Electronic Bill of Rights- End Surveillance Capitalism

Electronic Bill of Rights- End Surveillance CapitalismElectronic Bill of Rights- End Surveillance CapitalismElectronic Bill of Rights- End Surveillance Capitalism

Electronic Bill of Rights- End Surveillance Capitalism

Electronic Bill of Rights- End Surveillance CapitalismElectronic Bill of Rights- End Surveillance CapitalismElectronic Bill of Rights- End Surveillance Capitalism
More

Empower Your Legal Rights Today

Empower Your Legal Rights TodayEmpower Your Legal Rights TodayEmpower Your Legal Rights Today

Support: Electronic Bill of Rights.

Contact

Empower Your Legal Rights Today

Empower Your Legal Rights TodayEmpower Your Legal Rights TodayEmpower Your Legal Rights Today

Support: Electronic Bill of Rights.

Contact

Why The Need: Surveillance Capitalism & Cyber-Enslavement!

Threats Posed by Surveillance Capitalism

There is a drastic need for an Electronic Bill of Rights due to threats posed by Surveillance Capitalism.


Topics- Electronic Bill of Rights Policy Framework


Below are topics that are addressed within the current EBOR congressional policy framework.


As technology changes, there will be more topics to added. 


Global Data Brokers – Alphabet (Google), Apple, Meta, ByteDance, and Microsoft

Today’s tech giants operate as global data brokers, competing in the trillion-dollar information trafficking industry—driven by surveillance-based business practices and targeted advertising.


Surveillance Capitalism
  

These corporations have adopted Surveillance Capitalism as their core business model—built on the systematic exploitation of product owners, including teens, children, and business professionals.


Exploitation Through Connected Products of Necessity 

  

Consumers of smartphones, tablet PCs, and other connected products supported by Android OS, Apple iOS, or Microsoft Windows are exploited for profit—at the direct expense of their privacy, safety, civil liberties, human rights, and data sovereignty.

  

The Rise of Cyber-Enslavement Through Connected Products of Necessity


Essential connected products have been weaponized by OS, app, social media, and AI developers—transforming everyday devices, that cost money, into tools of surveillance and data mining that enable the developers to exploit product owners, including children, as uncompensated information-producing slaves.


Non-Enforcement of Existing Consumer and Child Protection Laws


The Federal Trade Commission, The Federal Communications Commission, and state attorney generals, consistently fail to enforce existing privacy, protection, and telecommunication laws.


The failure to enforce existing laws leaves consumers, children, and business professionals vulnerable to predatory business practices, addictive technologies, harmful and deadly products, and unauthorized surveillance and data mining by way of tech and telecom products supported by telecom and internet infrastructure regulated by the FCC.

   

Government Oppression by Proxy – Tech and Government Collusion


Through collusion with tech giants, governments, including oppressive regimes, use connected products of necessity—supported by Android OS, Apple iOS, and Microsoft Windows—as proxy tools to erode human rights and civil liberties, including privacy, security, safety, free speech, and freedom of the press.

  

Leaky Operating Systems, Legal Malware, and Manipulative AI Chatbots
 

Android OS, Apple iOS, and Microsoft Windows support intrusive, addictive, manipulative, and dangerous apps, social media platforms, and AI chatbots—intentionally designed as legal malware.


These technologies incorporate brain hijacking techniques and exploit the Eliza Effect (humanization of AI), posing significant threats and harm to end users, especially children.

  

Cybersecurity Threats – Indiscriminate Surveillance and Data Mining


Indiscriminate surveillance and data mining conducted through Android OS, Apple iOS, and Microsoft Windows—as well as the apps, social media platforms, and AI they support—pose significant cybersecurity threats to businesses. 


Sensitive business data, including intellectual property (IP), is collected alongside highly confidential personal information by all developers involved, including those from adversarial nations such as China and Russia.

  

Legalized Espionage by Proxy – Tech Conflict of Interest


Tech giants like Alphabet, Meta, ByteDance (China), and Tencent (China) compete across global industries, yet governments permit these multinational corporations to conduct mass surveillance and data mining on individuals—including business professionals—for profit. 


These companies gather business intelligence across sectors by surveilling billions through smartphones, computers, and connected products powered by Android OS, Apple iOS, and Windows OS. 


These tech giants also collect sensitive data on corporate executives, employees, and board members—individuals who use their operating systems, apps, and AI who work for companies in direct competition with the very tech firms harvesting their information, this is the definition of legalized corporate espionage.


Unrestricted and Tech-Based Hybrid Warfare Waged Through Connected Products
 

The erosion of privacy and security in smartphones, PCs, servers, and other connected products has empowered governments—including oppressive regimes—to conduct unrestricted and tech-based hybrid warfare. 


This includes psychological and cognitive warfare, election interference, and the global dissemination of propaganda and misinformation through AI-infused apps, social media platforms, and AI chatbots.


These forms of warfare target all internet users—including teens and children.

  

Foreign Surveillance, Data Mining, and Espionage, Enabled by U.S. Tech Giants


Through their control over the global distribution of AI-infused apps, social media platforms, and AI chatbots, Google, Apple, and Microsoft are responsible for the global distribution of highly addictive apps, social media platforms, and AI chatbots developed in China and Russia. 


These U.S. tech giants also share intellectual property—including AI-related IP—with developers in these countries, who must tailor their products to operate on Android OS, Apple iOS, or Microsoft Windows, thereby facilitating foreign surveillance, data mining, and espionage by proxy.


Foreign Influence Operations Backed by Lobbyists and Law Firms
 

Tech companies from China and Russia conduct foreign influence operations through powerful law firms and lobbyists—many of whom are former elected officials and presidential advisors, regardless of political affiliation (Democrat, Republican, or Independent).

  

Loss of Privacy, Security, Safety, Civil Liberties, and Data Sovereignty

One-way contracts of adhesion—embedded in operating systems, apps, social media platforms, and AI—strip users of privacy, security, safety, civil liberties, human rights, and data sovereignty.


Loss of Copyrighted Content and Intellectual Property by Proxy

Governments enable tech giants to legally steal copyrighted content and intellectual property (IP) under the guise of AI innovation and unregulated surveillance-based business practices.


Forced Participation Through Predatory Contracts of Adhesion

Consumers are coerced into accepting predatory contracts of adhesion—tantamount to cyber-enslavement agreements—that require users to forgo privacy, security, safety, civil liberties, and data sovereignty simply to use connected products powered by Android OS, Apple iOS, or Microsoft Windows.


Government-Regulated Infrastructure Exploited for Unauthorized Surveillance
 

The Federal Communications Commission (FCC) enables surveillance and data mining by OS, app, social media, and AI developers by allowing their technologies to operate over telecommunications and internet infrastructure regulated for public use.


Legalized Oppression and Exploitation of Consumers and Children by Proxy
 

Governments have failed to protect consumers—including teens, children, and business professionals—from legalized oppression, exploitation, and cyber-enslavement via essential connected products.


Monopoly Control and Centralization of Internet Access

Alphabet, Microsoft, and Apple dominate global access to internet trade and commerce through control of the operating system market while controlling the global development and distribution of AI infused apps, social media, and AI chatbots all supported by surveillance technologies and business practices rooted in Surveillance Capitalism.


The Need for an Electronic Bill of Rights


Without comprehensive legislative reform—such as an Electronic Bill of Rights that directly addresses Surveillance Capitalism—there will be no privacy, security, data sovereignty, safety, or true civil liberties for anyone who connects to the internet via Android, iOS, or Windows.

 

Your privacy, your freedom, your future—it’s time to reclaim them through meaningful legislation rooted in an Electronic Bill of Rights.


Join the movement for private, secure, and safe technology and telecommunications by taking action today.


Contact us for a copy of the congressional policy change proposal that incudes the framework for an Electronic Bill of Rights.


We can help you contact your representatives, file consumer and constituent complaints, and submit the formal policy change proposals to your congressional representatives.


Please use the form below to contact us.


Thank You,


Rex M. Lee

Security Advisor/Tech Journalist

Join the Abolitionist Movement: End Surveillance Capitalism

We Will Help You Voice Your Concern to Your Representatives- Contact Us to Learn More

Attach Files
Attachments (0)

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Electronic Bill of Rights

Contact Rex M. Lee at: Rlee@ElectronicBillofRights.com

Electronic Bill of Rights

Copyright © 2025 Electronic Bill of Rights - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept