The Gateway to Personal and Professional Information ("Digital DNA")
Surveillance and Data Mining Business Practices Employed by Tech Giants:
Cyber-enslavement & Product User Exploitation. Companies such as Google, Apple, Microsoft, Facebook and Amazon do not value their product users a loyal customers. These companies value their product users as "Uncompensated Information Producers" who are to be exploited for financial gain at the expense of the product user's civil liberties, privacy, cyber security and safety due to the fact that all parties concerned do not indemnify (protect) their customer's from harm.
The Loss of Civil Liberties, Privacy, Cyber Security and Safety. It is one thing to be viewed as a product, but to be exploited for financial gain at the expense of your civil liberties, privacy, cyber security and safety is worse.
Cyber-enslavement and product user exploitation needs to be addressed by telecom providers (e.g. AT&T, Verizon, etc.), the FCC, FTC, DOJ and law makers due to civil liberty, privacy, cyber security and safety threats posed by predatory surveillance and data mining business practices rooted in Surveillance Capitalism.
Preinstalled unpublished application legalese includes application permission statements, application product warnings and interactive application permission command strings which explain how much surveillance a content developer can conduct on a connected product user plus how much personal and professional surveillance data (e.g. location data) and sensitive user data (a person's Digital DNA) the content developer can data mine from the product user's device and/or online service such as social media.
In addition, content developers use a legal Trojan Horse Malware in the form of an app to collect a person's Digital DNA.
Nearly 100% of all personal and professional surveillance and sensitive user data is collected, used, shared, sold, purchased and aggregated by the preinstalled content developers via the use of predatory apps supported by application permission statements, application product warnings and interactive application permission command strings.
Numerous Entities from Around the World are Reading and Collecting Your Personal and Professional Messages!
Messages- Email, Text, Instant and Social Media.
Microsoft Products Contain Preinstalled Surveillance and Data Mining Technology!
Microsoft collects biometric data (voice print), location data, contacts, calendar data and the list goes on.........
Microsoft even collects keylogging data- Touch Screen and Keyboard Activity
Predatory Apps Supported by Unpublished (Hidden in Device) Application Legalese
Understanding Surveillance and Data Mining Business Practices
Below are real examples of android (Google), Apple and Microsoft preinstalled application legalese that support predatory apps which are programmed to enable the content developers with the ability monitor track and data mine the product user for financial gain.
Surveillance and data mining business practices are supported primarily by preinstalled uncontrollable content such as predatory apps that are supported by unpublished application legalese in the form of application permission statements.
The following android (Google) preinstalled application permission statements, application product warnings and interactive application permission command strings support all connected products supported by the android OS:
Apps Identify the Product User Including Children plus Share Your ID with "Others"!
Aside from Google, Apple and Microsoft, numerous entities from around the world know who you are:
Every Account on Your Device is Being Hacked by Numerous Entities from around the World!
Social Media, Banking, Medical and All Accounts Set Up on the Device
Even Personal & Business Social Media Accounts are Hacked by Numerous Entities!
Application Permission Statements Even Warn Product User to Censor Communications!
Are Companies such as Google Turning Your Conversations Over to State Actors?
How Come Application Product Warnings are Not Transparent to the Product User?
Access to Personal, Medical, Professional and Social Media Accounts:
Surveillance Capitalism- The Business Model
Monetizing and Exploiting the Product User for Financial Gain!
Apple, Microsoft, Amazon and Sony TV Preinstalled Application Legalese Examples:
Numerous Entities Know Who You are in Contact with plus Know Your Schedule!
Contact and Calendar- Content developers know who your family and friends plus your business contacts and healthcare providers. They even know your personal and professional schedule. Even attachments from calendar events are collected.
Apple Sells Access to Google!
Google Sells Access to Chinese Companies such as BAIDU!
Google is Allowing Chinese Companies to Monitor, Track and Data Mine Product Users
Preinstalled Chinese Surveillance Technology- android (Google) BAIDU Examples Samsung Galaxy Note:
Google, Apple and Microsoft Sell Access to Amazon
Amazon Uses Alexa to Collect Personal and Professional Information Aside from Recoding Your Personal and Professional Conversations!
Amazon collects personal ID, messages, contacts, calendar data, location data and the list goes on..................
Cyber-enslavement- Selling Access to You!
Google, Apple and Microsoft Sell Access to the Product User to the Highest Bidders!
Selling Access to the Product User- Google, Apple and Microsoft Enable Companies such as Facebook and BAIDU (State Owned Chinese Company) to Monitor, Track and Data Mine the Product User via Preinstalled Surveillance and Data Mining Technology such as Apps. The Facebook App enables Facebook to Monitor, Track and Data Mine the Product User even When the User is Not on Facebook.
Facebook App- Surveillance and Data Acquisition android (Google) Example:
Third-party Android and BAIDU Surveillance & Data Mining Technology!
Chinese Surveillance and Data Mining Technology Distributed by Google Play
Biometric Data- Your Body, Face, Eyes, Voice and Blood are Being Exploited for Financial Gain
Finger Prints, Voice Prints, Facial Data and Even DNA are Being Exploited for Financial Gain at the Expense of the Product User's Civil Liberties, Privacy, Cyber Security and Safely whether the Product User is an Adult, Childe or Business Professional:
Your Personal and Professional Life is being Recorded Without Your Consent of Knowledge!
Access to Hardware Without Consent of Knowlege- Camera, Microphone and Volume Control
Adults, Children, Business Professionals, Judges, Lawyers, Doctors, Government Officials, Law Makers, Law Enforcement Officials, Members of the Military are Being Recorded 24x7/365 without consent or knowledge.
Apps enabled content developers with the ability to record audio, video and take pictures of the product user and/or the product users personal and professional activities without the product user's consent or knowledge:
You are Being Tracked Even when Location Services and My Activity Tracker are Disabled!
Multisource Location and Motion Data- GPS, Cell Tower, Wi-Fi Access Points, Nearfield Communications ("NFC"), Etc.
Preinstalled apps enable content developers to monitor, track and data mine product users by multiple methods. Products users are monitored, tracked and data mined even when location services and the product user's Activity Tracker are disabled. Google can track smartphone and connected product user by alternative methods that include Wi-Fi Aps, NFC tags, Bluetooth connections, cell towers, auto telemactics and even when product users are sleeping, sitting, walking or biking: