Welcome!

News Feed Item

Google+ Shuts Online Predators' Accounts In Response to Consumer Watchdog Letter, But Key Privacy Design Flaw Remains And Must Be Fixed, Public Interest Group Says

SANTA MONICA, Calif., Jan. 9, 2014 /PRNewswire-USNewswire/ -- Google has cleaned up its social network shutting down some accounts of apparent online predators and eliminating explicit sexual content in apparent response to a complaint from Consumer Watchdog, but the Internet giant's Google+ still has a privacy design flaw that must be fixed, the public interest group said today.

In a letter to CEO Larry Page and Executive Chairman Eric Schmidt, Consumer Watchdog's Privacy Director John M. Simpson wrote:

"Clearly you can police your network when you want to do so. Consumer Watchdog calls on you to continue such necessary efforts.  However, as explained below you have still failed to address a fundamental design flaw in Google+ that violates users' privacy and Consumer Watchdog urges you to remedy this situation immediately."

Read Consumer Watchdog's letter to Google today here: http://www.consumerwatchdog.org/resources/ltrgoogle010914.pdf

In December Consumer Watchdog wrote Google complaining that in an apparent quest to grow the user base as rapidly as possible, Google+ had been allowed to become a virtual playground for online predators and explicit sexual content.  A report compiled by a tech industry whistleblower, who had periodically monitored Google's social network since March, was included with the letter.

The whistleblower's report listed and gave links to seven of the most egregiously salacious Google+ accounts as examples including one user who described himself like this:

"Nice daddy or older brother type who loves all things pervy… will share pics but not publicly—been deleted before! 38 now and looking to chat and share pics with any gay guys (or straight or bi) that are into it. Any age is cool with me—who am I to tell you you're too young? Right? Anyhow, I will share more photos as I go and will be on messenger as time allows! Hope to visit with you all soon!"

This user's Circles also included over 100 boys. Many of the images were sexualized or nude images of children -- several who appeared to be under the age of 10 or even toddlers.

When the study was sent, Google+ offered several Communities in which minors (or even adults posing as minors) could openly advertise the trading of sexually explicit images and photographs of each other – a blatant violation of Google's User Content & Conduct Policy.   Google+ had several sexually explicit Communities specifically focused on minors and teens including "Horny Teens," "Horny Teen Chat," "Horny Teen Talk" and more.  In many of these Communities sexually explicit content focused on teens was not only tolerated, but actively encouraged. The community guidelines for the Horny Teens Community for instance read:

"About this community: Welcome to a community created for all the horny teens that need someone else. Explicit content may be present and is recommended and welcome here, [emphasis added] please just enjoy yourselves and let me know if there is anything I can do to make your experience better. ;)"

"Thankfully these accounts have been deleted.  Without a doubt you have the resources to continue to monitor the network and remove inappropriate material," wrote Simpson. "When it was called to your attention, you did so. Now Google must understand that part of the responsibility of the operator of a social network is to proactively monitor its content.  Consumer Watchdog calls on you to continue that necessary effort.  However, doing that is not enough.  You must address a fundamental design flaw in Google+ that compromises users' privacy."

To understand the privacy problem it is necessary to compare Google+ with other social networks such as Facebook, Consumer Watchdog said.  In Facebook for example, a person receiving a request from an individual to be their "friend" must approve that request first.  If the person chooses not to accept, he or she is in no way associated with the individual. 

On Google+ any individual can add a user to his Circles.  If the user does not appreciate the posts he sends to them, they can block the individual's posts.  However, if anyone visits the person's profile and he has opted to display publicly who is in his Circles, the user's name and picture will still appear there.  The user cannot remove himself from the sender's Circles, no matter what, once that person has placed them in their Circles.

"A user is forced to be publicly associated with someone with whom they do not wish to be associated.  For example, both of you are in my Circles and I rather suspect you'd prefer not to be," wrote Simpson to Page and Schmidt. "This is a fundamental privacy flaw and must be fixed.  People must have the right to choose with whom they are associated."

Read Consumer Watchdog's December letter to Google here: http://www.consumerwatchdog.org/resources/ltrgoogle121713.pdf

You can find a redacted copy of the tech industry whistleblower's report on the Consumer Watchdog website.

Visit Consumer Watchdog's website at www.consumerwatchdog.org

SOURCE Consumer Watchdog

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Machine learning provides predictive models which a business can apply in countless ways to better understand its customers and operations. Since machine learning was first developed with flat, tabular data in mind, it is still not widely understood: when does it make sense to use graph databases and machine learning in combination? This talk tackles the question from two ends: classifying predictive analytics methods and assessing graph database attributes. It also examines the ongoing lifecycl...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
A valuable conference experience generates new contacts, sales leads, potential strategic partners and potential investors; helps gather competitive intelligence and even provides inspiration for new products and services. Conference Guru works with conference organizers to pass great deals to great conferences, helping you discover new conferences and increase your return on investment.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...