SlideShare a Scribd company logo
A Convincing Antitrust Suit
against Alphabet-Google
Emerges
By: Scott Cleland
A Convincing Antitrust Suit against Alphabet-Google
Emerges
A proven thought leader, Scott Cleland operates GoogleMonitor.com, which advocates for greater
accountability and transparency by the world’s leading search engine. As an internetization
strategist, Scott Cleland has written a number of articles on emerging trends, including “The Trump
DOJ ‘Slam Dunk’ Antitrust Case Against Alphabet-Google.”
A Convincing Antitrust Suit against Alphabet-Google
Emerges
Mr. Cleland begins by describing classic illegal monopoly behavior as being synonymous with
Alphabet-Google of 2007-17 in which the company displayed consistent patterns of law
enforcement obstruction, collusion, and anti-competitive acquisition behavior. A particular enabler
was the FTC’s 2007 approval of Google-DoubleClick and the 2010 approval of Google-AdMob,
which “substantially lessened competition.”
A Convincing Antitrust Suit against Alphabet-Google
Emerges
As Mr. Cleland describes it, a change in administration presents the ideal opportunity to delve into
evidence from a new FTC and DOJ investigative perspective. If pursued, a “slam dunk” antitrust
case of the United States v. Alphabet-Google emerges.
A Convincing Antitrust Suit against Alphabet-Google
Emerges
According to Mr. Cleland, the single most illegal act involved divvying up the digital ad market
between Google and Facebook, with the two companies agreeing not to compete against each
other's core businesses. This convinced Facebook to end its Internet search syndication
partnership with Microsoft-Yahoo in 2014.

More Related Content

More from Scott Cleland

Common Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptxCommon Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptx
Scott Cleland
 
A Proven Thought Leadership Model
A Proven Thought Leadership ModelA Proven Thought Leadership Model
A Proven Thought Leadership Model
Scott Cleland
 
Responsible Internet Measures
Responsible Internet MeasuresResponsible Internet Measures
Responsible Internet Measures
Scott Cleland
 
What Is The Internet Reset?
What Is The Internet Reset?What Is The Internet Reset?
What Is The Internet Reset?
Scott Cleland
 
The Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsThe Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional Investors
Scott Cleland
 
An Overview of Precursor, LLC
An Overview of Precursor, LLCAn Overview of Precursor, LLC
An Overview of Precursor, LLC
Scott Cleland
 
Internetization and Framework Analysis
Internetization and Framework AnalysisInternetization and Framework Analysis
Internetization and Framework Analysis
Scott Cleland
 
The Google Monopolization Strategy
The Google Monopolization StrategyThe Google Monopolization Strategy
The Google Monopolization Strategy
Scott Cleland
 
How Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersHow Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms Consumers
Scott Cleland
 
An Interview with Scott Cleland
An Interview with Scott ClelandAn Interview with Scott Cleland
An Interview with Scott Cleland
Scott Cleland
 
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitragePrecursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Scott Cleland
 
Article Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsArticle Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal Documents
Scott Cleland
 

More from Scott Cleland (12)

Common Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptxCommon Examples of Online Crimes.pptx
Common Examples of Online Crimes.pptx
 
A Proven Thought Leadership Model
A Proven Thought Leadership ModelA Proven Thought Leadership Model
A Proven Thought Leadership Model
 
Responsible Internet Measures
Responsible Internet MeasuresResponsible Internet Measures
Responsible Internet Measures
 
What Is The Internet Reset?
What Is The Internet Reset?What Is The Internet Reset?
What Is The Internet Reset?
 
The Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional InvestorsThe Internet Reset Defines New Realities for Institutional Investors
The Internet Reset Defines New Realities for Institutional Investors
 
An Overview of Precursor, LLC
An Overview of Precursor, LLCAn Overview of Precursor, LLC
An Overview of Precursor, LLC
 
Internetization and Framework Analysis
Internetization and Framework AnalysisInternetization and Framework Analysis
Internetization and Framework Analysis
 
The Google Monopolization Strategy
The Google Monopolization StrategyThe Google Monopolization Strategy
The Google Monopolization Strategy
 
How Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms ConsumersHow Google Stunts Innovation and Harms Consumers
How Google Stunts Innovation and Harms Consumers
 
An Interview with Scott Cleland
An Interview with Scott ClelandAn Interview with Scott Cleland
An Interview with Scott Cleland
 
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory ArbitragePrecursor Blog Explains Netflix Response to Regulatory Arbitrage
Precursor Blog Explains Netflix Response to Regulatory Arbitrage
 
Article Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal DocumentsArticle Explores Google’s Reaction to Subpoena for Internal Documents
Article Explores Google’s Reaction to Subpoena for Internal Documents
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

A Convincing Antitrust Suit against Alphabet-Google Emerges

  • 1. A Convincing Antitrust Suit against Alphabet-Google Emerges By: Scott Cleland
  • 2. A Convincing Antitrust Suit against Alphabet-Google Emerges A proven thought leader, Scott Cleland operates GoogleMonitor.com, which advocates for greater accountability and transparency by the world’s leading search engine. As an internetization strategist, Scott Cleland has written a number of articles on emerging trends, including “The Trump DOJ ‘Slam Dunk’ Antitrust Case Against Alphabet-Google.”
  • 3. A Convincing Antitrust Suit against Alphabet-Google Emerges Mr. Cleland begins by describing classic illegal monopoly behavior as being synonymous with Alphabet-Google of 2007-17 in which the company displayed consistent patterns of law enforcement obstruction, collusion, and anti-competitive acquisition behavior. A particular enabler was the FTC’s 2007 approval of Google-DoubleClick and the 2010 approval of Google-AdMob, which “substantially lessened competition.”
  • 4. A Convincing Antitrust Suit against Alphabet-Google Emerges As Mr. Cleland describes it, a change in administration presents the ideal opportunity to delve into evidence from a new FTC and DOJ investigative perspective. If pursued, a “slam dunk” antitrust case of the United States v. Alphabet-Google emerges.
  • 5. A Convincing Antitrust Suit against Alphabet-Google Emerges According to Mr. Cleland, the single most illegal act involved divvying up the digital ad market between Google and Facebook, with the two companies agreeing not to compete against each other's core businesses. This convinced Facebook to end its Internet search syndication partnership with Microsoft-Yahoo in 2014.