Surveillance Capitalism- The Business Model


Monetizing and Exploiting the Product User for Financial Gain!

Apple, Microsoft, Amazon and Sony TV Preinstalled Application Legalese Examples:

Numerous Entities Know Who You are in Contact with plus Know Your Schedule!


Contact and Calendar- Content developers know who your family and friends plus your business contacts and healthcare providers.  They even know your personal and professional schedule.  Even attachments from calendar events are collected.

Connected Product Terms Of Use and Predatory Apps

The Gateway to Personal and Professional Information ("Digital DNA")


Surveillance and Data Mining Business Practices Employed by Tech Giants:


Terms of Use = "Cyber-enslavement Agreements".  When a connected product owner and/or user clicks on "I Agree" to accept the product terms of use, they are binding themselves to a "Cyber-enslavement Agreement" designed to enable companies such as Google, Apple, Microsoft, Facebook, and Amazon to monitor, track and data mine their personal and professional information known as a person's Digital DNA.


Harvesting Digital DNA- Predatory Apps.  The preinstalled ("rooted") content (OS, apps, widgets, etc.) coupled with the terms of use that support connected products are designed to enable the content developers with the ability to collect, use, share, sell, purchase and aggregate the product user's Digital DNA for financial gain.


Personal and Professional Digital DNA- The New Gold Rush.  The graphic below depicts how much Digital DNA is being collected from a single smartphone user by way of predatory apps and exploitive terms of use:


























  


Cyber-enslavement & Product User Exploitation.  Companies such as Google, Apple, Microsoft, Facebook and Amazon do not value their product users a loyal customers.  These companies value their product users as "Uncompensated Information Producers" who are to be exploited for financial gain at the expense of the product user's civil liberties, privacy, cyber security and safety due to the fact that all parties concerned do not indemnify (protect) their customer's from harm.


The Loss of Civil Liberties, Privacy, Cyber Security and Safety.  It is one thing to be viewed as a product, but to be exploited for financial gain at the expense of your civil liberties, privacy, cyber security and safety is worse.


Cyber-enslavement and product user exploitation needs to be addressed by telecom providers (e.g. AT&T, Verizon, etc.), the FCC, FTC, DOJ and law makers due to civil liberty, privacy, cyber security and safety threats posed by predatory surveillance and data mining business practices rooted in Surveillance Capitalism.


Unfair Business and Deceptive Trade Practices- Unpublished (Hidden in Device) Terms of Use.  Companies such as Google, Apple and Microsoft realize that their customer would not knowingly agree to be exploited for financial gain at the expense of their civil liberties, privacy, cyber security and safety so these companies use the terms of use to mislead their customers.


In order to collect a connected product user's Digital DNA, companies such as Google, Apple, Microsoft, Amazon and Facebook intentionally hide preinstalled unpublished application legalese (see examples below) within the OS of the product rather than publish the preinstalled application legalese within online terms of use that include terms and conditions ("T&Cs"), privacy policies and end user licensing agreements ("EULAs").


Preinstalled unpublished application legalese includes application permission statements, application product warnings and interactive application permission command strings which explain how much surveillance a content developer can conduct on a connected product user plus how much personal and professional surveillance data (e.g. location data) and sensitive user data (a person's Digital DNA) the content developer can data mine from the product user's device and/or online service such as social media.


In addition, content developers use a legal Trojan Horse Malware in the form of an app to collect a person's Digital DNA.


















Nearly 100% of all personal and professional surveillance and sensitive user data is collected, used, shared, sold, purchased and aggregated by the preinstalled content developers via the use of predatory apps supported by application permission statements, application product warnings and interactive application permission command strings.

Numerous Entities from Around the World are Reading and Collecting Your Personal and Professional Messages!


Messages- Email, Text, Instant and Social Media.

Microsoft Products Contain Preinstalled Surveillance and Data Mining Technology!


Microsoft collects biometric data (voice print), location data, contacts, calendar data and the list goes on.........


Microsoft even collects keylogging data- Touch Screen and Keyboard Activity

Apple Sells Access to Google!


Aside from being exploited for financial gain by Apple, Apple enables Google to Monitor, Track and Data Mine Apple product users via preinstalled apps and predatory terms of use.


Apple products contain preinstalled Google products that the Apple user cannot uninstall forcing the Apple product user to accept Google's predatory terms of use.

You are Being Tracked Even when Location Services and My Activity Tracker are Disabled!


Multisource Location and Motion Data- GPS, Cell Tower, Wi-Fi Access Points, Nearfield Communications ("NFC"), Etc.


Preinstalled apps enable content developers to monitor, track and data mine product users by multiple methods.  Products users are monitored, tracked and data mined even when location services and the product user's Activity Tracker are disabled.  Google can track smartphone and connected product user by alternative methods that include Wi-Fi Aps, NFC tags, Bluetooth connections, cell towers, auto telemactics and even when product users are sleeping, sitting, walking or biking:

Cyber-enslavement- Selling Access to You!

Google, Apple and Microsoft Sell Access to the Product User to the Highest Bidders!


Selling Access to the Product User- Google, Apple and Microsoft Enable Companies such as Facebook and BAIDU (State Owned Chinese Company) to Monitor, Track and Data Mine the Product User via Preinstalled Surveillance and Data Mining Technology such as Apps.  The Facebook App enables Facebook to Monitor, Track and Data Mine the Product User even When the User is Not on Facebook.


Facebook App- Surveillance and Data Acquisition android (Google) Example:


Predatory Apps Supported by Unpublished (Hidden in Device) Application Legalese

Understanding Surveillance and Data Mining Business Practices


Below are real examples of android (Google), Apple and Microsoft preinstalled application legalese that support predatory apps which are programmed to enable the content developers with the ability monitor track and data mine the product user for financial gain.


Surveillance and data mining business practices are supported primarily by preinstalled uncontrollable content such as predatory apps that are supported by unpublished application legalese in the form of application permission statements.


The following android (Google) preinstalled application permission statements, application product warnings and interactive application permission command strings support all connected products supported by the android OS:


Apps Identify the Product User Including Children plus Share Your ID with "Others"!


Aside from Google, Apple and Microsoft, numerous entities from around the world know who you are:

Google Sells Access to Chinese Companies such as BAIDU!

Google is Allowing Chinese Companies to Monitor, Track and Data Mine Product Users


Preinstalled Chinese Surveillance Technology- android (Google) BAIDU Examples Samsung Galaxy Note:

Third-party Android and BAIDU Surveillance & Data Mining Technology!

Chinese Surveillance and Data Mining Technology Distributed by Google Play

Biometric Data- Your Body, Face, Eyes, Voice and Blood are Being Exploited for Financial Gain


Finger Prints, Voice Prints, Facial Data and Even DNA are Being Exploited for Financial Gain at the Expense of the Product User's Civil Liberties, Privacy, Cyber Security and Safely whether the Product User is an Adult, Childe or Business Professional:



Google, Apple and Microsoft Sell Access to Amazon


Amazon Uses Alexa to Collect Personal and Professional Information Aside from Recoding Your Personal and Professional Conversations!


Amazon collects personal ID, messages, contacts, calendar data, location data and the list goes on..................

TM.

Every Account on Your Device is Being Hacked by Numerous Entities from around the World!

Social Media, Banking, Medical and All Accounts Set Up on the Device


Even Personal & Business Social Media Accounts are Hacked by Numerous Entities!


Application Permission Statements Even Warn Product User to Censor Communications!


Are Companies such as Google Turning Your Conversations Over to State Actors?


How Come Application Product Warnings are Not Transparent to the Product User?


Access to Personal, Medical, Professional and Social Media Accounts:

Your Personal and Professional Life is being Recorded Without Your Consent of Knowledge!


Access to Hardware Without Consent of Knowlege- Camera, Microphone and Volume Control


Adults, Children, Business Professionals, Judges, Lawyers, Doctors, Government Officials, Law Makers, Law Enforcement Officials, Members of the Military are Being Recorded 24x7/365 without consent or knowledge.


Apps enabled content developers with the ability to record audio, video and take pictures of the product user and/or the product users personal and professional activities without the product user's consent or knowledge: