Feeds

Google is ‘Obama’s Halliburton’

So who's Dick Cheney?

High performance access to file storage

A discovery motion filed part of an investigation into Google’s former chief lobbyist turned Obama’s “Deputy CTO” failed this week.

Former lobbyists are prohibited from involvement in policies that affect their former employer - in the case of Andrew McLaughlin, Google's former Head of Global Public Policy - it's hard to see how this can be upheld. McLauglin hasn't been shy of rolling his sleeves up, and getting stuck in.

McLaughlin's cosy relationship with his former employer was exposed - ironically - by Google's Buzz privacy snafu, when McLauglin's private GMail backchannel came to light. McLaughlin was using GMail to share policy information with Google lawyers and lobbyists. McLaughlin was reprimanded in May.

Yesterday, Republicans on the House Oversight subcommittee that looks at IT policy wanted to subpoena Beth Noveck, who heads – ironically, again - the open government initiative. The vote failed on party lines.

A new batch of emails released by ethics watchdog the National Legal and Policy Center show McLaughlin - this time using his government email account - co-ordinating meetings with Google lobbyist Marckham Ericsson, and Google front group Free Press.

Free Press disputes this description – stating that its income comes from Foundations and private individuals, rather than directly from the Chocolate Factory itself. But it marches in lock-step with Google policy, which is a happy coincidence for both parties.

McLaughlin met former FreePress director Ben Scott at a local coffee shop, which meant the meeting didn't show up in the "visitors log" - officials are obliged to disclose details of who they meet.

It's hardly a smoking gun. Not yet, anyway. But the NLPC stepped up the pressure on the House Committee on Oversight and Government Reform to investigate the relationship, noting:

"Like Halliburton in the previous Administration, Google has an exceptionally close relationship to the current Administration."

Google CEO Eric Schmidt lobbied for Obama and paid to attend his coronation inauguration ceremony - a number of former company officials now serve in the administration. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.