SDP MULTIMEDIA GROUP

What is Seven Alpha (7A)

| Main Page | Home | Purchase | Practical Use | 3 Keys | 7A Detail Map | Legal References |

Historical and Legal Context of the Metaphors

Historically, Death represents the end of all power to act in the world of living persons and over property there. So arresting 'Death' means arresting the disruption of that authority.

Hell, in context to the old language, is more accurately translated as the abolition of existence than the metaphor of the garbage dump well know in Biblical times, and wrongly interpreted as fire and torture in evangelical era, to represent the utter destruction of any record or evidence that a person actually lived or existed - similar to erasing them from history and seizing credit for their works and acts, innovation, and deeds by larger collective groups they were assimilated by or outcast into. If the works of a person are their 'soul', then the destruction of their soul (works) would be the erasure of their deeds and all memory and name from history. In this context, the Legacy of the person would be obliterated, and so the concept of 'Hell' above and preservation of the same to the credit of individual and not to works of groups or outcome of society as some imaginary function of process or collective will, is preserved by this system as its core objective goal - a record of our community separate from the United States and other vulnerable government organizations subject to foreign econmic influence and takeover.

The Grave is the physical representation of the body being decomissioned and removed out-of-sight and beneath the earth (grave) so it shall no longer have standing or be used as a legal thing in matters at state by anyone. To literally 'walk out of the grave' is to walk in legal standing from a place having none to the square which bestows the rights of individual personhood and powers associated with the being of a living person. This power, too, afforded by the estate planning of the contracts and conditions codified for use by vendors and the estate at-law represented by the Key system which survives the physical death of its original agent in perpetuity - including all the rights bestowed upon it and the option to continue to exercise those rights with consent of the other parties in contract a legal thing at law among Seven Alpha partners and the designated survivor/heir of the estate, without right to sale or other use in Commerce or transfer for lesser circumstance. This concept, the same element in contract as a security for financial instruments, disbarring any money or commodity and limited solely to persona, suffrage, access rights, social media authority, and other privileges at-law, also conditional terms and service and use.

The cryptographic identity, registration, and access framework of Seven Alpha therefore seeks to arrest other automatic procedures at law which are afforded the right under Trust and estate rules a civil contract at law, and establish in trustee a stewardship over the affairs and protection of such data as afford certain advantage for partners and members and other API consumers, including strong user control and privacy rights.

This is, in a small way, a metaphorical stab at "defeating death, hell, and the grave" as relayed in the story of Jesus of Nazareth with respect to his time during Passover and popular stories in the evangelical tradition of Southeastern Oklahoma, and its relationship to the domain:

http://www.deathhellandthegrave.com

...and the related core registry of users (The Book of Life) governing the service Seven Alpha. The theme is recurring, such as reference to the "Seven Seals" of Revalations as the "Seven Gates" of the VPN network routing mesh, ephermal IP end-point-netwrok, and citation of the "Ninth Gate" (a citation to 'The Nine Doors to the Kingdom of Shadows' in the Roman Polanski movie on the screenplay by Enrique Urbizu in 1999.) The original book (a work of fiction, published in 1993) as "The Club Dumas" https://en.wikipedia.org/wiki/The_Club_Dumas.

The illustrations of which, including moving gates and doors, inspired the concepts in advanced networking and cloud servers employed for Seven Alpha security. The concept that you could walk through a door and be free of mortal contraints fascinated the writer to consider the legal ramifications and requirements in context to business law, information services, network security, and privacy rights.

As Crypto evolved into multi-key multi-factor solutions and instanced cloud technology infrastructure, the metaphor of the 'seven gates' and ninth gate (administration) access control evolved to abstract the concepts that would bore more non-programmers to tears (PKI, key stores, digital signing, etc). At risk of upsetting traditional Christian audiences, the metaphor dramatically cuts a path down analytical conversations of security versus non-germaine hate speech from users who traditionally win by 'shouting down' their opponents and overplaying their skills to intimidate other vendors and customers against criticism and report of illegal activity in backbone optical transport and high volume data network services, where state sponsorship to promote censorship and wiretapping directly threaten users rights to the extent a network like Seven Alpha is now necessary. As with shippping, the amount of goods a vendor can move is not nearly as important as the security and privacy of their movement. Efforts to disrupt that movement by large monopolies in optical transport against many smaller vendors using forged Denial of Service (DoS) and violent fraud tactics by Texas and Michigan companies prompted the Seven Alpha concept into formal development.

Contrary regular VPN services, Seven Alpha provides valid user information to combat abuse by customers of other customers and services, limiting service to maximize business throughput while monitoring and arresting beligerant traffic and removing bad actors proactively.

Effort to discredit or mar the service based on superstition or lack of access arise mostly from volume wholesale public Internet Exchanges (IX) whose practices of scraping data and selling access are threatened by strong cryptographic data services and next-generation privatized Internet with national ownership limitations. The Seven Alpha technology would disbar large foreign state investors in the United States and other countries vulnerable to wholesale wiretapping and espionage at the carrier and exchange level, and reveal true ownership via shell companies a number of foreign owners who represent a clear threat to national security of nations in which they are seeking expansion.

Like the work of Julian Assange and Phil Zimmerman, the impact on United States network services and policies if Seven Alpha products gain traction is substantian. Encryption has never been a strong platform for national security interest in transparency of civilian communication, contrary the best practices and abuses evident in 2001-2019 assault on the Oklahoma firm developing Seven Alpha. Encryption is in the interest of National Security, so much so that military networks will not even share trunk access with the services used by civilian businesses, citing national security concerns.

Some States, like STATE OF TEXAS, also object - as they rely on forfeiture laws to compel citizens to comply with fraud before the Federal Treasury for monies in excess of $70 billion USD per year, and such laws have been (recently) ruled unconstitutional and illegal for over 200 years per the SCOTUS ruling in 586 U.S. case 17-1091 and 588 U.S. case 17-647 right to relief contrary sovereign immunity claims of STATE OF TEXAS in these matters, tainting the United States Patent and Trademark Registry by such unlawful and illegal actions since 2001 August in support of their optical telecom and related securities markets jointly with STATE OF MICHIGAN, STATE OF CALIFORNIA, and STATE OF NEW YORK - executing large capital finance rounds similar to ENRON and MCI WORLDCOM again through NATION OF JAPAN and PEOPLE'S REPUBLIC OF CHINA state-fund investment.

Private networks like Seven Alpha are therefore vital, just as an impartial judge might have been in the case of Pontius Pilot at the Trial of Jesus, and resulting crucifixion to 'please the Jews' rather than comply with the Rule of Law; a Hegelian Dialectic decision if ever there was one.

In terms of Internet security and privacy, control over contact, and harassment - a civil death can have all the same impact in our society and workplace rights as a physical death, rendering a person 'legally dead' while their body remains alive to suffer the 'invisible' (inferior) treatment and exploitation of human trafficking, debt-bondage, and other forms of abuse barred by 22 USC Chapter 78 and 21 O.S. 21-748.1, generaly themed "genocide" by removal of children, loss of economic right to work, emotional and psychological abuse, deprivation of care and basic services, and other forms of injury themed "serious injury" in 18 USC 1589 Federal Law, a felony even when performed by State agents and court officers as a procedure at law, per Supreme Law in "The Convention on the Prevention and Punishment of the Crime of Genocide"; as exposed in case 01-17702-R and "FR-18-04", a civil suit themed "automatic mistrial" and refused 45 CFR 303.6 rule and protection at law to embezzle (18 USC 666) from the Treasury of the United States from 2001-2019. These concepts, in civil death, also strongly contributed to the design and language of Seven Alpha, to compare the right of return and remedy guaranteed under Oklahoma Constitution Article II section II-6 with the raising of Lazarus in the Biblical fable, and threat that such revalation posed to the Sanhedrin, as well as to the fable of of Hiram Abiff as killed and concealed under a sprig of Acacia. Like the allegory, Seven Alpha relies on metaphors to guard secrets of design (also protected at law by the Oklahoma Trade Secrets Act).

§21-1732. Larceny of trade secrets – Applicability of section.

    A. Any person who, with intent to deprive or withhold from the owner thereof the control of a trade secret, or with an intent to appropriate a trade secret to his or her own use or to the use of another:

      (a) steals or embezzles an article representing a trade secret, or,

      (b) without authority makes or causes to be made a copy of an article representing a trade secret, shall be guilty of larceny under Section 1704 of this title. For purposes of determining whether such larceny is grand larceny or petit larceny under this section, the value of the trade secret and not the value of the article shall be controlling.

    B.

      (a) The word "article" means any object, material, device, customer list, business records, or substance or copy thereof, including any writing, record, recording, drawing, sample, specimen, prototype, model, photograph, microorganism, blueprint, information stored in any computer-related format, or map.

      (b) The word "representing" means describing, depleting, containing, constituting, reflecting or recording.

      (c) The term "trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, customer list, business records or process, that:

        1. derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and

        2. is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

      (d) The word "copy" means any facsimile, replica, photograph or other reproduction of an article, including copying, transferring and e-mailing of computer data, and any note, drawing or sketch made of or from an article.

    C. In a prosecution for a violation of this act, it shall be no defense that the person so charged returned or intended to return the article so stolen, embezzled or copied.

    D. The provisions of this section shall not apply if the person acted in accordance with a written agreement with the person’s employer that specified the manner in which disputes involving clients are to be resolved upon termination of the employer-employee relationship.

    Added by Laws 1968, c. 110, §§ 1 to 3, emerg. eff. April 1, 1968. Amended by Laws 1986, c. 85, § 12, eff. Nov. 1, 1986; Laws 2009, c. 287, § 1, eff. Nov. 1, 2009.


What this means is, asking for technical plans or details beyond the metaphor as a condition of right to operate a business or make claims or offers shall be construed as felony criminal activity and treated as such. Do not fail to regard the law in this matter. Elements of the Seven Alpha™ product are protected by Trade Secret and subject to the prior statutory rule verbatim. Seven Alpha™ is a registered trademark in the State of Oklahoma.

For more infomration, see: Blackmail, extortion, and felony rules in Oklahoma.

Copyright © 2019 SHADOWDANCERS LLC - ALL RIGHTS RESERVED.