June 2015

T-Mobile CEO John Legere Wants You to Care About Spectrum

T-Mobile CEO John Legere has had considerable success getting wireless consumers on his side, but he faces an uphill battle in his latest quest: Convincing them to care about an upcoming spectrum auction and the rules that govern it. In 2016, the Federal Communications Commission will oversee an auction of wireless airwaves currently held by TV broadcasters.

Legere wants regulators to set aside more spectrum for smaller carriers rather than giving AT&T and Verizon the potential to bid on the bulk of the available spectrum. In a video blog, Legere urged people to make their voices heard to the FCC. “There’s some serious s--t about to go down in DC, and if you’re one of the 180 million Americans out there using a smartphone and you’re not pissed off right now, than you’re not paying attention -- but you need to,” Legere says, kicking off his case for why Verizon and AT&T shouldn’t be allowed to potentially run the table. Spectrum is, as Legere says, the lifeblood of the wireless industry. It’s key to calls and texts going through as well as to the fast data speeds that consumers crave.

White House race has already sparked $1 million in negative ads

The 2016 presidential election has already unleashed more than $1 million in negative ads, according to a Center for Public Integrity review of federal campaign finance filings. Only 515 more days until Election Day. In the meantime, expect the price of presidential mudslinging to rapidly hit eight, then eventually nine figures, as the already crowded race for the White House escalates.

To date, nearly all of the negativity has been directed at Democratic Party frontrunner Hillary Clinton, who announced her candidacy in mid-April. In June alone, Clinton has been attacked by the Republican National Committee and a host of other conservative groups, including the Stop Hillary PAC and the Citizens United Super PAC. “Getting in early was the only way to go given the enormity of the opposition,” said Dan Backer, treasurer of the Stop Hillary PAC.

Twitter chief executive Dick Costolo to step down

Twitter chief executive Dick Costolo will step down on July 1, and hand the reins over to Jack Dorsey, Twitter's co-founder and current chairman of the board. The company announced that Dorsey will serve as interim chief executive while Twitter looks for someone to fill Costolo's position. Costolo has been Twitter's chief executive since 2010; before that he was the company's chief operating officer. He has been criticized since taking the company public in 2013 for failing to ignite growth and find effective revenue streams for the social media company.

Lifeline Broadband: 61 Interest Groups Offer Guidelines for FCC

A broad group of 61 interest groups has sent a letter to Federal Communications Commission Chairman Tom Wheeler advocating for the FCC to adopt a Lifeline low-income program for broadband in 2015. The letter also makes broad recommendations about how that program should be structured. The move comes just a week before the FCC is expected to adopt a notice of proposed rulemaking (NPRM) about a Lifeline broadband program. In the letter the groups propose five principles they say should guide the FCC’s work to modernize the Lifeline program, including:

  1. The Lifeline program should provide sufficient resources and be designed so that all eligible households can receive the support they need to afford high-quality broadband.
  2. The program should support Internet connectivity of sufficient capacity to provide access to digital education and social services, healthcare, applying for jobs, performing job-related functions, doing homework, accessing “diverse and independent media,” reaching out for emergency services and participating in “civic discourse.” The letter points to the 10 Mbps downstream/ 1 Mbps upstream target speed established for the Connect America Fund broadband deployment program as an example of a speed target.
  3. Choice and competition. Low-income recipients of Lifeline funding should be able to use any qualified provider and the FCC should “adopt mechanisms that will increase users’ knowledge of their choices.”
  4. The Lifeline program should be structured to support continuous innovation. The letter argues, for example, that the program should offer financial incentives to provide above-average services or achieve program objectives such as high participation rates and that states should be offered incentive grants for finding the best ways to centralize eligibility databases, boost enrollment, improve efficiency and reduce fraud.
  5. Efficiency, transparency, accountability. The commission should continue enforcement actions. Additionally the letter states that “we hope to see reports on successful carriers and states, data on participant choices, . . . enrollment numbers and more.

[The Benton Foundation was a co-signer of the letter]

This is the GOP’s new tactic to stop net neutrality

The Federal Communications Commission's new network neutrality rules officially go into effect June 12, but Republican Representatives are making a last-minute legislative push to keep them from taking effect. Their efforts to do so just cleared an important hurdle in the House: the draft appropriations bill containing the measure that prevents the FCC from enforcing its Internet provider regulations was approved by the House Financial Services Subcommittee. The legislation would freeze the net neutrality rules until the Internet providers that have sued to overturn them receive an answer from the court.

Rep. José Serrano (D-NY) said that the FCC budget cut was penny wise and pound foolish and would force the FCC to either spend more now to stay in its more expensive headquarters, spend more later to move, or cut some core essential services. He also called the net neutrality rule rider among the most "excessive" riders, and one that would make the bill unpassable from the Democratic view. He said the rider was fundamentally flawed from a policy and procedural standpoint and would block the FCC's important step of insuring Internet content is treated the same way for everyone, in service of "a few large corporations." He said the bill will encourage plaintiffs to delay resolution of the cases.

Senate Passes FCC Report Consolidation Bill

The Senate has unanimously passed the Federal Communications Commission Consolidated Reporting Act of 2015 (S 253). That is the bipartisan bill that consolidates eight separate FCC reports to Congress, including the FCC's Sec. 706 report, into a single report on the state of the communications marketplace. It also gets rid of some outdated reports, including one on competition to the telegraph. The bill, introduced by Sen Dean Heller (R-NV) and co-sponsored by Se. Brian Schatz (D-HI), is the Senate version of a House bill that passed 411 to zip in February. Had the bill passed in the exact same form in the Senate, it could then have gone to the President's desk, but apparently there was a small change to the bill related to an international data report and some other changes that will require the House to vote the Senate bill. Among the main differences, according to s Senate source speaking on background, were:

  • The Senate bill retains the annual report on broadband deployment required by Section 706 of the Telecommunications Act of 1996
  • Retains the cable rates report, though going forward it will be produced every two years (as part of the larger communications marketplace report required by the bill), rather than each year
  • Would not subject the FCC to a 2-year score card where it has to document and defend its activities
  • Includes language sponsored by Senator Ed Markey (D-Mass.) that would retain the FCC’s International Broadband Data Report, including that report in the larger communications marketplace report required by the bill.

It is unclear whether the changes, and others said to be in the bill, will mean any hiccup in swift House passage, like having to conference the two bills.

Hackers May Have Obtained Names of Chinese With Ties to US Government

Investigators say that the Chinese hackers who attacked the databases of the Office of Personnel Management may have obtained the names of Chinese relatives, friends and frequent associates of American diplomats and other government officials, information that Beijing could use for blackmail or retaliation. Federal employees who handle national security information are required to list some or all of their foreign contacts, depending on the agency, to receive high-level clearances. Investigators say that the hackers obtained many of the lists, and they are trying to determine how many of those thousands of names were compromised. In classified briefings to members of Congress in recent days, intelligence officials have described what appears to be a systematic Chinese effort to build databases that explain the inner workings of the United States government.

The information includes friends and relatives, around the world, of diplomats, of White House officials and of officials from government agencies, like nuclear experts and trade negotiators. “They are pumping this through their databases just as the [National Security Agency] pumps telephone data through their databases,” said James Lewis, a cyberexpert at the Center for Strategic and International Studies. “It gives the Chinese the ability to exploit who is listed as a foreign contact. And if you are a Chinese person who didn’t report your contacts or relationships with an American, you may have a problem.” Officials have conceded in the briefings that most of the compromised data was not encrypted, though they have argued that the attacks were so sophisticated and well hidden that encryption might have done little good.

$21 million tab to taxpayers for clean up after massive Chinese hack of federal database

Hundreds of identify theft specialists at call centers in three states are starting to field inquiries from federal employees affected by the massive data breach that’s costing taxpayers $21 million to notify victims and protect their data. In the 72 hours since a private company the government hired under an emergency contract began e-mailing and sending letters to 4 million current and former federal workers, the customer service staff at call centers in Texas, Utah and South Carolina are already answering questions from anxious callers.

“The current call volumes we’re experiencing are expected for a cybersecurity incident of this proportion,” said Patrick Hillmann, a spokesman for Washington-based Winvale Group, but under company policy he would not say what those volumes are. Winvale signed a $20.7 million contract with the Office of Personnel Management on June 5 to start notifying victims of the intrusion by hackers from China, the largest breach of federal employee data in recent years. A week before the breach was made public June 4, OPM had issued a solicitation to identify companies that specialize in identity theft protection. The June 2 award was signed two days before the hack, of a database with employee information going back three decades, was made public.

What Apple’s Tim Cook Overlooked in His Defense of Privacy

[Commentary] Timothy Cook, Apple’s chief executive, delivered a speech that raised some eyebrows in the technology industry. His blistering defense of privacy, which he and other Apple executives repeated at the company’s developer conference, was notable. But while Cook raised awareness for digital privacy, his speech glossed over two main issues. For one, he neglected to mention that Apple also collects a great deal of data about how we use technology. While it has more protections for that data than many rivals, the company plainly states in its privacy policy that it does use private data in many ways, including to build and market its own products, and to build its own advertising network. Cook also failed to fairly explore the substantial benefits that free, ad-supported services have brought to consumers worldwide. Many hundreds of millions of people now have access to more information and communication technologies because of such services.

President Obama's cyber silence leaves US unprepared

[Commentary] Though many details of the massive cyberattack against US government personnel records are still not public, its strategic implications are plain. Washington remains unprepared in cyberspace, floundering and unable to articulate its intentions and capabilities on this new battlefield.

China is the likely culprit, and its cyberwarfare -- added to its near-belligerent behavior in the South and East China seas, its expanding military assets and its use of economic clout for political ends -- is part of a deeply troubling pattern. Unfortunately, President Barack Obama's response is also apparently part of a pattern of sustained inaction. There is obviously risk in any strong response to a cyberattack. But if America is unwilling to defend itself when the costs and risks are relatively low, there is no reason for Beijing and others to think it will do so when the potential consequences are far greater. North Korea's attack on Sony Pictures was a wake-up call. China's apparent capture of US government personnel records is like being upended out of bed to the floor. What else is it going to take?

[John Bolton, a former US ambassador to the United Nations, is a fellow at the American Enterprise Institute]