Internet Security

Case Study of Google Serial Over-collection of Private Data for FTC Hearings

A Case Study of Alphabet-Google’s 2004-2018 Privacy Track Record of Evident Unfair and Deceptive Over-collection of Consumers’ Personal Data Exposes an Evident Gap in the FTC’s Remedial Authority to Protect Consumers

Submitted as a public comment for the FTC’s fall 2018 “Competition and Consumer Protection in the 21st Century Hearings.” Topic #5: “The Commission’s remedial authority to deter unfair and deceptive conduct in privacy and data security matters” FTC Project Number: P181201; (PDF FTC submission here)

July 30, 2018; By Scott Cleland; President, Precursor® LLC  info@precursor.com & Chairman, NetCompetition®

Conclusion

This case study of Alphabet-Google’s track record of unfair and deceptive privacy and data security practices provides a compelling body of evidence of 17 major business practice examples over a fifteen-year period that indicate the FTC evidently does not have enough remedial enforcement authority to deter Google, or other Internet platforms, from engaging in unfair and deceptive conduct in privacy and data security matters.

It is also evident from Google’s words and actions chronicled below that it legally does not believe its users have a “legitimate expectation of privacy” concerning the information they provide to Google.

NetCompetition: Google & Softbank Are the Impetus Behind a Nationalized 5G Wireless Network

 

FOR IMMEDIATE RELEASE, January 29, 2018, Contact: Scott Cleland 703-217-2407

 

The Primary Beneficiaries of America Nationalizing a 5G Wireless Information Highway Would Be: Google’s Monopoly Information Access, Android Mobile Operating System, & Google Maps/Waze; and SoftBank’s ~$60b holdings in China’s Alibaba & $100b Telecom/Tech Venture Fund

 

WASHINGTON D.C. – The following may be attributed to Scott Cleland, Chairman of NetCompetition:

 

“An analysis of the Axios-reported memo proposing to build a nationalized 5G wireless network makes it clear that Alphabet-Google and SoftBank are the moving force behind it. The proposal obviously would benefit their interests first and foremost and it goes in the exact direction they have lobbied for over the last several years.”

 

“It is especially ironic and troubling that Softbank and Alphabet-Google are the apparent impetus behind this proposal for a secure wireless transportation network to compete with China and be secure from Chinese snooping.

 

Google’s the Encryption Ringleader Thwarting FBI Investigation of Terrorism

Google is the ringleader thwarting the FBI’s high priority to make smartphones subject to the Communications Assistance to Law Enforcement Act, CALEA, like all other communications technologies were before smartphones, so that the FBI can continue to wiretap, investigate and thwart terrorism (ISIS etc.), and crime, like it routinely did prior to the smartphone era.  

(Anyone that doubts Google is the de facto encryption ringleader, see the evidence here. And don’t miss the fourth segment of this analysis about how Google cleverly thwarted the FBI in lobbying for a de facto anti-CALEA, last-minute, change to the FCC’s Open Internet order.) 

Google’s “Going Dark” Encryption Leadership Threatens Sovereign Security

Google is unique in its leadership, plans, and global marketpower to accelerate the majority of all global Web traffic “going dark,” i.e. encrypted by default. Google’s “going dark” leadership seriously threatens  to neuter sovereign nations’ law-enforcement and intelligence capabilities to investigate and prevent terrorism and crime going forward.

Google is not the only U.S. Internet company endangering the national security of many countries by “going dark” via end-to-end corporate encryption in an environment of exceptional terrorist risk -- Apple has been self-servingly irresponsible as well.

Nevertheless, Google warrants the spotlight and primary focus here on “going dark” for three big reasons.

Deceptive Branding is “How Google Works” – Ask EC Law Enforcement

As EC law enforcement confronts Google’s uniquely extensive wrongdoing in competition, privacy/security, property, and tax matters, it is critical to examine if Google’s longstanding public promises to consumers to gain their trust are in fact true and trustworthy.

Central to law enforcement’s role in determining the extent of its Google charges, penalties and remedies is determining whether or not the infractions were willful or unintentional.

Google’s Illusion of Data Protection Security

 

While a well-positioned façade of a castle can create the illusion of a fully-fortified castle, real people’s data requires more than the illusion of security; it requires real data-protection-security.  

Google’s outsize ability to create the illusion of data-protection-security is particularly apt given that Eran Feigenbaum is Google Apps Security Director by day, and also a professional magician/illusionist by night.

Google Android Dominates by Cheating Data Protection

Google-Android sacrifices users’ security, privacy and data protection to scale Android fastest so that Google can dominate mobile software and advertising.

This charge and analysis is timely and relevant because Reuters is reporting that European Commission competition authorities are “laying the groundwork for a case centered on whether Google abuses the 80 percent market share of its Android mobile operating system to promote services from maps to search.”

The purpose of this particular analysis is to help a user better understand how they are harmed by Google-Android’s disregard for data protection.

Dropcam Key to Google’s New Ubiquitous Physical Surveillance Network – Part 25 Google Spying Series

Google recently boughtDropcam for $555m, a company which makes inexpensive, easy-to-install, WiFi-video-streaming-cameras that connect to cloud-based networks for convenient monitoring, set-up and retrieval.

Please don’t miss this graphic -- here -- of how the Dropcam acquisition fits into Google’s plans for a new ubiquitous physical surveillance network that will complement and leverage its existing virtual surveillance network.