Chinese Surveillance & Data Mining Technology


Your organization may be leaking confidential and protected information to numerous unauthorized entities including companies from China.  Aside from leaking confidential and protected information to unauthorized entities, your organization could actually be leaking highly confidential information to business competitors worldwide.


Example- Android BAIDU Interactive Application Permission Command String (Samsung Galaxy Note Smartphone Purchased From T-Mobile in Selma, Texas):

































My Smart Privacy will help your organization understand what hardware and operating system poses the biggest threat to your organization's privacy, cyber security and safety.


For more information contact Rex M. Lee at: RLee@MySmartPrivacy.com (210) 639-6035


Read Technology Articles Authored by Rex M. Lee at:




Return to Services at:


All Rights Reserved RML Business Consulting, LLC 2018

Can Technology Users Trust Google, Apple, Samsung, Amazon and Other


Tech Giants in Light of Facebook Cambridge Analytica?


The Facebook Cambridge Analytica incident is a wake up call for anyone who values civil liberties, privacy, cyber security and good business ethics.


Facebook Cambridge Analytica exposed that tech giants can and will misuse a technology user's personal and professional information for financial gain at the expense of the user's civil liberties, privacy, cyber security and safety.


Organizations need to vet the connected products they are investing in today.  Organizations need to understand that connected products such as smartphones are intentionally designed to enable the OEM (e.g. Samsung), OS developer (e.g. Apple) and content developers (e.g. Google) to surveil and data mine the product user for financial gain.


The smartphone is the greatest Corporate Surveillance Tool ever created enabling companies such as Google, Apple, Microsoft, Amazon, Facebook and other tech giants to collect, use, share, sell, and aggregate the product user's personal and professional information for financial gain.


Below is a Surveillance and Data Mining Flow Chart to help you understand how much of personal and professional Digital DNA is being collected, shared, sold, purchased, and aggregated by the product developers: