The Need For An Electronic Bill of Rights & Policy Framework

The Need For An Electronic Bill of Rights & Policy Framework

Executive Summary

?The Silicon Valley Matrix has you, you are trapped in digital servitude without even realizing it, you are in fact a cyber slave if you own a smartphone tablet PC, or connected product supported by Android, iOS, or Windows operating systems.

?The Silicon Valley Matrix represents a modern form of cyber enslavement, in which consumers unknowingly surrender their ID, privacy, security, safety, digital/data rights, IP, copywritten content, and civil liberties to a predatory business model rooted in Surveillance Capitalism.

?Tech giants—Alphabet (Google), Apple, and Microsoft—exploit their operating system customers, you, through control over access to internet trade and commerce through the monopolization of operating system market while controlling the global development and distribution of AI infused apps, social media platforms, and other connected products.

?Internet centralization raises significant antitrust concerns, as a handful of tech giants wield unchecked power to eliminate competition and acquire valuable innovation and intellectual property.

?By leveraging their dominance over the operating system market, these corporations can deplatform or acquire competitors—including their IP—at will as we have seen regarding Meta’s purchase of Instagram, which threatened Facebook, and Microsoft’s multibillion dollar investment in OpenAI ChatGPT, enabling them to dominate AI development and distribution.

?This same threat will be relevant to the rise of quantum computing, the next generation of computer innovation and technology.

?This control extends to the global distribution of AI-infused apps, social media platforms, and other connected services that support essential products like smartphones, ultimately leaving consumers with limited freedom of choice while stifling market competition and innovation centered on private, secure, and safe alternative decentralized product offerings that can be manufactured and developed at scale.

?Google, Apple, and Microsoft operate as modern-day digital slave traders, exploiting their paying customers (OS end users) for profit while simultaneously selling access to the OS end user to the highest bidder in the form of third-party data brokers, targeted advertisers, and developers—including those from adversarial nations.

?These entities include Amazon, TEMU (China), Prisma Labs (Russia/Android Apps), BAIDU (China/Android Apps), Meta (Facebook), X, and ByteDance (TikTok) who develop intrusive, addictive, and potentially harmful apps, social media platforms, streaming services, retail services, and AI-infused products.

?These multinational corporations embed intrusive, manipulative, divisive, and addictive mechanisms into every operating system, app, streaming service, and AI-infused products they develop for smartphones, tablet PCs, and connected devices.

?These systems are intentionally designed to maximize user screen time, ensuring prolonged engagement while developers exploit OS end users for maximum profit—often at the expense of their privacy, security, and overall well-being.

?These tech giants are the world's largest data brokers, engineering addictive, intrusive, divisive, and exploitative technologies supported by predatory contracts of adhesion primarily for their own gain rather than for the benefit of their paying customers or end users, including children and business end users.

?These users are effectively coerced into generating valuable data without compensation or meaningful consent, reinforcing a system of digital exploitation enabled by predatory one-way contracts of adhesion (terms of service).

?OS developers impose these contracts on consumers who purchase connected products of necessity, such as smartphones, forcing them to accept intrusive terms.

?In today's digital age, where participating in the connected world is essential for work, communication, and daily life, individuals have little choice but to comply—effectively surrendering their privacy, security, safety, and autonomy in exchange for access to fundamental digital services.

?If the product owner rejects the terms of service, they are denied access to the very device they paid for, leaving them with no real choice but to comply.

?Consumers of connected products of necessity are also vulnerable to government overreach, including from adversarial nations, that seek to erode civil liberties and human rights—such as freedom of speech, freedom of the press, and privacy by proxy as tech giants become extensions of government policing by way of consumer products and services that cost money.

?Through government and tech collusion, these governments leverage tech giants as proxies for mass surveillance, censorship, and digital policing, turning consumer products and services—such as smartphones, tablet PCs, and connected devices—into tools of control and suppression while the product owner pays the bills.

?These devices operate on wireless and landline infrastructure regulated by the Federal Communications Commission (FCC), raising concerns that such practices may violate existing telecommunications laws designed to protect private, secure, and safe communications and computing.

?Although lawmakers and federal agencies, such as the Federal Trade Commission (FTC), acknowledge the wrongdoing of developers like Google, Meta, ByteDance, and others, congressional hearings often lead to meaningless resolutions.

?Tech executives face no real accountability, even when they publicly admit wrongdoing during congressional hearings, offering hollow apologies to the families of children who have been addicted, harmed, or even killed as a result of using their addictive and manipulative apps and social media platforms.

?Meanwhile, government agencies, including the FTC, continue to neglect enforcement of existing consumer and child protection laws, largely due to the overwhelming influence of the powerful U.S.-China tech lobby, which prioritizes corporate interests over public safety and accountability.

?Likewise, developers of intrusive operating systems (“Leaky OS”)—which support addictive, manipulative, and dangerous AI-infused apps and social media platforms (“Legal Malware”)—may be in direct violation of numerous existing privacy and consumer protection laws.

These systems operate under predatory contracts of adhesion (terms of service) that strip users of their rights.

?However, due to regulatory inaction, agencies such as the FTC and state attorneys general fail to enforce these laws, leaving consumers and children vulnerable to exploitation, surveillance, and harm.

?OS end users, including children, are exposed to intrusive, addictive, and dangerous apps, social media platforms, and AI-infused products developed by companies based in adversarial nations.

?This means that Google, Apple, and Microsoft bear direct responsibility for the proliferation of AI-infused apps, platforms, and social media developed by companies in China, Russia, Iran, and North Korea—allowing these entities to exploit users, compromise privacy, and pose significant security threats on a global scale.

?Enabled by Google, Apple, Microsoft, and the U.S. government, these foreign entities monitor, track, and data mine users for profit, creating significant privacy, security, and safety risks—not only for the individual users but also for their employers, organizations, academia, medical institutions, and government agencies.

?Moreover, even if a smartphone owner does not subscribe to TikTok or Facebook, they are still subjected to surveillance and data mining when visiting websites embedded with web trackers developed by these global data brokers. These trackers operate silently in the background, harvesting user data without explicit consent, further entrenching the pervasive reach of Surveillance Capitalism.

?Furthermore, website owners themselves are vulnerable to data theft, including intellectual property and copyright infringement, due to the widespread use of web crawlers and scrapers. These tools, such as ByteSpider—developed by ByteDance, the Chinese parent company of TikTok—or scrapers designed by Meta, Amazon, Google, Apple, and Microsoft, systematically collect and exploit website data, further eroding privacy, security, and digital sovereignty.

?Since these global data brokers—who disguise themselves as technology innovators and developers—engage in indiscriminate surveillance and data mining, over 95% of the data they collect from end users is unrelated to consumerism or the intended use of their AI-infused apps and platforms.

?This mass data harvesting, which extends far beyond legitimate business purposes, should be deemed illegal.

?Additionally, these companies collect highly confidential and legally protected information, including biometric data, privileged client-attorney communications, and proprietary business information safeguarded by non-disclosure and employment agreements.

?They also harvest sensitive legal information protected by client attorney privilege, medical information protected under HIPAA, even information protected by Federal Information Processing Standards (FIPS), and possibly classified information further violating privacy laws and exposing individuals and businesses to severe security risks.

?Millions of business professionals, including executives and board members, are unknowingly leaking confidential business information, including IP, to existing and future competitors such as Alphabet, Tencent (China), and other tech giants that operate across multiple industries while developing leaky operating systems and AI infused apps and platforms that are tantamount to “Legal Malware’.

?Governments, meanwhile, continue to permit these multinational corporations to engage in mass surveillance and data mining, using smartphones, tablet PCs, and other connected products as pervasive surveillance, tracking, and data mining devices used to exploit the product owners for profits at the expense of the owner’s privacy, security, and safety.

?This unchecked legal form of corporate espionage not only compromises business intelligence but also gives these tech giants an unfair competitive advantage, enabling them to dominate industries through data-driven market manipulation and strategic acquisitions.

?These data brokers have effectively seized control of the entire global internet for their own benefit, turning it into a massive surveillance, consumer oppression, consumer enslavement, and exploitation apparatus through predatory, exploitive, addictive, manipulative, divisive, and dangerous technologies and business practices rooted in Surveillance Capitalism.

?By leveraging their dominance over operating systems like Android, iOS, and Windows, they have created an ecosystem that oppresses, enslaves, and exploits every individual—including children—who connect to the internet through a smartphone, tablet PC, or any other connected device that cost money to own while not paying for the information they are collecting.

?Rather than serving users, these platforms function as data extraction tools, prioritizing corporate profit over privacy, security, safety, and fundamental civil and human rights.

?All these issues and threats stem from Surveillance Capitalism—an exploitative business model driven by targeted advertising and fueled by addictive technology.

?This system is further reinforced by internet centralization, where a handful of multinational tech giants control access to global internet trade and commerce, consolidating power at the expense of consumer rights and digital freedom.

?Due to the powerful tech lobby, U.S.-based tech giants—including those from China—wield significant influence over lawmakers, U.S. law, government agencies, and even the White House.

?This influence is secured through powerful K Street law firms and lobbyists, many of whom are former members of Congress, the Senate, and even former presidential advisors.

?This revolving door between government and Big Tech is the primary barrier to accountability, leaving consumers of connected products powerless.

?Even when these companies engage in negligence, selling addictive and harmful products backed by predatory contracts and business practices rooted in Surveillance Capitalism, they continue to operate with impunity.

?Only within the tech industry can a CEO of a company publicly (during a congressional hearing) admit wrongdoing, negligence leading to harm and death of their customers, and get away with it, while in other industries these negligent CEOs would be held accountable, sued, and even jailed for causing addiction, harm, chaos, and death to their customers, including children, highlighting how powerful the U.S. China tech lobby is.

?As a result of the Surveillance Capitalism business model—driven by targeted advertising and adopted by OS and app developers—OS end users face numerous threats, including violations of privacy, security, and safety, as well as risks to civil liberties, human rights, and consumer protections.

?These threats extend to child exploitation, consumer oppression, digital discrimination, tech-based hybrid warfare, and the theft of confidential and protected data, including intellectual property and copyrighted content.

?Tech-based hybrid warfare, in particular, is a form of warfare without rules, targeting everyone connected to the internet—including children—who are subjected to cognitive and psychological manipulation through a silent but deadly war associated with Hybrid Warfare.

?This digital assault is waged through highly addictive, manipulative, exploitative, and dangerous AI-infused apps and social media platforms, including TikTok (ByteDance), WeChat (Tencent), RedNote, and numerous others.

?These platforms are designed to influence behavior, control narratives, and exploit user data while exposing individuals to propaganda, surveillance, and digital addiction.

?Banning TikTok alone will not resolve the broader threats posed by tech-based hybrid warfare. The dangers extend far beyond a single platform, encompassing the spread of misinformation, disinformation, civil unrest, societal harm, election interference, and even loss of life.

?To effectively combat these threats, all AI-infused apps and digital platforms originating from adversarial nations must be banned to prevent their use as weapons of mass influence, destruction, death, chaos, and digital subjugation.

Given the scale and severity of these growing threats, there is an urgent need for new legislation centered on an Electronic Bill of Rights to protect individuals, businesses, and society from the exploitative practices of Big Tech.

Electronic Bill of Rights Policy Framework?

Article I: Right to Data Privacy

  • Individuals shall have the right to control their personal data, including collection, storage, processing, and distribution.
  • Consent must be explicit, informed, and revocable at any time.
  • Companies and organizations must disclose how user data is collected, shared, and monetized in clear, understandable language, meaning language that is free from technical jargon, written in plain English (or the applicable primary language of the user), and easily accessible without requiring excessive navigation or legal expertise.

Article II: Right to Data Security

  • Individuals have the right to expect robust security measures to protect their personal information.
  • Companies must implement end-to-end encryption, multi-factor authentication, and other security protocols to prevent unauthorized access.
  • Any data breach must be immediately disclosed to affected individuals and regulatory bodies.

Article III: Right to Digital Anonymity

  • No individual shall be compelled to disclose personal information beyond what is necessary for a specific service.
  • Users shall have the right to browse the internet, communicate, and conduct transactions anonymously.

Article IV: Right to Be Forgotten

  • Individuals have the right to request the permanent deletion of their data from online platforms and databases.
  • Companies must honor deletion requests promptly, barring exceptions for legal or regulatory obligations.

Article V: Right to Opt-Out of Data Monetization

  • Users shall have the right to opt out of targeted advertising and data-sharing agreements without being penalized or denied service.
  • Alternative business models that do not rely on invasive data mining must be available.

Article VIII: Right to Digital Freedom and Free Speech

  • No entity, public or private, shall unlawfully censor or restrict lawful digital expression.
  • Content moderation policies must be transparent, consistently applied, and subject to independent appeals processes.

Article IX: Right to Own and Control Digital Identity

  • Individuals have the right to control their digital identities, including usernames, biometric data, and online personas.
  • No government or corporation shall claim ownership over an individual’s digital identity.

Article X: Right to Decentralized and Open Internet

  • Users have the right to access a free, open, and decentralized internet without undue restrictions.
  • Net neutrality must be upheld to prevent internet service providers from prioritizing certain content over others.
  • Decentralized technologies must be legally protected to ensure alternatives to centralized control.

Article XI: Right to Protection from Corporate and Foreign Surveillance

  • Companies, app developers, and multinational corporations shall be banned from conducting surveillance and data mining on any smartphone, tablet PC, connected product, or PC supported by the Android OS, Apple iOS, or Microsoft Windows.

Article XII: Right to National and Consumer Security and Safety

  • It shall be illegal for U.S.-based tech giants to form a symbiotic relationship with foreign tech giants beholden to oppressive governments or adversarial nations.
  • No U.S.-based or foreign tech giant shall be permitted to distribute intrusive, addictive, or dangerous operating systems, apps, social media platforms, or AI-infused products developed by a company beholden to an oppressive government.
  • It shall be illegal for U.S.-based tech companies to share developer tools, AI development tools, or AI-driven chips (GPUs) with any company beholden to an oppressive government or adversarial nation.

Article XIII: The Abolishment of Web Scraping, Web Crawling, and Web Tracking

  • Web scraping is data theft: It shall be illegal for any company, individual, government, or entity to scrape information from any website without the consent of the website creator or content creators who post information.
  • It shall be illegal to train AI using scraped information, including copyrighted content, original works, or intellectual property.
  • AI shall not impersonate any individual, including their likeness, biometric data, or voice print, without explicit consent.
  • Individuals shall have the right to sell access to their likeness in the same manner as athletes and entertainers.
  • Web tracking shall be illegal: No individual shall be tracked by a website, web crawlers, bots, or any tracking technology now or in the future.

Article XIV: The Right to Accountability from Tech Giants

  • OS, application, AI, social media, or any platform developers, along with employees, managers, executives, and board members of any company that develops or manufactures connected products and services, shall be held accountable for any harm, addiction, or death caused by their products.
  • Section 230 protections for tech giants shall be abolished.
  • Tech companies shall be held accountable as editors for publishing if they engage in censorship or the suppression of legitimate news or press on their platforms.

Article XV: The Right to Safe, Secure, and Private Preinstalled Apps, Software, & Technology

  • No operating system can include uncontrollable preinstalled surveillance and data mining technology of any kind, whether it be code, application, software, or anything that can be programmed into the operating system or preinstalled app.

Article XVI: The Right to Safe Technology

  • No app, social media platform, or AI-infused product can contain addictive, divisiveness, or manipulative technology designed to exploit users through brain hijacking techniques.
  • Bot transparency: No platform can employ bots to deceive users, and all users must verify their identities to prevent misinformation, fraud, or undue influence.
  • Governments, intelligence agencies, and militaries shall be banned from creating accounts on consumer platforms.
  • The FTC, DOJ, and State AGs must enforce consumer protection laws, and tech lobbying must be transparent and regulated.

Article XVII: The Right to Influencer and Bot Transparency

  • Influencers, corporations, and agencies must disclose any use of automated bots to boost visibility or engagement.
  • Deceptive marketing practices using automation to manipulate public perception shall be illegal.
  • Automated bots of any kind used for mis and dis information, spread propaganda, cause discourse among end users of technology, election interference, political purposes, discrimination, ethnic cleansing, or any malicious purpose shall be illegal.

Article XIX: Freedom from Addictive, Divisive, and Manipulative Technology (Brainwashing)

  • No developer shall provide addictive technology to manipulate users through brain hijacking or manipulative advertising technologies tantamount to cyber brainwashing.
  • Such technologies are more harmful and dangerous than subliminal advertising and shall be banned.

Article XX: Freedom from Government & Tech Collusion

  • Governments at all levels are banned from colluding with tech companies to suppress human rights, civil liberties, free speech, freedom of the press, or privacy.
  • Developers of operating systems, apps, social media, gaming, and AI are banned from hiring former government officials to exert government influence or engage in election interference, propaganda, or suppression of rights.
  • Governments are banned from hiring former tech executives, employees, or designers for political purposes.? Governments may higher former tech executives, employees, or designers for national security purposes only, but not to influence laws, or to suppress civil liberties, human rights, free speech, privacy, freedom of the press.?

Article XXI: Right to Data Collection Transparency

  • Companies must be transparent regarding data collection, sharing, and monetization.
  • Users have the right to request a copy of their data and demand its deletion from all parties within 7 working days.
  • Companies must be transparent regarding data collected about end users and/or paying customers from all third-parties, including data brokers

Article XXII: Freedom from Indiscriminate Surveillance and Data Mining

  • Indiscriminate surveillance and data mining are banned due to the collection on non consumerism data and data not essential to the use of an app, platform, or AI infused product.
  • It is illegal to collect any confidential information for any purpose, including marketing, that includes: Personal Information Business Information Employment Information Medical and Health Information Legal Information (Client Attorney Privilege) Biometric Information Location Information Information Associated with Federal Information Processing Standards Classified Information Sensitive User Data- Text Messages, Emails, Attachments, Calendar Information, Account Information, Passwords, Contacts (Personal/Business), Geo Fence Location Information, Speed of Car, Motion Information, and other Highly Sensitive End User Information associated with the use of a smartphone, tablet PC, connected product, or PC of any kind supported by an operating system, apps, social media, and AI infused products and services supported by targeted advertising, surveillance technologies, and surveillance/data mining business practices rooted in Surveillance Capitalism.
  • It is illegal for any entity to collect confidential or legally protected information, including classified data, intellectual property, client-attorney communications, HIPAA-protected medical records, NDA-protected business information, or any other legally protected data.

Article XXIII: Freedom from Forced Participation by Way of Legal Agreements

  • No forced participation by way of contracts of adhesion shall be permitted where consumers of connected products of necessity, such as smartphones, are required to participate in surveillance and data mining business models to access the products or services they paid for.

Article XXIX: Freedom to Control Technology and Connected Products

  • Consumers must have 100% control over the connected products they purchase, including operating systems and apps, such as smartphones, tablet PCs, connected products, computers, and any form of connected products and services.
  • Consumers must be able to delete unwanted software, apps, or preinstalled technology and optimize their devices for privacy, security, and safety.

Article XXX: The Right to Transparent Legal Language & App Permissions

  • All legal language supporting operating systems, apps, social media, or AI-infused products must be fully transparent.
  • Consumers must have 100% control over application permissions on their devices.
  • All data collection and app permissions must be disclosed in one location within the terms and conditions, privacy policies, or end-user agreements.

Article XXXI: Ban on Teen Acceptance of Legal Agreements

  • No teen aged 13 to 17, or any minor under 18, shall be permitted to accept legal agreements of any kind, including those supporting operating systems, apps, social media platforms, AI, gaming platforms, or any digital service.

Article XXXII: Right to Transparent AI and Algorithmic Accountability

  • Users have the right to understand how artificial intelligence (AI) and algorithms influence their digital experience.
  • AI decision-making processes must be explainable, fair, and free from discrimination from the use of manipulative, divisive, and addictive technology and algorithms.
  • Users must be able to contest and appeal AI-driven decisions that affect their rights or access to services.
  • All algorithms supporting operating systems, apps, social media platforms, or any platform of any king, including streaming services must be transparent to the product owner, subscriber, and/or end user.
  • The purpose of all algorithms concerned need to be made transparent to the product owner, subscriber, and/or end user.
  • It shall be illegal for any dangerous, addictive, manipulative, intrusive, or exploitive algorithm or technology to support any operating systems, apps, platforms, AI, or other products marketed to children under 18.

Article XXXIII: Right to Fair Terms and Conditions

  • End-user license agreements (EULAs) and terms of service must be concise, written in plain language, and subject to independent oversight.
  • Users must be given a clear choice before accepting data-sharing clauses.
  • One-way contracts of adhesion shall be banned in the terms of use for operating systems, apps, social media platforms, streaming services, cloud storage services, AI, or any other product that supports the operating system of a smartphone, tablet PC, connected product, SmartTV, connected vehicle, or any connected product of necessity that costs money.
  • No Forced Participation: Consumers of connected products of necessity, such as smartphones, shall not be forced to participate in surveillance and data mining business practices or business models through contracts of adhesion. If a product owner rejects the terms of service and/or contract of adhesion, they must still be able to use the products or services they paid for, such as a smartphone.
  • Transparent Legal Language: All legal language supporting operating systems, apps, social media, or AI-infused products must be fully transparent regarding terms and conditions, privacy policies, end-user licensing agreements, and application permissions.

Article XXXIV: Anti-Trust Protections & Internet Centralization

  • It shall be illegal for any company competing across multiple industries to conduct surveillance or data mining on end users through connected devices.
  • Companies shall be banned from using any form of surveillance or data mining to gain a competitive advantage over existing or future competitors.
  • Operating system, app, social media, streaming, and AI developers shall be prohibited from monopolizing the global marketplace by centralizing control over operating systems, apps, media, entertainment, news, and AI development and distribution on a global basis via preinstalled app agreements and app stores
  • It shall be illegal for any technology company, including those from adversarial nations to hire former government employees, elected officials, presidential advisors, and agents of the government for lobbying purposes, nor can law firms hired by technology companies hire such individuals for lobbying purposes on behalf of said technology companies.

Article XXXV: National, Internet, and Technology Safety

  • It shall be illegal for a symbiotic relationship between U.S.-based tech giants and foreign tech companies in adversarial nations beholden to oppressive governments.
  • No U.S.-based or foreign tech giant shall be permitted to distribute intrusive, addictive, or dangerous operating systems, apps, social media platforms, or AI-infused products developed by a company under the control of an oppressive government.
  • It shall be illegal for any U.S.-based tech company to share developer tools, including AI development tools and AI-driven chips (GPUs), with any company beholden to an oppressive government or adversarial nation.

Article XXXVI: The Right to Sue and Hold Tech Giants Accountable

  • Consumers of connected products of necessity, or any connected product or service, shall have the right to sue tech companies for predatory, nefarious, intrusive, dangerous, addictive, and manipulative products and services.
  • Individuals shall not be held accountable for one-way contracts of adhesion that force them to waive privacy rights while agreeing to surveillance, data mining, and dangerous business practices rooted in Surveillance Capitalism.
  • OS, application, AI, social media or any platform developers, coupled with employees, managers, executives, and board members of any company that develops or manufactures connected products and services can be held accountable for any harm, addiction, or death caused by all products concerned.
  • All can be indicted, arrested, and jailed aside from being sued for any violations.
  • These are consumer protection laws while section 230 laws protecting tech giants are to be abolished.
  • Tech companies can be held accountable as editors for publishing if they engage in any censorship or banning freedom of the press regarding any legitimate news story or information published on their platforms.

Conclusion

The necessity of an Electronic Bill of Rights is clear in a world where personal data is exploited, privacy is eroded, and technology is increasingly weaponized against individuals. Without concrete digital rights, consumers are left vulnerable to predatory business models, government overreach, and monopolistic control over digital infrastructure.

This bill establishes essential protections to uphold privacy, security, and digital freedom, ensuring individuals retain control over their personal information, devices, and online experiences. By implementing these rights, we can restore balance to the digital ecosystem, protecting users from exploitation while fostering innovation in a way that respects human rights and consumer interests.

Only through enforceable regulations can we safeguard personal freedom in the digital age.

Rex M. Lee

Security Advisor

My Smart Privacy

[email protected]

(210) 639.6035

要查看或添加评论,请登录

Rex M. Lee的更多文章

其他会员也浏览了