Google wins fight to keep Adwords FBI drug sting docs secret

Federal court gags Mississippi attorney general – for now


Special Report Google has won a crucial battle in its campaign to keep under wraps millions of documents relating to an FBI drugs probe into the company. And the web giant has done so using a law designed to combat porn sites.

At least 20 US states, led by Mississippi’s elected state prosecutor, opened a probe to find out whether Google was complying with the outcome of a sting operation combating illegal ads for drugs online. The advertising giant had to settle out of court in 2011 after it was accused of running adverts in the US for dodgy drugs peddled by Canadian pharmacies.

Yet the states’ enquiries into that settlement are now blocked until a new ruling can be overturned.

Google won an injunction in the Southern District of Mississippi federal court on 3 March which prevents the state's attorney general, Jim Hood, from pursuing an investigation against Google.

It also stops him from bringing civil or criminal charges against the ad giant for "making accessible third-party content to Internet users". In plain English, this injunction stops Hood from pursuing allegations that Google turned a blind eye to ad revenues coming from dodgy pharmacies peddling controlled drugs to consumers without prescriptions.

Google assured a court in 2011 that it was stopping the practice.

The injunction is a big setback for Hood, who is leading efforts to uncover an explosive cache of court documents which supposedly reveal how top Google executives knew about the dodgy pharmacies' ad spending and turned a blind eye to it.

The good, the bad and the Googly

In recent decades state prosecutors have led the way in corporate criminal cases, with Big Tobacco lawsuits and New York state’s dot-com bubble Wall Street settlements amongst the most prominent examples.

Hood, Mississippi’s corporate crime fighter (dubbed “the last Democrat in Dixie”) has tangled with various financial giants, pharmaceuticals companies and even the Ku Klux Klan, bringing some $850m of fines into his state's coffers. Mississippi is the poorest state in the USA.

In 2013 Hood was also one of 23 state attorneys who wanted to know whether Google was complying with an out-of-court legal settlement on drugs marketing which it had signed in 2011. In the settlement (a “non prosecution agreement”, or NPA – full document, PDF, 15 pages), Google agreed to pay a $500m forfeiture and promise not to help sellers of fake and re-imported drugs without seeing proof of age or a prescription.

Hood has claimed (PDF, one page) that despite the half-a-billion dollar forfeiture, Google was refusing to delist the fake pharmacies. Google allegedly shifted the business from Adwords to YouTube and continued to promote the sale of controlled substances to minors. So the allied states issued a 79-page subpoena.

"The attorneys general have asked Google to clean up its act, and it's done nothing but obfuscate," said Hood in 2013, after their letters and requests to meet were ignored. Last year the attorneys subpoenaed Google for documents relating to the 2011 out-of-court settlement. Significantly, a number of documents held by Rhode Island state, relating to the FBI/FDA sting operation on Google which led to the half-billion payout and NPA, have never been made public.

In December Google used the Communications Decency Act (CDA) to bring the states’ probe to a halt. The CDA had been rushed onto the books in 1996 after the first “cyberporn panic” in order to criminalise sexual and obscene websites. It was rapidly struck down for being overbroad and violating the First Amendment. Ironically, given that the CDA is being used to block investigations into the Internet’s most powerful company, the law began life as the “Internet Freedom and Family Empowerment Act”.

Google's “aggressive and overbroad” use of the CDA worries some legal experts. If Google succeeds in this battle – and it has won the first round – “then it would also prevent the Federal Trade Commission from enforcing analogous federal laws against Internet intermediaries. Such practices could include fraud, conspiracy, and aiding-and-abetting violations of state and federal controlled substances acts,” says one expert in a must-read analysis of Google’s blocking lawsuit, published in the American Spectator.

In other words, companies like Google could - if it wins this legal war - operate beyond the reach of the law. Even Goldman Sachs, at its multi-tentacled zenith, couldn’t dream of such a privilege.

Similar topics


Other stories you might like

  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module
    Anything that uses proximity-based BLE is vulnerable, claim researchers

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

    Essentially, what happens is this: the paired smartphone should be physically close by the Tesla to unlock it. NCC's technique involves one gadget near the paired phone, and another gadget near the car. The phone-side gadget relays signals from the phone to the car-side gadget, which forwards them to the vehicle to unlock and start it. This shouldn't normally happen because the phone and car are so far apart. The car has a defense mechanism – based on measuring transmission latency to detect that a paired device is too far away – that ideally prevents relayed signals from working, though this can be defeated by simply cutting the latency of the relay process.

    Continue reading
  • Google assuring open-source code to secure software supply chains
    Java and Python packages are the first on the list

    Google has a plan — and a new product plus a partnership with developer-focused security shop Snyk — that attempts to make it easier for enterprises to secure their open source software dependencies.

    The new service, announced today at the Google Cloud Security Summit, is called Assured Open Source Software. We're told it will initially focus on some Java and Python packages that Google's own developers prioritize in their workflows. 

    These two programming languages have "particularly high-risk profiles," Google Cloud Cloud VP and GM Sunil Potti said in response to The Register's questions. "Remember Log4j?" Yes, quite vividly.

    Continue reading
  • Rocket Lab is taking NASA's CAPSTONE to the Moon
    Mission to lunar orbit is further than any Photon satellite bus has gone before

    Rocket Lab has taken delivery of NASA's CAPSTONE spacecraft at its New Zealand launch pad ahead of a mission to the Moon.

    It's been quite a journey for CAPSTONE [Cislunar Autonomous Positioning System Technology Operations and Navigation Experiment], which was originally supposed to launch from Rocket Lab's US launchpad at Wallops Island in Virginia.

    The pad, Launch Complex 2, has been completed for a while now. However, delays in certifying Rocket Lab's Autonomous Flight Termination System (AFTS) pushed the move to Launch Complex 1 in Mahia, New Zealand.

    Continue reading

Biting the hand that feeds IT © 1998–2022