Feeds

Google boss: 'Creeped out by Street View? Just move'

Latest Schmidt gaffe vanished by CNN

SANS - Survey on application security programs

Uh, forgets?

As well-known privacy campaigner and former Federal Trade Commission employee Christopher Soghoian explains, Google does not "forget" or delete your searches. "It merely deletes a little bit of data that associates the searches to known Google users," Soghoian says.

As Chris Soghoian adds, Schmidt is a man with a PhD in computer science. You might say that a computer science doctorate hardly prepares you for discussions with the international news media. But it should indicate that you're capable of understanding how Google's server logs work.

After Schmidt said that Google retains search data for "a year, year and a half," he was asked "who decides?" He responded by saying that the company is forced to retain data by European law. "Well, in fact, the European government passed a set of laws that require us to keep it for a certain amount," he said, "and the reason is that the public safety sometimes wants to be able to look at that information."

Google has long made this argument. But as Soghoian points out, the EU has said that Google is not subject to its data-retention directive. "The Data Retention Directive applies only to providers of publicly available electronic communications services or of public communication networks and not to search engine systems," read a letter from the European Commission's Data Protection Unit, which is represented on the Article 29 Working Party, the committee of Europe's data protection authorities.

"Accordingly, Google is not subject to this Directive as far as it concerns the search engine part of its applications and has no obligations thereof."

In fact, Google moved to its nine-month policy after years of pressure from governments and privacy advocates, and the Article 29 Working Party still says that the policy does not comply with EU law.

"Deleting the last octet of the IP-addresses is insufficient to guarantee adequate anonymisation," read a May letter from the Working Party to Google. "Such a partial deletion does not prevent identifiability of data subjects. In addition to this, you state you retain cookies for a period of 18 months. This would allow for the correlation of individual search queries for a considerable length of time. It also appears to allow for easy retrieval of IP-addresses, every time a user makes a new query within those 18 months."

Schmidt isn't just leaping across the creepy line, he's misrepresenting Google's data-retention policies. And in both cases, it's unclear whether Schmidt completely realizes what's he doing or whether he's capable of stopping it. There's no shortage of high-profile pundits who point out that Schmidt only continues to creep people out with his seemingly offhanded claims that they — and not Google — are to blame if they're uncomfortable with Google, well, knowing where they are, where they’ve been, and more or less knowing what they're thinking about. And yet he continues to make these claims.

The situation only snowballs when Schmidt seems to chuckle when his approach is questioned and claims that comments seemingly made in earnest were mere jokes. By insisting Google isn't creepy, he only gets creepier.

And then he does it again. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.