You are here
Submitted by Scott Cleland on Wed, 2012-03-07 14:15
See my Daily Caller Op-Ed: "EU Filling FTC Void of Google Law Enforcement."
The evidence is mounting that the European Union is stepping in to fill the void of FTC law enforcement concerning Google. Currently, EU law enforcement is confronting Google on at least three different major law enforcement matters, and in the U.S., the DOJ, State Attorneys General, and Congressional overseers have taken a consistent, bipartisan tough law enforcement approach with Google. However, this is in stark contrast to the FTC's consistently lax law enforcement record with Google.
For the full story and evidence click here.
Submitted by Scott Cleland on Fri, 2012-03-02 17:16
Count me as totally perplexed how the supposedly-security-minded U.S. State Department could decide to adopt security-challenged Google's Chrome browser for worldwide use by the State Department. What are they thinking?
Chrome is a consumer-grade, ad-supported, tracking-driven browser. By design Chrome has an advertising default omni-tracking capability inappropriate for Federal Government secret classified work. For the first time only last week, Google begrudgingly committed to offering a voluntary do-not-track capability for Chrome by the end of 2012 as part of the White House brokered Online Privacy Bill of Rights. However, will Google respect the State Department's right to secrecy? That's a very fair question given that…
Submitted by Scott Cleland on Wed, 2012-02-22 13:22
Since Privacy International ranked Google worst in the world for Privacy in its 2007 privacy survey for its unique “comprehensive consumer surveillance & entrenched hostility to privacy,” Google has had at least 24 more public scandals/controversies over privacy/security.
Submitted by Scott Cleland on Fri, 2012-02-17 16:20
(Note: The text in quotations are verbatim quotes from Google via a Politico post. The italics in [ ] is a satirical translation of what Google really is saying.)
“Google’s Rachel Whetstone, senior vice president for Communications and Public Policy issued the following statement to POLITICO regarding a WSJ report that the company has been bypassing the privacy settings of Apple's Web browser on iPhones and computers:”
“The Journal mischaracterizes what happened and why.”
“We used known Safari functionality to provide features that signed-in Google users had enabled.”
Submitted by Scott Cleland on Tue, 2012-02-14 11:56
Google is battling law enforcement in the U.S. and around the world on three different legal battlefronts: antitrust, privacy and property. Why is it only Google that is under serious law enforcement investigation for so many different serious infractions in so many countries around the world? According to a top Google lawyer, “Google’s leadership does not care terribly much about precedent or law” per Stephen Levy’s book In The Plex. That very rare scofflaw attitude, combined with the vast amount of evidence cataloged below, strongly suggests Google is not the innocent victim it claims to be, but a dominant perpetrator of systematic violations of law around the globe.
Only Google is battling law enforcement around the globe with the defiant stance that:
Submitted by Scott Cleland on Tue, 2012-01-31 12:17
Why are market forces so weak in protecting users’ online privacy?
The main reason is that the online marketplace is economically structured around users being a commodity, data, to be aggregated and mined, not customers to be served and protected in a competitive marketplace. That’s because the overriding economic force that created the free and open commercial Internet – the predominant Silicon Valley venture capital/IPO value creation model – was and remains largely antithetical to protecting online privacy.
The Silicon Valley venture capital/IPO driven model is laser-focused on achieving Internet audience/user scale fastest in order to gain first-mover advantage and then rapid dominance of a new product or service segment. This predominant Internet economic model is predicated on a precious few investments achieving such rapid user scale that it: warrants a buy-out at an enormous premium multiple; enables fast and exceptionally-profitable liquidity (via the new secondary derivative market for private venture shares or employee options); or broad liquidity via a public IPO.
What is the essential critical element of achieving audience/user scale fastest? Free. No direct cost to the user fuels fastest, frictionless, viral adoption. This free economic model presupposes online advertising as an eventual monetization mechanism and shuns products and services directly paid for by the user because their inherent time-to-market is too slow and their upfront sunk cost of sales and customer service is too high for this predominant value creation model.
Submitted by Scott Cleland on Fri, 2012-01-27 19:12
Reports that “Twitter Can Censor by Country” is a perfect example of how the world is changing the Internet. Change is a two-way street. Conventional wisdom that only assumes the Internet is changing the world risks being blind-sided by the Internet’s underappreciated exa-trend: how the world is changing the Internet.
See my Forbes Tech Capitalist post: "Twitter Realpolitik & the Sovereignization of the Internet" to learn about Twitter's new realpolitik and how sovereign powers will increasingly be asserting themselves vis a vis the Internet.
Submitted by Scott Cleland on Tue, 2012-01-24 12:03
Google led, orchestrated, politically-framed and set the political tone for much of the Web’s opposition to pending anti-piracy legislation, SOPA/PIPA, because rule of law and effective enforcement of property rights online represent a clear and present danger to Google’s anti-property-rights mission, open philosophy, business model, innovation approach, competitive strategy, and culture.
Submitted by Scott Cleland on Wed, 2012-01-11 16:25
Submitted by Scott Cleland on Mon, 2011-12-12 13:59
Many thanks to Adam Thierer of the Technology Liberation Front, for selecting my book, Search & Destroy, as a top twenty most Important Cyber-Law & Info-Tech Policy books of 2011 because “it represented the beginning of an articulation of a philosophy of “cyber-conservatism.” I also thank Adam for his critical and insightful review of Search & Destroy, which clearly delineates his principled cyber-libertarian differences with my principled “cyber-conservative” views.