This article, as well as others that report on the Apple versus Facebook feud, failed to note that nearly 100 percent of apps that run on Apple iPhones and smartphones supported by the Android operating system (OS) are simply legal malware programmed to enable the app developer to monitor, track, and data-mine the app user for financial gain.
The fact that Facebook may have violated Apple’s data-collection policy is irrelevant, since nearly all smartphone apps can be classified as intrusive surveillance and data-mining technology in the first place.
Smartphones aren’t private, secure, or safe, because Apple and Google employ predatory surveillance and data-mining business practices rooted in surveillance capitalism. This also holds true for Apple and Google affiliates and their trusted partners such as Facebook and Amazon.
Apple would lead you to believe that Facebook is the foe, yet Apple has sold access to its users to Facebook, by allowing Facebook to pay Apple a lot of money to have the Facebook app pre-installed into Apple devices such as the iPhone.
Pre-installed Facebook and Amazon apps and third-party apps enable Facebook and Amazon to surveil and data-mine the smartphone user even when the user isn’t on the Facebook or Amazon platform.
For the most part, app users have no idea that the apps enable Facebook and Amazon to monitor, track, and data-mine all of the users’ spatial data (e.g. location data) and sensitive user data (their “digital DNA”), even when they aren’t using the apps.
Sensitive user data includes location data, device and app history, user accounts, personal ID and the ID of user’s contacts, calendar data, electronic address book (contacts), call and messaging logs, text messages, files, photos, videos, audio recordings, media files (e.g., music, movies, etc.), and information that can be collected from connected devices such as PCs or USB external storage devices.
The Facebook and Amazon application legalese that supports the apps enables this.
For example, permission to access device hardware, such as the camera and microphone, allows Facebook and Amazon to conduct audio and video surveillance of the Apple iPhone and Android OS-supported smartphone users without the users’ consent, which is why people see ads sent to them on their smartphones relating to verbal conversations they have had.
Below is a list of application permission statements associated with pre-installed and third-party Apple and Android apps.
Android Camera App Permission Statement: “Allows the app to take pictures and videos with the camera. This permission allows the app to use the camera at any time without your confirmation.”
Android Microphone App Permission Statement: “Allows the app to record audio with the microphone. This permission allows the app to record audio any time without your confirmation.”
Android Personal Information App Permission Statement: “Allows apps to read personal profile information stored on your device, such as your name and contact information. This means apps can identify you and may send your profile information to others.”
Android Contacts App Permission Statement: “Allows the app to read data about your contacts stored on your phone, including the frequency with which you’ve called, emailed or communicated in other ways with specific individuals. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.”
Apple Third-Party Acknowledgements
Pre-installed and third-party Apple apps are no less intrusive. Apple seems to be misleading people with regard to the privacy associated with Apple iPhones.
Facebook and Amazon
Below are master Android application permissions associated with Facebook and Amazon apps.
(Rex M Lee)
Facebook Android App Permissions:
Calendar—Read calendar events and confidential information; add or modify calendar events and send email to guests without owners’ knowledge.
Contacts—Find accounts on the device; read your contacts; modify your contacts.
Amazon Alexa Android App Permissions:
Contacts—Find accounts on the device; read your contacts.
Location—Precise location (GPS and network-based).
SMS—Read your text messages (SMS and MMS).
The sheer amount of personal and professional digital DNA collected by app developers, such as Facebook and Amazon, is astonishing, to say the least, especially considering each company can collect and use information not associated with the specific use of their products and services.
The privacy and cyber-security threats posed by Facebook and Amazon apps are systemic to nearly all pre-installed and third-party Android and Apple apps.
Even DNA apps developed by companies such as 23andMe enable the developer to surveil and data-mine the user’s digital DNA every minute of the day, whether the user is using 23andMe products or not.
23andMe not only collects the service user’s DNA but also, via the app, his or her photos, media, files, and other information from external storage devices connected to the smartphone, which include PCs and USB devices.
23andMe also conducts audio and video surveillance on the smartphone user by way of the camera and microphone.
The 23andMe product users may read their DNA results once or twice, but 23andMe continues to surveil and data-mine product users long after the users are done reading their results.
App users need to realize that when they activate pre-installed apps or download third-party apps, the app developers are enabled to surveil and data-mine the user, even if the user isn’t actively on the app developer’s platform or using the app developer’s product, as these examples indicate.
You may use an app one time, yet that app developer will continue to surveil and data-mine you indefinitely. Be sure to disable unwanted pre-installed apps and uninstall any third-party apps you no longer use.
In closing, note that not all pre-installed apps can be controlled, which means at some level, as many as 15 or more multinational companies are enabled to simultaneously monitor, track, and data-mine you for financial gain, depending on the operating system of your smartphone or device.
Rex M. Lee is a privacy and data security consultant and Blackops Partners senior analyst and researcher. Visit him at MySmartPrivacy.com
Views expressed in this article are the opinions of the author and do not necessarily reflect the views of The Epoch Times.