If the Intelligence Community is Doing Their Job,
Then One is Never Supposed to Know.
To Expose Would be A Lay Man’s Rabbit Hole to Insanity.
To Prove its Existence Would be to Question Sanity.
Best Viewed on a Desktop.

High Value Persons of Interest:
Over the next year, there will be weekly additions to this section, until all known members are disclosed to the public & domestic and concerned foreign intelligence officials. The information is presented in a weekly format to drive a deeper understanding. The formal series will begin on Memorial Day 2024 (May 27, 2024) and continue thereafter for 52 weeks.
To people outside the intelligence field: verifying names and backgrounds is as thorough as a deep undercover investigation. Those versed in this identity crafting process grasp how tough it is to identify and reveal the truth.
To domestic and foreign intelligence officials: this style of psychological torture (as confirmed by medical experts) is known as "advanced interrogation," widely known in select academic and intelligence groups worldwide for its covert use cases and practical biomedical engineering applications.
The individuals presented below have direct, indirect, or causal linkage to members of society at the highest levels of covert and public life. They are engaged either directly or indirectly with these classified civilian operations.
This website is an autobiographical account and represents my personal perspective of encounters and experience with these organizations and individuals. Vested parties are urged to conduct their own due diligence prior to forming opinions, as applicable or permissible under domestic and/or international law.
- - - - - - - - - - -
Dear Reader,
As a civilian, I have directly met the below individuals (both domestically and internationally) and can confidently justify this exposé. The purpose is to draw attention to the structured and systematic electronic, psychological, physical, emotional, and sexual abuses conducted directly and indirectly by these individuals. These individuals (some as students, some as public figures, and others in various capacities) pose a threat to both domestic security and the security of foreign governments where they have either worked or traveled, likely under false identity or premise. The individuals below are concerning for both civilians and governments.
It is important for those reading to understand that as a Stern graduate, most if not all graduates can traverse business fields with an ease and poise not afforded to most of the population. It is with this backdrop to understand why a graduate would choose to go down this route. Are there moral justifications? Yes. Are there ethical justifications? Yes. But this is not the motive.
Business has many gray areas. But to conduct structured and systematic electronic, psychological, physical, emotional, and sexual abuses to elementary school aged children and adults alike is not. To use advanced biomedical engineering and cutting-edge computer science to administer this torture is not. The abuses which will be shared will demonstrate how children working near me were structurally tortured, in addition to countless others including myself. It is one thing to torture adults for experimental value. It is different to torture children.
My story begins my Freshman Year, and the identities below will showcase a life lived much like a character in your favorite psychological spy thriller. Students who are not students, companies which are fronts, and surveillance and technology that are only seen in the movies. I am neither. But my lived life and my “by design” close proximity with those in this life will provide a glimpse into the realities faced by everyday Americans and innocent foreign citizens at the hands of intelligence officials masquerading as agents of national security while using unsuspecting civilians for covert biomedical and psychological operations. There is no intelligence gathering through these efforts in most, but not all use cases (certain counter-surveillance applications are in fact demonstrably effective). But there is an advancing of science through unwitting control groups. This exposé is concerned with the latter group.
To truly understand this and unveil the participants who conduct this type of advance interrogation on unwitting students (both as a form of “practical” counter intelligence and unconscionable human experimentation), one must understand that unlike your favorite thriller, this will take far more than 90 minutes to understand. Deep cover identities and covert civilian operations, including the one conducted at NYU Stern between 2009-2013, are not simply unveiled. As discussed in my closing thoughts, the most vested parties to this information and egregious abuses will not question this information in the same light as the average reader. Remember, in this business individuals neither confirm nor deny. The mere establishment of their existence poses an existential threat. Humbly, I would encourage reserving judgement or elementary analysis, as the techniques employed in these operations are far more complex and structured than what you may ever be able to truly understand. The world in which I will take you will depict some of the most cutting-edge intelligence capabilities and shed light into advanced interrogation techniques using biomedical engineering and computer science. If you have heard of any of these technologies, it is likely that you are mistaken. For those familiar with or in this line of work, the future blog posts will not be relevant.
By nature, due to the work of intelligence professionals, rape, torture, illegal surveillance, coercion, intimidation, and forced substance abuse, amongst a whole host of other crimes which are likely to land you in prison for multiple life sentences, are commonplace. Imagine your roommate or neighbor is a foreign national suspected of being in-country under false pretense. Certain deep cover operatives, as students or casual acquaintances, are designed to systematically build rapport, surveil, interrogate and determine if suspected parties are in fact honest individuals or intelligence operatives. While this counterintelligence is commonplace across campuses both in the United States and internationally, there are far more sinister use cases which take place every day on unsuspecting students and civilians, on and off the campus. This exposé is concerned with the latter use case.
Closing thoughts. For most, these writings will be nothing more than a glance, for others a bit more involved. The parties which are most vested are largely within foreign institutions. They understand and appreciate the severity of not simply these claims, but the knowledge and identities of the individuals who have directly and indirectly worked with their public and private concerns to subvert their national and security interests. The extent of damage caused to these institutions by these individuals is their own individual concern. For many in these communities, my identity or exposé will not come as a surprise.
Thank you.
Kapeesh K Shah
— — —
As more individuals are added to this High Value Persons of Interest List, each image will provide a detailed explanation of initial encounter, post-initial encounters, biographical, conversational, and implied identity discussion information. Certain information is rooted in remote interrogation techniques and will be detailed throughout the coming year.
Person 001: Dr. Klaus Kleinfeld
Person 002: Nikmal Abdullah.
Person 003: Ben Arendt.
Person 004: Coming Soon.
Person 005: Coming Soon.
Person 006: Grace Paulsen.
Person 007: Coming Soon.
Person 008: Ashby Taylor.
Person 009: Coming Soon.
Person 010: Coming Soon.
Person 011: Coming Soon.
Person 012: Coming Soon.
Person 013: Paul Bruno.
Person 014: Coming Soon.
Person 015: Coming Soon.
Person 016: Coming Soon.
Person 017: Coming Soon.
Person 018: Coming Soon.
Person 019: Coming Soon.
Person 020: Coming Soon.
Person 021: Coming Soon.
Person 022: Coming Soon.
Person 023: Coming Soon.
Person 024: Coming Soon.
Person 025: Coming Soon.
Person 026: Coming Soon.
Person 027: Coming Soon.
Blog: An Educational Series into “Biomedical” Re-education and Advanced Interrogation
Over the next year, this blog will provide a detailed view into the systematic and disciplined torture conducted to myself and others around me, including children as young as Age 4. To document almost 14 years of experience is no easy feat.
For those unfamiliar with covert intelligence operations, these narratives will showcase electronic, psychological, physical, emotional, and sexual abuses conducted to ordinary people, both domestically and internationally (unsuspecting foreign citizens) from the ages of 4 to 65.
For those working within the Intelligence Community (IC) or academics and leading experts in these fields, you are already familiar with these interrogative, biomedical, and neurological methods. You already know the nature and direction of these and future writings. It is not new information and this does not apply to you.
Now, back to the license plate image you saw when you first landed on this site. While “on the nose” and obvious, this image should not mean anything, yet.
Introduction to this website, its purpose, and general expectations. (Coming Soon)
Controlled Environment and Virtual Reality: Using biomedical engineering to reeducate educated individuals like dogs. (Coming Soon)
Disciplined execution of humans covertly through biomedical engineering.
