Oil IT Journal- Rex M. Lee Gives Wake Up Call Regarding Cybersecurity Threats Associated With B.Y.O.D Programs (Smartphones)- May 29, 2019

Big Tech Surveil Children For Profits: Google and Apple May be in Violation of Child Privacy Laws

image3

A wake up call for BYOD (N° 2 2019)  OilComm/FleetComm presentation from RML Business Consulting warns of ‘surveillance capitalism’ and the considerable dangers of a ‘bring your own device’ policy. Terms and conditions of mobile device hardware and services (including cloud computing) merit scrutiny.  Speaking at the 2018 OilComm FleetComm conference in Houston last year, Rex Lee, from RML Business Consulting provided a wake up call to all whose employers operate a ‘bring your own device’ policy. Lee categorizes the current practice of providing free mobile services as ‘monetizing the user’, aka ‘surveillance capitalism’. 

Lee asked if attendees believed that they could secure their smartphone or tablet PC with preinstalled or third party apps, or if they would ‘knowingly allow 15 or more multinational companies to monitor, track and data mine your home and office phone activity including content?’ This is pretty much what all smart devices do all the time. ‘Connected products are intentionally designed to enable content developers monitor, track and data mine the user for financial gain at the expense of the product user’s civil liberties, privacy, cyber security and safety’. In other words, the Android and Apple operating systems are definitely not private, secure or safe forms of telecommunications and computing! Android devices and iPhones allow multiple third parties to collect and use personal information. 

The surveillance capitalists use multiple ways of harvesting personal digital DNA, with obscure legalese in their terms of use that may violate consumer laws. Moreover, hundreds of apps widgets and other content may be preinstalled on a device and the collective terms of use can exceed 3,000 pages of ‘misleading and contradicting’ legalese. The GAFA’s are engaged on a new gold rush for your digital DNA which is being leaked to your service providers and their business partners including companies from China. Lee warns, no product is private, secure or safe. 

Stay away! Corporations need to verify terms of use of all devices and services (including cloud storage) to demand transparency from service providers. Vendor communications regarding official business should not be done on consumer grade technology. But most important of all, do not allow ‘bring your own device’ and terminate any such program forthwith. Next talk with your telecom provider and discuss privacy and cyber security issues associated with connected technology. 

Demand transparency, ask questions, file complaints, and litigate if necessary! At a personal level, individuals need to prod their elected and government officials to take action!Lee, who manages the www.MySmartPrivacy.com portal, speaks from 35 years of wireless industry and application development experience and as a contributor to the 2017 Department of Homeland Security study on mobile device security.Postscript: Right on cue we now have the WhatsApp breach!Click here to comment on this article
If your browser does not work with the MailTo button, send mail to  info@oilit.com with OilIT_1902_24 as the subject.  Copyright © 2019 The Data Room - all rights reserved.

Special report: Child Privacy threats by Rex m. lee

Big Tech Surveil Children For Profits: Google and Apple May be in Violation of Child Privacy Laws

image4

Article by Rex M. lee- The Wireless Messaging  News

To Read Article Click on Download Below:

Download: Tech Giants Surveil and Data Mine Children for profits below

Google Apps May Violate FTC COPPA Laws_RLee 02.22.2019 (pdf)

Download

Government fails to protect citizens & children from exploitative and harmful technology!

Government Fails to Enforce Existing Privacy, Telecommunication, & Consumer Laws!

image5

Article by Rex M. Lee- The Epoch Times

Read the article

Are Smartphone User Agreements and Harmful Technology Legal Part 1

image6

Article by Rex M. Lee- The Epoch Times

Read The Article

Are Smartphone User Agreements and Harmful Technology Legal Part 2?

image7

Article by Rex M. Lee- The Epoch Times

Read The Article

Breaking news May 2019

Can Social Media Users Trust Facebook? by Rex M. lee My Smart Privacy

image8

Article by The Wireless Messaging News

Published by May 10th

Download Article Below:

Download: Can Social media Users Trust Facebook?

Can Social Media Users Trust Facebook? by Rex M. Lee Published by The Wireless Messaging News, May 10th, 2019

Featured tech articles: Government Fails to Enforce existing privacy laws!

Chinese & Russian App Developers Distribute Intrusive Apps Via Google Play, Apple App Store, and MS App Store!

image9

Article by The Epoch Times

Published March 12th, 2019

Read the article

Google, Apple, & Microsoft Distribute Chinese Surveillance & Data Mining App- WeChat Posing Cybersecurity & Privacy Threats to App User!

image10

Article by The Mercury News

Published Feb 2th, 2019

Read The Article

Breaking tech news by my smart privacy 05.11.2019

Big Tech & Telecom Conflict of Interest: Antitrust & Unfair Business Competition- Part 1 & 2

image11

Article by Rex M. Lee- The Epoch Times

Published Part 1 Jan 3oth/Part 2 Feb 1st

Read The Article

Step Big Brother- 13 Part Series of Articles by Tech Industry Insider Rex M. Lee

# 1- Surveillance Capitalism: Monetizing the Smartphone User

image12

Article Highlights 

  • Learn how Google, Apple, & Microsoft have monetized their operating system (OS) customers by way of the Android OS, Apple iOS, & Microsoft Windows OS.
  • App developers exploit smartphone users for financial gain at the expense of cybersecurity and privacy.

Read the article

#2- Legal Malware (Apps): How Tech Giants Collect Personal & Professional Info Through Apps

image13

Article Highlights

  • Lean how tech giants such as Google, Apple, Microsoft, Amazon, Facebook, and Baidu (China) develop legal malware in the form of surveillance & data mining smartphone apps.
  • App developers collect personal and professional information leading to cybersecurity and privacy threats to app users.

Read The Article

#3- When Smartphone Terms of Use Become Cyber-Enslavement Agreements

image14

Article Highlights

  • Learn what you are agreeing to when you click on "I Agree" to accept the terms of use that support your smartphone.
  • Smartphone terms of use enable to app developers to exploit your personal & professional information for financial gain at the expense of your civil liberties, privacy, cybersecurity, and safety.

Read The article

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

  • Read "Smartphone Surveillance and Data-Mining: Who is Protecting Us? Part 2" Published Nov 5, 2018. 

Step Big Brother- Corporate Surveillance Continued

#4/Part 1- Government Fails to Enforce Privacy, Telecommunication, & Consumer Laws

image15

Article Highlights

  • Learn how government agencies, law makers, and telecom providers are failing to enforce existing privacy laws meant to protect telecom/smartphone subscribers.


Read The Article

#4.1/Part 2- Smartphone Surveillance & Data-Mining: Who is Protecting Us?

image16

Article Highlights

  • Learn how companies such as Google enable nation-state companies from China, such as Baidu, to surveil and data mine U.S. citizens, teens, children, and business professionals for financial gain. 

Read The Article

#5/Part 1- Are Smartphone User Agreements & Harmful Technology Legal?

image17

Article Highlights

  • Facebook & Google develop addictive technology in the from of apps in order to exploit their product users for financial gain.
  • Smartphone terms of use that may be illegal according to existing consumer laws governed by the FTC and state AGs.

Read the Article

#5.1/Part 2- Are Smartphone User Agreements & Harmful Technology Legal?

image18

Article Highlights

  • Smartphone users are forced to participate regarding predatory surveillance & data mining business practices employed by Google, Apple, Microsoft, Amazon, Facebook, and other tech giants.
  • Users of smartphones, tablet PCs, and connected products are not giving lawful consent enabling tech giants to collect & use personal & professional info for financial gain.

Read The Article

#6- Business Users of Smartphones May BE Breaking the Law

image19

Article Highlights

  • Smartphone users who work within a confidential and protected environment, such as the defense industry, may be breaking the law when using a smartphone that is supported by the android OS and Apple iOS.
  • Tech giants such as Google, Apple, & Microsoft may be breaking the law by collecting confidential and protected information from business users of smartphones. 

Read The Article

#7- Google Distributes Surveillance Technology Developed by Chinese Company (Baidu)

image20

Article Highlights

  • The FTC, FCC, DHS, and telecom providers such as AT&T, Verizon, Sprint, & T-Mobile enable Google to distribute surveillance & technology developed by Baidu a nation-state company from China. 
  • Smartphones, tablet PCs, and PCs supported by apps developed by Chinese companies pose huge cybersecurity and privacy threats to the tech product user.

Read The Article

Step Big Brother- Corporate Surveillance Continued

#8- Facebook & Google Congressional Hearings: Meaningless Resolve & Phony Apologies

image21

Article Highlights

  • Article author, Rex M. Lee was an advisor to the Senate and House Judiciary Committees Regarding the 2018 Facebook and Google congressional hearings.  
  • This article exposes the fact that the senate and house judiciary committees did not address many cybersecurity & privacy threats Mr. Lee brought to both committees' attention.

Read The Article

#9- Apple's CES Privacy Claim is Misleading

image22

Article Highlights

  • This article exposes Apple's relationship with Google plus how Apple apps enable the app developer to surveil and data mine the Apple product user for financial gain.
  • Although iPhone users can prevent personal information such as contacts from being uploaded to iCloud, Apple apps still enabled app developers to collect personal information such as text messages and contacts from the iPhone user.

Read The Article

#10/Part 1- Telecom & Tech Giant Conflict of Interest (Antitrust) & Competition Violations- Part 1

image23

Article Highlights

  • This article exposes potential violation of antitrust & unfair competition laws associated with the relationship between telecom providers such as AT&T and technology providers such as Google, Apple and Microsoft.
  • People who do not want Google to collect their personal & personal information cannot escape Google by going to Apple.
  • Unfair competition practices employed by telecom and tech giants are stifling competition and innovation.

Read The Article

#10/Part 2- Telecom & Tech Giant Conflict of Interest (Antitrust) & Competition Violations- Part 2

image24

Article Highlights

  • Read Part 2 highlights cybersecurity and privacy threats posed by exclusive relationships between telecom providers, OS developers, and app developers such as AT&T, Google, and Baidu (China).
  • The FTC, FCC, state AGs, and law makers are failing to enforce existing laws associated with antitrust and unfair business competition.

Read The Article

#11- Smartphone Users Are Data Mined Even When Not Using The Apps

image25

Article Highlights

  •  This article exposes the fact that apps developed by Facebook and Amazon data mine users even when the user is not on the Facebook or Amazon platforms or using the apps.
  • Companies such as Amazon and Facebook are enabled to use their apps to collect personal and professional information from the app user that has nothing to do with the use of Facebook and Amazon products or platform.

Read The Article

Step big Brother- Corporate surveillance Conclusion

image26

#13/Part 1- The Need for an Electronic Bill of Rights

This two part article highlights the need for an electronic bill of rights to protect U.S. citizens, teens, children, and professionals from predatory surveillance and data mining business practices employed by tech giants such as Google, Apple, Microsoft, Amazon, Facebook, Baidu (China), Tencent (China), and Prisma Labs (Russia). 

Read The Article

#13.1/Part2- The Need for an Electronic Bill of Rights Part 2

 Read "The Need for an Electronic Bill of Rights Part 2" Published Feb 20, 2019 by the Epoch Times. 

Read The Article