breaking news august 2019

The Rise of Foreign Cybersecurity Threats by Rex M. lee Published by MissionCritical Communications

image2

Go to MissionCritical Communications Magazine to Read the Article- Page 34

Read The Article

news May 2019

Can Social Media Users Trust Facebook? by Rex M. lee My Smart Privacy

image3

Article by The Wireless Messaging News

Published by May 10th

Download Article Below:

Download: Can Social media Users Trust Facebook?

Can Social Media Users Trust Facebook? by Rex M. Lee Published by The Wireless Messaging News, May 10th, 2019

Special report: Child Privacy threats by Rex m. lee

Big Tech Surveil Children For Profits: Google and Apple May be in Violation of Child Privacy Laws

image4

April 2019- The Wireless Messaging  News

To Read Article Click on Download Below:

Download: Tech Giants Surveil and Data Mine Children for profits by rex m. lee

Google Apps May Violate FTC COPPA Laws_RLee 02.22.2019 (pdf)

Download

Government fails to protect citizens & children from exploitative and harmful technology!

Government Fails to Enforce Existing Privacy, Telecommunication, & Consumer Laws!

image5

Article by Rex M. Lee- The Epoch Times

Read the article

Are Smartphone User Agreements and Harmful Technology Legal Part 1

image6

Article by Rex M. Lee- The Epoch Times

Read The Article

Are Smartphone User Agreements and Harmful Technology Legal Part 2?

image7

Article by Rex M. Lee- The Epoch Times

Read The Article

Featured tech articles: Government Fails to Enforce existing privacy laws!

Chinese & Russian App Developers Distribute Intrusive Apps Via Google Play, Apple App Store, and MS App Store!

image8

Article by The Epoch Times

Published March 12th, 2019

Read the article

Google, Apple, & Microsoft Distribute Chinese Surveillance & Data Mining App- WeChat Posing Cybersecurity & Privacy Threats to App User!

image9

Article by The Mercury News

Published Feb 2th, 2019

Read The Article

Breaking tech news by my smart privacy 05.11.2019

Big Tech & Telecom Conflict of Interest: Antitrust & Unfair Business Competition- Part 1 & 2

image10

Article by Rex M. Lee- The Epoch Times

Published Part 1 Jan 3oth/Part 2 Feb 1st

Read The Article

Step Big Brother- 13 Part Series of Articles by Tech Industry Insider Rex M. Lee

# 1- Surveillance Capitalism: Monetizing the Smartphone User

image11

Article Highlights 

  • Learn how Google, Apple, & Microsoft have monetized their operating system (OS) customers by way of the Android OS, Apple iOS, & Microsoft Windows OS.
  • App developers exploit smartphone users for financial gain at the expense of cybersecurity and privacy.

Read the article

#2- Legal Malware (Apps): How Tech Giants Collect Personal & Professional Info Through Apps

image12

Article Highlights

  • Lean how tech giants such as Google, Apple, Microsoft, Amazon, Facebook, and Baidu (China) develop legal malware in the form of surveillance & data mining smartphone apps.
  • App developers collect personal and professional information leading to cybersecurity and privacy threats to app users.

Read The Article

#3- When Smartphone Terms of Use Become Cyber-Enslavement Agreements

image13

Article Highlights

  • Learn what you are agreeing to when you click on "I Agree" to accept the terms of use that support your smartphone.
  • Smartphone terms of use enable to app developers to exploit your personal & professional information for financial gain at the expense of your civil liberties, privacy, cybersecurity, and safety.

Read The article

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

Step Big Brother- Corporate Surveillance Continued

#4/Part 1- Government Fails to Enforce Privacy, Telecommunication, & Consumer Laws

image14

Article Highlights

  • Learn how government agencies, law makers, and telecom providers are failing to enforce existing privacy laws meant to protect telecom/smartphone subscribers.


Read The Article

#4.1/Part 2- Smartphone Surveillance & Data-Mining: Who is Protecting Us?

image15

Article Highlights

  • Learn how companies such as Google enable nation-state companies from China, such as Baidu, to surveil and data mine U.S. citizens, teens, children, and business professionals for financial gain. 

Read The Article

#5/Part 1- Are Smartphone User Agreements & Harmful Technology Legal?

image16

Article Highlights

  • Facebook & Google develop addictive technology in the from of apps in order to exploit their product users for financial gain.
  • Smartphone terms of use that may be illegal according to existing consumer laws governed by the FTC and state AGs.

Read the Article

#5.1/Part 2- Are Smartphone User Agreements & Harmful Technology Legal?

image17

Article Highlights

  • Smartphone users are forced to participate regarding predatory surveillance & data mining business practices employed by Google, Apple, Microsoft, Amazon, Facebook, and other tech giants.
  • Users of smartphones, tablet PCs, and connected products are not giving lawful consent enabling tech giants to collect & use personal & professional info for financial gain.

Read The Article

#6- Business Users of Smartphones May BE Breaking the Law

image18

Article Highlights

  • Smartphone users who work within a confidential and protected environment, such as the defense industry, may be breaking the law when using a smartphone that is supported by the android OS and Apple iOS.
  • Tech giants such as Google, Apple, & Microsoft may be breaking the law by collecting confidential and protected information from business users of smartphones. 

Read The Article

#7- Google Distributes Surveillance Technology Developed by Chinese Company (Baidu)

image19

Article Highlights

  • The FTC, FCC, DHS, and telecom providers such as AT&T, Verizon, Sprint, & T-Mobile enable Google to distribute surveillance & technology developed by Baidu a nation-state company from China. 
  • Smartphones, tablet PCs, and PCs supported by apps developed by Chinese companies pose huge cybersecurity and privacy threats to the tech product user.

Read The Article

Step Big Brother- Corporate Surveillance Continued

#8- Facebook & Google Congressional Hearings: Meaningless Resolve & Phony Apologies

image20

Article Highlights

  • Article author, Rex M. Lee was an advisor to the Senate and House Judiciary Committees Regarding the 2018 Facebook and Google congressional hearings.  
  • This article exposes the fact that the senate and house judiciary committees did not address many cybersecurity & privacy threats Mr. Lee brought to both committees' attention.

Read The Article

#9- Apple's CES Privacy Claim is Misleading

image21

Article Highlights

  • This article exposes Apple's relationship with Google plus how Apple apps enable the app developer to surveil and data mine the Apple product user for financial gain.
  • Although iPhone users can prevent personal information such as contacts from being uploaded to iCloud, Apple apps still enabled app developers to collect personal information such as text messages and contacts from the iPhone user.

Read The Article

#10/Part 1- Telecom & Tech Giant Conflict of Interest (Antitrust) & Competition Violations- Part 1

image22

Article Highlights

  • This article exposes potential violation of antitrust & unfair competition laws associated with the relationship between telecom providers such as AT&T and technology providers such as Google, Apple and Microsoft.
  • People who do not want Google to collect their personal & personal information cannot escape Google by going to Apple.
  • Unfair competition practices employed by telecom and tech giants are stifling competition and innovation.

Read The Article

#10/Part 2- Telecom & Tech Giant Conflict of Interest (Antitrust) & Competition Violations- Part 2

image23

Article Highlights

  • Read Part 2 highlights cybersecurity and privacy threats posed by exclusive relationships between telecom providers, OS developers, and app developers such as AT&T, Google, and Baidu (China).
  • The FTC, FCC, state AGs, and law makers are failing to enforce existing laws associated with antitrust and unfair business competition.

Read The Article

#11- Smartphone Users Are Data Mined Even When Not Using The Apps

image24

Article Highlights

  •  This article exposes the fact that apps developed by Facebook and Amazon data mine users even when the user is not on the Facebook or Amazon platforms or using the apps.
  • Companies such as Amazon and Facebook are enabled to use their apps to collect personal and professional information from the app user that has nothing to do with the use of Facebook and Amazon products or platform.

Read The Article

Step big Brother- Corporate surveillance Conclusion

image25

#13/Part 1- The Need for an Electronic Bill of Rights

This two part article highlights the need for an electronic bill of rights to protect U.S. citizens, teens, children, and professionals from predatory surveillance and data mining business practices employed by tech giants such as Google, Apple, Microsoft, Amazon, Facebook, Baidu (China), Tencent (China), and Prisma Labs (Russia). 

Read The Article

#13.1/Part2- The Need for an Electronic Bill of Rights Part 2

 Read "The Need for an Electronic Bill of Rights Part 2" Published Feb 20, 2019 by the Epoch Times. 

Read The Article