Control of the Internet: Will Diverse Voices Flourish or Face

Download Report

Transcript Control of the Internet: Will Diverse Voices Flourish or Face

Internet Myth Busting and
Control of the Internet: Are
Internet Service Providers the
New Internet Gatekeepers?
By Catherine Sandoval
Assistant Professor
Santa Clara University School of Law
Carterfone and the Digital Era
Santa Clara University School of Law
Internet Myth Busting: Myth #1 The
Unregulated Internet

Myth of Unregulated Internet

Myth that Internet was Born of and Flourished
because of Lack of Regulation
Internet Myth Busting: Myth #1 The
Unregulated Internet

Congress repeated this myth in Section 230(b)
of the 1996 Telecommunications Act, stating
that U.S. policy is designed “to preserve the
vibrant and competitive free market that
presently exists for the Internet and other
interactive services, unfettered by Federal or
State regulation.”
Internet Myth Busting: Myth #1 The
Unregulated Internet

The ARPANET used private lines for its initial
connections between the four host universities

Some early tests uses Public Switch Telephone
Network Local Lines

The designers of the ARPANET assumed that
the Telephone Company (later dubbed the
Physical Layer in Internet terms) would act in
a neutral fashion in carrying their data traffic
Internet Myth Busting: Myth #1 The
Unregulated Internet

TCP/IP Protocol first described in a May 1974
paper by Vint Cert and Bob Kahn enables
disparate networks to communicate with each
other

The TCP/IP designers wanted to connect
radio-packet networks, satellite networks and
the ARPANET, as well as other future networks
Internet Myth Busting: Myth #1 The
Unregulated Internet

TCP/IP creates a common methodology for
communications between networks and
routing packets

TCP/IP assumes a neutral physical layer that
does not independently make routing
decisions about packets or discriminate
against traffic
Internet Myth Busting: Myth #1 The
Unregulated Internet

The FCC’s Carterfone decision was critical in allowing
consumers to attach devices to the telephone network
as long as they did not harm the network

With Carterfone and its predecesor Hush-a-Phone,
competition in Customer Premises Equipment was
born

Carterfone enabled the attachment of devices to the
telephone network such as modems used to
communicate between computers
Internet Myth Busting: Myth #1 The
Unregulated Internet

In 1975 the FCC initiated the Part 68
rulemaking in response to AT&T’s delays in
permitting customers to CPE

Part 68 permits consumers to connect
equipment from any source to the public
telephone network if such equipment fits
within the technical parameters outlined in
Part 68.
Internet Myth Busting: Myth #1
The Unregulated Internet

The first personal computer the Altair 8800 was
released in 1975

The first message using TCP protocol was sent in
1977

The First Computer Bulleting Board, CBBS goes
online in 1978

Usenet, a computer network and discussion group is
launched in 1979 using public phone lines
Internet Myth Busting: Myth #1
The Unregulated Internet

The legacy of Hush-a-Phone, Carterfone and Part 68
are critical to the development of the Internet and
the ability to attach modems to the Public Switched
Telephone Network

The Internet was traffic over the telephone network,
not a service of the telephone company

As such, it was subject to Common Carrier regulation
Internet Myth Busting: Myth #2: No
Permission is Needed to Develop an
Internet Application

Will ISPs be allowed to act as Internet gatekeepers,
much like the cable companies are gatekeepers for
video content?

By selectively blocking content using certain Internet
protocols, ISPs limit mechanisms for distributing
content and thus limit speech

Such limits help facilities-based ISPs like cable
companies limit competition from Internet-based
video
Internet Myth Busting: Myth #2: No
Permission is Needed to Develop an
Internet Application
The Internet flourished BECAUSE OF Common
Carrier Regulation
 During dial-up days, Telephone companies
had to allow upstart ISPs such as Earthlink
and AOL to use its facilities and offer Internet
service
 Cable modem Internet not initially defined but
since it was not a cable service, common
carrier assumption applied at least to traffic
non-discrimination

Internet Myth Busting: Myth #2: No Permission is
Needed to Develop an Internet Application

The FCC decided in 2002 to reclassify Cable
Internet as an “Information Service” rather
than a common carrier

The Supreme Court upheld that decision in
2005 in the FCC v. NCTA and Brand X case

The FCC subsequently changed all ISP
facilities-based service providers to
Information Services, rather than Common
Carriers
Internet Myth Busting: Myth #2: No
Permission is Needed to Develop an
Internet Application

Even with the Change to Regulation as an
Information Service Provider, Title I of the
Communications Act still applies

That change also made ISPs subject to the
Federal Trade Commission Act

Debate over Net Neutrality and Regulation of
ISP control over Internet traffic
Internet Myth Busting: Myth #2: No
Permission is Needed to Develop an
Internet Application

FCC issued order in August 2008 condemning
Comcast’s interference with peer-to-peer
(p2p) traffic

That order is now being appealed, challenging
FCC jurisdiction and authority

Whether ISPS can act as the net Internet
Gatekeepers is at stake in the Comcast order
Internet Myth Busting: Myth #2: No
Permission is Needed to Develop an
Internet Application
Is such conduct permissible under the
Communications Act?
 Is it “deceptive or unfair” under the Federal
Trade Commission Act
 Is it “unfair competition” under the Federal
Trade Commission Act
 Is it a violation of the Sherman Act?
 Do we need additional net neutrality or deeppacket inspection regulation?

Internet Myth Busting: Myth #2: No
Permission is Needed to Develop an
Internet Application

Facilities-based ISPs have appropriated the
model of Internet regulation based on layers:
Physical Layer, Application/Content Layer,
Logical Layer

Emphasize their ownership of physical layer to
justify control
Internet Myth Busting: Myth #2: No
Permission is Needed to Develop an
Internet Application
Danger that those who control the physical
layer will use their bottleneck facilities control
to become the new Internet gatekeepers
 Lack of facilities-based competition
 Ability to clandestinely limit traffic enables this
gatekeeper role
 Need to protect consumers, competition and
the ability of the Internet to serve as a forum
for content distribution without gatekeepers

Internet Myth Busting: Myth #3: ISPs May
Choose to Deal with Whom they Want and
Interfere with P2P or other Traffic

FTC Commissioner Rausch characterized ISP
interference with Peer-to-Peer (p2p) traffic as
a protected “refusal to deal,” reflecting a
trader’s freedom to choose with whom it will
deal under the Colgate doctrine

The FTC’s rules against deception and unfair
competition, as well as the Sherman Act and
the Communications Act constrain such
conduct
Internet Myth Busting: Myth #3: ISPs May
Choose to Deal with Whom they want and
Interfere with P2P or other Traffic

An ISP offer of Unlimited or Unfettered Internet
access is Deceptive under the FTC Act if it interferes
with certain types of Internet traffic in a manner that
was not prominently disclosed in the service offer

The FTC deception statute contains no “balancing
test” to balance the pro-competitive benefits of
interference to its other consumers or competition
against the anticompetitive harms

The FTC focuses on the representation and its
truthfulness in light of prominent disclosures to the
consumer
Internet Myth Busting: Myth #3: ISPs May
Choose to Deal with Whom they want and
Interfere with P2P or other Traffic
 Disclosures buried deep in a service
agreement that indicate certain types of traffic
MAY encounter delays is not a “refusal to
deal” announcement

ISPs who delay p2p may run afoul of the FTC
Act’s proscriptions against unfair competition
or the Sherman Act

First task is Market Definition
Internet Myth Busting: Myth #3: ISPs May Choose
to Deal with Whom they want and Interfere with
P2P or other Traffic
 ISPs argue that competition between cable and DSL
indicates that neither has monopoly power

This depends on how the market is defined

Millions of Americans do not have the choice of both
cable and DSL because they live to far from the
telephone company central office or there is no cable
service available

Query whether faster speeds claims indicate cable and
DSL compete in different markets or are differentiated
products?
Internet Myth Busting: Myth #3: ISPs May Choose
to Deal with Whom they want and Interfere with
P2P or other Traffic

If the market is defined so that cable-modem
based ISPs have monopoly power in certain
geographic markets, ISP interference with p2p
raise abuse of monopoly power claims

Is Comcast behavior like the Java tools conduct
by Microsoft?

Microsoft distributed software ostensibly
designed to enable Java programming, but it
really enabled Microsoft Windows
Internet Myth Busting: Myth #3: ISPs May Choose
to Deal with Whom they want and Interfere with
P2P or other Traffic

D.C. Circuit concluded Microsoft’s conduct re:
Java tools was deceptive and an abuse of
monopoly power

Is Comcast’s representation to the market that
it offers Unfettered Internet Access, subject
only to the possibility that some traffic may be
delayed, deceptive and an abuse of monopoly
power in light of evidence of 24 hour a day/ 7
day a week delays of p2p traffic?
Internet Myth Busting: Myth #3: ISPs May Choose
to Deal with Whom they want and Interfere with
P2P or other Traffic

Application developers induced to use TCP/IP
protocol including the reset function which
Comcast used to delay certain types of traffic
including p2p

Comcast appropriated TCP/IP to “manage”
internet traffic and delay certain applications

Those applications pose a potential competitive
threat to Comcast’s video business
Internet Myth Busting: Myth #3: ISPs May Choose to Deal
with Whom they want and Interfere with P2P or other
Traffic

Like Microsoft’s conduct toward Netscape, Comcast’s
use of resets to slow or stop p2p traffic makes it
appear that the problem is with the application or site
the user is trying to reach

Consumers blame the application, not Comcast
because Comcast used techniques to hide the fact it is
causing the delay

As with Microsoft’s conduct toward Netscape, this
conduct harms the competitive opportunity for other
applications to challenge Comcast’s video, voice or
data markets