You are here
Submitted by Scott Cleland on Mon, 2011-12-12 13:59
Many thanks to Adam Thierer of the Technology Liberation Front, for selecting my book, Search & Destroy, as a top twenty most Important Cyber-Law & Info-Tech Policy books of 2011 because “it represented the beginning of an articulation of a philosophy of “cyber-conservatism.” I also thank Adam for his critical and insightful review of Search & Destroy, which clearly delineates his principled cyber-libertarian differences with my principled “cyber-conservative” views.
Submitted by Scott Cleland on Fri, 2011-12-09 10:15
The kerfuffle painting the Google Wallet App as an innocent victim of Verizon blocking -- in violation of an "open" Internet and net neutrality regulations -- completely misses the forest for the trees. This conflict revolves around two ongoing industry battles.
Submitted by Scott Cleland on Wed, 2011-11-30 12:04
The likely passage of online anti-piracy legislation (SOPA/PIPA) in 2012 has put a spotlight on the substantial ad-based business interests aligned with piracy and against piracy enforcement.
See my Forbes Tech Capitalist post here to learn why Grand Theft Auto-mated is such big business and so anti-piracy enforcement.
Submitted by Scott Cleland on Tue, 2011-11-15 12:19
In compiling and ranking the top threats facing Google, I was amazed at the breadth, depth, diversity and seriousness of the threats and liabilities facing Google.
Please see my Forbes Tech Capitalist post here to learn the ranking of what threats to Google are most serious and why.
Submitted by Scott Cleland on Fri, 2011-10-28 11:03
How could Google fail to meet the security needs of the City of Los Angeles in its trophy government cloud contract?
Learn why in my Forbes Tech Capitalist post here, entitled "Google Too Fast and Loose for LAPD."
Submitted by Scott Cleland on Tue, 2011-10-11 13:43
Google's Rogue WiSpy Invasive Behavior Proliferates -- Security is Google's Achilles Heel -- Part XIIISubmitted by Scott Cleland on Fri, 2011-06-17 11:59
Evidence continues to mount that Google's management and supervision of its Android operating system is out-of-control when it comes to protecting privacy and security.
Consider the growing pattern of Google's default design and behavior that maximizes collection of private information, which inherently puts users at greater security risk.
First, and profoundly disturbing, is a new TechRepublic revelation in a post by security blogger Donovan Colbert.
In setting up his new Android-based tablet, Mr. Colbert discovered that the Android operating system by default, i.e. without permission, automatically collected and implemented encrytion key passcodes to automatically gain access to private networks without the permission of the user. In Mr. Colbert's own words:
Top 10 Reasons Google Has Culpability in Gmail Security Breach -- Security is Google Achilles Heel Part XIISubmitted by Scott Cleland on Fri, 2011-06-03 11:01
Google's deep aversion to accountability was in full view in its blog response to the latest gmail security breach, in which Google placed most all of the blame on users and others, while largely trying to absolve Google of its responsibility and accountability in the matter as the world's largest source of private, sensitive and secret information.
Top 10 Reasons Google Has Culpability & Needs More Accountability:
Submitted by Scott Cleland on Thu, 2011-05-12 11:47
Submitted by Scott Cleland on Tue, 2011-05-10 11:57
I've long thought there was a big untold story about Google, essentially a book all about Google, but told from a user's perspective, rather than the well-worn path of Google books told largely from Google's own paternal perspective.
Given that Google is the most ubiquitous, powerful and disruptive company in the world, it seemed logical to me that users, and people affected by Google, had a lot of important and fundamental questions about Google that no book had ever tried to answer in a straightforward and well-defended manner.