Conference: March 27-31, 2017
Exhibits: March 29-30, 2017

Las Vegas Convention Center
Las Vegas, NV

In Partnership With

Rex Lee

Business Analyst & Mobile Data Security Consultant
RML Business Consulting, LLC


Contact

112 Blossom CT
Cibolo,  TX  78108
United States
Phone:  210-639-6035

Profile

Rex M. Lee has over 30 years of wireless communication industry experience including carrier and software development. Mr. Lee helped launch and managed Houdinisoft a controversial enterprise cellular phone software company.

Houdinisoft enabled the hosting mobile network operator (“MNO”) the ability to unlock (‘jailbreak”) and re-provision (“flash”) smartphones. Houdinisoft was adopted by MetroPCS, Cricket, Pocket, nTelos, and other CDMA carriers nation-wide.

Mr. Lee has authored reports and analysis centered on the covert surveillance and data acquisition (data mining) business practices employed by companies such as Google, Apple, Samsung, AT&T, and T-Mobile plus their nebulous partners.

The reports highlight the legal process that support the lawful use of covert installed (“pre-installed”) surveillance and predatory technology used by third-parties to collect surveillance data and sensitive user data (personal and professional info) from connected products such as smartphones and tablets.

At the request of the Department of Homeland Security, Mr. Lee has submitted a report (“Nontransparent Data Mining Analysis”) in conjunction with the RFI Mobile Threats and Defenses.

In 2015, Mr. Lee has filed formal privacy complaints with the FCC against service providers such as T-Mobile seeking transparency pertaining to surveillance and data acquisition business practices. The FCC complaint yielded an admission from T-Mobile that smartphones are not a private form of telecommunications & mobile computing.

Mr. Lee’s analysis and complaints highlight numerous privacy concerns and cyber security threats associated with the use of consumer grade connected technology.

Mr. Lee’s presentation will be focused on the dangers of using unsecure consumer grade connected technology within critical infrastructure. Info on his reports can be found at: www.TermsMayApply.com

Sessions

Back to the Search