Hard hitting Privacy, Cyber Security, and tech Journalism!

Research, Analysis, and Investigative Reporting by Tech and Telecom Industry Insider Rex M. Lee

Breaking News-John Loeffler, steel on steel news radio, interviews Rex m. lee!

Listen to the Explosive Interview that was Published on 03.23.2019

image1

Listen to the Interview by Clicking on the Button Below.  The interview exposes civil liberty, privacy, cyber security, and safety threats associated with surveillance and data mining business practices employed by Google, Apple, Microsoft, Amazon, Facebook, Baidu (China) and other tech giants.  Lean how tech giants collect and use your personal and professional information.

Steel on Steel Interview with Rex

money masters TV (PBS) makes news at Ceraweek 2019, Houston, TX march 11 to 15

Money Masters TV Scores Question at Rick Perry Press Conference

image2

Kimberly Calhoun, Host Money Masters TV, Questions Rick Perry on Cyber Security at Wednesday's Press Briefing 03.13.2019

Money Masters TV Asks the Hard Questions Regarding Cyber Security- NRG CEO Mauricio Gutierrez

image3

Rex M. Lee, Associated Producer & Tech Journalist, Money Masters TV, Questions NRG CEO, Mauricio Gutierrez, about Great Power Competition  from China and Russia at Thursday's Press Briefing 03.14.2019

Money Masters TV Interviews Top CEOs and Sr. Executives at CERAWeek 2019

image4

Associate Producer Rex M. Lee Coordinates Interviews For Money Masters TV at CERAWeek 2019.  Kimberly Calhoun, Host, Interviews Mike Train, CEO, Emerson, Casey Fleming, CEO, BLACKOPS Partners, Michelle Pflueger, GM Chevron, T.A. (Tom) Moroney, Sr. Director - Operations Technology, Chesapeake Energy, and Others!

Money Masters TV Connects with Andy Jaffy, CEO, Amazon AWS, During Session

image5

Rex M. Lee, Associate Producer & Tech Journalist, Connects with Andy Jaffy, Amazon aws, CEO,  about Cyber Security & a future interview for Money Masters TV 03.11.2019

U.S. Senator Lisa Murkowski Visits With Money Masters TV at CERAWeek 2019

image6

Kimberly Calhoun, Host, Chats with Senator Murkowski about Cyber Security, Her Career as a Senator, & Financial Literacy on 03.11.2019

Contact Associate Producer Rex M. Lee to be Interviewed on Money Masters TV (PBS) Year Round. You could be our next interview!

image7

Money Masters TV is associated with PBS and BIZ TV.  Money Masters TV reaches over 40 million viewers in syndication.  Contact Rex at (210) 639.6035 for more information.

breaking news by Rex m. lee: Chinese and Russian companies exploit flaw in u.s. Cybersecurity: are google and apple violating sanctions against china and Russia?

Breaking News by Rex M. Lee- Google, Apple, & Microsoft Distribute Chinese Surveillance Technology- The Epoch Times

image9

Google, Apple, and Microsoft Distribute Chinese Surveillance Tech

This article by Rex M. Lee exposes threats from nation-state companies from China to our national security by way of intrusive apps that support smartphones, tablet PCs and connected products in general.  Published February 25, 2018 by The Epoch Times

Read the Explosive Article

Featured Article- The Need for an Electronic Bill of rights

image10

The Need for an Electronic Bill of Rights Part 1

Read "The Need for an Electronic Bill of Rights Part 1" Published Feb 20, 2019 by the Epoch Times.

Read The Article

The Need for an Electronic Bill of Rights Part 2

 Read "The Need for an Electronic Bill of Rights Part 2" Published Feb 20, 2019 by the Epoch Times. 

Read The Article

Articles by Tech and telecom industry insider- Rex m. lee

The Epoch Times Author Page- Rex M. Lee

image11

Read tech and telecom articles by Rex M. Lee.

The Epoch Times New York City.


Epoch Times Author Page: Rex M. Lee

Article- The Epoch Times

image12

Read "Smartphone App User Are Data Mined Even When Not Using the Apps" Published Feb 13, 2019 by The Epoch Times.  This article exposes the fact that apps such as Facebook and Amazon data mine users even when the user is not on the Facebook or Amazon platforms or using the apps.

Read The Article

Article- The Epoch Times

image13

Read "Telecom and Tech Giant Conflict of Interest and Competition Violations: Part 1" Published Jan 30, 2019 by The Epoch Times.  This article exposes potential violation of antitrust & unfair competition laws between telecom providers such as AT&T and technology providers such as Google, Apple, Microsoft, Amazon, Facebook and others. 

Read The Article

Article- The Epoch Times

image14

Read "Telecom and Tech Giant Conflict of Interest and Competition Violations: Part 2" Published Feb 1, 2019 by The Epoch Times 

Read The Article

Article- The Epoch Times

image15

Read "Apple's CES Privacy Claim is Misleading" Published Jan 11, 2019 by The Epoch Times.  This article exposes Apple's relationship with Google plus how Apple apps enable the developer to surveil and data mine the Apple product user for financial gain.  

Read The Article

Article- The Epoch Times

image16

Read "Facebook and Google Congressional Hearings: Meaningless Resolve and Phony Apologies" Published Dec 06, 2018 by the Epoch Times. Mr. Lee was an advisor to the Senate and House Judiciary Committees Regarding the 2018 Facebook and Google congressional hearings.  This article exposes the fact that the senate and house judiciary committees did not address many issues Mr. Lee brought to both committees' attention.

Read The Article

More Articles by Rex m. Lee

Article- The Epoch Times

image17

 Read "Google Distributes Surveillance Technology Developed by Chinese Company (Baidu)" Published Dec 19, 2018 by the Epoch Times. This article exposes surveillance and data mining technology, associated with the Samsung Galaxy Note smartphone, developed by Google and Baidu a nation-sate Chinese company and Google content developer. 

Read The Article

Article- The Epoch Times

image18

 Read "Business Users of Smartphone May Be Breaking the Law" Published Dec 4, 2018.  This article exposes the fact that smartphone users who work within a confidential and protected environment such as the defense industry and government may be breaking the law when using a smartphone that is supported by the android OS and Apple iOS due to Google and Apple's surveillance and data mining business practices. 

Read The Article

Article- The Epoch Times

image19

Read "Are Smart Phone User Agreements and Harmful Technology Legal? Part 1" Published Nov 7, 2018.  This article focuses on the legality regarding Facebook and Google addictive apps that are supported by terms of use that may be illegal according to existing consumer laws governed by the FTC and state AGs.

Read the Article

Article- The Epoch Times

image20

 Read "Are Smart Phone User Agreements and Harmful Technology Legal? Part 1" Published Nov 27, 2018.  

Read The Article

Article- The Epoch Times

image21

 Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 1" Published Nov 1, 2018.  This article centers in on the fact that government agencies, law makers and telecom providers are not protecting telecom product users from predatory surveillance and data mining business practices employed by tech giants such as Google, Apple, Microsoft, Amazon, Facebook and others

Read The Article

Article- The Epoch Times

image22

 Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

Read The Article

Article- The Epoch Times

image23

Read "When Smartphone Terms of Use Become Cyber-Enslavement Agreements" Published Oct 23, 2018. This article highlights the legality regarding the terms of use that support smartphones, tablet PCs, connected products and PCs.  The article features the fact that tech terms of use are predatory, intrusive, exploitative, and possibly illegal according to existing consumer laws.

Read The article

Article- The Epoch Times

image24

Read "Legal Malware: How Tech Giants Collect Personal Info Through Apps" Published Oct 16, 2018.  This article exposes how telecom and tech giants use intrusive apps to collect highly confidential telecom related personal and professional information known as a person's Digital DNA.  The article highlights how telecom and tech giants exploit a person's Digital DNA for financial gain at the expense of the smartphone user's civil liberties, privacy, cyber security and safety.

Read The Article

Article- The Epoch Times

image25

 Read "Surveillance Capitalism: Monetizing the Smartphone User" Published Oct 14, 2018.  This article features the fact that telecom and tech giants have monetized  their paying customers.  This means that telecom and tech giants view their paying customers as commodities to be exploited for financial gain without compensating the telecom and tech user.  The articles highlights the fact that telecom and tech product users are being exploited for financial gain at the expense of the product user's civil liberties, privacy, cyber security and safety.

Read the article

MissionCritical Communications Magazine

image26

 Read "What Surveillance Capitalism Means For You" Published April 1, 2018.  This article features privacy and cyber security threats posed by smartphones, tablet PCs, voice automated assistants, connected products, and PCs supported by the android OS, Apple iOS and Microsoft Windows OS.  This article was featured on the cover of the magazine.  Click on the Read the Article Button below to link to MissionCritical and search April 2018 to locate the article.

Read the Article

MissionCritical Communications Magazine

image27

  Read "Is Your Smartphone Secure" Published June 1, 2017.  This article exposes surveillance and data mining business practices employed by Google, Apple and Microsoft.  The articles exposes the fact that smartphones are not private, secure, or safe forms of telecommunications and computing.   Click on the Read the Article Button below to link to MissionCritical and search June 2017 to locate the article. 

Read The Article

Visit with Rex M. Lee at IWCE 2019

image28

Mr. Lee will be moderating a cybersecurity panel, speaking solo and participate on a panel for FirstNet at this year's IWCE taking place March 4 - 7, 2019.

Rex M. Lee Speaker Page

About My Smart Privacy

Background Info- Rex M. Lee

image29


Mr. Lee has over 35 years of tech and telecom industry experience which includes enterprise platform and software development.  


Mr. Lee is a privacy and data security advisor centered on telecommunications and connected technology.


Mr. Lee is a Senior Tech and Telecom Analyst for BLACKOPS Partners in Washington, D.C.


Mr. Lee is an associate producer, writer, and contributor for Money Masters TV (PBS/BIZ TV).


Mr. Lee is a freelance technology journalist. Mr. Lee writes articles for MissionCritical Communications Magazine, Money Masters, The Wireless Messaging News, and The Epoch Times (NYC, NY).  


Mr. Lee is an experienced public speaker. Mr. Lee speaks at trade shows centered on the defense industry and critical infrastructure.  


Since 2013, Mr. Lee has been researching the terms of use and preinstalled ("rooted") content (apps, etc.) that support smartphones, tablet PCs, and connected products which are supported by the android OS, Apple iOS and Microsoft Windows OS.  


Mr. Lee has written numerous smartphone, tablet PC, and connected product terms of use and preinstalled ("rooted") content reports & analysis.  The smartphone, tablet PC, and connected product reports have exposed civil liberty, privacy, cyber security, and safety threats associated with smartphones, tablet PCs and connected products supported by the android OS, Apple iOS and Microsoft Windows OS.  


Mr. Lee's smartphone, tablet PC, and connected product reports have been submitted to the Department of Homeland Security ("DHS"), FCC, FTC, State AGs, law makers, AT&T, T-Mobile, Google, Apple, and Samsung.


Mr. Lee's Samsung Galaxy Note smartphone terms of use and preinstalled content report, and analysis was used by the Department of Homeland Security for the DHS Study on Mobile Device Security which was published in April of 2017.


Mr. Lee is the only person in the world to have leveraged T-Mobile and Verizon into admitting that smartphones, tablet PCs, and connected products supported by the android OS, Apple iOS and Microsoft Windows OS are not private, secure, or safe due to preinstalled surveillance and data mining technology in the form of apps, widgets, and other intrusive content developed by Google, Apple, and Microsoft:


T-Mobile Admission: “We, too, remember a time before smartphones when it was reasonable to conclude that when you activated service with T-Mobile that only T-Mobile would have access to our personal information. However, with the Samsung Galaxy Note, the iPhone, and many other devices, there are indeed a variety of parties that may collect and use information.” — T-Mobile Privacy Team (FCC Consumer Complaint #423849 Filed by Rex M. Lee/Public Record).


Verizon Admission: “We have reviewed your request at the highest levels of our organization and have confirmed that the only solutions to make a phone private and secure are available through third parties, not directly from Verizon…. Additionally,  Verizon is not equipped to address preinstalled solutions or applications on any device” – July 02, 2018


Mr. Lee was a key advisor for two U.S. Senators plus the Senate and House Judiciary Committees regarding the Facebook and Google congressional hearings that took place in 2018 involving Mark Zuckerberg, CEO/Chairman, Facebook, and Sundar Pichia, CEO, Google.


Mr. Lee is providing valuable information pertaining to surveillance and data mining business practices employed by tech and telecom giants to the public for free.


Contact Rex M. Lee at: RLee@MySmartPrivacy.com or (210) 639-6035