Oct 2019

Big Tech's Monopoly: How Google, Apple & Microsoft Control Access to the Internet by Rex M. Lee

image2

Coming Soon- The Vision Times

Download- Big Tech's Monopoly

Coming Soon- Vision Times,Oct 2019

August/September 2019 Issue

The Rise of Foreign Cybersecurity Threats by Rex M. lee Published by MissionCritical Communications

image3

Go to MissionCritical Communications Magazine to Read the Article- Page 34

Download: The rise of foreign cybersecurity threats

Published by MissionCritical Communications Magazine, Aug 2019

cybersecurity threats- Chinese & Russian apps

Google, Apple, & Microsoft Distribute Chinese Surveillance Technology via App Stores

image4

Article by The Epoch Times

Published Feb 25th, 2019

Chinese & Russian App Developers Distribute Intrusive Apps Via Google Play, Apple App Store, and MS

image5

Article by The Epoch Times

Published March 12th, 2019

corporate surveillance- Series of Articles by Rex M. lee

# 1- Surveillance Capitalism: Monetizing the Smartphone User

image6

Article Highlights 

  • Learn how Google, Apple, & Microsoft have monetized their operating system (OS) customers by way of the Android OS, Apple iOS, & Microsoft Windows OS.
  • App developers exploit smartphone users for financial gain at the expense of cybersecurity and privacy.

#2- Legal Malware (Apps): How Tech Giants Collect Personal & Professional Info Through Apps

image7

Article Highlights

  • Lean how tech giants such as Google, Apple, Microsoft, Amazon, Facebook, and Baidu (China) develop legal malware in the form of surveillance & data mining smartphone apps.
  • App developers collect personal and professional information leading to cybersecurity and privacy threats to app users.

#3- When Smartphone Terms of Use Become Cyber-Enslavement Agreements

image8

Article Highlights

  • Learn what you are agreeing to when you click on "I Agree" to accept the terms of use that support your smartphone.
  • Smartphone terms of use enable to app developers to exploit your personal & professional information for financial gain at the expense of your civil liberties, privacy, cybersecurity, and safety.

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

Step Big Brother- Corporate Surveillance Continued

#4/Part 1- Government Fails to Enforce Privacy, Telecommunication, & Consumer Laws

image9

Article Highlights

  • Learn how government agencies, law makers, and telecom providers are failing to enforce existing privacy laws meant to protect telecom/smartphone subscribers.


#4.1/Part 2- Smartphone Surveillance & Data-Mining: Who is Protecting Us?

image10

Article Highlights

  • Learn how companies such as Google enable nation-state companies from China, such as Baidu, to surveil and data mine U.S. citizens, teens, children, and business professionals for financial gain. 

#5/Part 1- Are Smartphone User Agreements & Harmful Technology Legal?

image11

Article Highlights

  • Facebook & Google develop addictive technology in the from of apps in order to exploit their product users for financial gain.
  • Smartphone terms of use that may be illegal according to existing consumer laws governed by the FTC and state AGs.

#5.1/Part 2- Are Smartphone User Agreements & Harmful Technology Legal?

image12

Article Highlights

  • Smartphone users are forced to participate regarding predatory surveillance & data mining business practices employed by Google, Apple, Microsoft, Amazon, Facebook, and other tech giants.
  • Users of smartphones, tablet PCs, and connected products are not giving lawful consent enabling tech giants to collect & use personal & professional info for financial gain.

#6- Business Users of Smartphones May BE Breaking the Law

image13

Article Highlights

  • Smartphone users who work within a confidential and protected environment, such as the defense industry, may be breaking the law when using a smartphone that is supported by the android OS and Apple iOS.
  • Tech giants such as Google, Apple, & Microsoft may be breaking the law by collecting confidential and protected information from business users of smartphones. 

#7- Google Distributes Surveillance Technology Developed by Chinese Company (Baidu)

image14

Article Highlights

  • The FTC, FCC, DHS, and telecom providers such as AT&T, Verizon, Sprint, & T-Mobile enable Google to distribute surveillance & technology developed by Baidu a nation-state company from China. 
  • Smartphones, tablet PCs, and PCs supported by apps developed by Chinese companies pose huge cybersecurity and privacy threats to the tech product user.

Step Big Brother- Corporate Surveillance Continued

#8- Facebook & Google Congressional Hearings: Meaningless Resolve & Phony Apologies

image15

Article Highlights

  • Article author, Rex M. Lee was an advisor to the Senate and House Judiciary Committees Regarding the 2018 Facebook and Google congressional hearings.  
  • This article exposes the fact that the senate and house judiciary committees did not address many cybersecurity & privacy threats Mr. Lee brought to both committees' attention.

#9- Apple's CES Privacy Claim is Misleading

image16

Article Highlights

  • This article exposes Apple's relationship with Google plus how Apple apps enable the app developer to surveil and data mine the Apple product user for financial gain.
  • Although iPhone users can prevent personal information such as contacts from being uploaded to iCloud, Apple apps still enabled app developers to collect personal information such as text messages and contacts from the iPhone user.

#10/Part 1- Telecom & Tech Giant Conflict of Interest (Antitrust) & Competition Violations- Part 1

image17

Article Highlights

  • This article exposes potential violation of antitrust & unfair competition laws associated with the relationship between telecom providers such as AT&T and technology providers such as Google, Apple and Microsoft.
  • People who do not want Google to collect their personal & personal information cannot escape Google by going to Apple.
  • Unfair competition practices employed by telecom and tech giants are stifling competition and innovation.

#10/Part 2- Telecom & Tech Giant Conflict of Interest (Antitrust) & Competition Violations- Part 2

image18

Article Highlights

  • Read Part 2 highlights cybersecurity and privacy threats posed by exclusive relationships between telecom providers, OS developers, and app developers such as AT&T, Google, and Baidu (China).
  • The FTC, FCC, state AGs, and law makers are failing to enforce existing laws associated with antitrust and unfair business competition.

#11- Smartphone Users Are Data Mined Even When Not Using The Apps

image19

Article Highlights

  •  This article exposes the fact that apps developed by Facebook and Amazon data mine users even when the user is not on the Facebook or Amazon platforms or using the apps.
  • Companies such as Amazon and Facebook are enabled to use their apps to collect personal and professional information from the app user that has nothing to do with the use of Facebook and Amazon products or platform.

Step big Brother- Corporate surveillance Conclusion

image20

#12/Part 1- The Need for an Electronic Bill of Rights

This two part article highlights the need for an electronic bill of rights to protect U.S. citizens, teens, children, and professionals from predatory surveillance and data mining business practices employed by tech giants such as Google, Apple, Microsoft, Amazon, Facebook, Baidu (China), Tencent (China), and Prisma Labs (Russia). 

#12.1/Part2- The Need for an Electronic Bill of Rights Part 2

 Read "The Need for an Electronic Bill of Rights Part 2" Published Feb 20, 2019 by the Epoch Times. 

May 2019

Can Social Media Users Trust Facebook? by Rex M. lee My Smart Privacy

image21

Article by The Wireless Messaging News

Published by May 10th

Download Article Below:

Download: Can Social media Users Trust Facebook?

Can Social Media Users Trust Facebook? by Rex M. Lee Published by The Wireless Messaging News, May 10th, 2019

Special report: Child Privacy threats by Rex m. lee

Big Tech Surveil Children For Profits: Google and Apple May be in Violation of Child Privacy Laws

image22

April 2019- The Wireless Messaging  News

To Read Article Click on Download Below:

Download: Tech Giants Surveil and Data Mine Children for profits by rex m. lee

Google Apps May Violate FTC COPPA Laws_RLee 02.22.2019 (pdf)

Download