More restraint is in order when it comes to the Obama administrations intent to escalate “antitrust” enforcement against business and enterprise in America.

A skeptical interpretation of antitrust’s realities—up to and including recent campaigns targeting Intel, Google, XM-Sirius; and earlier campaigns against Microsoft and the AOL Time Warner merger, as well as rejected mergers like Echostar/DirecTV—is that antitrust often advances the well being of various species of political predators rather than consumers.

Antitrust is a form of economic regulation. And like all economic regulation, it transfers wealth from somebody to somebody else, often in response to special-interest urging. Partly in recognition of such shortcomings, many economic sectors like transportation and telecommunications were (partly) deregulated and liberalized during the last quarter of the 20th century. But antitrust regulation typically gets a pass. Even in the “new economy,” this century-old smokestack era concept is used to justify constraints and conditions imposed on vigorously competitive modern companies. Antitrust is wrongly seen as being in the public interest, as having a superior role to play in policing markets relative to the alternatives.

Continue reading →

Last year, my PFF colleague Adam Thierer asked whether State AGs + NCMEC = The Net’s New Regulators? Adam noted that NCMEC, the National Center for Missing and Exploited Children, a private non-profit organization, was playing a law enforcement role in regulating child pornography—but without any clear mechanisms for ensuring its accountability and effectiveness. Adam’s point wasn’t just that transparency is a good thing, but that when it comes to a cause as important as protecting children from exploitation, it’s vital to ensuring that we’re that we’re actually doing a good job at it!

Yesterday, Emmanuel Lazaridis commented on that post:

Given the increasing regulatory and investigative powers of the NCMEC, it is no longer clear whether or not the [Freedom of Information Act] applies to NCMEC records. We are about to find out. I am right now bringing a case against the NCMEC in federal court for access to records under the FOIA and, failing that, for discovery under 28 U.S.C. § 1782(a).

Mr. Lazaridis’s complaint in the D.C. District Court claims that Lazaridis (a Greek national) has been unfairly deemed a fugitive from U.S. justice for having taken his daughter to Greece over the objections of the girl’s American mother, Lazaridis’s ex-wife. NCMEC got involved by placing the girl on their MissingKids.com registry of abducted children. Lazaridis wants the court to recognize his custody, deem him not to be a fugitive, and to order NCMEC to turn over all their records on the girl.

This is, of course, just one side of the story (and such cases are usually so complicated as to be indecipherable to outsiders). But even if Lazaridis’s case were wholly without merit, his basic argument would be a sound one: Why shouldn’t NCMEC, in exercising any of its essentially governmental functions, be subject to the same accountability requirements through FOIA as the FBI would be?

When the issue is the Lazaridis family’s trans-Atlantic custody battle, it may seem easy to ignore this question. But when NCMEC is essentially making policy regarding filtering Internet content, blacklisting websites, turning over user logs to law enforcement, or “cleaning up” Craigslist, the question of NCMEC’s accountability under FOIA cannot be avoided as a critical decision about the future of Internet governance. Continue reading →

The proliferation of Web 2.0 social media services has magnified the old problem of cyber-squatting: Every new service represents the possibility that someone else might claim your name, or your organization’s trademark, as a user name before you do! This problem is especially significant where user names correspond to vanity URLs, as with Twitter and, more recently, Facebook.

So I was intrigued to discover that the market is responding to this need: ClaimMyName (CMN) will take care of user registrations on 30 Web 20 services for $329 or on an astounding 300 services for $799. CMN is a “freemium” service offered by DandyID.com, a nifty free service that allows users to organize all their social media profiles for something like 390 services so that buttons for each service can easily be added to an author bio page on a blog, as we’ve done at the TLF. So if I really wanted to make sure that no one else registered http://<WEB2.0service>.com/berinszoka, or /techliberation or /ProgressFreedom, this service would allow me to do so with just a few clicks—at a price of either $10.97/service for thirty or $2.66/service for 300 services.

CMN is essentially a mini-Mark Monitor, the international company famous for protecting trademarks online—except that CMN facilitates self-help by users outside of trademark law: No registration is required; everything is done on a first-come-first-serve basis. Pretty cool.

The Economist magazine has just released an important feature article entitled, “Sex Laws: Unjust and Ineffective.” In an indirect way, the article makes a point that I have been trying to get across in my work on this issue: If you want to keep your kids safe from real sex offenders, we need to scrap our current sex offender registries and completely rethink the way we define and punish sex offenses in this country.  That’s because, currently, a significant percentage of those people listed in sex offender registries pose almost no threat to children, making it difficult for us to know who really does pose a threat to our kids and what we should do about them.

Simply stated, we’ve dumbed-down the notion of “sex crimes” in this country. As a nation, we have foolishly come to equate almost all sex offenses equally.  While sex offender registry laws vary from state to state, many basically say that that two teens caught engaging in consensual oral sex in high school belong on the same list alongside child rapists. That is insanity. And it leaves many in the public, especially parents, thinking that the whole world is full of predators lurking on every corner just waiting to snatch, rape, and kill their children. [ For the actual facts, see the appendix I have included down below: “Is America Suffering from a National Child Abduction Epidemic”?]  In reality, as The Economist feature story points out, the truth is quite different: Continue reading →

We’ve written a lot lately about Microsoft’s efforts to reinvent itself, first rebranding its Live search engine as the Bing, and then partnering with Yahoo! to make Bing the search engine on Yahoo!’s still-impressive empire of content and services. But if Microsoft is going to beat Google in Search 3.0 and master shifts in the driving paradigms of the Internet from search and browsers to ubiquitous integration of social networking and other paradigms as yet unforeseen, Microsoft will need more than just brilliant engineering: They’ll need clever marketing.

So it seems that the software titan is turning to user-generated advertising, such as this gem:

http://www.youtube.com/v/h9DBynJUCS4&color1=0xb1b1b1&color2=0xcfcfcf&hl=en&feature=player_embedded&fs=1

WARNING: Battlestar Galactica spoiler: Google may well be in danger of losing its monopoly on cool to Microsoft if Bing can get at least four of the Final Five Cylons to volunteer as back-up singers in a promo video contest.

Google clearly considers Microsoft a threat, having recently launched an ad campaign of its own for its Apps services, which compete directly with Microsoft Office.

Five years ago, we started the TLF to report on—and hopefully help to reverse—this dangerous trend of over-regulation of the Internet, communications, media and high-technology in general. We’ve become a full-service technology policy blog that covers complete gamut of public policy issues affecting the future of the Internet and technology.

Please join us as we celebrate, commiserate and plan for the next five years of fighting the good cyber-libertarian fight. We’ll even through in a free TLF laptop sticker! Just RSVP on Facebook today!

Rocket BarRocketBar will be offering the following drink specials:

  • $3 PBR cans,
  • $5 Rail Cocktails,
  • $5 House Wine and
  • $4.50 Miller High Life 16oz cans.

They have a wide variety of games, so you can get your pool/shuffleboard/darts/Risk/Trivial Pursuit on.

Please spread the word about the event to your friends and, if you haven’t already done so, become a fan of our Facebook page!

Going Solo

by on August 6, 2009 · 15 comments

Adam Thierer recruited me to contribute to what became the Technology Liberation Front way back in August 2004, when I was fresh out of college and working as a writer at the Cato Institute. My first post was about DRM (I was against it). I remember going back and forth with Adam about whether there was really a demand for a libertarian tech-policy blog. I think the last five years have laid those questions to rest, as both our traffic and our list of contributors have grown steadily. The last year or so has gone especially well, as we’ve been joined by Ryan, Berin, and Alex and Adam inaugurated new features like his annual Best Tech Books series.

At the same time, I’ve been blessed with a steadily growing list of other blogging opportunities. I’m now nominally a regular contributor to at least 6 blogs. In practice, this has meant woefully neglecting all six of them. And at the same time, I’ve had a number of people complain that it’s impossible to follow my writing, scattered as it is in so many places.

So I’ve decided that now is a good time to “go solo.” I’ve launched a new blog called “Bottom-Up,” and I’m going to be ending or scaling back my involvement with all the other blogs to which I nominally contribute. This will be my last post at TLF, and starting tomorrow the vast majority of my blogging activities will be found at the new site.

Some of what I’ll be talking about will be familiar to longtime TLF readers. I did a post today on the decline of newspapers, a topic I’ve weighed in before. But I’ll also be covering some new ground. This post, for example, examines the why Darwin’s theory of evolution remains so controversial after 150 years. I hope you’ll check it out, and if it looks interesting, please subscribe.

In closing, I want to thank my fellow TLFers, with whom I’ve fought the good fight over the last five years. I’m excited to see what they come up with in the next five years.

Viva la (Technology) Revolution!

One reason AT&T may not like Google Voice is that it allows you to send and receive text messages for free. This has led many to argue that SMS are free to the carriers and they are overcharging. Congress is considering getting involved. Most recently there’s this from David Pogue in the NY Times:

The whole thing is especially galling since text messages are pure profit for the cell carriers. Text messaging itself was invented when a researcher found “free capacity on the system” in an underused secondary cellphone channel: http://bit.ly/QxtBt. They may cost you and the recipient 20 cents each, but they cost the carriers pretty much zip.

The price of a text message does sound ridiculous when you consider it on a per bit basis. The problem with thinking about it that way, though, is that it neglects the fact that AT&T had to build a network, and it has to maintain that network, before a text message can be “free.” AT&T charges customers so it can recoup its investment. It does so through voice and data service fees, but also through other fees, including for text messages. However it charges customers, it ultimately has to bring in enough to cover its costs or it goes out of business.

Now, if we passed a law today that said carriers could not charge for SMS because, after all, it’s free, we would see a an increase in the fees it charges for voice, data, and other services. The mix of prices for services we have right now is one the market will bear and consumers want, and there’s no reason to think that we could command a better one.

Better yet, if you want a “free” text messaging option, consider Boost Mobile, which offers just that. Of course, they have different voice prices and an older and slower network. In the end, they have to cover their costs, too.

By Eric Beach, Adam Marcus & Berin Szoka

In the first entry of the Privacy Solution Series, Berin Szoka and Adam Thierer noted that the goal of the series is “to detail the many ‘technologies of evasion’ (i.e., empowerment or user ‘self-help’ tools) that allow web surfers to better protect their privacy online.” Before outlining a few more such tools, we wanted to step back and provide a brief overview of the need for, goals of, and future scope of this series.

Smokey the Bear with signWe started this series because, to paraphrase Smokey the Bear, “Only you can protect your privacy online!” While the law can play a vital role in giving full effect to the Fourth Amendment’s restraint on government surveillance, privacy is not something that cannot simply be created or enforced by regulation because, as Cato scholar Jim Harper explains, privacy is “the subjective condition that people experience when they have power to control information about themselves.” Thus, when the appropriate technological tools and methods exist and users “exercise that power consistent with their interests and values, government regulation in the name of privacy is based only on politicians’ and bureaucrats’ guesses about what ‘privacy’ should look like.” As Berin has put it:

Debates about online privacy often seem to assume relatively homogeneous privacy preferences among Internet users. But the reality is that users vary widely, with many people demonstrating that they just don’t care who sees what they do, post or say online. Attitudes vary from application to application, of course, but that’s precisely the point: While many reflexively talk about the ‘importance of privacy’ as if a monolith of users held a single opinion, no clear consensus exists for all users, all applications and all situations.

Moreover, privacy and security are both dynamic: The ongoing evolution of the Internet, shifting expectations about online interaction, and the constant revelations of new security vulnerabilities all make it impossible to simply freeze the Internet in place. Instead, users must be actively engaged in the ongoing process of protecting their privacy and security online according to their own preferences.

Our goal is to educate users about the tools that make this task easier. Together, user education and empowerment form a powerful alternative to regulation. That alternative is “less restrictive” because regulatory mandates come with unintended consequences and can never reflect the preferences of all users.

Continue reading →

iphoneDespite my frequent disagreements with his policy conclusions, Farhad Manjooo of Slate is one of the most gifted tech policy pundits around today and everything he writes is worth reading (and I whole-heartedly agreed with his recent article on the high-tech and antitrust).  Alas, I find myself again disagreeing with him again today.

In his latest column, “The Great iPhone Lockdown: Should the FCC force Apple to sell Google’s apps?” Manjoo responds to a recent essay by TLF contributor Ryan Radia (“Newsflash to FCC: The iPhone is a Closed Platform, and Consumers Love It“). In that essay, Ryan generally argued that: (a) a lot of people own and love the iPhone despite some silly restrictions on certain apps; and (b) if they don’t like that, there are plenty of other options from which they can choose. Consequently, regulation seems unwarranted and likely highly misguided in light of the potential unitended consequences in might yield.  It’s an argument I very much agree with, of course.  Anyway, Manjoo responds:

Radia’s argument isn’t crazy. Just the other day, I argued that the government shouldn’t go after Google for antitrust violations because the tech industry is fluid; companies that are on top today can fall tomorrow. So what if Apple rejects apps capriciously? If its actions are so terrible, consumers will eventually abandon it.

But then Manjoo counters that argument and goes completely off-the-rails with several assertions that I find quite perplexing: Continue reading →