The Need For An Electronic Bill of Rights & Policy Framework
Rex M. Lee
VP Business Development| Security Advisor | Advisory Board Member | Thought Leader and Speaker | Tech Journalist
Executive Summary
?The Silicon Valley Matrix has you, you are trapped in digital servitude without even realizing it, you are in fact a cyber slave if you own a smartphone tablet PC, or connected product supported by Android, iOS, or Windows operating systems.
?The Silicon Valley Matrix represents a modern form of cyber enslavement, in which consumers unknowingly surrender their ID, privacy, security, safety, digital/data rights, IP, copywritten content, and civil liberties to a predatory business model rooted in Surveillance Capitalism.
?Tech giants—Alphabet (Google), Apple, and Microsoft—exploit their operating system customers, you, through control over access to internet trade and commerce through the monopolization of operating system market while controlling the global development and distribution of AI infused apps, social media platforms, and other connected products.
?Internet centralization raises significant antitrust concerns, as a handful of tech giants wield unchecked power to eliminate competition and acquire valuable innovation and intellectual property.
?By leveraging their dominance over the operating system market, these corporations can deplatform or acquire competitors—including their IP—at will as we have seen regarding Meta’s purchase of Instagram, which threatened Facebook, and Microsoft’s multibillion dollar investment in OpenAI ChatGPT, enabling them to dominate AI development and distribution.
?This same threat will be relevant to the rise of quantum computing, the next generation of computer innovation and technology.
?This control extends to the global distribution of AI-infused apps, social media platforms, and other connected services that support essential products like smartphones, ultimately leaving consumers with limited freedom of choice while stifling market competition and innovation centered on private, secure, and safe alternative decentralized product offerings that can be manufactured and developed at scale.
?Google, Apple, and Microsoft operate as modern-day digital slave traders, exploiting their paying customers (OS end users) for profit while simultaneously selling access to the OS end user to the highest bidder in the form of third-party data brokers, targeted advertisers, and developers—including those from adversarial nations.
?These entities include Amazon, TEMU (China), Prisma Labs (Russia/Android Apps), BAIDU (China/Android Apps), Meta (Facebook), X, and ByteDance (TikTok) who develop intrusive, addictive, and potentially harmful apps, social media platforms, streaming services, retail services, and AI-infused products.
?These multinational corporations embed intrusive, manipulative, divisive, and addictive mechanisms into every operating system, app, streaming service, and AI-infused products they develop for smartphones, tablet PCs, and connected devices.
?These systems are intentionally designed to maximize user screen time, ensuring prolonged engagement while developers exploit OS end users for maximum profit—often at the expense of their privacy, security, and overall well-being.
?These tech giants are the world's largest data brokers, engineering addictive, intrusive, divisive, and exploitative technologies supported by predatory contracts of adhesion primarily for their own gain rather than for the benefit of their paying customers or end users, including children and business end users.
?These users are effectively coerced into generating valuable data without compensation or meaningful consent, reinforcing a system of digital exploitation enabled by predatory one-way contracts of adhesion (terms of service).
?OS developers impose these contracts on consumers who purchase connected products of necessity, such as smartphones, forcing them to accept intrusive terms.
?In today's digital age, where participating in the connected world is essential for work, communication, and daily life, individuals have little choice but to comply—effectively surrendering their privacy, security, safety, and autonomy in exchange for access to fundamental digital services.
?If the product owner rejects the terms of service, they are denied access to the very device they paid for, leaving them with no real choice but to comply.
?Consumers of connected products of necessity are also vulnerable to government overreach, including from adversarial nations, that seek to erode civil liberties and human rights—such as freedom of speech, freedom of the press, and privacy by proxy as tech giants become extensions of government policing by way of consumer products and services that cost money.
?Through government and tech collusion, these governments leverage tech giants as proxies for mass surveillance, censorship, and digital policing, turning consumer products and services—such as smartphones, tablet PCs, and connected devices—into tools of control and suppression while the product owner pays the bills.
?These devices operate on wireless and landline infrastructure regulated by the Federal Communications Commission (FCC), raising concerns that such practices may violate existing telecommunications laws designed to protect private, secure, and safe communications and computing.
?Although lawmakers and federal agencies, such as the Federal Trade Commission (FTC), acknowledge the wrongdoing of developers like Google, Meta, ByteDance, and others, congressional hearings often lead to meaningless resolutions.
?Tech executives face no real accountability, even when they publicly admit wrongdoing during congressional hearings, offering hollow apologies to the families of children who have been addicted, harmed, or even killed as a result of using their addictive and manipulative apps and social media platforms.
?Meanwhile, government agencies, including the FTC, continue to neglect enforcement of existing consumer and child protection laws, largely due to the overwhelming influence of the powerful U.S.-China tech lobby, which prioritizes corporate interests over public safety and accountability.
?Likewise, developers of intrusive operating systems (“Leaky OS”)—which support addictive, manipulative, and dangerous AI-infused apps and social media platforms (“Legal Malware”)—may be in direct violation of numerous existing privacy and consumer protection laws.
These systems operate under predatory contracts of adhesion (terms of service) that strip users of their rights.
?However, due to regulatory inaction, agencies such as the FTC and state attorneys general fail to enforce these laws, leaving consumers and children vulnerable to exploitation, surveillance, and harm.
?OS end users, including children, are exposed to intrusive, addictive, and dangerous apps, social media platforms, and AI-infused products developed by companies based in adversarial nations.
?This means that Google, Apple, and Microsoft bear direct responsibility for the proliferation of AI-infused apps, platforms, and social media developed by companies in China, Russia, Iran, and North Korea—allowing these entities to exploit users, compromise privacy, and pose significant security threats on a global scale.
?Enabled by Google, Apple, Microsoft, and the U.S. government, these foreign entities monitor, track, and data mine users for profit, creating significant privacy, security, and safety risks—not only for the individual users but also for their employers, organizations, academia, medical institutions, and government agencies.
?Moreover, even if a smartphone owner does not subscribe to TikTok or Facebook, they are still subjected to surveillance and data mining when visiting websites embedded with web trackers developed by these global data brokers. These trackers operate silently in the background, harvesting user data without explicit consent, further entrenching the pervasive reach of Surveillance Capitalism.
?Furthermore, website owners themselves are vulnerable to data theft, including intellectual property and copyright infringement, due to the widespread use of web crawlers and scrapers. These tools, such as ByteSpider—developed by ByteDance, the Chinese parent company of TikTok—or scrapers designed by Meta, Amazon, Google, Apple, and Microsoft, systematically collect and exploit website data, further eroding privacy, security, and digital sovereignty.
?Since these global data brokers—who disguise themselves as technology innovators and developers—engage in indiscriminate surveillance and data mining, over 95% of the data they collect from end users is unrelated to consumerism or the intended use of their AI-infused apps and platforms.
?This mass data harvesting, which extends far beyond legitimate business purposes, should be deemed illegal.
?Additionally, these companies collect highly confidential and legally protected information, including biometric data, privileged client-attorney communications, and proprietary business information safeguarded by non-disclosure and employment agreements.
?They also harvest sensitive legal information protected by client attorney privilege, medical information protected under HIPAA, even information protected by Federal Information Processing Standards (FIPS), and possibly classified information further violating privacy laws and exposing individuals and businesses to severe security risks.
?Millions of business professionals, including executives and board members, are unknowingly leaking confidential business information, including IP, to existing and future competitors such as Alphabet, Tencent (China), and other tech giants that operate across multiple industries while developing leaky operating systems and AI infused apps and platforms that are tantamount to “Legal Malware’.
?Governments, meanwhile, continue to permit these multinational corporations to engage in mass surveillance and data mining, using smartphones, tablet PCs, and other connected products as pervasive surveillance, tracking, and data mining devices used to exploit the product owners for profits at the expense of the owner’s privacy, security, and safety.
?This unchecked legal form of corporate espionage not only compromises business intelligence but also gives these tech giants an unfair competitive advantage, enabling them to dominate industries through data-driven market manipulation and strategic acquisitions.
?These data brokers have effectively seized control of the entire global internet for their own benefit, turning it into a massive surveillance, consumer oppression, consumer enslavement, and exploitation apparatus through predatory, exploitive, addictive, manipulative, divisive, and dangerous technologies and business practices rooted in Surveillance Capitalism.
?By leveraging their dominance over operating systems like Android, iOS, and Windows, they have created an ecosystem that oppresses, enslaves, and exploits every individual—including children—who connect to the internet through a smartphone, tablet PC, or any other connected device that cost money to own while not paying for the information they are collecting.
?Rather than serving users, these platforms function as data extraction tools, prioritizing corporate profit over privacy, security, safety, and fundamental civil and human rights.
?All these issues and threats stem from Surveillance Capitalism—an exploitative business model driven by targeted advertising and fueled by addictive technology.
?This system is further reinforced by internet centralization, where a handful of multinational tech giants control access to global internet trade and commerce, consolidating power at the expense of consumer rights and digital freedom.
?Due to the powerful tech lobby, U.S.-based tech giants—including those from China—wield significant influence over lawmakers, U.S. law, government agencies, and even the White House.
?This influence is secured through powerful K Street law firms and lobbyists, many of whom are former members of Congress, the Senate, and even former presidential advisors.
?This revolving door between government and Big Tech is the primary barrier to accountability, leaving consumers of connected products powerless.
?Even when these companies engage in negligence, selling addictive and harmful products backed by predatory contracts and business practices rooted in Surveillance Capitalism, they continue to operate with impunity.
?Only within the tech industry can a CEO of a company publicly (during a congressional hearing) admit wrongdoing, negligence leading to harm and death of their customers, and get away with it, while in other industries these negligent CEOs would be held accountable, sued, and even jailed for causing addiction, harm, chaos, and death to their customers, including children, highlighting how powerful the U.S. China tech lobby is.
?As a result of the Surveillance Capitalism business model—driven by targeted advertising and adopted by OS and app developers—OS end users face numerous threats, including violations of privacy, security, and safety, as well as risks to civil liberties, human rights, and consumer protections.
?These threats extend to child exploitation, consumer oppression, digital discrimination, tech-based hybrid warfare, and the theft of confidential and protected data, including intellectual property and copyrighted content.
?Tech-based hybrid warfare, in particular, is a form of warfare without rules, targeting everyone connected to the internet—including children—who are subjected to cognitive and psychological manipulation through a silent but deadly war associated with Hybrid Warfare.
?This digital assault is waged through highly addictive, manipulative, exploitative, and dangerous AI-infused apps and social media platforms, including TikTok (ByteDance), WeChat (Tencent), RedNote, and numerous others.
?These platforms are designed to influence behavior, control narratives, and exploit user data while exposing individuals to propaganda, surveillance, and digital addiction.
?Banning TikTok alone will not resolve the broader threats posed by tech-based hybrid warfare. The dangers extend far beyond a single platform, encompassing the spread of misinformation, disinformation, civil unrest, societal harm, election interference, and even loss of life.
?To effectively combat these threats, all AI-infused apps and digital platforms originating from adversarial nations must be banned to prevent their use as weapons of mass influence, destruction, death, chaos, and digital subjugation.
Given the scale and severity of these growing threats, there is an urgent need for new legislation centered on an Electronic Bill of Rights to protect individuals, businesses, and society from the exploitative practices of Big Tech.
Electronic Bill of Rights Policy Framework?
Article I: Right to Data Privacy
Article II: Right to Data Security
领英推荐
Article III: Right to Digital Anonymity
Article IV: Right to Be Forgotten
Article V: Right to Opt-Out of Data Monetization
Article VIII: Right to Digital Freedom and Free Speech
Article IX: Right to Own and Control Digital Identity
Article X: Right to Decentralized and Open Internet
Article XI: Right to Protection from Corporate and Foreign Surveillance
Article XII: Right to National and Consumer Security and Safety
Article XIII: The Abolishment of Web Scraping, Web Crawling, and Web Tracking
Article XIV: The Right to Accountability from Tech Giants
Article XV: The Right to Safe, Secure, and Private Preinstalled Apps, Software, & Technology
Article XVI: The Right to Safe Technology
Article XVII: The Right to Influencer and Bot Transparency
Article XIX: Freedom from Addictive, Divisive, and Manipulative Technology (Brainwashing)
Article XX: Freedom from Government & Tech Collusion
Article XXI: Right to Data Collection Transparency
Article XXII: Freedom from Indiscriminate Surveillance and Data Mining
Article XXIII: Freedom from Forced Participation by Way of Legal Agreements
Article XXIX: Freedom to Control Technology and Connected Products
Article XXX: The Right to Transparent Legal Language & App Permissions
Article XXXI: Ban on Teen Acceptance of Legal Agreements
Article XXXII: Right to Transparent AI and Algorithmic Accountability
Article XXXIII: Right to Fair Terms and Conditions
Article XXXIV: Anti-Trust Protections & Internet Centralization
Article XXXV: National, Internet, and Technology Safety
Article XXXVI: The Right to Sue and Hold Tech Giants Accountable
Conclusion
The necessity of an Electronic Bill of Rights is clear in a world where personal data is exploited, privacy is eroded, and technology is increasingly weaponized against individuals. Without concrete digital rights, consumers are left vulnerable to predatory business models, government overreach, and monopolistic control over digital infrastructure.
This bill establishes essential protections to uphold privacy, security, and digital freedom, ensuring individuals retain control over their personal information, devices, and online experiences. By implementing these rights, we can restore balance to the digital ecosystem, protecting users from exploitation while fostering innovation in a way that respects human rights and consumer interests.
Only through enforceable regulations can we safeguard personal freedom in the digital age.
Rex M. Lee
Security Advisor
My Smart Privacy
(210) 639.6035