{"id":1993,"date":"2018-12-20T13:20:29","date_gmt":"2018-12-20T13:20:29","guid":{"rendered":"http:\/\/www.blackopspartners.com\/?p=1993"},"modified":"2018-12-20T13:20:29","modified_gmt":"2018-12-20T13:20:29","slug":"google-distributes-surveillance-technology-developed-by-chinese-company","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/google-distributes-surveillance-technology-developed-by-chinese-company\/","title":{"rendered":"Google Distributes Surveillance Technology Developed by Chinese Company"},"content":{"rendered":"\n

Commentary<\/em><\/p>\n\n\n\n

\ufeffThis article is part of a series on corporate surveillance, highlighting civil liberty, privacy, cybersecurity, safety, and tech-product user exploitation threats associated with connected products that are supported by the Android (Google) OS, Apple iOS, and Microsoft Windows OS. <\/em><\/p>\n\n\n\n

In part 1 of this article,\u00a0Business Users of Smartphones May be Breaking the Law<\/a>, I addressed the use of smartphones within a confidential and protected environment such as the defense industry, critical infrastructure, government, and legal and medical profession.<\/p>\n\n\n\n

<\/p>\n\n\n\n

My findings, coupled with admissions made by T-Mobile and Verizon, led to the conclusion that smartphones, tablet PCs, voice-automated assistants, connected products, and PCs supported by surveillance and data-mining business practices should not be used within a confidential and protected environment.<\/p>\n\n\n\n

All products concerned are supported by intrusive pre-installed content that will leak confidential and protected telecommunications, information, and data to numerous unauthorized third-parties such as AT&T, T-Mobile, Verizon, Sprint, Google, Apple, Microsoft, Samsung, Facebook, Amazon, Baidu, and other telecom and tech giants.<\/p>\n\n\n\n

The article concluded that it may, in fact, be illegal to use any smartphone or connected technology supported by surveillance and data-mining content, such as apps, within a confidential and protected environment governed by confidentiality agreements, non-disclosure agreements (NDAs), industry and federal cyber security standards, federal information processing standards (FIPS), and confidentiality laws that govern medical information, client\u2013attorney privilege, and classified information.<\/p>\n\n\n\n

Read the full article at <\/em>The Epoch Times<\/em><\/a>.<\/em><\/p>\n\n\n\n


<\/p>\n","protected":false},"excerpt":{"rendered":"

Commentary \ufeffThis article is part of a series on corporate surveillance, highlighting civil liberty, privacy, cybersecurity, safety, and tech-product user exploitation threats associated with connected products that are supported by the Android (Google) OS, Apple iOS, and Microsoft Windows OS.  In part 1 of this article,\u00a0Business Users of Smartphones May be Breaking the Law, I […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10],"tags":[14,28],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1993"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=1993"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1993\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=1993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=1993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=1993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}