The Chairman of the Federal Trade Commission made a significant contribution to understanding the proper role of government in ensuring net neutrality. Speaking at the Progress & Freedom Foundation’s Aspen Summit this week, Deborah Platt Majoras cited the principle that, absent clear and specific evidence of market failure or consumer harm, policymakers should not enact blanket prohibitions of particular business models or conduct.

Second, she reminds us that broadband Internet access services are within the FTC’s jurisdiction and that the agency’s powers are proven. The FTC has successfully targeted Internet service providers who have allegedly enganged in deceptive practices and it has also required a cable system to provide open access to Internet service providers. This track record makes it pretty clear the FTC not only has the power but it also has the inclination to preserve openness and other values associated with the Internet. The allegation is that the D-word (deregulation) is coming to broadband services. Aside from the FTC, the FCC and the Antitrust Division also have jurisdiction over broadband services. Contrary to what one might think from listening to the appeals of net neutrality advocates, there are three levels of government oversight of broadband services.

Third, Majoras acknowledged that important questions have been raised and more information is needed. She announced the formation of an Internet Access Task Force to examine issues related to net neutrality and other matters. Net neutrality has been a debate about hypotheticals, which is part of the reason it has seemed so unproductive. This task force will be made up of economists and attorneys from throughout the FTC who are competition and consumer protection experts. Unlike the FCC, which only does communications, the FTC has wide-ranging experience and expertise arising from their involvement in every sector of the economy. This makes the FTC, perhaps, less beholden to some of the passions and prejudices which animate the special interests that have a dog in this fight. The FTC’s involvement will probably contribute greatly to the debate. With this kind of comprehensive look at all the facts underway, I’ll bet many-to-most in Congress will prefer to review the findings before they cast a vote.
_______________

See:The Federal Trade Commission in the Online World: Promoting Competition and Protecting Consumers,” Remarks by Deborah Platt Majoras, Chairman, Federal Trade Commission, Progress & Freedom Foundation’s Aspen Summit, August 21, 2006

See:PREPARED STATEMENT OF THE FEDERAL TRADE COMMISSION before the COMMITTEE ON THE JUDICIARY UNITED STATES SENATE on FTC JURISDICTION OVER BROADBAND INTERNET ACCESS SERVICES,” by William E. Kovacic, Commissioner, Washington, D.C., June 14, 2006

Critics claimed broadband access is a duopoly (a market in which there are only two providers) but this is technically inaccurate in much of the country so now the complaint is that 98 per cent of broadband customers receive their service from either the telephone company or the cable company. Even this criticism is irrelevant. Consumer harm occurs where prices are excessive or quality is deficient. In the case of broadband, competition is leading to lower prices and higher bandwidth.

Most economists agree it’s misleading to read too much into market shares, although I could point out that regional bell operating companies–the main targets of net neutrality regulation–report only 39.3% of total high-speed connections and that this is far less than a dominant position (other providers who are not telephone companies are lumped together in the FCC’s broadband status report). More important is whether consumers could vote with their feet if an incumbent provider abuses its customer relationships. They could if there are alternate providers or new providers could enter the market. According to the FCC, satellite providers have at least some presence in 88% of the nation’s zip codes, ADSL in 82% and cable modem in 57%. These numbers suggest a lot of consumers have more competitive choices than the critics like to point to. Other technologies, such as fixed and mobile wireless (cellular, PCS and WiMAX) and power line, are growing fast and have enormous potential. They prove that new providers can enter the market.

Broadband is spreading rapidly, according to the FCC. High-speed lines increased by 18% during the second half of 2005 compared to a 12% increase during the first half of 2005. This wouldn’t be happening if broadband providers were gouging their customers or restricting their choices. In order to recoup their multi-billion dollar investments, the providers need to attract all the traffic they can.

The report also says that 99% of the nation’s zip codes have at least one provider who serves at least one customer, and that 99% of the nation’s population lives in those zip codes. Most would agree if only one household or business or a privileged handful have a choice of competitors, that’s a problem. The numbers are actually more positive and the methodology used to gather them more useful than it seems. Cable and telephone networks are never built to serve small groups of people. Networks are capital intensive with high fixed costs, so the cost of bringing on an additional user is always lower than it was for the most recent user. If you have a network you want to build it out as fast as you can, because every additional customer will generate a higher profit margin than the one before. Satellite and wireless providers are capable of serving small groups or even only one customer in an entire zip code, but the fact is they market their services widely and have no incentive to market in such a way as to manipulate the statistics that the FCC gathers in this report.

Duopoly is one of those frightening terms that can either be meaningful or meaningless. In the context of broadband access services, it is meaningless.

_______________

See: High-Speed Services for Internet Access: Status as of December 31, 2005,” Report of the FCC’s Industry Analysis and Technology Division, Wireline Competition Bureau, July 2006

State and local lawmakers learned in the 1990s that large, broad-based tax increases are political losers and that they redistribute taxpayers (to lower taxing jurisdictions) rather than redistributing income. Hence, the growing interest in targeting tax increases to divide taxpayers into smaller groups and minimize voter backlash. Tobacco and alcohol are the favorites, but the same thing is happening in telecom and housing. These are some of the findings from a study by Daniel Clifton and Elizabeth Karasmeighan for Americans for Tax Reform.

According to Tom Tauke, “broadband and, in particular, wireless services are increasingly viewed by state and local governments as the golden goose for raising new revenue. The state and local tax burden on communications is now two and a half times what it is for other businesses … Today in some states, taxes on cell phones exceed that of liquor and tobacco.”

Broadband and cellphone providers don’t pay these taxes, of course. They are merely tax collectors. Unfortunately, the taxes lead to higher prices for broadband and cellphone services, which lowers demand, as Tauke points out. Lower demand is bad for innovation, the economy and the future spending plans of politicians and social service advocates.

Clifton and Karasmeighan recommend that states limit spending to the rate of population growth plus inflation to ensure that revenue gains during upturns can be used to offset losses during recessions. They also recommend that states reduce their reliance on volatile revenue sources such as capital gains and dividends. States used temporary surges in capital gains revenue in the 1990s to increase spending permanently. When the stock market declined, states lost 80% of this revenue but kept spending anyway. Many fooled voters into raising taxes to cover the “unforseen” gap.

State and local tax policies are one of the chief threats to investment and innovation in the tech sector today.

_______________

See:State Tax Trends Over Twenty-Five Years: Tax Increases Down, Revenue Sources Shifting,” by Daniel Clifton and Elizabeth Karasmeighan, Americans for Tax Reform, Aug. 2006

See:Staying Ahead of the Broadband Curve,” Remarks by Tom Tauke, Executive Vice President–Public Affairs, Policy and Communications, Verizon Communications, at the Progress & Freedom Foundation’s Aspen Summit, Aug. 22, 2006

See:The Excessive State and Local Tax Burden on Wireless Telecommunications Service,” by Scott Mackey, Economist, Kimbell-Sherman-Ellis, Jun. 2004

Every week, I look at a software patent that’s been in the news. You can see previous installments in the series here. This week’s patent received extensive publicity this week when a judge slapped a $25 million fine on Microsoft for “misconduct,” including treating the patent holder, z4 Technologies, as “a small and irrelevant company that was not worthy of Microsoft’s time and attention.” Which as far as I can tell, it was, aside from the fact that it happened to have a patent on the kind of copy protection Microsoft uses in Windows XP.

There are two closely related patents at issue. The older of the two is Patent #6,044,471, “Method and apparatus for securing software to reduce unauthorized use.” (Strangely enough, the other patent was filed in 2002 and issued in 2004. It’s hard to see how Windows XP, released in 2001, could infringe it.)

Continue reading →

TSA Descends into Farce

by on August 24, 2006 · 4 comments

The TSA has posted a helpful web site detailing what now not allowed on airplanes:

We encourage everyone to pack gel-filled bras in their checked baggage. We recognize the sensitivity of the issue and we are reaching out to key women’s medical associations to assist passengers and make information available to them while respecting their privacy. Passengers with medical gel prosthetics will be permitted through the security checkpoint.

Please keep in mind, that while we can not provide an exhaustive list of items that covering all eventualities, all liquids, gels, or aerosols of any kind are prohibited at security checkpoints, in airport sterile areas, and aboard aircraft. You can pack these items in your checked baggage.

We ask for your cooperation in the screening process by being prepared before you arrive. We also ask that you follow the guidelines above and try not to over-think these guidelines. Please pack liquids, gels, and aerosols in your checked baggage even if you do not normally check a bag.

The last thing we’d want is sheep passengers who think too much.

The most depressing thing about that web page is that the fact that they bothered to create it probably means these rules are not going to go away any time soon.

Another DRM Train Wreck

by on August 24, 2006 · 36 comments

Cory Doctorow points to an article (that’s currently slashdotted) about Microsoft’s plan to disable high-def video playback in 32-bit versions of Windows Vista. It seems that there are too many ways to hack around Microsoft’s copy protection scheme in the 32-bit version, so Microsoft has simply thrown in the towel and told a substantial fraction of its customers that they’re out of luck.

As Doctorow notes, this creates an interesting perverse incentive, since movies downloaded from illegal file-sharing sites will work just fine. Is Hollywood trying to drive its customers into the arms of pirates?

Why Not Regulation

by on August 24, 2006 · 16 comments

Prompted by the good discussion over on my recent ‘Lack of Competition’ Meme post, I’ve just spent some time looking over other posts here on TLF for articulation of why we seem to be so intransigent about net neutrality regulation.

I think it’s the consensus among TLFers that regulation is a poor way of getting the best delivery of bits to end-users. There are some good posts, but I couldn’t find the one or two that clearly show why we so prefer competition to regulation for solving this problem.

So here’s a quick summary of my thinking about why not regulation:

Continue reading →

I missed this blog post a couple of weeks ago:

Intel released open-source drivers for its graphics cards on Wednesday, a bid to win Linux allies and give the operating better support, but graphics rival ATI Technologies has indicated it won’t follow suit when it comes to the software that lets operating systems communicate with its workstation and PC graphics cards.

“Proprietary, patented optimizations are part of the value we provide to our customers and we have no plans to release these drivers to open source,” the company said in a statement. “In addition, multimedia elements such as content protection must not, by their very nature, be allowed to go open source.”

It’s possible that position could change if Advanced Micro Devices’ acquisition of ATI goes through, but so far AMD hasn’t committed one way or the other.

This sums up in one succinct sound byte why fans of open source software hate software patents and digital rights management technology. Note that this has nothing to do with being stingy or anti-capitalist. Many open source hackers make a good living and would gladly pay extra for the right to use an open source ATI driver. What they’re focused on is the freedom to tinker, and the positive externalities generated when other programmers are given the freedom to tinker.

Unfortunately, as the ATI guy says, software patents and DRM are fundamentally hostile to the freedom to tinker. By nature, open source software projects lack the infrastructure required to collect patent royalties or to restrict modifications on DRM to prevent circumvention. As a result, the antagonism of open source programmers to software patents and DRM isn’t going to go away.

Hat tip: EFF

Privacy Debacle Top Ten

by on August 23, 2006 · 2 comments

Wired News reporter Annalee Newitz has compiled a “top ten” list of privacy debacles.

It’s easy to quibble with the results, but I was delighted to see “The Creation of the Social Security Number” at #1. Our national identifier has used its government backing to push aside all others and enable government and corporate surveillance on a scale that never would have occured under natural conditions.

In Identity Crisis: How Identification is Overused and Misunderstood, I discuss how the uniform identification system we’ve built around the Social Security Number is insecure for individuals, making information about them too readily available to governments, corporations, and crooks.

The fix is nothing so ham-handed as banning uses of Social Security Numbers. Rather, it will be necessary to remake our identification systems so that they are diverse, competitive, and thus solicitous of individuals’ interests.

Never Mind

by on August 23, 2006

The patent battle between Apple and Creative that I blogged about back in June has been settled. Apple agreed to pay Creative protection money to make them go away.

The dispute was doubtless good for the patent bar, but it’s hard to see how anyone else benefitted.