You are here Fraud
Submitted by Scott Cleland on Tue, 2017-11-28 14:45
On net neutrality, we have all been tricked by the masters of misdirection.
For many years Google, Facebook, Amazon, and the Internet Association have deftly misdirected the media’s and government’s attention away from their unaccountable market power, discriminatory models and practices, and real consumer protection problems, towards the potential for discrimination by legacy-regulated, competitive, broadband providers.
The masterful misdirection becomes painfully obvious when one looks at the facts.
First, it’s the supposedly “competitive” Internet “edge” that is hyper-dominant and hyper-concentrated, and it is America’s broadband industry that is the most competitive in the world.
Submitted by Scott Cleland on Mon, 2016-05-16 00:50
The Sunday Telegraph reports that the EU is poised to fine Google an EU record ~€3b for “web search monopoly abuse” and that “Google will be banned from continuing to manipulate search results to favour itself and harm rivals.”
Assuming this occurs in the reported June-July timeframe, and just like the EU’s 2015 Statement of Objections charged, the long-term ramifications for Google will be much broader and more serious than most appreciate.
Submitted by Scott Cleland on Wed, 2016-05-04 19:07
1 Oracle v. Google case + 1 EU Android Tying Case = 3
While the U.S. Oracle v. Google Java API copyright case that will recommence in public court this month has been completely independent of the EU Google-Android antitrust case, in sovereign jurisdiction, type of law, legal process, timetable and alleged offense, these two cases ultimately could have huge, much underappreciated implications for each other, because they are both about the same thing -- purposeful illegal actions that Google chose to do to extend its search-related dominance into mobile via Android.
Summary
Submitted by Scott Cleland on Fri, 2016-04-22 18:20
Submitted by Scott Cleland on Wed, 2016-04-13 10:05
The FCC’s AllVid proposal is déjà vu. We have seen Google-YouTube’s piracy-as-negotiating-leverage MO in action before.
Submitted by Scott Cleland on Thu, 2016-02-11 15:56
Does the impartial administration of justice, the integrity of the U.S. Government, and the oath of all federal employees to support and defend the Constitution of the United States, require that private interests not be allowed to supplant the public interest?
Submitted by Scott Cleland on Thu, 2015-12-03 22:41
How the FTC handles the EFF petition charging that Google has violated its enforceable pledge to protect K-12 students’ privacy will speak volumes to the world about two big things.
First, whether FTC Commissioners believe Google is subject to U.S. privacy law, or not.
Submitted by Scott Cleland on Mon, 2015-09-28 18:13
The U.S. FTC has opened an antitrust probe of Google’s Android mobile operating system per Bloomberg reporting to investigate allegations that Google has anti-competitively limited competitive services on the Google-Android platform and extended its market power by favoring Google services over competitors’.
Top Ten Questions Raised by FTC’s Google-Android Probe
Submitted by Scott Cleland on Fri, 2015-09-18 11:08
The FCC’s 218 page “brief” defending its Open Internet Order begs a big question.
How many times is it “reasonable” for any agency to assert that their core legal arguments are “reasonable” before they sound unreasonable? A few? Several? A dozen?
Of the 19 core statutory arguments in the summary defense of the FCC’s Open Internet order, TWELVE defend the order by declaring the FCC’s legal judgment was “reasonable.”
When arguing in court that the FCC has the statutory authority to common-carrier-regulate the Internet for the first time, shouldn’t the FCC be able to declare at least once in their summary defense: “the law says,” “precedent supports,” or at least “Congress intended?”
Submitted by Scott Cleland on Tue, 2015-09-08 22:27
“Cyber systemic risk” is Internet-driven risk that threatens to destroy the business viability of industry ecosystems.
While cybersecurity risk may be the familiar and recognizable type of cyber systemic risk, it is only recognizable like the tip of an iceberg is recognizable, because most cyber systemic risk lurks well out of view, deep beneath the surface in the ocean of virtual ones and zeros.
“Cyber systemic risk” generally is the Internet version of the financial crisis’ hard lesson of “systemic risk,” where the world learned that risks or disruptions to one or a few financial institutions could cascade to become risks or disruptions to the broader financial ecosystem. That’s because the inherent inter-linkages and inter-dependencies of financial institutions’ debt and liquidity exposed the then underappreciated fragility of the interwoven financial system.
The financial crisis exposed the need and the requirement for corporations to be more vigilant concerning enterprise risk management (ERM). Consequently the next crisis exposing enterprise risk is less likely to happen from a replay of known financial systemic risks, but from new unappreciated or ignored cyber systemic risks.
Cyber systemic risk is arguably more serious than financial systemic risk. That’s because the Internet inherently is: the most inter-linked, inter-dependent, intermediary system ever created; an insecure and un-private system; and more centralized and concentrated at the top than the financial ecosystem.
Pages
|