{"id":14944,"date":"2010-10-27T15:55:21","date_gmt":"2010-10-27T15:55:21","guid":{"rendered":"http:\/\/www.publicknowledge.org\/uncategorized\/the-open-internet-under-assault\/"},"modified":"2025-01-08T23:29:57","modified_gmt":"2025-01-08T23:29:57","slug":"the-open-internet-under-assault","status":"publish","type":"post","link":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/","title":{"rendered":"The Open Internet Under Assault"},"content":{"rendered":"<p>It\u2019s not at all difficult to look at all that went on over the last couple of weeks and wonder if the Open Internet was only a grand dream that never existed, or was a phenomenon that appeared all too briefly and then was gone.\u00a0 Either way, there are more losers than winners.<\/p>\n<p>Once, the online world (which encompasses the pre-Internet days) was, to use the expression, an \u201celectronic frontier.\u201d\u00a0 Congress did what it could to protect the nascent environment, recognizing the great values it could bring.\u00a0 It ruled out taxes on Internet access.\u00a0 It created a safe harbor to protect online providers (in the pre-Internet days) from liability for material that rankles those subject to the rancorous online world.\u00a0 The complaints go back to the start of such protection, continue even through today, including those voiced by New York <a href=\"http:\/\/www.nytimes.com\/2010\/10\/26\/business\/26hotels.html?pagewanted=1&amp;hp\" target=\"_blank\" rel=\"noopener noreferrer\">hotel operators<\/a> critiqued by customers.<\/p>\n<p>(We could observe that those who regularly spout the \u201cDon\u2019t regulate the Internet\u201d meme are 14 years late.\u00a0 The safe harbor provisions in the 1996 Telecommunications Act and 1998 Digital Millennium Copyright Act \u201cregulate\u201d the Internet by giving some legal protection from liability to online providers in content disputes, a concept similar to proposals requiring online providers not to discriminate in their content delivery would do.\u00a0 But we digress.)<\/p>\n<p>The online world seemed almost as a DMZ from the regular business world, even as the Internet ecosystem was built by, and populated by, millions of web sites from those created by big companies and individual people.\u00a0 They combined to create something new and fresh, for a while at least.<\/p>\n<p>That was then.\u00a0 Now, policymakers make noise about how important the Internet is, but do little to protect and preserve the environment, which allowed the unique properties of openness and creativity to flourish.\u00a0 Now, for some, the Internet world is simply a collection of more properties to be used as leverage in down-and-dirty business transactions. As usual, consumer desires, even if not legal rights, are getting left in the virtual dust.<\/p>\n<p><strong>Open Internet Expands Debate<\/strong><\/p>\n<p>The debate should revolve around what government policy will be to protect the Open Internet.\u00a0 That\u2019s a larger question than Net Neutrality, which deals with an ISP playing favorites with traffic. The Cablevision-Fox dispute over payment for programming is one example of the larger issue.\u00a0 Having TV stations and cable operators cut each other off is, unfortunately, become standard operating procedure (SOP) for these \u201cretransmission consent\u201d deals.\u00a0 Consumers lose regardless. The same contract runs out for Fox and Dish on Nov 1.\u00a0\u00a0 Fox blocking Cablevision\u2019s Internet customers is the new wrinkle.<\/p>\n<p>More recently, the big broadcast networks said they would <a href=\"http:\/\/online.wsj.com\/article\/SB10001424052702303339504575566572021412854.html?mod=WSJ_hps_sections_tech\" target=\"_blank\" rel=\"noopener noreferrer\">not allow<\/a> their online offerings to be viewed by consumers using Google TV.\u00a0 And the point of that exercise is what, exactly?\u00a0 To siphon off some money from Google?\u00a0 To hamper the development of online video?\u00a0 To keep viewers from using the search engine to find online content that the networks don\u2019t want the viewers to find \u2013 torrents of their shows, perhaps to be watched on a big television rather than a computer screen?\u00a0 Google TV is a Web browser, albeit one optimized for use on a TV.<\/p>\n<p><a href=\"http:\/\/thenextweb.com\/google\/2010\/10\/16\/is-sony-the-guardian-angel-for-google-tv-our-first-look-and-impressions\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sony<\/a> has already made a TV incorporating Google TV software, on the assumption that combining the TV experience with the Web experience would be a good one for consumers.\u00a0\u00a0 There shouldn\u2019t be any disagreement about that.\u00a0 Sony, Logitech (which also makes an access device using Google TV) or any other company, should be able to build a device on whatever software platform it wants that allows people to have access to the Web and\/or TV.<\/p>\n<p>Under normal situations, the gatekeepers are the Internet Service Providers (ISPs) and they are the ones at whom Open Internet policies are usually targeted.\u00a0 The FCC\u2019s 2005 Open Internet policy statement started from the perspective that the Commission has jurisdiction over the access services that ISPs provide \u2013 a perspective now thrown into doubt by a court ruling and the disinclination of the FCC leadership to resolve the problem.\u00a0 The FCC\u2019s policy that \u201cconsumers are entitled to access the lawful Internet content of their choice,\u201d could apply to other than ISPs as a matter of general principle.\u00a0 That\u2019s the way the Internet should operate, and that\u2019s a policy that could be supported across the government.<\/p>\n<p><strong>&#8216;Browser Wars&#8217; Valuable History<\/strong><\/p>\n<p>The U.S. Appeals Court for the D.C. Circuit, in upholding a lower court\u2019s ruling that some of Microsoft\u2019s licensing practices were anti-competitive, demonstrated that there are limits.\u00a0 (Note: in reading the quote, where it says \u201cgive rise to tort liability,\u201d non-lawyers should substitute the words \u201cbe held responsible for smacking someone over the head.\u201d)\u00a0 The court said:<\/p>\n<blockquote><p>\u00a0\u201cMicrosoft&#8217;s primary copyright argument borders upon the frivolous. The company claims an absolute and unfettered right to use its intellectual property as it wishes\u2026 That is no more correct than the proposition that use of one&#8217;s personal property, such as a baseball bat, cannot give rise to tort liability. As the Federal Circuit succinctly stated: \u2018Intellectual property rights do not confer a privilege to violate the antitrust laws.\u2019\u201d<\/p><\/blockquote>\n<p>There is more to the government than the FCC, particularly in a case in which anti-competitive behavior is inflicted on an ISP and its customers, as opposed to anti-competitive behavior by an ISP.\u00a0 As Public Knowledge said in our Oct. 21 letter to the Commission on the Cablevision-Fox dispute, \u201cnetwork neutrality is not the end-all be-all of consumer protection and these practices could threaten the integrity of the open Internet as much as anti-competitive behavior by telecommunications providers.\u201d\u00a0 Public Knowledge said those kinds of incidents \u201cshould be investigated by the FCC, FTC, Justice Department, or other agencies, according to their jurisdiction.\u201d<\/p>\n<p>In setting terms to dictate which platform for viewing a Web site is acceptable, the TV networks are regressing a decade to the days of the Browser Wars.\u00a0 Back then, Web site owners tried to pick which browser would work best, or work not at all, with the content on the site. The fight was primarily between Netscape Navigator, the first true browser, and Microsoft\u2019s Internet Explorer.\u00a0 Microsoft \u201cwon\u201d by integrating IE with Windows at no cost and driving Netscape out of business. Today, the Microsoft browser has <a href=\"http:\/\/gs.statcounter.com\/press\/microsoft-internet-explorer-browser-falls-below-50-perc-of-worldwide-market-for-first-time\" target=\"_blank\" rel=\"noopener noreferrer\">less than half<\/a> of the browser market, down from having two-thirds of the market two years ago while trailing not far behind is Firefox, the open-source descendent of Netscape. Web standards are more tolerant of differing browsers now also.<\/p>\n<p>Some people <a href=\"http:\/\/latimesblogs.latimes.com\/entertainmentnewsbuzz\/2010\/10\/fox-cablevision-turn-up-the-heat-in-dc.html\" target=\"_blank\" rel=\"noopener noreferrer\">argue<\/a> that dictating how a site will be viewed, either by which people or with which technology, is acceptable behavior because the intellectual property is privately owned, and the owners can decide what to do with it.\u00a0 That\u2019s true, only up to a point.<\/p>\n<p>Federal Communications Commissioner Michael Copps in his statement on the Cablevision-Fox situation, as he usually does, captured the dynamic perfectly:<\/p>\n<blockquote><p>\u201cWe must also understand that these seemingly \u2018old media\u2019 debates can be used against the new media of the digital age, too. For a broadcaster to pull programming from the Internet for a cable company\u2019s subscribers, as apparently happened here, directly threatens the open Internet. This was yet another instance revealing how vulnerable the Internet is to discrimination and gate-keeper control absent clear rules of the road.\u201d<\/p><\/blockquote>\n<p>That behavior of blocking sites, or of having a site owner determine which software will be able to access the site, shouldn\u2019t be tolerated if an Open Internet is the goal of U.S. policy.\u00a0\u00a0 If it isn\u2019t our policy, to be enforced by the FCC, antitrust authorities, then the Web as we know it will disappear even more rapidly than it now is.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s not at all difficult to look at all that went on over the last couple of weeks and wonder if the Open Internet was only a grand dream that never existed, or was a phenomenon that appeared all too briefly and then was gone.&nbsp; Either way, there are more losers than winners.<\/p>\n","protected":false},"author":50,"featured_media":0,"parent":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[13],"class_list":["post-14944","post","type-post","status-publish","format-standard","hentry","category-insights","tag-net-neutrality"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Open Internet Under Assault - Public Knowledge<\/title>\n<meta name=\"description\" content=\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Open Internet Under Assault\" \/>\n<meta property=\"og:description\" content=\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/\" \/>\n<meta property=\"og:site_name\" content=\"Public Knowledge\" \/>\n<meta property=\"article:published_time\" content=\"2010-10-27T15:55:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-08T23:29:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Public Knowledge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Public Knowledge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/\"},\"author\":{\"name\":\"Public Knowledge\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/b91ba827ec861d0c69e297ab67384598\"},\"headline\":\"The Open Internet Under Assault\",\"datePublished\":\"2010-10-27T15:55:21+00:00\",\"dateModified\":\"2025-01-08T23:29:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/\"},\"wordCount\":1291,\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"keywords\":[\"Net Neutrality\"],\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/\",\"url\":\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/\",\"name\":\"The Open Internet Under Assault - Public Knowledge\",\"isPartOf\":{\"@id\":\"https:\/\/publicknowledge.org\/#website\"},\"datePublished\":\"2010-10-27T15:55:21+00:00\",\"dateModified\":\"2025-01-08T23:29:57+00:00\",\"description\":\"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.\",\"breadcrumb\":{\"@id\":\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/publicknowledge.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Open Internet Under Assault\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/publicknowledge.org\/#website\",\"url\":\"https:\/\/publicknowledge.org\/\",\"name\":\"Public Knowledge\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/publicknowledge.org\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/publicknowledge.org\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/publicknowledge.org\/#organization\",\"name\":\"Public Knowledge\",\"url\":\"https:\/\/publicknowledge.org\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"contentUrl\":\"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png\",\"width\":400,\"height\":200,\"caption\":\"Public Knowledge\"},\"image\":{\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/b91ba827ec861d0c69e297ab67384598\",\"name\":\"Public Knowledge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fd5fff7e31f168b0a0339f1333b8374dc2802924d4aba14b0f6fccbbb4f082df?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fd5fff7e31f168b0a0339f1333b8374dc2802924d4aba14b0f6fccbbb4f082df?s=96&d=mm&r=g\",\"caption\":\"Public Knowledge\"},\"url\":\"https:\/\/publicknowledge.org\/author\/publicknowledge\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Open Internet Under Assault - Public Knowledge","description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/","og_locale":"en_US","og_type":"article","og_title":"The Open Internet Under Assault","og_description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","og_url":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/","og_site_name":"Public Knowledge","article_published_time":"2010-10-27T15:55:21+00:00","article_modified_time":"2025-01-08T23:29:57+00:00","og_image":[{"width":400,"height":200,"url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","type":"image\/png"}],"author":"Public Knowledge","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Public Knowledge","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/#article","isPartOf":{"@id":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/"},"author":{"name":"Public Knowledge","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/b91ba827ec861d0c69e297ab67384598"},"headline":"The Open Internet Under Assault","datePublished":"2010-10-27T15:55:21+00:00","dateModified":"2025-01-08T23:29:57+00:00","mainEntityOfPage":{"@id":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/"},"wordCount":1291,"publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"keywords":["Net Neutrality"],"articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/","url":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/","name":"The Open Internet Under Assault - Public Knowledge","isPartOf":{"@id":"https:\/\/publicknowledge.org\/#website"},"datePublished":"2010-10-27T15:55:21+00:00","dateModified":"2025-01-08T23:29:57+00:00","description":"Public Knowledge promotes freedom of expression, an open internet, and access to affordable communications tools and creative works. We work to shape policy.","breadcrumb":{"@id":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/publicknowledge.org\/the-open-internet-under-assault\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/publicknowledge.org\/the-open-internet-under-assault\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/publicknowledge.org\/"},{"@type":"ListItem","position":2,"name":"The Open Internet Under Assault"}]},{"@type":"WebSite","@id":"https:\/\/publicknowledge.org\/#website","url":"https:\/\/publicknowledge.org\/","name":"Public Knowledge","description":"","publisher":{"@id":"https:\/\/publicknowledge.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/publicknowledge.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/publicknowledge.org\/#organization","name":"Public Knowledge","url":"https:\/\/publicknowledge.org\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/","url":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","contentUrl":"https:\/\/publicknowledge.org\/wp-content\/uploads\/2021\/12\/pk_social_logo-2.png","width":400,"height":200,"caption":"Public Knowledge"},"image":{"@id":"https:\/\/publicknowledge.org\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/b91ba827ec861d0c69e297ab67384598","name":"Public Knowledge","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/publicknowledge.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fd5fff7e31f168b0a0339f1333b8374dc2802924d4aba14b0f6fccbbb4f082df?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd5fff7e31f168b0a0339f1333b8374dc2802924d4aba14b0f6fccbbb4f082df?s=96&d=mm&r=g","caption":"Public Knowledge"},"url":"https:\/\/publicknowledge.org\/author\/publicknowledge\/"}]}},"_links":{"self":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/14944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/comments?post=14944"}],"version-history":[{"count":0,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/posts\/14944\/revisions"}],"wp:attachment":[{"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/media?parent=14944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/categories?post=14944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/publicknowledge.org\/wp-json\/wp\/v2\/tags?post=14944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}