You are here
Submitted by Scott Cleland on Wed, 2015-03-25 11:03
Public evidence concerning the amount of special access Google has to the highest reaches of the U.S. Government creates at least the appearance that the U.S. Government’s business may not be “conducted with impartiality and integrity” as required under Federal ethics rules.
Submitted by Scott Cleland on Fri, 2015-03-20 04:00
Previously unknown facts about the FTC staff’s 2011 Google search bias investigation have the makings of a potential scandal and cover-up with broad repercussions for Google with the European Commission, other countries, the FTC, State AGs and Congress.
The WSJ gained inadvertent access to the FTC’s 2011 staff report about its investigation of Google’s search practices. FTC staff concluded: Google abused its monopoly power in search and search advertising; harmed Internet users and competitors; and manipulated its search results by favoring its own content over competitors’ content.
Submitted by Scott Cleland on Mon, 2015-03-16 11:48
Expect the FCC’s new Open Internet Order’s assertion of Title II authority ultimately to be rejected in court (90%), because of its core illegal confiscatory purpose and its serial ends-justify-the-means trampling of due process.
The FCC’s Title II legal defense is a “modern” day version of “the Emperor has no clothes” fable, where the vain FCC confidently parades in public clothed in the legal fabric that utopian legal alchemists have convinced the FCC is invisible only to those who are “hopelessly stupid” or “unfit for their positions.” Sadly, this emperor (the FCC) has no clothes (sustainable legal case).
Submitted by Scott Cleland on Wed, 2015-01-07 17:28
As EC law enforcement confronts Google’s uniquely extensive wrongdoing in competition, privacy/security, property, and tax matters, it is critical to examine if Google’s longstanding public promises to consumers to gain their trust are in fact true and trustworthy.
Central to law enforcement’s role in determining the extent of its Google charges, penalties and remedies is determining whether or not the infractions were willful or unintentional.
Submitted by Scott Cleland on Mon, 2014-10-27 16:02
Dear European Commission Official,
History teaches that those who do not learn from the past are doomed to repeat it.
Specifically, as the new European Commission takes charge of the mess that is the Google competition case, it is important to learn from, and not repeat, Mr. Almunia’s many big Google mistakes.
Summary of Almunia-Google Mistakes
Submitted by Scott Cleland on Mon, 2014-10-20 10:48
Google executives’ saccharine best-selling book: “How Google Works,” predictably ignores and whitewashes how Google steals to make its free model work.
This piece spotlights the likely “Post-it Child” of Google theft victims and five other theft victims that Google has stolen from using its signature MO or “Google Con.” It also links to another nineteen victims for a total of at least twenty five examples of Google’s theft and piracy. Corporate kleptomania is “How Google Works.”
Google’s mission is to organize the world’s information for free. Its business model is to generate ad revenue on only the sliver of information that users find and click on.
So Google respecting property rights – whether it is privacy, confidential information, trade secrets, copyrights, patents or trademarks – would be prohibitively expensive because their world view presumes that digitized information should be free.
Submitted by Scott Cleland on Tue, 2014-10-14 22:30
History should remember Google Chairman Eric Schmidt’s speech in Berlin, “The New Gründergeist,” as the “Ich bin ein Bigfibber” speech, because of his many big fibs about Google’s antitrust and data protection problems in Europe.
Claim: “Really, our biggest search competitor is Amazon” (not Bing or Yahoo.)
Facts: Google crawls 60 trillion unique URLs to create its search index of the world-wide-web; Amazon does not crawl or search index the world-wide-web.
Submitted by Scott Cleland on Mon, 2014-10-06 18:19
Google executives are on tour selling their new book: “How Google Works,” which actually tells very little about how Google really works when it comes to Google’s effect on people, and the protection of their well-being, property, privacy, safety, and dignity.
To really learn “How Google Works:”
Submitted by Scott Cleland on Sun, 2014-09-07 21:51
While a well-positioned façade of a castle can create the illusion of a fully-fortified castle, real people’s data requires more than the illusion of security; it requires real data-protection-security.
Google’s outsize ability to create the illusion of data-protection-security is particularly apt given that Eran Feigenbaum is Google Apps Security Director by day, and also a professional magician/illusionist by night.
Submitted by Scott Cleland on Mon, 2014-08-04 11:18
Google-Android sacrifices users’ security, privacy and data protection to scale Android fastest so that Google can dominate mobile software and advertising.
This charge and analysis is timely and relevant because Reuters is reporting that European Commission competition authorities are “laying the groundwork for a case centered on whether Google abuses the 80 percent market share of its Android mobile operating system to promote services from maps to search.”
The purpose of this particular analysis is to help a user better understand how they are harmed by Google-Android’s disregard for data protection.