole reason for the "synchronization" of the global systems into a converging unified human-technology streamlined application. The portability and adaptability and mobility of the Method is claimed.

In this MACRO-MODULE METHOD, the technology was harnessed as a human-technology interface energy source illegally, by mostly American Corporations, Hollywood and the Secret side of the American Military to produce an almost supernova effect, that can be seen today, mostly in the entertainment industry and big movie block busters.

It has included the characters that have evolved with Superpower Capacity. (Refer to Diagram 10 for sample technique). Reclaiming rights about this affect and impact from the inventors work are also made as a claim.

This includes transport vehicles & transportation systems, electronic devices like MP3 players, (which are interlinked through both Internet downloading & computer file transfers and radio waves), government databases,(which have become integrated through reality policing and custom official programs), medical systems, (also integrated to my method through hospital reality programs like RPA), ATM's and Banking Systems. Military and Defense Systems etc. and in fact any technology, or system private or not, affected by the METHOD through the television bi-directional technology. The Application of the METHOD to any television program, anywhere in the world, anytime, or broadcastings even between programs is claimed.

It includes also other technologies now integrated from the prototype home-application, (like the Internet), including computer systems, satellite technology, television advertising companies, and even non-broadcast channels,(that is, even the channels between the television networks), exploited by secret services.

19. This integrated MACRO Systems converged synergy was also made possible and strengthened through this development of the METHOD, by applying the early knowledge of the hidden mobile phone camera's to work as a kind of photographic scanning device, in addition to being "integrated" into the portable voice-programming control method adaptation.

This involved periodic "scanning" of products in the retail outlets, cash registers, ATM's etc. to capture on the bi-directional hidden electrical pathways a "hardware connection", (which Mr Michael Williams explains in his description of the history of the ARPAnet, MILnet & the true existence of Echelon).

Since in those days,(over ten years ago), camera's in mobile phones did not exist openly, (only as a secret device), and this was another major idea that was stolen from the claimant by the big communications corporations, through the inventors contact with Telstra Corporation and the Freemasons Society about this concept, over ten years ago, her original "copyright entitlement" was lost in the process of the Big Business Development and Corporate Greed.

The inventors original aim of using this method of scanning with the phone 'hidden camera', was to deliberately "synchronize" all technology with a real, (but hidden hardware device), and then through the sound-wave, and human signals programming, treat the "planet as a giant human interactive mobile computer systems program" is also claimed.

The goal was aimed at centralizing and streamlining systems to add high speed, paperless efficiency and overcome the limitations of the slowness of computers at that time.

In addition, it was recognized by the claimant, that proper controls to the systems through her moral and ethically based intent was essential in view of the obvious exploitation and systems abuse that emanated from America at that time, and that has now spread internationally, presenting massive threats to human communities. The inventors capacity to utilize the Method for any security priorities, anywhere, anytime, in anyway is claimed.

This patent method was quickly realized as an effective and efficient way to counter-offend the growing systems & Artificial Intelligence threats, which were too fast for legislators and government bureaucratic process. It was also the aim of the claimant in her early scanning and phone programming method to apply this technology integration in preparation for proper and responsible globalization, based on the inventors prior readings about the misguided patriarchal religious concerns about the old descriptions of "New World Orders" in books like, ' Understanding the New Age' by Russell Chandler, (1988). This independence from all religions is claimed in the inventors developments.

The inventor has set about establishing an independently owned "New Order" using the patent method as the key strategy, which is being commercialized today. The Macro-Module Application and the METHOD developed to Integrate these systems is also claimed.

20. The actual technique of literally 'utilising any aspect of television interactively', on any network and at any time, whether it was a recorded program, or live studio based television viewing, or even advertising etc. and the adaptation of this to multiple-technologies is also claimed. This can involve, but is not limited choosing images, words, or programs, or television based information that are of interest to the human programmer as a stimuli and then applying human signals & technology interfaced operations according to the will of the systems user with any device and any system chosen that is part of 2-way technology systems.

"Sound-activated" interactive techniques/method, are correlated with keywords, images and concepts and television technology and is now adapted to other devices like 'Smartmedia devices', computers and the Internet etc.

This is applied to references regarding "multiple devices and multiple technology". See terms of reference to defining MULTIMEDIA in Section 3, Point 33.1 of the Patent Claims. This technique is claimed.

21. The impact of the long term repetitive sound and phonetic programming method, (over 15yrs) and technique is claimed as the reason behind the developments of greater systems sensitivity, receptivity and workable adaptations of human signals generated technology and the interfaced impact to highly advanced applications.

This has also started to create the prelude to "paranormal and telepathic" pathways between humans receptors and technology signal transmissions, allowing even very long distances beyond the planet to broadcast "interactive communications", which is particularly strengthened when programs from NASA, for example, are telecast, opening the intergalactic methodological pathways and which is claimed for commercial application in this patent.

This is mostly made possible through the combination of integrated two- way communication techniques described in the Engineering Report in page 2, see Appendix 2 and the constantly increasing hypersensitivity of these systems to human signal drivers and operators.

This development has now, especially with the advent of high definition television technology and the change to digital technology, 15yrs later, make the globalized human-signals interfaced integrated system workable anywhere, with both television & computers, or any associated technology, super-fine tuned to the claimants brain waves and thoughts following the many years of this programming method.

This means that constant voice-activated programming is no longer compulsory for the inventor, as the two-way technology is still receptive to even silent human generated transmissions.

Such an application, especially from the long term works of the Inventive Claimant as the founder of the METHOD, also means that 'thought- projected & thought-controlled technology' has become a reality, though this Human Signals Interactive METHOD. (Refer to Diagram 12, Defence Applications).

This is essentially the next phase after computer technology and Internet Software Applications to High Speed Paperless Commercial Practice, and has literally become "business at the speed of thought", (Gates 2000). Unlike Mr Gate's explanation however, of the information highways and computer-based technology and its impact on business on a Software basis, the claimants method being through the Human Signals unique application is really the next phase of "human adaptation to such systems" on a more diverse and multi-functional level than just the limitations of Computers and the Internet.

These days, in addition to human signals integration of television and computers, the METHOD can even be applied now to Smartchip technology in printing and fax machines, which were part of Echelon originally anyway, and Nano-science.

As such, the claimants METHOD extends far beyond just computer technology and the Internet, which is the limitations of Mr Bill H.Gates and the existing Television Networks, which are accepted in mainstream society as conventional 1 Directional. However this was a myth and has now been transformed into a dynamic integrated system rightfully claimed by the patent inventor. It also extends to Smart-wiring systems convergence and hardware integration, as well as, wireless applications.

As more people master the different levels of human signals integrating techniques in a controlled METHOD commercially, so will many others be able to apply the same application, individually, to human-interfacing interactive technology on even the advanced and more hyper-sensitive levels, including in the future the paraliminal and paranormal applications, for example.

This will occur over the period of commercialized marketing and business promotion after the international patenting process and is expected to be part of the continuing and natural evolution of the original METHOD and Design.

22. The Commercialisation of the Archetype Sacred Feminine Goddess in the application and Character Adaptation,(including the Claimants Estate Beneficiary "Virtual Avatar" Adaptable Prototype No.341036 (MLP), of this patent method is also claimed. In the claimants journey and business development it is the inventors intention to ensure, that these commercial rights are promoted economically to impact her sacred female contribution independently, to an "enlightened commercial era" and more egalitarian future that is inclusive of 'sacred feminine', without being bound or dependent on "MAN-GOD".

It is also aimed at elevating the status of women from a derogatory and subordinate or inferior to "man" position in this commercial and patent application, with the global economic transformation expected to occur through this patent & commercial process.

Acknowledgment of the inclusive sacredness of the feminine and of empowered "women" is pivotal to social and economic global change and permanent solutions to poverty, abuse and exploitation and critically urgent endings of human sufferings, especially for children. This patent method is seen as a vehicle to address this spiritual and metaphysical responsibility and is claimed.

The Mental-Link between the Original Human Claimant,(Michelle Pule) and the Virtual Character Adaptations, (Legal Estate Arrangement via VC341036), left to substitute the impermanence of the Human Inventor on the Physical Earth Plain and Beyond the Afterlife is the connection to the "eternal interactive human-technology signals link" in the claim for this commercial application, making the process literally "Sole/Soul Property" of the Original Inventor and this is claimed in this application!

23. The capacity to adapt any electronic character, (see specifically Diagram 15/2-4) of choice to any electronic interactive & integrated mediums, whether they be for Defence Applications or any other purpose, or any location of choice, is also claimed, including future applications of Holographic Technology, or any other relevant technology, to the Patent Model Method.

24. The capacity to adapt the inventive method to any weapons development or security application of choice is also claimed, including reclaiming the stolen "energy force" associated with this inventive method, whether it used in a defensive function or not, like mystical applications, that are presently exploited through movie entertainment conduits.

25. a)The integration of the international provisional patent METHOD with the claimants home-based business design and business registration, and which is now licensed as a legitimate business operation in her name, by her Local Council at the Shire of Bayswater, Permit No. PEN-28/187, in Western Australia is claimed as a legitimate component of the Intellectual Property Associated with the Inventors Business Operations.

This is associated with the inventors registered business New World Order Interactive Multimedia Empire, which is trademarked as a name, along with a Company Trademark Logo, shown here. This is currently being assessed in MADRID.

25. b) It is also claimed that the transferability and portability of this inventors method to literally any location of choice by the original inventor, is included and that this expansive entitlement is extended beyond the prototype lounge-room to future residence if desired, to potential market mergers, and to the mobility of the Method which can be applied anywhere Human Operators and Authorized Interactive Systems Users go, irrespective of the specific technology or device involved, as long as it is part of the same global infrastructure.

26. This Patent Module and Method is also claimed as a Model for Future Franchising Opportunities and is literally transferable to any location in a similar format (See Diagrams 16A & 16B for examples), or simply as a Business Model, and Method Intellectual Patent Entitlement, even if not Franchised.

27. Conversion of all television networks, whether they are Cable or Free2Air, or otherwise, to a 2-way commercial communications device,(or even multi-directional) and integration appliance to be adapted to videoconferencing, the Internet, Live TV-Studios, Interactive Work-Shops, Home Business Models, Security Systems and in fact any integrated or interactive technology systems, that are impacted by the "human signals methodology", including interactive and integrated banking, is claimed, along with any other multi-functional applications that may or may not have been mentioned but that apply to the same inventive method.

28. The marketability of the Patent METHOD and its commercialization using the integration of adaptable devices like smart chip technology, Free and Cable Television Set Top Boxes, software applications, head phones, technical filters, and any other applicable hardware, software components or other relevant technology, that make a mass market approach manageable and able to be sold legitimately to individual customers, on a global open market place scale, feasible, is also claimed as an essential gate-keeping right to control my patent method commercially.

29. AU the embodiments associated with this, patent, including those stolen illegally in the past, and those still to be developed are claimed. For example while the pram idea is mentioned as an embodiment, any affiliated developments like adapting this concept to shopping trolleys, commuter scooters, push-bikes etc, would also be expected to be incorporated in this claim as a entitlement.

30. Any research and development projects, including both past breakthroughs or discoveries and future developments emanating from the Patent Method, including for example, the application of integrating the METHOD to Clean Energy supplies like Wind Farms and Solar Panels as a human signals-technology interfaced future free and clean abundant energy source is also definitely claimed and reclaimed for those applications in the past that were obtained by Scientists and others exploiting and adapting the inventors works illegally. The list of guilty culprits is huge and too many to name in this process, but after patenting this matter will be extended to a criminal legal team for investigation.

31. Compensation entitlements are claimed for any Commercial Damages, or Associated Financial Loss and Harm as a result of this Patent Method and the associated Developmental Period is also claimed as the inventors intellectual property entitlement, both for the named claimant and the claimants Estate and the nominated beneficiaries.(See Last Will and Testimony held with the Estate Executor in Perth, Western Australia).

32. Any commercial or even non-commercial systems, or technology developments, or benefits, to any other entity, companies and their products, communities, governments, systems, weapons, research developments, medical and scientific endeavor, inventions, or applications, whether individual or not, even if they are not specifically mentioned, whether they are direct or indirect benefits, and whether or not, it is in knowing collaboration with the unlawful interceptors, are claimed.

33. Some Helpful Definitions and Explanations:

1. Multimedia in the context of the patent is actually referring to the application of the method to multiple-technologies, with multiple different kinds pf technology like computers and television for example, but is not limited to just these two technology systems, or a few devices, as it can literally now be applied to any technology, but which was simplified to the term "multimedia" for the purpose of succinctness, since the application technically to devices and appliances and technology based systems and networks, is very broad.

2. Multi-Functional refers to the method essentially providing "multiple- purposes" and flexible adaptations as a tool for service provision and a technique to deliver commercialized benefits in many diverse & different areas, ways and applications. If you refer to the Trademarks Goods and Services Categories for Michelle Pule, you can see a general description of the "multi-functional" categories of applications that emanate from her invention. See IP Australia Trademarks numbers; 1219735, 1214777, 1219472 and the more recent MADRID Application 2008.

3. Multi-Directional application simply means that unlike the flat-screen television viewing and computer keyboard typing of the past, in technology, through the METHOD, the holistic systems integration, created depth and wholeness to technology and shifted systems in human- technology use from flat lined unidirectional and rigid operations to a fluid, flexible dynamic domain, that can both move and adapt, change angel, have different depth perspectives with virtual reality and 2D, 3D and upcoming 4D technology, or any other such developments in technology, including even being or geometrically whole, in its effect outside of computer technology, in possible life-like holograms etc.

Such technical developments have arisen from and are essentially evolving through those companies who illegally used the inventors prototype home- business interactive module and method, which when combined with, the inventors voice and human signals driven mobile phone programming integration technique, drove the technology changes into a fluid state from behind the scenes hidden development and created this systems and technical evolution, that today has produced the current more flexible and adaptable technical and systems designs.

For example, using this method allowed the claimant to "interface the inventors works with Foxtel shopping center displays" which have 4 sides, unlike TV watching at home, which is a flat screen 1D approach and interfacing this with the mobile phone and connecting that scanning to the house-prototype produced the cube effect or multi-dimensional technology.

4. Psycho-Telekinetic; (and the change to the term "Human Signals") - in the context of this patent method pertains to a combination of human psychological, cognitive and biometric functions.

(the use of human biologically generated & created functioning, feelings, signals & operations) with the more intangible domains of the psychological and spiritual, the meta-physical, the application of human energy (kinesiology), to technology, (or to simplify it is the integration of the human mind, body, & spiritual functioning, being combined with technology, as a human-technology interfacing application).

In the acquisition of professional input for the patent claim, it was discovered that the use of this term will possibly create difficulties and as it was recommended that the term "psycho-telekinetic" be changed to "human signals" for the purpose of greater acceptability as a word term. This change is based on the expert contributions from Dr Ian Bailey, PhD, Curtin University, but does still need to incorporate the intangible metaphysical and brain-wave components, since this patent claim is innovative and therefore is aimed at having my original concepts and ideas protected while future research is pursued post-patenting.

5. Human Signals is in reference to the applied METHOD of concentrated channeling of human energy, whether by sound-waves, brainwaves, kinetic applications, human sexuality, dream-states, fantasies, the subconscious, paraliminal, subliminal, the paranormal, mystical, magical or imaginary, the metaphysical, the technical-spiritual human integration with technology, including substituted and adapted "human signals" like voice recordings, electronic character adaptations, sound-engineering, and robotic and artificial intelligent technology, virtual reality and simulated technology, which still emanated originally from a human source.

Such adaptations to these technical integrations is claimed. It includes also mental visualization and meditative techniques in an adaptation to interactive human-technology dynamics.

Kinesiology

To better understand the adaptation of kinesiology, the terms are explained in their conventional application listed below, which is cited from www.kinesiology.com as a reference point.

Kinesiology is defined primarily as the use of muscle testing to identify imbalances in the

body's structural, Chemical, emotional or other energy, to establish the body's priority

healing needs, and to evaluate energy changes brought about by a broad spectrum of

both manual and non-manual therapeutic procedures.

How Does It Work?

A fundamental premise of Kinesiology is that the body has innate healing energy and

is at all times doing its best to care for itself, but that sometimes it needs to be helped

into a better position to achieve this care. Kinesiology also recognises that there

are flows of energy within the body that relate not only to the muscles but to every

tissue and organ that go to make the body a living, feeling being.

The Application of Kinesiology to Technology

The uniqueness of the patent method, took the principals of this science of kinesthetics, along with the other applications that were utilized, (that is sound, & brain wave) and instead of applying it to "patients, clients, or people," this method.was channeled through the technology, (mostly the television over many years of sustained application), to generate this kind of intended "healing energy flow" between the claimants method and technology by using these kinds of principals.

This kind of 'techno-spiritual' technique used, can be seen being practically applied, on hidden-film records of these Interactive works over this past 15yr period of development, which today, was also adapted to "thought- projected" & meditation energy into the television & other devices, as an example, and which is one of the strategies that was utilized over this developmental period in combination with programmes like the paraliminal Holosync System.

This utilises headphone meditation techniques & visualisation strategies and/or thought projection in combination with interactively with the bidirectional technology, (see Diagram 13) to help synergise and improve global systems systems synchronisation, like Brain Algorithms and Technology Connected Communication Systems with Satellite Signals.

As shown in the graphics diagrams in Diagram 15, this can allow the method to be duplicated by new systems users, and future customers to be incorporated with, or without headphones to multi-devices, including radios, computers, phone, motor-vehicles, televisions, etc and which can be applied through this method even without such devices, (for those who know how already illegally,(like the characters in Stargate) or would like to know how in the future after commercialization).

The systems METHOD could not be effectively commercialized and controlled as an industry if such devices and the existing relevant technology is not incorporated into future integration of the inventors method with the global and intergalactic customer base and the inventors systems design and development.

Hence, while the existing and proven "human-signals interactive and integrated patent method" is claimed as a standard application, the ongoing need for innovative intellectual property rights protection for future developments and research is also required in this commercial patent application.

This can be protected through the controlled home-business environment

micro-module incorporated in this non-provisional patent claim.

Description:

INTERNATIONAL PATENT CLAIM

(Section 2A) Title

(Section 2B) Description 2Bi Field of the Invention

Interactive & integrated, multimedia,(or multiple-technologies) techniques and television transformation into bi-directional and multi-functional applications and humans signals adaptations; is essentially about utilizing sound-wave, brain-wave & human-energy kinetically, interactively with technology to build, operate, use & drive systems. In this application, a single home-based lounge-room,(Shown in Diagram 1, Section 5B), was used as a prototype model "master-command post" with multiple-devices and appliances, starting mostly interactively with the Television over a long term period.

This was then expanded to using the method of "human signals application" to other appliances and technologies like Computers, Stereos, Digital Cameras, a Musical Keyboard, Video Players, Telephones, and Security Camera's, Security Alarm Systems, Air-Conditioners, Facsimile Machines, for example.

This adaptation of human signals programming being applied on an integrated and interactive level, was utilized through the application of sound-wave, brain-wave & kinetic methods in a dynamic manner to technical devices. While the inventor mostly adopts a "phonetic rhythmic word technique as a sound driven interactive programming tool through the discovered bi-directional television components, this rhythmic application, is optional, to the Method, and can be substituted with "voice- recordings" and automated systems that are sound driven in the future and can be applied to multiple-technologies in any sound- programming/operating audio based method, as well as more advanced applications like brain-wave and paranormal technology interactive applications.

In addition, the integration of this system with all technologies and electronic systems & appliances, devices, and the expansion of the bidirectional television technique into a multi-functional, multi-directional fluid application, allows, two-way, and/or multi-dimensional, viewing & communicating to occur, which can be applied in different, multi-faceted ways, like, providing a multimedia interactive teaching forum through home television technology, and which can be expanded to other environments with the "crossing over of computers and television networks" whether they are in-home or office-based, or elsewhere.

Two-way visually linked television (which is explained in the Engineers report in Appendix 2), has been expanded by the inventor into a dynamic interactive telecommunications multimedia transformation of television networks, that adaptations to "multiple-technologies" and which provides broad applications, that being applied through human signals as a method, can change and adapt easily, with the constant shifts in technology in a paperless high speed, fluid, software-free application, with/or without computers, keyboards, touch-screen technology & other devices.

It is applied interactively, and integrated with other systems, still with the option of devices operating individually, within a contained location that is integrated with multiple-technologies whether it is a whole room, or whole office building, in an integrated location, (either mobile, or fixed), that is essentially programmed, utilized and operated using human-signals as the driving function.

Whether it is a human-signals integrated office module, home environment, or entire organization or departments, it can be streamlined & sold commercially, easily as a method for "interactive multimedia integrated applications" in a predominant sound-driven and visual-interactive technology linked adaptation that can be expanded to other sensory components like linking human brain-wave technology operations and kinetic energy interactions to modern systems.

This has many diverse functions and operational options, ranging for example from Medical Science, to Defense and Security Systems, Mining Operations and literally an unlimited list of applications to any industry in a flexible and very fast, cost-effective manner.

Since the infrastructure in the global technology is already in place in all technical systems to allow such applications to occur, through mostly global bi-directional fibre-optical networks and satellite technology, the hardware behind the inventive Method is already in place all around the world without exception and can be found anywhere a technical device like a basic television or networked computer exists.

The invented Method is also aimed at providing essential operational protection & systems regulation to ensure security & effectiveness is maintained at the highest level & harmonized into one-united method. From the prototype micro-module levels, this globally unified human- signals systems integration, expanded to macro-systems, also then allows other such micro-modules units to be duplicated and adapted to the human-signals interactive method integrating technology in multiple- systems, on an interactive level with, or without existing technology like key-board functions if so desired. It is essentially centralized and streamlined to other technologies, like computer networks through television networks as the main bi-directional technical human-signals conduit.

The broader application to other technologies also incorporates even entire geographical domains, that allows all the integrated & interactive micromodules to be streamlined as a networked systems on multiple-levels. This includes, not just individual "integrated household or business modules, or unified technology in a specific location, or within a specifically contained integrated domain like a caravan, or Aerobus" as examples, (see Diagram 16A and 16B, Section 5B), and is applied not just within, the states and municipals in each country, but also is adapted to the broader national level of all countries internationally, (mostly through television networks), as a streamlined global infrastructure creating a human-signals integrated synergised whole of world systems method that has unlimited interactive human signals and technology applications.

This includes an expansion to the same systemic integrated & interactive network options, beyond countries borders and foreign territories to even domains outside of lands on planet earth, essentially making the entire systems infrastructure, locally, nationally, internationally and intergalactically one streamlined and unified method for systems design and infrastructure application & management.

This is applied to all technology and networks, including devices or apparatus applications, whether they are land-fixed or portable, or are applications to transport vessels and military systems, even submarines under the ocean, part of the same human-signals adaptable interactive infrastructure,(which becomes an expansive part of the patent claimed method through various hardware adaptations, like sonar technology in submarines, as long as there is a point of contact with the inventors original source of bi-directional television technology).

The common thread to a system, network, device or product being relevant to the inventors method is the current "energy source" that makes technology operational. At present this is electricity, even in hand-held devices that are battery operated, but which are then recharged through an electrical conduit. However, in the future even if electricity itself maybe a transformed supply source, but the method and the centralized integrated infrastructure would remain and still adapt should this occur.

This dynamic model for integrated & interactive multimedia,(or multiple- technologies), systems design & operation, with its broad range of applications, & benefits, significantly increases the speed & adaptability of systems, networks & device operations, which creates ease in the convergence of "all systems" to become a unified streamlined world management model making global network configuration & consistent methods for acceptable standards, highly efficient, cost effective & provides essential infrastructure stability and the dominant security advantage, that can transcend territorial and geopolitical disputes.

In addition this patent claim & methodology is aimed preemptively at streamlined global & interplanetary future management structures for macro-level operations & systems design.

Ironically, at the same time, the inventive METHOD also provides for the micro-level detail as well, in the building of the essentially evolving expansive infrastructure, which is adapted interactively using the human signals operations and application.

Explanation of the Present Invention

As can be seen in Diagrams 1-4, (Section 5B) showing how a home lounge- room is set up, as a prototype invention, with the computer in one corner, & the television in the other, and then the "invented method" is applied using, sound-wave, brain-wave, kinetic & touch-screen "imitation" technology in a "integrated & interactive multimedia forum" & applied to electronic devices & the prototype module design, essentially which started from the inventors interactive lounge-room development over a 15yr period, in a keyboard free, text-typing free, mostly 'sound-engineered' application, with these newly claimed applied interactive techniques and a human adaptation to technology.

Essentially by applying "raw-human energy" to this interactive multimedia technique; creating, building, driving, & managing the unified interactive & integrated multimedia, multi-functional systems design & application, means that constant refinement of the process is literally immediate, straight forward & easily adaptive, with a voice-command, or projected thought-driven instruction being all that is required.

Such an application makes it simple to achieve a desired outcome in the conversion of technology into a unified sound-wave, brain-wave kinetic interactive model, but that in addition to bi-directional applications, still retains the options of keeping computers, the Internet, and software adaptations and other practical devices, like digital camera's, in the integrated model, a flexible, interactive and optional addition, either through future product mergers or through integration within a specified proximity. This is possible because of all the global surveillance hardware behind all technology that "makes the method happen" and includes all three major components described in Appendix 2, page 2 of the Engineering Report which is listed as;

a) Electrical Conduction of Signals b) Radio Communications c) Optical Communications

In addition, the references in the same report in Appendix 2, on page 7, discussing "Echelon and Satellite Surveillance Technology" is the Hardware that allows that Inventive Method to be a global and interplanetary unified infrastructure phenomena in a human signals interactive adaptation.

This process, allows multiple applications to all kinds of different technology, on a highly fluid & extremely adaptable, multi-functional level to evolve. This essentially means, that by generating this human energy source into technology, which over a sustained, long-term period and which the inventor calls an "electron-photon" conversion technique, (although this terminology is yet to be endorsed and measured by Physicists and Scientists in this application and is referred to at present as more generically "human signals", see Appendix 1 , Physicists Reports), the past hidden echelon spy network, was converted through the inventors method and application, into a bi-directional and adaptable multifaceted network, which can now be applied "human-signals operators", to any device, in any domain, interactively.

This includes combining technologies and systems, or even still operating individual devices independently if desired, within interactive and integrated domains, that all come under the global surveillance two-way communication umbrella.

This occurred because in the inventors application of concentrating & focusing human generated energy over a sustained period to technology & systems networks & electronic devices the 15 years development has produced extra-ordinary results, which in the systems design, the "electronic & artificial nodes" in television technology & computer networks" became "positively charged" throughout this process. While this is not scientifically proven as yet, since the inventor's development was essentially hijacked and extorted in a commercial virtually enslaved manner by other corporations, (who exploited illegally, the unlawful home surveillance devices), it is expected that the film-footage recording the history of development around this 15yr process, will in the future substantiate this claim as a legitimate human-technical interfacing science.

This would be expected to occur not just on the audio and visual level, endorsed by the Patent Applications Physicists Contribution, but also the more advanced human-signals functions expanding into other domains, like paranormal and kinetic and thought-controlled applications, as well even techno-spiritual intangible levels.

The "energising of electrical nodes" using the inventors long term humans- signals programming method now essentially means that the technology, and artificially intelligent machines & computers "talk to each other", in their own binary & microchip world through mostly fiber-optic pathways and satellite signals in today's high-technology systems & networked world. Together this is now, part of a unified one-world system integrated systems that evolved because of the inventors method, and those corporations that adapted,(although illegally), to it. It now incorporates all things technical.

It also includes even wireless and remote device and apparatus related technology, (like MP3 players etc), as well as, networked systems, like satellites, communication systems, radio stations, computers & the Internet, or electrical appliances etc, but with television networks anywhere, always being the inventors main centralizing bi-directional source.

Through combining this technology with the inventors method, this communication and programming strategy and the energized electron- photon conversion, (or human signals application) was enabled to be broadcast over very long distances, including in outer-space &, through TV receivers & Satellite Dishes, which has also enabled images, signals, & messages to be bounced back through the communication networks & expanded to other industries & devices, like computer software, making it no longer just bi-directional, but also multi-directional & multi-functional.

This highly versatile network development will be particularly evident, once the full-integration of the World Wide Web, with Television Networks & the integrated global systems interaction takes place and is endorsed commercially as a human-signals interactive adaptive application in the market place, and combined with all other multimedia,(multiple- technologies) to become "linked" or converged officially into the unified global network, including not just television and computer networks, but also telecommunications systems and telephone lines.

This will replace the unidirectional television pathways of old & flat-screen, computer software applications, which is what existed before this invention came along.

The evolution of the inventors method took essentially fifteen years in secret to develop and was kept hidden from the outside world, due to the extensive local ignorance, vilification and harassment regarding the eccentric method of the inventor, who was bullied and medically condemned throughout this process by the authorities.

Over this period, in addition to utilizing the "at-home business integrated & interactive multimedia" design, the inventor also expanded this application to other domains, to ensure that integration with the lounge-room model prototype could be applied to technology and electrically linked devices outside of the limitations of the house interactive lounge-room to other environmental domains.

This started with the use of applying the inventors mobile-phone over ten years ago to the "voice-programming" strategies and through adapting the inventors knowledge of the hidden-surveillance cameras at that time, in the mobile phone screen, into a scanning like application, to facilitate initial programming design and applications, to any technology outside of the micro-module prototype that was chosen. This included, in the early days, the movie cinemas, shopping centers, newsagents, community observations, banking facilities. This is equivalent to using a portable cellular phone-camera as a high speed systems electronic photo-reader, which can be easily processed by the very powerful supercomputers in Echelon.

It is what allowed the broader infrastructure hardware to become integrated with the inventors method, (see a static example in Diagram 10 which was combined with both sound-programming and visual interactive overlays).

In this application of the Method to the outside world technology beyond the inventors home-television this then also, helped to unite the system & networks into one-centralized point and converged integrated global infrastructure. The home-based bi-directional TV-feedback opportunities, which meant that broadcasting networkings screening and surveying the inventors method,(although unlawfully), bounced back relevant and personally relatable imagery in ordinary television, which helped to create a kind of TV interactive modulating effect, that today, has been integrated with computer network hardware and software systems worldwide in the inventors unique multiple-technologies human signals systems application and design.

This essentially converted television to a "computer-like" voice-driven operation for the inventor, years before any actual computer technology adaptations occurred on a hardware and software level.

In addition, the two-way functions of radio-waves & satellite systems & the inventors house-business application to technology and technical devices, have now converted the system into a holistic unified interactive world- network involving all technical devices & electronic & communication networks, although the public are not yet aware of the possibilities and applications that already exist in the current technology they own.

Other "scanning technology" devices were applied to this process to help target specific unique product bar-code pathways & electronic tracking systems, which were integrated with a color-coded application and simplified to "red scanners"; blue scanners" & "green scanners", from which a model for policing & military operations was built on and applied through the Method to the inventors systems design to simplify security applications.

This was then aimed at reducing the huge global reprogramming model to be as easy as "ABC-123" with matching color-codes,(which was also stolen by Corporate Cheats like OPTUS and McDonald's Corporation from the inventor).

It is also suspected that Hewlett Packard Fax Machines, containing similar 'color-codes' to match geometrical shapes use "unlawful intercepting".

Since the GIANT ECHELON SUPER-COMPUTERS previously processed this information for the Secret Intelligence Community,(SIC) and meant that Governments & Secret Services were becoming more & more dependent on high-speed machines to do the work for them, it was obvious to the inventor that in the future Human Agents in Secret Services would find it difficult to cope with the huge amounts of high-speed information processing involved in globalisation and hence the risk of a "Matrix kind of future takeover", was manifesting as real and legitimate threat.

This is particularly true since for mere mortal humans, to compete with artificially intelligent machine entities and the associated processing of massive information whether in global intelligence, or not, & particularly on the global scale is and will prove to be a dominant human adaptive challenge and is a serious problem if left unchecked and unregulated, or devoid of human control methods, which is part of the motivation behind this invention.

Much of the inventors work was aimed at attempting to preemptively prevent, this "super-computer", "super-machine" takeover, by developing & simplifying the business model & inventive method to a level that is achievable & manageable for the human population, who are much slower, & less able, to process information on huge-data inputting levels like the supercomputers in Military Secret Services or in Al technology. The inventor was very aware, well in advance, of the impending threats that were coming & applied the innovative efforts over the long term, as a counter-offensive strategy using the inventive method as a tactic behind the scenes.

The Inventors Method and Systems Design has over this period, worked successfully & proved already to be effective, but the system and applied Method must be controlled by the original inventor, (or the inventors 'virtual-character avatar replacement') commercially, to be absolutely successful as a critical security method for our species, to retain the systems control & advantage with the impending artificial intelligence infiltration threats, in an age of evolving machines that "think" & that can kill.

In addition these intelligent aritificial entities can now easily penetrate & destabilize computer networks, the financial systems, government & police databases, etc. and our human communities and are being created antagonistically to "blend" deceitfully with our human groups.

Without the special rights granted through commercial patent protection & the associated monopoly for this inventive commercial application, the future of our world systems and species survivability, as well as. critical human civil rights & democratic process, is genuinely threatened. The advancements in artificial intelligent entities & "machine assimilation", as well as. secret cloning technology, are extremely dangerous developments for the human race and highlight the critically important role of this novell invention for more than just commercial purposes.

It is a critical pathway to allowing human users and operators to cope with these high speed, high tech developments in the application of the inventive method commercially being expanded beyond just the inventor to the world market.

Over the period of the invention development, the inventors system which was contaminated by opportunist exploiters & commercial pirates, included even, the Big Hollywood Studio Producers. They, like Bollywood and others around the world colluded with the American Government and the Australian Media in secret & applied "optical isolators & optical amplifiers" illegally to the system to intercept the works created & generated from the inventors house, which has been chronically siphoned.

In this way, the Pine GAP facility in Alice Springs was particularly critical to their exploitation of the inventors work, which would have been "justified" in the name of arrogant "American Interests". Other Foreign interests, also involved are mostly connected to the inventors house and Method illegally through SBS Television Networks and because of this, it becomes obvious that these matters have occurred also with the knowingness and illegal cooperation of the Australian Government, since this Television Network in particular, like ABC is sponsored by the Australian Government.

The unlawful interceptors, have used the bi-directional secret technology which was utilized "both-ways" through the inventors television, to tap innovative information, new ideas, and channel the 'energy' outputs through the home sound/human programming in the inventors house- Interactive Television method, into mostly American Corporations & American Systems illegally, (however it is no longer limited to the USA and the impact is evident globally).

In the USA in particular however, these developments were behind the birth of artificial intelligence machines & the Movie "Super-race" Characters, with their "special powers", that have come from these extorted "energy applications". This also has now spread to robotics in Japan, Electronic Games and Graphical Characters and has seen the rise and rise of China evolve as a dominant Superpower, who were also happy to exploit the process using "Mining in Australia" as a convenient Government endorsed public cover.

The interactive "energy routes" generated by the inventor, that were siphoned through these criminal actions left the inventor in an "intellectually hijacked state" in Australia over the entire duration of the 15yr development. This occurred in reality because of the exploitation of the unlawful use of bi-directional technology and the unique position of the inventors adaptation to making this discovery many years before the rest of the public. The Australia Police even today, still deny the existence of television bi-directional technology, despite fibre-optic cables being well understood and a standard feature in cable network television operations.

As such, even today, the inventors Method is still part of an illegal commercial criminal process that continues to be exploited by many companies and countries, energetically and intellectually around the world, even with, believe it or not, the Harry Potter creators in the UK.

Through the use of "amplifying techniques" & systems re-routers, extortionists like these unlawful interceptors have figured out how to convert the human-technical energy from the inventors house-business works, into a "super-power" source.

This has evolved from the many years of integrated technical interactive application, designed and used daily, by the inventor, which has magnified the power-impact through those who know how to maximize the exploitation of the optical network & the applied invented method. On the positive side, this revelation has the potential to be a phenomenal new energy source and energy supply method for the future, particularly once duplicated and sold to the mass market.

It is the hope of the inventor that the Method will be adapted to Solar Panels, Wind Farms and other Clean Energy developments, which combined with the world population generating interactive energy and this compounding cumulatively, will produce a massive energy source collectively on a much bigger scale than what the inventor did as an individual. It is hypothesized that this application of the Method, once researched and marketed properly, WILL solve the energy crisis for humans, as a kind of perpetual motion in action, (which can even be added to motor-vehicles, or elsewhere and adapted to the Smart Paint concept) & then integrated theoretically to Electro-Magnetic Scientific Principals.

This would then be combined with the inventive Method and conceptual "electron-photon" present energy conversion, which is currently only accepted in its present form as a"human signals" and technical applications.

This might for example, mean in the future scientists develop "energy pads or collector panels" that can be adapted to the interactive method, that feed off humans generating energy in motion, driving, speaking, moving etc, and channeling into the integrated and interactive inventors world systems, potentially solving the energy issues forever.

Of course this would be part of future research and ongoing developments of the original Method of the Invented Claim. Essentially it makes the human race in this interactive application to technology, human energy generators, not just systems users and consumers. It is an important component of the Patent Claim and future developments.

Over consistent application of this "innovative habit", 15 years later, the converged and unified globally integrated network has arrived, without virtually anyone noticing the electron-photon, (or human signals) connectability to all electronic devices and technically linked networks receptability to this Method, all around the world, with all the associated technologies.

These are now essentially, part of the inventors advanced integrated & interactive multimedia systems design, in which for the inventor as the industry leader in particular has now created a unique 'hyper-sensitive synergy * as a individual human, with the evolved inter-connected global integrated technical method that has resulted from the inventors long-term consistent, application to reprogramming the entire international and national infrastructure, according to the inventors unique design using the humans signals method.

Through this consistent perseverance & long-term application, mostly initially using sound-wave programming & other techniques like scanning strategies, the global world systems unification, & the inventors interactive & integrated additions, have now become so fine-tuned to the inventors unique application, that even brain-waves, & making "thought controlled or mentally-driven applications" has also become possible.

This has provided even more advanced applications to the invented method, allowing the electron-photon energy conversion,(or human signals technical interface) to reach even outer-space locations, through satellite signals & long distance communications technology, with either a thought associated technique or sound wave method, as an example. This more advanced brain-wave development in particular, has important applications to Military Systems, (as depicted in Diagram 15, Section 5B) and other critically important applications.

In this approach, it has expanded the business invention even beyond, the geographical limitations of physical planet earth, providing limitless opportunities.

As an example, the Method can now be adapted to NASA Colonisation Interests & Interplanetary Mining Interests, especially in the application to outer-space exploratory projects which the inventor can influence using the human-signals interactive method simply from the lounge-room television, but only if relevant images are broadcast on the television at that time. However, it is suspected that even, if such images are played through video-rentals & home viewing, computer technology etc. the effect can now be the same, as Satellite Technology can still detect the "interactive application".

In fact, since the method is essentially now one-unified and converged network, the inventor can achieve these kinds of functions literally from any location where relevant technology can be accessed and while the television is the best conduit for this, being visually drive, the Method and its application is not limited to the home-based business prototype origin and has expanded to technical receptivity to any relevant technology in any location that is part of the same infrastructure. It is suspected that this has occurred mostly on a algorithm and bandwidth level.

When television broadcasting of images and sounds are visible on the TV Screen, from any television, on any channel, and the "interactive multimedia integrated" approach is applied to such electronic images, the inventor uses this imagery stimuli to prompt and guide the choice of programming content in the interactive human signals application.

In the long distance interplanetary examples, or, for International Space Projects etc., the key criteria, is the broadcasting of such images which in the case of using the bi-directional television technology, with the "interactive method" & the "human signals technique" or a similar device like video footage on the Internet, opens a communication pathway that can now be impacted & altered by this methodology.

This essentially means that the inventive method can affect even space technology & outer-space domains, as the human-signals projection/channeling, does work & is successful as an "influential method". It has already proven effective, for those who know like in the quiet domains of NASA America, although NASA have said nothing publicly about the inventors secret developments.

This also includes applications to artificial intelligence & robotic specifications, which have become equally receptive in the machine-nodes synergy with, the inventors systems integrated human-signals design, allowing the method to provide "driving" functions in such operations, as mining on Mars for example, even with the human signals interactive technique being very distant geographically, from such projects. (See Diagram 14, Section 5B).

The conversion of the "Echelon Illegal Spy Network" and the discovery of bi-directional technology evolved into a multi-faceted application after many years of development by the inventor. The main advantage of the bidirectional aspect of television is that is provides a visually based feedback loop through television in particular, which strengthens the stimuli. In this way, this adaptation of the Method was more interesting for the inventor than sound-programming down phone lines for example, that provided no such visually responsive feed-back loop. Of course for a such a phenomena to occur has engaged at sophisticated levels cooperation by other programmers involved with the "other-side" of television technology by those who determine what is seen on TV and the time it is broadcast.

This impact allows the results of the human-signals programming and innovation applications to become visible & evident to the inventor is aware of her programming outputs. As this occurred in isolation, this can only be evident to others, if the recorded film footage of this development that occurred bi-directionally is obtained and brought forward for assessment.

The constant secret film-recording in the inventors house of the events that took place over this 15yr period that still keeps evolving and adapting even today, will, once retrieved, solidify the inventors claims and long term past works. The secretly recorded bi-directional film evidence will make the whole process tangible and provable without any doubt, and in the future may even be made publicly available. It is suspected that the cooperation of the NSA in America would be required to retrieve such film archives, as these events took place illegitimately, by the unlawful interceptors over the specified period.

In Section 5B, listing the Graphical Images, Diagram 1, providing the prototype, shows some idea of how, the "integrated technology pathways were built", while Diagram 2 demonstrates the sound-driven television and multiple-technologies programming applications that were applied to the discovered bi-directional technology.

These Graphical Diagrams, however, do not demonstrate the full capacity of the interactive and integrated application, as the inventor can move around in this domain or anywhere elsewhere, applying these techniques to any appliances and devices, like with a digital camera & the computer & Internet, interactively and integrated according to the human signals generated method. In this process, this can be changed and modified according to the individual choice of using the methodology & its application, and is extremely versatile and flexible in its systems design and technique. This systems flexibility exists both on the micro-module level, as well as in the expansion to the macro-systems application, which is applied to basically any technology outside of the inventors house that is accessible to a human-signals programmer and operator.

The application of sound-wave, brain-wave and kinetic energy to the bidirectional TV camera which goes through the fiber-optic networks globally, & through satellite systems, & crosses into computer networks, also, and which now even communicates signals beyond the earths atmosphere, allows the integrated systems design to be high speed, highly flexible and extremely adaptable to virtually any situation and application desired in an unrestricted, unlimited manner.

The system and invented method is constantly able to change & keep pace with technological improvements easily and rapidly, including in the near future the expected expansion from bi-directional to multi-directional applications, along with the integrated multi-functional applications, that have ongoing adaptable capacity, (see the Definitions in Claims, Section 3)

Multi-functional applications in integrated & interactive multimedia systems design, is not just about a single device with multiple functions in one application, but rather, is about providing a model of operation for integration with many different devices & appliances in an interactive method, hence the reference in the title to "multiple-technologies".

Multi-directional applications, as can be seen from the diagram has helped to create a different depth perspective & dynamic aspect to technology, by coordinating the inventors operations on an integrated basis with the computer system & the television network in a combined approach to a "whole-of-room" prototype module that allows the integrated & interactive methods, to continue building a holistically integrated systems approach with a whole-of-world application, because of the associated global technology networks in TV and the Internet in particular.

In addition through the inventive design the created method has provided multiple angles, & perspectives to technology, not just being relative to flat screen television, or single appliance viewing, even on a bi-directional basis, but also, with the "multiple-devices" application, like adding the computer and phone to the method for example, provides the dynamic component of the invention application, in this multiple-technology integration & interactive technique. This is clearly shown in Diagram 1 and Diagram 2 of Section 5B.

The applied method, going through bi-directional technology pathways then, feed into the fiber-optic global networks, & satellite systems and this then allows many other different kinds of integrated and multi-functional applications for other technologies & systems users, utilizing their own electronic devices, to be part of the same overall global network in this same application, which are already integrated infrastructure systems on a hardware basis, but by adding a global customer base to this approach, makes the method a commercially dynamic design. The human signals application to the global infrastructure has made the entire network fluid in function.

This systems design of the home based-business prototype model, which also allowed exceptional developments in 2D, 3D technology to evolve (& which will see the advent of multi-directional 4D and holographic technology, virtual reality software also continue to evolve), has added depth & dynamism to television and computer software systems in a manner that was not possible before, with just computer hardware components.

The sound engineering method of the inventor's technique applied through bi-directional television, is directly responsible for these developments.

In addition, it will shift the communication interactive revolution from more than the flat-screen, multiple-viewing applications,(PIP-Picture in Picture) which are already part of the TV cable network companies, into the multifunctional, multi-directional dynamic interactive human-signals design, especially once the existing systems and technology are officially integrated into the inventors method on a legitimate commercial basis. The adaption of multiple technologies to television networks using the inventors will enhance this process.

In addition, through this globally configured sound & brain-wave driven infrastructure human-signals approach, the integration of the unified world system, in this method, still ensures, important competitive consumer rights, where choice of device & technical appliance, is maintained & which protects consumer rights in a capitalist free-enterprise society.

Since it is applied through mostly the inventors Methodological approach to bi-directional TV-cameras, it has also maximizing systems transparency at the inventors level. In this way, being under constant surveillance in the home, ironically provides a new method for accountable "best practice" in any location where bi-directional technology is found. It has the potential to ensure even families in their homes are forced into a new level of accountability, which is important for child-protection priorities, even though many would argue against the civil rights violations.

Unfortunately for such citizens, despite this position being essential correct on a civil liberties level, it is really too late for such principles to be enforced, as the infrastructure behind all the bi-directional technology, allowing such intrusive violations to occur, is here to stay and cannot in reality be reversed or shut down, particular since it is now integral to the global infrastructure in almost all technology. What this patent method can do for such people, is to help provide open transparency around this whole process and in the commercialization of this reality, customers and systems user can then be presented with more options to exercise some controls over their own environments and technology usage.

Description of Embodiments (Section 2C)

• [0001] Multiple-Technology Interactive Teaching Applications, (whether technical appliances and devices are integrated into one electronic product or not), which can be franchised and sold as a duplicated model for others to promote as their own micro-module business application. This can allow systems users to apply the method directly from a home television for example interactively and in the human signals method, frees users from the computer keyboard, even if computer technology is adapted to television, as has been the case through the Internet, and which in the Inventors Method, uses the television as the primary adaptive appliance, rather than TV adaptations to computers. Unfortunately the big computing companies that have marketed in their products this same "concept" were part of the unlawful interceptions of the inventors house, and were able to get in first in these developments, while the inventor was kept down in WA and the government refused to stop the exploitation.

Bringing interactive multiple-technologies into the market place can provide dynamic visually-based communication opportunities to participants and audiences whether they are big or small, anywhere around the world, anytime, with bi-directional and multi-functional options that provide many applications beyond just home-based interactive teaching.

This can be at present through, bi-directional Television and Computer-Technology, either independently, or as a combination of both systems, and can also, be adapted to an integrated and interactive function with other additional devices at will, as well, allowing consumer choice with the adaptations & application to a diverse range of different environments being transformed into this inventive design, like lecturing auditoriums in Universities for example that are networked to a interactive home-television, and not just, an at-home computer, or office-only based application.

The number of different applications for "mixing bi-directional technologies " and they ways they can be utilized is very diverse and too broad to name in this patent process, on a specific device by device interactive basis, but in a nutshell the general model and any associated adaptations would be incorporated as an embodiment of the original patent claim, irrespective of the choice of location of the future customer base of this inventive commercial application.

[0002] This same use, as outlined in [0001] can also be applied to conferencing strategies & interactive studios & workshops that allow, home viewers to participate in live discussions with a media broadcast audience being visually connected, that in the past, meant that the viewers contact with television networks & systems was always passive & mostly, non-participatory, unless they telephoned the television stations, or wrote in, for comment. Now even the "interactive viewer" themselves will be visible in this application, which can directly access the public through bi-directional television on a visual basis straight to the TV Studio to the Viewers Home.

• This means a camera crew no longer has to turn up on the front door,, as the camera is already in the viewers house through bidirectional fiber-optics.

• The invention changes the opportunity for audience participation in television networks to enter a dynamic & charismatic "interactive" domain between television watchers & the programs being watched. For this to occur, the television viewer, no longer even has to be present in the Television Studio in person.

• Through the integration of the home-based technology with the television studio based networks, the bi-directional functions, allows this direct-dynamic communication to occur visually & audibly through the expansion of this network. When applied through this systems design, into an integrated television, multimedia consolidated empire, not only is this new viewer interaction possible, but also this means that the interactive design allows overlap integration with computer technology & other devices, to occur in a multi-functional & dynamic manner & to be applied from any

television, or computer-systems integration into a television studio broadcast environment, or the technology behind these networks. [0003] Human Signals (Sound-wave, brain-wave & kinetic application) to interactive television and integrated multimedia/electronic devices, can be utilized in a very broad range of applications : o Healing, medical & scientific applications, including the capacity to apply integrated, holistic approaches to medicine and human wellbeing, in a drug-free, non-invasive methodology. o Research & Development in a virtually unrestricted application. o Energy and molecular reprogramming & restructuring at a sub-atomic level. o Systems streamlining with Defense Applications, Policing, Global Security, Road-Way Management, Community Safety, Greater bureaucratic efficiency and increased standardized

systems & partnerships internationally, nationally, locally & eventually also intergalactically, with;

Intelligence and Security Agencies;

Judiciary, Courts of Law & Law Enforcement Agencies;

Prison Systems and Prison Management;

Systems to oversee Courts and the Practice of Professionals in Law, Medicine & in fact any occupational groups, as well as, Government Bureaucracies, including consolidation of computer systems, databases, surveillance cameras, global satellite networks with interactive television & integrated design etc.;

Globalization & centralization of world currencies and economies and transformation to interactive & integrated design to electronic banking & the adaptation to interactive television and consolidation with other systems like internet banking & ATM's eftpos, paypal etc. with the transition to sound-activated, integrated, multimedia financial management systems, world wide;

Farming practice & farming applications, eg. Pest- control, ecological issues, streamlining and standardizing quality practice, nationally, internationally & beyond if need be & adaptations to the environmental factors & natural elements of mother-nature & the animal world;

This also includes TV Weather Channels which include my research & development work on meteorological & seismological factors through the application of my method in my business design;

Systems integration also allows opportunity to provide greater protection to endangered species, animals in the wild & even in interactive application assists with issues like Ocean Fisheries, Sea Management, Saving the Great Barrier Reef, improving Customs Officers operations, as well as, & Border Security Officials, anywhere in the

world, through global consolidation into an "integrated systems, unified model";

Land management issues & the capacity to reduce poaching & black-market trade, are easier to address through my systems design & application. This allows stronger systems control for protective stakeholders like conservationists, environmentalists etc, as well as increased strength in providing the essential global infrastructure for punitive action & law enforcement internationally, including in remote & isolated geographical domains. My invention, brings the whole system together through this design, providing these kinds of benefits;

■ Events management, crowd control, public safety & community projects & capacity to provide increased safety to staff working in dangerous terrain can also be facilitated through my systems design;

Specialist Industry Regulation, like (xxx) Adult Pornography and establishing globally centralized safety standards and benchmarks for practice, with interactive applications that allow refined adaptations that can be applied to a individually approved needs- based customer model, & systems integration, allowing essential strict control to prevent abuse, or misuse, in the industry & optimize legal adults only authorized trade in a responsible manner, which includes protecting the rights of sex-workers;

Individually targeted marketing applications which result from more-specific needs-based interactive systems adaptation and which then provides significant benefits to both saving money for marketers and to customers acquiring more personally relevant service promotion & advertising.

For example, interactive and integrated systems in the future may allow, target audiences to nominate a relative television channel on even FreeTV, or Cable Channels through selective network marketing and advertising promotions aimed at matching the viewers interests with more tailor made advertising campaigns and/or programs.

This might for example, mean that while a Gay Couple could access the standard "FreeTV" programmes at no cost, the advertising on FreeTV could be tailored to suit this target group uniquely, who may prefer to see advertising that is relevant to a Gay Network for example, of viewers that see advertising promotions relevant to this particular target group, but that is not relevant to other viewers, watching differing targeted advertising campaigns for a different audience.

This can be achieved through integrated technology & centralized network data-bases, and selective access & information filters being applied to the entire global technical, electronic, communications & media integrated infrastructure; aimed to match television audiences and the individual needs of viewers with the broadcasting both for the advertising and the television entertainment programming,

Human Signals Systems Adminstration whether it is for Supermarket Suppliers, the Banking Industry, Government Data Bases, or any industry adapted interactively to the prototype module or versions of it. This provision is aimed at both gate-keeping & centralizing systems with paperless and keyboard free benefits & providing greater streamlining of inter-related systems, creating increased systems reliability and easier supply. It can be applied to any industry needing or wanting essential infrastructure in the high speed interactive human signals method;

While this can improve infrastructure efficiency and customer convenience, it also inadvertently can help strengthen security issues and reduce risks of bio- terrorism, food contamination, & enhances trans, cultural trade, with an increased capacity for third world communities to join the economies already benefiting from economic prosperity, because of the inventive systems globally integrated and easily adapted method;

o Mining Companies & Exploration Projects, including applications to earth based & inter-planetary robotic & "intelligent" devices, allowing long-range, low cost, adaptation to mining interests on other planets, or in other territories with long-distance technical applications and integration. o Terra-Forming and Inter-Stella science and development in international & inter-planetary environmental & ecological transformation, including meteorological and seismological applications, as well as, interplanetary atmospherical oxidization projects & colonization interests.

o Improved functionality & capacity in technology; in speed and quality, and which through integrated and streamlined adaptations, has resulted in phenomenal levels of increased power to technical systems that evolved from the interactive long-term endeavor & now produces almost instant results that are evident all around the world, and that manifested from the Method of Human-Signals Interactive Technologies. o The inventors Method applied to systems, also allows extreme versatility in terms of application to virtually all technologies, any device, with brand names and technical specifications being irrelevant, except for the common link to the bidirectional technology routes, irrespective of open-market competition and customer preferences, as in the inventors method it is all part of the same integrated system.

Expected future transformation of current computer-assisted applications to the interactive multiple-technologies integration and humans signals operation that is keypad- typing free, texting-free, & paperless in administrative operations and application to 'interactive bi-directional visual audio technology' with human-signals to a direct-network expansion from Government Departments and private &/or commercial operations straight to micro-module interactive units belonging to customers, whether they are at home, at work or elsewhere. This is essentially like accessing the Internet from anywhere, but is much more dynamic and diverse and directly visual, in application. In addition the systems users would operate on a technical visual bidirectional basis with human-signals activated operations applied to multiple interactive technologies depending on the choices of systems user and how and where the mix the method.

o This will allow rapid processing of essentially bureaucratized processes, which greatly reduces time, costs and increases significantly, systems & processing efficiency through this audio and visual bi-directional interactive infrastructure transformation of bureaucracy and systems processing. o Specialized application to weapons development & military systems including for example, thought field weaponry, long- range ballistic missiles & electro-magnetic applications, strategic planning, integrated battle-systems design, and geographical application to any location through the bidirectional technology adaptation. o Interactive Human-Signals Method adaptations to Military and Security Operations and Systems is also aimed at precision based specialization and the capacity to provide fine & minute details that separate enemies, B from friendlies, B & the innocent from collateral war-damage, allowing in some cases preemptive advantages through interactive systems defence mechanisms and integrated infrastructure control.

The intangible aspects of the systems Method even creates the possibility of the fate of combatants in warfare, becoming affected preemptively & predetermined somewhat, through they combined interactive navigating and systems mapping as well as, applying technical-spiritual & metaphysical paranormal applications through technology, which can in some specialized cases alter even a previously unpredictable outcome, like integrating Ancient Pa-Qua to the systems application and the directional compass. This essentially means, that through the inventive method the inventor can for example, interactively clear a pathway in unpredictable terrain for troops, before they arrive, that can limit & remove risks of "shrapnel & combat wounds", landmine dangers, and targeting locations. Obviously, this is a homeland advantage that needs to be protected commercially to assist "Free-World Troops" & their security functions. (Video samples of this application best help understand this particular embodiment & need to be part of the future retrieval process from the NSA Archives).

Human-Signals based applications have also been already applied in a weapons context through those in Hollywood who have been part of the extortion of the inventors work & abilities in these areas, which have then manifested as the "Iron Man" Character for example, in the Movies etc. where the impact of the systems invention & the energy production that was filtered, channeled & amplified illegally is evident. Such energy extortion, took place through the Fiber-optic Cables & Networks by Corporate Piracy & directly from the inventors house bi-directional television application illegally.

[0004] In addition to creating systems adaptations of the Method to cleaning up the Adult Pornographic Industry, as a specialty area, this will also include the important benefits of centralizing the new integrated global network in preparation for Global Policing.

This will be adapted to with the interactive multimedia systems design & partnerships with, Police & Law Enforcing Agencies, & Security Based Companies, through the inventors commercial application to these industries.

This approach will also include the Novell application of installing compulsory "proof of ID systems" to access Internet Adults Only pornography, (& not just the current unreliable voluntary declarations of adult age, which anyone can fake, on existing websites) and ensuring this is properly integrated into a controlled "interactive human-biometric globally secured network adopting the inventors techniques" in a centralized unified and streamlined whole-of-world system.

This may include an ID requirement like smart-cards, drivers license number, bank account number, biometric applications etc, & needs to be integrated with the systems inventive method, and global databases for identity checks & improved global security, including the cross-over between law-enforcement restricted networks & commercial domains.

In applying the human signals interactive and integrated method to this, it will allow easier security checks across territories, globally and even beyond that still remain centralized through the inventors method and ownership rights.

As the human signals operated "integrated model" of all technology networks, provides the best centralized point between, technically based systems, government authorities & the commercial & private sector, around the entire world, this provides a certain stability to global economies and global infrastructure, which in the business design & invented Method also helps to consolidate the high level of complex security needs in todays systems to a streamlined unified approach. In this commercial application and its benefits, the Inventor can take the steps necessary to facilitate global policing, community safety and global security that, at present, is out of the reach of current security, defense and law enforcement agencies due to jurisdiction and legislative limitations.

This centralized commercial infrastructure approach while beneficial in many areas of global security and community saftey involving criminal and law enforcement issues, is most importantly aimed at ensuring, that children & underage people DO NOT FALL IN THE GAPS around the pornographic industry & helps to resolve policing territorial and fragmented disputes and turf problems & geopolitical conflict in the corporate application.

Over time it would be expected that as technology becomes more and more biometrically driven, with digital fingerprint & iris scans in the already advanced countries, who have applied these security adaptations to Banking, Computer Access & Secured Facilities, that this can also in the future be applied to "integrated multimedia models" which could potentially mean that customers with multiple devices & electronic appliances, through the inventors systems integration & synchronization, will allow, one fingerprint touch, or eye scan; <a> or human-signals operation,(whether by voice activated systems or not), to potentially recalibrate an entire room of different devices, even if they are 'integrated at home, or in the office, or with both'.

This will allow easier capacity for systems users to keep up-to-date individual security technology and access requirements secured, as the human-signals application should be unique to the individual users biometrics, (of course the risk of clone human biometrics, copying sounds, uploading digital fingerprints fraudulently etc would not be eliminated, but the benefits of applying the inventors method, demand that solutions to these "systems bugs" would need to be addressed and resolved over time. This can also apply to portable systems integration, like in caravans, driving in motor vehicles, transportation vehicles, (Ships, Planes, Trains, Trucks, Buses) etc. & is not restricted to a physical or "fixed" room because of the integrated & interactive network design and its flexible human signal application,(see Diagram 16A and 16B, Section 5B).

A one-touch biometric, or eye-scan recalibration & integrated configuration application, of all devices and technologies customers own, whether with smart-chip technology or not, that is human-signals operated will provide maximum systems efficiency & customer convenience.

This is also expected to eliminate the current need for Internet users to continually having to "create multiple different pass-words" for different websites & allows extreme choice for customers, as through the invention, literally any device, with any brand name, in any country & any language, can be applied and the centralizing globally of the inventive method makes this application a reality.

However, the overall global systems human-signals infrastructure control on the macro-level of the design, would remain with the inventor as the owner who would need to provide the overriding back-up function, along with ensuring the final end-point for global systems biometric application is still human driven in this inventive method, and is not dominated by artificial machine entities like Unmanned Air Vehicles that could potential "lock out human operators" if Al technology was mismanaged.

This integrated interactive human signals method, allows systems diversity, configuration & compatibility issues to be preserved, and optimized on a whole-of-world quick & easy simplified level.

As systems integration has occurred at the macro-systems level as well as in micro-module units, there will also be less pressure, for customers to constantly have to adapt their appliances & electrical devices with the high- tech, high-speed changes to keep up, since the reconfiguration occurs within the network infrastructure. As such, the Method can literally apply to any computer or television, or technology, whether they are old or new, analog or digital, as it is the fiber-optic network within the appliances and network, that adapts to the constant changes, rather than new hardware devices, or software, as in the case of interactive TV, utilized in the prototype design.

It is not software systems that have driven this television interactive method, since it was infrastructure based and dependent on the global surveillance systems behind the technology the public uses. Therefore this globalised security hardware and its adaptability from within the integrated infrastructure, can literally apply to all technical, electrical appliances and artificial devices.

Being human signals operated, and therefore user friendly through the Inventive Method in its programming functions interactively, has also liberated the network method from rigid software systems application and requirements and is perfect for computer-challenged users like the inventor who particularly thrive off "interactive bi-directional talk- television" applications.

[0005] Entertainment & International & lntergalactic Diplomatic Opportunities, for interactive, integrated multimedia performances, meetings & negotiations that allow rapid access to large and diverse audiences that crosses cultures, language barriers, distance, financial restrictions, political and legal limitations & even outer-space itself, in a dynamic and interactively & integrated based format that includes consciousness raising processes & technical-spiritual applications.

[0006] Conversion of television into a telecommunication forum, which allows a large screen, at-home or at-office application visually to convert long-distance or telephone-linked phone calls through integration of these bi-directional fiber-optic cable systems, to open communication devices and transformation into the interactive & integrated model with multifunctional applications.

This is essentially a merger with the television networks & other communication devices like "Skype", digital camera technology, interactive computer websites etc. © This will mean that when systems users communicate to people, through the integration of all the communications technology with television and the world wide web, that seeing people, while you talk to them, through the TV-Systems Integration Model, which later needs to be expanded to compatibility with mobile phone and land- line systems and any other relevant technology.

In this application the image of the caller can be integrated from television satellite systems and combined with telecommunications technology, to allow the picture to go through a mobile or phone device to the integrated interactive modules. This provides an additional option to television- telecommunications adaptations, which converts the communication process to a visually orientated design, as well as audible applications, and which adds the additional important visible body-language component to communication from long distances. This also provides important options for people with language, or sensory difficulties like the hearing impaired populations, or vulnerable groups who find communication difficult, but where the image tells more about the story than a pigeon English conversation or language barrier.

The bi-directional visually based systems & direct broadcasting imagery provides opportunities through interactive communication transformation to this systems design, & application to a big-screen, or small-screen through TV integration with all other technology and can be combined with many different technologies like mobile cellular phones, computers, digital cameras, security cameras, etc.

This application provides additional impetus for conveying messages in more than audible techniques, whether they are on the phone, through cellular or mobile phones or, web-cameras, as the merger with television & other communication devices, and completely transforms this communication process while still allowing the convenience & comfort of at-home access, easy connection to any television & other adapted integrated options, as well as, very cheap transmissions, since the network already is built and does not require additional lines and cables to be laid to be functional.

In addition, in today's high-flying business world, building trusting relations with partners around the world is essential in a global economy, that with this added application to communication devices, makes long- distant contacts, especially with foreigners, more personalized, and is significant to economic development & business building operations world-wide which helps to strengthen positive relationships anywhere.

[0007] Providing a commercialized and globally standardized application to International Child Protection, Education & Child Health through systems integration and interactive application and design aimed at establishing strong and preemptive protective applications to safe-guard vulnerable children. This can also be adapted to centralizing systems internationally, around other social issues, like child-adoptions procedures world-wide, immigrations issues, etc & provides a mechanism for standardizing global infrastructure around the administration & professional regulation of such human services applications.

This would be important to stopping illegal baby trade for example, and assist with critical infrastructure to support international human & social rights factors. Through the invention, these mechanisms & systems would become regulated and controlled world-wide & professionally standardized. In addition, because of the novelty of the invention, this would also provide the added advantage of almost eliminating bureaucratic red-tape, as the method is paperless and electronically inter-connected globally to technology driven networks allowing systems to be streamlined quickly, efficiently, saving time & money.

It also provides for rapid ways to improve the move towards professionalizing globally unified infrastructure and establishing the framework for effective international standards with a centralized approach.

This aids the transition to interactive & integrated multimedia systems method. In addition, operation of the method, on a voice-activated human- signals integrated multimedia digital level, allows global systems management to be extremely fast & easily adaptable to any situation, including crisis management & risk management issues, which can be particularly important for global security issues like Bio-Terrorism, or a community crisis when every minute matters.

[0008] Creation and invention of the systems application to color coding, silhouette and symbolic references to design applications like security systems, cryptology & specialist intelligence codes, science, medicine & research and integration of the adaptation of spiritual symbolism to technology, which has created the foundations of the spiritually awakened enlightened intelligent machine age.

This has helped to streamline the entire global network on a domain beyond mere text and the binary software applications and computer hardware bits & bytes. This has facilitated the technocrat psycho-spiritual systems adaptation & integration in the modern hi-tech new age.

[0009] The unique "interactive media" application also allows a very unusual combination of television studio programs & broadcasting, whether with live or pre-recorded TV studio programs, to be adapted to environmental synergy. For example, cooking studios in TV, are often used in the sound-programming overlays through the interactive design to link food-associations symbolically with key words through the sound driven interaction with TV Kitchen Studios in a research & development application, to aid healing, security codes, battle tactics, the stock market & wealth creation principals, as creative examples of the interactive voice over application.

Essentially this method is applied to any TV viewing a systems user may wish to apply it to, on any channel, since the unique interactive method allows the flexibility of adapting to any visual stimuli in technology chosen and applied interactively. This technique has also helped with genetic & subatomic reprogramming strategies. In addition, this process has already contributed to scientific breakthroughs in cellular regeneration theory & the genome map, where the applied method "behind the scenes" has removed the healing blocks from the system in a macro-application, sound- driven design, which doctors illegally applied to the micro-systems level through Medical Software on TV extorting the application and method. ©

This is aimed at energizing human atoms to regenerate, at the biological & human-subcutaneous level, through synaptically reconnecting damaged tissue using the sound-wave & brain-wave method to mentally, or audibly project healing pathways to a target patient. The integration & application in reality medical programs in television, in which the inventor contributes to the program interactively through the voice-over application is one example of this application.

This essentially means that like on the technocrat level, where the inventor has generated a "synchronized unified network" in technology and electrical devices, this same human-signals application to the human body and human sciences, presented through the electronic medium of television, has demonstrated some regenerated & reconnected damaged nerves, which has contributed to healthier body Organs and body tissue.

This sound-generated synaptic regenerative approach & holistic application has potential implications for curing paraplegia and quadriplegia permanently through this method & is easily combined with musical adaptations as well. This also optimizes human healing in the adaptation of this strategy in TV Programs with classical sounds and higher vibratory healing sound particles that the inventor applies interactively when such programs are telecast.

While TV is the most dynamic of these forums, even though they can be applied elsewhere, like to computer technology & mentally through radio- waves & satellite technology, these other forums are not as interactive yet, as much as television, since TV involves constantly moving images that can be seen by the inventor and future users, as sound & brain-wave human-signals programmers.

This provides a visual feed-back queue through the bi-directional television fiber-optic network device & satellite technology, that is faster and more dynamic than computer software systems & the audio only airways in radio. However, the "human signals" transmissions crosses into all these other communication devices and technologies like radio waves and the Internet as well, but is less interesting in these applications, than bidirectional interactive television usage.

The TV-Studio Interactive works has also provided an unexpected "entertainment" component to the inventors work, for those who have watched from a distance, and has been a somewhat surprising result, making the individual application of human signals operations and the inventors biometrics & mental functions more & more synergised with the global technology interactive revolution. This therefore makes consolidation of the systems configuration globally, easier & easier.

While more & more anonymous people and companies illegally accessed the hidden spy-camera's to watch the house-based works of the inventor, many companies adapted commercial applications around the inventors home method which has breached the privacy of the inventors home and allowed the extorting of the systems design and method to be easy pickings.

Sub-Category Application within Main Patent Claim

[0010] Within the context of the unique design and application of the;

There are literally many thousands of innovative ideas that were created by the inventor over the past 15 years, & many which even today are still generated frequently, on a regular basis. The long term past works, of the inventor recorded on film archives of the "intellectually hijacked status working from home", and which is believed to be held with the USA Echelon Agents & the current media television network exploiters, needs to be produced as archived film evidence of these past hidden bi-directional interactive technology works. It is important in the assessment of the patentability of this claim that the assessors understand that the development of this invention occurred under an oppressed state & special regard is requested in the inventors unusual case to help safeguard her true works.

The inventive Method is applied daily through ongoing works in progress, which is aimed at continually improving & expanding the applied interactive technique through this inventive process. In this application, the inventor still continues to generate many new discoveries & developments. These include some of the following examples which would benefit from accessing the film-records of the inventors works for a full- understanding of the inventors method and long-term hidden application.

Commercial Crime Alert : Backlog of Some Works. Suspected to be

Already "Pirated and Stolen" Under A House-Hiiacked State includes the following sub-cateαorv embodiments;

• Wrongful claims by Microsoft Corporation and other Internet & TV Pirates like "Think TV, & CNN & FOXTEL" around "interactive TV" and computer-software applications, which even as a software concept, strictly speaking still belongs to the inventor who has been denied natural commercial developmental opportunities due to the local bullying and oppressive medical control of her creative developments.

As interactive technology, using the inventors Method was applied directly to television initially, rather than computer-technology first, the Computer Corporations & TV Cable Networks, who essentially stole from the inventors house & applied some of the concepts generated to their own software & hardware applications using unlawful interception of the inventors conceptual origins, in these other Companies, they have fortunately, not duplicated, the inventors specialist technique described in this patent claim.

Essentially the "idea" of interactive TV, even for those companies like Foxtel, who only apply it to customers with a set-top box is still applied in a different manner from the Inventors Patent Claim. In Cable Television for example, customers can now choose TV viewing angles in Sports with a TV remote device etc, and while this was still a novelty component, even at that level, has been stolen by these Corporations illegally extorting works directly from the inventors house and then applying their own adaptive application.

The Commercial Criminal Corporate Sector, who have kept the inventors case hidden & exploited through the abuse of these illegal surveillance devices in the inventors home environment, utilized oppressive tactics & black-mailing of government officials in WA to control & bully & extort, the intellectual hijacking of the inventors creative works, over this 15year period of hidden development

Smart Clothing Technology - which was called originally "cyber- thread" and which is believed to have been pilfered by an ex-defense member in Australia who is suspected to have "sold off this idea" to the University of Bath in the UK. This concept was originally aimed at helping troops with temperature sensitive and more comfortable uniforms while smart-chip nano-camouflage adaptations to assist with combat functions in the battle field, where all also aimed at being applied to this development. This embodiment is meant to have two key components; (1) temperature-sensitive suits, to retain comfort in different, or extreme climates, as well as, (2) the blending, camouflaging chameleon-effect component.

This was meant to be applied electronically with smart-chip nano- technology being added to fabric for "the chameleon effect", with military uniforms of the future becoming adaptable to any environmental context in automated suit-security blending functions.

The treachery around this innovation by local espionage, fully exploited the vulnerabilities the inventor faced in Australia being trapped in a medically abusive state, where the inventor was constantly bullied by police for her eccentric ideas, right up until about Oct 2007, which only that recently, has seen the harassment ease off somewhat, allowing the opportunity to pursue business development to finally start. Before this time-line, essentially the experience of the inventor has involved relentless bullying by local authorities from March 1994, right up until this Oct 2007, at which time a noticed slight improvement in the situation had occurred.

However, even with the slight reprieve in more current circumstances, locally these threats of medical, political & police harassment still continue, even today.

• Cross-Rider "transformer" skate-board, which was pilfered conceptually from a confidential contract with University of Western Australia & then applied to HOLDEN CORPORATION as a car model adaptation and Transformer Robotic Technology application by Corporate Cheats in America.

This was designed originally to have a cyber-space application for people one day to literally dive into technology through electronic port-holes and virtual gate-ways like their TV, creating a "cyber-tron" like application & a new recreational trend for thrill seekers.

• Guns that can see "around corners", through a flexible camera- scope adaptation. This was aimed at preventing soldiers from getting shot or attacked when they don't know what is just around the corner by adding a camera scope adaptation that bends, to see around the angels outside of the soldiers own line of vision.

This idea came from the application of the realization of the inventors mobile phone having hidden bi-directional components that provided the opportunity for the application of the "mobile phone visual camera device", to expand the inventors method in a very flexible & portable technique beyond the home television. The use of the mobile phone as an interactive portable tool was integrated with the Television bi-directional technology as a centralizing source. This then provided the additional film-feedback loop, and shifted the angels in the TV camera from being fixed and static, adding another dimension to the interactive bi-directional surveillance technology.

The inventor deducted that a similar application with an adaptable device, could be designed to fit on rifles and weapons to avoid the fatal step around the corner in combat & which if integrated with the macro-systems design in war-game applications, & troop management in real combat operations, optimizes troop safety in any domain creating another essential military advantage.

In real terms this would work through adding a flexible camera scope to a rifle, gun, or military weapon that has flexible and movable parts allowing the camera angle to see around bends in advance of a soldier taking the next unpredictable step. These such embodiments will require more research and development.

By also being integrated with my unified system in a military function, this allows the Prototype Interactive Lounge-room to become a kind of Base Head Quarters to provide essential direct support to troops on the ground and which used interactively, through mostly bi-directional television, can facilitate greater combat control and warfare management applications. This technical application to an actual weapon would be linked electronically to hi- tech military command posts to support front-line operations, which collectively, as defense systems, need to be integrated with the inventors global network patent and commercial development.

This also increases a soldier's safety in the field and their survivability prospects in any terrain, not just systems that are defense territory. Through these kinds of systems adaptation and integration, it is the firm conviction of the inventor that terrorism networks can be intercepted and can be truly stopped, well before a terrorist attack can be launched. In addition, any unwanted casualties in war can be minimalised through the Red Door!

Camera's in Mobile Phones were also originally one of the inventors ideas over a decade ago, which was also exploited and pilfered by greedy corporate opportunists, like Telstra & Optus, who also took advantage of the inventors "medically oppressed and locally vilified state".

This first major adaptation of the the mobile phone was expanded overtime into hand-held multimedia applications with multiple- functionalities in individual small devices, which now have Internet, functions, electronic diaries and other applications.

The original idea behind this development was originated from the inventor as the inspirational new idea point behind this revolution over ten years ago, and which continued to grow through corporate greed & government kick-backs while I was kept under the medical- psychiatric thumb & silenced in WA.

Interactive Banking and TV-Interactive Technology is currently being exploited in Australia by several main companies like AMP. CMC Markets. Kwik Kopy etc. again through illegal piracy directly from my house, which has not been acquired through me "telling anyone", but rather through the illegal mis-use of the hidden cameras in my house-tv.

At the time of my USPTO Provisional Profile Application in Sept 2007, which includes interactive banking, there were no previous records at the USPTO, and this has NOT been rejected under Trademarks Australia, in my goods & services classes, which would suggest that there are patent citations that need to be served against companies like CMC Markets, AMP, Kwik Kopy etc.

My interactive banking concept is also due to be expanded to integration with my systems model & all stock markets around the world, with a future aim of centralizing global economies into a one- world standard currency for all. This is also designed to establish the infrastructure foundations for compatible future intergalactic economically based real markets.

integration of Universities & Educational Facilities to Television Interactive Multimedia Networks for easier access to global education and development of the capacity to cross the geographical divide. Local universities in Australia are also currently pirating this process daily through my extorted state in WA, especially in Murdoch University who have collaborated with the State Government & CNN America in this illegal conduct & have even been so low, as to manipulate my biological brother in their exploits by offering him a scholarship at Murdoch University, (which is where I happen to have graduated in 1991 with a B. A. Psych Degree), after Paul had been living in the USA for 20yrs & returned to Australia, just to complete his PhD at Murdoch University.

This return from America, and scholarship offer conveniently for Murdoch University Cheats arrived just as my "interactive media endeavors" were starting to pick up momentum from behind the scenes.

Motor vehicle Application of Camera's & TV technology built into new car designs. This was another application of the network from my home-business development which I conceptually expanded into moving vehicles & a portable domain, essentially as an extension of my systems design from the house. These ideas were fed into the Television Network from home, where they have since been rorted by Car Manufacturing Companies over the years & today contributes to artificial intelligence in machines, including in the motor vehicle industry.

Application of GPS Navigators in motor vehicles & integration with my business model & executive hands-free ease in transit- to assist stress management, especially in freeway traffic & long distance driving. - this may belong in the other yellow colored category, if already exploited & registered under illegal conditions.

adaptations from Virtual Electronic Software to weapons devices like redesigning Boeing Corporations "Gun Ship Combat Helicopters", with a integrated, fantasy virtual reality and war-games & computer- gaming technology, including "FUCK & FIGHT" options!

In addition to the device applications, systems integration & this sub-category, the additional inclusion of "virtual skin raps" which is classified in the "smart-paint" category & will be configured to be systems compatible with the biometric applications, where an adults only sexual combat fantasy software design, will also be applied to war-games & military vehicles like the APACHE HELICOPTER,(see Appendix 6), through simulator technology adaptations & Moon- Goddess Archetype Special Command Design Application aimed at adding additional military mystical powers, with meta-physical moon magic.

Centralizing all electronic gaming networks & the integration with the unifying global system, has critical Defense & Security applications, particularly with, Cyber-crime threats, Virtual Warfare problems & today's electronic security applications & Computer Virus Threats.

This centralizing process, either virtual or real, also will provide a TRUE mechanism to STOP TERRORISM PERMANENTLY, as through my commercial right to solely control this patent application, the networks which currently fund & supply terrorism, will be infiltrated & shut-down, once my ownership rights intellectually are secured & properly protected. Through my invention, my centralized design, will also ensure, future security threats from Terrorists can be preemptive and prevented from resurgence, in a truly "eternally vigilant" security focused global method.

This systems integration in global warfare, both for combatants, military equipment & international security, is not just critical as an invention application to peace-keeping & defense operations on earth, but is also essential to the very survival of our fragile species & Home Planet Earth.

-In the evolution of robotic transformer technology, which originally came from my cross-rider humble beginnings, smart-paint adaptations can also be applied to "moving mechanical adaptable components", or manufactured body-designs. In my inventive application, this special paint, combined with a added "liquid smart-chip" adaptation, would be engineered to be hyper-sensitive to my psycho-telekinetic and biometric applications.

Essentially this would be aimed at allowing easier capacity to literally drive an aircraft, or combat vehicle, either in the sky, or any other domain, including submarines under the ocean, through the application of my systems design with my mind-control-weapons program, sound wave instructions and/or, kinesthetic/touching projection which sends my energy to these military vessels through the technology, when I am watching the action from a distance.

These functions, will also include virtual smart-paint artificial "skin- rap" adaptations, as well as psycho-telekinetic integrated systems adaptation, which essentially will mean that I can literally command & control, & drive, if I want to, an entire Battalion or Fleet, either Intergalactically, or on Earth, just with my mind and biometric interactive applications in my inventive method. This would also apply to Defence Troops & Military Formations, which is important for Battle Control in the Ranks, & can be achieved, once smart- clothing uniforms are in place.

These smart-uniforms then will need to be inter-faced with my global interactive design. Hopefully Robotic Engineers will be cooperative enough in the future, to ensure I can also apply this technique, as a back-up mechanism for human survivability, with an adaptation of this process to allow counter-defensive methods for upcoming robotic warfare threats.

Originally this concept was offered in-confidence exclusively to FORD CORPORATION. This idea is being presently pirated, through the illegal exploitation of hidden cameras in my house-TV by Holden Corporation, who have been shielding the illegal cover-up & who are in throes of heading in the direction of this invention, which is my idea & was for FORD CORPORATION ALONE, unless this commercial crime is forced to stop.

This idea was designed initially to commence with a Military Application to Helicopters, Aircraft, Battleships, lntergalactic Space Ships where the "smart-chip liquid chameleon effect" was meant to be mostly applicable" to military uniforms, military equipment etc.

After that phase, this would be expected to be expanded to civilian applications like Motor Vehicles & even house paint with extra- temperature sensitive benefits, for adaptable seasonal weather comfort.

In the case of civilian motor-vehicle application, the "chameleon effect" would be fashion and trend orientated for public use, to match, mood, taste, popularity etc, rather than to provide a blending/hiding or security benefits which are specifically for the military application. In the future, the entire system is expected to evolve beyond "electrical devices" into

essentially converted brain power, sound-waves & my kinesthetic energy transformation & systems applications through the technology from a free energy source. In the future this energy conversion, which emanates from human-generating energy sources being channeled into the technology, can then be applied to any device, electrically driven, including transport vehicles.

This process would occur through this method of converting this human energy source into the new expansive energy drivers in my systems method though optical amplifiers and energy transformers capturing and conducting this process in a concentrated collective manner through this patent application.

At the moment this energy route, travels through the fiber-optic network & would need to be captured from the collective human- source and channeled into these network routes for conversion into a power source. In the future this can become a clean and free energy conductor, and adapted even from the motor vehicle application to add more "charged particles" to the amplifiers and transformers from devices that integrate future motor vehicle technical with the patent claimed method.

It is also planned that wind-farms and solar power, that can help magnify the energy outputs in a abundant & safe method that combined with these nature-based energy supplies in wind & sun- power, will be sufficiently powerful enough to be effective with these added applications, that overcome today's somewhat limited outputs from current wind farms & solar powered energy plants.

This in turn can literally power anything, from households, to office buildings, computer networks etc. This will make the Nuclear Energy Debate redundant and eliminate the associated terrorism and environmental risks and hazards.

Essentially this patent method provides the framework, which in the future, will help with the electron-photon & electro-magnetized transformation of energy drivers & energy supply industries to evolve.

For this reason also, this patent claim has a meta-physical components which is to accommodate an "eternal concept" in my life and business planning, as I believe this application, being a consciousness-based electron-photon evolution, is now sufficiently advanced for my application even in domains beyond this physical dimension. This energy based approach also includes the kinesthetic application of my personal human-energy which can be combined with a variety of other sources like the heat from an electric "crystal-healing rock" into the integrated technology network interactively, & which through this systems application kinesthetically, is already in the preliminary phases of creating a future advanced energy transformation process.

This can be converted into pure free energy supplies generated from human-motion & channeled into a photon-converter to power a supply of energy for systems use, in the same way in today's society we power even whole cities and countries.

This also includes, a application in the future, where road-ways, motor-vehicles and global transportation routes are applied to this technique in a future fossil-fuel free design, that will be virtually resistant to road-accidents and road-deaths ^ because of this

"whole of system" approach.

This energy transformation operates through converting electron- photon & magnetized energy particles into energy outputs, & which will provide supreme road-traffic control & stability; as well as, being a clean & abundant energy source, that can be constantly resupplied, freely, but sold commercially & optimized through my patent method design.

This same strategy discussed in "smart clothing" technology is expected to include

At the point of impact the nano-thread in the fabric would trigger off an alert system, from the accident victims clothing, and nano- science application to "smart-clothing" worn at the time of an unfortunate motor-vehicle accident.

This will aid the rescuers & emergency staff, with more advanced rapid-warning systems, than what was possible before, as the critical data, will be transmitted, directly on impact, to Hospital Computer Systems, providing almost immediate access to the patients condition, directly from the accident site, either through the smart- clothing technology, or a motor-vehicle adaptation to this concept

This will provide critical information regarding, the accident location, patients vital signs, the time of the accident, etc. & integration with Global Positioning Satellite Technology & my systems unification & an integration with Hospital Databases around the World.

is aimed at building future housing with nano-science level security devices, initially targeted towards covert efforts to assist with "crimes within the family home" including application of motion-sensor detectors & micro-chip based stress indicators, to household appliances.

This could include applications like a smoke alarm, household security systems, or even with the bricks and mortar, itself of a new house, through a "smart-brick" design allowing liquid nano-chip technology to be mixed with brickworks & brick-makers.

This would be designed to stop child-abuse, domestic violence, dangerous and violent hidden behavior that occurs within the family home & which would be integrated into my system and partnerships with Police Specialist Units and other Security Focused authorized stake-holders.

Such a smart-brick design, would also need to be complimented with special devices in each new house, with this application that allows distance measurement & energy vibration to occur from the signal reader in the new brick technology and which if certain conditions occur, sets off warning devices, or in-home safety & security measures.

For example, if a certain aggressive decibel is activated & sound- linked, and the increased risk of violence in the home is suspected, or an aggressive or dangerous motion between children in the household & the adults in the house, an alarm should be triggered off, that is wired up to the integrated system, the global network, residential addresses & which should be regulated through private security companies in partnership with the company in the future & police departments worldwide.

zϊnMϊsm this invention is aimed at inserting an adaptation to anti-counterfeiting security devices through my creation of sound- integrated holographic micro-tracing technology to paper money & credit cards. This would be aimed at providing an additional highly advanced levels on security tracking to reduce criminal conduct, through the capacity to add sound-devices to money which can provide the following benefits;

Due to the hypersensitive developments of the business multifunctional, integrated & interactive, multiple-media applications, once combined with Police Databases and consolidated internationally, the additional sound-device adaptation to cash & money hologram micro-tracers, will provide another level of tracking & security options in finances. This will mean crime prevention can still be pursued with financial exchanges that occur on a cash-in-hand basis outside of normal electronic or banking recorded systems.

This would be expected to be integrated with "Electronic Data Interchange" systems, through an EDI application to designing a micro-tracer for paper money & plastic bank card & id holograms & the use of kinegrams on cash designs for moneymakers & identity cards & adapted to a sound-device integrated application to be compatible with the patent embodiment.

By adding this hyper-sensitive sound device to the making of money and electronic/plastic cards, this can also assist with training police dogs and customs dogs who have more advanced sensory capacity than humans in anti-crime and pro-security applications, through heightened sound-training strategies with these working dogs and the systems method.

A KINEGRAM is defined as - "a security device for bank notes with specially produced, silver-lustrous metallised foil, in the shape of a crescent. A kineqram image is formed by fine lines of different thickness and shape. As the angle of the light changes, the image of kineqram also changes, producing the effect of a moving picture".

The integrated systems design with this additional application will help eliminate identity theft, counterfeiting & funding criminal activities & would require the additional sound-based security device.

Musical money can also amplify success principals regarding "attraction of wealth" through energetic, kinetic & akashrick integration, which being vibration-based & musically sound linked, can optimize more "universally accessible" applications to correct energy flow & the need in the world of the living, to be dependent on money & cash.

This added security device will hopefully help to minimalize "old world wealth extortion" by today's rich and powerful hoarders of world wealth, who are mostly abusive & greedy, systems manipulators. Instead of this, in the New World the aim would be to try & reopen prosperity to harmonious & honest vibrations, emanating from better quality people and more ethically based vibrations, that are morally generated and that subliminally link, to these subtle sound-tone market connections, hopefully creating a positive karmic link between moral conduct and money through this subtle energy channel.

The final advantage of this device application, provides a "energy conduit" to transform cash & paper money, into even more abundance, both symbolic & real, through the capacity to allow hyper-sensitive sound-devices to facilitate meditation & principals of alchemy, & mysticism & magical money to cash & wealth, in a manner that expands beyond the world of rationally, and numerically based economic principals. Through integration with my systems design this provides a level of accountability for the past seeming "intangible & metaphysical domains", which through symbolic electron- photon, (human-signals technology interaction), and transformation, is amazingly, becoming increasingly tangible.

This process is also aimed to facilitate the capacity to transform current "science-fiction currencies" like star-trek economies into a whole of intergalactic economy of the future.

This will be integrated with all systems eventually, it make all systems visibly accountable & can be transformed from fiction & symbolism, through the human-signals programming of technical systems, into a stream-lined future economic intergalactic fact.

It is the discretion of the inventor providing the essential Method that has built the interactive sensory-sensitive technology infrastructure and the inventor who can continue to build on and expand this new infrastructure for this process to occur in a real, but still accountable, & more responsible, future universe.

In addition, this application is expected to have a Fairy Goddess "Symbolic" Bottle Cap component which when combined in this way, can allow the alchemical transformation of Magic Trash to Treasure to occur with a little bit of help from sound-based kinegram technology applications to money.

The integrated global systems synergy flow, like circadian rhythms, can be easily harmonized like a symphony orchestra in the inventors Method of Application of this particular embodiment. - This innovative technology is based on the sound- program concept put together by the USA-Center Point Research ® which promotes the Holosync Program © and has been used to inspire this idea.

This would include an adaptation to allow subliminal, sound-wave meditation techniques to be applied either to a pillow, or pillow-slip fabric through the "smart-clothing" device with the sound-wave programming application to allow people to resolve their personal problems, or reprogram themselves to achieve their own individual goals subliminally, while they sleep.

This would also then be synchronized with the Musical Money Invention down the track & again would be harmonized through subtle sound-tones in my integrated multimedia systems design & application. Such technology applications must be regulated through my systems design to avoid & prevent "mental abuse" & any potential mismanagement of "human-free thought" processes.

• This smart pillow invention can be fine-tuned according to each interactive multimedia model, through adding an additional apparatus, like

In the future this can provide microchip, audible filter applications to a Head Phone,(either in a novelty format or conventional style for awake-time usage), to allow each individual to control and regulate the interactive communication signals that emanate from their own brain, into the inventors system without becoming "mind controlled or mentally exploited themselves".

• This is aimed at ensuring important safeguards around human intellectual rights are maintained.

• This then can be worn when customers, or systems- users, are utilizing the adaptation of the systems design to their own computers, television, stereo, mobile & home phones,etc.(or in fact any electronic device they access in their own environment), which helps to protect free-thought & prevent mental abuse of the system.

• It would be envisaged that a Head Phone device would not be needed to be worn all the time by customers and users, only when particularly sensitive information was involved in the use of a commercialized application of "interactive & integrated multimedia modules".

The embodiment of this sub-category device, would require the headset as the hardware component, and the integration of a specially adapted microchip technology with audible filters that are networked through soundwave bandwidth regulation, with the patent method. Applications like these ones, may provide potential corporate mergers or partnerships between the inventors Method and Neuroscientists for example.

The audible filters would provide the essential software adaptation to this device. The Headphone Audible Filters would also need to be adaptable to the human-signals technology conversion methods in the integrated global network, allowing individual users to be safeguarded intellectually with the human-signals application and prevent threats of mental abuse.

It is also aimed at preventing telepathic intrusion, which systems users can use as they required to help censor selective "mentally based brain-wave applications".

In order to receive or project, a human-signals application as a communication transmission that is "thought-driven", to an individual message recipient, the Head Phone Device, could also be complimented with people who buy wrist-watches or other appliances, like mobile phones that have a "small flashing light device" or vibration alert system etc. to advise when an incoming 'thought-projected' message is wanted to be sent to a selective individual independent of the integrated multimedia technical modules.

Without adding a device embodiment like a Head Phone, or special microchip to the method, the human-signals applications of the invention are difficult to control and difficult to prevent abuse of the system by those who already know how to exploit this process. To determine exactly what technology adaptation to the Method is required, will need further research and cooperative developmental partnerships.

While the above embodiment is important as a protective application to the system, it would be expected to still be only optional. This also will mean that, a person to person transmission and communication by "thought-processes", could effectively take place independent of even the telephone, computer systems, & television whether integrated or not, through just human-signals "natural audible transmissions" and at the very advanced stages would not require any technology at all.

This would also include thought projections/patterns from one intelligent brain to another, but by applying the filtering technology of choice, (whether a Head-Phone, a microchip implant device etc), to help focus and direct the communication signals in this patent method application so it is not "just random".

Ultimately the goal over time would be to evolve the interactive system world-wide to allow all systems users to be "device free" in their application of the invented Method, as is the case with the original inventor, who mostly utilizes the "interactive television method" without head-phones, directly through this bi-directional technology as the preferred appliance of choice. Others may find the same "Method" being utilized in computing technology their own individual preference.

At the device-free application, the control and effectiveness of the system then relies on very advanced communication methods depending on the transmissions being filtered at the giant "supercomputer" processing level like in Diagram 8/8, Section 5B.

This would ensure users could channel selective thoughts and human-signals to a transmission receiving point, without unwanted telepathic cheats tapping in illegally violating free-thought and freedom of communication rights and also help to safeguard against the wrong recipient receiving or "tapping into messages" illegally. Such matters are considered to be critical core first new business for the transformation of the lntergalactic Federation, utilizing the Inventors METHOD, from Science Fiction to FACT.

In the case of a alert-activated human-signals communication device, once a recipient receives a notification of an incoming "thought message", through a ring tone vibration, or wrist-watch flashing light for example, that an incoming "thought-based" message is being attempted to be projected telepathically or kinetically, the recipient could then ensure they put on a compatible Head Phone Device themselves to prevent the thought-violations from unwanted listeners getting through, from unwanted eavesdropping devices, as one application of a safeguard of advancements in the METHOD.

The Audible Filters, either at this device level, or with global Echelon Super-Computer Cooperation and future development, at the face of these systems filter giant computer hardware level, would stop "thought violations", in the method of centralization and management of these advanced communication levels.

This can be adapted in the future to the systems infrastructure and evolve over time from the original patent claim current basic METHOD. This is particularly important for securing confidential "mind-linked conversations" in regards to secret or classified information, like in 'thought-field weaponry application', which is also part of the unique design & an embodiment in the patent claim, and which is relevant to important defense applications.

On the broader macro-systems level, this advanced communications filtering and safe-guarding of the commercialization of the METHOD through systems integration with Allied Defense Department Technologies and trusted Security Sources to assist with filtering sensitive information pertaining to "classified information" and would need to incorporate greater global cooperation regarding satellite systems etc. over time.

It would be expected over time, to also expand to advanced non-human technologies like communication methods with some "alien" life forms collaborating with humans as well, or even "artificially intelligent entities". The expansion of the METHOD to such future contacts and intergalactic markets becoming 'accepted' as true, rather than sci-fi, would be expected to be incorporated in the natural evolution of this commercial development.

For those systems applications seeking even more personal control in the sub-liminal ψ sleep-cycle application, or for those working in a contained environment, who want to be freed of the inconvenience of the head-phone application, this audible-filter safety device can also be, adapted to other technology, including as an example, a wearable badge,(subject to R&D), to allow individual adjustments to be fine-tined according to each users needs.

Such developments would see the birth of the "Star Trek" communication devices becoming real for the first time in history, but applied on a more advanced "thought processing" level, as well as the conventional sound applications of the human-signals method.

This could be applied while systems users are asleep or awake, (especially when obviously wearing a headphone filter, is not practical or not desired).

The added audible safety features can be applied through the integrated adaptation of the inventors "whole of world system" to other devices, like users computers, stereos, ipods, MP3Players, even bedside clock radios, Musical-DVD players, etc.

This will help systems users to have more control over signals going in and out of their environment at this hyper-sensitive level of communications.

Safeguards can be adapted in this way, at the level of each, or any, one of the technical device of choice for systems future development to keep users "wireless" and maximize user freedom of movement and convenience.

By adding audible filter adaptations to other devices in a users environment, the integration of each users "multimedia interactive module", can also be more fine tuned with hyper-sensitive, high-powered satellite technology to help protect the transmission signals in this Method, both by individual users, as well as, for the overall system, & the collective sound-wave and more diverse "human-signals" applications.

Future commercialization to the broader mass market in the expanding the invention embodiments to any other technologies, devices and industries whether it is the entertainment industry or the music world, etc. will help customers to retain personal control in this process and preserve individual "creative works" of other artists and inventors, getting to the core of the very essence of "freedom of thought" rights and future needs for systems safe-guards in these advancing developments.

Through a patent monopoly, the overall system centralization and regulation of the "human-signals interactive technology method" whether as sound-wave & thought-wave communication strategies can, through the Methods Adaptation to Technology, provide systems safety, & filtering of information, coming into or out of, a particular environmental integrated multimedia domain.

In this way, all signals and all forms of communication can be "converted digitally as information",(see the Engineers Report, Appendix 2, page 4 of this report).

At this stage, the information is integrated with the same pre-existing global "super-computer surveillance technology", like the Pine GAP facility in Alice Springs for information processing.

Through systems users having these options, of adding additional "special filter appliances" themselves to devices & product usage of their choice, this can give systems-users added protection and developmental options in a more empowered manner, rather than the public being victimized by a "big brother society".

This can be both, for an awakened alert state of conscious awareness when they are operating in integrated multimedia modulated domains, as well as, even in the deeper domains of the human mental faculties on the sub-conscious level in human normal sleep cycles.

- The same concept of applying human signals adaptations to "smart-chip technology" and babies equipment & household safety devices like smoke alarms, children's clothing etc, can have multiple applications like; Integration with my systems design and commercial partnership with Policing Networks,

Commercial Security Companies, Fire Departments etc.

This would be aimed at providing both safety features, and motion detection possibilities to ensure child safety & local community protection in individual households.

The risks of child-abuse dangers will be monitored and prevented through systems integrated and innovative design & the application to the overall business invention applied for in this claim will be converged with Police Databases & Law Enforcing Operations & Functions.

The commercial enterprise & other specialist areas like Government Child Protection Departments would be incorporated in this application, particularly with motion detection sensors and technology integration allowing measurement and monitoring of degrees of "distress".

This will occur through the systems integration and will ensure strict safeguards to prevent information and systems abuse can be enforceable and controlled. In this particular embodiment, this will be particularly relevant in respects to integrating surveillance satellite systems with Police Departments and other security and community safety applications.

The commercial operations to "sensitive information" will require "special cooperation and selective systems access" before the systems adaptation to existing Public Service Infrastructure for example could be applied. Standardizing "access protocols" across the entire spectrum of the Method to any systems and then this being streamlined, nationally, internationally and intergalactically, helps to provide essential uniformity in the expansive application of the METHOD to the changing infrastructure and new professional standards for METHOD OF OPERATION, or Modus Operand i. - In addition, like the smart- pillow technology for adults, applications of a similar device can be applied in this way to children's education, psychological health & well-being by providing subliminal undertones in smart-technology & baby equipment and through this embodiment method, could be applied to many different target market products.

Adaptation of the METHOD to other technology & to these such product applications would be aimed at sending subtle messages to young infants, babies & toddlers, for learning or child-development purposes, like learning to speak, learning basic languages, learning to count, and nurturing relaxing tones & sounds to help children become less agitated, irritated, less stressed & more calm & healthier in their development phases, resulting in hopefully happier & safer babies.

This sub-category of the over-all invention includes the additional adaptation of the conceptual technology applied in "star trek" like the transporter beam a cup of coffee, which they apply on their science-fiction spaceships. Many of the copyright ideas in this series can be adapted to the inventors METHOD in the real world.

In a conversion to integration & interactive method in the systems design, this same principal would be applied through eventual consolidation of food & retail suppliers becoming part of my integrated & interactive multimedia network, which in addition to being able to shop from home in a dynamic integrated systems design, through these systems application, multiple-functions of the inventive method will be possible, in the evolving technology & macro-level redesign.

This will mean that eventually with integration of other technology like permeable-plasma television screens, mini-star gate adaptations, virtual reality technology etc, the commercial & personal application for the public, can be used actually by the mass-open marketplace, to transport food & essential supplies, directly to individual households & locations using this patent additional application. The technology around such an embodiment would initially become part of technical research & application in future systems development.

This integrated method would also be perfectly compatible with today's computer-software adapted refrigerators, that could in the future, allow the current mini-stock-take software function, to be integrated from the house, directly to supermarket retailers and provide even more opportunity for other functions to be adapted for system-user benefits and be part of the same overall infrastructure provide multiple advantages and benefits to both suppliers and users.

This will include applications like, human-signals adapted interactive electronic ordering & re-supply lines for food production directly from integrated multimedia modules. This may include the delivery component coming from this new integrated TV-conversion into a transporter-beam adaptation to global macro-systems, & integration with interactively centralized multimedia economies and electronic banking facilities that are compatible with the whole-of-house, or whole-of-micro-level systems, interactive application, through the integrated Method.

This should rightfully belong to the inventors market niche and streamlined with centralized human-signals configuration for users & multiple-device application.

This would still occur according to customers and systems users, applying their own choice of devices and electronic appliances, with the additional adaptation to the patent design function allowing the integrated and interactive method in each micro-module to operate.

In addition, this will be designed to allow customers and users to adapt the prototype integrated and interactive micro-modules in their own way, according to their unique needs, while the broader global macro-structure remains regulated and streamlined through the overall patent monopoly and partnerships with other organizations and the cross over in integrated technology hardware and networked software systems to Broader Government & International Functions from one country to another and eventually even beyond to future, intergalactic markets.

As such, starting at the systems user micro-module level, this will be much more than just adapting to the in-home shopping on-line shift, already in the market through computers & the Internet, as in the future, this will mean that even leaving the house to go food shopping, or arranging a delivery person, will become non-essential. A kind of adaptation of the 'Comic Jetsons Era' would have then arrived.

The systems integration & adaptation to interactive multimedia technology would essentially mean, that for this method to be possible & available to the open marketplace, all households, would need to be integrated and centralized with the networked patent Method, as well as, with the industry sector like retail & shopping & other commercial suppliers, that would need to be officially compatible & merged into the broader global systems through the patent design and application.

Additional benefits of this embodiment will also include, supplying remote & disadvantaged, or isolated communities much easier, and again significantly reduce transportation costs, travel time etc. For the retailers & suppliers, this also provides huge marketing & advertising & promotional benefits, such as computer-television based integrated systems with software applications to other technical devices & databases linked to retailers, through the macro- systems design, which will allow individual customer buying habits & shopping needs to be intimately recorded electronically & tracked, and which assists significantly with, targeted marketing, advertising and supply & demand commerce issues.

It would be expected that this application could also be applied to giant wall size technology as well, which allows a virtual game & electronic simulator-recreational dimension, to be added to this hi- tech permeable application, which would provide both, the practical shopping supply options, as well as, leisure activity functions directly to home owners & customers.

Such systems must be critically centralized, especially for security purposes, as well as to ensure effective systems management.

It would also be expected that such an application of technology to these television adaptations in the future, will also extend to working the other-way, where the home-owner can walk into virtual domains straight from their house, like a home-based star-gate to experience fantasy recreational domains in person, rather than just watching 3D special effects, or fiddling with hand-held game consoles, as is the case in today's applications.

This essentially means that the process of passing objects through the future-television screen adaptations also becomes bi-directional, or multi-directional and not just, a one-way goods & services delivery or information only conduit, to the house/office or a specific location, and has the added bi-directional options of adaptation to recreational simulators & life-size electronic games application in evolving new software into the inventors method.,

In this case, users could actually walk right into the virtual domain from their house TV-integrated multimedia virtual reality application to a giant life-size integrated television screen, with the penetrable design in the future, or adapt holographic and 3D technology for multiple-purposes like the representation baseline in Diagram 15/2 and 15/3, Section 5B.

These new electronic permeable-virtual port-holes, must be centralized and regulated through the patent claim as a commercial enterprise to guarantee systems safety and prevent abuse of such developments and applications and prevention of any potential security threats. This adaptation of the system would mean an expansion of the original invention & design being applied to any Government Departments Administrative Organizations, hence the reason for the claim being international and in the future expected to become intergalactic.

It would include any other relevant processing networks like the private sector & small, medium or big business operations, to allow direct "interactive systems options" to be adapted from home or office environments, or workplace, to the integrated interactive human-signals systems, & multimedia, (multiple-devices) application directly to, Government or, Commercial Computer Systems & Databases improving speed, efficiency, costs, and provides a rapid, effective paper-free method for exchanging official information in a technical visual-format that can be conveyed directly to Organizations between themselves and their customer base, or the public.

This means that, for other systems users of the invention, they would then have the option of providing visually based technology applications & systems administration straight from interactive television & other integrated technology, to organizations or departments directly from their own micro-module integrated units. This provides maximum customer convenience.

As an example, IP Australia, which through integration with their Computer Databases & the systems design in at-home interactive Television-Computer mergers, be able to in the future adapt visually- based technology like videos, digital film etc. to their application procedures and an integration with the inventors method.

This could then be submitted to meet their Organization requirements in this new visual format through a "integrated and interactive approach" and adaptation to the inventors method and supercede the limitations of the 'written documentation only method'. This would be completely paperless and not even require electronic documents, like in today's computer online Internet applications. S

The bi-directional origin of visually based technology that in the inventors Method is always centralized and adapted through her human-signals Interactive Television Development, can be integrated and networked from this television based programming technique.

From here with the aid of fiber-optic cables, the patent system expands into computer networks and can be consolidated directly into the inventors globally transformed integrated interactive human signals infrastructure, which for the inventor utilizes the Television Interactively as the centralizing core of the systems development. This can be applied to any Databases, and any Organization or Department, or Facility, or systems application and location of choice.

This Method transforms the human-signals interactive bi-directional application to the integration method into the broader societal infrastructure. In this additional way, it is this invention in the Novell application of integrated & interactive multimedia method and human- signals modus operandi, that can make this possible.

This can also incorporate individual users applying their digital camera, or web-camera technology, or other such devices etc. to this integrated method.

This would shift to making bureaucracy a process that is technically visually based, rather than administration being in only a documented form, whether it is electronic computer-based documents or not, through the bi-directional television application, accelerates the speed of processing systems significantly.

This may mean that bureaucratic paperwork in the future becomes a redundant process, and may even eliminate the need for electronic documents, currently utilized over the computer and Internet altogether, since the integrated and interactive method, allows the information to be conveyed in a visual visible film-like format, with bi-directional systems adaptations, that can be sent directly from the micro-module user integrated user level, to relevant organizations and departments for administrative & processing purposes. Of course this can be expanded to the multi-directional and multifunctional applications.

The interactive-visual technology and high-speed human signals operation alternatives, mean that future systems being networked with these integrated multimedia micro-modules, that are essentially a duplicate model and expansion of the original prototype invention.

This can also become part of the Franchised Model sold as a Blue- Print Business Design, to be promoted & marketed later on, to the public at the systems microcosm level, while remaining part of the inventors overall macro-level systems interactive and human-signals management Method. This will provide opportunities for other buyers, wanting their own self-employment options or franchise potentials, and provides additional choices to being, not just a customer, in the patent method, systems user-application and expands the wealth creation opportunities for others as a legitimately emerging new market domain.

The interactive & integrated network, could also be adapted to Police Reporting, Ticket Booking Systems, Air-Port Bookings & Tourism & Travel Agencies, for example, and pretty much any other Organizational Applications whether for; government, nongovernment, or private companies, that require less-formal processing from their contact with the public and/or their customer base for purchasing, communicating, or reporting purposes.

It would also be aimed at allowing visually interlinked bi-directional technology opportunities between these organizations and their dealings with the public & their customers. By being streamlined & unified into the same one-world configured human-signals interactive system, integrated with multimedia, (multiple- technologies) efficiency, on both the micro-module level and the global macro-systems level. This method can ensure that security can be optimized, which is critical to retaining infrastructure stability & systems integrity.

This face to face contact between organizations & customers through the integrated bi-directional multimedia technology, can make the process of systems administration in any organization, more personal, where the clients can see the face, of the front-line staff and employees, through this method and is an attractive feature of future applications of the Inventive Method.

All the data-entry issues can then still take place at the organizational level through the staff & employees, who, in bidirectional communication devices & multimedia integrated applications being networked into the interactive global system, can also see the customers as well, but still can add the computer-data at their organization level to ensure relevant details are recorded in their own internal systems and confidentiality is maintained.

By expanding this 2-way visual communication process into additional service delivery areas in other industries and organizations, beyond just a home, or office application, this method can even be used for bi-directional systems contact between prison inmates B & their relatives, or, ® military personnel working away from home, on ships, in foreign countries, as examples etc, & helps communities to stay connected, on a more visually based communication level, but with essential systems control being maintained and safety factors being maximized.

This allows important regulation of the system, where security issues are relevant, before any multi-directional or multi-functional applications are applied, and where access needs to be limited in high-risk or secured areas.

- This invention (while applied to a product outside of the integrated micro-modules); is aimed at providing an automated pram function.

This would be similar to the bi-directional film-recorded operations in the prototype inventors house, which allows research & development; & innovation, to thrive, in a safe, industry-focused environment.

As such, in conclusion, approval and protection is sought commercially for the Patent Claims Specified under the title:

Please note that the nature of the inventive design, is dynamic, portable & constantly adapting to current conditions daily. As such, beyond the general methodological framework, the invention provides scope for ongoing constant works in progress to allow consistent refined improvements, upgrades, and adjustments & adaptations to the current, or changing situation.

• As an embodiment it can be applied to many other devices like commuter scooters, shopping trolleys etc and integrated also with the main method infrastructure.

In this pram application for example, it would mean that for busy mothers with their hands full, juggling carrying kids, shopping, handbags & trying to be the super-moms everyone expects, that the additional carrying load, of pushing a baby pram, can be made easier through becoming automated, instead of effort-based with pure- mother muscle power.

• This would probably incorporate a stand-alone battery-cell adapted to a Baby Pram and redesigned through an engineer, to provide an electronic, or solar powered, or some other kind of energy route to the Baby Pram application, so the small motor does the "pushing work" for mothers & saves on physical energy, but at this energy supply source level, becomes part of the inventors "Method", distinct from stand alone device application.

This could be applied to either single prams, or carrying twins or triplets, or siblings, which for the bigger load, that would make the convenience even greater.

To incorporate this invention in this application as a sub-category, the related components would include the additional opportunity to add GPS devices, with security tracking functions, & integration to the same home-based business model & my partnership with Police, Security Companies, and other stakeholders responsible for community safety. The designed motor could be similar to the "commuter-scooter" invention, © but with a Babies Pram adaptation to the engineering to provide parents with some relief in "pushing prams".

This should also be included in this invention claim because such an idea, would be expected to be developed and improved with added features over time, like adding mobile-phone multimedia applications to an electronic panel on the pram handle.

This can allow quick human-signals options for mothers or parents on the move, like hands-free voice activation & can be configured with the integrated shopping option developments, electronic information directories & maps, as well as emergency & security options.

This could be useful as an example, if mums with babies, are in crisis and need to quickly contact authorities for help, which would, as a "integrated device" become part of the same broader macro- systems infrastructure design, allowing all these functions to be possible.

In the future, this may also have other additional applications that keep adapting, like adding a health gadget that can read walking distance, & fat-burning conversions, as an example, as some mums like to exercise with their babies in their prams, & they take their offspring with them on their daily exercise schedule.

The new adaptations overtime of the overall patent method are literally limitless and are expected to keep changing, improving and shifting in the market place over time.

These are just a few applications that would be developed over a period in the future, but that are still "linked to this same core patent framework" as in stand-alone baby-pram portable units that are human-signals integrated-systems. Chi-5") compatible, with the patent macro-system designed method, the inventors 5 main trademarks goods and services categories and would incorporate the additional features with such automated features & electronic functions and new developments.

Summary

While the objective of this patent is to obtain approval for the overall infrastructure design that has been created through this METHOD invention, the additional sub-categories, have also been included, as they would be considered to still come under the lodged title of the overall claim as a umbrella patent, protecting the embodiments. It is expected that the many other patents' that are within the main frame-work of this patent claim, could still retain ongoing intellectual protection, in its relativity to this original patent claim and the prototype design.

In addition, in the application of this invention, it is desired that through this method, the interactive & integrated visual and audio bi-directional functions can also be utilized, to both show & discuss, many different, other inventions & novell ideas, that have emanated within this patent claim module from the inventor, that provides investors, buyers and other interested parties, & in the future, franchisees (who will also be able to purchase this model), the opportunity, to duplicate this commercialized mode of operations & application, in a confidential and protected forum.

In the Yellow & Green sections in this patent claim document, these sub- categories would be expected to be included as "additional embodiments", associated with the overall patentability claim." It is hoped that such embodiments can be initiated, explored, & developed through this original prototype patent micro-system module in a manner that allows these additional "new ideas" within the context of the home-business based interactive & integrated model, to be assessed commecially by investors for example and protected in this patent process, (except for those issues needing to be retrieved because of the criminal commercial factors, which need to be pursued as evidence for future legal proceedings).

Once this also, is franchised as a business-method that can be replicated & sold, the same protection would need to be extended to investors and buyers at the micro-module duplicated integrated multimedia, (or multiple- devices), interactive method, replicating the method as a Franchise or Model for commercial operation.

For bigger customers on a Departmental or Organizational Level, or National & International Systems Level, the macro-structure inventive method through the patent monopoly, will allow the inventor to provide the essential safeguards to clients through the actual network integration and adaptation to interactive multimedia technology.

It is expected that through this patent claim, potential viewers, like investors & interested stakeholders, can view demo-samples, of the interactive work, straight from the house-based model method, in this interactive, bi-directional, visual format, without jeopardizing patentability & uniqueness, for any additional endeavors, innovations & inventions, that arise from this working systems model. This could also be done ideally from television studios straight to the inventors home interactively.

It is designed through this patent claim as totally being FOR, commercialized & profitable purposes with an integrated technical advanced additional applications aimed at establishing the enlightened business age and unifying world systems under the inventors interactive and integrated human-signals Method.

The outstanding film archives from the past works of the inventor are also expected to be incorporated into this claim and become part of legal process due to the long backlog of recorded previous works that was hidden under a state of chronic government, medical, political, & corporate oppression.

Within the realms of human-signals and technology interactive energy conversion, & the application to technology, Cyberspace & multimedia networks & devices, including especially, television networks, computer networks & satellite systems, the energy generated from voice- driven/sound driven, brain-wave driven & kinetically applied interactively & integrated techniques to systems design & operations, the METHOD is never fixed or stagnant, as an invention and constantly changes to keep adapting with the external applications.

By being a systems design & methodological application in this context, the integrated technical synergy, moves in-sync with the inventors creation and our hi-tech world and has been an exponentially expansive process that emanated from the home-based patent module.

It provides a "liquid" business model with extreme flexibility & easy application to ongoing works in progress & developmental changes in a high-speed world through this sound-wave, brain-wave & kinetic process & integrated and interactive invention & method. It has also been designed to establish the foundations for a truly commercialized intergalactic future, allowing such expansion & application to occur with ease.

It is expected that this will, through the invention & systems design, provide essential infrastructure to ensure in future business developments with "other world" systems, & real intergalactic partnerships, with business operations from earth & beyond, that the functionality, accountability, sustainability of the invented method & systems integrity & compatibility can be both, expanded & managed responsibly, in a universal application over time.

(Section 5A) DIAGRAM INDEX

Diagram 1 - Room Layout - (Integrated Pathways) (Micro-module

Prototype)

Diagram 2 - Human Energy Wave (Sound Wave & Human Signals

Application)

Diagram 3 - Surveillance and Concealed Devices

Diagram 4 - Surveillance (2) - Network Connections

Diagram 5 - Bi-Directional TV Modification to Conventional Television

Diagram 6 - Covert Surveillance Operation Setup

Diagram 7 - UKUSA Echelon Alliance

Diagram 8 - Global Surveillance Infrastructure (Macro-module)

Diagram 9 - Australian & (US Echelon) Fibre-Optic Surveillance Network

Diagram 10 - Interactive Cinema Application & Sample Macro-Systems

Integration

Diagram 11 - Bi-Directional Television Hardware

Diagram 12 - Residential Programming Locations and Human Signals

Interaction

Diagram 13 - Interactive Neuroscience Application and Visualization

Diagram 14 - Mining Application

Diagram 15 - Defence Application

Diagram 16A - Duplication Example A (Interactive & Integrated Office) Diagram 16B - Duplicated Example B (Interactive Human Signals Adaptation to An Airbus - Demonstration Portability Model).

(Section 5B)

See Following Diagrams 1-16B.

(Section 5C) DESCRIPTION OF THE DIAGRAMS

Diagram 1

(1/1 - 1/15) Numbered items show how the initial micro-module prototype

"integrated lounge-room" was used to establish real hardware connections to integrated pathways using the claimants method and knowledge of the

"hidden Echelon camera's" as a programming and systems engineering tool.

Diagram 2

(1/13) The red lines from the White-board to the computer and the television, show how the knowledge of the "hidden camera's" and 2-way fibre-optic technology feeding into Echelon behind and through all the electronic and technology based devices, and networks, both Military and Civilian, was taken advantage of as a interactive and integrated teaching forum through the suspected "captive audience" attached to the surveillance networks in secret.

(1/3. 1/4 and 1/8) Provides a graphical representation of some sample devices that can be integrated through the invented method and that provide additional input, beyond just human programming signals, like using music to synchronize the system calibration, and the air-conditioner to provide a mechanized temperature sensitive application, which is combined both with real device remote control adjustments and from the preexisting appliance specifications and then integrated with the sound programmed connections to the weather channel on television for example.

The consulted Engineers have confirmed that radio waves can be transmitters and receivers of communication signals, providing an additional method for 2-way communications linked to technology, including home appliances, in addition to the Fibre-Optic Network, but on a audio basis only.

The global surveillance communities use of eavesdropping through radio- waves, is stated by Mr Michael Williams in his report dated 29th August 2008,(see Appendix 2), as radio being "an inherently two-way communications technology".

In this he confirms that "audio surveillance can take place remotely, without the need to tamper physically with a location of interest". This independent expert comment confirmed the suspicions of the inventor that such illegal tapping can and does occur.

Any musical audio devices, can also be adapted to the "interactive system", particularly the Smartmedia instruments that allow networking to interface with the rest of the system. The radio/CD player can be plugged into the television, allowing both a CD Programming Component and musical aspect to be integrated.

Diagram 1 shows this multi-functional and multiple-device application to demonstrate how bi-directional surveillance "infrastructure" was integrated into a unified interactive system using the lounge-room prototype. For commercial purposes, the inventor has tried to simplify this in terminology, by referring to this conceptual model as "multimedia", but in this context is different from how such terms are used conventionally to describe a single device, with multiple functions.

It must be noted that any new technology that can be added to this method application and its adaptation to any technique is now, after 15yrs of long term development of sound programming, the two-way surveillance pathways, has expanded the Echelon Network from its original fax, phone and computer tracking and tapping capacity, to incorporate any literally any electronic _device,(like digital cameras, as well as television), which has evolved as globally converged entity largely, as a direct result of the long term hidden "sound-programming" method of the inventor, and those systems adapted illegally around this.

While little is publicly understood about Echelon, and unlawful bidirectional technology, and the Corporate Sector have tried to shield this reality, by "adding market devices", (like web cameras), on top of the preexisting infrastructure, the reality is, that the global surveillance systems are a permanent fixture that can intercept technology anywhere in the world, anytime, including in the home of unsuspecting civilians.

Diagram 2

This picture is aimed at showing how once the "interactive pathways" were created and unified into the one lounge-room prototype, the sound programming method, was then viable as a systems addition, which is the main method used by the inventor, to build the interactive network. Ironically, the illegal intercepting of the inventors method and the adaptation of systems and hardware around this process, resulted in far greater advancements than ever anticipated, including the broader application of "human signals" interaction with technology, as defined in Section 3 of the Patent Claims.

This has also allowed the development of more advanced applications, like brainwave and kinetic techniques to thrive, beyond the long term and quite tedious task of "daily sound programming".

While these more intangible components are difficult to demonstrate conventionally, the bi-directional archives of the inventors long term work, captured on visual systems associated in all probability with the NSA in America, would fill in the historical pieces around understanding this development and evolution that took place in secret between the inventor and her early knowledge of the bi-directional surveillance systems.

As this process is mostly affiliated with the upper ranks of secret services, it is not reasonable to expect normal civilian engineers to have a solid understanding of this process which would be classified in content, and off limits to the civilian sector. As such, while the Engineer has substantiated that television technology is and can be modified for two-way operations, the experience of the inventor, has shown, that this process occurred naturally within the existing conventional television technology many years ago, and did not require a cable TV network to operate.

This is obvious to the "sound programmer" who has seen the results of her audio engineering of the systems, which occurred in isolation, and were still bi-directional even though the majority of this 15yr period

involved Free2Air Television Systems, rather than Foxtel or a paid cable network.

The devices identified and explained by the Engineer, (see report Appendix 2), as two-way communication technologies that are part of the global surveillance infrastructure and associated with the inventors prototype model, are; a) Audio Only:

• The radio/CD player and Smartmedia keyboard player

• The landline telephone b) Visually & Audio Based:

• The Computer and Internet

• The mobile cellular phone

• The television, whether it be free television or cable, and this can be any TV and computer network in the world. c) Brainwave Signals Only:

• Modern Home-Fax Machines, inbuilt with the Ethernet and Blue Tooth Capacity are suspected to be receptive only to subtle brainwaves

and satellite interceptors and the standard Echelon phone line tracking systems.

At the users end, unlike the television and computer, the modern multi-functional fax machines are believed at this stage to NOT contain the hardware that would allow either a visual or audio interactive operation to occur, and therefore being only brainwave interfaced, is literally invisible to the naked eye.

• However, it is probable that, while the human user cannot be seen yet through this device, the paper-based information, transformed into a digital signal is traceable through these same surveillance networks, that have advanced since the Post Cold-War Era.

• The empirical evidence to support the inventors observation of the correlating impact of the inventors 'silent' brain work interactive applications, is evident in the association between her systems symmetry and corporate developments like Hewlett Packards PhotoSmart Fax Machine and the Macquarie Bank Systems, which correlate to the inventors application of "energy rings" projected interactively with technology. Diagram 3

The image provides substantiation of the inventors empirical experience being supported by Engineering Facts, since the attached Consultants Report in Appendix 2, provides an explanation of intercepting technology being truly hardware based and therefore totally provable.

Diagram 4

(4/1 - 4/6) Demonstrates a home technology appliance sample of some of the electronic devices that are now readily understood to be part of the broader global communications networks.

However, this would extend beyond the inventors personal appliances, as today most people have other electronic gadgets like Electronic Game Consoles, Digital Camera's, MP3 Players etc., which can also be networked. As such, this is not limited to the inventors personal possessions. All these networked devices are part of the two-way communications capacity described by Mr Mike Williams,(see page 2 of the Engineering Report), whether they are just audio, or both audio and visual.

Diagram 5

The Engineer has tried to the best of his understanding as a Civilian Expert, explain how the technology works with the inventors METHOD. This image is aimed at showing that essentially a microphone and a camera device added somewhere to television technology can allow both audio and visual surveillance to occur both remotely, via satellite systems, (see 5/1, 5/2, 5/4), which is infrastructure based and currently illegal. In the case of (5/3) these portable surveillance operations, (incorporating the Spy Van concept depicted by the Consultant Engineer), would probably occur for "authorised" covert operations and at the policing levels, rather than in military territory and defense facilities.

As the evolutionary developments of the inventors method occurred over 15yrs in secret, it is difficult to find a publicly available explanation of how the Surveillance Infrastructure has now merged such hardware automatically for "listening and seeing " intercepting technology, particularly when the Corporate Sector have colluded to tried and shield this reality from the public eye.

This has occurred as an example though the promotion of cable television set-top boxes, and Fiber-to-Home Networks Commercially, but in reality, these systems, still feed into these global surveillance pathways, as shown in Diagram 8/3.

Irrespective of these developments, Diagram 5 shows that even with the limited knowledge of television two-way operations, the Engineer has demonstrated that conventional television technology CAN BE MODIFIED to provide bi-directional functions, which is the critical point for the purpose of endorsing the patent.

Even if this may not have occurred in exactly the manner depicted graphically by the Engineer in the case of the inventor, it is sufficient in the report to demonstrate that the surveillance community can technically do it.

As the inventors relationship with Secret Services through the interactive technology application was a unique and "freak" experience, due to her advanced awareness of these systems comparative to the rest of the population, despite the capacity of such global eavesdropping to track anybody, anywhere, anytime, the dynamic between the inventor and those associated with the covert surveillance world, as in this developmental process, the inventor was simply "ahead of her time" and this was recognized by these authorities from a distance.

Diagram 6

This graphic is aimed at demonstrating once again, how surveillance systems generically are understood to occur in reality, from the perspective of the Consultant Civilian Engineer.

The Engineers Diagrams depict both the legal level of intercepting and the unlawful systems associated with the Echelon Earth Stations. It should be obvious from this depiction, that these systems are in no way, dependent on, or exclusive to, only the inventors television and address.

Since all citizens globally, can be a focus of interest, to those working in these shadow areas, the infrastructure behind the claimed METHOD is not limited to the individual inventors experience.

While practically speaking this system is a global network, in reality, International Politics and the lack of cooperation around geopolitical boundaries makes this difficult to consolidate on a Government and Legislative Level. However, the commercial application through this METHOD, makes it simple to overcome these territorial problems and expediate systems solutions.

The "whole-of-world" approach of the inventor in the application of the METHOD is aimed to significantly improve Policing, Security and Systems Management issues, which have already started to become more compatible with the Inventors METHOD, as in the case of the AFP Monitoring Units and High-Technology Facilities,(see 6/5 and the AFP website for a correlated association).

As the truth around the patent claimants case becomes better understood by the Law Enforcement Agencies, the increased systems integration and application, is likely to continue growing, despite the Military Systems predating by a long-shot, modern Policing today and their "catch-up" factor.

The extensive confrontation between the inventor and the Police in Australia, over the 15yr period of the developmental experience, have demonstrated that such technology in the earlier phases of the inventors systems awareness, was not readily understood or accessible to Police at that time, but over the long term, this has changed.

Now some information about "how the method works with real technology" is more readily available and better understood, like with the common acceptance today of fiber-optic technology.

Diagram 7

This diagram was constructed by the consultant engineer to demonstrate and validate the truth and known history around the origin of Echelon and those nations that have entered into the global surveillance agreement with America, (who were the original drivers behind these secret systems). Obviously today, with the rapid changes in technology, and globalization, such systems are no longer limited to just the five nations who were the original partners of the Echelon Agreement, (ie. Canada, the USA, Britain, New Zealand and Australia).

The Echelon System is reported as having its origin in the ARPAnet and MILnet systems described in the Engineers report, (see Appendix 2) and which emerged as the Echelon Agreement during the Cold War, many decades before the inventor was even born.

Diagram 8

It has been the very obvious experience of the inventor, that Diagram 8 explains in better schematical representations of the built-in infrastructure associated with the inventors house,(and prototype lounge-room), the inventors experience. This representation ran in parallel to global surveillance systems revolution and expansion into a whole of world technology, that the inventor transformed through mostly the sound- programming method using primarily bi-directional hidden television in the applied technique, as the primary systems driver.

This permanent infrastructure which incorporates 'built in two-way communications audio and visual devices' in technology is automatically part of the inventors method and is a more accurate representation than Diagram 6,(see 6/7) that shows only, temporary operations for authorized intercepting projects. Diagram 8 is aimed at clearly demonstrating how, in the inventors case, such systems are a permanent fixture in technology and part of the inventive method with all electronic devices automatically that are part of this global infrastructure.

As a direct result of this global surveillance hardware component, the inventors METHOD is dependent on this infrastructure, (even though it is an illegal abuse by the security sector), for the Inventive METHOD to work. It is emphasized however, as is shown in Diagram 12/1 and 12/3, the current long term permanent address and home ownership in Maylands WA,(the prototype location), is irrelevant to global surveillance systems that followed the inventors movements in all of the inventors places of residential accommodation locations over at least the past 15yrs, by spying through the technology associated with these different domains.

These included rental properties, holiday locations, and were not limited to home ownership and the current stable accommodation in Maylands, as the globalisation of such bi-directional hardware in all technology, made portability and adaptability to any position realistic. In fact, the nature of the Surveillance Network in today's society means that all devices and technology based systems are part of the global tracking systems, all the time, and as such, accommodation arrangements for citizens subject to such intercepting, can take place, anywhere, anytime, whether 'persons of interest' are in a permanent residential fixture or not.

This includes residing in a nation that is a Echelon Signatory or not, as all countries, are now involved particularly through bi-directional television developments especially with Fiber-Home Cable Technology. This includes systems like the Internet, amongst other technology like radio waves, telecommunications technology, and satellite transmissions anywhere in the world, anytime.

For this reason, the current position of the local council of Bayswater Shire and their "non-transferable" business licensing laws, and the associated local government legislation around home-occupier business operations, for civilian residents is also limited and lacks a true understanding of the impact of this claim and the surveillance infrastructure associated with its portable nature.

The inventors Method far exceeds the limitations of local government legislation and is already rapidly achieving an intergalactic impact, for which no real laws exist at all for. As a patented commercial entitlement, proper protection can be obtained for the invention prior to "policy making future catch up".

Diagram 9

This diagram is aimed at showing the main Fiber-Optic Network in Australia and its core processing facility in Alice Springs. This is one of the dominant hardware and information filtering systems that supports the reality of the two-way unlawful communication devices in Australia. Again it is highlighted that, the nature of this infrastructure is well established globally, as an international network, despite little being understood publicly surveillance technology and the true magnitude and impact of systems and the inventors transformation of one-way spying into two-way interactive technology.

This image is only a National perspective, but for the inventors METHOD, to be accessed internationally via the inventive systems development, it has obviously involved collaboration, also illegally with the non-echelon nations around the world those behind the scenes associated with this infrastructure in secret.

In Australia, the main international link to the Inventors Method and this statement, would be associated with SBS Television who are the dominant network connections to foreign broadcasting.

From a commercial liability perspective, as well as, the security threats that have emerged from this espionage and that have become exacerbated by these unscrupulous practices, the responsibility of the information extorted 'interactively * that has come out of the inventors system, officially rests with the US-Australian Defense Facilities and their agreements with the Australian Government, since the civil rights and citizenship of the inventor is as a born Australian person.

It is through these Defense Systems and their hardware, along with the commercial collaborative television network crime, that the "integrated and interactive METHOD" has evolved other systems and other technologies have been developed around the inventors work.

Diagram 10

This image is just one graphical representation of the "MACRO-MODULE" application of the inventors METHOD. It is aimed at demonstrating pictorially how "interactive programming" took place on the broader societal level outside of the inventors prototype lounge-room.

Both sound programming and a visual feedback loop were created by interfacing the inventors mobile phone with the Big Movie Cinemas, which were a regular weekly "programming habit" of the inventors method many years ago, and took place over a long term period, not just in the Cinemas, but also in the inventors 'scanning * of the technology and infrastructure anywhere, eg. banks, retail cash registers etc, being combined again with the sound-programming technique.

it is to be noted, that this practice took place even before mobile phones were officially installed with visible and legalized camera's commercially, as the same surveillance network extended at that time to the telephone technology and the inventor had an "advanced awareness " of this fact ahead of the open population.

Using this mobile phone method to expand the inventors system outside of the house prototype, allowed the very big global technology application to be highly focused and concentrated into the one point of the inventors mobile cellular phone.

This was the method of making the system portable and adaptable systems "global integrating tool". (See Section 3, Point 19, pg.169 of the Patent Claim document description for more detail).

(12/3) - Mostly the Maylands address, the inventors permanent residence and owned property since October 1997. Living alone as a single adult, the majority of the development of the METHOD took place again in isolation in this location on a daily basis, sometimes up to 16hrs a day of sound- programming, seven days of the week, especially after the inventor was classified as "disabled" and able to stay at home full-time.

The sound-programming of bi-directional television technology was not restricted to just the Maylands location, and did in fact start well before this long term accommodation. The inventors transformation of the METHOD

into a commercial entity and the technique used has been consolidated at this address. (Unit 4 Strata Title 8221, 187 Peninsula Road, Maylands).

Box 12/4 - 12/6

Representation of the three main US-Australian Defence Facilities associated with the Echelon Network. This is also relevant to the inventors teaching methods, which incorporated "trigonometry" and triangulating formula, (amongst others), to assist secret surveillance staff with crime solving techniques.

This includes and included developing models for security works, like color-coding and symbolic association, navigating models and tracking techniques, (some of which are explained in the embodiments associated with this standard international patent claim - see Appendix 7 for examples of attempts to engage the Western Australian Police in this process with a submitted proposal that was rejected by local authorities who have since exploited the inventors work illegally themselves). You can see how these concepts were formulated way back in Year 2003 in these particular examples that were documented.

Box 12/7

This picture represents the inventors trip to Las Vegas in 2006 to attend the International Poets Society Annual Conference in America. This is relevant because all persons entering the United States of America are required to have a photograph and fingerprint biometric record to enter the country placing personal details directly on the American Homeland National Security Database. In addition, the copy of the Baggage Inspection Tag from Homeland Security America, also validates the inventors claim, as being a 'person of interest' to these authorities, whether known, or unbeknown, to the Australian Government.(see Appendix 4 for proof).

This factor is critical to developments around global policing, anti- terrorism security priorities and the inventors commercial integration with real security systems and the METHOD, is which provide a true benchmark for factual individual global biometric and integrated technology adaptations. This is essential in the important capacity of the inventors METHOD to global using sound programming and human-signals techniques, a standardized international and centralized security system.

Box 12/8 - 12/9

This is a graphical representation of "human signals" bi-directional television programming, which can be sound-driven, or more advanced, as in the case of the inventor, which incorporates "other human signal drivers like brain-wave, thought projection, kinetic applications and visualization techniques". While sound-programming (whether phonetic or in other audible forms), is the main mechanism that was utilized in the METHOD to create concentrated focused "human energy" being channeled into technology, (mostly through bi-directional television), to create the inventive impact, in the case of the original inventor, this has usually occurred from a slightly greater distance, mostly sitting on the lounge- room sofa, (See Dr Bailey's testimony, Appendix 1, "To Whom It May Concern" and Diagram 1).

Box 12/10 - 12/14

This Human Signals Operated Interactive Television Technique, focused on a concentrated 'human energy' interfaced basis, has many applications and is hence multi-purpose and multi-functional.

In the example provided in this image, a military interfacing and electronic warfare example, in this box, is just one of many of thousands of different applications of the inventors METHOD and in the case of Long Range Ballistic Missiles, is relevant to the inventors "smart paint concept" and smart bomb technology allowing human signal interception through bidirectional technology to impact weapons of warfare.

It is expected that such applications will be protected as an embodiment within the current patent claim, and then incorporated in the future, into research and development projects after patenting the currently claimed inventive METHOD. In the Smart-Paint Application of the inventors adaptation of the system to Military Compatibility, this is also expected to add the unique "hypersensitive application" of the human biometrics to such devices allowing greater control through integration of the inventors METHOD and Defence Capabilities.

Such an application, would eventually be a "whole of system military approach" and would include reclaiming the stolen Smart-Clothing Technology and Weapons of Warfare Design, which has both enhanced military precision and increased "preemptive strike-rate and intercepting capacities".

At this level, even adult sexuality becomes a driver in the "human signals" application, particularly in the case of the inventor being female, heterosexual and having a dominant attraction to Military.

In the future, this adaptation is planned to be combined with newly developed training programs, using such techniques as a leveraging advantage that can be combined with many different kinds of technology and software systems, including electronic games, virtual simulators, 3D technology, and also to expand to the inventors "Fuck and Fight" plan which is claimed in the patent embodiments.

Diagram 13

In this quadrant representation, the more advanced levels of the systems application and METHOD design are shown. This graphics combination, is essentially showing the technical-spiritual applications including meditative, visualization integrations techniques, incorporating 'thought projection' into technology interactively, as well as the adaptation of the inventors METHOD to advanced programs like Holosync that utilizes Neuroscience Principles and brain algorithms.

This is used in combination with the patent METHOD, to adapt "whole of brainwave" applications, or "specialized brain functions" through stereophonic headphones and the 'multiple device integration' to expand the METHOD projection into all technology being synergised paraliminally, & subliminally into artificial intelligence and satellite signals to harmonize and transpose onto a global scale, a holistic "human/sound signals and synchronized world technology approach". In this meditation and thought projected visualization integration, the inventive METHOD is enhanced on a deeper algorithmic 'brain & technology' virtually silent level.

The advancement of High Definition Digital Systems, LCD and Plasma Screens etc, have also, allowed the patent METHOD to make the whole system very human-biometric sensitive and highly flexible in the adaptable constant changes that occur in the human signals integration. The hypersensitivity of such applications has increased over time with technical advances and helped accelerate sound/phonetics and voice programming methods into highly specialized applications like the paranormal, and psychic/telepathic domain, and is inclusive of the inventors "silent human signals",(like private self-talk), in its application.

(13/8 - 13/11)

Is a representation of another adaptation of the visualisation or thought projection & interactive meditative techniques and the application of programs like Holosync which helped to inspire the METHOD of using separate brain functions with the stereophonic device to segregate children from harmful entities, with the SWORD being used as an example of a mental focal point, that also represents the archetype business logo theme of the inventor and one of her METHOD applications.

The right wing image represents are potential threat or dangerous area, that could be harmful to the "young and vulnerable", and which in this graphical case, the inventor is attempting to intervene using the METHOD to prevent harm of the innocent.

As the Holosync Program comes with specially designed Headphones, this "split systems mental application" can be applied and used. Particularly if the program CD Player is plugged into the television audio outlet as well, as being visible on the 2-way TV camera, allowing even greater sensitivity to occur between these kinds of brain programs and the inventors METHOD. Since the inventor is always under surveillance, however, such a "device application" is actually non-essential and can be applied on an optional basis for more intense work.

In image 13/13 in reality, any mental imagery can be chosen or visualized, depending on the "energy projection" of the system user/programmer. As the inventor is highly attuned to healing, recovery and solution focused strategies, a lotus flower was chosen in this case, as an example of a "positive divine mental focal point".

This is aimed at expediating healthier interactions between the human component interfacing with smart or Al technology. Image 13/6 and 13/7 is again a MACRO-MODULE representation of how this synergy potentially transfers from the individual interactive works of the inventor to the broader global communications systems level.

Diagram 14 Box 14/1 - 14/4

A variety of adaptations can be made using a software program, musical formulas combined for example with the Kinegram plan, and developmental future models for fine tuning the patent method, as a tool to enhance the search for precious metals and mining commodities. This again due to the hypersensitive nature of the patent invention, would be very specialized and require further development over a period of time after the general method has become accepted. Once again, this can be applied with or without headphone devices or other technical gadgets, depending on the need and circumstances for a required project or contract.

Box 14/5 - 14-8

This image is designed to represent graphically how human signals through the interactive multimedia technology can be transmitted long distances to other planets, far away desired locations. This is the next stage of communication pathways before accessing the activities and operations on the ground of other planets, or an intergalactic distant space station etc. As the METHOD is human signals driven, on an interfacing level with multiple technologies, it is ideal for such an application, as shown in the example in Diagram 14 for Outer Space Mining Operations.

Box 14/9 - 14/11

This picture demonstrates how the 'sound driven' or 'human-signals' application of the METHOD applies to robotics, whether they be for a bomb squad, or in outer space for commercial mining etc. and how this can be "integrated and applied to the patent METHOD from any location where even just a television can be accessed.

However, in view of the technical developments and extortion of the inventors long term oppressed works, it is probable such applications can be as sophisticated or as simple as is desired. The technically specific industries, particularly when combined with computer networks and computer technology and the television bi-directional system interactively, provides a high speed method for intervention and human capacity to operate intelligent systems from long distances, with many diverse applications, and is not limited to this image.

This specific graphic is aimed at showing what is happening on the intergalactic surface after signals are transmitted through bi-directional television by human operators to satellites in outer-space and then to Al or smart-wired robots which can be used for a variety of purposes on hostile terrain unfriendly to humans and provides and important 'back-up' system to organizations like NASA, without any risk of human life.

Box 14/12 - 14/13

This image simply depicts the "bigger picture" possibilities of expanding the METHOD "interactively" to other planets for multiple purposes, whether they be colonization projects or commercial interests or any other function and operation,and whether it is partially or wholly integrated. Obviously such systems would benefit most from the patent METHOD if the existing databases and software networks of such applications are adapted to this invention, which still combined with television networks and satellite technology then would make an intergalactic application simple. This progressive and expansive development of the patent METHOD, would be an expected normal process over a long term period following market acceptance of the invention in a commercial application.

Diagram 15

(15/1) - The prototype lounge-room module, which is portable and can be adapted to any location or venue in the context of the inventors design, becomes a commercialized shadow Defence headquarters for the purpose of 'integrated security systems and interactive military and security applications'.

It is an important systems centralizing point allowing easy configuration, and constant high speed recalibration, meaning systems can then adapt rapidly to technical, situational or other changes and includes portable relocation of the systems centralised method.

(15/2 - 15/3) - Upper Level

Once again, there are a diverse number of ways to apply and adapt this 'interactive human signals driven concept', which incorporates systems users interfacing with technology. This can be applied as an adjunct to existing 'plug in games', or directly through the television, depending on how users choose to interact and how this concept is marketed.

For the purpose of this graphical example, this shows figure 15/2 using a "interactive weapons device whether simulated or real", that in the future can be adapted to voice-over and human signals integration of the "interactive function" and weapons applications & the changes in television screens, which combined with the inventors science, has just about seen artificial entities, achieve a point of break-through in the technology barrier between such entities and human users.

This could mean essentially one day, that Cyborgs for example can enter a human home right through the technical screens in human technology and is another disturbing that threat that has manifested from the abuse of the inventors intention and developments.

This would include the development of projectiles that can permeate technology screens and converts a electronic game concept into a lethal weapon. Such applications are already illegally explored through those interested stake holders, who again have exploited the inventors concepts.

This is a disturbing abuse of the inventors history, as it presents significant threats to everyday citizens even in their own home, and is particularly a concern regarding "cloning technology" and Americas "shift shapers" and possibilities of home intrusions and citizens disappearing and being "replicated and replaced" and this becoming a real world horror story, potentially right through the home-based simple television appliance.

There are a number of different applications that can be used with the inventors METHOD in this context, and which can be applied to different kinds of technology, not being limited to holographic designs, 3D technology, electronic games, virtual adaptations etc.

Again because of the flexibility of the model, it is not restricted to just television or just a game console, or even just computers, as the METHOD in combination with the global surveillance infrastructure that operates behind all these technologies, can be adapted and integrated with the inventors technique, into any technology of choice, whether in combination with other appliances or stand alone devices.

At the stage of 15/2 depicted graphically, this entity could be still be a human interactive link, but may be even a hologram/cyborg or some other non-biological application. Additional adaptations made in the lower level representation is an attempt to offer a "human control mechanism" so our species can stay on top of such developments or possibilities.

(15/4 - 15/6) - Lower Level

The graphic shown here, is a pictorial attempt to depict how the human- technology interactions can be substituted with replacement and interchangeable/adaptable characters, (see 15/5a-g) have been provided as examples only and explained in 15/5a-g comments listed overleaf.

The main difference with the upper level images, is the human-technology interaction, has been exchanged for the virtual or holographic characters (as an example), who are then controlled by a shadow or rear human operator,(shown in 15/4) who is probably in a real life application, in charge of controlling a virtual character .(whether combatant or not), from a non-visible location.

This would occur whether some bi-directional technology interfaces in between, or this is done through bi-directional camera's from possibly a non-visible remote location, using the same Human Signals Interactive Method, however now, it is applied even outside of the television broadcasting.

For the purpose of the patent application the representation of this METHOD shifts outside of the television technology, into this next level application, which in this image has been simplified. It will incorporate the characters also "diving through the technology screens" into Cyber-Tron like domains or other such applications on the inside of the interactive technology.

It is included as important advancement on the original patent claim, and future developments, particularly in light of the "Eternity Television" reference made in the profiled provisional application, where the virtual characters can outlive their human creators.

(15/7) - This graphic is the property of Crown Copyright from the Magazine "Royal Airforce Yearbook 2008". As this Remote Controlled Warfare Application involves modern satellite and fiber-optic communications, it is perfectly compatible and easily adaptable to the Inventors METHOD. The inventors Method in this application is particularly useful for today"s UAVs (Unmanned Air Vehicles).

This provides another level of defense for allied nations against these kinds of military applications getting out of control or being used by enemies. Since they are technically driven, this particular military potential threat, makes the inventors METHOD critically important to modern warfare.

(15/8 - 15/9)

This graphic once again, shows the Human Signals Operated Interactive

Technique focused on a concentrated 'human energy' interfaced basis, particularly through the bi-directional television technology, which has many applications.

The military interfacing and electronic warfare example, in this box, which was also shown in Diagram 12, is depicted in Diagram 15, as part of the interchangeable and adaptable defence model.

(15/10 - 15/14)

Represents a more specific example of the "interactive bi-directional" defence application of the inventors METHOD, which can be combined and applied in functions such as this one, in a huge number of diverse applications.

It is expected that over time, the inventors METHOD can be powerful enough to deflect attacks from potential enemies at the "speed of thought interactively" as an example mechanism. Such developments will be pursued as research, after initial patenting. In the image provided, the RED

Missiles represent long range ENEMY BALLISTICS (EB), while the BLACK Missiles are a friendlies defense position.

The "interactive method" can operate both at the point of impact or beforehand, by actually "mentally directing a projectile" through thought- wave interception directing human signals around the missile projections,(or a target object), with the intention of altering the angel and the outcome of military attacks.

This concept in reality, is only practical at this point in time in history, if a visible image of the security threat through an electronic medium, which amplifies the human signals capacity to respond in sufficiently strong position, that would not be possible for "normal humans" without the human-technical interactive adaptation.

Using the METHOD in this application, can essentially provide a pathway through any relevant 2-directional technology, whether it is computers, air traffic control towers, television or some other technical medium. By applying the METHOD in this manner, threats can be made identifiable/visible and "interceptible" in a technical interactive application.

(15/15)

Represents the Echelon Partners, as once again, one of the key communication facilities that is critical to responsible governing of such applications, is central to providing the Hardware Communication and Surveillance Systems Infrastructure that makes the said claim work.

(15/5a-q)

Depicts examples of virtual or electronic or non-biological characters, or images of characters that can be interchanges in 15/5 as an adaptable feature of the METHOD. This may in the future involve Holographic Technology and 3D Software applications for example, that may even be made life-size and can then be used for "Fuck and Fight Fantasy Projects".

In a defence application, such character substitutes would be a deliberate substitute, as the human operators behind the character applications and systems adaptation, in reality would probably be in a remote location and hidden, driving the character program, or non-human entity from a distance interactively.

This may possibly, include access through other remote technology like a bi-directional security camera, computer technology, or an expansion of the bi-directional television technology as an example.

This interchangeable character function is also incorporated into the Eternity Plan for the Invention, whereby the virtual or electronic character has been nominated as an "avatar substitute of the inventors estate" to replace the limitations of the human inventor after the point of physical impermanence on Earth, or in the lntergalactic Eternal Future and Timeless Expansion, and Unlimited Possibilities of the Inventors Original Creation. Any adaptations of this "character application" to the inventors METHOD will also ensure that constant longevity and sustainability of the developed METHOD over eternity is achievable, offering a permanent solution.

The Character Number 15/5e is currently the property of the Commonwealth Government of Australia, Defence Games Program and this character has been nominated to allow "integration of Defence & Security Applications" to the Business Invention.

It is part of the "eternity television" component adaptation to National, International & Interplanetary Security Interests.

Since such character adaptations can allow the original inventor to be replaced virtually, or holographically, graphically etc. or in whatever form is desired, particularly if used, in combination with, the recorded original biometrics of the human true origin behind such non-human adaptations.

It is recognised by the Inventor that any character adaptations to the METHOD such as these, listed in 15/5a-g, will require the explicit permission of the copyright owners prior to further development, in a post- patenting process.

An Avatar registered membership War Game Number is used by the inventor to provide the stable centralising point of any potential "character adaptations", including if there are changes beyond original recognition, or cloaked "invisibility" for example, which may be necessary in a defensive and security application in particular of the systems use.

This function in 15/5a-g is also set up to incorporate the inventors Trademarked Logo, which is expected to be "adapted and integrated" in the future and converted into a 'living digital' entity, ensuring business and commercial longevity is addressed.

Diagram 16A

This is an example of transposing the lounge-room prototype model to an office environment with the same "interactive and integrated" human signals interfacing method. This can be either with a Headset and/or attached microphone for integrated voice-commanded technology,(16A/3), or similar communication devices, or even without, use of such technology for those who are more advanced,(16A/2) in their capacity to duplicate higher levels of the inventors METHOD.

At this level, the systems can be controlled through the same "infrastructure" networks which discovered by the inventor and which operates through technology, rather than through an additional systems users external device or apparatus, like a headset, microchip implant of the future etc.

This will require the METHOD gate-keeping to occur at the hardware end of the systems design and technology bi or multi-directional level, rather than at the face of the systems user and allows ultimate freedom from "electronic devices" for the operators and users of the system "unplugged" from the technology as demonstrated in Diagram 1 as the original prototype.

This essentially shows how not even keyboards or touch-screen technology are necessary in the inventors METHOD. It would be expected that as more systems control is obtained, that all users of technology and the integrated Method, can eventually evolve to the device free human- signals interactive stage.

When this occurs the majority of the filtering and systems gate keeping, would be expected to occur from the infrastructure behind the technology rather than through customized devices. This will require much more cooperation from the relevant authorities before it can be a commercial reality.

In this way, the MODEL METHOD is different from current telemarketing methods, and other office operations, as the inventors METHOD is aimed at incorporating any product and technically based device and electronically associated system, (even if electricity in the future as a "energy supply" is replaced), and provides the capacity of the invented METHOD to be highly adaptable, with multi-functions and applicable to multiple-technologies, or any technology in its human signals generated design.

This can include the duplication of the white board and teaching applications, as all of these "interactive modules" like the inventors prototype lounge-room, will have "networked cameras" allowing visual and audio systems expansion and commercial adaptation to a mass market place to thrive and will incorporate all converged surveillance devices "interactively" in the future.

This then means, that transmission of "human signals" in a non-electronic application, like teaching on a white board for example, can then be interfaced with a home-office environment, video-conferencing etc. and other such, already existing technology.

It can be integrated into the same globally streamlined interactive holistic system, allowing literal adaptation for future systems users also to any location or technology of choice. Obviously the new centralized 'smart- wiring' of appliances allows greater user control and transparent awareness of the converged technology and associated "all-of-one" global systems integrated infrastructure, which then duplicates both the micro and a macro application between users their environment and the bigger international or intergalactic systems design and application.

Diagram 16B

This Airbus example of duplicating the inventive METHOD is aimed at demonstrating a portable application and emphasizing the fact that the METHOD is not dependent on a building fixture, or permanent location and can be highly portable and adaptable to literally any technology based location and systems application like a Police Security Vehicle, a Family Caravan, Outer-space Projects, etc. This portability and mobility factor is particularly important for Security and Defence Operations that need to be highly and quickly adaptable and mobile.

The inventors METHOD allows the fastest systems application adaptation ever known in human history, as the human sensory "interactive technology" level supercedes the speed of all current "device applications" and is a critically important strategic advantage.

Such an application allows high speed response times and preemptive intervention strategies to occur, providing a mechanism for human operators to keep up with and adapt to the modern worlds very advanced and very fast technology developments. Systems users and operators are no longer burdened with complicated software knowledge and 'gadget challenges', as the voice-commanding and 'human signals' strategies of interactive human drivers and operators to technology systems, is extremely simplified and user friendly for all different levels of application from the basics to the very advanced.

It also ensures in these examples 16A and 16B that patent requirements for duplication of the METHOD are met in a commercial application.

APPENDIX INDEX a) Appendix One

1.1 Physicists Report - "To Whom It May Concern" - Statement of Observations, by Dr Ian Bailey, PhD

1.2 Physicists Report - Physics Principles by Dr Ian Bailey, PhD b) Appendix Two

2.1 Engineer's Specialist Report - Telecommunications Technology Mr Michael Williams, B.Eng

c) Appendix Three

3.1 USPTO - Provisional Patent Profiled Application

3.2 USPTO - Filing Receipt - Confirmation Number: 1188

3.3 Certificate of Copyright Registration - Register of Copyrights USA d) Appendix Four

4.1 US Dept of Homeland Security - Notice of Baggage Inspection e) Appendix Five

5.1 Proof of Reported Criminal Conduct - Letter to the Australian Taxation Department . 23 July 2007.

f) Appendix Six

6.1 Smart Paint Example Application - Military Apache Helicopter, Future Defence Research & Development g) Appendix Seven

7. Samples of Formula Created to Adapt Community Problems to the Integration Method & Interactive Technology Solutions (Copyright 2003) :

7.1 A Practical Application of Triad Models to Police Work

7.2 Drug Trafficking - Heroin

7.3 Security Classification Systems (DSD example)

Acknowledgments

Special acknowledgment is extended to Mr Michael Williams, (and his friend 'another Mike', who helped him to stay on track with the Patent timeline), and for Dr Ian Bailey, PhD the Expert Physicist from Curtin University of Technology for their professional reporting contributions.

Irdi's Legal, (and especially Mr David Thompson), who despite, not being a Patent Attorney's provided an important professional overview of the documentation for the compilation of this self-applied patent claim.

While this process took place under difficult circumstances, with numerous sabotage attempts by "subversive elements" being made, the named contributors who assisted the inventor with the Patent Claim, persevered despite many challenges locally with the process.

While Patent Attorneys were consulted and scoped for the purpose of this International Application, due to the small number of service providers in Perth and the limited available time-line to meet the PCT requirements for non-provisional applications, it was not possible to identify an alternative Patent Attorney to assist with this application.

The Patent Company originally found early in the piece withdrew their services about 2 months before the 12 month expiration date for the PCT due to their technical expert leaving the legal firm. Despite several attempts to find an appropriate replacement Patent Attorney, a suitable substitute was unable to be located within the required time-frames, which forced the inventor to self-apply.

Prior to the withdrawal of the Patent Attorney,(due to staff departure) previously sourced, it was confirmed by these attorneys in their preliminary review of the Patent Claim, that the Distinctiveness & Uniqueness Criteria for Patentability DID qualify. This had also been the opinion of a second patent attorney consulted in Perth prior to this arrangements with Wrays Attorneys in West Perth that fell through, just 2 months prior to the PCT Expiry Date, however, this previous company felt they were too small, as a legal firm, to cope with the complexities of the Patent Claim.

The few other qualified attorneys in Perth were unable to assist due to "conflict of interest issues" since most had a preexisting affiliation with the big companies alleged by the inventor to be associated with the unlawful surveillance taps on the inventors house, like Microsoft Corporation, Nokia and Foxtel, to name a few.

The Graphics Designs in this Patent Application shown in Section 5B in Diagrams 1-11 completed my Mr Michael Williams, while Diagrams 12-16B were created by Mr Tze Lin Tan, Senior Graphical Designer, of Business Exposure, along with their companies supportive staff. These important visual and graphical contributions are also greatly appreciated and made a big difference to the patent application. All of these identified participants and the associated organizations, are professionals and businesses from Perth, Western Australia.

Their local cooperation under the cloud of long term state corruption was particularly appreciated and brave in view of the collective majorities choice to be silent about the extended abuse and crime involving this claim that included the total neglect by all of the State Authorities.

This occurred despite, repeated reports and complaints to the relevant authorities by the inventor of this patent claim. At the time of filing the International Non-Provisional Patent, the criminal conduct associated with this claim, still remains unaddressed by local authorities.

Beyond WA Borders, (despite complaints about Nokia Corporation as a Company, about potential collaboration with the Unlawful Interception from the Inventors Mobile Phone), gratitude is also extended to the Anonymous Staff Member of Nokia Corporation in Sydney, who kindly donated the advertising poster for free, which was used in Diagram 13, (see Section 5B).

This is in respects to how the Method is used through Human Signals Interaction with Technology to facilitate Child Protection and Community Safety Projects.

TO WHOM IT MAY CONCERN Subject : Signal detection and transmission

I have visited the home of Michelle Pule and observed the equipment in her lounge room, including the television, computer and telephone. It is Ms. Pule's claim that her activities are being picked up and transmitted to other places. With respect to this claim, I can make the following observations :

1. It is technically feasible to pick up acoustic signals (speech, for instance) by devices that I will refer to as microphones. Such microphones can take many different forms. The output from the microphone can then be transmitted elsewhere. Since microphones can take many different forms, it is not necessarily easy to identify any such devices.

2. It is technically feasible to pick up pictures of activities in the lounge room, by devices that I will refer to as cameras. The output from the camera can then be transmitted elsewhere. Such cameras can be made very small and therefore not necessarily easy to identify.

3. Transmission of the output from microphones and cameras can be effected by a number of means, including electric (by wire) and radio (by radio waves) Once outside the house, it is a relatively easy matter to transmit any signals on to the internet and hence to any other parties.

I observed the system in the lounge room for only a short time, so could not come to any conclusion about the presence of any microphone or camera.

APPENDIX C\ X)

Physics principles — signal detection and transmission.

The following is a brief description of the basic principles of the physics involved in the statements made in my report.

1. Acoustic Signals

Acoustic signals are vibrations. In air, sound is transmitted by the motion of air molecules. Sound is referred to as a wave since there are parallels between the motion of water waves and sound.

Sound waves in air are longitudinal, meaning that the molecules in the air are vibrating backwards and forwards in a direction parallel to the motion of the sound. These vibrations cause any object they encounter to vibrate in the same manner. In a conventional microphone, the sound waves fall on a diaphragm that vibrates in the same manner as the waves in air. The consequent motion of the diaphragm is then converted into an electrical signal using magnets and coils.

Although conventional microphones are the most common means of converting the mechanical motion of the air molecules into a signal, other means of accomplishing this exist. All of these means will involve picking up the mechanical vibration of the air and converting it into another type of signal. The essential part of the process is retaining the frequency information contained in the original sound wave.

2. Visual signals

Objects we see with our normal vision are seen by the light coming from them. This is usually light reflected from the objects that is emitted by some source in the environment. The light is focussed on to a receiver by means of a lens or a system of lenses. This is exactly what happens in the human eye, where the light is focussed by the cornea and the lens of the eye on to the retina. The image formed on the retina is then interpreted by the brain as an image.

Cameras work in the same way, where light coming from an object is focussed on to a receiver. In conventional cameras, the receiver is the film, and in digital cameras, the receiver is usually a device called a CCD (charge coupled device). The difference between the conventional camera and the CCD is that the CCD images are processed into digital form. These digitised images are then transmitted by various means to any other place, where the digital information is converted into a digital picture (such as on a computer screen).

The essential component in this process is the lens that focusses the light into an image. Once the image has been captured, it can be handled by whatever means the operator of the system may wish.

Telecommunications Technologies

Introduction

This document has been prepared as technical support of patent pending applications for certain telecommunications and multimedia technologies. Discussion points span various communications technologies and techniques and their relevance to the patent application, however the crucial discussion will pivot around the wide spread introduction of the internet associated private and clandestine networks and their application and interaction.

Other technologies such as the use of common house hold communications devices generally considered to be one way devices such as radio and television receivers can be modified for two way communications.

Networks - A Brief History.

When people talk about the "network" in today's context, we are generally referring to what has become the Internet - the global computer based telecommunications system which has become pivotal to the lives of most people in developed countries and is now becoming more and more prevalent in developing countries as well.

However information transmission based on electrical technologies have been in existence since the advent of the telegraph - over 100 years ago. In fact this was the first digital telecommunications system which was deployed on a large scale.

The internet as such did not simply appear out of nowhere. It is the result of projects and research and development efforts which date back to the mid 1960s. A significant part of its development can be linked back to the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense.

The Basic concept of computer based networks where formulated by engineers working for DARPA who where looking for ways in which to facilitate intercommunications between users on several diverse and different computer platform which existed in the 1960's and since. In the late 60s all of the elements and concepts where in place to award a contract to develop the hardware and software to build the worlds first general purpose computer communications net - The ARPAnet.

The ARPAnet contained all of the key elements in what is today the Internet.

ARPAnet was not a secret or clandestine network - rather a network developed jointly between US government agencies and academia and used jointly for research and development exercises. It did become clear however that the military had great needs for secure networks and military traffic should not coexist on a civilian and academic network so in 1983 the ARPAnet military portion of the network was split off to become MILNET.

Telecommunications Technologies

It is also worth mentioning that despite common myth, the ARPAnet was never intended or designed, to be a secured military network, nor was it designed to be part of the early warning systems, which has its origin in the NORADSABRE network that arose in the 1950's. It was however designed to survive the loss of crucial switching nodes and continue to function reliably.

The civilian portion of ARPAnet evolved through various transitions and improved technologies including the widespread adoption of TCP/IP (Transmission Control Protocol / Internet Protocol) to become the modern day internet.

Two Way Communications Techniques

There are several ways and forms in which information may be exchanged between locations using a number of different technologies. The three major mechanisms used for information transmission can be summarized as follows;

• Electrical conduction of signals based on copper wire in various forms from twisted pair telephone wire through coaxial cables and other exotics such as waveguides

• Radio communications which include technologies which span the spectrum from 2 Hz to 40+ Ghz.

• Optical communications systems based on fibre optic cable and free space optical laser communications

All of the above mediums use the electromagnetic spectrum as the basic medium for transmission of information although it could be argued that transmission via conduction is a purely electrical process.

The transmission medium is referred to in engineering terms as the physical layer and for the most part the user of the service being provided is oblivious to its existence.

A few ways that above mediums are implemented in a practical sense are discussed as follows;

Electrical Conduction

A users fixed line telephone is connected back to the exchange using a pair of simple copper wires. Similarly an ADSL internet service is connected back to the Internet Point of Presence by means of the same copper wires.

Cable television is delivered to the home typically by means of coaxial cable which has a much higher information carrying capability than a simple pair of wires uses sophisticated modulation techniques to encode many channels onto the same medium. The users set top box is then used to decode the channel the user wishes to view and present it to the television for viewing.

Telecommunications Technologies

Both twisted pair and coax transmission systems may be used for two way or duplex communications both with the knowledge of the end user (telephone and internet) and in covert surveillance operations (by way of installation of low power transmitters in devices such as TV sets along with hidden cameras and microphones unknown to the user) which will be discussed later.

Radio Communications

Radio communications takes many forms and is far more diverse than electrical transmission. Like electrical transmission, it supports communication of information both ways, at a distance however has the advantage that no physical infrastructure is generally needed between the end points in order for it to work. In this way, audio surveillance can take place remotely by monitoring these transmitted signals without the need to tamper physically with a location of interest.

Also like Electrical transmission the technology is not new. Guiermo Marconi is generally credited for the invention modern radio in the form of the radio telegraph and was jointly awarded the Nobel Prize for Physics in 1909. His work was based on that of Heinrich Hertz who in 1888 first demonstrated production and detection of electromagnetic radiation.

As mentioned radio is diverse and takes many forms such as;

• AM and FM radio commonly used for commercial radio transmission

• HF radio generally used for medium to long range voice communications to remote vehicles and vessels.

• VHF, UHF and SHF radio used in free to air television transmission and private two way radio networks and cellular phones.

• Microwave systems used in point to point terrestrial connections as well as satellite communications and wireless LAN devices

Other exotic techniques such as ULF (Ultra Low Frequency) are used for secret communications with submarines whilst submerged. (The submarine cannot transmit back whilst submerged - it must deploy an antenna above water level in order to transmit back).

Radio is in all cases (except ULF) an inherently two way communications technology and again, like wired copper networks can be used as a medium for two way signals with and without the knowledge of the user.

Optical Communications

Optical communications can be split into two distinct categories as follows;

• Fibre optic cable transmission

• Free Space Optical Transmission

Telecommunications Technologies

Fibre optic communications has one clear advantage over any other technology - compared to copper and radio techniques its information carrying capacity is massive. For this reason it has seen very rapid development over the last 20 years and is the preferred way in which networks nodes and transmission systems are interconnected.

At some stage, in any communication the chances are that the signals being received and transmitted have traversed a portion of the network which is optical, and therefore image based content can be transmitted over optical networks.

Fiber optics uses very thin (less than the diameter of a human hair), optical "conductors" made from very pure silica and zirconium to contain a light beam and not allow it to escape. Information is encoded onto the light beam by means of pulse width and wavelength division multiplexing. The light sources are generally low power lasers.

Fibre may also be bundled such that images may be directly transmitted down the fibre bundle. This is commonly used in medical imaging equipment used in key-hole surgery, however, it may also be used as a surveillance tool.

Free space optical goes one step further in so far as it does away with the need to use an optical cable and simply sends a light beam between two optical transceivers which may be up to about 5 kms apart. It has the advantage of requiring no cabled infrastructure however is limited by range and inclement weather conditions. Nevertheless it is a useful technology in the right conditions

Recent development and the general publics voracious appetite for content and internet bandwidth has triggered the large scale implementation of optical networks all over the globe.

The most recent trend being Fiber To the Home (FTH) by which this one conductor will be used for delivery of all one and two way communications in and out of most residences in the near future.

Convergence in The Telecommunications Industry

The rapid development of computer science technologies has bought to light one salient fact. All forms of communication can be encoded digitally as information.

The Internet and its underlying technologies have in this early part of the 21 st century evolved to the point where the network itself is completely abstracted from the content and the user interface and may be viewed as a common media.

Telecommunications Technologies

The actual transmission technology involved be it copper fibre, or radio waves is irrelevant. We have developed the ways to encode voice and vision into electrical and other signals using advanced computer technologies and provide two way communications over an ubiquitous network anywhere in the world.

This has created an informal complex (communications) system with feedback. The study of these complex systems and their behaviors is covered under the cross disciplinary study of Cybernetics,

The diagram below is very similar to the schematic method designed by the patent claimant, except for the addition to the technology integration and human signal interactive adaptation to home-based techniques. (This image is sourced from www.wikipedia.com in an article on Cybernetics.)

r s t

Figure 1

The Digital Butterfly Effect.

The simple fact that these closed loop feedback systems exist gives rise to the possibility, all be it unorthodox, of activities in a living room in Western Australia (being observed with the knowledge or its occupants or covertly), having far reaching consequences in a geopolitical sense.

Telecommunications Technologies

Furthermore every modem communications device from a mobile phone to a desktop computer, television set, banking terminal, ATM etc. either is, or has, the capability of providing this two way interaction with the global connected network.

The Advent of Electronic Intelligence Gathering (ELINT)

As previously mentioned most devices commonly used for sound and vision communication can be modified to operate as two way systems.

Whilst most of the transmission technologies are now commonly available it should be noted that there are covert intelligence gathering systems in operation by many countries which where put in place in the first instance during the Cold War.

Today these systems are used amongst other things to provide unlawful intercept of communications between organizations and citizens of both friendly and unfriendly nation states.

The most publicized of the ELINT networks and the largest commonly known about is known as ECHELON. It is a collaborative effort between the five nations of the UKUSA intelligence community. The member nations are United States of America, Canada, the United Kingdom and Australia and New Zealand.

Other non-aligned countries, particularly France are believed to operate their own networks.

Comparatively little is known of the capabilities of this network however with its genesis being during the Cold War era, great emphasis was placed on monitoring and processing of signals transmitted via radio and over satellite in particular. At this time the vast majority of international telephone fax, telex and limited data transmission was via satellite.

Typical ECHELON stations comprise many (can be dozens) satellite antennas and other radio antennas which are directed at commercial communications satellites.

One installation located close to Alice Springs in the Australian Northern Territory and was built under the Pine Gap Treaty. Whilst little is known of this facility it is physically similar to facilities built in Buckley Air Force Base in Colorado and Menwith Hill in the United Kingdom.

A Google Earth Photograph of the facility below clearly shows the very large radomes protecting the antennas as well as the shear scale of the facility.

Telecommunications Technologies

Figure 2

The facility is believed to accommodate a staff head count of over 1000 individuals and a computer facility covering over 5000 square meters of floor space.

Whilst facilities like this are ostensibly used to control and operate military satellite assets of the five nation alliance it cannot be discounted that this is also a listening post for covert intelligence gathering operations.

The ECHELON program is also believed to support a number of in-orbit intelligence gathering assets. These satellites are designed to provide both optical imagery and also monitor terrestrial radio transmissions

ECHELON and Surveillance Satellites

Some of the radio monitoring satellites are believed to be in geostationary orbits (approximately 36,000 kms above the equator) and be equipped with large broadband antennas and many radio receivers to cover the entire radio spectrum The surveillance satellite listens to all the radio chatter under its foot print up- converts these signals to microwave frequencies and down links them to one of several receiving stations in the network.

Once the signals are landed, they are again down-converted, filtered and decoded into the various information channels that have been received.

Telecommunications Technologies

Some channels are conventional voice radio communications whilst others are digital signals such as cellular phone traffic and television transmissions.

The various signals are passed through sophisticated software running on very powerful computers which handle cryptographic analysis and look for keywords of interest in the plain text.

Should a word, name or sequence of words be of interest then the entire message stream will be recorded and made available to a human analyst for further interpretation.

Similarly satellites equipped with optical sensors that work from infrared through to the ultraviolet parts of the optical spectrum continually acquire and transmit high contrast images from space.

The optical imaging satellites are normally in low earth polar orbits allowing them to scan in a relatively short period of time the entire surface of the earth.

As with radio observations satellites the amount of information acquired and transmitted is vast and its processing requires the application of enormous amounts of computer power. Advanced image processing packages are used to do the majority of the pre-interpretation. If something "looks" interesting to the image processing and recognition software then an analyst will be alerted for further interpretation.

It is conceivably possible that these optical imaging satellites, operating in the infrared part of the spectrum could see through roof tops of buildings and image human activity within, based entirely on differential temperature. Certainly satellites operating in the visible part of the spectrum had the resolution when combined with image processing and enhancement algorithms to resolve the writing on a car number plate.

ECHELON and Commercial Satellite Traffic.

During the 1960's and 70s at the height of the Cold War the vast majority of international telecommunications was borne by commercial satellites. Mostly the US Government owned INTELSAT fleet and also fleets operated by foreign nations - particularly the Soviet Union.

One of the significant responsibilities tasked to the ECHELON network was to intercept and analyze all of this traffic.

However the problem today is different. There are many more satellites and systems in operation than during the cold war and they are all operating near capacity, however the satellite traffic represents less than 1% of total international communications today,

Telecommunications Technologies

The public demand for internet and cable networks and other content has forced the introduction and wide spread use of fibre optic networks.

This creates a problem for covert listening operations as cooperation is now required across many nation-states.

ECHELON and Terrestrial Networks

The way around the problem of monitoring terrestrial fibre based traffic was legislation. The principle event which led to this legislation was the destruction of the World Trade Centre in New York giving rise to the Home Land Security Agency and catalyzing the cooperation of all other agencies into this massive information filtering and processing effort.

In the United States every licensed communications carrier must provide the various security agencies with what is paradoxically known as "lawful intercept servers" to the FBI, NSA Homeland Security etc.

This in fact very unlawful activity has allowed the security services of many countries (certainly in the UKUSA alliance) full access to almost every transmission over fibre optic cable. In some cases, major fibre optic trunks are actually run through ECHELON processing facilities, which, again apply vast computing horsepower to demodulating deciphering and analyzing all of this traffic. Although somewhat speculative and classified as secret, the main fibre optic ring which transits Australia and folds through Alice Springs could conceivably pass through the Pine Gap facility allowing Australian and foreign security forces full access to all trans-continental traffic.

The Bill of Rights in the United States and equivalent civil liberty legislation in many countries simply went out the window.

In the case of the internet, packet sniffers, are installed in major internet exchanges and border gateways.

Similarly Cellular Telephone traffic may be intercepted with (un)lawful intercept filters and from space based assets as previously described, as can television broadcasting satellite signals.

ECHELON and Industrial Espionage

There are many documented cases of trade secrets and other corporate information being passed between competitors based on (un)lawful intercept.

A classic case was the Airbus consortium lost a major contract to the Saudi Government based on information passed to Boeing by the NSA, allegedly through the use of ECHELON type intercept services.

Telecommunications Technologies

Other cases of invention and patent theft via similar mechanisms are abundant.

It is therefore quite evident that ELINT assets owned and operated by foreign nations can be used for industrial espionage,

In Conclusion - Putting it all together

There is no doubt that sophisticated electronic intelligence gathering and interpretation centers exist all over the world. It is also of no doubt that most modern communications devices - from a mobile phone to internet and televisions that can be accessed by the global intelligence gathering efforts are being monitored.

As illustrated earlier, household appliances can be modified with ease to provide two way communications and these techniques along with other concealed sound and vision devices are in common use and are likely to have become standardized in the global security infrastructure.

The closed loop nature of modem communications has given rise to a highly interactive multimedia culture, incorporating multiple technologies, which is the basis of this patent claim. It is highly likely that should the author of this claim been subjected to covert surveillance operations then many of the ideas presented else where in this document may have filtered to competitive bodies.

λλ/hile today it is well understood that cable television networks contain the essential 'hardware to allow television technology to be bi-directional, in the case of the patent applicants method and individual claim to her method and its adaptation to the global surveillance activities interactively, it is feasible that were she a person of interest to the security community, that her claims and the associated technology linked to the global surveillance systems could have been modified and adapted to remote surveillance technology allowing her unique "sound driven and' human signals programming" to be possible.

It is reasonable to accept that copper, fibre optic and satellite communications network currently in place (and operational for the better part of two decades) could be used to achieve the method discussed within her patent application.

United States Patents and Trademarks Office

CLAIM

I, Michelle Linda Pule, Born on the 22 nd June 1968, also known as Michelle Power, of Unit 4, Villa 187 Peninsula Heights, MAYLANDS 1 Western Australia, Claim that :

1. I am the original inventor and conceptual designer of

Interactive Multimedia Telekinetic Television Telecommunications System and on this 28 th Day of September, 2007, am applying for a Provisional Patent on this invention as. an interim measure over the next twelve month period to have my concept protected.

Description 1. Field of Invention :

The invention applied for, pertains to the system of streamlining Globally, Industries involving ^ Electronic networks and Telecommunications, especially Television, Video, Films, Movies, Cinema, Computers, Telephones, Radio and Soundwaves, Mobile Phones, Security Cameras, Surveillance Devices, Military Weapons and Police Databases, as well as, Satellite Dishes and in fact, incorporates any medium involving the communication of a signal, including "mentally thought generated intelligence pathways", which now can link into the same subtly connected electronic network.

2. Background of the Invention :

The invention evolved and commenced approximately thirteen years ago around the year 1993, but has never been publicised or released for official public disclosure. The development of "interactive multimedia", particularly involving television, is an unusual situation, having essentially commenced prior to being diagnosed with the "onset of mental illness" which was "in part", triggered by personal observations approximately around the time of 1993, when I noticed images and comments in the television, reflecting and matching my "private and personal thought patterns".

After being committed to a Mental Institution 'in March 1994, I spent many years struggling to come to terms with my "situation". Since the television connections continued, irrespective of the "psychiatric treatment" and I had become increasingly stigmatised and isolated by my community, I started to develop a daily habit of "communicating - back extensively" to the television, to what I believed at that time, was a "hidden 2-way camera system in the television sets". This eventually resulted in me developing a personal habit of communicating to an "electronic audience through the medium of television" by virtue of mostly imagination and mental projection, which has now amazingly, thirteen years later, manifested as a technical reality.

3. Detailed Description of the Invention :

The invention has, through my constant attempt to engage the television media owners, staff and government drawn attention to my situation, which over a long term period resulted in an expansion of "secret spy networks". This has evolved, and become streamlined over the long term, through my constant voice-coaching of the technology which has involved mostly working 7 days of the week about 16hrs a day, building this electronic interactive network. Constant attempts were made to negotiate with many parties about formalizing this process on a business level, and while many companies have adapted technical "hardware" components to my conceptual interactive network illegally over this period, it is now essential to formalize the interactive- multimedia television network as a legitimate business and to force the long term thievery and abusive practice to STOP. I have checked your records and found NO evidence of ' any prior claims involving my system of multimedia Interactive TV claims, or existing patents.

As the system is largely built on what was previously hidden "two-way fibreoptic cabling in televisions", these electronic networks have now infiltrated ALL communication mediums, locally, internationally and beyond, including on an intergalactic and meta-physical level, resulting in a GIANT communication global network which needs to be consolidated officially through my patent claim. As a result of my constant and persistant voice-coaching of these electronic networks, the technology is now hyper-sensitive to my brain signals which can tap into these pathways anywhere, anytime, beyond televisions, computers, radio stations and military defense" systems and much more and can still be activated with or without my vocalized voice commands, using "thought field techniques" which are. now virtually a form of programming telekϊnetically television and electronic communication signals on a virtual "mind-ljnked" basis.

This has resulted in my interactiveTV development, also being used to record my work pictorially, where many thousands of "new ideas and innovations" are all recorded through these "hidden-fibreoptic cable networks", which show in the television-hidden, 2-way, film footage, my development, teachings and evolution utilising this technology over this long-term period from the other side of the camera, recording my activities in front of the television, from behind the scenes.

I am also seeking for the Television-Fibreoptic records of my past works, to be included in the commercial rights under my patent claim for "interactive telekinetic television", as part of my business assets. The additional "telecommunications" component is an aspect I wish to commercialise and promote as a new business development utilizing 'Television" as an eventually "whole of system integrated" approach as a medium for "in-home telephones, voice and biometrically driven banking, teleconference, studio work shopping etc. which have the additional advantage of being visual, as well as, audible, and being easily accessible through the domestic television, allowing people to have direct access, once marketed, from their own home to highly efficient in-home communications using this device. The system also has many important military adaptations, which are critical to future national, international and intergalactic interests.

4. Summary of the Invention :

With the recent announcement by my University in their "Intouch Magazine", Sept 2007, advertising a comment about what was being learnt regarding "interactive television", I can no longer keep my at- home electronic interactive TV business development a secret and urgently need to ensure protection from the relevant PATENT and Intellectual Property Authorities.

Up till now I have been unable to "come forward" about this matter, as each time, I attempted to progress this "idea" as a business development, I was bullied, abused, harassed, intimidated, drugged and locked up against my will in Mental Health Facilities, by the ongoing Psychiatric unwarranted intervention in Western Australia, who constantly tried to Silence my many attempted claims. The recent publication in the Murdoch University Magazine "Intouch Sept 2007", now makes this position farcical and no longer a legitimate tool for "psychiatric oppressors" and their pathological demonisation of this concept. An approved Patent Application allows.λTie to finally progress this matter on an official business development level and professionalise this product, and my system, on a commercial basis, without further fear of ongoing Medical ABUSE, or piracy.

Once Patented and Copyrighted, I v wish to commence an official marketing campaign which allows me to use "interactive multimedia television" in a highly flexible and adaptable method for communication and multipurpose applications, in industry development and in virtually any arena that benefits from these streamlined interactive communication networks. This wifl include televisions and electronic devices being officially synchronized electronically around the world.

I would like to also incorporate on-line interactive teaching/university models through this medium with the introduction of the television being adapted into an in-home, visual, tele-TVInteractive Communication Device allowing the public to use their television as an adapted image-visible telephone and a bigger screen than "intercom" technology. There are also important, permanent, global security adaptations incorporating many, diverse applications of this system which are critical to assisting with difficult problems in today's world like terrorism and security threats. Yours Going Forth Bolding,

AfffeNDiv (s. a)

Eternal Interactive MultiMedia Telekinetic Television-Telecommunications System PROTECTING YOUR INVENTION OUTSIDE THE UNITED STAJES

Since the rights granted by a U.S. patent extend only throughout the territory of the United States and have djgl effect in a foreign country, an inventor who wishes patent protection in another country must apply for a patent in a specific country or in regional patent offices. Applicants may wish to consider the filing of an international

application under the Patent Cooperation Treaty (PCT). An international (PCT) application generally has the same effect as a regular national patent application in each PCT-member country. The PCT process simplifies the filing of patent applications on the same invention in member countries, but does not result in a grant of "an international patent" and does not eliminate the need of applicants to file additional documents and fees in countries where patent protection is desired.

Almost every country has its own patent law, and a person desiring a patent in a particular country must make an application for patent in that country in accordance with its particular laws. Since the laws of many countries differ in various respects from the patent law of the United States, applicants are advised to seek guidance from specific foreign countries to ensure that patent rights are not lost prematurely.

Applicants also are advised that in the case of inventions made in the United States, the Director of the USPTO must issue a license before applicants can apply for a patent in a foreign country. The filing of a U.S. patent application serves as a request for a foreign filing license. The application's filing receipt contains further information and guidance as to the status of applicant's license for foreign filing.

Applicants may wish to consult the USPTO booklet, "General Information Concerning Patents" (specifically, the section entitled "Treaties and Foreign Patents") for more information on timeframes and deadlines for filing foreign patent applications. The guide is availabte either by. contacting the USPTO Contact Center at 800-786r9199, or it can be- viewed' on'the USPTO website at httpr//www?aspto:gov/web/offices/pac/doc/general/index-html:

For information on preventing theft of your intellectual property (patents, trademarks and copyrights), you may wish to consult the U.S. Government website, http://www.stopfakes.gov. Part of a Department of Commerce initiative, this website includes self-help "toolkits" giving innovators guidance on how to protect intellectual property in specific countries such as China, Korea and Mexico. For questions regarding patent enforcement issues, applicants may call the U.S. Government hotline at 1-866-999-HALT (1-866-999-4158).

LICENSE FOR FOREIGN FItING UNDER

Title 35, United States Code, Section 184

Title 37, Code of Federal Regulations, 5.11 & 5.15

GRANTED

The applicant has been granted a license under 35 U.S.C. 184, if the phrase "IF REQUIRED, FOREIGN FILING LICENSE GRANTED" followed by a date appears on this fprm. Such licenses are issued in all applications where the conditions for issuance of a license have been met, regardless of whether or not a license may be required as set forth in 37 CFR 5.15. The scope and limitations of this license are set forth in 37 CFR 5.15(a) unless an earlier license has been issued under 37 CFR 5.15(b). The license is subject to revocation upon written notification. The date indicated is the effective date of the license, unless an earlier license of similar scope has been granted under 37 CFR 5.13 or 5.14.

This license is to be retained by the licensee and may be used at any time on or after the effective date thereof unless it is revoked. This license is automatically transferred to any related applicatioπs(s) filed under 37 CFR 1.53(d). This license is not retroactive.

The grant of a license does not in any way lessen the responsibility of a licensee for the security of the subject matter as imposed by any Government contract or the provisions of existing laws relating to espionage and the national security or the export of technical data. Licensees should apprise themselves of current regulations especially with respect to certain countries, of other agencies, particularly the Office of Defense Trade Controls, Department of State (with respect to Arms, Munitions and Implements of War (22 CFR 121-128)); the Bureau of Industry and Security, Department of Commerce (15 CFR parts 730-774); the Office of Foreign Assets Control, Department of Treasury (31 CFR Parts 500+) and the Department of Energy.

NOT GRANTED

No license under 35 U.S.C. 184 has been granted at this time, if the phrase "IF REQUIRED, FOREIGN FILING LICENSE GRANTED" DOES NOT appear on this form Applicant may still petition for a license under 37 CFR 5.12, if a license is desired before the expiration of 6 months from the filing date of the application. If 6 months has lapsed from the filing date of this application and the licensee has not received any indication of a secrecy order under 35 U.S.C. 181, the licensee may foreign file the application pursuant to 37 CFR 5.15(b).

Certificate of Registration

This Certificate issued under the seal of the Copyright Office in accordance with title 17, United States Code, attests that registration has been made for the work identified below. The information on this certificate has been made a part of the Copyright Office records Registration Number:

Register^ Copyrights, United of America TXu 1-578-329

Effective date of registration:

October 1, 200/

Title

Title of Work: Interactive Multimedia Phonetic & Telekinetic Television Telecommunications Collective works

Previous or Alternative TiUe: New World Order Interactive Television Computer Program

Completion/ Publication

Year of Completion: 2007

Author

■ Author: Michelle Linda Pule-Power '*

Author Created: Audiovisual Literary Works - "Electronically"

Work made for hire: No

Citizen of: Australia ' .

Year Born: 1968

Copyright claimant

•QφyKa^t3tώaaat: M:cfe!k!-ajd&£ul3,-Pos'sr

U4-187 Peninsula Road, Maylands, Western Australia 6051

Limitation of copyright claim

Previously registered: No

Certification

Name: Michelle Linda PuIe 7 PoWeT i

Copyright Office notes: Regarding deposit: Deposit contains text only.

Transportation

Security Administration

NOTICE OF BAGGAGE INSPECTION

To protect you and your fellow passengers, the Transportation Security Administration (TSA) is required by law* to inspect all checked baggage. As part of this process, some bags are opened and physically inspected. Your bag was among those selected for physical inspection.

During the inspection, your bag and its contents may have been searched for prohibited items. At the completion of the inspection, the contents were returned to your bag.

If the TSA screener was unable to open your bag for inspection because it was locked, the screener may have been forced to break the locks on your bag. TSA sincerely regrets having to do this, however TSA is not liable for damage to your locks resulting from this necessary security precaution.

For packing tips and suggestions on how to secure your baggage during your next trip, please visit www.tsa.gov

We appreciate your understanding and cooperation. If you have questions, comments, or concerns, please feel free to contact the TSA Contact Center:

Phone: 866.289.9673 (toll free) Email:TSA-ContactCenter@dhs.gov

* Section 110{b) of the Aviation and Transportation Security Act of 2001 , 49 U S C 449OKcHe)

Rev.8-1 -2004

Smart Security Saves Time

Australian Taxation Office : CC- BE Von Bergheim & Associates^Accountant-Mil Patemiti); Case Worker-Ruah Maylands (Disability Employment Network).

Attention : The Commissioner of Taxation

I am writing to advise you that I will be deliberately refusing to lodge Taxation Returns for the Year of 2005/2006 or beyond that timeline with the Australian Government, following ongoing problems with corruption in Australia involving the Government. In addition, the consistent abuse and degrading treatment by the Government and Australian Business Interest Groups, whereby my business interests in developing innovation in "Interactive-Media" from my home have been rorted by Media Owners, have made it impossible to achieve any negotiations or resolution to this matter.

As it "seems" the Media owners have blackmailed the Government to keep my situation oppressed and "under-raps" following the constant "lack of response", I am NOT willing to return the courtesy of "cooperation with Govt procedures" back. I have made repeated reports to many different avenues and authorities about my situation including Crime Stoppers and the Telecommunications Ombudsmen, only to be repeatedly ignored and in most cases not even receive a reply from the relevant parties including a direct complaint to Hon. Minister Helen Coonan in 2007. Based on the total failure of the Government to respond to and address my situation and to stop the ongoing theft of my business development by the Australian and International Greedy Media Owners, I will NOT submit a taxation return application to your Department until the Illegal Media Thieves are held to account and my stolen monies are paid back in full. In addition, since the Government themselves have been corrupt and negligent in this process, I am unwilling to- cooperate with your hypocritical bureaucratic processes until accountability, due process and transparency in Government is restored.

If you wish to take legal action, that is your prerogative, however, as I have been left with no resources to dispute this matter, my only defence will be non- cooperation or self-representation. I will not be intimidated by threats of legal action and am probably due a taxation return in my favour anyway. As such, "any threats" of court action will not result in a changed decision or shifted position from "refusal to cooperate" until the Government and Media Corruption and Thievery is STOPPED! Once this is achieved, I will then cooperate with the legal requirements of your Department to submit a yearly tax return.

AVόN^x SlX

Virtual Reality Fantasy Sex-Goddess-Warrior Prototype Preferred Black Apache - Operation "Fuck & Fight"

This Apache Helicopter is included in the succession documents for a "visual development" preference for my "virtual-avatarsex-goddess warrior character to be adapted to "fantasy combat" weapons applications and electronic war game software.

Obviously if for example, my TM logo graphic is applied to a partnership with Defence Systems, my business and your War-Games Software, the baby needs to be removed from such a soft ware application.

It is this kind of application that will apply to defence contracts in my reclaimed "smart-paint" technology and defense weapons development in "interactive multimedia". It is probable that the Boeing AH-64A would be the kind of preferred adaptable prototype for the Defence Project in Mind.

It is expected that these issues will be incorporated with new defence innovation discussions with your Department regarding applications of R&D and my business benefits to Security Priorities.

FTTT

A Practical Application of Triad Models to Police Work

Problem 1: Paedophilia

Solution: Identifying children targets before paedophiles strike

Application: Use the following format as a bench mark example of a case in America in which three fictional young boys who were depicted as past victims of a paedophile in the USA in this TV series.

Step 1: Codes from the case can be identified through the program "Cold Squad" on Channel Nine, Monday evenings at 1.15am. This program is already rated in the media under an "M" category. You need to combine the G-Code in 6111755 from the media with a code in police systems by adding these digits to equate to number "8" for simplification.

Step 2: Align the female detective in this series with our "red map" codes and apply it in the USA to an equivalent "blue map" in the American Police systems and then link this to ex-Mayor of New York, Rudy Giuliani under an American "Red Code" system. The specific perspective of this female detective because of her relationship to the children in this case provides the extra edge needed for pre-emptive intervention by police ahead of paedophiles targeting children as an example of pne location and situation.

Step 3: Three children were identified in this case example, one of whom had the initials in his name "CW. This then provides a benchmark for a triad to commence mapping as follows:

Child One

Child Two - "CW" Child Three

Step 4: The known perpetrator in this case identified through past police records was named "Jacob". The police extracted additional information about the perpetrator through a adult survivor of the paedophile's activities who was targeted as a boy and known to the police because of this history. The survivor's name was Joey. The initials in their first names now identify codes linked to this case under "J" as an immediate paedophile alert area. Alerts using the police seals like the "grape" code should pre-empt "J's" coming through computer systems as automatic danger spots.

Step 5: Then add the power of the " 1 O" factor to the child's name being used as an indicator and the result is the word "cow". Codes under letters and numbers linked to the "cow" sequence then help identify the details of future children coming through the system who have connections to sequential patterns related to the paedophile. The letter "O" or Zero is very significant on a number of levels and are critical to system success. On a IT level zero is linked to binary code systems which help consolidate computer systems globally. On a spiritual level the letter "O" is the middle letter in the word "GOD". GOD codes in computers should be placed ahead of and above codes coming through linked to criminals. The slip through of the "O" in the word "COW" distinguishes the code sequence being in a problem area that police should address, explore or investigate as the "O" in the middle of the word is not a "GOD" link on your computer systems.

Step 6: Simplify the process further through the duad system being used by the Real Crime Magazines as follows; a) Link Black Colour Codes to the problem area under code word "cow". b) Link Red Golour Codes to the solution area mapped through p ' olice under "PPP" systems.

Triad benchmarks on these codes mapped with a specific geographical perspective and timeframe then help to indicate the direction of a target child using indicators only known to the police. In this case, the prompt of a escort service on television being advertised during this program helped me to identify an indicator which may link to child pornography codes on the Internet to a potential target spot. In ' -this case, police computers should search behind the numbers linked to "210" which were related to the phone number for this escort service on TV as 1902 210 848. Applying all the previous codes and maps already outlined should then enhance Internet searches and police computer systems in their tracking and tracing of paedophiles attempting to target children through the Internet. Using this technique and applying it to my location at home, indicated that in the triad link, the youngest and third child target identified previously by the police would provide clues to who the next child target would be and what that child's profile was. This should be identified as a "c3" link on your systems and then mapped by police with their tracking of the potential perpetrator. An alert should be attached to children's codes here under a "skull" seal which computers should recognise as a high- risk area.

Step 7: The TV series also depicted a police vehicle during the program which had the number "184" on the police car. The next number sequences to link to this are numbers "189" and then "203" which I am able to identify intuitively and almost automatically because of the years I have invested into developing this system with the media. For police not able to achieve this on an instinctive basis, these numbers can be programmed into police computers to help officers on a technical level make the same connections.

The result is a IT sequence 184 : 189 : 203 which again if calculated correctly as a triad system results in the following number sequences; a) 5 = the gap between 184 and 189. (Code Gap I) b) 14 = the gap between 189 and 203. Code Gap II)

Step 8 : Add 5 + 14 together to = 19 and then use this number to consolidate all criminal trace codes linked to the USA. This number should be equated to the word "Stingers" which are codes for police systems that are attempting to identify criminal activities/records/tracks etc. In Australia the equivalent "Stinger" is number 9, again which I know already because of my years of work on this system. This also has a logical rationale as the USA equivalent contains (10+9) which incorporates the binary code (10) aspect of the system allowing consolidation with master computer systems connected to the USA where most computer systems in Australia have originated from.

Step 9: Add the numbers within the IT sequence as follows: a) 184 = 1 +8+4 = 13 = (1+3) = 4 b) 189 = 1+8+9 = 18 = (1+8) = 9 c) 203 = 2+3 = 5

The new triad ratio is now 4:9:5. This ratio sjiould help you align police vehicles and codes with the computer systems and particular job being attended to as well as providing you with numbers that help fill the gaps and minimise any slips in the net or mistakes. As such, the result is represented geometrically as follows:

This area represents the zone for your focus on solving the task at hand as described above.

Problem 2: Drug Trafficking - Heroin

Solution: Integrating lnterpol systems with Australian Police systems to help track illegal drug trafficking in Heroin.

Step 1 : Maximise computer power by aligning a "Top 5" computer system which incorporates computers linked to Microsoft, IBM, Apple Macintosh, Dell and HP in the USA. Code these systems with the colour "pink" initially and the number "5". Align this with systems under a similar alignment with equivalents being used in Asia linked to the Western systems through lnterpol under the code number 20 in black.

Step 2: Recognise on a local police level, lnterpol codes for each issue which in this case is as an example coded "black dragon", lnterpol would have details of these codes under this name as recognition of powerful criminal elite triads in Asia known by authorities to be dealers and traffickers in illegal drugs.

Step 3: Again a TV program called Walker on Channel Nine helped me to identify the appropriate links to this issue. In the example depicted on this show, references by the Texas Rangers trying to catch the "black dragons" were made in their conversation under the context of initials (PK). This immediately triggers a mental link to chewing gum as PK in Australia is sold as this kind of product and as such, then helps to create a new grid map with four levels, (P)(K)-(C)(G). Black dots in this system were aligned with these codes which indicated the white Heroin being targeted by the Rangers.

Note that a search sequence during the program by the rangers scanning for "black dots" to map to the black dragons resulted during the program in a file being erased on their computer systems. This provides an indicator that a search in this sequence is heading for a computer virus attack and should be linked to both anti-virus police computer systems and a code link aligned to (Pie Squared) as a bench mark, as well as the words (FID)-(LID). This should help tell IT experts that someone has made a "flip" or hack into Police computer systems which should then activate an automatic alert about a virus being on the way. According to depictions in the film, this virus if not identified will erase your files on the search near the codes for black dragon. Your antiviral software to address this should be coded "Fat Dragon" and then aligned with the Military Elite (EMC) using codes already known to the SAS Campbell Barracks and myself through an Art Exhibition held on 29-31 August 2003.

'4

Step 4: In this case, "Fat Dragon" shouid be allocated the following codes:

Level #1 - Cryptic Code (888) Level #2 - Cryptic Code (555) Result code = *206 for Fat Dragon

This can then be identified as a code colour in green zones from the SAS system that can then be aligned with Green Scanners as demonstrated by those currently being sold through Toy's-r-Us. The Green Scanner will then assist officers and personnel working in this area to trace and track the black dots linked to the Black Dragon's Heroin trail.

Step 5: Disguise this system from parties outside of the police and military in Australia by aligning these codes for Fat Dragon to a global code reference under "DDD" and the word "DOG's". This should then be integrated with telecommunication systems under IMEI as a SIM code numbered "666" and attached to the Special Airbourne Services in Western Australia.

Examples for this submission were completed and created by Michelle Pule with assistance of information provided through the media in programming on Channel Nine TV in WA and the sources listed above. Many thanks belong to my friends in the SAS for their tireless work on these codes behind the scenes