Click here to close now.


News Feed Item

Google+ Shuts Online Predators' Accounts In Response to Consumer Watchdog Letter, But Key Privacy Design Flaw Remains And Must Be Fixed, Public Interest Group Says

SANTA MONICA, Calif., Jan. 9, 2014 /PRNewswire-USNewswire/ -- Google has cleaned up its social network shutting down some accounts of apparent online predators and eliminating explicit sexual content in apparent response to a complaint from Consumer Watchdog, but the Internet giant's Google+ still has a privacy design flaw that must be fixed, the public interest group said today.

In a letter to CEO Larry Page and Executive Chairman Eric Schmidt, Consumer Watchdog's Privacy Director John M. Simpson wrote:

"Clearly you can police your network when you want to do so. Consumer Watchdog calls on you to continue such necessary efforts.  However, as explained below you have still failed to address a fundamental design flaw in Google+ that violates users' privacy and Consumer Watchdog urges you to remedy this situation immediately."

Read Consumer Watchdog's letter to Google today here:

In December Consumer Watchdog wrote Google complaining that in an apparent quest to grow the user base as rapidly as possible, Google+ had been allowed to become a virtual playground for online predators and explicit sexual content.  A report compiled by a tech industry whistleblower, who had periodically monitored Google's social network since March, was included with the letter.

The whistleblower's report listed and gave links to seven of the most egregiously salacious Google+ accounts as examples including one user who described himself like this:

"Nice daddy or older brother type who loves all things pervy… will share pics but not publicly—been deleted before! 38 now and looking to chat and share pics with any gay guys (or straight or bi) that are into it. Any age is cool with me—who am I to tell you you're too young? Right? Anyhow, I will share more photos as I go and will be on messenger as time allows! Hope to visit with you all soon!"

This user's Circles also included over 100 boys. Many of the images were sexualized or nude images of children -- several who appeared to be under the age of 10 or even toddlers.

When the study was sent, Google+ offered several Communities in which minors (or even adults posing as minors) could openly advertise the trading of sexually explicit images and photographs of each other – a blatant violation of Google's User Content & Conduct Policy.   Google+ had several sexually explicit Communities specifically focused on minors and teens including "Horny Teens," "Horny Teen Chat," "Horny Teen Talk" and more.  In many of these Communities sexually explicit content focused on teens was not only tolerated, but actively encouraged. The community guidelines for the Horny Teens Community for instance read:

"About this community: Welcome to a community created for all the horny teens that need someone else. Explicit content may be present and is recommended and welcome here, [emphasis added] please just enjoy yourselves and let me know if there is anything I can do to make your experience better. ;)"

"Thankfully these accounts have been deleted.  Without a doubt you have the resources to continue to monitor the network and remove inappropriate material," wrote Simpson. "When it was called to your attention, you did so. Now Google must understand that part of the responsibility of the operator of a social network is to proactively monitor its content.  Consumer Watchdog calls on you to continue that necessary effort.  However, doing that is not enough.  You must address a fundamental design flaw in Google+ that compromises users' privacy."

To understand the privacy problem it is necessary to compare Google+ with other social networks such as Facebook, Consumer Watchdog said.  In Facebook for example, a person receiving a request from an individual to be their "friend" must approve that request first.  If the person chooses not to accept, he or she is in no way associated with the individual. 

On Google+ any individual can add a user to his Circles.  If the user does not appreciate the posts he sends to them, they can block the individual's posts.  However, if anyone visits the person's profile and he has opted to display publicly who is in his Circles, the user's name and picture will still appear there.  The user cannot remove himself from the sender's Circles, no matter what, once that person has placed them in their Circles.

"A user is forced to be publicly associated with someone with whom they do not wish to be associated.  For example, both of you are in my Circles and I rather suspect you'd prefer not to be," wrote Simpson to Page and Schmidt. "This is a fundamental privacy flaw and must be fixed.  People must have the right to choose with whom they are associated."

Read Consumer Watchdog's December letter to Google here:

You can find a redacted copy of the tech industry whistleblower's report on the Consumer Watchdog website.

Visit Consumer Watchdog's website at

SOURCE Consumer Watchdog

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
Internet of @ThingsExpo, taking place June 7-9, 2016 at Javits Center, New York City and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Y...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
There are over 120 breakout sessions in all, with Keynotes, General Sessions, and Power Panels adding to three days of incredibly rich presentations and content. Join @ThingsExpo conference chair Roger Strukhoff (@IoT2040), June 7-9, 2016 in New York City, for three days of intense 'Internet of Things' discussion and focus, including Big Data's indespensable role in IoT, Smart Grids and Industrial Internet of Things, Wearables and Consumer IoT, as well as (new) IoT's use in Vertical Markets.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...