You are here
Submitted by Scott Cleland on Tue, 2015-10-13 11:11
This piece assembles the evidence that Google’s benign PR explanation and stock-enhancement justification for its Alphabet holding company restructuring -- may be the truth, but apparently is not the whole truth and nothing but the truth, about the structural antitrust and privacy risks ahead that it clearly foresees, but is not disclosing.
What we have learned in the last two months is that Google is much more worried than it says about the risks it faces from a variety of real structural changes it may have to make in its core business overseas in the months and years ahead -- where the vast majority of Google’s users are, and from where over 50% of its revenues come.
Submitted by Scott Cleland on Wed, 2015-10-07 18:43
Don’t miss the sweeping antitrust, privacy, security, and EU-U.S. Data Safe Harbor ramifications of Google-Android’s power grab and highly-strategic acquisition last week of Jibe Mobile’s “Rich Communications Suite” (RCS), the world’s leading, mobile-carrier, messaging platform/standard.
Simply, Google has just acquired the single missing strategic piece holding Google back from being able to centralize the recording, data transfer and analysis of most global mobile communications like it has already centralized the collection, data transfer, and indexing of the world’s digital information.
Submitted by Scott Cleland on Mon, 2015-09-28 18:13
The U.S. FTC has opened an antitrust probe of Google’s Android mobile operating system per Bloomberg reporting to investigate allegations that Google has anti-competitively limited competitive services on the Google-Android platform and extended its market power by favoring Google services over competitors’.
Top Ten Questions Raised by FTC’s Google-Android Probe
Submitted by Scott Cleland on Wed, 2015-09-23 11:28
The juxtaposition of Google tacitly accusing the EU with “digital protectionism” and “discrimination” as the EU’s Digital Chief, Günther Oettinger, visits D.C. and Silicon Valley, while the Google-created Internet Association this week asks for U.S. protection from ISP “discrimination” in an appeals court brief in support of the FCC’s Open Internet order – exposes exceptional hypocrisy.
Antitrust and privacy regulators around the world weren’t born yesterday. They know Google and its online platform allies want it both ways – manipulating policy to advantage them and disadvantage their potential competitors.
Submitted by Scott Cleland on Thu, 2015-09-17 12:10
Submitted by Scott Cleland on Tue, 2015-09-08 22:27
“Cyber systemic risk” is Internet-driven risk that threatens to destroy the business viability of industry ecosystems.
While cybersecurity risk may be the familiar and recognizable type of cyber systemic risk, it is only recognizable like the tip of an iceberg is recognizable, because most cyber systemic risk lurks well out of view, deep beneath the surface in the ocean of virtual ones and zeros.
“Cyber systemic risk” generally is the Internet version of the financial crisis’ hard lesson of “systemic risk,” where the world learned that risks or disruptions to one or a few financial institutions could cascade to become risks or disruptions to the broader financial ecosystem. That’s because the inherent inter-linkages and inter-dependencies of financial institutions’ debt and liquidity exposed the then underappreciated fragility of the interwoven financial system.
The financial crisis exposed the need and the requirement for corporations to be more vigilant concerning enterprise risk management (ERM). Consequently the next crisis exposing enterprise risk is less likely to happen from a replay of known financial systemic risks, but from new unappreciated or ignored cyber systemic risks.
Cyber systemic risk is arguably more serious than financial systemic risk. That’s because the Internet inherently is: the most inter-linked, inter-dependent, intermediary system ever created; an insecure and un-private system; and more centralized and concentrated at the top than the financial ecosystem.
Submitted by Scott Cleland on Wed, 2015-09-02 11:10
The modern world has never before seen a company with the scale, scope, reach and speed of Google’s business dominance. Expect Google’s antitrust problems to proliferate with its proliferating dominance and abuses.
No other company has ever grown several separate and very different, stand-alone verticals simultaneously, by several hundred million users each, in less than ~three years.
Submitted by Scott Cleland on Fri, 2015-08-21 09:55
The single most important Google accountability article I have ever read, out of the literally ten thousand plus that I have read in my nine years researching Google in depth, is Dr. Robert Epstein’s article in Politico entitled “How Google could rig the 2016 election.”
Anyone, who has any interest in, or concern about, the integrity of elections in democracies in the digital age, and/or Google’s market power over what information people access, must read this article.
Submitted by Scott Cleland on Wed, 2015-08-12 12:40
There is more to learn from the Alphabet-Google restructuring than Google’s PR narratives.
First for those paying close attention, this restructuring and Alphabet branding should spotlight Google’s truly amazing accomplishments to date, and Alphabet-Google’s breathtaking ambitions going forward.
At core this restructuring formalizes Alphabet-Google’s very real transition, from a Gcosytem focus of disintermediating and dominating much of the Internet and tech sectors, to a Gconomy focus of disintermediating and dominating much of the rest of the economy.
Submitted by Scott Cleland on Tue, 2015-07-07 18:51
In the coming months, Google, and to a lesser extent, Facebook and Apple are on a collision course with American and foreign law enforcement over their pervasive, law-evasive, encryption of Internet traffic by default, which increasingly means law enforcement with a legitimate court-ordered-warrant, cannot search a Google, Facebook, or Apple users’ communications to investigate, prevent and prosecute terrorism or felony crime.
All three, to different degrees, are seeking to regain user trust lost by Snowden’s exposure of ubiquitous NSA spying, by deceptively trumpeting their encryption of traffic as a panacea for privacy vulnerabilities.
[Please don’t miss the summary below of that encapsulates how more pervasive, law-evasive, encryption is not a privacy/security panacea but a grave threat to both public safety and the global free and open Internet we know today.]