Cover for No Agenda Show 712: Kalette
April 12th, 2015 • 3h 3m

712: Kalette

Shownotes

Every new episode of No Agenda is accompanied by a comprehensive list of shownotes curated by Adam while preparing for the show. Clips played by the hosts during the show can also be found here.

TODAY
-------------------------------------------------------------------------------------------------------------
Vegas
-------------------------------------------------------------------------------------------------------------
Bill Hudec auto backup recorder
-------------------------------------------------------------------------------------------------------------
Fletcher Jetta red light runner karma
-------------------------------------------------------------------------------------------------------------
Amazon Now
-------------------------------------------------------------------------------------------------------------
No Agenda the hit Broadway Musical
-------------------------------------------------------------------------------------------------------------
Congressional Dish on The Stream
-------------------------------------------------------------------------------------------------------------
Theodore Kasczinski "Industrial Society and Its Future"
Smith Mundt Act - A reminder that you are living in a Smith-Mudt Act repealed media landscape
NDAA and Overturning of Smith-Mundt Act
The National Defense Authorization Act for Fiscal Year 2013 (NDAA) allows for materials produced by the State Department and the Broadcasting Board of Governors (BBG) to be released within U.S. borders and strikes down a long-time ban on the dissemination of such material in the country.[14][15][16]
Propaganda in the United States - Wikipedia, the free encyclopedia
Sun, 21 Sep 2014 15:00
Propaganda in the United States is propaganda spread by government and media entities within the United States. Propaganda is information, ideas, or rumors deliberately spread widely to influence opinions. Propaganda is not only in advertising; it is also in radio, newspaper, posters, books, and anything else that might be sent out to the widespread public.
Domestic[edit]World War I[edit]The first large-scale use of propaganda by the U.S. government came during World War I. The government enlisted the help of citizens and children to help promote war bonds and stamps to help stimulate the economy. To keep the prices of war supplies down, the U.S. government produced posters that encouraged people to reduce waste and grow their own vegetables in "victory gardens." The public skepticism that was generated by the heavy-handed tactics of the Committee on Public Information would lead the postwar government to officially abandon the use of propaganda.[1]
World War II[edit]During World War II the U.S. officially had no propaganda, but the Roosevelt government used means to circumvent this official line. One such propaganda tool was the publicly owned but government funded Writers' War Board (WWB). The activities of the WWB were so extensive that it has been called the "greatest propaganda machine in history".[1]Why We Fight is a famous series of US government propaganda films made to justify US involvement in World War II.
In 1944 (lasting until 1948) prominent US policy makers launched a domestic propaganda campaign aimed at convincing the U.S. public to agree to a harsh peace for the German people, for example by removing the common view of the German people and the Nazi party as separate entities.[2] The core in this campaign was the Writers' War Board which was closely associated with the Roosevelt administration.[2]
Another means was the United States Office of War Information that Roosevelt established in June 1942, whose mandate was to promote understanding of the war policies under the director Elmer Davies. It dealt with posters, press, movies, exhibitions, and produced often slanted material conforming to US wartime purposes. Other large and influential non-governmental organizations during the war and immediate post war period were the Society for the Prevention of World War III and the Council on Books in Wartime.
Cold War[edit]During the Cold War, the U.S. government produced vast amounts of propaganda against communism and the Soviet bloc. Much of this propaganda was directed by the Federal Bureau of Investigation under J. Edgar Hoover, who himself wrote the anti-communist tract Masters of Deceit. The FBI's COINTELPRO arm solicited journalists to produce fake news items discrediting communists and affiliated groups, such as H. Bruce Franklin and the Venceremos Organization.
War on Drugs[edit]The National Youth Anti-Drug Media Campaign, originally established by the National Narcotics Leadership Act of 1988,[3][4] but now conducted by the Office of National Drug Control Policy under the Drug-Free Media Campaign Act of 1998,[5] is a domestic propaganda campaign designed to "influence the attitudes of the public and the news media with respect to drug abuse" and for "reducing and preventing drug abuse among young people in the United States".[6][7] The Media Campaign cooperates with the Partnership for a Drug-Free America and other government and non-government organizations.[8]
Iraq War[edit]In early 2002, the U.S. Department of Defense launched an information operation, colloquially referred to as the Pentagon military analyst program.[9] The goal of the operation is "to spread the administrations's talking points on Iraq by briefing ... retired commanders for network and cable television appearances," where they have been presented as independent analysts.[10] On 22 May 2008, after this program was revealed in the New York Times, the House passed an amendment that would make permanent a domestic propaganda ban that until now has been enacted annually in the military authorization bill.[11]
The Shared values initiative was a public relations campaign that was intended to sell a "new" America to Muslims around the world by showing that American Muslims were living happily and freely, without persecution, in post-9/11 America.[12] Funded by the United States Department of State, the campaign created a public relations front group known as Council of American Muslims for Understanding (CAMU). The campaign was divided in phases; the first of which consisted of five mini-documentaries for television, radio, and print with shared values messages for key Muslim countries.[13]
NDAA and Overturning of Smith-Mundt Act[edit]The National Defense Authorization Act for Fiscal Year 2013 (NDAA) allows for materials produced by the State Department and the Broadcasting Board of Governors (BBG) to be released within U.S. borders and strikes down a long-time ban on the dissemination of such material in the country.[14][15][16]
Ad Council[edit]The Ad Council, an American non-profit organization that distributes public service announcements on behalf of various private and federal government agency sponsors, has been labeled as "little more than a domestic propaganda arm of the federal government" given the Ad Council's historically close collaboration with the President of the United States and the federal government.[17]
International[edit]Through several international broadcasting operations, the US disseminates American cultural information, official positions on international affairs, and daily summaries of international news. These operations fall under the International Broadcasting Bureau, the successor of the United States Information Agency, established in 1953. IBB's operations include Voice of America, Radio Liberty, Alhurra and other programs. They broadcast mainly to countries where the United States finds that information about international events is limited, either due to poor infrastructure or government censorship. The Smith-Mundt Act prohibits the Voice of America from disseminating information to US citizens that was produced specifically for a foreign audience.
During the Cold War the US ran covert propaganda campaigns in countries that appeared likely to become Soviet satellites, such as Italy, Afghanistan, and Chile.
Recently The Pentagon announced the creation of a new unit aimed at spreading propaganda about supposedly "inaccurate" stories being spread about the Iraq War. These "inaccuracies" have been blamed on the enemy trying to decrease support for the war. Donald Rumsfeld has been quoted as saying these stories are something that keeps him up at night.[18]
Psychological operations[edit]The US military defines psychological operations, or PSYOP, as:
planned operations to convey selected information and indicators to foreign audiences to influence the emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.[19]
The Smith-Mundt Act, adopted in 1948, explicitly forbids information and psychological operations aimed at the US public.[20][21][22] Nevertheless, the current easy access to news and information from around the globe, makes it difficult to guarantee PSYOP programs do not reach the US public. Or, in the words of Army Col. James A. Treadwell, who commanded the U.S. military psyops unit in Iraq in 2003, in the Washington Post:
There's always going to be a certain amount of bleed-over with the global information environment.[23]
Agence France Presse reported on U.S. propaganda campaigns that:
The Pentagon acknowledged in a newly declassified document that the US public is increasingly exposed to propaganda disseminated overseas in psychological operations.[24]
Former US Defense Secretary Donald Rumsfeld approved the document referred to, which is titled "Information Operations Roadmap." [22][24] The document acknowledges the Smith-Mundt Act, but fails to offer any way of limiting the effect PSYOP programs have on domestic audiences.[20][21][25]
Several incidents in 2003 were documented by Sam Gardiner, a retired Air Force colonel, which he saw as information-warfare campaigns that were intended for "foreign populations and the American public." Truth from These Podia,[26] as the treatise was called, reported that the way the Iraq war was fought resembled a political campaign, stressing the message instead of the truth.[22]
See also[edit]References[edit]^ abThomas Howell, The Writers' War Board: U.S. Domestic Propaganda in World War II, Historian, Volume 59 Issue 4, Pages 795 - 813^ abSteven Casey, (2005), The Campaign to sell a harsh peace for Germany to the American public, 1944 - 1948, [online]. London: LSE Research Online. [Available online at http://eprints.lse.ac.uk/archive/00000736] Originally published in History, 90 (297). pp. 62-92 (2005) Blackwell Publishing^National Narcotics Leadership Act of 1988 of the Anti''Drug Abuse Act of 1988, Pub.L. 100''712, 102 Stat. 4181, enacted November 18, 1988^Gamboa, Anthony H. (January 4, 2005), B-303495, Office of National Drug Control Policy '-- Video News Release, Government Accountability Office, footnote 6, page 3 ^Drug-Free Media Campaign Act of 1998 (Omnibus Consolidated and Emergency Supplemental Appropriations Act, 1999), Pub.L. 105''277, 112 Stat. 268, enacted October 21, 1998^Gamboa, Anthony H. (January 4, 2005), B-303495, Office of National Drug Control Policy '-- Video News Release, Government Accountability Office, pp. 9''10 ^Drug-Free Media Campaign Act of 1998 of the Omnibus Consolidated and Emergency Supplemental Appropriations Act, 1999, Pub.L. 105''277, 112 Stat. 268, enacted October 21, 1998^Office of National Drug Control Policy Reauthorization Act of 2006, Pub.L. 109''469, 120 Stat. 3501, enacted December 29, 2006, codified at 21 U.S.C. § 1712^Barstow, David (2008-04-20). "Message Machine: Behind Analysts, the Pentagon's Hidden Hand". New York Times. ^Sessions, David (2008-04-20). "Onward T.V. Soldiers: The New York Times exposes a multi-armed Pentagon message machine". Slate. ^Barstow, David (2008-05-24). "2 Inquiries Set on Pentagon Publicity Effort". New York Times. ^Rampton, Sheldon (October 17, 2007). "Shared Values Revisited". Center for Media and Democracy. ^"U.S. Reaches Out to Muslim World with Shared Values Initiative". America.gov. January 16, 2003.
-------------------------------------------------------------------------------------------------------------
Podcast Patent
-------------------------------------------------------------------------------------------------------------
Episodes vs Segments
Compilation file doesn't have to be at same URI
EFF Transcript of ginal podcasting testimony
Sun, 12 Apr 2015 07:08
Trials@uspto.gov Paper No. 40 571-272-7822 Entered: February 5, 2015 RECORD OF ORAL HEARING UNITED STATES PATENT AND TRADEMARK OFFICE - - - - - - BEFORE THE PATENT TRIAL AND APPEAL BOARD - - - - - - ELECTRONIC FRONTIER FOUNDATION Petitioner vs. PERSONAL AUDIO, LLC Patent Owner - - - - - - Case No. IPR2014-00070 Patent 8,112,504 - - - - - - Oral Hearing Held: December 17, 2014 Before SHERIDAN K. SNEDDEN, TRENTON A. WARD, and GREGG ANDERSON (via video conference), Administrative Patent Judges The above-entitled matter came on for hearing on Wednesday, December 17, 2014 at the U.S. Patent and Trademark Office, 600 Dulany Street, Alexandria, Virginia at 1:00 p.m., in Courtroom A.
2 APPEARANCES: ON BEHALF OF THE PETITIONER: NICHOLAS A. BROWN, ESQ. Greenberg Traurig LLP 4 Embarcadero Center, Suite 3000 San Francisco, CA 94111 415-655-1271 and RICHARD C. PETTUS, ESQ. Greenberg Traurig LLP 200 Park Avenue New York, New York 10166 212-801-9387 ON BEHALF OF THE PATENT OWNER: MICHAEL J. FEMAL, ESQ. Much Shelist, P.C. 191 North Wacker, Suite 1800 Chicago, Illinois 60606-2000 312-521-2768
IPR2014-00070 Patent 8,112,504 3 P R O C E E D I N G S 1 ( 1 : 0 0 p . m . ) 2 J U D G E W A R D : G o o d a f t e r n o o n . W e l c o m e t o t h e 3 P a t e n t T r i a l a n d A p p e a l B o a r d . W e ' r e h e r e t h i s a f t e r n o o n f o r 4 t h e o r a l h e a r i n g f o r i n t e r p a r t e s r e v i e w m a t t e r N u m b e r I P R 5 2014-0 0 0 7 0 . I t i s a n i n t e r p a r t e s r e v i e w p r o c e e d i n g i n w h i c h 6 E l e c t r o n i c F r o n t i e r F o u n d a t i o n i s t h e P e t i t i o n e r a n d P e r s o n a l 7 A u d i o , L L C i s t h e P a t e n t O w n e r . 8 T h e p a n e l f o r t h e h e a r i n g t o d a y i s m y c o l l e a g u e , 9 J u d g e S n e d d e n , s i t t i n g h e r e o n m y r i g h t , m y s e l f , Ju d g e W a r d , 10 a n d a l s o m y c o l l e a g u e , J u d g e A n d e r s o n , w h o i s j o i n i n g u s f r o m 11 o u r s a t e l l i t e o f f i c e i n D e n v e r . J u d g e A n d e r s o n , g o o d m o r n i n g 12 t o y o u . C a n y o u s e e a n d h e a r u s c l e a r l y ? 13 J U D G E A N D E R S O N : I c a n . T h a n k y o u , J u d g e 14 W a r d . 15 J U D G E W A R D : A l l r i g h t . 16 I w o u l d l i k e t o s t a r t b y g e t t i n g a p p e a r a n c e s o f 17 c o u n s e l . W h o d o w e h a v e o n b e h a l f o f P e t i t i o n e r , E l e c t r o n i c 18 F r o n t i e r F o u n d a t i o n ? 19 M R . P E T T U S : M a y i t p l e a s e t h e B o a r d , R i c h a r d 20 P e t t u s o f t h e G r e e n b e r g T r a u r i g l a w f i r m . W i t h m e i s V e r a 21 R a n i e r i o f E l e c t r o n ic F r o n t i e r F o u n d a t i o n a n d m y p a r t n e r , 22 N i c h o l a s B r o w n , w h o w i l l b e p r e s e n t i n g t h e a r g u m e n t . 23 J U D G E W A R D : T h a n k y o u , M r . P e t t u s . A n d w h o 24 d o w e h a v e o n b e h a l f o f t h e P a t e n t O w n e r ? 25
IPR2014-00070 Patent 8,112,504 4 M R . F E M A L : Y e s , m a y i t p l e a s e t h e C o u r t , 1 M i c h a e l J . F e m a l o n b e h a l f o f t h e P a t e n t O w n e r , P e r s o n a l 2 A u d i o . 3 J U D G E W A R D : M r . F e m a l , w e l c o m e t o y o u . 4 I h a v e a f e w a d m i n i s t r a t i v e d e t a i l s I w a n t t o g o o v e r 5 b e f o r e w e g e t s t a r t e d w i t h t h e a r g u m e n t s , p r i m a r i l y t o t a l k 6 a b o u t t h e f o r m a t f o r t h e h e a r i n g . T h e t r i a l h e a r i n g o r d e r t h a t 7 w e e n t e r e d i n t h i s c a s e o n N o v e m b e r 2 8 t h i n s t r u c t e d t h a t t h e 8 p a r t i e s w o u l d e a c h h a v e 4 5 m i n u t e s t o p r e s e n t t h e i r a r g u m e n t s . 9 W e ' r e g o i n g t o f i r s t h e a r f r o m t h e P e t i t i o n e r . 10 P e t i t i o n e r , y o u w i l l p r e s e n t o u r a r g u m e n t s . A n d , M r . F e m a l , 11 t h e P a t e n t O w n e r , w i l l th e n b e a l l o w e d t o r e s p o n d t o p r e s e n t 12 t h e i r a r g u m e n t s . A n d P e t i t i o n e r , i f y o u w i s h t o d o s o , y o u c a n 13 r e s e r v e t i m e f o r r e b u t t a l . J u s t i n d i c a t e h o w m u c h t i m e y o u 14 w a n t a t t h e b e g i n n i n g o f y o u r a r g u m e n t s . 15 O n e a d m i n i s t r a t i v e d e t a i l f o r c o u n s e l . I w a n t t o 16 mak e s u r e t h a t w h e n y o u a r e r e f e r r i n g t o a d e m o n s t r a t i v e s l i d e , 17 p l e a s e m a k e s u r e t o r e f e r t o t h e s l i d e n u m b e r . J u d g e A n d e r s o n 18 a t t e n d i n g r e m o t e l y i n D e n v e r w i l l o n l y b e a b l e t o h e a r y o u 19 w h e n y o u a r e s p e a k i n g i n t o t h e m i c r o p h o n e a n d h e w i l l n o t b e 20 a b l e t o s e e w h a t i s s h o w n o n t h e p r o j e c t o r h e r e i n t h e h e a r i n g 21 r o o m . 22 S o i n o r d e r f o r J u d g e A n d e r s o n t o b e a b l e t o f o l l o w 23 a l o n g w i t h y o u r a r g u m e n t s , m a k e s u r e y o u a r e r e f e r e n c i n g t h e 24
IPR2014-00070 Patent 8,112,504 5 s l i d e n u m b e r or p a r t i c u l a r d e m o n s t r a t i v e t h a t y o u a r e r e l y i n g 1 u p o n s o t h a t J u d g e A nd e r s o n c a n f o l l o w a l o n g . 2 C o u n s e l f o r P e t i t i o n e r , d o y o u h a v e a n y q u e s t i o n s ? 3 M R . B R O W N : N o , Y o u r H o n o r . 4 J U D G E W A R D : C o u n s e l f o r P a t e n t O w n e r , a n y 5 q u e s t i o n s f r o m y o u ? 6 M R . F E M A L : N o , Y o u r H o n o r . 7 J U D G E W A R D : A l l r i g h t . P e t i t i o n e r , w h e n y o u 8 a r e r e ad y . 9 M R . B R O W N : G o o d a f t e r n o o n . 10 J U D G E W A R D : G o o d a f t e r n o o n . 11 M R . B R O W N : T h e B o a r d s h o u l d i n v a l i d a t e t h e 12 ' 5 0 4 p a t e n t . 13 J U D G E W A R D : M r . B r o w n , d i d y o u w a n t t o 14 r e s e r v e a n y t i m e f o r r e b u t t a l ? 15 M R . B R O W N : Y e s . 16 J U D G E W A R D : H o w m u c h ? 17 M R . B R O W N : P l ea s e r e s e r v e 2 0 m i n u t e s . 18 J U D G E W A R D : 2 0 m i n u t e s f o r r e b u t t a l . O k a y . 19 N o t e d . 20 M R . B R O W N : T h e B o a r d s h o u l d i n v a l i d a t e t h e 21 ' 5 0 4 p a t e n t b e c a u s e P e r s o n a l A u d i o m a d e t h r e e a r g u m e n t s 22 distinguishing the CNN/Compton reference in its response. 23 B u t i n t h e d e p o si t i o n o f P e r s o n a l A u d i o ' s e x p e r t , 24 P e r s o n a l A u d i o ' s e x p e r t a d m i t t e d t h a t e a c h o f t h o s e a r g u m e n t s 25
IPR2014-00070 Patent 8,112,504 6 i s w r o n g . T h e f i r s t a r g u m e n t t h a t P e r s o n a l A u d i o m a d e w a s 1 t h a t t h e t a b l e o f c o n t e n t s f i l e , c o n t e n t s . h t m l i n t h e C N N 2 r e f e r e n c e d o e s n o t h a v e a p r e d e t e r m i n e d U R L. B u t D r . N e l s o n 3 t e s t i f i e d i n h i s d e p o s i t i o n t h a t a U R L e x a c t l y l i k e t h e o n e 4 d i s c l o s e d i n t h e C N N r e f e r e n c e w i t h a s i x-d i g i t d a t e c o d e w a s a 5 p r e d e t e r m i n e d U R L . 6 P e r s o n a l A u d i o a r g u e d t h a t t h e c o n t e n t s . h t m l f i l e i n 7 t h e C N N r e f e r e n c e i s n o t a n u p d a t e d c o m pi l a t i o n f i l e , b u t 8 D r . N e l s o n a d m i t t e d t h a t t h e c o n t e n t s . h t m l f i l e i s u p d a t e d e a c h 9 d a y . 10 P e r s o n a l A u d i o ' s t h i r d a r g u m e n t w a s -- 11 J U D G E W A R D : M r . B r o w n , l e t m e s t o p y o u r i g h t 12 t h e r e o n t h a t p a r t i c u l a r p o i n t . 13 M R . B R O W N : Y e s . 14 J U D G E W A R D : U p d a t e d e a c h d a y. I s n ' t a n e w f i l e 15 c r e a t e d e a c h d a y ? 16 M R . B R O W N : L e t m e p u t u p t h e d i s c l o s u r e . I t i s 17 -- a p p e a r s t o b e a n e w f i l e w i t h t h e s a m e n a m e c r e a t e d b y t h e 18 s a m e p r o g r a m i n t h e s a m e l o c a t i o n e a c h d a y . 19 T h e r e i s a p r o g r a m c a l l e d c o n t e n t s . c . T h a t p r o g r a m 20 c o n t e n ts . c , I a m n o w o n s l i d e 1 8 , a n d i t s h o w s f i g u r e 3 o f t h e 21 C o m p t o n r e f e r e n c e a n d a p i e c e o f t h e t e x t d e s c r i b i n g t h a t 22 f i g u r e . T h a t p r o g r a m c o n t e n t s . c r u n s e a c h d a y a f t e r t h e 3 : 4 5 23 a . m . b r o a d c a s t o f t h e N e w s r o o m s h o w f o r t h a t d a y a n d i t 24
IPR2014-00070 Patent 8,112,504 7 p r o c e s s e s t h e c o n t e n t of t h a t C N N N e w s r o o m s h o w e a c h d a y t o 1 g e n e r a t e t h e f i l e c o n t e n t s . h t m l . 2 T h e r e f e r e n c e d o e s n ' t s p e c i f i c a l l y s t a t e h o w t h a t 3 c o n t e n t s . h t m l f i l e t h a t i s s h o w n i n t h e f i g u r e i s p u t o n t o t h e 4 w e b s e r v e r a t t h e U R L w i t h t h e d a t e c o d e t h a t y o u c a n s e e i n 5 f i g u r e 1 a n d i n f i g u r e 2 . B u t -- a n d I a m n o w o n t h e n e x t s l i d e , 6 s l i d e 1 9 -- w h e n I a s k e d D r . N e l s o n a b o u t t h i s p r o c e s s , t h i s i s 7 w h a t h i s t e s t i m o n y w a s . 8 A n d , i n p a r t i c u l a r , I -- h e a g r e e d t h a t t h e f i l e -- I ' m 9 s o r r y , t h e p r o g r a m c o n t e n t s . c r u n s e a c h d a y . I t g e n er a t e s t h e 10 H T M L f i l e . A n d t h e n a s a r e s u l t t h e c o n t e n t s . h t m l f i l e i s 11 u p d a t e d e a c h d a y . 12 J U D G E W A R D : M r . B r o w n , l e t m e a s k y o u , c l a i m 13 3 1 s t a t e s " s t o r i n g a n u n d a t e d v e r s i o n o f c o m p i l a t i o n f i l e i n o n e 14 o f s a i d o n e o r m o r e d a t a s t o r a g e s e r v e r s " a n d t h e n l a t e r s t a t e s , 15 " s a i d u p d a t e d v e r s i o n o f s a i d c o m p i l a t i o n f i l e c o n t a i n i n g 16 a t t r i b u t e d a t a . " 17 D o e s n ' t c l a i m 3 1 r e q u i r e t h a t i t i s o n e c o m p i l a t i o n 18 f i l e t h a t i s u p d a t e d a n d n o t a s e q u e n c e o f n e w f i l e s c r e a t e d e a c h 19 a n d e v e r y d a y t h a t a r e u n r e l a t e d ? 20 M R . B R O W N : W e l l, w h a t t h e c l a i m r e q u i r e s i s t h a t 21 t h e r e b e a n u p d a t e d v e r s i o n o f a c o m p i l a t i o n f i l e . T h e c l a i m 22 d o e s n ' t s p e c i f y w h a t t h a t c o m p i l a t i o n f i l e w a s b e f o r e o r w h a t 23 t h a t c o m p i l a t i o n f i l e i s a f t e r . I t h a s t o b e a n u p d a t e d v e r s i o n o f 24 a c o m p i l a t i o n f i l e . 25
IPR2014-00070 Patent 8,112,504 8 J U D G E W AR D : A n d h o w i s t h i s c o n t e n t s . h t m l , 1 h o w i s t h a t a n u p d a t e d v e r s i o n , l e t ' s s a y , f o r t o d a y , W e d n e s d a y , 2 h o w i s i t a n u p d a t e d v e r s i o n o f w h a t -- o f T u e s d a y ' s H T M L 3 f i l e ? 4 M R . B R O W N : W e l l , b e c a u s e e a c h d a y i t i s u p d a t e d 5 t o i n c l u d e t h e c o n t e n t f o r t h a t d a y ' s C NN N e w s r o o m b r o a d c a s t . 6 J U D G E W A R D : S o y o u w o u l d a g r e e t h a t i t d o e s 7 n o t l i k e l y c o n t a i n a n y c o n t e n t t h a t w o u l d h a v e b e e n t h e r e t h e 8 p r e v i o u s d a y ? E a c h d a y i s n e w c o n t e n t i n t h e c o n t e n t s . h t m l 9 f i l e ? 10 M R . B R O W N : C o r r e c t , e a c h d a y w i l l b e n e w 11 c o n t e n t , g e n e r at e d i n t h e s a m e w a y b a s e d o n t h e n e w c o n t e n t 12 t h a t w a s b r o a d c a s t t h a t m o r n i n g . T h a t i s c o r r e c t . 13 H o w e v e r , I w a n t t o e m p h a s i z e , t h e c l a i m d o e s n o t 14 s a y t h e r e m u s t b e a s i n g l e c o m p i l a t i o n f i l e . I t d o e s n o t s a y t h a t 15 i t m u s t b e a s i n g l e f i l e a t a s p e c i f i c f i xe d u n c h a n g e d U R L . I t 16 s a y s t h e r e h a s t o b e a f i l e . I t s a y s t h a t i t m u s t b e a n u p d a t e d 17 v e r s i o n o f a f i l e . 18 A n d t h e i s s u e , i t s e e m s t o b e , i s w h e t h e r t h e c l a i m 19 p r o s c r i b e s t h a t a n u p d a t e d v e r s i o n i s c r e a t e d i n a p a r t i c u l a r 20 w a y . A n d i t d o e s n ' t . I t d o e s n ' t s a y t h a t t h e f i l e h a s t o b e 21 a m e n d e d , t h a t i t h a s t o h a v e h a d o l d c o n t e n t i n i t a n d t h a t o l d 22 c o n t e n t h a s t o e i t h e r b e r e p l a c e d o r s u p p l e m e n t e d . I t j u s t s a y s 23 t h e r e i s a f i l e , i t h a s t o h a v e b e e n u p d a t e d , a n d t h a t u p d a t e d 24 v e r s i o n o f c o n t e n t s . h t m l i s d e s c r i b ed r i g h t t h e r e . I n f a c t , t h e 25
IPR2014-00070 Patent 8,112,504 9 p a t e n t s p e c i f i c a l l y s a y s -- I w i l l f i n d t h i s s l i d e s i t e -- t h a t i t i s 1 u p d a t e d . 2 I d o n ' t h a v e t h e c i t e h a n d y , I a p o l o g i z e . 3 S o I a m g o i n g t o c o m e b a c k t o w h e r e I w a s . T h e r e 4 i s t h e u p d a t e d c o m p i l a t i o n f i l e i s s u e . T h e t h i r d a rg u m e n t t h a t 5 P e r s o n a l A u d i o h a s m a d e i s t h a t t h e r e i s n o c o m p i l a t i o n f i l e a t 6 a l l b e c a u s e t h e n e w s s e g m e n t s t h a t a r e s h o w n i n f i g u r e 1 o f t h e 7 p a t e n t -- I ' m s o r r y , o f t h e C N N r e f e r e n c e a r e n o t a c t u a l l y 8 e p i s o d e s , t h a t w h a t f i g u r e 1 o f t h e C N N a c t u a l l y s h o w s i s a 9 s i n g l e e p i s o d e t h a t c o n t a i n s m u l t i p l e s e g m e n t s . 10 D r . N e l s o n w a s a s k e d a b o u t t h i s i n h i s d e p o s i t i o n , 11 P e r s o n a l A u d i o ' s e x p e r t , a n d h e t e s t i f i e d u n d e r t h e B o a r d ' s 12 d e f i n i t i o n o f e p i s o d e , a s a d o p t e d i n t h e I n s t i t u t i o n d e c i s i o n , 13 t h a t e a c h o f t h e i n d i v i d u a l se g m e n t s s h o w n i n f i g u r e 1 o f C N N 14 a r e , i n f a c t , e p i s o d e s . 15 J U D G E W A R D : M r . B r o w n , w h a t i s t h e d i f f e r e n c e 16 b e t w e e n a n e p i s o d e a n d a p r o g r a m s e g m e n t ? 17 M R . B R O W N : A p r o g r a m -- i f y o u h a v e t w o 18 p r o g r a m s e g m e n t s t h a t m i g h t b e c o m p l e t e l y u n r e l a t e d t o e a c h 19 o t h e r, t h e y m i g h t n o t b e e p i s o d e s . W h a t t h e p a t e n t d e s c r i b e s a s 20 e p i s o d e s a r e p r o g r a m s e g m e n t s t h a t a r e r e l a t e d t o e a c h o t h e r , 21 p o t e n t i a l l y , f o r e x a m p l e , b e c a u s e t h e y s h o u l d b e p l a y e d i n 22 s e q u e n c e , p o t e n t i a l l y b e c a u s e t h e y a r e p a r t s o f w o r l d n e w s . 23
IPR2014-00070 Patent 8,112,504 10 S o , f o r e x a m pl e , I w i l l r e f e r y o u t o -- I b e l i e v e t h i s 1 i s s l i d e -- I a m d i s c u s s i n g c o l u m n 3 0 o f t h e p a t e n t . A n d I w i l l 2 g i v e y o u t h e s l i d e n u m b e r , s l i d e 2 2 . 3 A n d w h a t t h e p a t e n t d e s c r i b e s h e r e i s t h a t y o u c a n 4 h a v e p r o g r a m s e g m e n t s , w h i c h i s t h e t o p b o x , i t c a n b e 5 c o m bi n e d , n o w a t l i n e 3 1 , c o m b i n e d w i t h o t h e r r e l a t e d p r o g r a m 6 s e g m e n t s t o f o r m a s e q u e n c e o f a s s o c i a t e d s e g m e n t s , h e r e 7 c a l l e d a s u b j e c t . 8 A n d t h e n i t g o e s o n t o e x p l a i n i n t h e n e x t c o l u m n , 9 n o w c o l u m n 3 0 a t a r o u n d l i n e 1 8 o n w a r d s , t h a t t h o s e s u b j e c t s 10 c a n i n c l ud e w o r l d n e w s , n a t i o n a l n e w s , l o c a l n e w s , e t c e t e r a . 11 S o -- 12 J U D G E W A R D : D i d n ' t y o u a r g u e i n y o u r r e p l y 13 b r i e f t h a t p r o g r a m s e g m e n t s c a n b e r e l a t e d , e v e n i f t h e y a r e 14 o n l y t e m p o r a l l y r e l a t e d ? 15 M R . B R O W N : C o r r e c t . S o , f o r e x a m p l e , t h e w o r l d 16 n e w s s u b j e c t th a t ' s d e s c r i b e d h e r e m i g h t c o n t a i n f i v e d i f f e r e n t 17 s u b j e c t s t h a t w o u l d b e t e m p o r a l l y r e l a t e d i n t h e s e n s e t h a t t h e y 18 a r e t h e w o r l d n e w s o f t h e d a y , o f t h a t d a y . 19 T h e y m i g h t b e a b o u t u n r e l a t e d m a t t e r s . O n e m i g h t 20 b e a b o u t t h e e v e n t s t h a t a r e o c c u r r i n g i n I r aq . A n o t h e r m i g h t 21 b e a b o u t t h e e v e n t s t h a t a r e o c c u r r i n g i n A f g h a n i s t a n . T h o s e 22 e v e n t s m i g h t n o t b e c o n n e c t e d t o e a c h o t h e r . 23 T h e f a c t t h a t t w o p r o g r a m s e g m e n t s o f t h e w o r l d 24 n e w s a r e c o n t a i n e d i n t h e w o r l d n e w s , d o e s n ' t m e a n t h a t t h e i r 25
IPR2014-00070 Patent 8,112,504 11 s u b j e c t m a t t e r i s ne c e s s a r i l y r e l a t e d , b u t t h e y a r e n o n e t h e l e s s 1 r e l a t e d b e c a u s e t h e y a r e b o t h p a r t o f t h e w o r l d n e w s . A n d 2 t h a t ' s e x a c t l y w h a t w e h a v e . 3 J U D G E A N D E R S O N : S o , c o u n s e l , w h e n t h e 4 p r e a m b l e s a y s " s e r i e s o f e p i s o d e s , " a r e y o u i n t e r p r e t i n g t h a t t o 5 b e r e l a t e d e p i s o de s ? 6 M R . B R O W N : Y o u r H o n o r , I a m i n t e r p r e t i n g t h a t 7 t o m e a n r e l a t e d s e g m e n t s a s t h e B o a r d d e f i n e d " e p i s o d e s . " I n 8 o t h e r w o r d s , a n e p i s o d e i s r e l a t e d s e g m e n t s . A n d s o I i n t e r p r e t 9 " s e r i e s o f e p i s o d e s " a s t h e B o a r d d i d i n t h e I n s t i t u t i o n d e c i s i o n 10 t o b e a s er i e s o f r e l a t e d s e g m e n t s . 11 F o r e x a m p l e , a s I h a v e p u t u p o n t h e s l i d e , w o r l d 12 n e w s o r n a t i o n a l n e w s . 13 J U D G E A N D E R S O N : S o d o e s t h e " s e r i e s o f 14 e p i s o d e s " a s i t i s u s e d i n t h e c l a i m , i s t h a t a n i s s u e t h a t ' s n o t 15 a m o n g t h e t h r e e i s s u e s t h a t I h e a r d y o u a r t i c u la t e , t h a t ' s n o t a n 16 i s s u e h e r e b e c a u s e t h e C N N , f o r e x a m p l e , h a s m u l t i p l e e p i s o d e s 17 t h a t a r e r e l a t e d i n t h a t t h e y a r e a l l n e w s , I g a t h e r , a n d t h u s t h e y 18 a r e a s e r i e s o f e p i s o d e s ? 19 M R . B R O W N : T h a t i s o u r p o s i t i o n . P e r s o n a l 20 A u d i o d o e s d i s p u t e t h a t t h e e p i s o de s s h o w n i n f i g u r e 1 o f C N N , 21 t h a t t h o s e s e g m e n t s , e x c u s e m e , a r e e p i s o d e s . T h e i r a r g u m e n t 22 i s b e c a u s e o n e i s a b o u t a c o l l i s i o n a t J u p i t e r a n d o n e i s a b o u t 23 g e n e t i c a l l y-e n g i n e e r e d p l a n t s , b e c a u s e t h a t s u b j e c t m a t t e r i s 24
IPR2014-00070 Patent 8,112,504 12 d i f f e r e n t , t h e y a r e n o t r e l a t e d , e v e n th o u g h t h e y a r e b o t h p a r t o f 1 t h e s a m e d a y ' s C N N N e w s r o o m b r o a d c a s t . 2 T h a t i s t h e t h i r d a r g u m e n t t h a t I w a s a t t e m p t i n g t o 3 d e s c r i b e . O n t h a t p o i n t , t h o u g h , t h e B o a r d ' s i n i t i a l d e f i n i t i o n 4 o f " e p i s o d e , " w h i c h i s b a s e d o n c o l u m n 1 9 a n d 2 0 , I b e l i e v e , o f 5 t h e p at e n t , c o l u m n 1 9 o f t h e p a t e n t , u n d e r t h a t d e f i n i t i o n , 6 P e r s o n a l A u d i o ' s e x p e r t t e s t i f i e d t h a t t h e s e g m e n t s s h o w n i n 7 f i g u r e 1 o f C N N N e w s r o o m a r e , i n f a c t , e p i s o d e s . 8 S o h e r e I h a v e p u t u p o n t h e n e x t s l i d e , w h i c h i s 9 s l i d e 2 3 , t h e d e f i n i t i o n t h a t w a s p r o v i de d b y t h e B o a r d i n t h e 10 I n s t i t u t i o n d e c i s i o n , " a p r o g r a m s e g m e n t r e p r e s e n t e d b y o n e o r 11 m o r e m e d i a f i l e s , w h i c h i s p a r t o f a s e r i e s o f r e l a t e d s e g m e n t s . " 12 A n d I w i l l q u o t e t o y o u w h a t w e p u t o n p a g e 6 o f 13 o u r r e p l y b r i e f , t h e t e s t i m o n y o f P e r s o n a l A u d i o ' s e xp e r t , a n d 14 t h e q u e s t i o n w a s : S o u n d e r t h e d e f i n i t i o n t h a t w a s a d o p t e d b y 15 t h e B o a r d -- a n d I g o o n t o r e a d i t -- u n d e r t h a t d e f i n i t i o n , t h e 16 t w o p r o g r a m s e g m e n t s t h a t a r e p a r t o f t h e M a y 1 9 C N N 17 N e w s r o o m s h o w t h a t a r e s h o w n i n f i g u r e 1 a r e b o t h e p i s o d e s , 18 c o r re c t ? 19 " A n s w e r : Y e s , I t h i n k s o . " 20 S o t h e r e i s a d i s p u t e , b u t t h e e v i d e n c e i n t h e r e c o r d 21 s h o w s t h a t w e a r e c o r r e c t , t h a t s h o w s s h o u l d b e d e e m e d 22 e p i s o d e s . 23 J U D G E W A R D : M r . B r o w n , c a n y o u g i v e m e a n 24 e x a m p l e u n d e r y o u r p r o p o s e d c o n s t r u c t i o n o f " e p i s o d e " an d t h e 25
IPR2014-00070 Patent 8,112,504 13 r e l a t e d c o n s t r u c t i o n o f p r o g r a m s e g m e n t s , r e l a t e d p r o g r a m 1 s e g m e n t s , I a m u n d e r s t a n d i n g y o u t o a r g u e r e l a t e d p r o g r a m 2 s e g m e n t s c o n s t i t u t e a n e p i s o d e . C a n y o u g i v e m e a n e x a m p l e 3 o f a p r o g r a m s e g m e n t s t h a t y o u c o n s i d e r t o b e u n r e l a t e d ? 4 M R . B R O W N : S ur e . I t h i n k i t i s s i m p l e . Y o u c a n 5 g o b a c k t o f i g u r e 1 o f t h e C N N N e w s r o o m . S o I w e n t b a c k t w o 6 s l i d e s , a n d i t i s s l i d e 2 1 . A n d t h e r e i s a n i m a g e o f f i g u r e 1 o f 7 C N N N e w s r o o m . 8 S o i f t h e s e t w o s t o r i e s , o n e w h i c h i s a b o u t a c o s m i c 9 c o l l i s i o n n e a r J u p i t e r an d o n e w h i c h i s a b o u t 10 g e n e t i c a l l y-e n g i n e e r e d p l a n t s , i f t h o s e w e r e o n d i f f e r e n t w e b 11 p a g e s , t h e y w e r e n ' t b o t h p a r t o f t h e C N N N e w s r o o m s h o w , o n e 12 w a s r e p o r t e d b y C B S a t 1 : 0 0 p . m . o n o n e d a y a n d a n o t h e r w a s 13 r e p o r t e d b y N B C a t 8 : 0 0 a . m . t h r e e w e e k s l a t e r , t h e y w o u l d b e 14 u n r e l a t e d . 15 H o w e v e r , b e c a u s e t h e y a r e b o t h p a r t o f t h i s C N N 16 N e w s r o o m s h o w , t h e y a r e p a r t o f t h e c o n t e n t t h a t C N N s e l e c t e d 17 t o i n c l u d e i n i t s e d u c a t i o n a l b r o a d c a s t e a c h d a y , t h e y a r e 18 r e l a t e d b y b e i n g p a r t o f t h e s a m e s h o w . 19 J U D G E W A R D : D o y o u u nd e r s t a n d t h e d i f f i c u l t y 20 t h a t t h e p a n e l h a s , t h o u g h , i n t r y i n g t o d e t e r m i n e t h e 21 b o u n d a r i e s o f w h a t y o u a r e s u g g e s t i n g ? Y o u a r e t e l l i n g u s t h a t 22 i f t h e y s h o w u p o n t h e s a m e p a g e o n t h e s a m e d a y , t h e y a r e 23 r e l a t e d , b u t i f t h e y s h o w u p o n d i f f e r e n t p a g e s o n d i ff e r e n t 24 d a y s , t h e y a r e u n r e l a t e d . 25
IPR2014-00070 Patent 8,112,504 14 D o e s i t e x t e n d t o -- w e l l , m a y b e C N N c h a n g e s t o 1 w h e r e t h i s p a g e i s o n l y u p d a t e d e v e r y t w o d a y s ? I s t h e r e a 2 c e r t a i n a m o u n t o f t i m e t h a t i s r e q u i r e d ? I s t h e r e a c e r t a i n 3 a m o u n t o f , i f t h e y a r e r e l a t e d w e b p a g e s , b u t y o u g av e u s t h e 4 e x a m p l e o f C B S v e r s u s A B C . W h a t i f t h e y w e r e b o t h C N N w e b 5 p a g e s b u t t h e y w e r e g i v e n o n d i f f e r e n t d a y s ? A r e t h o s e n o w 6 s o m e h o w u n r e l a t e d ? 7 M R . B R O W N : W e l l , I t h i n k t h a t t h e a n s w e r t o t h a t 8 q u e s t i o n m i g h t n o t a c t u a l l y m a t t e r h e r e , t h o u g h w h a t I do 9 b e l i e v e i s t h a t t h e e x a m p l e p r o v i d e d i n t h e p a t e n t o f s u b j e c t s 10 w h i c h c o n s i s t o f a s e r i e s o f r e l a t e d s e g m e n t s a r e w o r l d n e w s , 11 c o m p u t e r t r a d e n e w s , e t c e t e r a . 12 S o t h e p a t e n t i s e x p l a i n i n g t h a t s e g m e n t s o f n e w s 13 c a n b e g r o u p e d t o g e t h e r b y t h e i r s u b j e c t m a t te r b e c a u s e t h e y 14 a r e a l l w o r l d n e w s . T h e p a t e n t d o e s n ' t d i s t i n g u i s h , d o e s n ' t s e t 15 t h e b o u n d a r i e s o f e p i s o d e i n t h e w a y t h a t y o u a r e d e s c r i b i n g . 16 A l l t h e p a t e n t s a y s i s i t i s a s e r i e s o f r e l a t e d s e g m e n t s . 17 S o I d o u n d e r s t a n d t h e d i f f i c u l t y i n a n a b s t r a c t 18 sen s e , b u t I t h i n k t h a t t h e p a t e n t p r o v i d e s t h e a n s w e r , a t l e a s t 19 w i t h t h e s p e c i f i c i t y n e e d e d t o r e a c h a d e c i s i o n h e r e , b e c a u s e 20 w h a t t h e p a t e n t d e s c r i b e s a s a n e p i s o d e i s e x a c t l y w h a t t h e 21 C N N r e f e r e n c e c o n t a i n s . 22 A n d t h e n o n t o p o f t h a t , I w i l l j u s t , i f t h e re i s a n y 23 c o n c e r n a b o u t t h i s , t h e r e h a s b e e n n o a r g u m e n t f r o m P e r s o n a l 24 A u d i o t h a t i t m a k e s a n y s o r t o f t e c h n o l o g i c a l d i f f e r e n c e w h a t 25
IPR2014-00070 Patent 8,112,504 15 t h e s p e c i f i c c o n t e n t i s o f t h e e p i s o d e s t h a t a r e b e i n g d e s c r i b e d 1 i n t h e p a t e n t . 2 I f w e t a k e a s t e p b a c k a n d w e l o o k a t w h a t i s 3 d e s c r i b e d i n c l a i m 3 1 , i t d e s c r i b e s a m e c h a n i s m f o r d i s t r i b u t i n g 4 o v e r t h e I n t e r n e t a s e r i e s o f r e l a t e d e p i s o d e s . B u t t h e r e i s n o 5 a r g u m e n t t h a t i t c o u l d b e d o n e a n y d i f f e r e n t l y o r t h a t i t n e e d t o 6 b e d o n e a n y d i f f e r e n t l y i f t h e y w e r e n ' t , i n f a c t , r e l a t ed , i f i t w a s 7 j u s t a s e r i e s o f v i d e o s t h a t h a d n o r e l a t i o n t o e a c h o t h e r , a l l o f 8 t h e e l e m e n t s o f t h e c l a i m w o u l d f u n c t i o n i n e x a c t l y t h e s a m e 9 w a y . 10 A n d , a s a r e s u l t , a n a r g u m e n t t h a t t h e s p e c i f i c 11 s u b j e c t m a t t e r a n d t h e d e g r e e o f r e l a t e d n e s s o f t h e s p e c i f i c 12 e p i s o d e s , a n y a r g u m e n t t h a t t h a t s o m e h o w l e n d s p a t e n t a b i l i t y i s 13 i n c o n s i s t e n t w i t h t h e l a w o f a n o n-f u n c t i o n a l d e s c r i p t i v e 14 m a t e r i a l . S o i n t h e M a t h i a s c a s e t h a t w e c i t e d i n o u r r e p l y , 15 t h e r e w a s a p a t e n t w h i c h r e q u i r e d a p o p-u p w i n d o w t o b e 16 d i s p l a y e d o v e r a s p o r t i n g e v e n t . 17 A n d t h e r e w a s a p r i o r a r t w h e r e i t w o u l d p o p u p t h e 18 w i n d o w , i t w o u l d d i s p l a y i t o v e r t h e t e l e v i s i o n , b u t i t w o u l d n ' t 19 d i s p l a y i t d u r i n g t h e s p o r t i n g e v e n t . I t w o u l d d i s p l a y i t d u r i n g 20 a n i n t e r v i e w a f t e r t h e s p o r t i n g e v e n t o r b e f o r e t h e sp o r t i n g 21 e v e n t s t a r t e d . 22 A n d t h e c o n c l u s i o n i n t h a t c a s e w a s t h a t i t d o e s n ' t 23 m a k e a n y d i f f e r e n c e w h a t t h e c o n t e n t i s o f t h e t e l e v i s i o n s h o w 24 t h a t i s b e i n g d i s p l a y e d u n d e r t h e p o p-u p w i n d o w . Y o u c a n ' t 25
IPR2014-00070 Patent 8,112,504 16 r e l y o n t h a t t y p e o f n o n-f u n c t i o n a l d e s c r i p t i v e m a t e r i a l f o r 1 p u r p o s e s o f p a t e n t a b i l i t y . 2 S o e v e n i f t h e p a t e n t d i d n ' t d e s c r i b e e p i s o d e s 3 e x a c t l y i n t h e s a m e w a y t h a t C N N d e s c r i b e s e p i s o d e s , i t s t i l l 4 w o u l d n ' t b e a b l e t o d e f e n d t h e ' 5 0 4 p a t e n t . 5 J U D G E W A R D : L e t m e m a k e s u r e I u n d e r s t a n d y o u 6 p e r f e c t l y , t h o u g h , Mr . B r o w n . Y o u d o a g r e e , P e t i t i o n e r d o e s 7 a g r e e t h a t t h e t e r m " e p i s o d e " a s u s e d i n c l a i m 3 1 r e q u i r e s a 8 c e r t a i n a m o u n t o f r e l a t i o n b e t w e e n s e g m e n t s ; i s t h a t c o r r e c t ? 9 M R . B R O W N : T h a t i s c o r r e c t . T h e B o a r d ' s 10 d e f i n i t i o n , w e b e l i e v e i s c o r r e c t . I t i s b a s e d o n t h e d i s c l o s u r e . 11 S o I h a v e p u t u p s l i d e 2 3 . T h e d e f i n i t i o n t h a t w e p r o p o s e d a n d 12 t h e B o a r d a d o p t e d i n t h e I n s t i t u t i o n d e c i s i o n w a s " a p r o g r a m 13 s e g m e n t , r e p r e s e n t e d b y o n e o r m o r e m e d i a f i l e s , w h i c h i s p a r t 14 o f a s e r i e s o f r e l a t e d s e g m e n t s . " 15 A n d t h a t i s b a s e d d i r e c t l y o n t h e l a n g u a g e o f t h e 16 p a t e n t a s c i t e d i n t h e I n s t i t u t i o n d e c i s i o n , c o l u m n 1 9 , 3 5 t o 4 2 . 17 I f t h e r e a r e -- I w i l l n o w t u r n b r i e f l y t o t h e C B C 18 r e f e r e n c e . 19 T h e C B C P a t r i c k r e f e r e n c e i s a r e f e r e n c e t h a t 20 d e s c r i b e s a p r o g r a m t h a t d i g i t i z e d r a d i o s h o w s f r o m t h e 21 C a n a d i a n B r o a d c a s t i n g C o r p o r a t i o n a n d d i s t r i b u t e d t h e m o v e r 22 t h e I n t e r n e t t h r o u g h F T P a n d t h r o u g h t h e W o r l d W i d e W e b . 23 L e t m e g o t o s l i d e 2 6 . 24
IPR2014-00070 Patent 8,112,504 17 A n d t h e s i t u a t i o n w i t h t h i s r e f e r e n c e i s v e r y s i m i l a r 1 t o t h e C N N r e f e r e n c e . T h e p r i m a r y a r g u m e nt t h a t P e r s o n a l 2 A u d i o m a d e a g a i n s t P a t r i c k C B C r e f e r e n c e s e e m s t o b e t h a t 3 b e c a u s e t h e r e i s n o a c t u a l p i c t u r e i n t h e r e f e r e n c e o f t h e t a b l e 4 o f c o n t e n t s p a g e f o r a r a d i o s h o w , a n d w e f o c u s e d i n o u r p a p e r s 5 o n t h e Q u i r k s & Q u a r k s r a d i o s h o w t h a t w a s b r o a d c a s t , t h a t 6 b e c a u s e t h e r e i s n o p i c t u r e i n t h e r e f e r e n c e o f t h e w e b p a g e f o r 7 t h a t r a d i o s h o w , t h a t t h e w e b p a g e m i g h t n o t b e t h e r e , t h a t t h e 8 w e b p a g e m i g h t n o t h a v e a U R L , t h a t i t m i g h t n o t b e w h a t i s 9 r e q u i r e d t o a n t i c i p a t e t h e c l a i m . 10 H o w e v e r , a g a i n , P e r s o n a l A u d i o ' s e x p e r t d i d n o t 11 s u p p o r t t h a t a r g u m e n t . D r . N e l s o n a d m i t t e d i n h i s d e p o s i t i o n 12 t h a t a p e r s o n o f o r d i n a r y s k i l l i n t h e a r t " w o u l d u n d e r s t a n d " 13 f r o m t h e P a t r i c k r e f e r e n c e t h a t t h e r e w a s , i n f a c t , a w e b p a g e 14 t h e r e , e v e n t h o u g h i t w a s n ' t s p e c i f i c a l l y p i c tu r e d . S p e c i f i c a l l y 15 h e a d m i t t e d -- 16 J U D G E A N D E R S O N : I s n ' t P a t r i c k u s e d i n y o u r 17 p e t i t i o n t o a s s e r t u n p a t e n t a b i l i t y b a s e d o n a n t i c i p a t i o n , t h o u g h ? 18 M R . B R O W N : Y e s , Y o u r H o n o r , i t i s . A n d t h e 19 q u e s t i o n o n a n t i c i p a t i o n i s w h e t h e r a p e r s o n o f o r d i n a r y s k i l l in 20 t h e a r t w o u l d u n d e r s t a n d f r o m t h e r e f e r e n c e t h a t e a c h e l e m e n t 21 o f t h e c l a i m w a s p r e s e n t . 22 A n d h e r e t h e f a c t t h a t t h e y d i d n ' t p u t a p i c t u r e o f 23 t h e w e b p a g e i n d o e s n ' t m e a n t h a t a p e r s o n o f o r d i n a r y s k i l l i n 24 t h e a r t s e e i n g t h e d e s c r i p t i o n o f p r o v i d i n g t he c o n t e n t t h r o u g h 25
IPR2014-00070 Patent 8,112,504 18 t h e W o r l d W i d e W e b w o u l d u n d e r s t a n d t h a t a w e b p a g e m i g h t 1 b e a b s e n t . 2 P e r s o n a l A u d i o ' s e x p e r t a d m i t t e d t h a t o n r e a d i n g 3 t h i s P a t r i c k r e f e r e n c e , t h e y w o u l d u n d e r s t a n d t h a t a w e b p a g e 4 w a s o r a s e t o f w e b p a g e s w a s p r e s e n t . 5 A n d i t i s l i k e i f y o u h a d a p a p e r w h i c h d e s c r i b e s a 6 c a r b u t d i d n ' t m e n t i o n a s t e e r i n g w h e e l , a p e r s o n o f o r d i n a r y 7 s k i l l i n t h e a r t m i g h t u n d e r s t a n d t h a t t h e c a r h a d a s t e e r i n g 8 w h e e l . 9 J U D G E W A R D : M r . B r o w n , y o u a g r e e t h a t t h e 10 r e f e r e n c e i t s e l f , P a t r i c k , d o e s n o t d i s c l o se s p e c i f i c a l l y a t a b l e 11 o f c o n t e n t s-t y p e o f w e b p a g e ? 12 M R . B R O W N : N o , I d o n ' t a g r e e w i t h t h a t . I 13 a p o l o g i z e i f I w a s u n c l e a r . I t d o e s d i s c l o s e t h a t t o a p e r s o n o f 14 o r d i n a r y s k i l l i n t h e a r t . I t d o e s n ' t c o n t a i n a p i c t u r e o f t h e w e b 15 p a g e . 16 L e t m e s h o w y o u w h a t i t d o e s d i s c l o s e . E x c u s e m e , 17 l e t m e g o b a c k . I a m n o w a t s l i d e 2 7 . A n d a t s l i d e 2 7 w e h a v e 18 a q u o t e f r o m p a g e s 2 t o 3 , w h i c h s h o w s t h a t i t w a s m a d e 19 a v a i l a b l e t h r o u g h t h e I n t e r n e t o n t h e W o r l d W i d e W e b . T h a t ' s 20 d a t a p o i n t n u m b e r 1 . 21 I t e x p l a i n s t h a t p r o g r a m s w e r e b r o k e n i n t o s e g m e n t s 22 t h a t h a d a c c o m p a n y i n g t e x t , s o u s e r s c o u l d s e l e c t t h e p a r t s o f 23 t h e p r o g r a m t h a t w e r e o f i n t e r e s t t o t h e m . T h a t ' s s l i d e 2 8 . 24
IPR2014-00070 Patent 8,112,504 19 G o i n g t o s l i d e 2 9 , I w i l l k e e p g o i n g t o s l i d e 3 0 , i t 1 e x p l a i n s -- 2 J U D G E W A R D : L e t m e a s k y o u t o g o b a c k t o t h a t 3 q u o t e t h a t y o u j u s t g a v e u s . T h i s i s d i s c l o s u r e t h a t I h a v e 4 l o o k e d a t c l o s e l y . T h e l a n g u a g e i n t h i s s e n t e n c e s a y s " t h e 5 l a r g e r p r o g r a m s w e r e b r o k e n i n t o s e g m e n t s t h a t w e r e d e s c r i b e d 6 i n a c c o m p a n y i n g t e x t . " 7 W o u l d y o u a g r e e t h a t t h e t e x t a c c o m p a n i e s t h e 8 b r o k e n s e g m e n t ? 9 M R . B R O W N : Y e s , I w o u l d . 10 J U D G E W A R D : S o i n -- 11 M R . B R O W N : T h a t ' s r e p e a t e d e l s e w h e r e i n t h e 12 r e f e r e n c e . 13 J U D G E W A R D : -- d o w n l o a d i n g t h e s e g m e n t , I 14 w o u l d r e c e i v e t h e a c c o m p a n y i n g t e x t ? 15 M R . B R O W N : I t h i n k -- I t h i n k n o t . I t h i n k w h a t 16 t h a t s e n t e n c e s a y s i s -- k e e p i n m i n d , t h i s i s 1 9 9 6 , w h e n 17 b a n d w i d t h w a s n o t a s g o o d a s i t i s t o d a y . A n d w h e n p e o p l e 18 w e r e t h i n k i n g a b o u t d o w n l o a d i n g a n a u d i o f i l e a n d t h e y w a n t e d 19 t o m a k e s u r e t h e y w e r e o n l y d o w n l o a d i n g t h e p a r t s o f t h e a u d i o 20 f i l e s t h a t w e r e o f i n t e r e s t t o t h e m , s o t h e y w a n t e d t o b e a b l e t o 21 l o o k a t t h e t e x t a n d k n o w w h a t t h e y w e r e g e t t i n g b e f o r e t h e y 22 d o w n l o a d e d i t . 23
IPR2014-00070 Patent 8,112,504 20 S o w h a t t h i s s e n t e n c e s a y s t o a p e r s o n o f o r d i n a r y 1 s k i l l i n t h e a r t i s : Y o u n e e d t o r e a d t h e t e x t s o y o u k n o w w h a t 2 y o u a r e g e t t i n g b e f o r e y o u c l i c k o n t h e l i n k a n d g e t i t . 3 S o f o r -- t h e r e i s -- a n d , a s I h a v e s a i d , t h a t i s 4 r e p e a t e d l a t e r o n . F o r e x a m p l e h e r e , n o w o n s l i d e 2 0 -- e x c u s e 5 m e , 3 0 , w e ' r e s p e c i f i c a l l y d e s c r i b i n g Q u i r k s & Q u a r k s . I t 6 p o i n t s o u t t ha t y o u c a n s e l e c t p o r t i o n s o f t h e s h o w t h a t w e r e o f 7 i n t e r e s t t o y o u a n d d o w n l o a d t h e m . 8 A n d t h e n t h e n e x t s l i d e , s l i d e 3 1 , " e a c h s h o w h a s a 9 m e n u a t t a c h e d t o i t t o d e s c r i b e t h e c o n t e n t s o f t h e v a r i o u s 10 p a r t s . " 11 S o w h a t i s d i s c l o s e d h e r e ? W h a t i s d i s c l o s e d i s t h a t 12 t h e r e i s t h e Q u i r k s & Q u a r k s s h o w . I w a n t t o g o b a c k o n e s l i d e 13 t o s l i d e 3 0 . T h e r e i s a Q u i r k s & Q u a r k s s h o w , w h i c h i s 14 r e g u l a r l y u p d a t e d o n t h e s e r v e r . W e k n o w f r o m t h e n e x t s l i d e , 15 s l i d e 3 1 , i t h a s a m e n u . W e k n o w f r o m t h a t d e s c r i p t i o n a n d 16 h e r e t h a t i t d e s c r i b e s t h e c o n t e n t s o f e a c h o f t h e s e g m e n t s o f 17 t h a t Q u i r k s & Q u a r k s s h o w i n e n o u g h d e t a i l t h a t y o u c a n p i c k 18 o u t t h e p a r t i c u l a r s e g m e n t s t h a t y o u w a n t t o d o w n l o a d a n d t h e n 19 d o w n l o a d t h e m . 20 W h a t i t d o e s n ' t s a y s p e c i f i c a l l y i s h e r e i s a p i c t u r e 21 of w h a t t h i s l o o k s l i k e w h e n y o u g o t o t h a t s i t e o n t h e W o r l d 22 W i d e W e b . I t t e l l s y o u t h a t i t i s o n t h e W o r l d W i d e W e b , a n d 23 i t t e l l s y o u t h a t t h i s i s w h a t i s -- t h e i n f o r m a t i o n t h a t i s 24 a v a i l a b l e t o y o u . 25
IPR2014-00070 Patent 8,112,504 21 A n d b a s e d o n t h a t d i s c l o s u r e , P e r s o n a l A u d i o ' s 1 e x p e r t -- a n d I w i l l r e a d i t t o y o u -- a c k n o w l e d g e d t h a t t h e r e 2 m u s t -- e x c u s e m e , t h a t a p e r s o n o f o r d i n a r y s k i l l i n t h e a r t 3 w o u l d u n d e r s t a n d , " w o u l d u n d e r s t a n d f r o m t h e a r t i c l e " t h a t 4 t h e r e w a s a w e b p a g e o r a s e t o f w e b p a g e s t h a t p r o v i d e d t h i s 5 i n f o r m a t i o n . A nd t h a t ' s -- t h e c i t e f o r t h a t i s 1 1 9 : 6 t h r o u g h 1 2 3 6 o f t h e N e l s o n d e p o s i t i o n . 7 J U D G E W A R D : M r . B r o w n , t h a t i s t h e e n d o f y o u r 8 2 0 m i n u t e s . Y o u a r e n o w g o i n g i n t o y o u r r e b u t t a l t i m e . Y o u 9 m a y c o n t i n u e , i f y o u w i s h . 10 M R . B R O W N : T h a n k y o u . 11 M R . F E M A L : M ay i t p l e a s e t h e C o u r t , i f w e c o u l d 12 h a n d u p , s i n c e t h e r e i s n o E L M O . 13 J U D G E W A R D : Y e s , y o u m a y , M r . F e m a l . 14 M R . F E M A L : T h a n k y o u , Y o u r H o n o r . 15 J U D G E W A R D : A r e t h e s e t h e s a m e a s p r o v i d e d t o 16 t h e B o a r d ? 17 M R . F E M A L : T h e e x a c t s a m e , a n d p r o v i d e d t o b o t h 18 c o u n s e l h e r e f o r t h e P e t i t i o n e r . 19 J U D G E W A R D : T h a n k y o u . 20 M R . F E M A L : M a y i t p l e a s e t h e C o u r t , f i r s t o f a l l , 21 t o b e g i n w i t h , a q u e s t i o n n o t r e a l l y a n s w e r e d t o J u d g e W a r d , 22 t h e c o m p i l a t i o n f i l e d o e s h a v e a l l e p i s o d e s l i s t e d . I t i s a s i n g l e 23 f i l e . I t i s q ui t e c l e a r f r o m t h e p a t e n t a p p l i c a t i o n a s i t i s d e f i n e d 24 t h a t i t i s . 25
IPR2014-00070 Patent 8,112,504 22 A n d t h e P e t i t i o n e r , d u r i n g t h e d e p o s i t i o n o f M r . 1 N e l s o n , a s k e d q u e s t i o n s a b o u t t h e s e g m e n t . T h e s e g m e n t s t a r t s 2 a t c o l u m n 2 9 o f t h e p a t e n t a n d r e f e r s t o n e w s a n d o t h e r t h i n g s 3 t h a t m a y b e i n a c o m p i l a t i o n f i l e , b u t t h e l a s t r e f e r e n c e t o 4 e p i s o d e s t o p s a t c o l u m n 2 1 a t t h e t o p . 5 A n d s o t h e r e i s d e f i n i t e l y a d e m a r c a t i o n b e t w e e n 6 e p i s o d e s a n d s e g m e n t s . A n d c l a i m s m e a n s o m e t h i n g . A n d i n 7 t h e s e t w o r e f e r e n c e s c i t e d h e r e , t h e C B C P a t r i c k r e f e r e n c e 8 h a r d l y h a s a n y o f t h e c l a i m e d e l e m e n t s r e q u i r e d t o i n v a l i d a t e 9 t h e c l a i m o r t o a n t i c i p a t e t h e c l a i m . 10 J U D G E W A R D : M r . F e m a l , b e f o r e y o u l e a v e t h e 11 p o i n t , I w a n t t o a s k y o u a b o u t e p i s o d e a n d s e g m e n t . 12 M R . F E M A L : Y e s . 13 J U D G E W A R D : C a n y o u d e s c r i b e f o r m e t h e 14 d i f f e r e n c e b e t w e e n a n e p i s o d e a n d a s e g m e n t ? 15 M R . F E M A L : A n e p i s o d e t o m e i s v e r y c l e a r . I f 16 s o m e t h i n g i s r e l a t e d t o o n e a n o t h e r , t h a t w o u l d b e a n e p i s o d e , 17 s u c h a s , l e t ' s s a y , c u r r e n t l y S e i n f e l d , a b u n c h o f e p i s o d e s a r e 18 a l l r e l a t e d t o o n e a n o t h e r . 19 O n t h e o t h e r h a n d , o n t h e s e g m e n t s s h o w n i n t h e 20 C N N / C o m p t o n a r t i c l e , y o u h a v e u n r e l a t e d m a t t e r . 21 A n d a s t h e C o u r t i n t h e c o n s t r u c t i o n o f t h e c l a i m 22 s a i d , r e l a t e d . T h e r e i s n o t h i n g r e l a t e d b e t w e e n , a s w e p u t i n 23 o u r b r i e f , J u p i t e r a n d g e n e t i c v e g e t a b l e s . A t b e s t -- 24
IPR2014-00070 Patent 8,112,504 23 J U D G E W A R D : M r . F e m a l , u n d e r y o u r 1 c o n s t r u c t i o n t h e n , " r e l a t i o n " w o u l d r e q u i r e w h a t ? H o w s h o u l d 2 w e c o n s t r u e r e l a t i o n , t h e m a t i c a l l y r e l a t e d ? 3 M R . F E M A L : Y o u r H o n o r , I w o u l d s a y t h a t i t i s 4 t h e m a t i c a l l y r e l a t e d , t h a t , i n o t h e r w o r d s , t h a t t h e ep i s o d e s a r e 5 r e l a t e d t o o n e a n o t h e r w i t h a c o m m o n t h e m e . A n d c l e a r l y i t i s 6 n o t i n t h e C B C r a d i o o r i n t h e C o m p t o n . 7 J U D G E W A R D : W o u l d y o u c o n s i d e r o n e s e g m e n t 8 p e r t a i n i n g t o w o r l d n e w s a n d o n e s e g m e n t p e r t a i n i n g t o l o c a l 9 n e w s t o b e r e l a t e d , t h e y h a v e a c om m o n t h e m e o f n e w s ? 10 M R . F E M A L : W e l l , I w o u l d s a y t h a t t h o s e a r e j u s t 11 s e g m e n t s , Y o u r H o n o r , n o t e p i s o d e s . T h e y a r e j u s t -- a n 12 e p i s o d e i s a c o m p l e t e t h i n g o f t h e s a m e t h e m e , a s d e f i n e d i n 13 c o l u m n s 1 t h r o u g h 2 9 o r 2 1 o f t h e p a t e n t . A n d w h e n y o u g e t t o 14 c o lu m n 2 9 , i t s t a r t s t a l k i n g a b o u t s e g m e n t s . 15 J U D G E W A R D : A g a i n , t h e p a n e l , t h e r e i s 16 d i f f i c u l t y i n a t t e m p t i n g t o d e t e r m i n e t h e p r o p e r b o u n d a r y f o r 17 t e r m s l i k e t h i s . G i v e m e t h e p r o p e r b o u n d a r y t h a t y o u w o u l d 18 p r o p o s e t o t h e p a n e l f o r " t h e m e . " H o w d o I d e f i ne w h a t i s 19 w i t h i n a t h e m e a n d o u t s i d e o f a t h e m e ? 20 M R . F E M A L : O k a y . W e l l , I w o u l d s a y i n a t h e m e , 21 l e t ' s s a y y o u h a v e a s e g m e n t -- o r n o t a s e g m e n t -- b u t a n 22 e p i s o d e o f H o u s e o f C a r d s . I t i s a l l a b o u t t h e C o n g r e s s i o n a l 23 W h i p o r H e a d o f t h e H o u s e , H o u s e S pe a k e r , a n d e v e r y s e g m e n t 24 o r e v e r y e p i s o d e a f t e r t h a t i s r e l a t e d t o t h a t s a m e t h e m e . T h e y 25
IPR2014-00070 Patent 8,112,504 24 a r e g o i n g t h r o u g h t h e l i f e o f t h e S p e a k e r o f t h e H o u s e . T h a t 1 w o u l d b e e p i s o d i c . T h a t w o u l d b e e p i s o d e s . 2 I f y o u h a v e n e w s p r o g r a m s , e a c h d a y t h e y a r e 3 u p d a t e d , t h e y a r e p u t a w a y . H o w a r e t h e y r e l a t e d ? Y e s t e r d a y ' s 4 n e w s i s j u s t t h a t , y e s t e r d a y ' s n e w s . S e l d o m d o t h e y e v e r g o 5 b a c k t o i t . A n d , i n f a c t , i n t h e C N N a r t i c l e , a s w e l l a s e v e n i n 6 t h e r a d i o , b e c a u s e o f l i m i t a t i o n s o f s p a c e a t t h i s t i m e , t h e y j u s t 7 t o o k t h e m of f t h e a r c h i v e . 8 J U D G E W A R D : S o u n d e r y o u r d e f i n i t i o n a r e y o u 9 t e l l i n g m e t h a t t h e r e n e e d s t o b e s o m e l e v e l o f c o n s i s t e n c y i n 10 c h a r a c t e r o r p l o t ? 11 M R . F E M A L : T h e r e h a s t o b e s o m e c o n s i s t e n c y . I t 12 c a n ' t b e u n r e l a t e d . 13 J U D G E W A R D : W e l l , C N N u s e s t h e s a m e a n c h o r 14 f o r t h e i r n e w s p r o g r a m . I s t h a t e n o u g h t h e m e c o n s i s t e n c y ? 15 M R . F E M A L : T o h a v e t h e s a m e p e r s o n d o t h e 16 n e w s ? I d o n ' t t h i n k s o . P e o p l e a r e n o t p a r t i c u l a r l y a f t e r a 17 p e r s o n t h a t d o e s i t . I t i s -- i t i s -- n e w s i s d i f f e r e n t e v e r y d a y . 18 T h o s e a r e g o in g t o b e d i f f e r e n t , y o u k n o w , s e g m e n t s . T h e y a r e 19 n o t g o i n g t o b e r e l a t e d . 20 O n e m a y -- 21 J U D G E A N D E R S O N : S o , c o u n s e l -- 22 M R . F E M A L : Y e s . 23 J U D G E A N D E R S O N : C o u n s e l , s o I a m g o i n g t o g o 24 b a c k t o w h a t I a s k e d P e t i t i o n e r ' s c o u n s e l l o r . I s t h e s e r i e s o f 25
IPR2014-00070 Patent 8,112,504 25 e p i s od e s t h e h o o k o n w h i c h y o u w o u l d s a y i n p a r t t h a t 1 e v e r y t h i n g -- t h a t t h e e p i s o d e s m u s t b e r e l a t e d ? 2 M R . F E M A L : I w o u l d s a y y e s , Y o u r H o n o r . 3 J U D G E A N D E R S O N : I s t h a t a y e s ? 4 M R . F E M A L : Y e s . 5 J U D G E A N D E R S O N : O k a y . S o i n t h e 6 s p e c i f i c a t i o n , I a m l o o k i ng a t t h e ' 5 0 4 p a t e n t , c o l u m n 1 9 , 7 b e g i n n i n g a t l i n e 3 5 , i t s a y s t h a t " p r o g r a m m i n g m a y i n c l u d e 8 s e r i a l i z e d s e q u e n c e s o f p r o g r a m s , a g i v e n p r o g r a m s e g m e n t 9 m a y r e p r e s e n t a n e p i s o d e i n a s e r i e s , w h i c h i s s e l e c t e d a s a 10 g r o u p b y t h e s u b s c r i b e r o r " -- a n d i t g o e s on . 11 S o i s n ' t a s e r i e s o f e p i s o d e s s i m p l y s o m e t h i n g t h a t 12 i s s e l e c t e d b y t h e p e r s o n w h o i s m a k i n g t h e c o m p i l a t i o n ? 13 M R . F E M A L : T h e p e r s o n s e l e c t i n g t h e 14 c o m p i l a t i o n , i f y o u a r e g o i n g o f f a n e p i s o d e , i t w o u l d b e a n 15 e p i s o d e o f S e i n f e l d , a n e p i s o d e o f H o u s e of C a r d s , y o u 16 w o u l d n ' t n e c e s s a r i l y g o H o u s e o f C a r d s a n d t h e n t h r o w i n 17 s o m e t h i n g a b o u t c o o k i n g . T h a t w o u l d n ' t b e r e l a t e d . 18 J U D G E A N D E R S O N : W h a t i f I a m i n t e r e s t e d i n 19 b o t h t h o s e s u b j e c t s a n d I d e c i d e a s t h e p e r s o n t h a t i s g o i n g t o 20 m a k e t h i s a v a i l a b l e t o ma k e t h a t m y s e r i e s o f p r o g r a m s , s e r i e s 21 o f e p i s o d e s ? 22 M R . F E M A L : T h o s e a r e n ' t -- 23 J U D G E A N D E R S O N : I s t h a t n o t p r e c l u d e d ? 24
IPR2014-00070 Patent 8,112,504 26 M R . F E M A L : T h o s e a r e n ' t e p i s o d e s , t h o s e a r e 1 s e g m e n t s . A n d y o u m a y h a v e a t o p i c l i k e i n t h e C N N a r t i c l e , 2 s c h o o l , a n d y o u h a v e a b un c h o f u n r e l a t e d t h i n g s a b o u t s c h o o l . 3 O n e m a y b e a b o u t t h e B o a r d o f E d u c a t i o n , a l e g a l m a t t e r . O n e 4 m a y b e a b o u t b u i l d i n g a s c h o o l . 5 J U D G E A N D E R S O N : O k a y . S o l e t m e g e t b a c k t o 6 m y q u e s t i o n . I f s o m e t h i n g i s s e l e c t e d a s a g r o u p b y t h e 7 s u b s c r i b e r , i s t h at n o t a s e r i e s ? I t d o e s n ' t s a y t h a t i t h a s t o b e 8 r e l a t e d . I t j u s t s a y s i t i s s e l e c t e d a s a g r o u p . 9 M R . F E M A L : W e l l , y e s , i f h e s e l e c t s a g r o u p o f 10 c o n s t r u c t i o n t h i n g s , t h a t m a y b e h i s i d e a o f a s e r i e s o f 11 s e g m e n t s . 12 J U D G E A N D E R S O N : S o i s i t t h a t -- is i t t h a t 13 f l e x i b l e , w h a t e v e r t h e s u b s c r i b e r d e c i d e s , i s a s e r i e s o f 14 e p i s o d e s ? 15 M R . F E M A L : I d o n ' t t h i n k i t i s n e c e s s a r i l y u p t o 16 t h e p a r t y t o d e t e r m i n e w h e t h e r h e i s d o i n g a n e p i s o d e o r i f h e i s 17 d o i n g s e g m e n t s . I t h i n k i f h e i s d o i n g s e g m e n t s , s i m p l y s t a r t a t 18 c o l u m n 2 9 i n t h e p a t e n t a n d m o v e f o r w a r d a n d i t d e s c r i b e s 19 s e g m e n t s . 20 Y o u c a n d o w n l o a d n e w s t h i n g s . Y o u c a n d o w n l o a d 21 t h i n g s a b o u t a n i m a l s , a n y t h i n g y o u w a n t . P u t i t i n a g r o u p i f 22 y o u w a n t . T h e r e i s t h a t f l e x i b i l i t y . C l a i m 3 1 d e a l s s p e c i f i c a l l y 23 with e p i s o d e s . 24
IPR2014-00070 Patent 8,112,504 27 A n d t h e n t u r n i n g t o t h e a r g u m e n t s t h a t P e t i t i o n e r 1 m a d e a b o u t t h e e x p e r t i n t h e c a s e , t h e e x p e r t a f t e r e a c h o n e o f 2 t h e s e s e r i e s o f q u e s t i o n s , y o u c a n r e a d t h e t r a n s c r i p t , i s n o t 3 c h a n g i n g h i s t e s t i m o n y . 4 A n d w h a t t h e P e t i t i o n e r c l e v e r l y d i d i s a s k 5 q u e s t i o n s a b o u t s e g m e n t s . B e c a u s e i f y o u l o o k a t t h e 6 r e f e r e n c e , h e i s t a l k i n g a b o u t c o l u m n 2 9 . H e i s o f f o n 7 s e g m e n t s . H e i s n o t t a l k i n g a b o u t e p i s o d e s . H e w a s v e r y 8 c a r e f u l n o t t o m e n t i o n t h e w o r d e p i s o d e s w h e n a s k i n g h i m 9 t h o s e q u e s t i o n s . 10 S o h e w en t o f f o n a t a n g e n t . A n d h e a s k e d 11 q u e s t i o n s a n d I t h i n k M r . N e l s o n a n s w e r e d t r u t h f u l l y . I 12 o b j e c t e d w h e n h e t r i e d t o s a y t h a t s o m e h o w t h i s i s 13 p r e d e t e r m i n e d , e p i s o d e s a t a n U R L , t h i n g s l i k e t h a t , t h e r e i s 14 o b j e c t i o n s i n t h e t r a n s c r i p t . B u t v e r y c l e v e r , w e nt o f f o n t o 15 s e g m e n t s , a n d s e g m e n t s a r e m e n t i o n e d i n t h e p a t e n t . T h e r e i s 16 n o q u e s t i o n a b o u t i t . I f s o m e o n e w a n t s t o p u t s e g m e n t s i n 17 t h e r e , t h e y a r e m o r e t h a n f r e e t o d o s o . A n d t h a t g o e s f o r e a c h 18 o n e o f h i s c i t e s . 19 M r . N e l s o n , a f t e r e a c h o n e , M r . N e l s o n a n s w e r s 20 t r u t h f u l l y w h a t , y o u k n o w , i s h y p o t h e t i c a l . A n d , i n f a c t , t h e 21 P e t i t i o n e r w e n t o f f o n a s k i n g M r . N e l s o n w h e n h e w a n t e d t o 22 d r i v e t h e p o i n t h o m e o n p r e d e t e r m i n e d U R L , w h e t h e r o r n o t 23 h y p o t h e t i c a l l y i f I h a d a n a l g o r i t h m t h a t a l l o w e d y o u t o d o t h a t . 24 A n d M r . N e l s o n s a i d : W h a t a l g o r i t h m ? 25
IPR2014-00070 Patent 8,112,504 28 A n d t h a t ' s t h e p r o b l e m w i t h b o t h o f t h e s e 1 r e f e r e n c e s . T h e y l a c k s t r u c t u r e . T h e y l a c k d i a g r a m s . A n d 2 w h e n a s k e d t h e q u e s t i o n o f t h e i r e x p e r t , i s a n U R L r e f e r r e d t o 3 i n t h e a r t i c l e , P a t r i c k C B C r a d i o , i n a m o m e n t o f cl a r i t y a n d 4 h o n e s t y , M r . S c h m a n d t s a i d t h e r e i s n o r e f e r e n c e t o a n U R L . 5 S o w h a t t h e P e t i t i o n e r i s t r y i n g t o d o w i t h b o t h o f 6 t h e s e a r t i c l e s i s f i l l i n a n i n h e r e n c y a r g u m e n t , m u s t b e 7 i n h e r e n c y b e c a u s e i t i s n o t s h o w n i n s t r u c t u r e . A n d t o f i l l i n 8 w h a t t h e y c l a i m i s a o r d i n a r y p e r s o n s k i l l e d i n t h e a r t , M r . 9 S c h m a n d t t a k e s t h e p o s i t i o n , h e i s a p r o f e s s o r a t M I T t h a t w a s 10 s t e e p e d i n t h e t h i n g , a n d h e r e y o u h a v e i n v e n t o r s t h a t d o n ' t 11 e v e n h a v e a f o r m a l e d u c a t i o n , c a m e u p w i t h t h e i d e a b e c a u s e 12 p e o p l e , o r d i n a r y p e o pl e w o r k e d i n t h i s a r e a a n d t h e y d i d n ' t 13 h a v e a d v a n c e d d e g r e e s . 14 A n d t h i s i s t h e b e g i n n i n g o f t h e I n t e r n e t . A n d s o m e 15 o f t h e r e c e n t t h i n g s t h a t c a m e o n l i n e , N e t s c a p e i n t h e 16 e a r l y-to-m i d ' 9 0 s a f f e c t e d b y m a r k e d e n t r i e s i n t h e f o u n d e r , i n 17 o n e o f t h e f o u n d e r s. A n d E x p l o r e r d i d n ' t c o m e a l o n g u n t i l 18 W i n d o w s 9 5 . A n d t h e n i t w a s j u s t o n e o r t w o p e r c e n t o f t h e 19 I n t e r n e t . 20 A n d s o m e o f t h o s e s t i l l h a d t h e b l u e s c r e e n o f d e a t h 21 w h e n y o u t r i e d t o p u t i n a n a d d r e s s a n d g e t s o m e w h e r e . 22 B e c a u s e I c e r t a i n l y r e m e m b e r t h a t . I g o b a c k f a r e n o u g h t h a t I 23 r e m e m b e r t h e b l u e s c r e e n o f d e a t h a n d a l o t o f t h o s e . 24
IPR2014-00070 Patent 8,112,504 29 J U D G E W A R D : M r . F e m a l , d o y o u h a v e a p r o p o s a l 1 a s t o t h e p e r s o n o f o r d i n a r y s k i l l i n t h e a r t w i t h r e s p e c t t o t h i s 2 c l a i m ? 3 M R . F E M A L : Y e s , w e d o . A n d i t i s t h e d e f i n i t i on 4 t h a t w a s p u t i n b y o u r e x p e r t , M r . N e l s o n . H e i s a p e r s o n w i t h 5 a c o u p l e y e a r s e x p e r i e n c e w o r k i n g i n t h e f i e l d , m a y b e h a v i n g a 6 c o m p u t e r -- 7 J U D G E W A R D : W o r k i n g i n w h a t f i e l d , M r . F e m a l ? 8 M R . F E M A L : W o r k i n g j u s t w i t h t h e I n t e r n e t , 9 p l a y i n g a r o u n d w i t h it , a n d a l s o m i g h t h a v e a l i t t l e b i t o f 10 c o m p u t e r s c i e n c e b a c k g r o u n d , m a y . B u t i t i s n o t a h i g h l e v e l i n 11 ' 9 5 o r ' 9 6 . 12 J U D G E A N D E R S O N : S o , c o u n s e l , w i t h r e s p e c t t o 13 t h e C N N a r g u m e n t , g r o u n d , s o t h a t ' s a n o b v i o u s n e s s c h a l l e n g e . 14 W h a t d o e s y o u r e x p e r t s a y -- a n d I l o o k e d a l i t t l e b i t -- but 15 d o e s h e s a y a n y t h i n g t o s u g g e s t t h a t w e c o u l d g o l o o k a t t h a t 16 s a y s t h a t t h e c o m p u t e r -- t h a t t h e -- s o m e o f t h e h a r d w a r e , t h e 17 d a t a s t o r a g e s e r v e r s , c o m m u n i c a t i o n s i n t e r f a c e s , p r o c e s s o r s , 18 t h a t t h o s e a r e n o t p r e s e n t o r w o u l d n o t b e u n d e r s t o o d t o b e 19 p r e s e n t b y a p e r s o n o f o r d i n a r y s k i l l i n t h e a r t w i t h r e s p e c t t o 20 t h e C N N r e f e r e n c e ? 21 M R . F E M A L : W i t h a l l d u e r e s p e c t , i n t h e C N N 22 r e f e r e n c e , y o u h a v e a d i g i t a l , a u d i o , v i d e o , a n d d i s t r i b u t i o n 23 s y s t e m t h a t u t i l i z e s a s i g n a l c a p t u r e co m p r e s s i o n . T h e r e i s 24
IPR2014-00070 Patent 8,112,504 30 e n c o d i n g , i f y o u l o o k a t t h e f r o n t e n d o f t h e d i a g r a m , w h i c h 1 t h e y d o n ' t s h o w t h e e n t i r e t h i n g . 2 T h i s i s a v e r y a d v a n c e d t h i n g w h e r e y o u t r y i n g t o 3 t a k e a n a l o g v i d e o , w h i c h i s a v e r y h u g e f i l e , c o n v e r t i t t o a 4 d i g i t a l f i l e , r e q u i r i n g ex t e n s i v e t h i n g s n o t r e a l l y u s e d b y t h e 5 o r d i n a r y p e r s o n s k i l l e d i n t h e a r t a t t h e t i m e . Y o u a r e t a l k i n g 6 s a t e l l i t e . Y o u a r e t a l k i n g e n c o d i n g . Y o u a r e t a l k i n g m a s s i v e 7 f i l e s . 8 I t h i n k i n t h e a r t i c l e , C N N a r t i c l e m e n t i o n s 2 7 9 t e r a b y t e s f o r a n e x a m p l e o f t r y in g t o s t o r e a f e w v i d e o f i l e s . 10 A n d t h e v i d e o f i l e s -- 11 J U D G E A N D E R S O N : B u t m y q u e s t i o n , m y 12 q u e s t i o n i s M r . S c h m a n d t s e e m s t o s a y t h a t t h e h a r d w a r e i s 13 t h e r e . Y o u d o n ' t s e e m t o a r g u e i n y o u r b r i e f t h a t t h e h a r d w a r e 14 i s n ' t . A n d s o t h i s i s y o u r o p p o r t u n i t y t o t e l l u s t h a t i t i s n ' t . 15 A n d I g a t h e r y o u a r e s a y i n g t h a t r i g h t n o w . 16 M y q u e s t i o n i s d o e s y o u r e x p e r t s u p p o r t t h a t 17 position? 18 M R . F E M A L : T h e e x p e r t i n h i s e x p e r t r e p o r t d o e s , 19 d o e s s u p p o r t t h a t t h e e l e m e n t s o f t h e c l a i m s a r e n o t t h e r e , c l a i m 20 3 1 . E s s e nt i a l l y y o u d o n ' t h a v e a c o m p i l a t i o n f i l e . Y o u d o n ' t 21 h a v e a n u p d a t i n g o f a s i n g l e f i l e t h a t h a s a l l t h e e p i s o d e s i n i t . 22 T h e C N N i s q u i t e c l e a r t h a t e a c h d a y y o u h a v e a 23 b r a n d n e w -- i f t h e y w a n t t o c a l l t h a t a c o m p i l a t i o n f i l e -- t h e y 24 h a v e a b r a n d n e w c o nt e n t s f i l e u n r e l a t e d t o t h e o t h e r d a y s . 25
IPR2014-00070 Patent 8,112,504 31 E a c h d a y i s a b r a n d n e w d a y i n t h e C N N . A n d a s f a r a s 1 h a r d w a r e g o e s -- 2 J U D G E W A R D : H o w d o y o u r e s p o n d t o t h e 3 P e t i t i o n e r ' s a r g u m e n t w i t h r e s p e c t t o t h a t u p d a t e d c o m p i l a t i o n 4 f i l e , t h a t i t c a n b e u p d a t e d i n t h e s e n se t h a t t h e d a t a c h a n g e s , a s 5 l o n g a s i t i s t h e c o m p i l a t i o n f i l e ? 6 M R . F E M A L : T h e r e i s n o c o m p i l a t i o n f i l e i n C N N , 7 z e r o . 8 J U D G E W A R D : Y o u d o n ' t a g r e e t h a t c o n t e n t s . h t m l 9 i s a c o m p i l a t i o n f i l e ? 10 M R . F E M A L : A b s o l u t e l y n o t . A n d , m o r e o v e r , t o 11 e v e n g e t t o t he f i n a l t h i n g , y o u a r e t a l k i n g h a r d w a r e n o w , t h a t 12 d i a g r a m s h o w i n g t h e c o n t e n t s f i l e , i f y o u g o d o w n t h e r o w 13 t h e r e , t h e r e i s a f i l e a f t e r t h e c o n t e n t s . I f y o u f o l l o w t h e l i n e 14 d o w n t o w h e r e i t i s g o i n g t o b e d i s t r i b u t e d o u t , t a l k i n g a b o u t 15 t h e m s h o o t i n g t h e ms e l v e s i n t h e f o o t , y o u h a v e a m e r g e T C . C 16 f i l e . W h a t i n t h e h e c k i s t h a t ? 17 S p e c i a l s o f t w a r e t o t r y t o g e t y o u t o a p o i n t w h e r e 18 y o u c a n d i s t r i b u t e t h e c o n t e n t . I h a v e n o i d e a w h a t t h a t i s . I t 19 i s n o t e x p l a i n e d i n t h e C N N a r t i c l e . 20 I n f a c t , t h e a r t i c l e i s re p l e t e w i t h t a l k i n g a b o u t 21 s p e c i a l i z e d s o f t w a r e , s p e c i a l i z e d s t r u c t u r e t o g e t t o y o u r v i d e o 22 t h a t i s b r o a d c a s t o u t t o a w e b . 23 J U D G E W A R D : B u t d o e s c l a i m 3 1 p r o h i b i t t h e u s e 24 o f s u c h s o f t w a r e o r h a r d w a r e ? 25
IPR2014-00070 Patent 8,112,504 32 M R . F E M A L : C l a i m 3 1 h a s n o t h i n g t o d o w i t h 1 e n c o d i n g v i d e o f r o m w h a t I c a n s e e f r o m a s a t e l l i t e a n d h a v i n g 2 s p e c i a l p r o x y s e r v e r s o n t h e p l a y e r e n d . 3 J U D G E W A R D : B u t y o u w o u l d a g r e e t h a t a s l o n g 4 a s I m e e t t h e e l e m e n t s o f c l a i m 3 1 , a n d m a y i n a d d i t i o n e n c o d e 5 v i d e o o r d o o t h e r t h i n g s -- 6 M R . F E M A L : I f y o u m ee t a l l t h e e l e m e n t s o f c l a i m 7 3 1 , o b v i o u s l y y o u w o u l d h a v e i t , b u t t h e r e i s n o m e e t i n g o f t h e 8 c l a i m l a n g u a g e . I t i s j u s t s i m p l y n o t t h e r e . 9 J U D G E A N D E R S O N : D o y o u h a v e a d i s p u t e a t t h i s 10 t i m e w i t h t h e c o n s t r u c t i o n w e g a v e t o c o m p i l a t i o n f i l e i n t h e 11 d e c i s io n i n s t i t u t e d , t h a t b e i n g t h a t s i m p l y a c o m p i l a t i o n f i l e i s 12 a f i l e t h a t c o n t a i n s e p i s o d e i n f o r m a t i o n ? 13 M R . F E M A L : Y e s , e p i s o d e i n f o r m a t i o n . 14 J U D G E A N D E R S O N : Y o u d o n ' t t h i n k t h a t s h o u l d 15 b e p a r t o f t h e c o n s t r u c t i o n ? 16 M R . F E M A L : Y o u k n o w , t h e c o m p i l a t i on f i l e 17 w o u l d c o n t a i n e p i s o d e i n f o r m a t i o n . H e r e w i t h e i t h e r t h e C N N 18 o r C B C r e f e r e n c e s , t h e r e i s n o c o m p i l a t i o n f i l e . A l s o y o u w i l l 19 n o t f i n d t h e w o r d " u p d a t i n g , " b e c a u s e i t i s n o t u p d a t e d . O n c e i t 20 i s f i x e d , i t i s a f f i x e d . T h e r e i s n o c o m p i l a t i o n . T h e y do n ' t 21 c o m p i l a t e a n y t h i n g . 22 E a c h d a y i s a b r a n d n e w d a y i n t h e C N N N e w s . 23 A n d e a c h d a y o n t h e r a d i o f o r t h e Q u i r k s s e r i e s , a n h o u r s h o w 24 b r o k e n i n t o s e g m e n t s , i t i s t h e s a m e s h o w . A l l o f a s u d d e n y o u 25
IPR2014-00070 Patent 8,112,504 33 t a k e t h e s a m e s h o w t h a t i s a n h o u r s h o w , y o u b r e a k i t i n to 1 s e g m e n t s , n o w i t b e c o m e s a n e p i s o d i c s h o w ? 2 J U D G E A N D E R S O N : S o , a s I u n d e r s t a n d i t , y o u 3 d o n ' t h a v e -- y o u d o n ' t h a v e a n y d i s p u t e w i t h t h e c u r r e n t 4 c o n s t r u c t i o n , w i t h t h e p r e l i m i n a r y c o n s t r u c t i o n o f " c o m p i l a t i o n 5 f i l e , " y o u s i m p l y a r e s a y i n g t h a t b o t h C N N a n d t h e C B C d o n ' t 6 c o n t a i n e p i s o d e i n f o r m a t i o n , t h e y c o n t a i n s e g m e n t i n f o r m a t i o n ; 7 i s t h a t r i g h t ? 8 M R . F E M A L : T h e y c o n t a i n s e g m e n t i n f o r m a t i o n , 9 Y o u r H o n o r , a n d t h e y a l s o l a c k a n y c o m p i l a t i o n . 10 J U D G E S N E D D E N : L e t m e s e e i f I u n d e r s t a n d . 11 T h e w a y I u n d e r st a n d y o u r a r g u m e n t , t h e w a y I r e a d y o u r 12 r e s p o n s e i s t h a t y o u a r e e s s e n t i a l l y a r g u i n g t h a t t h e c l a i m 13 r e q u i r e s o r r e f e r e n c e s e p i s o d e s . A n d w h a t i s d i s c l o s e d i n t h e 14 C N N r e f e r e n c e , f o r e x a m p l e , i s n o t e p i s o d e s , r a t h e r , w h a t i s 15 b e i n g u p l o a d e d o r p u t o n t h e C N N w e b p a g e a r e s e g m e n t s o f a 16 s i n g l e e p i s o d e . A n d t h a t i s d o n e b e c a u s e t h e s e f i l e s a r e l a r g e . 17 H a v e I g o t i t s t r a i g h t s o f a r ? 18 M R . F E M A L : H e i s u p l o a d i n g a t w o- t o 19 t h r e e-m i n u t e s e g m e n t o f t h e n e w s b r o a d c a s t . 20 J U D G E S N E D D E N : T h e n e w s b r o a d c a s t . A n d t h e 21 r e a s o n w h y i t h a s t o b e b r o k e n u p i n t o t h e s e s u c h s e g m e n t s i s 22 b e c a u s e t h e e n t i r e b r o a d c a s t c a n n o t b e l o a d e d b e c a u s e o f t h e 23 s i z e o f t h e f i l e s ? 24
IPR2014-00070 Patent 8,112,504 34 M R . F E M A L : W e l l , y o u c a n ' t u p l o a d b e c a u s e o f 1 t h e s i z e o f t h e f i l e , t h a t ' s c o r r e c t , Y o u r H o n o r . T h e a r t i c l e s a ys 2 s o . 3 J U D G E S N E D D E N : S o t h e y a r e b r o k e n u p i n t o 4 s e g m e n t s t h a t a r e t h e n a v a i l a b l e , y o u k n o w , o n t h e w e b s i t e , b u t 5 t h i s i s n o t a c o m p i l a t i o n f i l e b e c a u s e e v e r y d a y t h i s e n t i r e p a g e 6 i s r e p l a c e d ? 7 M R . F E M A L : I t i s r e p l a c e d e v e r y d a y , Y o u r H o n o r . 8 J U D G E S N ED D E N : S o y o u c a n ' t a c c e s s p r e v i o u s 9 e p i s o d e s , o n l y s e g m e n t s o f a c u r r e n t e p i s o d e ? 10 M R . F E M A L : Y o u w o u l d h a v e t o g o b a c k a n d t r y 11 t o f i n d w h a t e v e r t h a t U R L w a s i n t h e U R L o f t h e C N N 12 b r o a d c a s t , u p l o a d t h a t t o f i n d o u t w h a t t h e c o n t e n t i s , b e c a u s e 13 t h e r e i s n 't a s i n g l e c o m p i l a t i o n f i l e . 14 J U D G E S N E D D E N : S o t h e c o m p i l a t i o n f i l e w o u l d 15 r e q u i r e o n e o r m o r e e p i s o d e s c o n t a i n e d i n t h a t f i l e ? 16 M R . F E M A L : Y e s . F o r e x a m p l e , i f y o u -- i f y o u 17 a r e e x p e r i e n c e d w i t h N e t f l i x o r s o m e t h i n g l i k e t h a t , y o u g o t o 18 N e t f l i x . 19 J U DG E S N E D D E N : I u n d e r s t a n d t h a t . 20 M R . F E M A L : A l l t h e e p i s o d e s a r e l i s t e d t h e r e , a l l 21 t h e s e r i e s a r e l i s t e d , e v e r y y e a r , e v e r y e p i s o d e . T h a t ' s a 22 c o m p i l a t i o n f i l e , y o u k n o w w h e r e e v e r y t h i n g i s . 23
IPR2014-00070 Patent 8,112,504 35 W i t h C N N y o u h a v e t o g o b a c k a n d u p l o a d w h a t e v e r 1 d a y i t i s a nd y o u h a v e t o k n o w w h a t t h e U R L w a s f o r t h a t 2 s e g m e n t o r t h a t n e w s c a s t f o r t h a t d a y . 3 A n d e v e r y d a y a b r a n d n e w c o n t e n t s f i l e i s c r e a t e d . 4 I t h a s n o r e l a t i o n s h i p t o t h e o t h e r c o n t e n t f i l e s . A n d t h a t , a s 5 f a r a s t h e p a t e n t i s t a l k i n g a b o u t , i s n o t a r e l a t ed e p i s o d e . 6 T h e r e i s n o r e l a t i o n s h i p . Y o u k n o w , d i f f e r e n t c o n t e n t f i l e s , 7 d i f f e r e n t t h i n g s . 8 J U D G E S N E D D E N : W e l l , t h e y a r e r e l a t e d i n t h e 9 s e n s e t h a t t h e y a r e t e m p o r a l l y r e l a t e d , t h e y a r e o n t h e s a m e 10 d a y ? 11 M R . F E M A L : W e l l , t h a t ' s t h e d e f i n i t i o n t h e 12 P e t it i o n e r u s e d t o t r y t o p u l l a n i n h e r e n c y a r g u m e n t . 13 J U D G E W A R D : I w o u l d l i k e t o t r y t o u n d e r s t a n d 14 t h e s t a t e m e n t y o u m a d e i n y o u r r e s p o n s e . Y o u t o l d u s t h a t t h e 15 B o a r d i m p r o p e r l y i m p o r t e d a c o n c e p t o f a s e g m e n t i n t o o u r 16 d e f i n i t i o n o f e p i s o d e . A n d I w o u l d li k e t o u n d e r s t a n d y o u r 17 d i s t i n c t i o n b e t w e e n a p r o g r a m a n d a s e g m e n t . 18 M R . F E M A L : O n t h e e p i s o d e d e f i n i t i o n , y o u p u l l e d 19 i n w h a t i s r e f e r r e d t o i n t h e p a t e n t a f t e r c o l u m n 2 9 , t a l k i n g 20 a b o u t s e g m e n t s , a n d s o m e o n e h a v i n g a g r o u p o f r e l a t e d o r 21 u n r e l a t e d t h i n g s a b o u t f i s h i n g , f o r e x a m p l e . I t h a s a b u n c h o f 22 a r t i c l e s . T h a t ' s f i n e . T h e r e i s n o t h i n g w r o n g w i t h t h a t . 23 A s f a r a s w e ' r e c o n c e r n e d , n e w s , n e w s t h i n g s a r e 24 u n r e l a t e d , p u l l i n n e w s i n a g r o u p , w h a t e v e r y o u w a n t t o p u l l i n 25
IPR2014-00070 Patent 8,112,504 36 a s s e g m e n t s o r p r o g r a m s a n d t h e p ro g r a m s , d u e t o t h e s i z e i n 1 t h e C N N a r t i c l e , y o u c o u l d n ' t h a v e a w h o l e p r e s e n t a t i o n a t o n c e 2 b e c a u s e y o u c o u l d n ' t d o w n l o a d i t . 3 A n d i f y o u l o o k a t t h e s t r u c t u r e s h o w n , t h e y h a v e 4 s p e c i a l p r o x y s e r v e r s . A n d t h i n g s a r e d o w n l o a d e d i n t h e 5 e v e n i n g b e c a u s e t h e f il e s a r e s o b i g , y o u c a n ' t r e a l l y s h o w 6 t h o s e . I n o t h e r w o r d s , i f a p e r s o n a s c a l l e d f o r i n t h i s p a t e n t , 7 e s p e c i a l l y w h e n y o u g e t d o w n t o t h e e n d o f t h e p a t e n t , A B C , 8 a n d r e q u e s t s t h o s e t h i n g s , t h o s e e l e m e n t s , y o u c a n ' t d o w i t h 9 C N N . Y o u h a v e t o d o w n l o a d t h e n i g h t b e f o r e t h e s e g m e n t s . 10 A n d i f y o u l o o k a t t h a t s t r u c t u r e s h o w n i n t h a t d r a w i n g , y e s , i t 11 s h o w s a w e b s e r v e r , a n d t h e n i t s h o w s t h e I n t e r n e t , b u t t h e n i t 12 s h o w s a b u n c h o f p r o x y s e r v e r s b e c a u s e t h e o n l y p l a c e t h a t t h e 13 C N N a r t i c l e s w e n t t o a r e s c h o o l s t h at c o u l d a f f o r d p r o x y 14 s e r v e r s a n d v e r y e x p e n s i v e b o a r d s t h a t w o u l d a l l o w y o u t o p l a y 15 t h e v i d e o . 16 B e c a u s e t h e y a r e t a l k i n g a b o u t M P E G f i l e s , w h i c h 17 a r e v e r y h u g e a t t h a t t i m e . T h e y a r e n o t t a l k i n g a b o u t M P 3 . 18 T h e y h a v e n ' t c o m e a l o n g y e t . 19 J U D G E W A R D : I a m s t i l l t r y i n g t o u n d e r s t a n d . 20 A n d t h e g i s t o f m y q u e s t i o n i s t h a t o u r d e f i n i t i o n o f e p i s o d e i n 21 s h o r t i s t h a t a n e p i s o d e i s a s e r i e s o f r e l a t e d s e g m e n t s . A n d 22 w h a t y o u p r o p o s e d i s t h a t a n e p i s o d e i s a s e r i e s o f r e l a t e d 23 p r o g r a m s . 24
IPR2014-00070 Patent 8,112,504 37 I a m t r y i n g t o u n d e r s t a n d w h a t t h e d i f f e r e n c e i s 1 b e t w e e n a p r o g r a m a n d a s e g m e n t i n t h o s e t w o c o n s t r u c t i o n s ? 2 M R . F E M A L : W e l l , i n t h a t p a r t i c u l a r c o n t e x t t h e 3 p r o g r a m i s t h e e n t i r e p r o g r a m , i n o t h e r w o r d s , t h e e n t i r e 4 e p i s o d e 3 3 o f S e i n f e l d , s e a s o n 1 , o r w h a t e v e r . 5 J U D G E W A R D : A n d a s e g m e n t o f t h a t S e i n f e l d 6 e p i s o d e w o u l d b e t h e f i r s t f i v e m i n u t e s ? 7 M R . F E M A L : W o u l d b e t h e f i r s t f i v e m i n u t e s , t h e 8 m i d d l e f i v e , t e n m i n u t e s , o r , y o u k n o w , t h e t a i l e n d o f 3 0 9 m i n u t e s b e f o r e t h e c o m m e r c i a l w o u l d b e s e g m e n t s . 10 J U D G E W A R D : B u t t h o s e s e gm e n t s a r e 11 c o m p o n e n t s o f a n e p i s o d e , c o r r e c t ? 12 M R . F E M A L : C a n b e c o m p o n e n t s o f a n e p i s o d e , i f 13 y o u a r e t a l k i n g a b o u t a n e p i s o d e . 14 J U D G E W A R D : S o i f I h a d e n o u g h s e g m e n t s , I 15 c o u l d h a v e m u l t i p l e e p i s o d e s ? 16 M R . F E M A L : A p e r s o n m a y c h o o s e t o d o w n l o a d 17 p r o b ab l y -- i n S e i n f e l d , y o u c a n d o w n l o a d t h e w h o l e t h i n g , 18 obviously, the whole episode, but if you want to break it into 19 s e g m e n t s , y o u c a n t a k e a n e p i s o d e a n d b r e a k i t i n t o s e g m e n t s . 20 A n d I t h i n k t h a t i s w h a t i s c o n f u s i n g a b o u t t h e P e t i t i o n e r ' s 21 c l a i m t h a t t h e se l i t t l e i n d i v i d u a l s e g m e n t s a r e e p i s o d e s . 22 J U D G E S N E D D E N : W h a t d o y o u s u g g e s t t h e y a r e ? 23 T h e y a r e s e g m e n t s o f a p r o g r a m ? 24 M R . F E M A L : P a r d o n ? 25
IPR2014-00070 Patent 8,112,504 38 J U D G E S N E D D E N : W h a t d o y o u s u g g e s t t h e y a r e ? 1 T h e y a r e s e g m e n t s o f a p r o g r a m ? 2 M R . F E M A L : T h e y a r e u n r e l at e d , u n r e l a t e d 3 s n i p p e t s o f t h e n e w s . I h a v e a n a r t i c l e a b o u t s a v i n g t h e w h a l e s . 4 I h a v e a n a r t i c l e a b o u t t h e t e r r i b l e w e a t h e r i n C a l i f o r n i a . 5 J U D G E S N E D D E N : T h e y a r e r e l a t e d i n t h a t t h e y 6 w e r e p r e s e n t e d t o g e t h e r i n t h e w o r l d n e w s p r o g r a m ? 7 M R . F E M A L : Th e y a r e g r o u p e d t o g e t h e r a s 8 s e g m e n t s , b u t t h e y a r e n o t e p i s o d i c , h a v e n o t h e m e . W h a t i s 9 t h e t h e m e b e t w e e n t h e w h a l e s b e i n g s a v e d a n d a s t o r m i n 10 C a l i f o r n i a ? 11 J U D G E A N D E R S O N : S o w h a t p a r t o f c o l u m n 2 9 12 a r e y o u p o i n t i n g t o t h a t s a y s s e g m e n t s a r e s o m e h o w d i ff e r e n t 13 f r o m e p i s o d e s ? 14 M R . F E M A L : L e t m e l o o k a t m y n o t e s h e r e , Y o u r 15 H o n o r . 16 J U D G E S N E D D E N : F o r u s i t i s a l i t t l e d i f f e r e n t . 17 N o w t h a t w e m a y h a v e a n u n d e r s t a n d i n g , i s t h e r e -- w h a t 18 e v i d e n c e o n r e c o r d w o u l d s u p p o r t t h a t , y o u r d e f i n i t i o n , y o u r 19 c o n s t r u c t io n ? 20 M R . F E M A L : W e l l , Y o u r H o n o r , b a s i c a l l y g o i n g 21 f r o m c o l u m n s u p t h r o u g h c o l u m n 2 1 , i t t a l k s a b o u t e p i s o d e s a n d 22 d e f i n e s w h a t e p i s o d e i s . A n d , i n p a r t i c u l a r , y o u h a v e c o l u m n 6 , 23 l e t ' s s e e h e r e , c o l u m n 6 s t a r t i n g a t l i n e 6 0 , y o u h a v e t h e h o s t 24 s e r v e r 1 0 1 pe r i o d i c a l l y t r a n s m i t s a d o w n l o a d c o m p i l a t i o n f i l e 25
IPR2014-00070 Patent 8,112,504 39 1 4 5 u p o n r e c e i v i n g r e q u e s t f r o m t h e p l a y e r 1 0 3 . T h e f i l e 1 4 5 i s 1 p l a c e d i n a p r e d e t e r m i n e d F T P d o w n l o a d f i l e d i r e c t o r y a n d 2 a s s i g n e d a f i l e n a m e k n o w n t o t h e p l a y e r 1 0 3 . A t a t i m e 3 d e t e r m i n e d b y p l a y e r 1 0 3 mo n i t o r i n g t h e t i m e o f d a y c l o c k 1 0 6 , 4 a d i a l-u p c o n n e c t i o n i s e s t a b l i s h e d v i a t h e s e r v i c e p r o v i d e r , a n d 5 t h e I n t e r n e t , a n d t h e s e r v e r d o w n l o a d s c o m p i l a t i o n f i l e 1 4 5 . I t 6 i s t r a n s f e r r e d t o t h e p r o g r a m d a t a s t o r e 1 0 7 i n t h e p l a y e r . A n d 7 t h e n a p e r s o n c a n l o o k u p i n t h e c o m p i l a t i o n f i l e w h a t , w h a t 8 e p i s o d e s t h a t h e i s i n t e r e s t e d i n . A t t h e t o p o f c o l u m n 7 , a n d 9 t h e n g o i n g o n t o l i n e 1 0 -- 10 J U D G E S N E D D E N : S o t h a t c o m p i l a t i o n f i l e w o u l d 11 c o n t a i n e p i s o d e s s e l e c t e d b y t h e u s e r o r -- 12 M R . F E M A L : T h a t c o m p i l a t i o n f i l e c o u l d c o n t a i n 13 w h a t e v e r t h e u s e r w a n t s t o p u t i n a c o m p i l a t i o n f i l e , b u t i t h a s 14 a l l o f t h e i n f o r m a t i o n t h a t h e i s l o o k i n g f o r . 15 A n d t h e n I g u e s s t o g o b a c k t o a n o t h e r t h i n g a b o u t 16 t h e m e , J u d g e W a r d , y o u w e r e a s k i n g a b o u t t h e m e . Y o u c a n a s k 17 y o u r s e l f a q u e st i o n d o e s i t m a t t e r w h i c h o r d e r y o u w a t c h t h e 18 n e w s p r o g r a m i n ? I f y o u w a t c h t h e v e g e t a b l e f i r s t , i s t h a t 19 b e t t e r t h a n w a t c h i n g J u p i t e r ? I f i t d o e s n ' t m a t t e r , t h e n i t i s 20 p r o b a b l y n o t a n e p i s o d e i n a s e r i e s o f e p i s o d e s . T h e r e i s n o 21 r e l a t i o n s h i p t o t h e o r d er t h a t t h e y a r e i n . I t w o u l d b e h i g h l y 22 e p i s o d i c a t t h a t p o i n t . 23 J U D G E W A R D : S o a r e y o u s a y i n g a n e p i s o d e 24 i n d i c a t e s a s e r i e s t h a t m u s t b e w a t c h e d i n a s p e c i f i c o r d e r ? 25
IPR2014-00070 Patent 8,112,504 40 M R . F E M A L : Y o u c a n w a t c h t h e m o u t o f o r d e r i f 1 y o u w o u l d l i k e t o , Y o u r H o n o r , b u t t h e re i s a g i v e n o r d e r t o 2 e p i s o d e s . T y p i c a l l y , f o r e x a m p l e , i f y o u j u m p i n a t H o u s e o f 3 C a r d s a t e p i s o d e 1 2 , y o u h a v e n o i d e a w h a t i s g o i n g o n ; 4 t h e m a t i c a l l y , c o m p l e t e l y l o s t t h e t h r e a d . Y o u h a v e t o g o b a c k 5 a n d s t a r t w a t c h i n g e p i s o d e s 1 t h r o u g h 1 1 t o f i n d o u t w h a t t h e 6 h e c k 1 2 i s r e l a t e d t o . 7 J U D G E W A R D : W h a t a b o u t a s h o w l i k e T h e 8 Twilight Zone, where each show is independent? 9 M R . F E M A L : I t h i n k t h o s e a r e t o t a l l y i n d e p e n d e n t , 10 Y o u r H o n o r . 11 J U D G E W A R D : T w i l i g h t Z o n e , n o e p i s o d e s i n 12 Twilight Zone? 13 M R . F E M AL : I w o u l d n ' t c a l l i t n e c e s s a r i l y 14 e p i s o d i c . T h e y a r e a l l d i f f e r e n t , n o t a s i n g l e T w i l i g h t Z o n e a m 15 I a w a r e o f f o l l o w s a n o t h e r o n e . O n e y o u h a v e p e o p l e b e i n g 16 e a t e n a l i v e , y o u k n o w , a t a c l u b a n d a n o t h e r o n e t a l k i n g a b o u t , 17 y o u k n o w , s o m e i n t e r s t e l l a r r a d i at i o n h i t t i n g t h e e a r t h o r 18 s o m e t h i n g . I t i s a b u n c h o f u n r e l a t e d p r o g r a m s . 19 T h e y a r e p r o g r a m s , t h o u g h . A n d y o u c a n d o w n l o a d 20 s e g m e n t s o f i t . I f y o u h a v e C N N , y o u h a v e a l a r g e v i d e o f i l e , 21 b u t , y o u k n o w , g e t t i n g b a c k t o t h e c l a i m l a n g u a g e , w h i c h I 22 t h i n k i s w h e r e i t i s r e a l l y a t , w h a t I f o u n d s p e c i o u s i n s o m e o f 23 t h e a r g u m e n t s b y t h e i r e x p e r t , a s w e l l a s i n t h e b r i e f s , i s s i m p l y 24 t h e y a r e t r y i n g t o f i g u r e i n w h a t i s n ' t s h o w n . 25
IPR2014-00070 Patent 8,112,504 41 A n d f o r a n t i c i p a t i o n a s Y o u r H o n o r s j u s t m e n t i o n e d 1 a w h i l e a g o , f o r a n t i c i p a t i o n , yo u h a v e t o s h o w e a c h a n d e v e r y 2 e l e m e n t . A n d i f y o u c a n ' t s h o w e a c h a n d e v e r y e l e m e n t , l i k e 3 D r . S c h m a n d t s a i d , I d o n ' t k n o w w h e r e a U R L i s o r w h a t k i n d 4 o f U R L i s i n C B C r a d i o , w h e n a s k e d t h a t q u e s t i o n i n h i s 5 d e p o s i t i o n b y m e . 6 H e s i m p l y s a i d : I h a v e n o id e a w h a t t h e U R L w o u l d 7 b e . W e l l , i f h e h a s n o i d e a w h a t t h e U R L i s g o i n g t o b e , h o w 8 c a n y o u h a v e a p r e d e t e r m i n e d U R L ? H o w c o u l d y o u h a v e a n y 9 o f t h e s t r u c t u r e a s s h o w n i n c l a i m 3 1 ? 10 A n d , m o r e o v e r , c l a i m 3 1 c a l l s f o r v e r y s p e c i f i c 11 s t r u c t u r e . A n d t h a t s t ru c t u r e i s c l e a r l y n o t s h o w n i n e i t h e r o n e 12 o f t h e r e f e r e n c e s . A n d I t h i n k s o m e o f t h e l a n g u a g e t h a t i s v e r y 13 i m p o r t a n t h e r e , i f y o u g o t o t h e c l a i m l a n g u a g e , i t s t a r t s o u t 14 w i t h o n p a g e 3 o f o u r p r e s e n t a t i o n , a s e r v e r f o r d i s s e m i n a t i n g a 15 s e r i e s o f e p i s o d e s re p r e s e n t e d b y a m e d i a f i l e s v i a t h e I n t e r n e t , 16 a s s a i d e p i s o d e b e c o m e s a v a i l a b l e . 17 A n d a s I s a i d a s f a r a s e p i s o d i c g o e s , i t m e a n s t h a t 18 y o u h a v e t h e m e-r e l a t e d e p i s o d e s . A n d t h e a p p a r a t u s a p p l i e s 19 o n e o r m o r e d a t a s t o r a g e s e r v i c e . W e l l , i n C B C , I h a v e n o id e a 20 w h a t d a t a s t o r a g e s t h e y h a v e o r d o n ' t h a v e . A n d o n e o r m o r e 21 c o m m u n i c a t i o n i n t e r f a c e s c o n n e c t e d t o t h e I n t e r n e t . A n d , 22 a g a i n , w h e n a s k e d t h o s e q u e s t i o n s o f M r . S c h m a n d t , t h e r e i s n o 23 a n s w e r b e c a u s e t h e r e i s n o s t r u c t u r e s h o w n , n o d r a w i n g s h o w n 24 a s a d m i t te d b y t h e P e t i t i o n e r . 25
IPR2014-00070 Patent 8,112,504 42 J U D G E W A R D : M r . F e m a l , a r e y o u a r g u i n g t h a t a 1 p e r s o n o f o r d i n a r y s k i l l i n t h e a r t , t a k i n g a l o o k i n g a t t h e 1 0 3 2 c h a l l e n g e , a p e r s o n o f o r d i n a r y s k i l l i n t h e a r t , a n d I w i l l u s e 3 y o u r p r o p o s e d d e f i n i t i o n , i n d i v i d u a l w i t h a n u m b e r o f ye a r s o f 4 e x p e r i e n c e w o r k i n g o n w e b s i t e s . 5 M R . F E M A L : R i g h t . 6 J U D G E W A R D : R e a d i n g t h e d i s c l o s u r e , t h i s i s t h e 7 s t a t e m e n t f r o m t h e C N N N e w s r o o m d i s c l o s u r e , " I n t e r n e t 8 N e w s r o o m i s a c c e s s e d v i a t h e W o r l d W i d e W e b . " I s i t y o u r 9 a r g u m e n t t h a t a p e r s o n o f s k i l l i n t h e a r t r e a d i n g t h a t w o u l d n o t 10 u n d e r s t a n d t h a t t h a t w o u l d r e q u i r e a s e r v e r w i t h a 11 c o m m u n i c a t i o n i n t e r f a c e a n d a p r o c e s s o r ? 12 M R . F E M A L : A p e r s o n o f o r d i n a r y s k i l l w o u l d 13 r e a l i z e t h a t t h e r e i s a -- w e l l , a p r o c e s s o r , a t l e a s t o n t h e c l i e n t 14 s i d e , o b v i o u sl y , t o i n q u i r e o n t h e w e b . B u t w h a t s t r u c t u r e i s 15 b e h i n d , w h a t t h e h o s t s e r v e r i s c o m p r i s e d o f , y o u w o u l d h a v e 16 n o i d e a . 17 J U D G E W A R D : B u t h e w o u l d n ' t k n o w t h e r e w a s a 18 s e r v e r , y o u a g r e e w i t h t h a t ? 19 M R . F E M A L : H e w o u l d k n o w t h e r e i s a s e r v e r 20 s o m e w h e r e . 21 JU D G E W A R D : A n d w o u l d n ' t t h a t s e r v e r n e e d t o 22 h a v e a c o m m u n i c a t i o n i n t e r f a c e f o r h i s c l i e n t d e v i c e t o b e a b l e 23 t o a c c e s s i n f o r m a t i o n o n t h a t s e r v e r ? 24
IPR2014-00070 Patent 8,112,504 43 M R . F E M A L : H e d o e s n ' t n e c e s s a r i l y k n o w e x a c t l y 1 w h a t i s b e h i n d t h e c u r t a i n . T o h i m i t i s , i t i s a s e r v e r , b u t w h a t 2 i s t h e s t r u c t u r e o f t h e s e r v e r ? W h a t d a t a b a s e d o e s i t h a v e ? 3 H o w a r e t h i n g s u p l o a d e d ? H o w a r e t h i n g s -- 4 J U D G E W A R D : A n d w h e r e i n y o u r c l a i m a r e t h o s e 5 r e q u i r e m e n t s ? 6 M R . F E M A L : T h o s e r e q u i r e m e n t s a r e i n c l a i m 3 1 . 7 Y o u h a v e o n e o r m o r e d a t a s to r a g e s e r v e r s . 8 J U D G E W A R D : Y o u a g r e e t h a t o n e o f s k i l l i n t h e 9 a r t w o u l d k n o w t h e r e w o u l d b e s e r v e r s , c o r r e c t ? 10 M R . F E M A L : H e m i g h t k n o w t h e r e i s a d a t a 11 s t o r a g e s e r v e r b u t n o t o n e o r m o r e . 12 J U D G E W A R D : O k a y . 13 M R . F E M A L : H e m a y k n o w t h e r e h a s g o t t o b e 14 s o m e k i n d o f c o m m u n i c a t i o n i n t e r f a c e , b u t h e d o e s n ' t n e e d t o 15 k n o w t h e r e i s o n e o r m o r e . 16 J U D G E W A R D : Y o u w o u l d a r g u e t h a t h e w o u l d n ' t 17 k n o w t h a t t h e r e w e r e m u l t i p l e ? 18 M R . F E M A L : H e w o u l d n ' t n e c e s s a r i l y k n o w t h a t 19 t h e r e a r e m u l t i p l e . 20 J U D G E W A R D : B ut y o u r c l a i m d o e s n ' t r e q u i r e 21 m u l t i p l e . 22 M R . F E M A L : N o , j u s t o n e o r m o r e . 23 J U D G E W A R D : S o y o u w o u l d a g r e e t h a t h e w o u l d 24 b e a w a r e -- 25
IPR2014-00070 Patent 8,112,504 44 M R . F E M A L : A t l e a s t o n e . 1 J U D G E W A R D : -- o f o n e s e r v e r a n d o n e 2 c o m m u n i c a t i o n i n t e r f a c e ? 3 M R . F E M A L : A t l e a s t o n e , u m-hu m . 4 J U D G E W A R D : S o w h a t o t h e r e l e m e n t s w o u l d h e 5 n o t b e a w a r e o f i n c l a i m 3 1 ? 6 M R . F E M A L : H e w o u l d n o t n e c e s s a r i l y i n t h e C B C 7 k n o w t h a t t h e r e i s a n U R L . 8 J U D G E W A R D : I a m t a l k i n g a b o u t t h e C N N . 9 M R . F E M A L : O h , C N N ? 10 J U D G E W A R D : T h e o b v i o u s n e s s r e j ec t i o n , w h i c h 11 w o u l d l o o k a t a p e r s o n o f o r d i n a r y s k i l l i n t h e a r t . 12 M R . F E M A L : R i g h t . T h e d i a g r a m t h e y s h o w j u s t 13 s h o w s a s e r v e r . Y o u h a v e n o i d e a w h a t U R L s a r e b e i n g u s e d o r 14 n o t u s e d i n t h a t p a r t i c u l a r -- 15 J U D G E W A R D : D o e s n ' t i t s h o w y o u a U R L a t t h e 16 to p o f t h e w e b p a g e ? 17 M R . F E M A L : I t s h o w s a d o m a i n n a m e . I t m i g h t b e 18 a d o m a i n n a m e . I t m i g h t b e -- G o d o n l y k n o w s w h a t . I h a v e n o 19 i d e a w h a t t h a t p a r t i c u l a r U R L m i g h t o r m i g h t n o t b e . 20 J U D G E W A R D : I t i s a t t h e t o p o f t h e w e b p a g e . 21 M R . F E M A L : M a y b e d o m a i n n a m e . I a g r e e i t i s a 22 w e b p a g e . I a m n o t a r g u i n g t h a t . B u t a t t h a t p a r t i c u l a r t i m e , I 23 h a v e n o i d e a w h a t -- w h e r e y o u g o w i t h t h a t p a r t i c u l a r U R L , i f 24 i t i s u n i q u e o r i f i t i s w h a t e v e r . 25
IPR2014-00070 Patent 8,112,504 45 J U D G E W A R D : Y o u r c l a i m r e q u i r e s t h a t i t b e 1 u n i q u e ? 2 M R . F EM A L : I t r e q u i r e s t h a t y o u g e t a n u p d a t e d 3 c o m p i l a t i o n f i l e f r o m a p r e d e t e r m i n e d U R L . 4 J U D G E W A R D : I s t h e U R L l i s t e d a t t h e t o p o f t h e 5 w e b p a g e s h o w n i n t h e C N N N e w s r o o m a p r e d e t e r m i n e d U R L ? 6 M R . F E M A L : I t i s a s p e c i f i c U R L . B u t i f y o u t r y 7 g o a n d g e t a no t h e r n e w s p a g e , y o u a r e g o i n g t o g o t o a b r a n d 8 n e w U R L , w h a t e v e r t h a t m i g h t b e . 9 J U D G E W A R D : A n d i t w a s p r e d e t e r m i n e d , w a s i t 10 n o t ? 11 M R . F E M A L : I d o n ' t k n o w i f y o u w o u l d -- a s t h e 12 p a t e n t d e f i n e s w h a t i s p r e d e t e r m i n e d , m y , m y t h i n g o f a 13 p r e d e t e r m i n e d U RL i s t h e U R L t h a t h a s a c o m p i l a t i o n f i l e . 14 A n d t h a t d o e s n o t l e a d y o u t o a c o m p i l a t i o n f i l e i n e i t h e r C N N 15 o r C B C . 16 J U D G E W A R D : Y o u h a v e g o t a b o u t s e v e n m i n u t e s 17 r e m a i n i n g . 18 M R . F E M A L : O k a y . A n d t h e n w h a t y o u d o n ' t 19 k n o w i s f r o m t i m e t o t i m e a s n e w e p i s od e s r e p r e s e n t -- a s e r i e s 20 o f e p i s o d e s b e c o m e a v a i l a b l e , t h a t t h e y a r e s t a r t i n g a n u p d a t e d 21 v e r s i o n o f a c o m p i l a t i o n f i l e , a n d o n e o r m o r e o f s a i d d a t a 22 s e r v e r s a t t h e s t o r a g e l o c a t i o n i d e n t i f i e d b y a p r e d e t e r m i n e d 23 U R L . A n d t h e r e i s n o i n d i c a t i o n t h a t t h e r e i s a p r e d e t e r m i n e d 24 U R L t h a t h a s a l l o f t h e e p i s o d e s . 25
IPR2014-00070 Patent 8,112,504 46 J U D G E W A R D : Y o u d o a g r e e t h a t t h e r e i s a 1 p r e d e t e r m i n e d U R L f o r a p a r t i c u l a r p a g e a t t h e C N N w e b p a g e , 2 b u t y o u d o n o t a g r e e t h a t t h a t p r e d e t e r m i n e d U R L l e a d s y o u t o 3 a c o m p i l a t i o n f i l e ; i s t h a t c o r r e c t ? 4 M R . F E M A L : T h a t ' s c o r r e c t . 5 J U D G E W A R D : A n d t h a t i s b e c a u s e t h a t 6 c o m p i l a t i o n f i l e w a s c r e a t e d b r a n d n e w f o r t h a t p a r t i c u l a r d a y 7 a n d w a s n o t a n u p d a t e d v e r s i o n o f a p r e v i o u s l y e x i s t i n g f i l e ? 8 M R . F E M A L : T h a t ' s c o r r e c t , Y o u r H o n o r . 9 J U D G E W A R D : A n d w h a t i s t h e d i f f e r e n c e 10 b e t w e e n a n u p d a t e d v e r s i o n o f a f i l e t h a t c o m p l e t e l y w i p e d 11 a w a y t h e p r e v i o u s f i l e a n d h a s n e w c o n t e n t s a n d w h a t y o u a r e 12 t e l l i n g m e a b o u t -- 13 M R . F E M A L : B e c a u s e i t h a s t h e o l d c o n t e n t , Y o u r 14 H o n o r , a n d t h e n e w c o n t e n t . A n d y o u c a n te l l e x a c t l y w h e r e 15 y o u w a n t t o g o i n t h e e p i s o d e s . 16 J U D G E W A R D : S o y o u r c l a i m r e q u i r e s t h a t t h a t 17 c o m p i l a t i o n f i l e r e t a i n s o m e i n f o r m a t i o n f r o m t h e p r e v i o u s 18 v e r s i o n o f t h e f i l e ? 19 M R . F E M A L : I t w o u l d h a v e p r e v i o u s i n f o r m a t i o n 20 f r o m t h e p r e v i o u s f i l e s , t h a t' s c o r r e c t . 21 J U D G E W A R D : W h e r e i n t h e c l a i m d o I g e t t h a t 22 l i m i t a t i o n ? 23 M R . F E M A L : B e c a u s e , b e c a u s e i t s a y s a n u p d a t e d 24 v e r s i o n o f t h e c o m p i l a t i o n f i l e c o n t a i n s a t t r i b u t e d a t a 25
IPR2014-00070 Patent 8,112,504 47 d e s c r i b i n g c u r r e n t l y a v a i l a b l e e p i s o d e s i n s a i d s e r i e s o f 1 e p i s o d e s a n d s a i d a t tr i b u t e d a t a f o r e a c h g i v e n o n e o f s a i d 2 c u r r e n t l y a v a i l a b l e e p i s o d e s . 3 S o i f t h e r e i s o n e c u r r e n t l y a v a i l a b l e i n t h a t f i l e , i t 4 h a s g o t t o h a v e s o m e k i n d o f i n f o r m a t i o n t h e r e , Y o u r H o n o r . 5 J U D G E W A R D : Y e s , b u t l e t ' s l e a v e t h e e p i s o d e 6 a r g u m e n t a s i d e f o r t h e m o m e n t a n d c o n s i d e r -- 7 M R . F E M A L : O k a y . 8 J U D G E W A R D : -- t h a t i f I a m r e a d i n g t h e c l a i m , 9 s t o r i n g a n u n d a t e d v e r s i o n o f a c o m p i l a t i o n f i l e i n o n e o r m o r e 10 s e r v e r s , d e s c r i b i n g c u r r e n t l y a v a i l a b l e e p i s o d e s i n t h e s e r i e s o f 11 e p i s o d e s , t h e C N N f i l e c r e a t e d f or t o d a y , W e d n e s d a y , i s g o i n g 12 t o l i s t p r o g r a m s a v a i l a b l e f o r t o d a y , a n d i t i s u p d a t e d i n t h e 13 s e n s e t h a t i t i s n e w e r t h a n y e s t e r d a y . 14 I t d o e s n ' t c o n t a i n a n y o f t h e i n f o r m a t i o n f r o m 15 y e s t e r d a y , b u t I d o n ' t u n d e r s t a n d h o w y o u r c l a i m r e q u i r e s t h a t 16 t h a t u p d a t e d v e r s i o n s o m e h o w r e t a i n a p o r t i o n o f p r e v i o u s l y 17 p r o v i d e d c o m p i l a t i o n f i l e d a t a ? 18 M R . F E M A L : B e c a u s e i t s a i d g i v e n s a i d c u r r e n t l y 19 a v a i l a b l e e p i s o d e a n d o n e o r m o r e e p i s o d e U R L s s p e c i f y i n g i n 20 t h e s t o r a g e l o c a t i o n s o f o n e o r m o r e c o r r e s p o n d i n g m e d i a f i l e s . 21 A n d i t s a i d e p i s o d e s . I t i s p l u r a l . I t i s n o t a s i n g l e e p i s o d e . 22 J U D G E W A R D : R i g h t . W e l l , a n d l e t ' s l e a v e t h e 23 e p i s o d e a r g u m e n t a s i d e f o r a w h i l e . L e t ' s j u s t a s s u m e t h a t 24 w h a t i s d i s c l o s e d i n t h e C N N N e w s r o o m a r e m u l t i p l e e p i s o d e s . 25
IPR2014-00070 Patent 8,112,504 48 I t h a s m u l t i p l e e pi s o d e s . I t d o e s n ' t h a p p e n t h a t t h e r e i s a n y 1 c o r r e l a t i o n o r o v e r l a p f r o m t h e p r e v i o u s d a y s , b u t i t h a s 2 m u l t i p l e p r o g r a m s . 3 M R . F E M A L : R i g h t , i t i s a b r a n d n e w p r o g r a m 4 e a c h d a y , b r a n d n e w c o n t e n t . 5 J U D G E W A R D : I t i s a n u p d a t e d v e r s i o n , m u l t i p l e 6 p r o g r a m s . 7 M R . F E M A L : I t i s n o t n e c e s s a r i l y a n u p d a t e d 8 v e r s i o n . I t i s a b r a n d n e w v e r s i o n . B e c a u s e u p d a t e d s a y s , 9 b a s i c a l l y i m p l i e s , i f y o u w a n t t o g o i n t o i n h e r e n t a r g u m e n t s 10 t h a t t h e y a r e u s i n g f o r s t r u c t u r e n o t s h o w n i n t h e i r t w o a r t i c l e s 11 -- 12 J U D G E W A R D : B u t in t h a t y o u a r e r e q u i r i n g m e t o 13 c o n s t r u e " u p d a t e d " t o m e a n " c a r r y o v e r , " t h a t y o u a r e 14 p r o h i b i t i n g t h e t e r m u p d a t e d t o b e i n g a p p l i e d t o s o m e t h i n g t h a t 15 w a s -- t h e o l d d a t a w a s w i p e d o u t a n d a l l n e w d a t a w a s 16 i n s e r t e d ? 17 M R . F E M A L : Y e a h , i t i s a n u p d a t e d c o m p i la t i o n 18 f i l e . A l l o f t h e e p i s o d e s t h a t a r e a v a i l a b l e a r e i n t h a t . N o t j u s t , 19 y o u k n o w , a s i n g l e f i l e i s c r e a t e d e a c h d a y a n d t h e r e i s n o 20 c o m p i l a t i o n f i l e . W h e r e i s t h e c o m p i l a t i o n f i l e i n t h e s e t w o 21 a r t i c l e s ? I c a n ' t f i n d i t , Y o u r H o n o r . T h e r e i s n o r e f e re n c e t o 22 i t . 23
IPR2014-00070 Patent 8,112,504 49 A n d t h e r e i s n o r e f e r e n c e t o -- i f t h e y w a n t e d t o s a y 1 t h e y w e r e u p d a t i n g , a n d t h e s e w e r e n ' t b r a n d n e w , t h e y w o u l d 2 s a y t h e w o r d u p d a t i n g i n t h e C N N a r t i c l e . I t i s n o t t h e r e . 3 J U D G E S N E D D E N : I t s e e m s t h a t a r g u m e n t a l w a y s 4 g o e s b a c k t o h o w w e c o n s t r u e " e p i s o d e . " R i g h t ? T h e 5 c o n t e n t s . c f i l e i s n o t a c o m p i l a t i o n f i l e b e c a u s e i t o n l y c o n t a i n s 6 i n f o r m a t i o n f o r t o d a y , w h i c h y o u d o n ' t r e q u i r e -- w h i c h y o u 7 d o n ' t s e e m t o a g r e e t h a t t h a t ' s a n e p i s o d e . 8 M R . F E M A L : Y o u r H o n o r , c l a i m 3 1 t a l k s a b o u t 9 e p i s od e s , b u t I a m n o t s a y i n g t h a t t h e c o m p i l a t i o n f i l e d o e s n ' t 10 h a v e n e w s s e g m e n t s . I t m a y h a v e n e w s s e g m e n t s i n i t . S o 11 w h a t ? 12 J U D G E S N E D D E N : W e l l , s o w h a t ? B e c a u s e t h a t ' s 13 -- I t h i n k I u n d e r s t a n d y o u r a r g u m e n t . 14 M R . F E M A L : B u t i t i s u p d a t e d t o o . S o e v e n i f y o u 15 a r e a d d i n g n e w n e w s a r t i c l e s , y o u h a v e a n u p d a t e d f i l e . Y o u 16 d o n ' t h a v e a n u p d a t e d f i l e w i t h C N N . T h e r e i s n o r e f e r e n c e t o 17 t h e r e b e i n g a c o m p i l a t i o n f i l e t h e r e . T h e y g o b a c k a n d f i n d a 18 c o m p i l a t i o n f i l e a n d s e e t h a t i t i s u p d a t e d w i t h a b r a n d n e w 19 n e w s o r t h a t t h e o l d s t u f f f r o m l a s t y e a r i s t h e r e t o o . 20 J U D G E S N E D D E N : S o t h a t ' s a n u p d a t e d f i l e , n o t 21 a n u p d a t e d c o m p i l a t i o n f i l e ? 22 M R . F E M A L : R i g h t , t h e c o m p i l a t i o n f i l e h a s a l l 23 t h e c o n t e n t i n i t , Y o u r H o n o r . 24
IPR2014-00070 Patent 8,112,504 50 J U D G E W A R D : A b o u t a m i n u t e a n d a h a l f r e m a i n s , 1 M r . F e m a l . 2 M R . F E M A L : O k a y . W e l l , i n c l o s i n g , t h e m a i n 3 a r g u m e n t , I t h i n k , t h a t c o m e s a c r o s s i s t h e C N N i s , y o u k n o w , a 4 s a t e l l i t e , h i g h-t e c h , v e r y l a r g e f i l e s . T h e y h a v e a l l k i n d s o f 5 p r o b l e m s . T h e y h a v e a l l k i n d s o f s p e c i a l s o f t w a r e . T h e r e is n o 6 r e f e r e n c e t o a c o m p i l a t i o n f i l e . T h e r e i s r e f e r e n c e s t o b r a n d 7 n e w s t r u c t u r e a n d b r a n d n e w t h i n g s t h a t y o u c a n p o s s i b l y d o . 8 B u t t h e r e i s n o u p d a t e d c o m p i l a t i o n f i l e w i t h 9 e p i s o d e s i n i t . A n d t h e n e w s a r t i c l e s d e f i n i t e l y a r e n o t r e l a t e d 10 t o o n e a n o t h er , a s o u r c l a i m c o n s t r u c t i o n w a s t h a t e p i s o d e s 11 w o u l d b e r e l a t e d t o o n e a n o t h e r . 12 T h a n k y o u , Y o u r H o n o r s . 13 J U D G E W A R D : T h a n k y o u . M r . B r o w n , y o u h a v e 14 2 0 m i n u t e s r e m a i n i n g . 15 M R . B R O W N : T h a n k y o u , Y o u r H o n o r . 16 I w o u l d l i k e t o s t a r t w i t h t h e l a n g u a g e o f c l a i m 3 1 . 17 A n d I w a n t t o c l a r i f y e x a c t l y w h a t t h e c l a i m r e q u i r e s a b o u t t h e 18 c o m p i l a t i o n f i l e , a b o u t t h e e p i s o d e s . 19 I a m o n s l i d e 3 , a s -- t h e f i r s t p a r t o f c l a i m 3 1 . I 20 a m n o t g o i n g t o d i s c u s s t h i s p a r t o f t h e c l a i m b e c a u s e w e 21 h a v e n ' t g o t t e n t o t h e c o m p i la t i o n f i l e a t t h i s p a r t o f t h e c l a i m i n 22 a n y d e t a i l o f w h a t w e h a v e i n t h e f i r s t p a r t o f t h e c l a i m t h a t i s 23 s h o w n o n s l i d e 3 i s y o u a r e d i s s e m i n a t i n g a s e r i e s o f e p i s o d e s . 24 Y o u a r e u s i n g a s e r v e r t o d o i t . A n d -- 25
IPR2014-00070 Patent 8,112,504 51 J U D G E A N D E R S O N : C o u n s e l , y o u a r e g o i n g t o 1 n e e d t o g e t c l o s e r t o t h e m i c r o p h o n e , i f y o u w a n t m e t o h e a r 2 t h i s . 3 M R . B R O W N : I a p o l o g i z e , Y o u r H o n o r , l e t m e 4 s t a r t a g a i n . 5 W h a t y o u h a v e i n t h e p a r t o f c l a i m 3 1 t h a t i s s h o w n 6 o n s l i d e 3 , y o u h a v e t h e p r e a m b l e , w h i c h e x p l a i n s t h a t y o u a r e 7 d i s s e m i n a t i n g a s e r i e s o f e p i s o d e s o v e r t h e I n t e r n e t . T h e n y o u 8 h a v e s o m e h a r d w a r e c o m p o n e n t s , t h r e e o f t h e m ; t h e d a t a 9 s t o r a g e s e r v e r , t h e c o m m u n i c a t i o n i n t e r f a c e , a n d t h e 10 p r o c e s s o r s . 11 A n d t h e n y o u h a v e a n e x p l a n a t i o n o f w h a t t h o s e 12 t h i n g s a r e d o i n g s p e c i f i c a l l y . A n d f o r p a r t o f t h e c l a i m h e r e i s 13 j u s t s o f a r w e o n l y h a v e t h e m e d i a f i l e s f o r e a c h e p i s o d e . S o 14 y o u h a v e a m e d i a f i l e f o r e a c h e p i s o d e , a n d I w a n t t o j u s t 15 e m p h a s i z e t h a t t h a t m e d i a f i l e i s s t o r e d a t a s t o r a g e l o c a t i o n 16 s p e c i f i e d b y a u n i q u e e p i s o d e U R L . 17 S o wh e n t h e y w a n t e d t o c l a i m a u n i q u e U R L , t h e y 18 k n e w h o w t o d o i t a n d t h e y d i d i t . 19 N o w l e t ' s g o t o t h e n e x t s l i d e , s l i d e 4 . H e r e i s 20 w h e r e w e h a v e t h e a c t u a l l a n g u a g e a b o u t t h e c o m p i l a t i o n f i l e . 21 F r o m t i m e t o t i m e , a s n e w e p i s o d e s r e p r e s e n t e d i n 22 t h e s e r i e s b e c o m e a v a i l a b l e , s t o r i n g , s t o r i n g a n u p d a t e d v e r s i o n 23 o f a c o m p i l a t i o n f i l e a t t h e s t o r a g e l o c a t i o n i d e n t i f i e d b y a 24 p r e d e t e r m i n e d U R L . A n d w h a t h a s t o b e i n t h a t f i l e ? T h e r e 25
IPR2014-00070 Patent 8,112,504 52 h a s t o b e a t t r i b u t e d a t a -- I a m p a r a p h r a s i n g h e r e . A n d w h a t 1 d o e s t h e a t t r i b u t e d a t a h a v e t o h a v e ? I t s a y s , " s a i d a t t r i b u t e 2 d a t a f o r e a c h g i v e n o n e o f s a i d c u r r e n t l y a v a i l a b l e e p i s o d e s , 3 i n c l u d i n g d i s p l a y a b l e t e x t a n d o n e o r m o r e e p i s o d e U R L s 4 s p e c i f y i n g t h e s t o r a g e l o c a t i o n s . " 5 S o w h a t d o y o u h a v e f o r t h e c o m p i l a t i o n f i l e ? I t 6 h a s to c o n t a i n U R L s , l i n k s t o t h e f i l e s , a n d i t h a s t o c o n t a i n 7 t e x t a b o u t t h e f i l e s . T h a t ' s w h a t i t h a s t o b e . I t t e l l s y o u w h a t 8 a c o m p i l a t i o n f i l e i s r i g h t t h e r e i n t h e c l a i m . 9 N o w , w e h e a r d a n a r g u m e n t t h a t i t h a s t o d e s c r i b e 10 a l l e p i s o d e s . T h a t i s n o t w h at i t s a y s . I n f a c t , i t s p e c i f i c a l l y 11 s a y s t h a t i t h a s t o d e s c r i b e c u r r e n t l y a v a i l a b l e e p i s o d e s . I t 12 d o e s n ' t s a y a l l c u r r e n t l y a v a i l a b l e e p i s o d e s e i t h e r . I t s a y s 13 c u r r e n t l y a v a i l a b l e e p i s o d e s . 14 J U D G E W A R D : H o w d o y o u r e s p o n d t o M r . 15 F e m a l ' s a r g u m e n t t h a t up d a t e d m e a n s i t r e t a i n s s o m e o f t h e 16 p r e v i o u s i n f o r m a t i o n ? 17 M R . B R O W N : M y r e s p o n s e t o t h a t i s t h r e e t h i n g s . 18 F i r s t , t h a t i s n ' t t h e o n l y m e a n i n g o f u p d a t e d i n o r d i n a r y E n g l i s h 19 u s a g e . S e c o n d , i n t h e p a t e n t i t e x p l a i n s w h a t t h e c o m p i l a t i o n 20 f i l e i s a n d w h y it i s u p d a t e d . I t i s u p d a t e d s o t h e p l a y e r c a n 21 d o w n l o a d t h e n e w p r o g r a m s e g m e n t s . 22 S o i t s e r v e d t h e p u r p o s e o f t h e c o m p i l a t i o n f i l e a s 23 d e s c r i b e d i n t h e p a t e n t a t c o l u m n 6 a n d c o l u m n 7 . I t j u s t h a s t o 24 c o n t a i n t h e n e w o n e s . A n d t h e n , t h i r d , I a s k e d t h e i r e x p e r t , a s I 25
IPR2014-00070 Patent 8,112,504 53 h a v e s a i d , s p e c i f i c a l l y i n h i s d e p o s i t i o n a b o u t t h i s u p d a t e d 1 i s s u e . A n d c o u n s e l a r g u e d : W e l l , I d i d n ' t a s k h i m a b o u t 2 p r o g r a m s e g m e n t s , t h a t I w a s -- I ' m s o r r y , t h a t I w a s a s k i n g 3 a b o u t p r o g r a m s e g m e n t s , t h a t I w a s n ' t a s k i n g a b o u t e p i s o d e s . 4 A n d I j u s t w a n t t o a d d r e s s t h a t , b e c a u s e I t h i n k t h e 5 l a n g u a g e i s a c t u a l l y v e r y c l e a r i n t h e d e p o s i t i o n . E x c u s e m e 6 w h i l e I f i n d t h e c i t a t i o n . 7 I ' m s o r r y , i t w a s c l e a r b o t h o n e p i s o d e s a n d o n 8 u p d a t e d . S o l e t m e -- 9 J U D G E W A R D : C a n y o u t e l l u s w h i c h e x h i bi t y o u 10 a r e g o i n g t o r e f e r t o , M r . B r o w n ? 11 M R . B R O W N : I a m g o i n g t o r e f e r t o t h e d e p o s i t i o n 12 t r a n s c r i p t , w h i c h i s E x h i b i t 1 0 3 1 . 13 J U D G E W A R D : T h a n k y o u . 14 M R . B R O W N : A n d i n E x h i b i t 1 0 3 1 , a t p a g e 9 1 , 15 a n d I w a s a s k i n g h i m a b o u t -- a n d I a m g o i n g t o g o t o sl i d e 1 8 . 16 I w a s a s k i n g h i m a b o u t f i g u r e 3 o f t h e C N N r e f e r e n c e . A n d I 17 a s k e d h i m : T h e t a b l e o f c o n t e n t s , i n p a r t i c u l a r t h e 18 c o n t e n t s . h t m l f i l e i s g e n e r a t e d e a c h d a y f o r e a c h N e w s r o o m 19 p r o g r a m ; c o r r e c t ? 20 " A n s w e r : Y e s . " 21 A n d i n p a r t i c u l a r t h e r e i s a p r o g r am i d e n t i f i e d h e r e 22 a s c o n t e n t s . c t h a t i s r u n e a c h d a y a n d g e n e r a t e s t h e H T M L f i l e , 23 c o n t e n t s . h t m l f o r e a c h N e w s r o o m p r o g r a m , r i g h t ? 24 " A n s w e r : Y e s , t h a t ' s w h a t i t l o o k s l i k e . 25
IPR2014-00070 Patent 8,112,504 54 " Q u e s t i o n : T h a t m e a n s t h e c o n t e n t s . h t m l f i l e i s 1 u p d a t e d e a c h d a y t o r e f l e c t t h e m o s t r e c e n t b r o a d c a s t o f C N N 2 N e w s r o o m , c o r r e c t ? 3 " A n s w e r : Y e s , I b e l i e v e s o . " 4 S o i n s u m t h e r e a s o n s a r e t h a t u p d a t e d m e a n s , 5 i n c l u d e s a n e w f i l e d o e s n o t r e q u i r e t h a t t h e f i l e b e u p d a t e d i n a 6 s p e c i f i c w a y b y b e i n g a m e n d e d . T h e r e a s o n s a r e , N u m b e r 1 , 7 th e o r d i n a r y m e a n i n g o f t h e w o r d " u p d a t e d " a n d , N u m b e r 2 , t h e 8 w a y t h e c o m p i l a t i o n f i l e i s d e s c r i b e d i n t h e p a t e n t a n d w h a t i t 9 n e e d s t o b e t o a c c o m p l i s h t h e p u r p o s e i n t h e p a t e n t , w h i c h i s t o 10 d o w n l o a d t h e n e w e p i s o d e s -- e x c u s e m e , s e g m e n t s t o t h e 11 p l a y e r . An d , N u m b e r 3 , b e c a u s e I s p e c i f i c a l l y q u e s t i o n e d 12 P e r s o n a l A u d i o ' s e x p e r t a b o u t i t , a n d h e a c k n o w l e d g e d t h a t 13 w h a t i s d e s c r i b e d i n t h e C N N r e f e r e n c e i s a n u p d a t e d f i l e . 14 J U D G E W A R D : H o w d o y o u -- 15 J U D G E A N D E R S O N : C o u n s e l , w h a t a b o u t t h e 16 l a n g u a g e , w h a t a b o ut t h e l a n g u a g e i n t h e c l a i m 3 1 t h a t s a y s , " a s 17 n e w e p i s o d e s r e p r e s e n t e d i n s a i d s e r i e s o f e p i s o d e s b e c o m e 18 a v a i l a b l e , s t o r i n g a n u p d a t e d v e r s i o n o f a c o m p i l a t i o n f i l e i n 19 o n e o r m o r e o f t h e s t o r a g e o f t h e s e r v e r s . " 20 S o i s C N N , a s I u n d e r s t a n d C N N i s u p d a t e d d a i l y , I 21 u n d e r s t a n d t h a t , b u t e a c h d a y t h a t i t i s u p d a t e d , i t a l r e a d y h a s 22 p r e d e f i n e d c o n t e n t , t h r e e o r f o u r n e w e p i s o d e s e g m e n t s , 23 w h a t e v e r , a r e a v a i l a b l e i n t h a t c o m p i l a t i o n f i l e , s o t h e r e r e a l l y 24
IPR2014-00070 Patent 8,112,504 55 i s n o t h i n g -- t h e r e i s n o t h i n g t h a t g e t s a d d e d a s a n e w " e p is o d e " 1 b e c o m e s a v a i l a b l e o r a m I w r o n g ? 2 M R . B R O W N : W e l l , l e t ' s -- l e t m e l o o k a t t h e -- 3 g e t t h e c l a i m l a n g u a g e i n f r o n t o f m e , Y o u r H o n o r . L e t ' s g o 4 t h r o u g h i t . A n d I w i l l m a p i t t o w h a t i s d i s c l o s e d i n C N N f o r 5 y o u . 6 A t a h i g h l e v e l , y o u h a v e a r i g h t , w h a t C N N i s 7 d e s c r i b i n g i s a w a y o f d i g i t i z i n g , a n a u t o m a t e d d i g i t i z a t i o n 8 s y s t e m t h a t t o o k t h e C N N n e w s b r o a d c a s t , w h e t h e r i t w a s a n 9 e d u c a t i o n a l b r o a d c a s t a t 3 : 4 5 a . m . e v e r y m o r n i n g , i t w a s 10 i n t e n d e d f o r t e a c h e r s t o r e c o r d a n d u s e i n t h e i r c l a s s r o o m s . I t 11 cap t u r e d t h e b r o a d c a s t a n d i n a u t o m a t e d w a y s i t d i v i d e d i t i n t o 12 p i e c e s , i n t o s e g m e n t s . A n d i t g e n e r a t e d t h i s c o n t e n t s . h t m l t a b l e 13 o f c o n t e n t s f i l e d e s c r i b i n g e a c h a n d l i n k i n g t o e a c h . S o l e t ' s 14 l o o k a t t h e l a n g u a g e o f t h e c l a i m . 15 A n d y o u p o i n t e d t o i t . I t s a y s , j u s t r e a d i n g f r o m 16 c l a i m 3 1 h e r e , " f r o m t i m e t o t i m e a s n e w e p i s o d e s r e p r e s e n t e d 17 i n s a i d s e r i e s o f e p i s o d e s b e c o m e a v a i l a b l e . " S o e v e r y m o r n i n g 18 a t 3 : 4 5 a . m . f o r t h e n e x t 1 5 m i n u t e s t h e r e i s a n e w b r o a d c a s t o f 19 C N N N e w s r o o m . E v e r y m o r n i n g t h a t i s r e c or d e d . 20 I a m n o w l o o k i n g a g a i n , I a m s t i l l o n s l i d e 1 8 , a n d 21 m u l t i p l e s o u r c e s o f i n f o r m a t i o n m u s t b e p r o c e s s e d a n d m e r g e d 22 e a c h n i g h t . T h e y r e c o r d t h e b r o a d c a s t . I b e l i e v e t h e y a l s o -- I 23 f o r g e t s p e c i f i c a l l y t h e o t h e r s o u r c e . I b e l i e v e t h e r e w a s s o m e 24
IPR2014-00070 Patent 8,112,504 56 s o r t o f a p r o d u c t i o n n o t e s t h a t w e r e i n t e n d e d f o r t h e t e a c h e r . 1 T h e y a r e a l s o d i s c l o s e d . 2 T h o s e a r e p r o c e s s e d t o g e t h e r . E x c u s e m e , i t i s t h e 3 c u r r i c u l u m g u i d e , I a m r e m i n d e d . I n f i g u r e 3 , t h e r e i s a 4 r e f e r e n c e t o t h e c u r r i c u l u m g u i d e . T h a t i s p r o c e s s e d b y t h is 5 p r o g r a m , c o n t e n t s . c , i n o r d e r t o g e n e r a t e t h e c o n t e n t s . h t m l f i l e 6 f o r t h a t p a r t i c u l a r b r o a d c a s t . 7 J U D G E A N D E R S O N : C o u n s e l , I ' m s o r r y t o 8 i n t e r r u p t , b u t t h e q u e s t i o n t h a t I r e a l l y h a v e i s , o k a y , s o t h e r e i s 9 a n u p d a t e d c o m p i l a t i o n f i l e e v e r y d a y , b u t t h e cl a i m s u g g e s t s t o 10 m e -- a n d m a y b e m o r e t h a n s u g g e s t s -- t h a t n e w e p i s o d e s , a s 11 t h e y b e c o m e a v a i l a b l e , a r e u p d a t e d i n t o t h a t s a m e c o m p i l a t i o n 12 f i l e . 13 A n d i t a p p e a r s t h a t C N N s h o w s t h a t e p i s o d e s a r e 14 t h e r e u n d e r w h a t w e h a v e d i s c u s s e d s o f a r , w h a t y o u r p o s i t i o n 15 i s , b u t t h e n e x t d a y a n e w c o m p i l a t i o n f i l e i s m a d e a n d i t i s 16 n e v e r u p d a t e d a s e p i s o d e s b e c o m e a v a i l a b l e . S o t e l l m e w h y I 17 a m m i s s i n g t h e b o a t h e r e . 18 M R . B R O W N : Y o u r H o n o r , I t h i n k y o u a r e 19 p a r t i a l l y r i g h t . S o i f y o u l o o k a t t h e f i g u r e 3 i n C N N 20 N e w s r o om , w h a t i t s h o w s i s t h a t e v e r y d a y t h e c o n t e n t i s 21 u p d a t e d i n t o t h e s a m e c o n t e n t s . h t m l f i l e . W h a t i t d o e s n ' t s h o w 22 i s t h a t o l d c o n t e n t s . h t m l c o n t e n t , t h e f i l e t h a t w a s i n t h a t f i l e 23 f r o m b e f o r e , i s l e f t i n t h e f i l e . I t i s n ' t . I t i s a l w a y s c l e a r l y 24 b e i n g o v er w r i t t e n . 25
IPR2014-00070 Patent 8,112,504 57 S o t h a t i s t h e i s s u e . Y o u h a v e a f i l e t h a t i s b e i n g 1 o v e r w r i t t e n e a c h d a y w i t h n e w c o n t e n t . A n d t h e p l a i n l a n g u a g e 2 o f u p d a t e d v e r s i o n o f a c o m p i l a t i o n f i l e , w e b e l i e v e , i n c l u d e s 3 t h a t . B u t l e t ' s t a l k a b o u t t h e s i t u a t i o n t h a t i t d o e s n ' t . L e t ' s t a l k 4 a b o u t t h a t . 5 W h a t d o e s t h e p a t e n t s h o w u s ? A c t u a l l y , I d o n ' t 6 h a v e a s l i d e o n t h i s , I a p o l o g i z e , b u t i f y o u g o t o p a g e 3 0 o f t h e 7 C N N r e f e r e n c e , I ' m s o r r y , i t i s p a g e 3 0 o f t h e e x h i b i t a n d i t i s 8 p a g e 2 9 o f t h e r e f e r e n c e . W h a t d o e s i t s a y ? I t t a l k s a b o u t h o w 9 t h e t e c h n i q u e s t h a t a r e d e s c r i b e d h e r e -- a n d I w i l l q u o t e -- 10 " c o u l d a d d s i g n i f i c a n t v a l u e t o o t h e r g e n e r a l n e w s p r o g r a m s o r 11 s p e c i a l i z e d n e w s p r o g r a m s . " A n d h e r e i s t h e k e y p a r t -- " o r 12 a n y o t h e r p r o g r a m f o r w h i c h u s e r s m i g h t w a n t t o b e a b l e t o se e 13 p a s t e p i s o d e s , i . e . , o t h e r n e w s p r o g r a m s , s i t c o m s , s o a p o p e r a s . " 14 S o t h i s r e f e r e n c e i s s a y i n g e x p r e s s l y s o t h a t i t c a n 15 b e a p p l i e d t o e x a c t l y t h e s i t u a t i o n t h a t P e r s o n a l A u d i o i s 16 a r g u i n g i t s h o u l d h a v e b e e n a p p l i e d , y o u k n o w , t h a t i t s p a t e n t 17 i s d e s c r i b in g w h e r e y o u w a n t t o -- y o u h a v e a t e l e v i s i o n s h o w 18 l i k e a s i t c o m a n d y o u w a n t t o b e a b l e t o g e t p a s t e p i s o d e s , a s 19 w e l l a s t h e c u r r e n t l y a v a i l a b l e e p i s o d e s o f t h e s i t c o m . 20 N o w , I d o n ' t t h i n k t h a t ' s w h a t t h e c l a i m r e q u i r e s , 21 b u t i f t h a t i s w h a t t h e B o a r d b e li e v e s t h e c l a i m r e q u i r e s , C N N 22 e x p r e s s l y t e a c h e s t h a t t h a t i s , c a n b e a c c o m p l i s h e d u s i n g t h e 23 m e c h a n i s m t h a t i s d e s c r i b e d i n d e t a i l . A n d t h e r e i s n o 24 a r g u m e n t , n o a r g u m e n t f r o m P e r s o n a l A u d i o a b o u t h o w i t c o u l d 25
IPR2014-00070 Patent 8,112,504 58 p o s s i b l y m a k e a n y s o r t o f t e c h n o l o g i c a l d i f f e r en c e o n t h i s 1 i s s u e . 2 T h e B o a r d ' s I n s t i t u t i o n d e c i s i o n -- a n d I d o n ' t h a v e 3 a p a g e n u m b e r i n f r o n t o f m e -- b u t t h e B o a r d ' s I n s t i t u t i o n 4 d e c i s i o n s p e c i f i c a l l y p o i n t e d o u t t h a t t h e p r e l i m i n a r y r e s p o n s e 5 b y t h e P a t e n t O w n e r d i d n ' t c o n t a i n a n y l o g i c u n d e r K S R 6 e x pl a i n i n g h o w t h i s w a s a n o n -- t h a t i f t h e r e w a s a r e q u i r e m e n t 7 o f a d i f f e r e n t a m e n d e d c o m p i l a t i o n f i l e w i t h o l d c o n t e n t , t h a t 8 t h i s w a s s o m e h o w m o r e t h a n -- i t w a s s o m e h o w p r e d i c t a b l e a n d 9 i t w a s s o m e h o w m o r e t h a n a t r i v i a l m e c h a n i s m . 10 A n d e v e n a f t e r t h e B o ar d s p e c i f i c a l l y p o i n t e d t h a t 11 o u t , t h e r e h a s b e e n n o s h o w i n g a n d n o e v i d e n c e f r o m P e r s o n a l 12 A u d i o o n t h a t p o i n t . N o n e . 13 W h y i s t h a t ? W e l l , w h e n I a s k e d t h e i r e x p e r t a b o u t 14 w h a t w a s k n o w n a n d u n d e r s t o o d , o n e o f t h e t h i n g s t h a t I a s k e d 15 h i m a b o u t , w h a t a p e r so n o f o r d i n a r y s k i l l i n t h e a r t w o u l d 16 u n d e r s t a n d t o b e a b l e t o d o a t t h e t i m e w a s s p e c i f i c a l l y a b o u t 17 c r e a t i n g a n u p d a t e d v e r s i o n o f a t a b l e o f c o n t e n t s f o r a w e b s i t e 18 w i t h l i n k s t o a m e d i a f i l e . 19 A n d s o I w i l l r e f e r t o t h e t r a n s c r i p t o f D r . N e l s o n , 20 g e n e r al l y f r o m p a g e 7 9 t h r o u g h p a g e 8 2 i s w h a t w e q u o t e d i n 21 o u r r e p l y . A n d I a m g o i n g t o r e a d t o y o u p a r t i c u l a r l y a t t h e e n d 22 o f t h a t s e r i e s o f q u e s t i o n s -- a c t u a l l y , I w i l l s t a r t a t t h e 23 b e g i n n i n g , j u s t t o s e t t h e c o n t e x t . 24
IPR2014-00070 Patent 8,112,504 59 I a s k e d h i m : " P e o p l e o f o r d i n a r y s k il l k n e w h o w t o 1 i n c l u d e m e d i a f i l e s s u c h a s p i c t u r e s i n t h e i r w e b p a g e s , r i g h t ? 2 " A n s w e r : Y e s . " T h a t ' s o n p a g e 7 9 f r o m 1 2 t o 1 6 . 3 A n d t h e n s k i p p i n g f o r w a r d t o p a g e 8 1 , m y q u e s t i o n 4 w a s : " S u p p o s e y o u h a v e a w e b s i t e t h a t h a s a w e b s i t e -- 5 e x c u s e m e , t h a t h a s 1 0 H T M L f i l e s a n d t e n i m a g e s a n d y o u 6 h a v e g o t -- y o u w o u l d k n o w " -- I a p o l o g i z e f o r m y b a d 7 q u e s t i o n i n g i n t h i s d e p o s i t i o n -- " y o u w o u l d k n o w h o w t o 8 g e n e r a t e a t a b l e o f c o n t e n t s . h t m l f i l e t h a t h a d l i n k s t o a l l 2 0 o f 9 t h o s e t h i n g s , r i g h t ? 10 " A n s w e r : O k ay . 11 " Q u e s t i o n : I s t h a t t r u e ? 12 " A n s w e r : Y e s . 13 " Q u e s t i o n : N o w , s a y t h a t p e r s o n c r e a t e d o n e m o r e 14 i m a g e a n d a d d e d i t t o t h e i r w e b s i t e . A r e y o u w i t h m e ? 15 " A n s w e r : Y e a h . 16 " Q u e s t i o n : W o u l d t h e p e r s o n o f o r d i n a r y s k i l l i n 17 1 9 9 6 k n o w h o w t o u p d a t e t h e t ab l e o f c o n t e n t s t o r e f e r t o t h a t 18 n e w i m a g e ? 19 " A n s w e r : Y e a h , I t h i n k s o . 20 " Q u e s t i o n : I s t h e s a m e t r u e i f t h e y a d d e d a n 1 1 t h 21 w e b p a g e , s o a n e w H T M L f i l e ? 22 " A n s w e r : R i g h t , I a g r e e . " 23 J U D G E S N E D D E N : I h a v e a q u e s t i o n . M r . F e m a l 24 i n a r g u m e n t s u g g e s t e d t ha t w h a t w a s p r e s e n t e d i n t h e C N N w e b 25
IPR2014-00070 Patent 8,112,504 60 p a g e i s n o t a n e p i s o d e b e c a u s e i t c o n t a i n s i n f o r m a t i o n t h a t i s 1 n o t s e r i a l l y r e l a t e d , m e a n i n g t h a t i t d i d n ' t m a t t e r w h a t o r d e r 2 y o u v i e w e d t h e s u b j e c t m a t t e r , b u t d o e s i t m a t t e r w h a t o r d e r 3 y o u w o u l d -- b e c a u s e t h e y w e r e un r e l a t e d i n t h a t r e g a r d . 4 T h e t i t l e o f t h i s p a t e n t d o e s s u g g e s t o r j u s t i s 5 s y s t e m s f o r d i s s e m i n a t i n g m e d i a c o n t e n t r e p r e s e n t i n g e p i s o d e s 6 i n a s e r i a l i z e d s e q u e n c e . A n d i n t h a t s e n s e i f I t h i n k a b o u t 7 w o r l d n e w s , i t w o u l d b e s e r i a l l y r e l a t e d i f i t w a s p r e s en t e d i n a 8 m a t t e r o f s a y , M o n d a y , T u e s d a y , W e d n e s d a y , w h e n w e ' r e j u s t 9 looking at Wednesday, is it still serialized in this way? Is that 10 -- h o w d o y o u a d d r e s s t h a t ? 11 M R . B R O W N : S o I b e l i e v e i t i s s t i l l s e r i a l i z e d . 12 A n d t h e s h o r t a n s w e r i s t h a t I b e l i e v e it i s s t i l l s e r i a l i z e d 13 b e c a u s e t h e r e i s t h e f i r s t s t o r y , t h e r e i s t h e s e c o n d s t o r y , a n d 14 t h e t h i r d s t o r y . A n d I b e l i e v e t h a t i s e x a c t l y w h a t i s d e s c r i b e d 15 i n t h e p a t e n t a s w h a t a s e r i a l i z e d s e q u e n c e i s . 16 S o I w o u l d l i k e t o j u s t r e f e r y o u , b e c a u s e I t h i n k 17 thi s i s a n i m p o r t a n t p o i n t , b a c k t o w h a t t h e p a t e n t a c t u a l l y s a y s 18 a b o u t e p i s o d e s . 19 A n d s o t h e r e i s t h r e e w o r d s h e r e t h a t a r e b e i n g 20 u s e d , p r o g r a m , s e g m e n t , a n d e p i s o d e . A n d t h e p a t e n t i n g r e a t 21 d e t a i l d i s c u s s e s p r o g r a m s e g m e n t s . S o I b e l i e v e t h e r e i s a l i t tl e 22 b i t o f c o n f u s i o n t h a t o c c u r s f r o m t r y i n g t o s e p a r a t e p r o g r a m 23 a n d s e g m e n t . B e c a u s e t h r o u g h o u t w h a t i s d e s c r i b e d i n t h i s 24
IPR2014-00070 Patent 8,112,504 61 p a t e n t i s h o w t o d i s t r i b u t e p r o g r a m s e g m e n t s , t h e c o m p i l a t i o n 1 f i l e p r o v i d e s t h e n e w p r o g r a m s e g m e n t s t o t h e s u b s c r i b e r . 2 A n d s o I a m j u s t g o i n g t o s t a r t b y r e f e r r i n g y o u t o 3 c o l u m n 1 8 , w h e r e t h e r e i s w h a t I b e l i e v e i s a n i n t e r e s t i n g t a b l e 4 w h i c h s h o w s t h e d a t a s t r u c t u r e f o r a p r o g r a m s e g m e n t . A n d I 5 w a n t t o p a r t i c u l a r l y c a l l o u t t o y o u , b e c a u s e i t i s a b o u t t o c o m e 6 u p i n t h e n e x t c o l u m n , c o l u m n 1 9 , t h a t t h e r e a r e -- h a n g o n , I 7 h a v e t o g e t i t -- t h a t i n t h e t a b l e o n c o l u m n 1 8 , I ' m s o r r y , 8 c o l u m n 1 7 , I a p o l o g i z e , o n e o f t h o s e d a t a -- t h e s e t s o f d a t a 9 f i e l d s a r e g r o u p I D , e p i s o d e . A n d t h a t i s a t l i n e 3 8 . 10 S o n o w i f w e g o o n t o c o l u m n 1 9 , t h is i s n o w t h e 11 p o r t i o n o f t h e p a t e n t t h a t t h e B o a r d w a s d e s c r i b i n g i n i t s e a r l i e r 12 q u e s t i o n s . I t e x p l a i n s , w h e n i t i s t a l k i n g a b o u t s e r i a l i z e d 13 s e q u e n c e o f p r o g r a m s , " a g i v e n p r o g r a m s e g m e n t m a y r e p r e s e n t 14 a n e p i s o d e i n a s e r i e s , w h i c h i s s e l e c t e d a s a g r o u p by a 15 s u b s c r i b e r . " 16 A n d I t h i n k r i g h t n o w w h a t w e k n o w s o f a r i s t h a t 17 a n e p i s o d e i s a t y p e o f p r o g r a m s e g m e n t t h a t c a n b e s e l e c t e d a s 18 a g r o u p b y a s u b s c r i b e r . A n d t h e n i t g o e s o n t o s a y -- a n d t h e 19 g r a m m a r , I b e l i e v e -- I b e l i e v e i t i s t h e r e i s a t y p o i n c ol u m n 20 1 9 . T h e g r a m m a r i s a l i t t l e c o n f u s i n g . B u t i t s a y s , " a 21 s u b s c r i b e r m a y s e l e c t a n i n d i v i d u a l p r o g r a m i n a s e r i a l 22 s e q u e n c e . " A n d w h i l e i t o n l y s a y s p r o g r a m t h e r e , I t h i n k i t i s 23 c l e a r f r o m t h e c o n t e x t , i t i s r e f e r r i n g t o t h e p r o g r a m s e g m e n t . 24
IPR2014-00070 Patent 8,112,504 62 A n d t h e n i t g o e s o n t o s a y , " t h e h o s t m a y t h e n 1 f u r t h e r i n s t a l l m e n t s o r r e l a t e d p r o g r a m s , " w h i c h d o e s n ' t m a k e 2 m u c h s e n s e t o m e . T o m e w h a t I t h i n k w h a t t h e y m e a n t t o s a y 3 w a s t h e h o s t m a y t h e n s e n d f u r t h e r i n s t a l l m e n t s o f r e l a t e d 4 p r o g r a m s w i t h i n t h e s e r i e s . 5 I n o th e r w o r d s , i t i s d e s c r i b i n g t w o p o s s i b i l i t i e s 6 w h e r e i f y o u s e l e c t o n e e p i s o d e i n a s e r i e s o f r e l a t e d s e g m e n t s , 7 i t m a y t h e n a u t o m a t i c a l l y s e n d y o u o t h e r -- f u r t h e r i n s t a l l m e n t s 8 o f r e l a t e d p r o g r a m s w i t h i n t h e s e r i e s . A n d i t i s t h a t s e n t e n c e 9 t h a t w e p o i n t e d t o i n o u r p e t i t i o n w h e n w e w e r e e x p l a i n i n g 10 " r e l a t e d . " 11 A n d I b e l i e v e t h a t t h a t p a r a g r a p h , w h e n i t i s r e a d , 12 s h o w s t h a t r e l a t e d -- s e g m e n t s a r e r e l a t e d a n d e p i s o d e s , w h e n 13 t h e y a r e p a r t o f a s e r i e s , a n d t h a t ' s w h a t t h i s p a t e n t s a y s . N o w , 14 t h e p a r t t h a t r e a l ly c l i n c h e s i t f o r m e , a n d t h e r e a s o n I p o i n t e d 15 o u t t h e t a b l e i n c o l u m n 1 7 i s t h e n e x t s e n t e n c e , w h i c h s a y s " t h e 16 p r o g r a m s e g m e n t r e c o r d c o n t a i n s a g r o u p I D f i e l d , w h i c h 17 s p e c i f i e s t h e s e r i e s a s a w h o l e a n d a n e p i s o d e i n t e g e r f i e l d 18 s p e c i f i e s t h e p o s i t i o n o f th e g i v e n p r o g r a m s e g m e n t w i t h i n t h e 19 s e r i a l i z e d s e q u e n c e . " 20 S o t h e p a t e n t i s e x p l a i n i n g t h e r e l a t i o n s h i p h e r e . 21 T h e s e g m e n t s a r e e p i s o d e s . T h e y f i t w i t h i n t h e s e r i e s a s a 22 w h o l e . T h e y h a v e a g r o u p I D f i e l d . A n d t h e y h a v e a n e p i s o d e 23 I D f i e l d , w h i c h i d e n t if i e s t h e m s p e c i f i c a l l y . 24
IPR2014-00070 Patent 8,112,504 63 A n d j u s t -- I h e a r d t h e b e e p -- b u t t o w r a p u p 1 q u i c k l y , u n d e r t h e d e f i n i t i o n o f e p i s o d e t h a t i s p r o v i d e d h e r e i n 2 c o l u m n 1 9 , t h e i r e x p e r t a c k n o w l e d g e d t h e s e a r e e p i s o d e s . T h a t 3 i s t h e d e f i n i t i o n t h a t i s p r o v i d e d i n c o l u m n 1 9 i s e x ac t l y w h a t 4 i s s u p p o r t e d b y t h e B o a r d ' s d e f i n i t i o n . 5 E v e n i f y o u r e m o v e t h e w o r d " r e l a t e d , " e v e n i f y o u 6 o n l y r e q u i r e t h e e p i s o d e s t o b e p a r t o f a s e r i e s , t h a t i s c l e a r l y 7 s a t i s f i e d b y w h a t i s d i s c l o s e d i n b o t h t h e C N N r e f e r e n c e a n d 8 Q u i r k s & Q u a r k s , b e c a u s e th e r e i s a s e r i e s o f s t o r i e s t h a t a r e 9 p a r t o f e a c h d a y ' s C N N N e w s r o o m b r o a d c a s t . T h e y w e r e 10 s e l e c t e d b y t h e C N N s t a f f t o b e p a r t o f t h a t 1 5-m i n u t e s e g m e n t 11 t h a t w a s b r o a d c a s t a t 3 : 4 5 a . m . f o r e d u c a t i o n a l u s e . 12 Y o u p r o b a b l y a r e n ' t g o i n g t o s e e g r a p h i c m u r d e r 13 s t o r i e s i n t h e r e . Y o u a r e g o i n g t o s e e s t o r i e s t h a t w e r e b e l i e v e d 14 t o b e a p p r o p r i a t e f o r u s e i n a n e d u c a t i o n a l s e t t i n g . T h a t w e r e 15 s p e c i f i c a l l y s e l e c t e d t o g e t h e r . 16 J U D G E W A R D : M r . B r o w n , w h a t a b o u t , y o u 17 m e n t i o n e d t h e P a t r i c k r e f e r e n c e . W h a t a b o u t t h e fa c t t h a t -- 18 a n d y o u a r e r e l y i n g s p e c i f i c a l l y o n t h e Q u i r k s & Q u a r k s r a d i o 19 p r o g r a m . 20 M R . B R O W N : Y e s . 21 J U D G E W A R D : F r o m w h a t I v i e w i n t h a t 22 r e f e r e n c e , i t o n l y d i s c l o s e s o n e Q u i r k s & Q u a r k s e p i s o d e . 23 M R . B R O W N : L e t m e g o t o s l i d e 2 0 . I b e l i e v e , 24 Y o u r H on o r , t h a t i t d i s c l o s e s r e g u l a r l y u p d a t i n g t h e Q u i r k s & 25
IPR2014-00070 Patent 8,112,504 64 Q u a r k s e p i s o d e s a v a i l a b l e o n t h e s e r v e r . I a m p u t t i n g o n p a g e 1 2 0 . A n d i t s a y s t h e s h o w i s r e g u l a r l y u p d a t e d o n t h e s e r v e r . 2 T h e h o u r-l o n g s h o w w a s a u t o m a t i c a l l y r e c o r d e d e a c h w e e k a n d 3 t h e n m a n u a l l y br o k e n i n t o f i v e- o r t e n-m i n u t e s e g m e n t s a t t h e 4 n a t u r a l b o u n d a r i e s . S o I t h i n k t h a t ' s e x p l a i n i n g t h a t i t w a s 5 r e c o r d e d m u l t i p l e t i m e s . 6 J U D G E W A R D : I h a v e o n e f i n a l q u e s t i o n f o r y o u 7 a n d I w i l l a s k m y c o l l e a g u e s i f t h e y h a v e a d d i t i o n a l o n e s . M y 8 f i n a l q u e s ti o n i s , d o y o u h a v e a p r o p o s a l w i t h r e s p e c t t o t h e 9 p e r s o n o f o r d i n a r y s k i l l i n t h e a r t ? 10 M R . B R O W N : Y o u r H o n o r , w e d i d h a v e a 11 p r o p o s a l . I n P e t i t i o n e r ' s r e s p o n s e , t h e y a r g u e d t h a t i t d i d n ' t 12 m a k e a n y d i f f e r e n c e . I b e l i e v e t h a t i s a t p a g e 8 . W e b e l i e v e 13 th e s a m e . W h e t h e r y o u a d o p t t h e i r p r o p o s a l o r o u r p r o p o s a l 14 i s n ' t g o i n g t o m a k e a d i f f e r e n c e . 15 A p e r s o n o f o r d i n a r y s k i l l i n t h e a r t b a s e d o n m y 16 q u e s t i o n s t o D r . N e l s o n , w h o w a s u s i n g h i s o w n d e f i n i t i o n o f 17 p e r s o n o f o r d i n a r y s k i l l , k n e w h o w t o c r e a t e a n u pd a t e d t a b l e o f 18 c o n t e n t s f i l e , k n e w w h a t a l i n k w a s , k n e w t h a t w h e n y o u h a d a 19 l i n k t o f o l l o w o r t o d o w n l o a d f i l e -- 20 J U D G E W A R D : S o y o u a c c e p t t h e P a t e n t O w n e r ' s 21 p r o p o s a l t h a t i t i s a p e r s o n w i t h a n u m b e r o f y e a r s o f 22 e x p e r i e n c e i n w e b p a g e d e v e l o p m e n t ; i s t h a t c o r r e c t ? 23 M R . B R O W N : I f t h a t ' s -- I w a n t t o b e c a r e f u l 24 b e c a u s e I a m n o t s u r e t h a t w a s e x a c t l y t h e p r o p o s a l i n t h e i r 25
IPR2014-00070 Patent 8,112,504 65 r e s p o n s e . I w o u l d a c c e p t t h e p r o p o s a l i n t h e i r r e s p o n s e , w h i c h 1 i s w h a t I u n d e r s t o o d D r . N e l s o n t o b e t e s t i f y i n g a b o u t . 2 J U D G E W A R D : O k a y . T h a n k y o u . 3 J u d g e S n e d d e n , a n y q u e s t i o n s f r o m y o u ? 4 J U D G E S N E D D E N : I h a v e n o n e . 5 J U D G E W A R D : J u d g e A n d e r s o n , a n y f u r t h e r 6 q u e s t i o n s ? 7 J U D G E A N D E R S O N : N o , J u d g e W a r d . T h a n k y o u . 8 J U D G E W A R D : A l l r i g h t . W e s t a n d a d j o u r n e d . 9 T h a n k y o u . 10 ( W he r e u p o n , a t 2 : 3 8 p . m . , t h e h e a r i n g c o n c l u d e d . ) 11
IPR2014-00070 Patent 8,112,504 66 For PETITIONER: NICHOLAS A. BROWN, ESQ. Greenberg Traurig LLP 4 Embarcadero Center, Suite 3000 San Francisco, CA 94111 415-655-1271 and RICHARD C. PETTUS, ESQ. Greenberg Traurig LLP 200 Park Avenue New York, New York 10166 212-801-9387 For PATENT OWNER: MICHAEL J. FEMAL, ESQ. Much Shelist, P.C. 191 North Wacker, Suite 1800 Chicago, Illinois 60606-2000 312-521-2768
-------------------------------------------------------------------------------------------------------------
eff podcadting uspto
Fri, 10 Apr 2015 20:35
Trials@uspto.gov Paper 41 571-272-7822 Entered: April 10, 2014 UNITED STATES PATENT AND TRADEMARK OFFICE ____________ BEFORE THE PATENT TRIAL AND APPEAL BOARD ____________ ELECTRONIC FRONTIER FOUNDATION Petitioner, v. PERSONAL AUDIO, LLC Patent Owner. ____________ Case IPR2014-00070 Patent 8,112,504 B2 ____________ Before SHERIDAN K. SNEDDEN, TRENTON A. WARD, and GREGG I. ANDERSON, Administrative Patent Judges. ANDERSON, Administrative Patent Judge. FINAL WRITTEN DECISION 35 U.S.C. § 318(a) and 37 C.F.R. § 42.73
Case IPR2014-00070 Patent 8,112,504 B2 2 INTRODUCTION On October 30, 2013, Electronic Frontier Foundation (''Petitioner'') filed a revised Petition requesting an inter partes review of claims 31''35 of U.S. Patent No. 8,112,504 B2 (Ex. 1001, ''the '504 patent''). Paper 6 (''Pet.''). On April 18, 2014, we granted the Petition and instituted trial for claims 31''35 of the '504 patent on less than all of the grounds of unpatentability alleged in the Petition. Paper 21 (''Decision on Institution'' or ''Dec.''). After institution of trial, Personal Audio, LLC (''Patent Owner'') filed a Patent Owner Response. Paper 30 (''PO Resp.''). Petitioner filed a Reply. Paper 34 (''Pet. Reply''). An oral hearing was held on December 17, 2014. The transcript of the hearing has been entered into the record. Paper 40 (''Tr.''). We have jurisdiction under 35 U.S.C. § 6(c). This Final Written Decision is issued pursuant to 35 U.S.C. § 318(a). A. Related Proceedings Petitioner indicates the '504 patent is involved in co-pending proceedings, including: (i) Personal Audio, LLC v. CBS Corp., No. 2:13-cv-270 (E.D. Tex. Apr. 11, 2013); (ii) Personal Audio, LLC v. NBC Universal Media, LLC, No. 2:13-cv-271 (E.D. Tex. Apr. 11, 2013); (iii) Personal Audio, LLC v. Ace Broadcasting Network, LLC, No. 2:13-cv-14 (E.D. Tex. Jan. 7, 2013); (iv) Personal Audio, LLC v. Howstuffworks.com, No. 2:13-cv-15 (E.D. Tex. Apr. 10, 2013); (v) Personal Audio, LLC v. Togi Entertainment, Inc., No. 2:13-cv-13 (E.D. Tex. Jan. 7, 2013); (vi) Fox Networks Group, Inc. v. Personal Audio, LLC, No. 1:13-cv-11794 (D. Mass.
Case IPR2014-00070 Patent 8,112,504 B2 3 July 26, 2013); and (vii) Personal Audio, LLC v. Fox Broadcasting Co., No. 2:13-cv-577 (E.D. Tex. Aug. 6, 2013). Pet. 1''2, Paper 28. B. The '504 patent The '504 patent broadly relates to a player for audio programming, which includes functions that allow the listener to control many aspects of the playback. Ex. 1001, 2:21''56. As relevant to the claims under consideration, the '504 patent relates to how audio program segments are distributed to client subscriber locations. Ex. 1001, Abstract. Figure 1 of the '504 patent is reproduced below: Figure 1 is a block diagram of the invention that illustrates using the Internet to connect host computer 101 to audio player 103. Ex. 1001, 4:39''42. Host server 101 periodically transmits download compilation file 145 upon receiving a request from player 103. Id. at 6:60''62. The compilation file extracts data from library 130 based on the selections of the user as specified
Case IPR2014-00070 Patent 8,112,504 B2 4 in the subscriber data and usage log database 143. Id. at 7:3''9. The file is placed in a predetermined FTP download file directory and assigned a filename known to the player. Id. at 6:62''64. Using clock 106, at a time determined by the player, a dial up connection is established via service provider 121 and the Internet to FTP server 125, and the download compilation is transferred to program data store 107 in the player. Id. at 6:64''7:1. Once downloaded, the user plays program data 107 using the functionality of the player. Id. at 4:44''60. The invention includes the ability for the user to select a program segment, which may represent an episode in a series. Ex. 1001, 19:35''38. When a serialized sequence is requested, the host may download less than all of the episodes, when all are not yet available. Id. at 19:45''49. Episodes that have not issued yet may be selected. Id. at 20:64''21:3. C. Illustrative Claim Claim 31 is the only independent claim challenged and is reproduced below: 31. Apparatus for disseminating a series of episodes represented by media files via the Internet as said episodes become available, said apparatus comprising: one or more data storage servers, one or more communication interfaces connected to the Internet for receiving requests received from remotely located client devices, and for responding to each given one of said requests by downloading a data file identified by a URL specified by said given one of said requests to the requesting client device, one or more processors coupled to said one or more data storage servers and to said one or more communications interfaces for:
Case IPR2014-00070 Patent 8,112,504 B2 5 storing one or more media files representing each episode as said one or more media files become available, each of said one or more media files being stored at a storage location specified by a unique episode URL; from time to time, as new episodes represented in said series of episodes become available, storing an updated version of a compilation file in one of said one or more data storage servers at a storage location identified by a predetermined URL, said updated version of said compilation file containing attribute data describing currently available episodes in said series of episodes, said attribute data for each given one of said currently available episodes including displayable text describing said given one of said currently available episodes and one or more episode URLs specifying the storage locations of one or more corresponding media files representing said given one of said episodes; and employing one of said one or more communication interfaces to: (a) receive a request from a requesting client device for the updated version of said compilation file located at said predetermined URL; (b) download said updated version of said compilation file to said requesting client device; and (c) thereafter receive and respond to a request from said requesting client device for one or more media files identified by one or more corresponding episode URLs included in the attribute data contained in said updated version of said compilation files. D. Grounds Upon Which Trial Was Instituted Inter partes review was instituted on two ground: (1) that claims 31''35 of the '504 patent were anticipated under 35 U.S.C.
Case IPR2014-00070 Patent 8,112,504 B2 6 § 102(a) by Patrick/CBC;1 and (2) claims 31''35 would have been obvious under 35 U.S.C. § 103(a) over Compton/CNN.2 Dec. 26. ANALYSIS A. Claim Construction In an inter partes review, claim terms in an unexpired patent are interpreted according to their broadest reasonable construction in light of the specification of the patent in which they appear. 37 C.F.R. § 42.100(b); In re Cuozzo Speed Techs., LLC, 778 F.3d 1271, 1279''83 (Fed. Cir. 2015). If an inventor acts as his or her own lexicographer, the definition must be set forth in the specification with reasonable clarity, deliberateness, and precision. Renishaw PLC v. Marposs Societa' per Azioni, 158 F.3d 1243, 1249 (Fed. Cir. 1998). The terms also are given their ordinary and customary meaning as would be understood by one of ordinary skill in the art in the context of the disclosure. In re Translogic Tech., Inc., 504 F.3d 1249, 1257 (Fed. Cir. 2007). 1. ''episode'' (Claims 31''35) Petitioner proposes ''episode'' be construed as ''a program segment, represented by one or more media files, that is part of a series of related segments, e.g. a radio show or a newscast.'' Pet. 11''12; Pet. Reply 8. Petitioner notes that the Specification describes an episode as a program segment that is part of a series (i.e., a sequence of related segments). 1 Andrew S. Patrick, et al, CBC Radio on the Internet: An Experiment in Convergence, 21 CANADIAN J. OF COMM'N 1, 125-140 (1996)(''Patrick/CBC,'' Ex. 1012). 2 Charles L. Compton, Internet CNN NEWSROOM: The Design of a Digital Video News Magazine, Massachusetts Institute of Technology (Aug. 10, 1995)(''Compton/CNN,'' Ex. 1022).
Case IPR2014-00070 Patent 8,112,504 B2 7 Pet. 11, (citing Ex. 1001, 19:35''42). Petitioner also argues that ''program segment[s]'' may be combined with other ''related program segments'' to form a subsection of the overall compilation. Pet. Reply 6''8 (citing Ex. 1001, 29:28''34). Petitioner argues the related program segments disclosed in the '504 patent include, among other things, world, national and local news. Id. (citing Ex. 1001, 30:18''25). Patent Owner proposes that ''episode'' should be construed as ''a program, represented by one or more media files, that is a part of a series.'' PO Resp. 10 (emphasis omitted). Patent Owner notes that the '504 patent references the episodes in a serialized sequence.'' Id. at n. 3. Patent Owner also cites to the Specification as stating that: . . . programming may include serialized sequences of programs. A given program segment may represent an episode in a series which is selected as a group by the subscriber. Id. (citing Ex. 1001, 19:36''37; see Ex. 1001, 19:35''20:11; 20:57''21:3; 39:35''46; 43''45:67; 46:1''52:11). Notwithstanding the preceding, Patent Owner argues our final construction of ''episode'' is not determinative of the outcome here because ''episode,'' as well as ''compilation file,'' are ''further qualified by the plain and ordinary meaning of other claim language,'' which is dispositive. PO Resp. 11 (emphasis omitted). To summarize the parties' respective positions, Petitioner proposes that episodes are related program segments. Patent Owner argues that an episode is a program, not a segment thereof, that is part of a series. At the final hearing, Patent Owner argued the difference between episodes and segments is that episodes must be related to each other, while segments are not related. Tr. 22:14''21. However, Patent Owner acknowledges that the
Case IPR2014-00070 Patent 8,112,504 B2 8 Specification states that a given ''program segment may represent an episode in a series.'' PO Resp. 10, n.3. The Specification lists several forms of programming that a ''subscriber may select.'' See Ex. 1001, 19:38''42.3 In that portion of the Specification cited by both parties, the only mention of ''episode'' states that ''[a] given program segment may represent an episode in a series which is selected as a group by the subscriber.'' Id. at 19:36''38 (emphasis added). In support of its construction, Patent Owner argued at the final hearing episodes are television programs. Tr. 25:14''18; 40:1''7. The Specification is not so limited and lists, among other things, news programming as part of the ''overall program compilation.'' Ex. 1001, 29:8''12; 30:18''25. We are not persuaded by Patent Owner's argument that the Specification is limited to segments and the claims refer to episodes. See Tr. 26:16 ''20. Neither party argued that the limitation ''series of episodes,'' as it appears in the preamble of challenged claim 31, has any different meaning from ''episode'' alone. We give ''series,'' and therefore, ''series of episodes,'' its ordinary and customary meaning in the context of our construction of ''episode.'' Thus, we conclude that related program segments are included in the broadest reasonable interpretation of ''episode.'' We construe ''episode'' to mean ''a program segment, represented by one or more media files, which is part of a series of related segments, e.g., a radio show or a newscast.'' 3 Neither declarant proposes or argues claim construction for any claim term. See Declaration of Chris Schmandt (''Schmandt Declaration,'' Ex. 1002 ¶ 11); Declaration of Peter C. Nelson (''Nelson Declaration,'' Ex. 2004 ¶¶ 37''39).
Case IPR2014-00070 Patent 8,112,504 B2 9 2. ''compilation file'' (Claims 31''35) Petitioner proposes ''compilation file'' be construed as ''any file that contains information about multiple episodes and satisfies the other claim requirements.'' Pet. 12''13; Pet. Reply 8. Petitioner argues that the Specification describes the ''compilation file'' as simply an ordinary file that contains the information required by the claim. Id. (citing Ex. 1001, 6:60''64, 7:10''22). Patent Owner contends that our construction of particular words or phrases is ''not material'' to Patent Owner's arguments in its Response. PO Resp. 11. Rather, the words or phrases, particularly ''compilation file,'' are ''further qualified by the plain and ordinary meaning of other claim language.'' Id.(emphasis omitted). As a result of the preceding, Patent Owner has no proposed construction for ''compilation file.'' In our Decision on Institution we preliminarily construed compilation file as ''a file that contains episode information.'' Dec. 8. This construction was supported by, among other things, the Specification, which describes the compilation file as ''one or more subscriber and session specific files which contain the identification of separately stored sharable files.'' Id. (citing Ex. 1001, 7:10''13). Episode information in the compilation file of claim 31, which states the ''compilation file contain[s] . . . attribute data describing currently available episodes in said series of episodes.'' At the final hearing, Patent Owner objected to our preliminary construction because it included the term ''episode,'' but did not articulate any reason for the objection to the inclusion of episode. Tr. 32:10''14. Patent Owner argues additionally that the cited references do not include a compilation file at all. Tr. 32:15''22. However, Patent Owner does not
Case IPR2014-00070 Patent 8,112,504 B2 10 make any specific argument regarding how we should construe ''compilation file.'' Instead, Patent Owner's argument relies on arguments relating to its proposed construction of ''episode.'' Tr. 33:3''34:23. As discussed above, we also have considered the claim language, which Patent Owner argues qualifies the construction of compilation file. PO Resp. 11. Claim 31 recites, in pertinent part, ''storing an updated version of a compilation file in one of said one or more data storage servers at a storage location identified by a predetermined URL.''4 Claim 31 (emphasis added). Patent Owner contends that the ''updated compilation file'' includes information from previous compilation files. Tr. 46:17''21. As used in claim 31, however, ''updated'' does modify ''compilation file,'' but rather it modifies ''version.'' The meaning of ''updated'' does not require express construction. Thus, we determine the broadest reasonable interpretation of ''compilation file'' is ''a file that contains episode information.'' 3. ''media file'' (Claims 31''35) Petitioner proposes that ''media file'' be construed as ''a file with content that can be reproduced as video, audio, and/or text.'' Pet. 13; Pet. Reply 9. Petitioner points to claims 32 and 33 as reciting that the media file includes ''digital compressed audio'' and/or ''text data.'' Id. (citing Ex. 1001, claims 32''33). Patent Owner does not propose a meaning for the term and does not object to our preliminary construction in the Decision on Institution. See PO Resp. 9''11. 4 Claim 1, which is not challenged here, also references the ''current version'' of a compilation file.
Case IPR2014-00070 Patent 8,112,504 B2 11 The Specification does not define or describe the term ''media files'' beyond the recitation of the term in the claims. The customary and ordinary meaning of ''media'' is consistent with Petitioner's proposed construction of ''media files.'' Thus, we determine the broadest reasonable interpretation of ''media files'' is ''a file with content that can be reproduced as video, audio, and/or text.'' B. Obvious over Compton/CNN (Claims 31''35) Petitioner contends that claims 31''35 of the'504 patent are obvious under 35 U.S.C. § 103 over Compton/CNN (Ex. 1022). Pet. 16, 45''59. To support this position, Petitioner presents the Schmandt Declaration. Ex. 1002 ¶¶ 72''85. 1. Compton/CNN Overview Compton/CNN describes the design of a digital video newsroom based on the video program CNN NEWSROOM.5 Ex. 1022, Abstract. Compton/CNN describes that the CNN NEWSROOM uses MPEG digital video and is distributed via the World Wide Web on the Internet. Id. CNN NEWSROOM is disclosed as being distributed via cable television systems as well as directly to schools via satellite. Ex. 1022, 11.6 Compton/CNN describes that an important aspect of the Internet deployment of CNN NEWSROOM is the development of a searchable digital library of 5 Exhibit 1022 also uses ''CNN Internet NEWSROOM,'' ''Internet CNN NEWSROOM,'' and ''Internet NEWSROOM.'' We generally will refer to these disclosed video programs as ''CNN NEWSROOM.'' 6 Page references are to the actual page numbers of Exhibit 1022 and not to Petitioner's Exhibit pages.
Case IPR2014-00070 Patent 8,112,504 B2 12 CNN NEWSROOM programs and segments. Id. at 14. CNN NEWSROOM is disclosed as being archived for six months. Id. at 15. Figure 1 of Compton/CNN is reproduced below. Figure 1 shows the Table of Contents for a particular day's programming. Ex. 1022, 14. Figure 1 further shows the Table of Contents as an HTML document that consists of a short summary and an icon or title for each segment of the program, where a segment corresponds to a single news story. Id.
Case IPR2014-00070 Patent 8,112,504 B2 13 Figure 6 of Compton/CNN is reproduced below. Figure 6 illustrates a hardware hierarchy for network video distribution. Ex. 1022, 23''24. Caching proxy servers store video content. Id. Only one caching server is required for Internet connectivity. Id. at 23. Ultimately, video is delivered over the Internet to the subscribing caching servers for display. Ex. 1022, 25. The programming includes past episodes of other news programs, sitcoms, and soap operas. Id. at 29. 2. Claims 31''35 as Obvious over Compton/CNN We begin our obviousness analysis by determining the level of ordinary skill in the art. KSR Int'l Co. v. Teleflex Inc., 550 U.S. 398, 406 (2007)(citing Graham v. John Deere Co., 383 U.S. 1, 17''18 (1966)). At the final hearing Patent Owner relied on the Nelson Declaration to argue the level of ordinary skill is not a ''high level.'' Tr. 29:1''12. The Nelson Declaration says the level of ordinary skill is an ''undergraduate degree in
Case IPR2014-00070 Patent 8,112,504 B2 14 computer science or a few years' experience in working with web sites and programming.'' Ex. 2004 ¶ 34. We find credible the Nelson Declaration's testimony that at the time the invention was conceived, 1994''1996, web developers did not necessarily have formal training. Id. Petitioner agrees with Patent Owner's position. Tr. 64:21''65:2. Thus, we adopt the level of ordinary skill proposed by Patent Owner. Petitioner contends the disputed limitations of claim 31 are taught by Compton/CNN specifically including: (1) episodes; (2) an updated compilation file; and (3) a ''predetermined URL'' for the compilation file. See Pet. Reply 1. Patent Owner statement of the issues is very similar, i.e., that neither Compton/CNN or Patrick/CBC (discussed below) disclose claim limitations related to new episodes, updating the compilation file, and a predetermined URL for the compilation file. PO Resp. 46''47 (citing Ex. 2004 ¶¶ 18, 21, 56, 61, 63). We first address the limitations both parties find to be in dispute. To the extent not addressed in our analysis, Patent Owner's arguments that other claim 31 limitations or dependent claim limitations are not shown will be addressed separately. See PO Resp. 35''37; Ex. 2004 ¶¶ 51''63. a. Whether Compton/CNN teaches ''episodes'' Petitioner argues CNN Newsroom describes a system for distributing a ''video magazine'' via the Internet. Pet. 53 (citing Ex. 1022, 13). Further, the video broadcast each day by CNN Newsroom is broken out into segments that each ''corresponds to a single news story.'' Id. (citing Ex. 1022 at 14). Compton/CNN teaches that the segments were encoded in MPEG-1 media files. Id. (citing Ex. 1022 at 7). Petitioner notes that Compton/CNN explains that the same system could be used for ''any other
Case IPR2014-00070 Patent 8,112,504 B2 15 program for which users might want to be able to see past episodes (i.e., other news programs, sitcoms, soap operas . . . [)]'' Id. (citing Ex. 1022 at 29). Petitioner argues that the ''displayable text'' in the Table of Contents describes the ''episode,'' i.e., segment. Pet. 56, Pet. Reply 6. Petitioner contends the Table of Contents includes URLs specifying media files representing the ''episode'' which can be downloaded. Id. (citing Ex. 1002 ¶¶ 24''33; see also Ex. 1022 at 25 (user clicking on a link an entire MPEG file is downloaded to user's hard disk). Petitioner argues that testimony by Patent Owner's declarant, Dr. Nelson, at his deposition (Ex. 1031), supports its position that Compton/CNN teaches ''episodes.'' Pet. Reply 6. Specifically, Dr. Nelson, at his deposition, acknowledges that, under our construction of ''episode,'' Compton/CNN Figure 1 discloses ''episodes.'' Id. (citing Ex. 1031, 88:14''24. Patent Owner's opposition to a determination that ''episodes'' are not disclosed in Figure 1 of Compton/CNN relies on our accepting its construction of ''episode.'' As discussed above, Patent Owner argues ''episode'' should be construed as ''a program, represented by one or more media files, that is a part of a series.'' PO Resp. 10 (emphasis omitted). Thus, based on its proposed construction that an episode is part of a ''series,'' Patent Owner contends the news stories of Figure 1 of Compton/CNN are ''not different episodes but rather part of the single May 19, 1994 episode.'' Id. at 38. Patent Owner also argues the news segments are neither a series nor are they a program. Id. at 38''39.
Case IPR2014-00070 Patent 8,112,504 B2 16 Our construction of ''episode,'' however, leads us to reject Patent Owner's argument that episodes must be either a program or in a given order. See Tr. 39:24''40:7. Nor are we persuaded that a theme between episodes is required. Tr. 38:6''11. As we noted in our construction analysis, the Specification specifically lists new programming as being part of a compilation file of ''episodes.'' Ex. 1001, 30:18''25. Additionally, Patent Owner argues the May 19 news segments disclosed in Compton/CNN are not ''updated,'' as claim 31 requires. Id. at 39. This argument relates to the ''updated version of a compilation file'' limitation, which we discuss next. Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, Compton/CNN discloses ''episodes'' as claimed. b. Whether Compton/CNN teaches an ''updated version of a compilation file'' Claim 31 recites that a ''compilation file'' is updated from ''time to time, as new episodes represented in said series of episodes become available.'' As already discussed, the Table of Contents of Compton/CNN (see Figure 1 above) is relied on by Petitioner to show a ''compilation file.'' Pet. 55 (citing Ex. 1002 ¶ 78). Petitioner argues that the ''displayable text'' in the Table of Contents describes the ''episode,'' i.e., segment. Id. at 56. Petitioner contends it would have been obvious to update the compilation file as new segments are produced. Id. at 50 (citing Ex. 1002 ¶ 78; 1022, 13''14). In the first instance, Patent Owner argues the Table of Contents of Compton/CNN is not a compilation file at all because it ''described one
Case IPR2014-00070 Patent 8,112,504 B2 17 episode only.'' PO Resp. 40. Based on our construction of ''episode'' and ''compilation file,'' there are two news segments, i.e., ''episodes,'' identified in the Table of Contents of Compton/CNN. Accordingly, we disagree with Patent Owner's premise, that the two news segments, i.e., ''episodes,'' identified in the Table of Contents are only a single episode. Furthermore, we are persuaded that the Table of Contents is a ''compilation file'' as we have construed the term, i.e., ''a file that contains episode information.'' Additionally, Patent Owner argues the Table of Contents page is devoted to a single day, May 19, 1994, and, therefore, is ''not updated as new episodes become available.'' PO Resp. 39 (emphasis in original). Patent Owner contends each day a different Table of Contents page at a different URL is created. Id. Petitioner responds that ''the fact that a contents.html file is stored at a different URL for each day does not imply that the contents.html file is not 'updated.''' Pet. Reply 3. Petitioner contends the program ''contents.c'' runs each day and a new version of the contents.html file ''describes the news segments that became available that day.'' Id. (citing Ex. 1022, Fig. 3,18''19, 13''14)(emphasis in original). . Petitioner again cites to Dr.Nelson's deposition for testimony that Compton/CNN describes updating the ''contents.html'' file. Id. (citing Ex. 1031, 91:15''18; see 90:10''91:14). As Petitioner argues, the updated ''compilation file'' limitation is met if the ''compilation file'' is overwritten. Pet. Reply 4. Patent Owner argued at the final hearing that updating required some information be retained from the previous compilation file. Tr. 46:17''21. Patent Owner's basis for this position is that the Table of Contents contains a single ''episode,'' and not a series of episodes or ''[a]ll of the episodes required for a compilation.''
Case IPR2014-00070 Patent 8,112,504 B2 18 Tr.47:15''22, 48:18''23. We have determined already that the Table of Contents includes more than one segment, i.e., ''episodes.'' There is no claim language limiting how the updating of the compilation file occurs. Claim 31 states that as ''new episodes'' become available, an ''updated version of the compilation file'' is created including the new episodes. Ex.1001, 50:52''53. We have reviewed the Nelson Declaration, which states that Compton/CNN discloses ''HTML that was present at a single point'' and does not include ''disclosure that the HTML was updated.'' Ex. 2004 ¶ 52. This is the same contention rejected above, that the Table of Contents, i.e., the ''HTML . . . at a single point,'' must be updated with new information on an ongoing basis. Other testimony from the Nelson Declaration relating to updated compilation files does not persuade us differently. See, e.g., Ex. 2004 ¶ 61. Because the claim language does not include a limitation that would prohibit creating a new file on a daily basis from being an update, we find that Compton/CNN teaches an updated compilation file. The episodes listed in one compilation file for one day which are updated for the next day are related segments concerning the news. See Ex. 1022, 10. The new episode is thus listed in the updated compilation file, as required by claim 31. Even if we accept Patent Owner's argument regarding updating, we agree with Petitioner that it would have been obvious to update the Table of contents by ''amendment'' as opposed to creating a new file on a daily basis. Pet. Reply 4. According to the Schmandt Declaration, the ''URL is partially visible in Figure 1 '' the table of contents was accessed at: http://www.nmis.org/NewsInteractive/CNN/Newsroom/940519/cont[ents.ht
Case IPR2014-00070 Patent 8,112,504 B2 19 ml].'' Ex. 1002 ¶ 78. ''[I]t would require only a trivial modification to use the described system to create an updated table of contents HTML file at a single predetermined URL, such as 'todaysnews.html.''' Id. ¶ 79. We are persuaded by a preponderance of the evidence that Petitioner's rationale for obviousness is supported by rational underpinnings. KSR 550 U.S. at 418. For example, Compton/CNN already archives past programming on the server, making that programming separately accessible to users. See Ex. 1022, 15. We agree that making all the programming available at a single URL would have been a ''trivial modification'' obvious to a person of ordinary skill in the art. See, e.g., Ex. 1002 ¶ 79. Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, Compton/CNN discloses an updated ''compilation file'' as claimed. c. Whether Compton/CNN includes a ''predetermined URL'' Compton/CNN discloses the automatic generation of a WWW user interface for daily content. Ex. 1022, 7. Further, Compton/CNN captures video using the FTP protocol and delivers the files to the server. Id. at 22. Compton/CNN discloses links to the listed content in its teaching that ''[c]ustom software agents have been developed to automatically generate the WWW user interface for the service based on daily content.'' Id. at 7. Compton/CNN goes on to state ''[t]his means that results can be delivered to any host on the Internet supporting the ftp protocol.'' Id. at 22. Petitioner relies upon these disclosures and the testimony in the Schmandt Declaration to argue links in the Table of Contents would be understood to be unique episode URLs. Pet. 55 (citing Ex. 1002 ¶ 77).
Case IPR2014-00070 Patent 8,112,504 B2 20 Patent Owner again contends that the Table of Contents of Compton/CNN discloses a single episode only and not a series of episodes. PO Resp. 39. The Nelson Declaration is cited for support that Compton/CNN does not disclose ''a single predetermined URL where a user can access multiple episodes of a series of episodes at a single place.'' Id. at 47 (citing Ex. 2004 ¶¶ 58''59). This argument is not persuasive for reasons already discussed. Specifically, the Table of Contents includes information about at least two episodes. Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, Compton/CNN discloses a ''predetermined URL'' as claimed. d. Additional Claim Limitations Patent Owner argues other limitations of claim 31 and the dependent claims are not taught by Compton/CNN. PO Resp. 35''37; Ex. 2004 ¶¶ 51''63. Patent Owner provides a claim chart reproducing in bold claim limitations it contends are not disclosed or suggested by Compton/CNN. PO Resp. 35''37; Ex. 2004 ¶¶ 51''63. The claim chart is unpersuasive that any claim limitation is missing. Patent Owner does not argue the computer components claimed, i.e., servers, communications interfaces, processors, or requesting client device, are not disclosed to a person of ordinary skill. See Tr. 29:13''30:2; 42:7''44:4. The Schmandt Declaration supports the conclusion that the presence of such components would be trivial to the person of ordinary skill in the art.
Case IPR2014-00070 Patent 8,112,504 B2 21 Ex. 1002 ¶ 47 (disclosure of a ''server . . . necessarily would have included processors and a communication interface'').7 Patent Owner additionally cites to the Nelson Declaration for its contention that Compton/CNN lacks disclosure of certain claim limitations. PO Resp. 45''47. Patent Owner's Response states that the Nelson Declaration ''[i]n essence'' supports the Response. Id. at 46. As specifically pertinent to Compton/CNN, Patent Owner restates the argument we rejected above that ''at most, Compton/CNN discloses HTML that was present at a single point.'' Id. at 47 (citing Ex. 2004 ¶¶ 52, 58''59). We have reviewed paragraphs 51 through 63 of the Nelson Declaration. See Ex. 2004 ¶¶ 51''63. These paragraphs discuss Compton/CNN, alleging limitations discussed previously here are not present and alleging the Schmandt Declaration is conclusory regarding obviousness. Id. The Nelson Declaration presents no new arguments for our consideration regarding claim 31. e. Dependent Claims 32''35 We also have reviewed the Petitioner's argument and evidence and claim charts in connection with dependent claims 32''35. Pet. 51''53, 57''59. The argument is supported by the Schmandt Declaration. Ex. 1002 ¶¶ 82''85. Patent Owner goes through the limitations of claims 32''35 in the Examiner's Reasons for Allowance section discussed immediately below. PO Resp. 45. Patent Owner makes no specific argument regarding the 7 Althoughthis testimony relates specifically to the Geek of the Week references (Exs. 1008''1011, 1019''1020, and 1023''1028), on which we did not institute trial, we credit it for the discussion of basic Internet hardware components.
Case IPR2014-00070 Patent 8,112,504 B2 22 dependent claims other than stating that the elements argued as not taught by Compton/CNN in connection with claim 31 are likewise missing from the dependent claims 32''35. Id. at 44. This argument is unpersuasive for reasons discussed above in connection with claim 31 f. Examiner's Reasons for Allowance Patent Owner contends the grounds under review do not address the Examiner's Reasons for Allowance. PO Resp. 43''45. The Reasons for Allowance states, in part: The prior art does not provide for nor suggest for updating/downloading current version of a compilation file containing attribute data describing episodes and including one or more episode URLs identifying one or more corresponding media files representing said given one of said episodes. PO Resp. 44 (see Prosecution History of '504 patent, Ex. 2002, 2) (emphasis omitted). We are not bound by an Examiner's determinations in the prosecution of a patent in an inter partes review proceeding. To the extent Patent Owner points out that the Examiner had reasons for allowing the claims, we acknowledge those reasons. The record here does not disclose that the Examiner was considering the Compton/CNN reference when drafting the Reasons for Allowance. 3. Conclusion Regarding Claims 31''35 as Obvious over Compton/CNN Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, that claims 31''35 would have been obvious under 35 U.S.C. § 103(a) over Compton/CNN.
Case IPR2014-00070 Patent 8,112,504 B2 23 C. Claims 31''35 as Anticipated by Patrick/CBC Petitioner alleges Patrick/CBC is prior art anticipating claims 31''35 of the'504 patent under 35 U.S.C. § 102(a).8 Pet. 16, 35''45. Petitioner relies on the Schmandt Declaration to support its position. Ex. 1002 ¶¶ 58''71. Petitioner's supporting argument for anticipation relies heavily on the Schmandt Declaration and what a person of ordinary skill would understand from what is disclosed in the four corners of the Patrick/CBC reference. See, e.g., Ex. 1002 ¶¶ 66''67; see Tr. 17:17''20. Patent Owner contends that Petitioner must rely on inherency to find that Patrick/CBC discloses certain claim limitations. PO Resp. 26. Patent Owner's statement is based on Petitioner's reliance on the Schmandt Declaration for what a person of ordinary skill would understand from Patrick/CBC, as well as our analysis in the Decision on Institution. Id. In order for a prior art reference to serve as an anticipatory reference, it must disclose every limitation of the claimed invention, either explicitly or inherently. In re Schreiber, 128 F.3d 1473, 1477 (Fed. Cir. 1997). We must analyze prior art references as a skilled artisan would. See Scripps Clinic & Res. Found. v. Genentech, Inc., 927 F.2d 1565, 1576 (Fed. Cir. 1991), overruled on other grounds by Abbott Labs. v. Sandoz, Inc., 566 F.3d 1282 (Fed. Cir. 2009) (to anticipate, ''[t]here must be no difference between the claimed invention and the reference disclosure, as viewed by a person of ordinary skill in the field of the invention''). As the Federal Circuit has held: 8 The '504 patent was filed prior to the effective date of § 102, as amended by the AIA'--March 16, 2013'-- and is governed by the pre-AIA version of § 102(a). See AIA § 3(n)(1).
Case IPR2014-00070 Patent 8,112,504 B2 24 This modest flexibility in the rule that ''anticipation'' requires that every element of the claims appear in a single reference accommodates situations where the common knowledge of technologists is not recorded in the reference; that is, where technological facts are known to those in the field of the invention, albeit not known to judges. It is not, however, a substitute for determination of patentability in terms of § 103. Cont'l Can Co. USA v. Monsanto Co., 948 F.2d 1264, 1268''69 (Fed. Cir. 1991). A claim limitation is inherent if it is necessarily present in the prior art, not merely probably or possibly present. Akami Techs., Inc. v. Cable & Wireless, 344 F.3d 1186, 1192 (Fed. Cir. 2003). As with Compton/CNN, with respect to Patrick/CBC, the parties focus on claim limitations related to episodes, updating the compilation file, and a predetermined URL for the compilation file. Pet. Reply 1: PO Resp. 46''47 (citing Ex. 2004 ¶¶ 18, 21, 56, 61, 63). 1. Patrick/CBC Overview Patrick/CBC discloses an experimental trial to determine, among other things, if there was any demand for regular radio programming distributed as digital audio files over the Internet. Ex. 1012, Abstract. Patrick/CBC alleges that the trial is ''the first time that audio programs produced for traditional radio broadcasts have been made available on the Internet on a regular basis.'' Id. at 2.9 CBC Radio programming was stored on a server and the resulting program files were made available using standard Internet server software. Id. at 2''3. 9 Page references are to the actual page numbers of Exhibit 1012, and not Petitioner's Exhibit pages.
Case IPR2014-00070 Patent 8,112,504 B2 25 a. Whether Patrick/CBC discloses ''episodes'' Patrick/CBC discloses radio programming on the Internet, including Quirks & Quarks, a science magazine show. Ex. 1012, 5. The show was updated regularly on the server. Id. Petitioner cites to the preceding disclosure to meet the ''episode'' limitation. Pet. 40 (citing Ex. 1002 ¶ 60). Patent Owner makes no specific challenge that Patrick/CBC discloses episodes, focusing instead on the ''compilation file'' and ''predetermined URL'' limitations. PO Resp. 15''16. Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, that Patrick/CBC discloses ''episodes'' as claimed. b. Whether or not Patrick/CBC discloses an ''updated version of a compilation file'' Petitioner cites generally to a server which automatically is updated with new programming. Pet. 41''42 (citing Ex. 1012, 3; see Ex. 1012, 5). For example, ''the Quirks & Quarks science magazine show was recorded each week, broken down into its component parts, and made available on the server.'' Id. at 42 (citing Ex. 1012, 7). Further, ''users could select those portions of the show that interested them and download the appropriate audio file.'' Pet. Reply 11''12 (citing Ex. 1012, 5). Petitioner cites this disclosure as showing the compilation file. Pet. 42, Pet. Reply 11''12. The Schmandt Declaration cites to Patrick/CBC's disclosure that radio shows are stored on a server in an HTML file at ftp://www.radio.cbc.ca or http://www.radio.cbc.ca/. Ex. 1002 ¶ 64. Based on these disclosures from Patrick/CBC, the Schmandt Declaration concludes ''[a]n ordinary artisan would understand this to mean an HTML file (i.e. a compilation file).'' Id.
Case IPR2014-00070 Patent 8,112,504 B2 26 Given our construction of ''compilation file'' as ''a file that contains episode information,'' we agree that a person of ordinary skill would conclude that Patrick/CBC necessarily discloses a ''compilation file.'' Pet. 42 (citing Ex. 1002 ¶¶ 63''66). Patent Owner's declarant, in the Nelson Declaration, provides no analysis as to why Patrick/CBC does not disclose a ''compilation file.'' See Ex. 2004 ¶¶ 49''57. More importantly, none of the testimony questions whether a person of ordinary skill would understand the disclosure of Patrick/CBC to meet the recited limitation necessarily. Claim 31 specifically recites that the updated ''compilation file'' includes ''attribute data for each given one of said currently available episodes including displayable text describing said given one of said currently available episodes.'' (Emphasis added). Patent Owner contends that Patrick/CBC does not show the ''displayable text'' limitation. PO Resp. 16. At the final hearing Petitioner argued, however, that a person of ordinary skill in the art would recognize that a compilation file is present, even though no ''picture'' of such a compilation file exists. Tr. 17:1''22. We have reviewed the Schmandt Declaration and are persuaded that a person of ordinary skill would conclude that Patrick/CBC necessarily includes ''displayable text'' associated with the ''compilation file.'' We credit the testimony in the Schmandt Declaration that Patrick/CBC discloses that ''[e]ach show has a menu attached to it to describe the contents of the various parts.'' Ex. 1002 ¶ 64 (citing Ex. 1012, 7). Users would then ''select'' recordings that were of interest to them. Id. (citing Ex. 1012, 3). AlthoughPatrick/CBC does not state expressly that the menu includes ''displayable text,'' the menu selection lists the programs the user may select and necessarily is ''displayed'' so the user may select the programming.
Case IPR2014-00070 Patent 8,112,504 B2 27 Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, Patrick/CBC discloses updating the ''compilation file'' as claimed. c. Whether Patrick/CBC discloses a ''predetermined URL'' The Schmandt Declaration again cites to the disclosure that the server could be accessed at ftp://www.radio.cbc.ca or http://www.radio.cbc.ca/ as disclosing a ''predetermined URL.'' Ex. 1002 ¶ 64 (citing Ex. 1012, 7). The Schmandt Declaration concludes an ''ordinary artisan would understand this to mean an HTML file (i.e. a compilation file) with links to the episodes was stored at a predetermined URL.'' Id. As noted above, the Nelson Declaration does not contradict this testimony. Patent Owner argues that Mr. Schmandt admitted in his deposition that he did not know the specific URL of the ''compilation file,'' but it must exist for users to select audio programming. PO Resp. 19''20 (citing Ex. 2002, 13:19''24). Patent Owner acknowledges one of ordinary skill could ''perhaps'' infer program segments include URLs. These arguments, however, tend to support the Schmandt Declaration that URLs are present in Patrick/CBC for the selected programming. Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, that Patrick/CBC discloses ''predetermined URLs'' for the selected programming. d. Enablement The Nelson Declaration asserts Patrick/CBC is not enabled because code is not disclosed to effect its functionality. Ex. 2004 ¶ 55. Dr. Nelson at his deposition acknowledged that creating and updating an HTML website was within the level of ordinary skill. See Pet. Reply 13 (citing Ex. 1031,
Case IPR2014-00070 Patent 8,112,504 B2 28 77:19''82:10). Thus, we do not agree that code disclosure is required for enablement. f. Dependent Claims 32''35 We also have reviewed the Petitioner's argument and evidence and claim charts in connection with dependent claims 32''35. Pet. 44''45; 57''59. The argument is supported by the Schmandt Declaration. Ex. 1002 ¶¶ 68''71. Patent Owner makes no specific argument regarding the dependent claims other than stating the elements argued as not disclosed in Patrick/CBC. PO Resp. 17''19. Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, Patrick/CBC discloses the limitations of dependent claims 32''35. 3. Conclusion Regarding Claims 31''35 as Anticipated by Patrick/CBC Petitioner has shown sufficient evidence to establish, by a preponderance of the evidence, that claims 31''35 are anticipated under 35 U.S.C. § 102(a) by Patrick/CBC. CONCLUSION Petitioner has shown by a preponderance of the evidence that claims 31''35 would have been obvious over Compton/CNN and anticipated by Patrick/CBC.
Case IPR2014-00070 Patent 8,112,504 B2 29 ORDER For the reasons given, it is ORDERED that Petitioner has shown by a preponderance of the evidence that claims 31''35 of U.S. Patent No. 8,112,504 B2 are unpatentable; and FURTHER ORDERED that, because this is a final written decision, parties to the proceeding seeking judicial review of the decision must comply with the notice and service requirements of 37 C.F.R. § 90.2. For PETITIONER: Richard C. Pettus Nicholas A. Brown GREENBERG TRAURIG LLP pettusr@gtlaw.com brownn@gtlaw.com For PATENT OWNER: Robert W. Faris Updeep S. Gill NIXON & VANDERHYE P.C. rwf@nixonvan.com usg@nixonvan.com
EFF Busts Podcasting Patent, Invalidating Key Claims at Patent Office | Electronic Frontier Foundation
Fri, 10 Apr 2015 20:34
San Francisco - The U.S. Patent and Trademark Office (USPTO) invalided key claims in the so-called ''podcasting patent'' today after a petition for review from the Electronic Frontier Foundation (EFF)'--a decision that significantly curtails the ability of a patent troll to threaten podcasters big and small.
''We're grateful for all the support of our challenge to this patent. Today is a big victory for the podcasting community'' said EFF Staff Attorney Daniel Nazer, who also holds the Mark Cuban Chair to Eliminate Stupid Patents. ''We're glad the Patent Office recognized what we all knew: 'podcasting' had been around for many years and this company does not own it.''
The ''podcasting patent'' became big news in 2013, when a company called Personal Audio, LLC, began demanding licensing fees from podcasters including comedian Adam Carolla and three major television networks. Personal Audio doesn't do podcasting itself, but instead used its patent to claim infringement and collect payouts from actual creators.
In petitions filed with Patent Office, EFF showed that Personal Audio did not invent anything new before it filed its patent application, and, in fact, other people were podcasting for years previously. Earlier examples of podcasting include Internet pioneer Carl Malamud's "Geek of the Week" online radio show and online broadcasts by CNN and the Canadian Broadcasting Corporation (CBC).
''We have a lot to celebrate here,'' said EFF Staff Attorney Vera Ranieri. ''But unfortunately, our work to protect podcasting is not done. Personal Audio continues to seek patents related to podcasting. We will continue to fight for podcasters, and we hope the Patent Office does not give them any more weapons to shake down small podcasters.''
EFF partnered with attorneys working pro bono and the Cyberlaw Clinic at Harvard's Berkman Center for Internet and Society to craft the petition for review with the USPTO.
For the full decision on the Personal Audio ''podcasting patent'':https://www.eff.org/document/uspto-decision
US Breaks the Grip of Reviled "Podcasting Patent"
Sat, 11 Apr 2015 17:56
The much-reviled ''podcasting patent'' '-- initiated by a company called Personal Audio, LLC to demand licensing fees from podcasters '-- is now defunct, the Electronic Frontier Foundation (EFF) has reported.
The US Patent and Trademark Office (USPTO) today invalided key claims of that patent in response to a petition for review from the EFF. Today's order by the USPTO rejects the claim by Personal Audio and its founder, Jim Logan, that they are owed money by podcasters because of a US Patent 8,112,504 with a priority date of 1996, which refers to a ''system for disseminating media content representing episodes in a serialized sequence.''
This decision breaks a major grip of patent trolls over independent podcast creators of all sizes.
The controversy started in 2013 when Personal Audio started demanding licensing fees from podcasters, including comedian Adam Carolla and three major TV networks, with a claim that it had invented podcasting.
In response, the EFF launched a crowd-funded campaign to challenge that claim and have proved their case, citing earlier podcasts such as Carl Malamud's 'Geek of the Week' online radio show and online broadcasts by CNN and the Canadian Broadcasting Corporation.
Despite this defeat, the EFF said that Personal Audio is continuing to seek payments from podcasters.
Personal Audio does not now nor did it ever do any of its own podcasting, but used its 1996 patent to claim infringement and collect payment from others.
'ž¤ EFF Busts Podcasting Patent, Invalidating Key Claims at Patent Office
U.S. Patent Office: Patent Troll Does Not Entirely Own Concept of ''Podcasting'' '' Consumerist
Sun, 12 Apr 2015 13:06
''Podcasting'' might as well have been the word of the year in 2014, when ''Serial'' shot the form straight to the top of the pop-culture buzz charts for a few months. But while everyone in America was plugging in earbuds and trying to decide whodunit, the U.S. Patent Office had the more important end of the challenge: deciding who actually owns the patent for the idea of podcasting.In short? Score one for the good guys. The decision addresses a few very specific elements of the patent claim, but no, the U.S. Patent Office found, this company does not actually have the exclusive ownership of releasing episodic audio content over the internet in a regular, updated way.
The matter came to a hearing at the Patent Office last December. Personal Audio, your basic ''non-practicing'' patent troll entity, claimed that they owned a patent on the tech that allows podcasting to work, and therefore lots of big, powerful companies with deep pockets '-- like CBS and CNN '-- owe them money.
The Electronic Frontier Foundation, which often represents people and companies trying to assert their rights in the digital world, stepped in and challenged Personal Audio's claims last October, and the issue went to a hearing in December. The Patent Office released the result of that hearing today.
In their decision (PDF), the Patent Office works its way through the very, very specific arguments about wording and meaning. It is not unlike reading a geometric proof, in the way it builds a clear argument of facts and existing rulings. Ultimately, however, the dry legalese ends up with one result: the patent troll does not own podcasting.
''Petitioner [the EFF] has shown by a preponderance of the evidence that claims 31-35 of [the patents] are unpatentable,'' the order concludes. ''Because this is a final written decision, parties to the proceeding seeking judicial review of the decision must comply with the notice and service requirements.''
''We have a lot to celebrate here,'' EFF Staff Attorney Vera Ranieri said in a statement. ''But unfortunately, our work to protect podcasting is not done. Personal Audio continues to seek patents related to podcasting. We will continue to fight for podcasters, and we hope the Patent Office does not give them any more weapons to shake down small podcasters.''
-------------------------------------------------------------------------------------------------------------
Katy Perry sics lawyers on Left Shark vendor - CNN.com
Sun, 12 Apr 2015 07:18
13 photos
You've survived the cultural phenomena that were the first and second "Sharknado" movies without a bite. Now, stars Tara Reid and Ian Ziering have agreed to reprise their roles in "Sharknado 3," scheduled for a summer 2015 release.
13 photos
Steven Spielberg's 1975 shark thriller "Jaws" gave birth to the summer blockbuster and a cultural love-hate relationship with swimming in the ocean. The filmmaker's classic also proved that these beasts were ready for their close-ups.
13 photos
Maybe we can blame our current obsession with sharks on the generation who grew up watching "Jabberjaw," ABC's animated series that ran from 1976 to 1978. The kids' show was reportedly inspired by "Jaws," but this version was far more cuddly; Jabberjaw held regular jam sessions with his human pals.
13 photos
Ever wondered where the phrase "jumped the shark" came from? You can thank the "Happy Days" writers for that one. In 1977, the beloved show took a plot turn it couldn't recover from when Henry Winkler's Fonzie literally "jumped a shark" while water skiing.
13 photos
Decades before Syfy became the home of shark-related comedy, "Saturday Night Live" introduced "the cleverest species of them all" in its "Land Shark" sketch. It featured Chevy Chase as the trickster shark who preyed on unsuspecting humans with the lure of telegrams and flowers.
13 photos
Disney's 1989 under-the-sea adventure "The Little Mermaid" began with a tense run-in with a shark. Unlike the chilling but affable characters Disney has produced lately, this shark was straight out of "Jaws" with its brutish strength and snapping teeth.
13 photos
Out of all the sharks in "Deep Blue Sea" -- like this guy seen terrorizing LL Cool J -- there's one that particularly stands out. In the 1999 film, Samuel L. Jackson was in the middle of giving a stirring speech when a toothy killer popped up from behind him and practically devoured him whole.
13 photos
Disney/Pixar brought Steven Spielberg's Bruce to life again in 2003's "Finding Nemo." This Bruce was just as terrifying -- especially to a clownfish dad hunting for his son -- but at least he tried to live by the rule that "fish are friends, not food."
13 photos
In 2004, the shark wave rolled on with DreamWorks' "Shark Tale," featuring the voices of Will Smith, Angelina Jolie, Renee Zellweger and Jack Black as Lenny the shark. With Hans Zimmer composing, the soundtrack had just as much bite.
13 photos
The build-up to "Sharknado" was quiet enough that many didn't see the cultural storm coming. Syfy didn't land monster ratings at first, but the film has had a long tail. Thanks to the intense fandom on Twitter, a sequel aired in summer 2014, and a third "Sharknado" will be out in summer 2015.
Greenberg Traurig Once Again Reports Revenue Increase and its Position as a Top Gaining Firm in Lateral Partner Hires; Elevates 29 Lawyers to Shareholder Status - Greenberg Traurig LLP
Sun, 12 Apr 2015 07:12
NEW YORK (Feb. 09, 2012) '-- The international law firm Greenberg Traurig, LLP reported 2011 gross revenue of $1.243 billion, again resulting in increased revenues and revenues per lawyer for the firm. The information was released as part of the annual survey of the largest law firms in the United States by The American Lawyer and The National Law Journal.
"We are not followers and recognize that our number of lawyers and gross revenues are only relevant if they actually result in greater client satisfaction and a positive culture and experience for our lawyers," said Richard A. Rosenbaum, Chief Executive Officer of Greenberg Traurig. "This approach, coupled with careful management, allows us to nimbly navigate our own path through a changing world and uncertain economic conditions, resulting in another year of stable and balanced financial performance."
Rosenbaum believes the firm's unique business strategy is the key to client and lawyer satisfaction across all cycles: "Our strategy sets us apart and resonates with clients and lawyers alike. First, we are one large global firm, not the result of mergers or other large combinations that simply add size, with a common, empowering culture. Second, we continue our intense focus on delivering quality and value to our clients through the collaboration of our unusually wide range of top tier signature practices, the unmatched breadth and depth of our U.S. platform and our disciplined global reach."
This week Greenberg Traurig also announced the elevation of 29 of its lawyers to shareholder status. Reflecting the firm's diversified platform and wide-ranging legal experience, the 2012 class represents over 20 different office locations and a range of its key areas of practice, including bankruptcy, corporate and securities, intellectual property, labor and employment, litigation, real estate and tax.
''Our future is in the hands of our new and developing shareholders, and we are very proud of their sustained commitment to addressing client needs,'' said Rosenbaum. "We are extremely focused on their integration and adding further value to our clients by the continued development not only of their legal skills but also their skills in the business of practicing law."
Additionally, Greenberg Traurig had a number of high-profile hires in 2011. The firm ranks fourth nationwide on The American Lawyer 2012 Lateral Report "Top Gaining Firms: Lateral Partner Hires" list, with 46 lateral shareholders joining the firm in 2011. The firm also achieved the most overall first-tier rankings, most first-tier metropolitan rankings and most practice areas with first-tier rankings for the United States in the U.S. News Media Group and Best Lawyers® ''Best Law Firms'' rankings, 2011-2012.
In 2011, the firm opened an office in Mexico City, and announced the opening of an office in Tel Aviv in early 2012. Greenberg Traurig, LLP serves clients from 33 offices in the United States, Latin America, Europe and Asia. In the U.S., the firm's 29 offices represent more locations than any other firm among the Top 10 on The National Law Journal's 2011 NLJ 250.
Greenberg Traurig Expands its Patent Litigation Practice with the Addition of Intellectual Property Trial Lawyer Richard C. Pettus in New York | Business Wire
Sun, 12 Apr 2015 06:57
NEW YORK--(BUSINESS WIRE)--The international law firm Greenberg Traurig, LLP announced that Richard C. Pettus has joined its New York City office as a shareholder in the Intellectual Property & Technology Practice. Prior to joining Greenberg Traurig, Pettus was a partner at King & Spalding and served as deputy practice leader of its Intellectual Property Practice as well as co-head of the Pharmaceutical, Biotechnology and Medical Device Initiative.
Rich is an experienced trial lawyer who focuses on patent matters, particularly in the pharmaceutical and Hatch Waxman area. Over the last 15 years, he has represented clients in more than 50 patent cases, including more than a half dozen trials to verdict. His experience spans an array of technologies and industries including pharmaceuticals, medical devices, computer hardware and software, business methods, semiconductors, polymers, ''green'' technology, energy and industrial equipment, fiber optics and chemical processes and consumer products.
''I have known Rich for almost 20 years. His reputation is based not only on his strong experience but also on his commitment to client service. He is a terrific addition to the team,'' said Scott Bornstein, co-chair of the firm's Patent Litigation group and chair of New York's Intellectual Property Practice.
Pettus has served as lead counsel in a number of patent trials and other matters in the areas of bio-pharmaceutical and ANDA Hatch-Waxman litigation, including Hatch-Waxman pre-litigation assessments to prepare branded pharmaceutical clients for challenges to their patent portfolios.
''Richard's extensive patent litigation experience expands the level of service we can bring clients,'' said Ed Wallace, co-managing shareholder of Greenberg Traurig's New York City office.
Warren Karp, co-managing shareholder of Greenberg Traurig's New York City office, added ''we're thrilled to have Rich with us and welcome him to the Greenberg Traurig family.''
Pettus received his J.D. from Fordham University School of Law and his engineering degree from Manhattan College.
With more than 200 intellectual property attorneys and agents, Greenberg Traurig provides full-service patent, trademark and copyright protection and strategic counseling. The firm's Intellectual Property & Technology Practice has been ranked by IPLaw 360 and IP Law & Business as the most frequently hired trademark and patent practices for prosecution and litigation. In addition, the firm's trademarks and brand management team has been ranked among the top 5 firms by CSC Trademark Insider for the number of USPTO trademark applications submitted.
Pettus is the most recent hire in the trend of strategic expansion throughout Greenberg Traurig's Intellectual Property and Technology Practice. Others include San Francisco shareholders Vernon Winters, Nicholas Brown and Evan Nadel; Washington, D.C. shareholder Charanjit Brahma; and Boston shareholder Jennifer Camacho.
About Greenberg Traurig, LLP
Greenberg Traurig, LLP is an international, full-service law firm with approximately 1,800 attorneys serving clients from more than 30 offices in the United States, Europe and Asia. In the U.S., the firm has more offices than any other among the Top 10 on The National Law Journal's 2011 NLJ 250. In the U.K., the firm operates as Greenberg Traurig Maher LLP. Greenberg Traurig has a strategic alliance with the independent law firm, Studio Santa Maria in Milan and Rome. The firm was Chambers and Partners' USA Law Firm of the Year in 2007 and among the Top 3 in the International Law Firm of the Year at the 2009 The Lawyer Awards. For additional information, please visit www.gtlaw.com.
-------------------------------------------------------------------------------------------------------------
Vocal Fry
Annie email-singer
Hi Adam (and John),
Funny you should mention vocal fry. I've been trained as a singer from a young age (mostly opera, jazz, broadway stylings) and vocal fry is a huge issue as far as singing goes. When someone does vocal fry, they actually don't run any air past their vocal chords. The vocal chords rub together much like when a singer goes too high too often, causing strain.
Vocal fry is damaging to the vocal chords and can result in nodes which can only be removed surgically. Hence why I cringe every time I hear Meghan Trainor's "All About That Bass". At this rate, she'll have no voice by 35 (Julie Andrews had nodes and was unable to sing for years).
This is why I actually explain vocal fry to girls who do it (and guys). It could save them from either having no voice or getting a rather expensive surgery. Please tell everyone you know who does this to STOP!
-Annie
Über Sources
Haiti
-------------------------------------------------------------------------------------------------------------
Oil all the way to Jamaica
-------------------------------------------------------------------------------------------------------------
Certification Related to the Government of Haiti Under Section 7045(E)(1) of the Department of State, Foreign Operations, and Related Programs Appropriations Act, 2015
Sun, 12 Apr 2015 03:29
Pursuant to the authority vested in the Secretary of State, including under section 7045(e)(1) of the Department of State, Foreign Operations, and Related Programs Appropriations Act, 2015 (Div. J, Pub. L. 113-235), I hereby certify that Haiti is taking steps to hold free and fair parliamentary elections and to seat a new Haitian Parliament; is selecting judges in a transparent manner and respecting the independence of the judiciary; is combating corruption, including implementing the anti-corruption law by prosecuting corrupt officials; and is improving governance and implementing financial transparency and accountability requirements for government institutions.
This Certification shall be published in the Federal Register, and copies shall be transmitted to the appropriate committees of Congress.
Dated: April 1, 2015.
John F. Kerry,
Secretary of State.
[FR Doc. 2015-08468 Filed 4-10-15; 8:45 am]
BILLING CODE 4710-10-P
-------------------------------------------------------------------------------------------------------------
Definition and Management of Hypertension Among Haitian Immigrants: A Qualitative Study
Other reported alternative, culturally based approaches included 5 kob wouj (a red five-cent piece) (n=1), baby aspirin (n=3), fey zanmann (n=11), papaya and papaya leaves (n=2), oil of lwil maskreti (Castor oil) (n=2), fey metsyen (n=12), lay (garlic) (n=12), fey lougawou (n=4), and simen kontra (n=22). These herbal remedies were either imported from Haiti or came directly from the participants’ backyards where participants had planted them for easy access. As one participant stated:
Oh. I can take metsyen [leaf], zanmann [leaf], lougawou [leaf]. I have my garden outside. Whenever I need I just go outside, I take and boil them. When I am done drinking these leaves, I pee a lot. It lowers my blood pressure. Papaya leaf, it lowers the blood pressure more than the pill. You can get addicted to the pill. You keep taking the pill the doctor gave you, but it is not good for your intestine. (P2)
This participant reiterated that she believed culturally based herbal medicines were effective in lowering blood pressure. She discussed her preference for alternative approaches for hypertension management. She expressed that this preference was because of the potential addictive effects of prescribed medications. The5-kob wouj (a red five-cent piece) was placed in the middle of the head along with the lwil maskreti, an oil. This was believed to lower blood pressure. Baby aspirin was believed to enhance blood circulation. Fey zanmann was used as a tea and also applied straight to the forehead with the oil of maskreti. Fey metsyen, fey lougarou, and simen kontra were also prepared as a tea. Papaya was blended and drunk as a juice. Papaya leaf was smeared with lwil maskreti and placed on the forehead to lower blood pressure. Garlic bulb was used to make tea and was also boiled along with other leaves and placed in the refrigerator to be consumed throughout the day for water intake.
Zanmann '' Tropical Almond | Mangeons LAKAY
Sun, 12 Apr 2015 04:13
I remember spending endless hours sitting in the backyard, after collecting several ZANMANNs (Tropical Almonds) that I would shamelessly enjoy, from the tree that my father had planted there.The tree's latin name is actually Terminalia catappa whose origin is of India. No matter how hard I would try to describe the fruit to some of my friends over here, they would not know what I would refer to.
See, ZANMANN (The fruit) is creole for Amande which some people think means ALMOND.But the ALMOND and the Terminalia catappa's fruit are two different things to my taste buds. They probably come from the same family however. I'm not too sure.
I used to not just enjoy the fruit (which you could eat with its bear skin btw) ,but I would also be armed with a hammer. YES! A HAMMER! I know I used to be between the ages of 10 and 15 when I would sit in the backyard using my father's hammer but this was never considered a hazard back home lol . ''What's the hammer for?'' you might ask.Well, what else than to crack open the fruit so I could reach the nut that would lay inside of it as a desired treasure! It would take an eternity to do so but these endless minutes were totally worth it !
Terminalia catappa medicinal uses:
The leaves have many medicinal uses including diaphoretic, anti-indigestion, and anti-dysentery activities. An infusion of the young leaves or scraped bark are occasionally taken as a potion for treating mouth infections.
Like this:LikeLoading...
Related
-------------------------------------------------------------------------------------------------------------
Pras - Wikipedia, the free encyclopedia
Sun, 12 Apr 2015 04:10
This article is about Pras, the musical artist. For the computer science concept "polynomial-time randomized approximation scheme" or PRAS, see polynomial-time approximation scheme.PrasBirth namePraskazrel Samuel MichelBorn(1972-10-19) October 19, 1972 (age 42)Brooklyn, New York, United StatesGenresHip hop, soul, reggae,Occupation(s)Rapper, multi-instrumentalist, singer, songwriter, record producer, arrangerInstrumentskeyboards, samplerYears active1992''presentLabelsColumbia, Ruffhouse, Guerrilla EntertainmentAssociated actsFugees, Refugee Camp All-StarsPras (//; born Praskazrel Samuel Michel on October 19, 1972) is a two-time Grammy-winning American rapper, best known as one of the founding members of the critically acclaimed hip hop group, the Fugees, which included his cousin Wyclef Jean and recording artist Lauryn Hill.
Biography[edit]Early life[edit]Born in Brooklyn, New York and raised in Irvington, New Jersey, Pras cultivated an early interest in music. When he was 15, Pras met Lauryn Hill, while both attended Columbia High School, South Orange, New Jersey. In 1988, Pras introduced Lauryn to Wyclef Jean. Pras Michel, Wyclef Jean and Lauryn Hill began to rehearse under the guidance of Kool and the Gang's producer, Ronald Khalis Bell, and subsequently they formed a musical group called The Rap Translators in 1989 (also known as Tranzlator Crew.)
Music career[edit]In 1994, before and during the time that The Fugees were recording their first album Blunted on Reality, under the supervision of Ronald Khalis Bell, Pras attended Rutgers College and Yale University, pursuing a double major in Philosophy and Psychology.[1] In 1996, The Fugees achieved historic crossover success with The Score, which went multi-platinum. Pras has also forged a successful solo career, beginning with an international hit single from his first full-length solo LP, "Ghetto Supastar (That Is What You Are)", featuring M½a and Ol' Dirty Bastard. "Ghetto Superstar" became a top ten single in 1999, and the eighth most played single; it was received with critical acclaim and earned Pras a performance at the World Music Awards. The hit single was included in the soundtrack for the film Bulworth. "Ghetto Supastar" spent eight weeks in the UK Top 5, peaking at No. 2 in July 1998,[2] and reached US No. 15 a month later. "Blue Angels", from the same album, was a UK Top 10 hit, reaching No. 6 in November.[2] Pras also featured on the track "Turn You On" by Swedish artist DeDe[3] which was released in 2007. "Turn You On" was also written and produced by Pras Michel. After nine weeks on Sweden's single chart, it peaked at No. 2. He also featured "Pushin'" from the album Equalize by Swami, which was released in 2007.
Film career[edit]After his cameo debut in the 1999 film, Mystery Men, Pras gained an interest in Hollywood. In 2000, Pras starred in the New Line film, Turn It Up. In early 2002, he appeared in the Sony and Urban World release Higher Ed, and Go for Broke in which he starred and produced. He also co-starred in three 20th Century Fox films in 2007. These included The Mutant Chronicles.
In 2006, Pras created Skid Row, Los Angeles, a documentary account of his nine-day experience posing as a homeless person living in downtown Los Angeles. Using a hidden camera, Pras captured the reality of homelessness. The film was produced by Teryn Fogel.[4]Skid Row was released on August 24, 2007 to widespread critical acclaim.[5]
In 2009, Pras travelled to Somalia to film a documentary entitled Paper Dreams to highlight piracy off the African coast. During filming pirates invaded the ship he was on, the MV Maersk Alabama and took the Captain of the ship hostage. Due to be released in 2014, the documentary remains unfinished due to a legal dispute.[6]
In 2010, Pras created a documentary entitled Sweet Mickey For Prezidan. The documentary chronicled the rise of Haitian musician Michel Martelly, through his election to fight corruption as President of Haiti, an election campaign that was strongly endorsed by Pras.[7]
Discography[edit]Albums[edit]Singles[edit]As lead artist[edit]As featured artist[edit]Acting and producing career[edit]Mystery Men (1999) '' Tony C (credited as Prakazrel Michel)Turn It Up (2000) - Denzel/Diamond (credited as Pras Michel) (co-producer)Higher Ed (2001) - Ed Green (credited as Pras Michel) (executive producer)Go For Broke (2002) - Jackson/Jackie (credited as Pras Michel) (producer)Nora's Hair Salon (2004)Careful What You Wish For (2004) '' Zen Salesman (credited as Pras Michel)Feel The Noise (2007) '' ElectricFirst Night (2007) '' himself (producer)Skid Row (2007) '' himself (producer)The Mutant Chronicles (2007) - Captain Michaels (producer)Paper Dreams (2010) - himself (producer)Sweet Mickey for Prezidan (2012) - himself (producer)References[edit]Sources[edit]^Rahul (May 17, 2012). "Pras Talks 2Pac, Suge Knight, Wyclef, Lauryn Hill & Beef on the Champs Podcast". Dajaz1.com. Retrieved May 19, 2012. ^ abRoberts, David (2006). British Hit Singles & Albums (19th ed.). London: Guinness World Records Limited. p. 362. ISBN 1-904994-10-5. ^http://www.dede.se^"IMDB "Skid Row"". IMDB. Retrieved 2010-12-04. ^"Skid Row 83% Rotten Tomatoes". Retrieved 2013-06-13. ^"TMZ Pras Michel Lawsuit". Retrieved 2013-06-13. ^"IMDB "Sweet Mickey for Prezidan"". Retrieved 2013-06-13. ^"Pras Album & Song Chart History: Billboard 200". Billboard. ^"Pras Album & Song Chart History: R&B/Hip-Hop Albums". Billboard. ^ abcHung, Steffen. "Discographie Pras Michel". German Charts Portal. Hung Medien (Steffen Hung). ^ abcHung, Steffen. "Discography Pras Michel". Norwegian Charts Portal. Hung Medien (Steffen Hung). ^ abcHung, Steffen. "Discography Pras Michel". New Zealand Charts Portal. Hung Medien (Steffen Hung). ^ abcHung, Steffen. "Discography Pras Michel". Swedish Charts Portal. Hung Medien (Steffen Hung). ^ abcHung, Steffen. "Discographie Pras Michel". Swiss Charts Portal. Hung Medien (Steffen Hung). ^"Pras Michel > UK charts". Official Charts Company. ^ abHung, Steffen. "Discography Pras Michel". Australian Charts Portal. Hung Medien (Steffen Hung). ^ abHung, Steffen. "Discographie Pras Michel". Austrian Charts Portal. Hung Medien (Steffen Hung). ^ abHung, Steffen. "Discografie Pras Michel". Belgium (Flanders) Charts Portal. Hung Medien (Steffen Hung). ^ abHung, Steffen. "Discography Pras Michel". Finnish Charts Portal. Hung Medien (Steffen Hung). ^ ab"Pras Michel > UK Charts". Official Charts Company. External links[edit]PersondataNamePrasAlternative namesShort descriptionAmerican rapperDate of birth1972-10-19Place of birthBrooklyn, New York, United StatesDate of deathPlace of death
-------------------------------------------------------------------------------------------------------------
Sulfur - Wikipedia, the free encyclopedia
Sun, 12 Apr 2015 00:46
Sulfur, 16SSpectral lines of sulfur
General propertiesName, symbolsulfur, SPronunciation//SUL-fÉrAppearancelemon yellow sintered microcrystalsSulfur in the periodic tableAtomic number16Standard atomic weight32.06[1] (32.059''32.076)[2]Element category polyatomic nonmetalGroup, blockgroup 16 (chalcogens), p-blockPeriodperiod 3Electron configuration[Ne] 3s2 3p4per shell2, 8, 6Physical propertiesPhasesolidMelting point388.36 K '‹(115.21 °C, '‹239.38 °F)Boiling point717.8 K '‹(444.6 °C, '‹832.3 °F)Densitynear r.t.alpha: 2.07 g·cm''3beta: 1.96 g·cm''3gamma: 1.92 g·cm''3when liquid, at m.p.1.819 g·cm''3Critical point1314 K, 20.7 MPaHeat of fusionmono: 1.727 kJ·mol''1Heat of vaporizationmono: 45 kJ·mol''1Molar heat capacity22.75 J·mol''1·K''1vapor pressureP (Pa)1101001 k10 k100 kat T (K)375408449508591717Atomic propertiesOxidation states6, 5, 4, 3, 2, 1, ''1, ''2 '‹(a strongly acidic oxide)ElectronegativityPauling scale: 2.58Ionization energies1st: 999.6 kJ·mol''12nd: 2252 kJ·mol''13rd: 3357 kJ·mol''1(more)Covalent radius105±3 pmVan der Waals radius180 pmMiscellaneaCrystal structure'‹orthorhombicThermal conductivity0.205 W·m''1·K''1 (amorphous)Electrical resistivity2—1015 Î(C)·m (at 20 °C) (amorphous)Magnetic orderingdiamagnetic[3]Bulk modulus7.7 GPaMohs hardness2.0CAS Registry Number7704-34-9HistoryDiscoveryChinese[4](before 2000 BCE)Recognized as an element byAntoine Lavoisier (1777)Most stable isotopesMain article: Isotopes of sulfur· referencesSulfur or sulphur (see spelling differences) is a chemical element with symbol S and atomic number 16. It is an abundant, multivalentnon-metal. Under normal conditions, sulfur atoms form cyclic octatomic molecules with chemical formula S8. Elemental sulfur is a bright yellow crystalline solid when at room temperature. Chemically, sulfur can react as either an oxidant or a reducing agent. It oxidizes most metals and several nonmetals, including carbon, which leads to its negative charge in most organosulfur compounds, but it reduces several strong oxidants, such as oxygen and fluorine.
Sulfur occurs naturally as the pure element (native sulfur) and as sulfide and sulfate minerals. Elemental sulfur crystals are commonly sought after by mineral collectors for their distinct, brightly colored polyhedron shapes. Being abundant in native form, sulfur was known in ancient times, mentioned for its uses in ancient India, ancient Greece, China and Egypt. Fumes from burning sulfur were used as fumigants, and sulfur-containing medicinal mixtures were used as balms and antiparasitics. Sulfur is referred to in the Bible as brimstone (burn stone) in English, with this name still used in several nonscientific tomes.[5] It was needed to make the best quality of black gunpowder. In 1777, Antoine Lavoisier helped convince the scientific community that sulfur was a basic element rather than a compound.
Elemental sulfur was once extracted from salt domes where it sometimes occurs in nearly pure form, but this method has been obsolete since the late 20th century. Today, almost all elemental sulfur is produced as a byproduct of removing sulfur-containing contaminants from natural gas and petroleum. The element's largest commercial use (after mostly being converted to sulfuric acid) is to produce sulfate and phosphate fertilizers, because of the relatively high requirement of plants for sulfur and phosphorus. Sulfuric acid is also a primary industrial chemical outside fertilizer manufacture. Other well-known uses for the element are in matches, insecticides and fungicides. Many sulfur compounds are odoriferous, and the smell of odorized natural gas, skunk scent, grapefruit, and garlic is due to sulfur compounds. Hydrogen sulfide produced by living organisms imparts the characteristic odor to rotting eggs and other biological processes.
Sulfur is an essential element for all life, and is widely used in biochemical processes. In metabolic reactions, sulfur compounds serve as both fuels (electron donors) and respiratory (oxygen-alternative) materials (electron acceptors). Sulfur in organic form is present in the vitamins biotin and thiamine, the latter being named for the Greek word for sulfur. Sulfur is an important part of many enzymes and in antioxidant molecules like glutathione and thioredoxin. Organically bonded sulfur is a component of all proteins, as the amino acidscysteine and methionine. Disulfide bonds are largely responsible for the mechanical strength and insolubility of the protein keratin, found in outer skin, hair, and feathers, and the element contributes to their pungent odor when burned.
Spelling and etymologyEditSulfur is historically a Latin word. The original Latin spelling was sulpur, but this was Hellenized to sulphur; the form sulfur appears toward the end of the Classical period. (The true Greek word for sulfur, θεá–Îν, is the source of the international chemical prefix thio-.) In 12th-century Anglo-French, it was sulfre; in the 14th century the Latin ph was restored, for sulphre; and by the 15th century the full Latin spelling was restored, for sulfur, sulphur. The parallel f~ph spellings continued in Britain until the 19th century, when the word was standardized as sulphur.[6]Sulfur was the form chosen in the United States, whereas Canada uses both. However, the IUPAC adopted the spelling sulfur in 1990, as did the Nomenclature Committee of the Royal Society of Chemistry in 1992, restoring the spelling sulfur to Britain.[7] The Oxford Dictionaries note that "in chemistry ... the -f- spelling is now the standard form in all related words in the field in both British and US contexts."[8]
The late Latin form also continues in the Romance languages: French soufre, Italian zolfo (from solfo), Spanish azufre (from a§ufre, from earlier §ufre), Portuguese enxofre (from xofre). The Spanish and Portuguese forms are prefixed with the Arabic article, despite not being Arabic words.[6] The root has been traced back to reconstructed proto-Indo-European*sw(C)plÌ¥ (genitive *sulpl"s), a nominal derivative of *swelp 'to burn', a lineage also preserved in the Germanic languages, where it is found for example as modern German Schwefel, Dutch zwavel, and Swedish svavel, and as Old Englishswefl.[9]
CharacteristicsEditPhysical propertiesEditSulfur forms polyatomic molecules with different chemical formulas, with the best-known allotrope being octasulfur, cyclo-S8. The point group of cyclo-S8 is D4d and its dipole moment is 0 D.[10] Octasulfur is a soft, bright-yellow solid with only a faint odor, similar to that of matches.[11] It melts at 115.21 °C (239.38 °F), boils at 444.6 °C (832.3 °F) and sublimes easily.[5] At 95.2 °C (203.4 °F), below its melting temperature, cyclo-octasulfur changes from α-octasulfur to the β-polymorph.[12] The structure of the S8 ring is virtually unchanged by this phase change, which affects the intermolecular interactions. Between its melting and boiling temperatures, octasulfur changes its allotrope again, turning from β-octasulfur to Î"-sulfur, again accompanied by a lower density but increased viscosity due to the formation of polymers.[12] At even higher temperatures, however, the viscosity decreases as depolymerization occurs. Molten sulfur assumes a dark red color above 200 °C (392 °F). The density of sulfur is about 2 g·cm''3, depending on the allotrope; all of its stable allotropes are excellent electrical insulators.
Chemical propertiesEditSulfur burns with a blue flame concomitant with formation of sulfur dioxide, notable for its peculiar suffocating odor. Sulfur is insoluble in water but soluble in carbon disulfide and, to a lesser extent, in other nonpolar organic solvents, such as benzene and toluene. The first and the second ionization energies of sulfur are 999.6 and 2252 kJ·mol''1, respectively. Despite such figures, the +2 oxidation state is rare, with +4 and +6 being more common. The fourth and sixth ionization energies are 4556 and 8495.8 kJ·mol''1, the magnitude of the figures caused by electron transfer between orbitals; these states are only stable with strong oxidants as fluorine, oxygen, and chlorine.
AllotropesEditSulfur forms over 30 solid allotropes, more than any other element.[13] Besides S8, several other rings are known.[14] Removing one atom from the crown gives S7, which is more deeply yellow than S8. HPLC analysis of "elemental sulfur" reveals an equilibrium mixture of mainly S8, but with S7 and small amounts of S6.[15] Larger rings have been prepared, including S12 and S18.[16][17]
Amorphous or "plastic" sulfur is produced by rapid cooling of molten sulfur'--for example, by pouring it into cold water. X-ray crystallography studies show that the amorphous form may have a helical structure with eight atoms per turn. The long coiled polymeric molecules make the brownish substance elastic, and in bulk this form has the feel of crude rubber. This form is metastable at room temperature and gradually reverts to crystalline molecular allotrope, which is no longer elastic. This process happens within a matter of hours to days, but can be rapidly catalyzed.
IsotopesEditSulfur has 25 known isotopes, four of which are stable: 32S (95.02%), 33S (0.75%), 34S (4.21%), and 36S (0.02%). Other than 35S, with a half-life of 87 days and formed in cosmic ray spallation of 40Ar, the radioactive isotopes of sulfur have half-lives less than 3 hours.
When sulfide minerals are precipitated, isotopic equilibration among solids and liquid may cause small differences in the δS-34 values of co-genetic minerals. The differences between minerals can be used to estimate the temperature of equilibration. The δC-13 and δS-34 of coexisting carbonate minerals and sulfides can be used to determine the pH and oxygen fugacity of the ore-bearing fluid during ore formation.
In most forest ecosystems, sulfate is derived mostly from the atmosphere; weathering of ore minerals and evaporites contribute some sulfur. Sulfur with a distinctive isotopic composition has been used to identify pollution sources, and enriched sulfur has been added as a tracer in hydrologic studies. Differences in the natural abundances can be used in systems where there is sufficient variation in the 34S of ecosystem components. Rocky Mountain lakes thought to be dominated by atmospheric sources of sulfate have been found to have different δ34S values from lakes believed to be dominated by watershed sources of sulfate.
Natural occurrenceEdit32S is created inside massive stars, at a depth where the temperature exceeds 2.5—109 K, by the fusion of one nucleus of silicon plus one nucleus of helium.[18] As this is part of the alpha process that produces elements in abundance, sulfur is the 10th most common element in the universe.
Sulfur, usually as sulfide, is present in many types of meteorites. Ordinary chondrites contain on average 2.1% sulfur, and carbonaceous chondrites may contain as much as 6.6%. It is normally present as troilite (FeS), but there are exceptions, with carbonaceous chondrites containing free sulfur, sulfates and other sulfur compounds.[19] The distinctive colors of Jupiter's volcanic moon Io are attributed to various forms of molten, solid and gaseous sulfur.[20]
On Earth, elemental sulfur can be found near hot springs and volcanic regions in many parts of the world, especially along the Pacific Ring of Fire; such volcanic deposits are currently mined in Indonesia, Chile, and Japan. Such deposits are polycrystalline, with the largest documented single crystal measuring 22—16—11 cm.[21] Historically, Sicily was a large source of sulfur in the Industrial Revolution.[22]
Native sulfur is synthesised by anaerobic bacteria acting on sulfate minerals such as gypsum in salt domes.[23][24] Significant deposits in salt domes occur along the coast of the Gulf of Mexico, and in evaporites in eastern Europe and western Asia. Native sulfur may be produced by geological processes alone. Fossil-based sulfur deposits from salt domes have until recently been the basis for commercial production in the United States, Russia, Turkmenistan, and Ukraine.[25] Currently, commercial production is still carried out in the Osiek mine in Poland. Such sources are now of secondary commercial importance, and most are no longer worked.
Common naturally occurring sulfur compounds include the sulfide minerals, such as pyrite (iron sulfide), cinnabar (mercury sulfide), galena (lead sulfide), sphalerite (zinc sulfide) and stibnite (antimony sulfide); and the sulfates, such as gypsum (calcium sulfate), alunite (potassium aluminium sulfate), and barite (barium sulfate). On Earth, just as upon Jupiter's moon Io, elemental sulfur occurs naturally in volcanic emissions, including emissions from hydrothermal vents.
ProductionEditSulfur may be found by itself and historically was usually obtained in this way, while pyrite has been a source of sulfur via sulfuric acid.[disputed'' discuss][26] In volcanic regions in Sicily, in ancient times, it was found on the surface of the Earth, and the "Sicilian process" was used: sulfur deposits were piled and stacked in brick kilns built on sloping hillsides, with airspaces between them. Then, some sulfur was pulverized, spread over the stacked ore and ignited, causing the free sulfur to melt down the hills. Eventually the surface-borne deposits played out, and miners excavated veins that ultimately dotted the Sicilian landscape with labyrinthine mines. Mining was unmechanized and labor-intensive, with pickmen freeing the ore from the rock, and mine-boys or carusi carrying baskets of ore to the surface, often through a mile or more of tunnels. Once the ore was at the surface, it was reduced and extracted in smelting ovens. The conditions in Sicilian sulfur mines were horrific, prompting Booker T. Washington to write "I am not prepared just now to say to what extent I believe in a physical hell in the next world, but a sulphur mine in Sicily is about the nearest thing to hell that I expect to see in this life.".[27]
Today's sulfur production is as a side product of other industrial processes such as oil refining; in these processes, sulfur often occurs as undesired or detrimental compounds that are extracted and converted to elemental sulfur. As a mineral, native sulfur under salt domes is thought to be a fossil mineral resource, produced by the action of ancient bacteria on sulfate deposits. It was removed from such salt-dome mines mainly by the Frasch process.[25] In this method, superheated water was pumped into a native sulfur deposit to melt the sulfur, and then compressed air returned the 99.5% pure melted product to the surface. Throughout the 20th century this procedure produced elemental sulfur that required no further purification. However, due to a limited number of such sulfur deposits and the high cost of working them, this process for mining sulfur has not been employed in a major way anywhere in the world since 2002.[28][29]
Today, sulfur is produced from petroleum, natural gas, and related fossil resources, from which it is obtained mainly as hydrogen sulfide. Organosulfur compounds, undesirable impurities in petroleum, may be upgraded by subjecting them to hydrodesulfurization, which cleaves the C''S bonds:[28][29]
R-S-R + 2 H2 '†' 2 RH + H2SThe resulting hydrogen sulfide from this process, and also as it occurs in natural gas, is converted into elemental sulfur by the Claus process. This process entails oxidation of some hydrogen sulfide to sulfur dioxide and then the comproportionation of the two:[28][29]
3 O2 + 2 H2S '†' 2 SO2 + 2 H2OSO2 + 2 H2S '†' 3 S + 2 H2OOwing to the high sulfur content of the Athabasca Oil Sands, stockpiles of elemental sulfur from this process now exist throughout Alberta, Canada.[30] Another way of storing sulfur is as a binder for concrete, the resulting product having many desirable properties (see sulfur concrete).[31] Sulfur is still mined from surface deposits in poorer nations with volcanos, such as Indonesia, and worker conditions have not improved much since Booker T. Washington's days.[32]
The world production of sulfur in 2011 amounted to 69 million tonnes (Mt), with more than 15 countries contributing more than 1 Mt each. Countries producing more than 5 Mt are China (9.6), US (8.8), Canada (7.1) and Russia (7.1).[33] While the production has been slowly increasing from 1900 to 2010, the price was much less stable, especially in the 1980s and around 2010.[34]
CompoundsEditCommon oxidation states of sulfur range from ''2 to +6. Sulfur forms stable compounds with all elements except the noble gases.
Sulfur polycationsEditSulfur polycations, S82+, S42+ and S192+ are produced when sulfur is reacted with mild oxidising agents in a strongly acidic solution.[35] The colored solutions produced by dissolving sulfur in oleum were first reported as early as 1804 by C.F Bucholz, but the cause of the color and the structure of the polycations involved was only determined in the late 1960s. S82+ is deep blue, S42+ is yellow and S192+ is red.[12]
SulfidesEditTreatment of sulfur with hydrogen gives hydrogen sulfide. When dissolved in water, hydrogen sulfide is mildly acidic:[5]
H2S HS'' + H+Hydrogen sulfide gas and the hydrosulfide anion are extremely toxic to mammals, due to their inhibition of the oxygen-carrying capacity of hemoglobin and certain cytochromes in a manner analogous to cyanide and azide (see below, under precautions).
Reduction of elemental sulfur gives polysulfides, which consist of chains of sulfur atoms terminated with S'' centers:
2 Na + S8 '†' Na2S8This reaction highlights arguably the single most distinctive property of sulfur: its ability to catenate (bind to itself by formation of chains). Protonation of these polysulfide anions gives the polysulfanes, H2Sx where x = 2, 3, and 4.[36] Ultimately reduction of sulfur gives sulfide salts:
16 Na + S8 '†' 8 Na2SThe interconversion of these species is exploited in the sodium-sulfur battery. The radical anion S3'' gives the blue color of the mineral lapis lazuli.
Oxides, oxoacids and oxoanionsEditThe principal sulfur oxides are obtained by burning sulfur:
S + O2 '†' SO22 SO2 + O2 '†' 2 SO3Other oxides are known, sulfur rich oxides e.g. sulfur monoxide and disulfur mono- and dioxides and higher oxides containing peroxo groups.
Sulfur forms a number of sulfur oxoacids, some of which cannot be isolated and are only known through their salts. Sulfur dioxide and sulfites (SO2''3) are related to the unstable sulfurous acid (H2SO3). Sulfur trioxide and sulfates (SO2''4) are related to sulfuric acid. Sulfuric acid and SO3 combine to give oleum, a solution of pyrosulfuric acid (H2S2O7) in sulfuric acid.
Thiosulfate salts (S2O2''3), sometimes referred as "hyposulfites", used in photographic fixing (HYPO) and as reducing agents, feature sulfur in two oxidation states. Sodium dithionite (Na2S2O4), contains the more highly reducing dithionite anion (S2O2''4).
Halides and oxyhalidesEditThe two main sulfur fluorides are sulfur hexafluoride, a dense gas used as nonreactive and nontoxic propellant, and sulfur tetrafluoride, a rarely used organic reagent that is highly toxic.[37]Sulfur dichloride and disulfur dichloride are important industrial chemicals. Sulfuryl chloride and chlorosulfuric acid are derivatives of sulfuric acid; thionyl chloride (SOCl2) is a common reagent in organic synthesis.[38]
PnictidesEditAn important S''N compound is the cage tetrasulfur tetranitride (S4N4). Heating this compound gives polymeric sulfur nitride ((SN)x), which has metallic properties even though it does not contain any metal atoms. Thiocyanates contain the SCN'' group. Oxidation of thiocyanate gives thiocyanogen, (SCN)2 with the connectivity NCS-SCN. Phosphorus sulfides are numerous, the most important commercially being the cages P4S10 and P4S3.[39][40]
Metal sulfidesEditThe principal ores of copper, zinc, nickel, cobalt, molybdenum, and other metals are sulfides. These materials tend to be dark-colored semiconductors that are not readily attacked by water or even many acids. They are formed, both geochemically and in the laboratory, by the reaction of hydrogen sulfide with metal salts. The mineral galena (PbS) was the first demonstrated semiconductor and found a use as a signal rectifier in the cat's whiskers of early crystal radios. The iron sulfide called pyrite, the so-called "fool's gold," has the formula FeS2.[41] The upgrading of these ores, usually by roasting, is costly and environmentally hazardous. Sulfur corrodes many metals via the process called tarnishing.
Organic compoundsEditSome of the main classes of sulfur-containing organic compounds include the following:[42]
Compounds with carbon''sulfur bonds are uncommon with the notable exception of carbon disulfide, a volatile colorless liquid that is structurally similar to carbon dioxide. It is used as a reagent to make the polymer rayon and many organosulfur compounds. Unlike carbon monoxide, carbon monosulfide is only stable as a dilute gas, as in the interstellar medium.[43]
Organosulfur compounds are responsible for some of the unpleasant odors of decaying organic matter. They are used in the odoration of natural gas and cause the odor of garlic and skunk spray. Not all organic sulfur compounds smell unpleasant at all concentrations: the sulfur-containing monoterpenoidgrapefruit mercaptan in small concentrations is responsible for the characteristic scent of grapefruit, but has a generic thiol odor at larger concentrations. Sulfur mustard, a potent vesicant, was used in World War I as a disabling agent.[44]
Sulfur-sulfur bonds are a structural component to stiffen rubber, in a way similar to the biological role of disulfide bridges to rigidify proteins (see biological below). In the most common type of industrial "curing" or hardening and strengthening of natural rubber, elemental sulfur is heated with the rubber to the point that chemical reactions form disulfide bridges between isoprene units of the polymer. This process, patented in 1843, allowed rubber to become a major industrial product, especially automobile tires. Because of the heat and sulfur, the process was named vulcanization, after the Roman god of the forge and volcanism.
AntiquityEditBeing abundantly available in native form, sulfur (Latinsulphur) was known in ancient times and is referred to in the Torah (Genesis). English translations of the Bible commonly referred to burning sulfur as "brimstone", giving rise to the term "fire-and-brimstone" sermons, in which listeners are reminded of the fate of eternal damnation that await the unbelieving and unrepentant. It is from this part of the Bible that Hell is implied to "smell of sulfur" (likely due to its association with volcanic activity). According to the Ebers Papyrus, a sulfur ointment was used in ancient Egypt to treat granular eyelids. Sulfur was used for fumigation in preclassical Greece;[45] this is mentioned in the Odyssey.[46]Pliny the Elder discusses sulfur in book 35 of his Natural History, saying that its best-known source is the island of Melos. He mentions its use for fumigation, medicine, and bleaching cloth.[47]
A natural form of sulfur known as shiliuhuang was known in China since the 6th century BC and found in Hanzhong.[48] By the 3rd century, the Chinese discovered that sulfur could be extracted from pyrite.[48] Chinese Daoists were interested in sulfur's flammability and its reactivity with certain metals, yet its earliest practical uses were found in traditional Chinese medicine.[48] A Song Dynasty military treatise of 1044 AD described different formulas for Chinese black powder, which is a mixture of potassium nitrate (KNO3), charcoal, and sulfur.
Indian alchemists, practitioners of "the science of mercury" (sanskrit rasaśāstra, रसशास्त्र), wrote extensively about the use of sulfur in alchemical operations with mercury, from the eighth century AD onwards.[49] In the rasaśāstra tradition, sulfur is called "the smelly" (sanskrit gandhaka, गन्धक).
Early Europeanalchemists gave sulfur its own alchemical symbol, a triangle at the top of a cross. In traditional skin treatment before the modern era of scientific medicine, elemental sulfur was used, mainly in creams, to alleviate conditions such as scabies, ringworm, psoriasis, eczema, and acne. The mechanism of action is unknown'--though elemental sulfur does oxidize slowly to sulfurous acid, which in turn (through the action of sulfite) acts as a mild reducing and antibacterial agent.[50][51][52]
Modern timesEditIn 1777, Antoine Lavoisier helped convince the scientific community that sulfur was an element, not a compound. Sulfur deposits in Sicily were the dominant supply source for over half a century. Approximately 2000 tons per year of sulfur were imported into Marseilles, France for the production of sulfuric acid via the Leblanc process by the late 18th century. In industrializing Britain, with the repeal of tariffs on salt in 1824, demand for sulfur from Sicily surged upward. The increasing British control and exploitation of the mining, refining and transportation of the sulfur, coupled with the failure of this lucrative export to transform Sicily's backward and impoverished economy led to the 'Sulfur Crisis' of 1840, when King Ferdinand II gave a monopoly of the sulfur industry to a French firm, violating an earlier 1816 trade agreement with Britain. A peaceful negotiated solution was eventually mediated by France.[53][54]
In 1867, sulfur was discovered in underground deposits in Louisiana and Texas. The highly successful Frasch process was developed to extract this resource.[55]
In the late 18th century, furniture makers used molten sulfur to produce decorative inlays in their craft. Because of the sulfur dioxide produced during the process of melting sulfur, the craft of sulfur inlays was soon abandoned. Molten sulfur is sometimes still used for setting steel bolts into drilled concrete holes where high shock resistance is desired for floor-mounted equipment attachment points. Pure powdered sulfur was used as a medicinal tonic and laxative.[25] With the advent of the contact process, the majority of sulfur today is used to make sulfuric acid for a wide range of uses, particularly fertilizer.[56]
ApplicationsEditSulfuric acidEditElemental sulfur is mainly used as a precursor to other chemicals. Approximately 85% (1989) is converted to sulfuric acid (H2SO4):
2 S + 3 O2 + 2 H2O '†' 2 H2SO4Because of its importance, sulfuric acid was considered an excellent indicator of a country's industrial well-being.[57] For example with 32.5 million tonnes in 2010, the United States produces more sulfuric acid every year than any other inorganic industrial chemical.[34] The principal use for the acid is the extraction of phosphate ores for the production of fertilizer manufacturing. Other applications of sulfuric acid include oil refining, wastewater processing, and mineral extraction.[25]
Other large-scale sulfur chemicalsEditSulfur reacts directly with methane to give carbon disulfide, which is used to manufacture cellophane and rayon.[25] One of the direct uses of sulfur is in vulcanization of rubber, where polysulfide chains crosslink organic polymers. Sulfites are heavily used to bleachpaper and as preservatives in dried fruit. Many surfactants and detergents, e.g. sodium lauryl sulfate, are produced are sulfate derivatives. Calcium sulfate, gypsum, (CaSO4·2H2O) is mined on the scale of 100 million tons each year for use in Portland cement and fertilizers.
When silver-based photography was widespread, sodium and ammonium thiosulfate were widely used as "fixing agents." Sulfur is a component of gunpowder.
FertilizerEditSulfur is increasingly used as a component of fertilizers. The most important form of sulfur for fertilizer is the mineral calcium sulfate. Elemental sulfur is hydrophobic (that is, it is not soluble in water) and, therefore, cannot be directly utilized by plants. Over time, soil bacteria can convert it to soluble derivatives, which can then be utilized by plants. Sulfur improves the use efficiency of other essential plant nutrients, particularly nitrogen and phosphorus.[58] Biologically produced sulfur particles are naturally hydrophilic due to a biopolymer coating. This sulfur is, therefore, easier to disperse over the land (via spraying as a diluted slurry), and results in a faster release.
Plant requirements for sulfur are equal to or exceed those for phosphorus. It is one of the major nutrients essential for plant growth, root nodule formation of legumes and plants protection mechanisms. Sulfur deficiency has become widespread in many countries in Europe.[59][60][61] Because atmospheric inputs of sulfur continue to decrease, the deficit in the sulfur input/output is likely to increase, unless sulfur fertilizers are used.
Fine chemicalsEditOrganosulfur compounds are used in pharmaceuticals, dyestuffs, and agrochemicals. Many drugs contain sulfur, early examples being antibacterial sulfonamides, known as sulfa drugs. Sulfur is a part of many bacterial defense molecules. Most β-lactam antibiotics, including the penicillins, cephalosporins and monolactams contain sulfur.[42]
Magnesium sulfate, known as Epsom salts when in hydrated crystal form, can be used as a laxative, a bath additive, an exfoliant, magnesium supplement for plants, or (when in dehydrated form) as a desiccant.
Fungicide and pesticideEditElemental sulfur is one of the oldest fungicides and pesticides. "Dusting sulfur," elemental sulfur in powdered form, is a common fungicide for grapes, strawberry, many vegetables and several other crops. It has a good efficacy against a wide range of powdery mildew diseases as well as black spot. In organic production, sulfur is the most important fungicide. It is the only fungicide used in organically farmed apple production against the main disease apple scab under colder conditions. Biosulfur (biologically produced elemental sulfur with hydrophilic characteristics) can be used well for these applications.
Standard-formulation dusting sulfur is applied to crops with a sulfur duster or from a dusting plane. Wettable sulfur is the commercial name for dusting sulfur formulated with additional ingredients to make it water miscible.[62][63] It has similar applications and is used as a fungicide against mildew and other mold-related problems with plants and soil.
Elemental sulfur powder is used as an "organic" (i.e. "green") insecticide (actually an acaricide) against ticks and mites. A common method of use is to dust clothing or limbs with sulfur powder.
Diluted solutions of lime sulfur (made by combinding calcium hydroxide with elemental sulfur in water), are used as a dip for pets to destroy ringworm (fungus), mange and other dermatoses and parasites. Sulfur candles consist of almost pure sulfur in blocks or pellets that are burned to fumigate structures. It is no longer used in the home due to the toxicity of the products of combustion.
Bactericide in winemaking and food preservationEditSmall amounts of sulfur dioxide gas addition (or equivalent potassium metabisulfite addition) to fermented wine to produce traces of sulfurous acid (produced when SO2 reacts with water) and its sulfite salts in the mixture, has been called "the most powerful tool in winemaking."[64] After the yeast-fermentation stage in winemaking, sulfites absorb oxygen and inhibit aerobic bacterial growth that otherwise would turn ethanol into acetic acid, souring the wine. Without this preservative step, indefinite refrigeration of the product before consumption is usually required. Similar methods go back into antiquity but modern historical mentions of the practice go to the fifteenth century. The practice is used by large industrial wine producers and small organic wine producers alike.
Sulfur dioxide and various sulfites have been used for their antioxidant antibacterial preservative properties in many other parts of the food industry also. The practice has declined since reports of an allergy-like reaction of some persons to sulfites in foods.
Pharmaceutical useEditSulfur is used in pharmaceutical skin preparations for the treatment of acne and other conditions. it acts as a keratolytic agent and also kills bacteria, fungi, scabies mites and other parasites.[65] Precipitated sulfur and colloidal sulfur are used, in form of lotions, creams, powders, soaps, and bath additives, for the treatment of acne vulgaris, acne rosacea, and seborrhoeic dermatitis.[66]
Biological roleEditProtein and organic cofactorsEditSulfur is an essential component of all living cells. It is the seventh or eighth most abundant element in the human body by weight, being about as common as potassium, and a little more common than sodium or chlorine. A 70 kg (150 lb) human body contains about 140 grams of sulfur.
In plants and animals, the amino acidscysteine and methionine contain most of the sulfur. The element is thus present in all polypeptides, proteins, and enzymes that contain these amino acids. In humans, methionine is an essential amino acid that must be ingested. However, save for the vitamins biotin and thiamine, cysteine and all sulfur-containing compounds in the human body can be synthesized from methionine. The enzyme sulfite oxidase is needed for the metabolism of methionine and cysteine in humans and animals.
Disulfide bonds (S-S bonds) formed between cysteine residues in peptide chains are very important in protein assembly and structure. These covalent bonds between peptide chains confer extra toughness and rigidity.[67] For example, the high strength of feathers and hair is in part due to their high content of S-S bonds and their high content of cysteine and sulfur. Eggs are high in sulfur because large amounts of the element are necessary for feather formation, and the characteristic odor of rotting eggs is due to hydrogen sulfide. The high disulfide bond content of hair and feathers contributes to their indigestibility and to their characteristic disagreeable odor when burned.
Homocysteine and taurine are other sulfur-containing acids that are similar in structure, but not coded by DNA, and are not part of the primary structure of proteins. Many important cellular enzymes use prosthetic groups ending with -SH moieties to handle reactions involving acyl-containing biochemicals: two common examples from basic metabolism are coenzyme A and alpha-lipoic acid.[67] Two of the 13 classical vitamins, biotin and thiamine contain sulfur, with the latter being named for its sulfur content. Sulfur plays an important part, as a carrier of reducing hydrogen and its electrons, for cellular repair of oxidation. Reduced glutathione, a sulfur-containing tripeptide, is a reducing agent through its sulfhydryl (-SH) moiety derived from cysteine. The thioredoxins, a class of small protein essential to all known life, using neighboring pairs of reduced cysteines to act as general protein reducing agents, to similar effect.
Methanogenesis, the route to most of the world's methane, is a multistep biochemical transformation of carbon dioxide. This conversion requires several organosulfur cofactors. These include coenzyme M, CH3SCH2CH2SO3'', the immediate precursor to methane.[68]
Metalloproteins and inorganic cofactorsEditInorganic sulfur forms a part of iron-sulfur clusters as well as many copper, nickel, and iron proteins. Most pervasive are the ferrodoxins, which serve as electron shuttles in cells. In bacteria, the important nitrogenase enzymes contains an Fe-Mo-S cluster, is a catalyst that performs the important function of nitrogen fixation, converting atmospheric nitrogen to ammonia that can be used by microorganisms and plants to make proteins, DNA, RNA, alkaloids, and the other organic nitrogen compounds necessary for life.[69]
Sulfur metabolism and the sulfur cycleEditThe sulfur cycle was the first of the biogeochemical cycles to be discovered. In the 1880s, while studying Beggiatoa (a bacterium living in a sulfur rich environment), Sergei Winogradsky found that it oxidized hydrogen sulfide (H2S) as an energy source, forming intracellular sulfur droplets. Winogradsky referred to this form of metabolism as inorgoxidation (oxidation of inorganic compounds). He continued to study it together with Selman Waksman until the 1950s.
Sulfur oxidizers can use as energy sources reduced sulfur compounds, including hydrogen sulfide, elemental sulfur, sulfite, thiosulfate, and various polythionates (e.g., tetrathionate).[70] They depend on enzymes such as sulfur oxygenase and sulfite oxidase to oxidize sulfur to sulfate. Some lithotrophs can even use the energy contained in sulfur compounds to produce sugars, a process known as chemosynthesis. Some bacteria and archaea use hydrogen sulfide in place of water as the electron donor in chemosynthesis, a process similar to photosynthesis that produces sugars and utilizes oxygen as the electron acceptor. The photosyntheticgreen sulfur bacteria and purple sulfur bacteria and some lithotrophs use elemental oxygen to carry out such oxidization of hydrogen sulfide to produce elemental sulfur (S0), oxidation state = 0. Primitive bacteria that live around deep ocean volcanic vents oxidize hydrogen sulfide in this way with oxygen; see giant tube worm for an example of large organisms that use hydrogen sulfide (via bacteria) as food to be oxidized.
The so-called sulfate-reducing bacteria, by contrast, "breathe sulfate" instead of oxygen. They use organic compounds or molecular hydrogen as the energy source. They use sulfur as the electron acceptor, and reduce various oxidized sulfur compounds back into sulfide, often into hydrogen sulfide. They can grow on a number of other partially oxidized sulfur compounds (e.g. thiosulfates, thionates, polysulfides, sulfites). The hydrogen sulfide produced by these bacteria is responsible for some of the smell of intestinal gases (flatus) and decomposition products.
Sulfur is absorbed by plants via the roots from soil as the sulfate and transported as a phosphate ester. Sulfate is reduced to sulfide via sulfite before it is incorporated into cysteine and other organosulfur compounds.[71]
SO42'' '†' SO32'' '†' H2S '†' cysteine '†' methioninePrecautionsEditElemental sulfur is non-toxic, as generally are the soluble sulfate salts, such as Epsom salts. Soluble sulfate salts are poorly absorbed and laxative. However, when injected parenterally, they are freely filtered by the kidneys and eliminated with very little toxicity in multi-gram amounts.
When sulfur burns in air, it produces sulfur dioxide. In water, this gas produces sulfurous acid and sulfites, which are antioxidants that inhibit growth of aerobic bacteria and allow its use as a food additive in small amounts. However, at high concentrations these acids harm the lungs, eyes or other tissues. In organisms without lungs such as insects or plants, it otherwise prevents respiration in high concentrations. Sulfur trioxide (made by catalysis from sulfur dioxide) and sulfuric acid are similarly highly corrosive, due to the strong acids that form on contact with water.
The burning of coal and/or petroleum by industry and power plants generates sulfur dioxide (SO2), which reacts with atmospheric water and oxygen to produce sulfuric acid (H2SO4) and sulfurous acid (H2SO3). These acids are components of acid rain, which lower the pH of soil and freshwater bodies, sometimes resulting in substantial damage to the environment and chemical weathering of statues and structures. Fuel standards increasingly require that fuel producers extract sulfur from fossil fuels to prevent acid rain formation. This extracted and refined sulfur represents a large portion of sulfur production. In coal-fired power plants, flue gases are sometimes purified. More modern power plants that use synthesis gas extract the sulfur before they burn the gas.
Hydrogen sulfide is as toxic as hydrogen cyanide, and kills by the same mechanism, though hydrogen sulfide is less likely to cause surprise poisonings from small inhaled amounts, because of its disagreeable warning odor. Though pungent at first, however, hydrogen sulfide quickly deadens the sense of smell'--so a victim may breathe increasing quantities and be unaware of its presence until severe symptoms occur, which can quickly lead to death. Dissolved sulfide and hydrosulfide salts are also toxic by the same mechanism.
ReferencesEdit^Conventional Atomic Weights 2013. Commission on Isotopic Abundances and Atomic Weights^Standard Atomic Weights 2013. Commission on Isotopic Abundances and Atomic Weights^Magnetic susceptibility of the elements and inorganic compounds, in Handbook of Chemistry and Physics. CRC press. 2000. ISBN 0849304814. ^"Sulfur History". Georgiagulfsulfur.com. Retrieved 2008-09-12. ^ abcGreenwood, N. N.; & Earnshaw, A. (1997). Chemistry of the Elements (2nd ed.), Oxford:Butterworth-Heinemann. ISBN 0-7506-3365-4.^ ab"sulphur". Oxford English Dictionary (3rd ed.). Oxford University Press. September 2005. ^McNaught, Alan (1991). "Journal style update". The Analyst116 (11): 1094. Bibcode:1991Ana...116.1094M. doi:10.1039/AN9911601094. ^"Ask Oxford". Retrieved 2010-11-12. ^Mallory & Adams (2006) The Oxford introduction to Proto-Indo-European and the Proto-Indo-European world, Oxford University Press^Rettig, S. J.; Trotter, J. (15 December 1987). "Refinement of the structure of orthorhombic sulfur, α-S8". Acta Crystallographica Section C Crystal Structure Communications43 (12): 2260''2262. doi:10.1107/S0108270187088152. ^A strong odor called "smell of sulfur" actually is given off by several sulfur compounds, such as hydrogen sulfide and organosulfur compounds.^ abcGreenwood, Norman N.; Earnshaw, Alan (1997). Chemistry of the Elements (2nd ed.). Butterworth-Heinemann. pp. 645''665. ISBN 0080379419. ^Steudel, Ralf; Eckert, Bodo (2003). "Solid Sulfur Allotropes Sulfur Allotropes". Topics in Current Chemistry. Topics in Current Chemistry 230: 1''80. doi:10.1007/b12110. ISBN 978-3-540-40191-9. ^Steudel, R. (1982). "Homocyclic Sulfur Molecules". Topics in Current Chemistry. Topics in Current Chemistry 102: 149''176. doi:10.1007/3-540-11345-2_10. ISBN 978-3-540-11345-4. ^Tebbe, Fred N.; Wasserman, E.; Peet, William G.; Vatvars, Arturs; Hayman, Alan C. (1982). "Composition of Elemental Sulfur in Solution: Equilibrium of S6, S7, and S8 at Ambient Temperatures". Journal of the American Chemical Society104 (18): 4971''4972. doi:10.1021/ja00382a050. ^Meyer, Beat (1964). "Solid Allotropes of Sulfur". Chemical Reviews64 (4): 429''451. doi:10.1021/cr60230a004. ^Meyer, Beat (1976). "Elemental sulfur". Chemical Reviews76 (3): 367''388. doi:10.1021/cr60301a003. ^Cameron, A. G. W. (1957). "Stellar Evolution, Nuclear Astrophysics, and Nucleogenesis". CRL-41. ^Mason, B. (1962). Meteorites. New York: John Wiley & Sons. p. 160. ISBN 0-908678-84-3. ^Lopes, Rosaly M. C.; Williams, David A. (2005). "Io after Galileo". Reports on Progress in Physics68 (2): 303''340. Bibcode:2005RPPh...68..303L. doi:10.1088/0034-4885/68/2/R02. ^Rickwood, P. C. (1981). "The largest crystals". American Mineralogist66: 885''907. ^Kutney, Gerald (2007). Sulfur: history, technology, applications & industry. Toronto: ChemTec Publications. p. 43. ISBN 978-1-895198-37-9. OCLC 79256100. ^Klein, Cornelis and Cornelius S. Hurlbut, Jr., Manual of Mineralogy, Wiley, 1985, 20th ed., p. 265-6 ISBN 0-471-80580-7^Sulphur on Mindat.org^ abcdeNehb, Wolfgang; Vydra, Karel (2006). "Sulfur". Ullmann's Encyclopedia of Industrial Chemistry. Ullmann's Encyclopedia of Industrial Chemistry. Wiley-VCH Verlag. doi:10.1002/14356007.a25_507.pub2. ISBN 3-527-30673-0. ^Riegel, Emil; Kent, James (2007). Kent and Riegel's handbook of industrial chemistry and biotechnology1. New York: Springer. p. 1171. ISBN 978-0-387-27842-1. OCLC 74650396. ^Washington, Booker T. The Man Farthest Down: A Record of Observation and Study in Europe. ^ abcEow, John S. (2002). "Recovery of sulfur from sour acid gas: A review of the technology". Environmental Progress21 (3): 143''162. doi:10.1002/ep.670210312. ^ abcSchreiner, Bernhard (2008). "Der Claus-Prozess. Reich an Jahren und bedeutender denn je". Chemie in unserer Zeit42 (6): 378''392. doi:10.1002/ciuz.200800461. ^Hyndman, A. W.; Liu, J. K.; Denney, D. W. (1982). "Sulfur: New Sources and Uses". ACS Symposium Series 183. pp. 69''82. doi:10.1021/bk-1982-0183.ch005. ISBN 0-8412-0713-5. ^Mohamed, Abdel-Mohsen; El-Gamal, Maisa (2010). Sulfur concrete for the construction industry: a sustainable development approach. Fort Lauderdale: J. Ross Publishing. p. 109. ISBN 978-1-60427-005-1. OCLC 531718953. ^McElvaney, Kevin. "The Men Who Mine Volcanos". theatlantic.com. The Atlantic. Retrieved 26 February 2015. ^Apodaca, Lori E. (2012) Sulfur. Mineral Commodity Summaries. USGS^ abApodaca, Lori E. "Mineral Yearbook 2010: Sulfur". United States Geological Survey. ^Shriver, Atkins. Inorganic Chemistry, Fifth Edition. W. H. Freeman and Company, New York, 2010; pp 416^Handbook of Preparative Inorganic Chemistry, 2nd ed. Edited by G. Brauer, Academic Press, 1963, NY. Vol. 1. p. 421.^Hasek, W. R. (1961). "1,1,1-Trifluoroheptane". Org. Synth.41: 104. ^Rutenberg, M. W; Horning, E. C. (1950). "1-Methyl-3-ethyloxindole". Org. Synth.30: 62. ^Heal, H. G. (1980). The Inorganic Heterocyclic Chemistry of Sulfur, Nitrogen, and Phosphorus. London: Academic Press. ISBN 0-12-335680-6. ^Chivers, T. (2004). A Guide To Chalcogen-Nitrogen Chemistry. Singapore: World Scientific. ISBN 981-256-095-5. ^Vaughan, D. J.; Craig, J. R. "Mineral Chemistry of Metal Sulfides" Cambridge University Press, Cambridge (1978) ISBN 0-521-21489-0^ abCremlyn R. J.; "An Introduction to Organosulfur Chemistry" John Wiley and Sons: Chichester (1996). ISBN 0-471-95512-4.^Wilson, R. W.; Penzias, A. A.; Wannier, P. G.; Linke, R. A. (March 15, 1976). "Isotopic abundances in interstellar carbon monosulfide". Astrophysical Journal204: L135''L137. Bibcode:1976ApJ...204L.135W. doi:10.1086/182072. ^Banoub, Joseph (2011). Detection of Biological Agents for the Prevention of Bioterrorism. Dordrecht: Springer. p. 183. ISBN 978-90-481-9815-3. OCLC 697506461. ^Rapp, George Robert (2009-02-04). Archaeomineralogy. p. 242. ISBN 978-3-540-78593-4. ^Odyssey, book 22, lines 480''495 ' www.perseus.tufts.edu. Retrieved on 2012-08-16.^Pliny the Elder on science and technology, John F. Healy, Oxford University Press, 1999, ISBN 0-19-814687-6, pp. 247''249.^ abcZhang, Yunming (1986). "The History of Science Society: Ancient Chinese Sulfur Manufacturing Processes". Isis77 (3): 487. doi:10.1086/354207. ^White, David Gordon (1996). The Alchemical Body '-- Siddha Traditions in Medieval India. Chicago: University of Chicago Press. pp. passim. ISBN 978-0-226-89499-7. ^Lin, A. N.; Reimer, R. J.; Carter, D. M. (1988). "Sulfur revisited". Journal of the American Academy of Dermatology18 (3): 553''558. doi:10.1016/S0190-9622(88)70079-1. PMID 2450900. ^Maibach, HI; Surber, C.; Orkin, M. (1990). "Sulfur revisited". Journal of the American Academy of Dermatology23 (1): 154''156. doi:10.1016/S0190-9622(08)81225-X. PMID 2365870. ^Gupta, A. K.; Nicol, K. (2004). "The use of sulfur in dermatology". Journal of drugs in dermatology : JDD3 (4): 427''31. PMID 15303787. ^Riall, Lucy (1998). Sicily and the Unification of Italy: Liberal Policy and Local Power, 1859''1866. Oxford University Press. ISBN 9780191542619. Retrieved 2013-02-07. ^Thomson, D. W. (April 1995). "Prelude to the Sulphur War of 1840: The Neapolitan Perspective". European History Quarterly25 (2): 163''180. doi:10.1177/026569149502500201. ^Botsch, Walter (2001). "Chemiker, Techniker, Unternehmer: Zum 150. Geburtstag von Hermann Frasch". Chemie in unserer Zeit (in German) 35 (5): 324''331. doi:10.1002/1521-3781(200110)35:53.0.CO;2-9. ^Kogel, Jessica (2006). Industrial minerals & rocks: commodities, markets, and uses (7th ed.). Colorado: Littleton. p. 935. ISBN 978-0-87335-233-8. OCLC 62805047. ^Sulfuric Acid Growth. Pafko.com. Retrieved on 2012-08-16.^Sulfur as a fertilizer. Sulphurinstitute.org. Retrieved on 2012-08-16.^Zhao, F.; Hawkesford, MJ; McGrath, SP (1999). "Sulphur Assimilation and Effects on Yield and Quality of Wheat". Journal of Cereal Science30 (1): 1''17. doi:10.1006/jcrs.1998.0241. ^Blake-Kalff, M. M. A. (2000). "Diagnosing sulfur deficiency in field-grown oilseed rape (Brassica napus L.) and wheat ( Triticum aestivum L.)". Plant and Soil225 (1/2): 95''107. doi:10.1023/A:1026503812267. ^Ceccotti, S. P. (1996). "Plant nutrient sulphur-a review of nutrient balance, environmental impact and fertilizers". Fertilizer Research43 (1''3): 117''125. doi:10.1007/BF00747690. ^Mohamed, Abdel-Mohsen Onsy; El Gamal, M. M (2010-07-13). Sulfur Concrete for the Construction Industry: A Sustainable Development Approach. pp. 104''105. ISBN 978-1-60427-005-1. ^Every, Richard L. et al. (1968-08-20). "Method for Preparation of Wettable Sulfur". Retrieved 2010-05-20. ^Spencer, Benjamin Sulfur in wine demystified. intowine.com. Retrieved 2011-10-26.^Hagers Handbuch der Pharmazeutischen Praxis (in German) 6B (4th ed.). Berlin''Heidelberg''New York: Springer. 1978. pp. 672''9. ISBN 3-540-07738-3. ^Arzneibuch-Kommentar. Wissenschaftliche Erl¤uterungen zum Europ¤ischen Arzneibuch und zum Deutschen Arzneibuch [Pharmacopoeia Commentary. Scientific annotations to the European Pharmacopoeia and the German Pharmacopoeia] (in German) (23rd ed.). Stuttgart: Wissenschaftliche Verlagsgesellschaft. 2004. Monographie Schwefel zum ¤uŸerlichen Gebrauch [Monograph Sulfur for external use]. ISBN 978-3-8047-2575-1. ^ abNelson, D. L.; Cox, M. M. (2000). Lehninger, Principles of Biochemistry (3rd ed.). New York: Worth Publishing. ISBN 1-57259-153-6. ^Thauer, R. K. (1998). "Biochemistry of methanogenesis: a tribute to Marjory Stephenson:1998 Marjory Stephenson Prize Lecture". Microbiology144 (9): 2377''2406. doi:10.1099/00221287-144-9-2377. PMID 9782487. ^Lippard, S. J.; Berg, J. M. (1994). Principles of Bioinorganic Chemistry. University Science Books. ISBN 0-935702-73-3. ^Pronk JT; Meulenberg R; Hazeu W; Bos P; Kuenen JG (1990). "Oxidation of reduced inorganic sulphur compounds by acidophilic thiobacilli". FEMS Microbiology letters75 (2''3): 293''306. doi:10.1111/j.1574-6968.1990.tb04103.x. ^Heldt, Hans-Walter (1996). Pflanzenbiochemie. Heidelberg: Spektrum Akademischer Verlag. pp. 321''333. ISBN 3-8274-0103-8. External linksEdit
-------------------------------------------------------------------------------------------------------------
ICD-10
Search Engine
You mentioned ICD-10 in the last show--although hospital billing is very boring I thought a couple things were interesting during my time in the industry. I used to work for a company that you could say is 'the ICD-* search engine'. Doctors have to enter in and search every diagnosis when they enter into their patient charts. Something like 80%+ of all doctors use it in the US.
Because using a computer for health records is mandated, one company has insight into almost every diagnosis being reported in the US (and growing internationally too). They don't get your name and other identifiable info, it;s just the actual diagnosis and meta-data. Naturally, they're selling (or about to sell) this data to pharma companies so that they can presumably push their anti-depressant and dick pill commercials to better geographical areas, or A/B test their commercials and find out what gets resilts, I.e. causes an increase in people reporting depression or whatever. Also, apparently the CDC has no interest in this data but I don't know why.
Another thing is that not surprisingly the government makes billing and re-imbursement stuff intentionally difficult so that hospitals get less money back. They are extremely nitpicky about paperwork, and you can't resubmit when there are errors. They intentionally fill ICD and other billing stuff like HCC with patent ambiguity to make it harder to document right and get paid (really, to get paid back).
Here are some other ridiculous ICD-10 codes I remember:
-Burn due to water-skis on fire
-Struck by turtle
-Sucked into jet engine, subsequent encounter (i.e. guy got sucked into a jet engine, somehow lived, and is now coming back for a check-up)
Jack
Detailed overview from DNB-crazy codes!
ITM Adam and John!
I have been a dude named Ben in Healthcare IT for the last 6 years and I hold a CPHIMS certification (which isn't just like a BS MCSE).
While you did get most things correct on the Thursday's show, I wanted to shed some light on why medical records are going digital and the potential risks that come with it. I've worked at 3 different hospitals in California ranging from a small critical-access facility (10-25 beds typically that's basically a big Emergency Dept) to a 200 bed Level I Trauma Center where I currently work.
BTW, before I start here are some of my favorite ICD10 codes:
V97.33XD: Sucked into jet engine, subsequent encounter.
V00.01XD: Pedestrian on foot injured in collision with roller-skater, subsequent encounter.
Y92.146: Swimming-pool of prison as the place of occurrence of the external cause.
W61.62XD: Struck by duck, subsequent encounter.
63.1: Problems in relationship with in-laws.
R46.1: Bizarre personal appearance.
Security
At my current facility, we had to disable our password expiration policy network-wide because the Execs were annoyed that they had to change their password. There are numerous generic accounts that can be used to access all sorts of areas in the EHR (Electronic Health Record).
There are no requirements for security audits, although HIPAA and the HITECH act lay out most of the strict requirements specifically for patient records. Our WiFi networks do have MAC address filtering and segmented networks for patients/visitors, and of course there are other things in place, however we have had 3 major data breaches. Not by hackers, but by idiocy. One was 50k patient records were, for some reason, on a laptop that was stolen from a car. The laptop didn't have encryption on the hard drive, but they do now.
For medications, we have cabinets like this that dispense medications after you enter in what you need. However, they can be put into manual override mode (like during a downtime) and then it's a free for all--just grab whatever you want.
As with anything digital, if someone really wanted to get to it, then can. We have TONS of temp contractors come in who get the generic admin password that hasn't changed in 10 years. I got locked out of my account the other day and used the generic admin account to VPN into the network, connect to our domain controller and reset my own password--yea, scary.
Obamacare & Meaningful Use
Bush mandated the use of EHRs in 2005, but the government incentives to actually put it into place didn't actually come into play until the American Reinvestment & Recovery Act in 2009. Under this program, healthcare providers were mandated to meet certain standards and have EHRs (called Meaningful Use) in stages. If they complied, they would get a chunk of change from the government. My last hospital, just 85 beds (a TINY place compared to most) got almost $5 million after meeting the standards early.
The standards become mandatory in 2015 and if you don't meet them you will no longer receive Medicare payments. What you may not realize that most small, community hospitals (like the 85 bed facility) usually get around 80% of their revenues from Medicare--making them essentially (ding ding!) government run hospitals. Without Medicare, you'd have to close. These standards also include stipulations like if a Medicare patient is readmitted with the same diagnosis within 30 days, you don't get paid for it. It's supposed to encourage better care but that's largely not the case.
Big Data
One set of standards in MU mandates the reporting of Core Measures--things like how many patients have heart disase, diabetes, substance use smoke cigarettes, etc (more here: http://www.jointcommission.org/core_measure_sets.aspx). When a patient is admitted, this data is automatically sent to the federal government. While every single hospital in the country must send this data, data itself is actually less portable than you might think.
At my facility, we have over 100 healthcare applications and even an iPhone app used for discharge planning. Systems for the Birth Center, cancer center, imaging, the kitchen, EVS (janitors--so they know which rooms are ready to be cleaned), revenue management, ordering meds, using lab equipment, etc etc. Only about half of these pieces of software talk to each other. Things like the list of patients, diagnosis, lab results, xrays are sent in between systems via an interface standard called HL7.
Now that most facilities in the country are up on EHRs, Health Information Exchanges (HIE) are being developed. These are regional, national, or local data repositories that a hospital feeds ALL their data into so insurance companies, other hospitals, and the government can have easy access to it. This is the next level of "big data" and it'll change the game completely. Right now we live in a segmented world where very few doctor's offices exchange data with hospitals so a single patient could have dozens of separate medical records. HIE systems are being billed as the way for a single record to follow you everywhere.
IT $$$$
As you can imagine, the IT costs suddenly on hospital's balance sheets are astronomical and came out of nowhere. We have our core EHR hosted by the vendor in an offsite data center. There are only 4 major EHR vendors (a bunch of ancillary ones, too, but 4 CORE big guys): Epic (Kaiser uses this), Cerner (Sutter uses this), Meditech and McKesson Paragon (we use this one). Being at the mercy of this vendor is painful--just the other day a guy accidentally turned off our SQL database and took the Paragon system down for 30 minutes. We had a network issue that took it down for 10 hours yesterday, too. When the system goes down, "providers" (as they really are called or clinicians) have to revert to paper for ordering meds, notes, admitting patients, etc and then input it all into the computer when the system is back up. We have a quarterly 7-10 hour downtime for our vendor to upgrade the core system with patches, updates, etc. And as with all upgrades, it fixes 10 things and breaks 20 new things. Sometimes it seems like they don't even test the new release before giving it to us.
A big problem with these massive EHRs are the infrastructure costs. To come up on the next major version of Paragon, we have to spend several hundred thousand dollars to upgrade our domain, our network switches, add more disc space in the SAN, and countless other things. Oh and the state has regulatory requirements built into these releases, so you HAVE to update regularly. And the next upgrade is like going from Windows 2000 to Windows 8 so it will require a huge amount of staff training.
We just moved from one hosted vendor to another and it took 12 months of planning, 15 hours of the hospital being completely back on paper for the migration, and around $5 million. We are considered a mid-sized hospital, so just imagine what Kaiser or other big systems are doing. As you can imagine, this is an absolute bonanza for consults and dudes named Ben. Our IT dept has around 50 people and the hospital itself has a staff of about 1,500. Our top paid engineers make close to $200k and they deserve it. Our IT budget is 6% of the overall annual budget for the entire hospital. A typical EHR takes 3 years to implement and can cost several million dollars in the end (or up to a billion for a place like Kaiser/Sutter).
Now, it may seem like I'm poopooing the entire idea of EHRs, but there are certainly benefits. Medical errors have been reduced by 50%, cost savings have been realized, and the entire team of providers, case managers, physical therapsists etc can see the same information and communicate more effectively about a patient's condition and treatment. It's pretty cool. Docs use the system to order all medications and we had a case where an unconscious patient's primary care doc was called by our ED. He was out sailing in the bay and used his phone to look up what allergies the patient had and it turned out there were a few bad ones--without an EHR that patient could have died. However, usability is not one of the positive angles of EHRs.
Usability
Nurses and doctors HATE computer systems for the most part. They are some of the hardest customers on the planet. Most have used other EHRs and the grass is always greener. Many of them are nice about it, but getting berated about some random feature or bug in the system is a regular occurrence even though we are powerless to fix a lot of them. I was shadowing an OR case the other day and right as the surgeon put the knife into the patient, the 42'' TV running our EHR showing him where to cut timed out to screensaver--there are a million examples like that. It's comical almost.
Hope this helps your understanding of Healthcare IT! If you have any questions specifically just let me know.
Bingo boom shakalaka
More crazy codes from Carwin
2015 ICD-10-CM Diagnosis Code V91.07XA
Burn due to water-skis on fire, initial encounter
2015Billable CodeNot A Principal Dx
V91.07XA describes the circumstance causing an injury, not the nature of the injury, and therefore should not be used as a principal diagnosis.
V91.07XA is a billable ICD-10-CM code that can be used to indicate a diagnosis for reimbursement purposes.
On October 1, 2015 ICD-10-CM will replace ICD-9-CM in the United States, therefore, V91.07XA - and all other ICD-10-CM codes - should only be used for training or planning purposes until then.
This is the American ICD-10-CM version of V91.07XA. Other international ICD-10 versions may differ.
HIPPA training
ITM Adam,
Feel free to use whatever portion of this you feel is appropriate.
I was listening to the 712 show and in the first half hour you talk about HIPPA having some regulation about sharing health info with the government. I work at an assisted living facility and just finished the HIPPA training, put together by the HIPPA people. We are told and trained to cooperate and share any date with the government that is asked for. Not that I am saying you are wrong, I think HIPPA does have in the regulation that minimal, only, sharing is expected, but the training they are giving the "boots on the ground" is that we are to comply with any government BS. I agree with your conclusion that a mental health database is being setup and we are going to get screwed in the future.
Sir Greg
The 16 most absurd ICD-10 codes | Healthcare Dive
Fri, 10 Apr 2015 18:47
There are 68,000 billing codes under the new ICD-10 system, as opposed to a paltry 13,000 under the current ICD-9. The expansive diagnostic codes, intended to smooth billing processes and assist in population health and cost reduction across the healthcare delivery system, have providers across the board worried about integration: A recent survey by the American Health Information Management Association and the eHealth Initiatives found that 38% of providers think revenue will decrease in year following the switch from ICD-9, while only 6% think revenue will increase.
Still, providers are preparing for the switch. After yet another delay this year, the official changeover date is set for October 1, 2015'‹, and 40% of respondents say they will be prepared to do end-to-end testing by the end of this year.
Despite the controversy surrounding ICD-10, there is one universally agreed-upon upside to the hyper-specific coding system: Weird and obscure codes that stand for bizarre medical injuries. There's even an illustrated book, Struck by an Orca: ICD-10 Illustrated. (Healthcare Dive is super into it.)
Therefore, behold! The 16 most absurd codes in the entire ICD-10 set, with a little advice from Healthcare Dive on how to handle these cases should they come into your ER:
16. V97.33XD: Sucked into jet engine, subsequent encounter. Sucked into a jet engine, survived, then sucked in again? First of all, that really, really sucks. Second of all, this patient is obviously Wolverine, and should be detained for imaging and posterity.
(Technically, this means "subsequent encounter with a physician" not "subsequent encounter with a jet engine," but that's less dramatic.)
15. W51.XXXA: Accidental striking against or bumped into by another person, sequela. The "sequela" here implies the kind of human bumper cars that can only happen at a music festival, the subway or possibly an active combat zone. Potentially fatal for agoraphobics. Recommend handling with care.
14. V00.01XD: Pedestrian on foot injured in collision with roller-skater, subsequent encounter.First, are roller skates even still a thing anymore? I mean, other than how one knows spring has sprung in Central Park? Second, can you call a person on roller skates a pedestrian? Thirdly, if the answers to one and two are "yes," then these things should be outlawed, because they are obviously dangerous.
13. Y93.D: Activities involved arts and handcrafts. Camp is a dangerous thing. Hot glue guns and knitting needles definitely wouldn't be allowed on a plane, yet we habitually allow 7-year-olds to play with them. This is a public health crisis that needs to be addressed.
12.Z99.89: Dependence on enabling machines and devices, not elsewhere classified.There's a reason they call it the Crackberry. This is an obsolete joke, but there just isn't an iPhone pun that can compete with "crackberry."
11. Y92.146: Swimming-pool of prison as the place of occurrence of the external cause.There is also a code for "day spa of prison as the place of occurrence."
10. S10.87XA: Other superficial bite of other specified part of neck, initial encounter.Alright, people. Let's call a spade a spade. "Other superficial bite of other specified part of the neck?" This is a hickey. Admit it. Although why anyone would be admitted for that remains a mystery.
9. W55.41XA: Bitten by pig, initial encounter'‹.First, be sure that the patient is restrained from doing whatever he or she may have done to provoke the pig in the first place. Security should be placed on alert. Also, what was this person doing in a farm setting in the first place? Pigs are not pets.
8. W61.62XD: Struck by duck, subsequent encounter.Maladies that rhyme should be given immediately priority in the ER. Ducks, like most water fowl, are mean-spirited animals and this case should be treated with the utmost urgency as it is likely to be a serious injury.
7. Z63.1: Problems in relationship with in-laws. Who doesn't?
'‹'‹6. W220.2XD: Walked into lamppost, subsequent encounter. No. No. People. You only get to do this once. ONCE. If a patient is going around whacking into lampposts regularly, there is a deeper problem here, and he should be referred to psych immediately.
5. Y93.D: V91.07XD: Burn due to water-skis on fire, subsequent encounter'‹.How does this happen? Are water skis even flammable?
4. W55.29XA: Other contact with cow, subsequent encounter."Other contact with cow." OTHER CONTACT WITH COW? There are codes for "bitten by cow" and "kicked by cow." What else is there?! What, precisely, is the contact with the cow that has necessitated a hospital visit?!
3. W22.02XD: V95.43XS: Spacecraft collision injuring occupant, sequela. The existence of this type of code does not engender trust in the National Aeronautics and Space Administration. Shouldn't they have more control over their spacecraft than that? Or are they just careening around in the ether, pinging into one another and injuring occupants/astronauts?
2. W61.12XA: Struck by macaw, initial encounter. '‹Macaws are endangered'--some are extinct in the wild'--so if a patient has been struck by a macaw, chances are, it was the patient's fault. Consider calling the SPCA and/or the police. The macaw needs to be found and treated immediately.
'‹1. R46.1: Bizarre personal appearance. LADY GAGA, IS THAT YOU? WE LOVE YOUR MEAT SUIT.
But seriously, who gets to decide what constitutes "bizarre personal appearance"? Let the people do what they want!
Did we miss one? Tweet us your favorite bizarre code at @healthcaredive. Would you like to see more healthcare news like this in your inbox on a daily basis? Subscribe to our Healthcare Dive email newsletter. You may also want to read Healthcare Dive's feature on the ICD-10 delay.
MIC
A-10 Scandal
Silent Death - The Zipper
Scorpion = Barbie Plane
Air Force Right to Fire General Who Threatened Troops with Treason
Sun, 12 Apr 2015 05:02
Air Force Right to Fire General Who Threatened Troops with TreasonApril 10, 2015
Major General James N. Post III
The Air Force's decision to remove Major General James Post from his position as vice commander of Air Combat Command was the right move.
As we said in our February 5 letter to the Air Force Secretary, Major General Post had to be held accountable. When he told service members it would be ''treason'' to communicate with Congress about the A-10's capabilities it showed he was unfit for command.
Members of the military have a constitutional right to communicate with Congress. To threaten them with an offense as serious as treason goes against the very oath that all military personnel and Major General Post, himself, had to take.
We look forward to an investigation into the retaliation against those who brought Major General Post's remarks to light.
Read POGO's letter to the Air Force Secretary.
Read the Air Force Inspector General's investigation into Major General Post.
Image by AF.mil
Ms. Brian's areas of expertise include: National Security, Government Oversight, Wasteful Defense Spending, Ethics, Open Government, Whistleblower Issues
Topics:Government Accountability, National Security
Authors:Danielle Brian
Please enable JavaScript to view the comments powered by Disqus.
comments powered by
POGO on Facebook
Latest PodcastPodcast; Social Media, Internet Provides Opportunities, Challenges for LawmakersThe Congressional Management Foundation offers the Gold Mouse Awards annually to members of Congress who make the most of the opportunity the digital world offers them. POGO spoke with members of Rep. Mike Honda's communications team about their award.
Hold Post Accountable for His Chilling Statement
Sun, 12 Apr 2015 05:01
February 5, 2015
February 5, 2015
The Honorable Deborah Lee JamesSecretary of the Air ForceU.S. Department of the Air Force1670 Air Force PentagonWashington, DC 20330-1670
Via email:
Dear Secretary James:
We are writing to express our deep concerns about reported comments from Major General James Post that service members who communicate to Congress about the capabilities and successes of the A-10 are committing ''treason.''[1] These comments undermine service members' constitutional rights to petition their government, and appear to violate statutory protections for military whistleblowers.[2] Most importantly, they try to interfere with Congress's ability to learn how these systems are currently performing in combat to address current threats, precisely the kind of information they need to know to conduct their constitutional duties and to oversee the Air Force's operations and programs.
We are also deeply concerned about allegations that the Air Force has initiated retaliatory investigations against service members who have already come forward to Congress.[3] If true, this seems to indicate that there is a broader problem of a toxic culture against whistleblowers. We urge you to ensure that no prohibited personnel actions are taken against any service members who have come forward, and to suspend or remove any officials found to be responsible for initiating retaliatory investigations.
Major General Post's comments seriously call into question his judgment and ability to continue in his role as vice commander of the Air Force's Air Combat Command. Major General Post has not denied making these comments, and while we understand that an investigation is ongoing, we think the known facts merit his immediate removal. At the very least, he should be suspended while the investigation is ongoing and removed if the allegations are proven to be true.
As you are aware, Congress recently expanded whistleblower protections for service members to ensure that they could come forward without fear of retaliation. These reforms were initiated following reports of reprisal against sexual assault survivors, including 62 trainees at Lackland Air Force Base, and against Air National Guard whistleblowers expressing concerns about the F-22's On-Board Oxygen Generation System (OBOGS).[4] Given these previous concerns about the Air Force's treatment of whistleblowers, we believe it is particularly incumbent upon you to send a strong signal that retaliatory behavior will not be tolerated.
We appreciate your attention to this issue, and would welcome the opportunity to discuss this in more detail with you or your staff. If you have any questions or would like additional information, please contact Mandy Smithberger at the Project On Government Oversight's Straus Military Reform Project at 202-347-1122 or msmithberger@pogo.org.
Sincerely,
Project On Government Oversight
Center for Financial Privacy and Human Rights
Government Accountability Project
International Association of Whistleblowers
London Center for Policy Research
National Whistleblower Center
NETWORK, A National Catholic Social Justice Lobby
Peace Action
Taxpayers Protection Alliance
Whistlewatch.org
Elaine Mittleman, Esq.
Kevin Downing
cc: Senator John McCain, Chairman, Senate Armed Services CommitteeSenator Jack Reed, Ranking Member, Senate Armed Services CommitteeRepresentative Mac Thornberry, Chairman, House Armed Services CommitteeRepresentative Adam Smith, Ranking Member, House Armed Services CommitteeMembers of the House and Senate Armed Services CommitteeSenator Susan CollinsSenator Chuck GrassleySenator Mark Warner
Please enable JavaScript to view the comments powered by Disqus.
comments powered by
SCORPION-Could This Airplane Replace the A-10 Warthog? (TXT)
Sun, 12 Apr 2015 05:52
The Fairchild Republic A-10 Thunderbolt. Armed and... in danger? Photo source: Wikimedia Commons.
After more than four decades in service, the A-10 Warthog is due for a replacement. So says the U.S. Air Combat Command.
What's more, ACC says it's already "thinking about" fielding such a replacement. But what might that replacement be?
Last week, we got a clue. As reported by Reuters, the Air Force has recently begun evaluating Textron's (NYSE: TXT ) Scorpion fighter jet as a potential 21st-century replacement for the 20th-century Warthog.
Quoting Air Force Gen. Herbert Carlisle, head of ACC, Reuters reports that the Air Force has done "some research" on Textron's new budget-priced Scorpion. And Carlisle thinks the plane just might be what the Air Force needs to perform close-air support in "contested environments" that could prove lethal to the A-10.
But what exactly is Scorpion, and how does it stack up against the A-10 Thunderbolt Warthog?
Source: Textron AirLand.
Introducing Scorpion Textron describes Scorpion as a modern "surveillance and strike" aircraft boasting:
twin turbofan engines, producing 8,000 lbs. of combined thrusta 45,000-foot top altitudea top speed of 520 mphsix hard points for carrying weapons on its wings (6,200 lbs. capacity)room for 3,000 lbs. more payload in an internal weapons baya flyaway cost of less than $20 million -- and an hourly operations cost of about $3,000Relative to the A-10 Warthog, Textron's Scorpion has about half as much engine power -- but also half the weight. The aircraft's range is roughly equal to the A-10's, but the Scorpion is a better "sprinter," featuring both a faster maximum speed and a slower "stall speed" -- important for flying low-and-slow on ground support missions.
Of course, the biggest difference between Scorpion and the A-10 Warthog is the absence of a "big gun" -- specifically, the 30 mm GAU-8 Avenger rotary cannon that is both the A-10's primary weapon and its defining feature. Designed to kill Soviet tanks in a circa-1980s Cold War confrontation -- and actually used to destroy nearly 900 Soviet-vintage Iraqi tanks in the 1990s Gulf War I -- the A-10's big gun is notably absent from Textron's Scorpion.
Close-up shot of the A-10 Warthog's very big gun. Photo source: Omono via Wikimedia Commons.
But can Scorpion replace the A-10 Warthog without it?
Scorpion's biggest fan Bill Anderson, president of Textron AirLand, thinks so. In a recent phone conversation, Anderson pointed out that Textron originally developed Scorpion to perform a "Multi Mission, ISR/strike platform" role. It thus was not designed to duplicate the A-10's mission; it prefers using precision weapons to attack ground targets from a safe distance out of range of enemy defenses.
That fact addresses the Air Force's concerns about the A-10 Warthog's survivability. And flying high and fast, Scorpion might be a good candidate to take over the A-10's role in some threat environments.
As Anderson explains it, "two abilities are critical" for any aircraft performing close-air support: "The ability to communicate with ground forces, and the ability to find and fix a target." Anderson argues that "Scorpion is very good in both these roles, and can loiter up to five hours," providing ground support as needed through its suite of high-tech, standoff weapons. What's more, while the aircraft doesn't carry an integrated 30 mm cannon, its modular design permits it to carry one or even two cannon "pods" on its wings, to provide a strafing ability when there's a need to get up close and personal.
Textron's Scorpion: No big gun, but room for more than a few big bombs. Photo source: Textron AirLand.
A budget-priced fighter jet for tight fiscal times Most crucially, Textron's Scorpion is both cheap to buy and cheap to fly, and designed to permit easy upgrades over time. This addresses the big problem with modern fighter jets, in that they cost a fortune, take forever to develop, and by the time they're introduced, they're often stuck using out-of-date technology.
Citing research from DARPA, Anderson notes that, in decades past, it was possible to design and build a new fighter jet in five to 10 years. These days, it takes closer to 20 years to bring a new concept to market. Thus, technology that was cutting-edge when the Lockheed Martin's F-22 Raptor and F-35 Lightning II were first envisioned, for example, is now already becoming obsolete -- just as the planes are starting to fly.
To address this problem, Textron built Scorpion with off-the-shelf parts -- taking fully vetted "mature high technology" that is already available, and assembling it into a jet that's modern today -- and can be upgraded as technology advances tomorrow. This permitted an exceptionally fast turnaround time in developing the plane. As Anderson describes it, "From the time we got the 'go' signal, from a clean slate, it took 23 months for Scorpion to take its first test flight."
An attractive proposition As a result, the Scorpion is nearly as cheap to buy as it is to fly. Extrapolating from historical U.S. Air Force data, the current-day cost of a new A-10 would be approximately $18.6 million -- roughly equal to Scorpion's price tag. Theoretically, at least, the Air Force could swap its entire fleet of old A-10s for shiny new Scorpions at a cost of less than $6 billion. (And incidentally, that would be worth about 40% of a year's revenues to Textron.)
They might even be tempted to make such a switch. Air Force figures show that, per flight hour, it costs $17,716 to operate an A-10 Warthog -- whereas Textron says Scorpion will cost just one-sixth of that, giving the Air Force a much reduced operating cost.
Granted, for die-hard supporters of the A-10 Warthog -- and they are legion -- anything less than a full-fledged A-10 probably isn't going to cut it as a replacement for the aging warbird. But for a U.S. Air Force that's increasingly strapped for cash, with much of its budget tied up buying high-end F-35 fighter jets, Textron's Scorpion seems to offer a way to perform low-tech, low-and-slow close-air support on a budget.
Now all Textron has to do is convince the Air Force to buy it.
1 great stock to buy for 2015 and beyond2015 is shaping up to be another great year for stocks. But if you want to make sure that 2015 is your best investing year ever, you need to know where to start. That's why The Motley Fool's chief investment officer just published a brand-new research report that reveals his top stock for the year ahead. To get the full story on this year's stock -- completely free -- simply click here.
Scorpion: It can do tricks. But for close-air support missions, will it do the trick? Photo source: Textron AirLand.
The Air Force's Awesome Attack Plane Has a Pretty Sad Replacement '-- War Is Boring '-- Medium
Sun, 12 Apr 2015 05:46
A-10 Warthog. Bryan William Jones PhotoThe A-10 is the best warplane for saving lives'Š'--'Štoo bad its days are numberedOn July 24, dozens of U.S. troops in Afghanistan were nearly wiped out by a Taliban ambush. Until two A-10 Warthog attack planes showed up.
It began with a routine patrol to clear a highway of bombs. But the convoy of 12 vehicles and 60 soldiers got stuck when the lead vehicle fell into a ravine and flipped over. Night fell, and the soldiers worked to pull the vehicle out. Meanwhile, the Taliban quietly set up firing positions along a tree line with a view of the stranded soldiers.
At dawn, the Taliban opened fire.
The soldiers were in a bad place. The gunfire pinned them behind their vehicles. The Taliban were then free to move closer for a possible assault on the position, which could have caused potentially horrendous casualties for the Americans.
The A-10s roared in from Bagram Air Field near Kabul.
''I flew over to provide a show of force while my wingman was looking for gunfire below,'' one A-10 pilot said. ''Our goal with the show of force was to break the contact and let the enemy know we were there, but they didn't stop. I think that day the enemy knew they were going to die, so they pushed even harder and began moving closer to our ground forces.''
Flying low and slow, the A-10s strafed the Taliban. The aviators' eyesight'Š'--'Šand the bird's-eye view through the Warthog's big round canopy'Š'--'Šwas instrumental. ''Even with all our top-of-the-line tools today, we still rely on visual references,'' the pilot said.
For two bloody hours, the A-10s dropped three 500-pound bombs and strafed the militant positions 15 times, burning through thousands of 30-millimeter cannon rounds, according to the pilot. The Taliban fighters withdrew, leaving 18 of their dead behind.
Three U.S. troops were wounded. It could have been much worse.
The firefight was only briefly mentioned by the Air Force in a press release. It's one of hundreds of times the A-10 has rescued U.S. ground troops under fire in Iraq and Afghanistan. Its mere presence is often enough to deter an attack.
But the A-10 might not be around much longer.
A-10s in Kandahar, Afghanistan on Nov 6, 2009. David Axe photoThe competitionThe A-10 is a ground-attack airplane'Š'--'Šthe Air Force's only jet designed solely for such missions. The twin-engine fighter was developed during the Cold War to destroy Russian tanks steamrolling through Germany in the event of World War III. Its arsenal of rockets, missiles, bombs and a powerful 30-millimeter cannon destroyed huge numbers of Iraqi tanks during the first Gulf War, and the plane went on to fly regular missions over Iraq, Libya and Afghanistan.
The Warthog flies slow and looks ugly as Hell, but it was cheap to build'Š'--'Šabout $13 million in the early 1980s'Š'--'Šand its turbofan engines sip small amounts of fuel. The best feature is that the plane is essentially a flying gun that's super-lethal against anything on the ground. In recent years, it's also been upgraded with new sensors, wings and more advanced targeting systems.
But the Air Force is faced with a dilemma. Its main jet planned for the coming decades is the F-35 Joint Strike Fighter, a stealthy multi-role warplane equipped for both air-to-air and ground-attack missions. The F-35, which is still in development, could eventually replace most of the Air Force's fighter fleet.
At a cost of at least $400 billion just to develop and build, the F-35 is the most expensive military project ever. (A single F-35 costs more than $100 million.) The Air Force is also being ordered by Congress to trim billions from its share of the defense budget.
Maj. Gen. Steven Kwast, an influential voice in U.S. military doctrine as director of the Quadrennial Defense Review, said the F-35 is here to stay. ''We must be able to project power in contested environments and the Joint Strike Fighter is that machine,'' Kwast told reporters this week.
In military-speak, he means the long-range F-35 is what's needed to extend the range of U.S. fighters into areas where potential foes'Š'--'Šlike China'Š'--'Šcould deny U.S. warships access with a combination of advanced new aircraft and deadly anti-ship missiles. The end of the war in Iraq, and the upcoming U.S. withdrawal from Afghanistan, has led the Pentagon to downplay weapons used for fighting insurgents and plus-up gear for fighting some future war with Beijing.
That's also the conclusion reached by a recent review ordered by Defense Secretary Chuck Hagel, which suggested retiring 120 Warthogs of a total fleet of 343, on top of two squadrons of A-10s that have already been shuttered over the past year.
An A-10's 30-millimeter cannon. Bryan William Jones photoFalse promiseThere's one big problem. The F-35 is not particularly good at what it's designed to do and certainly can't replicate the A-10's performance. The JSF is stealthy, which is okay for avoiding detection and sneaking past enemies before destroying them at long range.
But in a close-range fight, the F-35 is dead.
The reason is how its cockpit is designed. Instead of a bubble-canopy like the A-10's, the F-35's windscreen looks like a giant clamshell. This means an F-35 pilot can see out of the front and sides of the cockpit, but not the back. That's a huge problem in a fast-moving dogfight, and equally problematic while supporting ground troops. A JSF flier could never get the same view of the battlefield that allowed the Warthog jockies to save all those soldiers.
Still, the F-35 will eventually replace the A-10 and be tasked with carrying out the same ground-attack missions currently assigned to the Warthog.
But the JSF just can't do the job. Besides having a terrible view of the battlefield, the F-35 is also too fast and lightly built to loiter over a hot ambush zone'Š'--'Šand its 25-millimeter gun comes with just 180 rounds, compared to the more than 1,100 bullets an A-10 carries. It's worth pointing out that the two Warthogs over the Afghan battle apparently fired all their ammunition.
''Note the actions the F-35 is incapable to perform,'' said Winslow Wheeler, director of the Straus Military Reform Project at the Project on Government Oversight in Washington, D.C. ''Among them long time loiter, low altitude observation of the problem, multiple gun passes with extreme accuracy.''
These things saved American lives. The A-10's replacement? Perhaps not.
War is Boring is going to Syria! Support our effortswith a small donation.Subscribe to War is Boring: medium.com/feed/war-is-boring.
Joint terminal attack controller - Wikipedia, the free encyclopedia
Sun, 12 Apr 2015 05:25
A Joint terminal attack controller (JTAC) is the term used in the United States Armed Forces and some other military forces for a qualified service member who directs the action of combat aircraft engaged in close air support and other offensive air operations from a forward position. The term that is used in most other countries, as well as previously in the US and in the relevant NATO standard[1] is Forward Air Controller.[2] The term became effective in the US on September 3, 2003 with the publishing of Joint Publication (JP) 3-09.3 Close Air Support.[3]
Australia[edit]In 2006, the Royal Australian Air Force became the first foreign air force to receive Joint Terminal Attack Controller (JTAC) accreditation from the United States Joint Forces Command (USJFCOM).[4]No. 4 Squadron RAAF runs JTAC training, and provides trained controllers to other units, with its main role being to support the units of the Special Operations Command. JTAC-qualified personnel have served in Afghanistan.[5][6]
United States[edit]In the United States Armed Forces a qualified and current joint terminal attack controller is recognized across the U.S. Department of Defense as being capable and authorized to perform terminal attack control.[citation needed]
United States Marine Corps students are trained at the Expeditionary Warfare Training Group, Pacific (EWTGPAC), and Atlantic (EWTGLANT). United States Air Force students receive their training at Nellis Air Force Base in Nevada, while United States Navy students are trained at the Naval Strike and Air Warfare Center (NSAWC) at Naval Air Station Fallon in Nevada by SEALs assigned to NSAWC. Members of special operations units attend the Special Operations Terminal Attack Control Course (SOTACC) at Yuma Proving Ground, Arizona.[citation needed]
Air Force JTACS also trained at Spangdahlem Air Base, in Germany, through the Joint Firepower Center of Excellence (JFCOE).[7]
Italy has qualified JTAC operators in its tier 1, 2 and 3 teams. Some of these operators have served in Afghanistan, as part of TF45. During the Afghanistan War, AMX ground attack aircraft from the Italian Air Force TF BLACK CATS conducted Close Air Support with JTAC operators on the ground provided by the Italian Army, the Carabinieri, and the Navy and Air Force.[8] The equipment used by Italian JTAC operators is not well publicized, although the equipment used by 185 RRAO has been briefly reported on.[9] The training areas used by Italian JTACs are also kept secret. It has been reported that Italian JTACs will potentially work with the newest gunship, the MC-27J Praetorian in the future.[10]
See also[edit]References[edit]^"NATO STANAG 3797 MINIMUM QUALIFICATIONS FOR FORWARD AIR CONTROLLERS & LASER OPERATORS IN SUPPORT OF FORWARD AIR CONTROLLERS". NATO. ^"Training the RAF's eyes and ears". BBC. February 14, 2009. Retrieved May 7, 2010. I ask if Prince Harry's deployment as a forward air controller, or what the Americans term a "JTAC" (joint tactical air controller or joint terminal attack controller), has boosted the number of volunteers for the job. ^Lieutenant Colonel Steven P. Milliron, Army Aviation. "Army JTAC training--the way ahead.". U.S. Field Artillery Association. Effective 3 September 2003 with the publishing of Joint Publication (JP) 309.3 Tactics. Techniques and Procedures (TTP) for Close Air Support, the joint community codified the requirements for an individual to direct the actions of combat aircraft engaged in CAS and other air operations. This position, called a "joint terminal attack controller" was created to standardize the certification and qualification process for terminal attack controllers to ensure a common capability across the services. The Army needs to develop Soldiers who, from a forward position, can deliver joint indirect fires and direct the actions of joint combat aircraft. The Joint Combat Aircraft (JCA) is the official designation used by the United Kingdom's Ministry of Defence for the F-35 Lightning II, formerly known as the Joint Strike Fighter, and the result of the Joint Strike Fighter competition. ^Defence Magazine, June 2006[dead link]^Allard, Tom (March 17, 2008). "New squadron will aim to cut civilian deaths". The Sydney Morning Herald. Retrieved September 19, 2008. ^Air Power Development Centre (June 2014). "Combat Control in the RAAF". Pathfinder Issue 224. Royal Australian Air Force. ^"Joint Multinational Warriors". 7th U.S. Army Joint Multinational Training Command. Winter 2007. The Joint Fires Center of Excellence exists to train Army and Air Force forward observers and Joint Terminal Attack Controllers. [dead link]^Janez. "Task Force 45". Retrieved November 7, 2014. ^"Home - 185 RRAO". 185 RRAO. Retrieved November 7, 2014. ^"MC-27J Praetorian - Alenia Aermacchi". Retrieved November 7, 2014. External links[edit]
U.S.C. Title 18 - CRIMES AND CRIMINAL PROCEDURE
Sat, 11 Apr 2015 22:23
U.S.C. Title 18 - CRIMES AND CRIMINAL PROCEDURE18 U.S.C.United States Code, 2011 EditionTitle 18 - CRIMES AND CRIMINAL PROCEDUREPART I - CRIMESCHAPTER 1 - GENERAL PROVISIONSSec. 4 - Misprision of felonyFrom the U.S. Government Printing Office, www.gpo.gov
§4. Misprision of felonyWhoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both.
(June 25, 1948, ch. 645, 62 Stat. 684; Pub. L. 103''322, title XXXIII, §330016(1)(G), Sept. 13, 1994, 108 Stat. 2147.)
Historical and Revision NotesBased on title 18, U.S.C. 1940 ed., §251 (Mar. 4, 1909, ch. 321, §146, 35 Stat. 1114).
Changes in phraseology only.
Amendments1994'--Pub. L. 103''322 substituted ''fined under this title'' for ''fined not more than $500''.
U.S.C. Title 18 - CRIMES AND CRIMINAL PROCEDURE18 U.S.C.United States Code, 2011 EditionTitle 18 - CRIMES AND CRIMINAL PROCEDUREPART I - CRIMESCHAPTER 1 - GENERAL PROVISIONSSec. 4 - Misprision of felonyFrom the U.S. Government Printing Office, www.gpo.gov
§4. Misprision of felonyWhoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both.
(June 25, 1948, ch. 645, 62 Stat. 684; Pub. L. 103''322, title XXXIII, §330016(1)(G), Sept. 13, 1994, 108 Stat. 2147.)
Historical and Revision NotesBased on title 18, U.S.C. 1940 ed., §251 (Mar. 4, 1909, ch. 321, §146, 35 Stat. 1114).
Changes in phraseology only.
Amendments1994'--Pub. L. 103''322 substituted ''fined under this title'' for ''fined not more than $500''.
Six Week Cycle
Army Recruit Charged With Helping ISIS Watched by FBI, Given Clearance by Army - The Intercept
Sun, 12 Apr 2015 14:36
A Kansas man arrested and charged Friday morning for attempting to provide material support to the Islamic State was under surveillance by the FBI last year when he checked himself into a mental institution and was not regarded as an immediate threat, according to a document obtained by The Intercept.
In fact, the U.S. Army had approved the new recruit for a Secret clearance.
John T. Booker Jr., who also goes by the name Mohammed Abdullah Hassan, was arrested Friday and charged with attempting to provide material support to the Islamic State, plotting to use a weapon of mass destruction, and planning to destroy property with an explosive.
Yet in March 2014, Booker was already being watched by the FBI, who determined he had no ability to carry out an attack, according to a ''Situational Information Report'' issued last year by the FBI's Kansas City division. Booker had in Feb. 2014 signed up to join the U.S. Army and had even been approved for a security clearance, the FBI document states.
Booker's plans to join the Army were derailed the next month by his deteriorating mental health.
''BOOKER voluntarily checked himself into a mental health facility for evaluation on 26 March 2014; Kansas City Division is in contact with the facility and will be apprised if BOOKER is deemed healthy enough to be released. BOOKER has not been charged with a crime at present. BOOKER does not have access to a vehicle or other form of transportation at this time, nor is there evidence he possess firearms,'' the report, issued March 30, 2014, stated.
What changed in the following year was not necessarily Booker's mental state, but the introduction of two FBI informants into his life.
It is unclear when Booker was released from the mental health institution, but in Oct. 2014 he met the first of two FBI informants. By the spring of 2015, Booker had been introduced to the second informant '-- and, according to the indictment unsealed Friday, the two informants provided the 20-year-old with the materials and support that led to his arrest on Friday on charges stemming from his alleged plans to carry out an attack against Fort Riley in support of the Islamic State.
There were early warning signs of Booker's interest in terrorism '-- and his mental instability. In the months prior to signing up for the U.S. Army '-- and being granted a secret-level clearance '-- Booker has posted a series of comments on social media, saying he wanted to ''wage jihad'' against America.
''I wanna be a martyr (shaheed)!!! YA, brothers and sisters,'' Booker said in a comment on YouTube five months before enlisting in the military.
Around the same time, months before being approved for a security clearance, Booker posted in the comments section of a YouTube video showing graphic video of American soldiers under fire in Iraq in 2008. ''I'm am Muslim. Muslims had no business in Iraq,'' Booker wrote.
On March 9, a month after he enlisted at the Kansas City recruiting station, Booker posted a series of photos of Osama bin Laden holding various weapons. ''Allahu Akbar J Sheikh Osama bin Laden and his army,'' reads a post by one photo.
On March 15, a post on Facebook expressed Booker's desire to die for his beliefs. ''I want to be with my lord so bad that I cry but I will miss you guys I am not going to lie,'' he wrote.
Those comments, and the initial FBI warning, were first written about by this reporter for FoxNews.com. An FBI spokesperson attempted to downplay the threat at the time.
''We have interviewed this individual,'' the spokeswoman told this reporter at the time. ''There is no imminent threat to public safety, nor should the public be concerned that this threat exists from an individual at large.''
Photo: FBI
Misprision of felony - Wikipedia, the free encyclopedia
Sat, 11 Apr 2015 22:20
Misprision of felony was an offence under the common law of England and was classified as a misdemeanour.[1] It consisted of failing to report knowledge of a felony to the appropriate authorities.
Exceptions were made for close family members of the felon.[citation needed]
A person was not obliged to disclose his knowledge of a felony where the disclosure would tend to incriminate him of that offence or another.[2]
With the development of the modern law, this crime has been discarded in many jurisdictions, and is generally only applied against persons placed in a special position of authority or responsibility. In this case, the offence of misfeasance in public office or malfeasance in public office may be considered instead. For example, corrections officers who stand idly by while drug trafficking occurs within the prison may be prosecuted for this crime.[citation needed]
It has been abolished in England and Wales,[3] in Northern Ireland,[4] in the Republic of Ireland,[5] and in New South Wales[6] and other Australian States and Territories, but has often been replaced by a statutory offence.
United States federal law[edit]"Misprision of felony" is still an offense under United States federal law after being codified in 1909 under 18 U.S.C. § 4:
Whoever, having knowledge of the actual commission of a felony cognizable by a court of the United States, conceals and does not as soon as possible make known the same to some judge or other person in civil or military authority under the United States, shall be fined under this title or imprisoned not more than three years, or both.
This offense, however, requires active concealment of a known felony rather than merely failing to report it.[7]
The Federal misprision of felony statute is usually only used in prosecutions against defendants who have a special duty to report a crime, such as a government official.[8]
See also[edit]References[edit]^Sykes v. Director of Public Prosecutions [1962] A.C. 582^R v. King [1965] 1 All ER 1053^The Criminal Law Act 1967 (c.58), section 1^The Criminal Law Act (Northern Ireland) 1967 (c.18) (N.I.), section 1^The Criminal Law Act 1997 (No.14), section 3^The Crimes Act 1900, section 341 [1]^See United States v. Johnson, 546 F.2d 1225 (5th Cir. 1977) at 1227 ("The mere failure to report a felony is not sufficient to constitute a violation of 18 U.S.C.A. § 4."^Smith, Jeff (April 7, 2014). "Chris Christie Is Toast: Federal prosecutors have their teeth in the New Jersey governor's close associates. And they ain't letting go". Politico. Retrieved April 8, 2014. Other sources[edit]Curenton, The Past, Present, and Future of 18 U.S.C. Sec. 4: An Exploration of the Federal Misprision of Felony Statute, (2003) Vol. 55 Alabama Law Review, 183.U.S. Code Online via GPO Access (wais.access.gpo.gov) United States Code Title 18, Part I, Chapter I, Section 4Further reading[edit]For a discussion of the appellant's defence and the decision in Sykes above, see P.R.Glazebrook, Misprision of Felony - Shadow or Phantom, The American Journal of Legal History, Volume 8, No.3 (July 1964) pp. 189 '' 208, Temple University JSTORFor a general discussion of this offence from an American viewpoint, see William Lawrence Clark, A Treatise on the Law of Crimes, Hein, 1996, para. 439 pp. 679 '' 680 [2]
Fort Riley suicide bombing plot: Was an FBI sting operation necessary? (+video) - CSMonitor.com
Sun, 12 Apr 2015 01:05
USA/USA Update
(Read article summary)John T. Booker was arrested for attempting a suicide attack on Fort Riley military base. The actions were part of an extensive FBI sting operation, raising an ethical question of whether sting operations are helpful or counterproductive.
By Samantha Laine, Staff Writer / April 11, 2015
Kansas resident John T. Booker, 20, was charged Friday for planning a suicide attack on the Fort Riley military base on Friday.
Authorities arrested Mr. Booker, who also goes by the name Mohammed Abdullah Hassan, outside of the Army post as he attempted to arm a 1,000-pound bomb, according to prosecutors. He was not aware the bomb was inert, as the situation was part of an extensive FBI sting operation that resulted in Booker's arrest.
"The perimeter of Fort Riley was never penetrated, there was never any concern on our part that he would get onto the fort and, unbeknownst to him, the materials that were used to make up this bomb were inert," U.S. Attorney Barry Grissom said, reported NPR.
Is this an example of the FBI getting better at identifying radicalized American youth? Perhaps. But it also appears to be the case of a troubled individual, so open about his terrorist ambitions, that he becomes fodder for a sting operation, one the FBI describes as an effort to keep him "off the streets."
Booker is charged with three federal crimes, including attempting to use a weapon of mass destruction, attempting to damage property by means of an explosive and providing material support to a foreign terrorist organization. Another Topeka man, Alexander E. Blair, 28, was also charged for failure to report a felony. He was known to have similar radical views, and also allegedly provided funds to Booker to help cover the cost of the storage locker where the bomb was built, reported The New York Times.
''Over a period of months, he began doing and taking actions that were more than just mere talking,'' Mr. Grissom said, reported The New York Times. He added that the arrest ''reminds us that we in law enforcement have to remain vigilant.''
Booker's susceptibility to radical views first came to light in early 2014, when he was recruited to join the U.S. Army in Kansas City, Mo. He was scheduled to report to basic training in April. In March, he publicly posted to Facebook two entries, which stated: ''I will soon be leaving you forever so goodbye! I'm going to wage jihad and hopes that i die'' and ''Getting ready to be killed in jihad is a HUGE adrenaline rush!! I am so nervous. NOT because I'm scared to die but I am eager to meet my lord.''
After the second post, the FBI interviewed him after receiving a complaint. According to the complaint, Booker allegedly heard and waived his Miranda rights and said ''he enlisted in the United States Army with the intent to commit an insider attack against American soldiers like Major Nidal Hassan had done at Fort Hood, Texas.'' After detailing other possible jihad attacks, he was subsequently denied US military employment.
Seven months later, the FBI continued to keep tabs on the young man. Since October 2014, Booker engaged in conversation with a confidential FBI informant. According to the complaint, he repeatedly told the informant of his desire to go to the Middle East and join the self-declared Islamic State, ''but he didn't know anyone who could help him do so.''
Mid-November, the FBI informant told Booker he had a ''cousin'' who could get people overseas, referring to another FBI informant who later identified himself as ''a high ranking sheikh planning terrorist attacks in the United States.'' When asked what he would like to do, Booker responded: ''Anything. Anything you think is good. I will follow you.''
Booker repeatedly discussed his intentions to perform jihad with the two FBI informants in the following months, leading up to Friday's end when Booker attempted to detonate the inert bomb. Booker filmed a video of himself to be played after his death, during which he swears bay'ah, or allegiance, to IS leader Abu Bakr Al Baghdadi.
According to the complaint, the FBI informants provided a list of explosive materials to Booker, and also assembled the explosives at his request. Booker made it clear that he wished to detonate the explosion himself, so the FBI informants demonstrated how to arm the device.
Last summer, the Human Rights Watch and Columbia Law School's Human Rights Institute released a report detailing 27 federal terrorism cases from initiation to post-conviction. In some cases, individuals had no history of terrorist acts, and were considered to be "law-abiding citizens" before the initiation of sting operations. Andrea Prasow, deputy Washington director at Human Rights Watch and one of the authors of the report, said in a release:
Americans have been told that their government is keeping them safe by preventing and prosecuting terrorism inside the US . . . But take a closer look and you realize that many of these people would never have committed a crime if not for law enforcement encouraging, pressuring, and sometimes paying them to commit terrorist acts.
A case similar to Booker's arose in 2012 when a Chicago suburban teen, Adel Daoud, was driven by FBI informants to a downtown location to detonate a bomb. At the time, he was not part of a terrorist organization, nor did was any group attempting to recruit him. Al Jazeera reported that Chicago's Muslim communities were shocked by the arrest, and questioned the FBI's tactics.
"For many, the first question was why. Why target as a terrorist-in-waiting a teen who was plainly incapable of planning and conducting a terrorist attack?" Al Jazeera reported. "The second question was one of fear: Will my child be the FBI's next target?"
Imam Omar Hazim of the Islamic Center of Topeka said he began counseling Booker after two FBI agents brought him to his attention last year. The FBI told Hazim that Booker suffered bipolar disorder, and that they hoped counseling would help change his radical beliefs.
Hazim said that recently, Booker had gone off his medication because ''he didn't like the way it made him feel and it was expensive'' and that he acted strangely in the days leading up to the arrest. Hazim later he learned of the sting operation in an effort to get Booker ''off the streets.'' He said:
''I think the two FBI agents set him up, because they felt at that point someone else might have done the same thing and put a real bomb in his hands.''
This article contains reporting from The Associated Press.
LGBBTQQIAAP
Note from Tranny Lucille
Girl, you're such a viper. always pretending to be on LGBT side. here's how you roll:
"john, i'm a bi-curious, as you know, but my flower brothers and lezzie sisters SHOULD ALL BE ARRESTED"
"so this guy was arrested because he killed a bunch of homos. ahhh... gay brothers and sisters, YOU'RE BEING MANIPULATED, I'M DISAPPOINTED"
You say you're bi-curious just to license your hate speech. The truth is you're not gay nor even a yestergay. You're actually a hetty, a misogynist, a homophobic and a republican. You can deny that, but just listen to yourself.
SHAME ON YOU CURRY
Counter note from Brian the Gay Crusader
Lucille:
First and foremost, Adam is not only bi-curious but he is an unwavering ally of the LGBT community-- he is not like so many people who simply call themselves supporters of LGBT equality because it's en vogue; Adam chooses to support equality for all and uses his platform to both advocate for LGBT rights as well as share and deconstruct misguided/not well thought out actions by LGBT NGOs or highlight various ways that the media & Hollywood exploit LGBT issues. It is a true ally that will advocate for equality and also shine a light on issues that impact the LGBT community that the mainstream media does not report; Adam is a true ally.
[I could mention that Adam's daughter is a lesbian and that my first communication with Adam was on a day when he was in the Netherlands where he and his wife were visiting Adam’s daughter and her girlfriend. What did they do all together as a family that day? They participated in the Amsterdam Gay Pride Parade as part of the OUT TV float.]
Most importantly I am lucky to call Adam a friend; if he lived the life of "a misogynist, a homophobic and a republican" I can promise you that we would not be friends. Is he often sarcastic and does he sometimes say memorable things in an effort to be funny? Absolutely. Are those statements rooted in anti-gay or transphobic beliefs or feelings? Absolutely not.
As someone whose professional career path has primarily focused on diversity and inclusion I find it quite bizarre that in the face of comments that you perceive as offensive, the solution is no longer to try to foster a dialogue in order to address the comments that offended you, instead the go-to response is anger, hate and shaming the person for your perception of his comments. The diverse spectrum of gender identification, racial identification, religious beliefs, sexual orientation and economic status and the biases/issues/ignorance that come with each will never be resolved to the point that we love each other as humans if our response to issues is to attack that person because the outcome will only be to move us further away from complete inclusion.
I cannot stress enough that if Adam was the slightest homophobic or transphobic, he would not be someone I call a friend.
I hope that moving forward instead of attacking someone whose comments you perceived to be offensive to you, you might try to start a dialogue with that person by sharing your issue in a manner that you'd hope someone would reach out to you if your words were perceived as offensive by that individual.
All my best,
Brian
Chiner$
Presidential Determination -- Proposed Agreement for Cooperation Between the Government of the United States of America and the Government of the People's Republic of China Concerning Peaceful Uses of Nuclear Energy
Sun, 12 Apr 2015 14:26
The White House
Office of the Press Secretary
For Immediate Release
April 10, 2015
SUBJECT: Presidential Determination on the Proposed
Agreement for Cooperation Between the Government
of the United States of America and the
Government of the People's Republic of China
Concerning Peaceful Uses of Nuclear Energy
I have considered the proposed Agreement for Cooperation Between the Government of the United States of America and the Government of the People's Republic of China Concerning Peaceful Uses of Nuclear Energy (the "Agreement"), along with the views, recommendations, and statements of the interested departments and agencies.
I have determined that the performance of the Agreement will promote, and will not constitute an unreasonable risk to, the common defense and security. Pursuant to section 123 b. of the Atomic Energy Act of 1954, as amended (42 U.S.C. 2153(b)), I hereby approve the proposed Agreement and authorize the Secretary of State to arrange for its execution.
The Secretary of State is authorized to publish this determination in the Federal Register.
BARACK OBAMA
China to Build Pipeline From Iran to Pakistan - WSJ
Thu, 09 Apr 2015 12:41
ISLAMABAD'--China will build a pipeline to bring natural gas from Iran to Pakistan to help address Pakistan's acute energy shortage, under a deal to be signed during the Chinese president's visit to Islamabad this month, Pakistani officials said.
The arrival of President Xi Jinping is expected to showcase China's commitment to infrastructure development in ally Pakistan, at a time when few other countries are willing to make major...
China's Great Cannon
Fri, 10 Apr 2015 18:07
This post describes our analysis of China's ''Great Cannon,'' our term for an attack tool that we identify as separate from, but co-located with, the Great Firewall of China. The first known usage of the Great Cannon is in the recent large-scale novel DDoS attack on both GitHub and servers used by GreatFire.org.
Authors: Bill Marczak1,2,3 (Lead), Nicholas Weaver2,3 (Lead), Jakub Dalek,1 Roya Ensafi,4 David Fifield,2 Sarah McKune,1 Arn Rey, John Scott-Railton,1 Ronald Deibert,1 Vern Paxson.2,3
Affiliations: (1) Citizen Lab, Munk School of Global Affairs, University of Toronto; (2) International Computer Science Institute; (3) University of California, Berkeley; (4) Princeton University
Section 1: Introduction, Key FindingsOn March 16, GreatFire.org observed that servers they had rented to make blocked websites accessible in China were being targeted by a Distributed Denial of Service (DDoS) attack. On March 26, two GitHub pages run by GreatFire.org also came under the same type of attack. Both attacks appear targeted at services designed to circumvent Chinese censorship. A report released by GreatFire.org fingered malicious Javascript returned by Baidu servers as the source of the attack.1 Baidu denied that their servers were compromised.2
Several previous technical reports3 have suggested that the Great Firewall of China orchestrated these attacks by injecting malicious Javascript into Baidu connections. This post describes our analysis of the attack, which we were able to observe until April 8, 2015.
We show that, while the attack infrastructure is co-located with the Great Firewall, the attack was carried out by a separate offensive system, with different capabilities and design, that we term the ''Great Cannon.'' The Great Cannon is not simply an extension of the Great Firewall, but a distinct attack tool that hijacks traffic to (or presumably from) individual IP addresses, and can arbitrarily replace unencrypted content as a man-in-the-middle.
The operational deployment of the Great Cannon represents a significant escalation in state-level information control: the normalization of widespread use of an attack tool to enforce censorship by weaponizing users. Specifically, the Cannon manipulates the traffic of ''bystander'' systems outside China, silently programming their browsers to create a massive DDoS attack. While employed for a highly visible attack in this case, the Great Cannon clearly has the capability for use in a manner similar to the NSA's QUANTUM system,4 affording China the opportunity to deliver exploits targeting any foreign computer that communicates with any China-based website not fully utilizing HTTPS.
Report StructureWe organize our Report as follows:
Section 2 locates and characterizes the Great Cannon as a separate system;Section 3 analyzes DDoS logs and characterizes the distribution of affected systems;Section 4 presents our attribution of the Great Cannon to the Government of China;Section 5 addresses the policy context and implications;Section 6 addresses the possibility of using the Great Cannon for targeted exploitation of individual users.
Section 2: The Firewall & The Cannon: Separate Systems, Significant SimilaritiesFigure 1. Simplified logical topology of the Great Cannon and Great Firewall
In general, a firewall serves as an in-path barrier between two networks: all traffic between the networks must flow through the firewall. In contrast, an on-path system like the Chinese ''Great Firewall'' (GFW) sits off to the side: it eavesdrops on traffic between China and the rest of the world (TAP in Figure 1), and terminates requests for banned content (for example, upon seeing a request for ''http://www.google.com/?falun'',5 regardless of actual destination server) by injecting a series of forged TCP Reset (RST) packets that tell both the requester and the destination to stop communicating (INJECT RST in Figure 1).6 On-path systems have architectural advantages for censorship, but are less flexible and stealthy than in-path systems as attack tools, because while they can inject additional packets, they cannot prevent in-flight packets (packets that have already been sent) from reaching their destination.7 Thus, one generally can identify the presence of an on-path system by observing anomalies resulting from the presence of both injected and legitimate traffic.8
The GFW keeps track of connections and reassembles the packets (''TCP bytestream reassembly'') to determine if it should block traffic. This reassembly process requires additional computational resources, as opposed to considering each packet in isolation, but allows better accuracy in blocking. While a web request often fits within a single packet, web replies may be split across several packets, and the GFW needs to reassemble these packets to understand whether a web reply contains banned content.
On any given physical link (e.g., a fiber optic cable), the GFW runs its reassembly and censorship logic in multiple parallel processes9 (perhaps running on a cluster of many different computers). Each process handles a subset of the link's connections, with all packets on a connection going to the same process. This load-balanced architecture reflects a common design decision when a physical link carries more traffic than a single computer can track. Each GFW process also exhibits a highly distinctive side-channel '-- it maintains a counter, and numbers the forged TCP Reset packets it injects (via the value of the IP TTL field).
The Great Cannon (GC) differs from the GFW: as we will show, the GC is an in-path system, capable of not only injecting traffic but also directly suppressing traffic, acting as a full ''man-in-the-middle'' for targeted flows. The GC does not actively examine all traffic on the link, but only intercepts traffic to (or presumably from) a set of targeted addresses. It is plausible that this reduction of the full traffic stream to just a (likely small) set of addresses significantly aids with enabling the system to keep up with the very high volume of traffic: the GC's full processing pipeline only has to operate on the much smaller stream of traffic to or from the targeted addresses. In addition, in contrast to the GFW, the GC only examines individual packets in determining whether to take action, which avoids the computational costs of TCP bytestream reassembly. The GC also maintains a flow cache of connections that it uses to ignore recent connections it has deemed no longer requiring examination.
The GC however also shares several features with the GFW. Like the GFW, the GC is also a multi-process cluster, with different source IP addresses handled by distinct processes. The packets injected by the GC also have the same peculiar TTL side-channel as those injected by the GFW, suggesting that both the GFW and the GC likely share some common code. Taken together, this suggests that although the GC and GFW are independent systems with different functionality, there are significant structural relationships between the two.
In the attack on GitHub and GreatFire.org, the GC intercepted traffic sent to Baidu infrastructure servers that host commonly used analytics, social, or advertising scripts. If the GC saw a request for certain Javascript files on one of these servers, it appeared to probabilistically take one of two actions: it either passed the request onto Baidu's servers unmolested (roughly 98.25% of the time), or it dropped the request before it reached Baidu and instead sent a malicious script back to the requesting user (roughly 1.75% of the time). In this case, the requesting user is an individual outside China browsing a website making use of a Baidu infrastructure server (e.g., a website with ads served by Baidu's ad network). The malicious script enlisted the requesting user as an unwitting participant in the DDoS attack against GreatFire.org and GitHub.
Localizing the CannonThe GFW continues to operate as normal: on-path and statefullyWe began our investigation by confirming the continued normal operation of the GFW's censorship features. We did so employing measurements between our test system outside of China and a Baidu server that we observed returning the malicious Javascript. We sent the Baidu server a request that the GFW would process as a query for ''http://www.google.com/?falun'', a URL long known10 to trigger the GFW to inject forged TCP Resets to terminate the connection. This packet capture shows the results of our experiment, which confirmed that the normal, well-understood operation of the GFW continues. Note that the capture includes both the injected TCP Reset and, later, the legitimate response (an HTTP 403 reply) from the Baidu server. This occurs because the GFW operates as an on-path system, and, as discussed earlier, on-path systems cannot prevent in-flight packets from reaching their destination.
Figure 2. How the Great Cannon was deployed in the GitHub and GreatFire.org attacks
Localizing the GFWWe then localized where (with respect to our measurement system) in the network topology the GFW operates, as follows. For a given measurement packet, we can control how far into the network it transits from our measurement system to its destination by controlling the packet's TTL value. The TTL value determines after how many intermediate hops a packet will be discarded by the Internet's internal routers. We sent the ''Falun'' queries from our test system to the Baidu server with TTL values increasing from 1 on up. We observed that the GFW's TCP Reset injection only occurred when we sent packets with TTL values >= 18, suggesting that the GFW acts on traffic flowing between the 17th and 18th hop along the path from our test system to the Baidu server (which was itself 24 hops away from our test system). This packet capture shows our localization results.11
The GC operates as a separate, in-path systemAs noted previously, our traces of GFW operation showed both the injected TCP Reset, as well as the legitimate server reply. In contrast, no legitimate server reply accompanied the injected malicious reply from the GC. We ran further testing, where we retransmitted our request to Baidu over the same connection, and with the same sequence numbers, after we received a malicious response. We observed Baidu responding as normal to the retransmitted request. Thus, we conclude12that the GCdroppedour request before it reached Baidu, a capability not present in the GFW.13
We also checked whether the GFW and GC might share the same injector device,14 but found no evidence that they do. In particular, from a given TCP source port, we sent one request designed to trigger GC injection, followed by a request designed to trigger GFW injection. We repeated the experiment from a number of source ports. While packets injected by both the GFW and GC exhibited a similar (peculiar) TTL side-channel indicative of shared code between the two systems, we found no apparent correlation between the GFW and GC TTL values themselves.
The GC appears to be co-located with the GFWWe used the same TTL technique to localize the GC on the path between our test system and the Baidu server. We found that for our path, the GC acted on traffic between hop 17 and hop 18, the same link we observed as responsible for the GFW. We also observed that unlike the GFW, we could trigger the GC using ''naked'' requests (i.e., requests sent in isolation, with no previous TCP SYN as required for standard communication). Acting on ''naked'' requests implies that the GC's content analysis is more primitive (and easily manipulated), but does offer significant performance advantages, as the GC no longer needs to maintain complex state concerning connection status and TCP bytestream reassembly.
We also checked two separate servers in China whose traffic the GC targets to observe whether the GC existed along with the Great Firewall on multiple network paths. From our measurement system outside of China, we examined the path to both 115.239.210.141 and 123.125.65.120. For 115.239.210.141, the GFW and the GC both exist between hop 12 and 13, on the link between 144.232.12.211 and 202.97.33.37, as the traffic enters China Telecom. For 123.125.65.120, the GFW and GC both exist between hop 17 and 18, on the link between 219.158.101.61 and 219.158.101.49, belonging to China Unicom. A previous report by Robert Graham used the same TTL technique to conclude that on one link, the GC was located ''inside China Unicom infrastructure.''15
The GC is currently aimed only at specific destination IP addressesWhen we probed an IP address adjacent to the Baidu server (123.125.65.121), the GC ignored the requests completely, although the GFW acted on censorable requests to this host.
Unlike the GFW, the GC only acts on the first data packet of a connectionFor a given source IP address and port, the GC only examines the first data packet sent when deciding whether to inject a reply. To avoid examining subsequent packets requires remembering which connections it has examined in a flow cache. Unlike the GFW, the GC does not reassemble packets, a significant implementation difference. In addition, the GC will process invalid HTTP requests, while the GFW will not, also indicating differing implementations.
We confirmed these behaviors by sending a number of probes to the Baidu server, requesting resources that trigger the GC's injection. Each probe had a different source port. We sent 500 probes, each with the request split across three packets (so 1,500 packets total). The GC ignored each probe. We then sent 500 probes where the first packet's data is an invalid HTTP request, and the second packet's data is a complete, valid request for a targeted resource. The GC ignored each probe. We then sent a final 500 single-packet probes, each containing a complete, valid request for a targeted resource, to confirm normal GC operation. As expected, the GC injected malicious content in some cases, seemingly based on its probabilistic decision-making process.
How big is the GC flow cache?We attempted to completely fill the GC flow cache by sending packets to the Baidu server with different source IP addresses and ports, while probing to see whether the entries that we previously added had now expired. Our attempt suggests that at least in some cases, the GC flow cache between our test system and the Baidu server supports up to around 16,000 entries for a single sending IP address.
Unlike the GFW, the GC appears to act probabilisticallyCensorship systems generally operate in a deterministic fashion: they aim to block all content that matches the target criteria. The GC, on the other hand '-- at least for this particular attack '-- appears to act probabilistically, and ignores most of the traffic it could act on. In one test, it completely ignored all traffic from one of four measurement IP addresses, and on the three other measurement IP addresses it only responded to 526 requests out of an initial 30,000 from the three (1.75%).
The cache capacity test also provides evidence that the GC's probabilistic choice occurs on the decision to act on a particular flow, and not as some sort of pre-filter for reducing analysis load. When we succeeded in completely filling the flow cache, subsequently injected packets occurred for different source ports than in the initial test. If the GC only intercepted a subset of flows to the target IP address, we would expect subsequent injections to appear for the same flows, since most schemes to probabilistically select flows for interception (such as hashing the connection 4-tuple) would select the same set of flows the second time around.
Does the GC have a load-balanced architecture?We determined that the GC uses a separate flow cache for different source IP addresses, and that packets injected from different source IP addresses have distinct TTL side-channels. This finding suggests a load-balanced architecture similar to the GFW, where packets are routed to GC nodes based on source IP address. We then sent traffic alternating from four measurement IP addresses in an attempt to fill a 16,000 entry cache. This attempt did not manage to fill the cache, suggesting that the GC not only processed the different source IP addresses with different injection elements, but did so using different flow caches. As stated before, one of the four source IP addresses never received any injected replies.
Section 3: Analysis of the DDoS Logs from the attack against GreatFireThe staff of GreatFire.org provided the authors with server logs covering the period of March 18 to 28.16 (A report previously published by Great Fire uses a different sample.17) This period appears to capture the end of the DDoS attack on GreatFire.org's services, as shown by the size of server log files over this period:
To keep our analysis tractable, we examined a sample of the data from March 18th 11:00 GMT to March 19th 7:00 GMT, as seen from two of the three most commonly seen backend servers. For each hour, we selected 30MB of compressed logs for each server.18 The total sample includes 16,611,840 web requests, with 13,183 unique source IP addresses. We used the MaxMind GeoIP2 Lite database19 from March 3rd, 2015 to assign a country of origin to each source IP address. For any IP address that did not result in a definite geolocation using this tool (31 addresses), we looked up the address manually using the iplocation.net service.
The figure below summarizes the top countries of origin, with China added for comparison.
Figure 3. Number of Unique IP addresses seen in DDoS log sample showing the top 5 countries/regions, with Chinese traffic included for comparison.
Note that 8,827 (66.9%) of the IP addresses originate from Taiwan and Hong Kong, two regions where Chinese is the official language. China, however, accounted for only 18 requests. This is consistent with malicious code injected into China-hosted websites at the border of the Chinese Internet.
To determine which websites have their responses altered by the injection of malicious code, we extracted the domain names of the 25 most frequently seen referrers in our dataset,20 finding that these domains account for 55% of the total requests in the sample.
Figure 4. Top 25 referrers found in the DDoS logs, grouped by domain. The top bar reflects domains directly in the baidu.com DNS space. Manual verification confirms that all top 25 referrers use Baidu services such as advertising or analytics.
The most commonly seen domain is pos.baidu.com (37.7% of total requests in the sample), a part of Baidu's ad network. Many non-Baidu sites display ads served through Baidu's ad network, indicating that visitors to non-Baidu sites displaying ads also became targeted.21
We examined the top 25 domains, and linked each one to Baidu: in each case, the site is either a Baidu property or uses Baidu analytics, advertisements, or static resources.22 This finding indicates that Baidu was a major injection target for this attack. According to Alexa statistics, Baidu itself is the fourth-most visited site globally, the highest ranking China-based site on the global list,23 and has received an estimated 4.99 million unique visitors from the US alone in the past 30 days.24
We speculate that Baidu was chosen as an injection target because it is a simple way to target many users.
Section 4: Attributing the Great Cannon to the Chinese GovernmentWe believe there is compelling evidence that the Chinese government operates the GC. In recent public statements, China has deflected questions regarding whether they are behind the attack, instead emphasizing that China is often itself a victim of cyber attacks.25
Where is the GC Located?We tested two international Internet links into China belonging to two different Chinese ISPs, and found that in both cases the GC was co-located with the GFW. This co-location across different ISPs strongly suggests a governmental actor.
Who built the Great Cannon?That the GFW and GC have the same type of TTL side-channel suggests that they share some source code. We are unaware of any public software library for crafting packets that introduces this type of TTL side-channel.
What is the Great Cannon's Function?Our observations indicate that the GC's design does not reflect technology well-suited for performing traffic censorship. Its operation only examines the first data packet of a given connection, which provides a weak censorship mechanism compared to the GFW. More generally, the GC's design does not, in practice, enable it to censor any traffic not already censorable by the GFW. Thus, the evidence indicates that the GC's role is to inject traffic under specific targeted circumstances, not to censor traffic.
Who is the Great Cannon attacking?The DDoS attack launched by the GC using ''bystander'' machines directly aligns with known political concerns of the Chinese government. The Cyberspace Administration of China has previously referred to GreatFire as a ''foreign anti-Chinese organization'' (åƒå¤–反华ç>>).26 The particular GreatFire service targeted in this attack provides proxies to bypass the GFW using encrypted connections to Amazon's CloudFront cloud service.
GreatFire also hosts two GitHub repositories, https://gitub.com/greatfire and https://github.com/cn-nytimes, that provide technology for users who wish to circumvent Chinese government censorship. The attack on GitHub specifically targeted these repositories, possibly in an attempt to compel GitHub to remove these resources. GitHub encrypts all traffic using TLS, preventing a censor from only blocking access to specific GitHub pages. In the past, China attempted to block Github, but the block was lifted within two days, following significant negative reaction from local programmers.27
Section 5: Policy Context and ImplicationsThis section describes some policy implications of deploying the Great Cannon, addresses the impact of targeting Baidu traffic specifically, and discusses the Chinese authorities that may be involved in operation of the GC.
Implications of the GC for Chinese PolicyDeploying the Great Cannon is a major shift in tactics, and has a highly visible impact. It is likely that this attack, with its potential for political backlash,28 would require the approval of high-level authorities within the Chinese government. These authorities may include the State Internet Information Office (SIIO),29 which is responsible for Internet censorship. It is also possible that the top body for cybersecurity coordination in China, the Cybersecurity and Informatization Leading Group (CILG),30 would have been involved. The CILG is chaired by Xi Jinping and includes as members senior leaders from across the government; its administrative office is housed within the SIIO.31
The government's reasoning for deploying the GC here is unclear, but it may wish to confront the threat presented to the Communist Party of China's (CPC) ideological control by the ''collateral freedom'' strategy advanced by GreatFire.org32 and others. The attack was exceptionally costly to GreatFire, according to their public statements,33 as well as disruptive to the companies that hosted GreatFire content. Such a disruption could be both an attempt to block the operations of an undesirable resource, and a signal sent to other organizations of the potential price tag for this kind of activity. Deployment of the GC may also reflect a desire to counter what the Chinese government perceives as US hegemony in cyberspace.
This approach would be consistent with the CPC's paramount focus on protecting ''domestic stability'' (and its own authority) against entities it has identified as ''foreign hostile forces,'' including not only governments but also Western media outlets (such as the New York Times) and NGOs or other civil society actors (such as GreatFire.org).34 According to such a world view, the collateral freedom strategy is a provocative, hostile act that threatens China's security.
Implications of Using Traffic to Baidu ServicesThe incorporation of Baidu in this attack suggests that the Chinese authorities are willing to pursue domestic stability and security aims at the expense of other goals, including fostering economic growth in the tech sector. Selecting Baidu's international traffic may appear counterproductive given the importance of Baidu to the Chinese economy: the company enjoys stature as one of China's ''big three'' Internet firms, alongside Alibaba and Tencent,35 and currently ranks as the top site in China.36 While its shares came under pressure after the February release of its Q4 and fiscal year 2014 reports,37 its total revenue in 2014 was USD $7.906 billion, with online marketing revenues for that period valued at USD $7.816 billion.38
''Service interruptions could reduce our revenues and profits and damage our brand if our systems are perceived to be unreliable.''39
Baidu has denied involvement in the attack and asserted its internal security was not compromised.40 Yet the targeting of international visitors trying to reach sites that are Baidu properties, or that use Baidu analytics, advertisements, or static resources, could undermine the company's reputation and its appeal to overseas users and advertisers.
Baidu writes in its SEC filings that it was the target of legal action in the United States in 201141 for complying with Chinese censorship. Baidu explicitly notes that cooperation and coordination with Chinese censorship authorities could be costly in terms of brand image, profit, and stockholder confidence.
''our compliance with PRC regulations governing internet access and distribution of news and other information over the internet may subject us to negative publicity or even legal actions outside of China.''42
Moreover, exploiting Baidu's international reach as a means for conducting digital attacks belies the government's recent commitment to enhance the global presence of Internet companies. At the meeting of the National People's Congress on March 5, 2015, Premier Li Keqiang (who is also Vice-Chair of the CILG) announced:
We will develop the ''Internet Plus'' action plan to integrate the mobile Internet, cloud computing, big data, and the Internet of Things with modern manufacturing, to encourage the healthy development of e-commerce, industrial networks, and Internet banking, and to guide Internet-based companies to increase their presence in the international market.43
This goal '' which closely echoes that contained in a draft declaration presented (but not passed) at the November 2014 Wuzhen World Internet Conference44 '' may not come to fruition if Chinese domestic companies appear unreliable, their business objectives secondary to other objectives of the Chinese Government.
Chinese authorities may, however, be betting that their use of Baidu traffic to mount this DDoS attack will ultimately be perceived as an isolated occurrence, a sort of ''force majeure,'' with limited impact on Baidu's long-term economic prospects '' particularly given Baidu's apparent status as unwitting victim and its strong market position.
Additionally, Baidu's CEO Robin Li is a member of the Chinese People's Political Consultative Conference45 and well-positioned for lucrative government contracts going forward '-- such as his artificial intelligence project ''China Brain,'' for which he has sought military support.46 He may have little personal incentive (let alone opportunity, given the existing legal and regulatory framework applicable to Internet companies in China47) to challenge this action by the government.
Thinking About Authorities Who May Be Responsible for Implementing The Great CannonEven for the GFW, it is difficult to pinpoint the precise authorities behind its deployment, or its operators and origins. This makes understanding the origins of the GC equally challenging. However, some clues are available. For example, the shared source code and co-location between the GFW and GC suggest that the GC could have been developed within the same institutional framework as the GFW. We might therefore draw further insight into the GC by assessing what we know about the GFW.
Some reports characterize the GFW as an element of China's ''Golden Shield'' project,48 under the authority of the Ministry of Public Security. However, unverified insider information 'leaked' online suggests that the GFW was developed within a separate entity: the ''National Computer Network and Information Security Management Center'' (国家è®ç®—æ'ºç½‘ç>>'与ä息安全ç®ç†ä¸­åƒ) (hereafter, ''the Center'').49 Little is publicly known about the Center. It appears to bear close relationship50 to the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) run by the Ministry of Industry and Information Technology (MIIT) '-- indeed, the listed address for CNCERT/CC is the same as that of the Center as indicated on its patent applications '-- and the former National Network and Information Security Coordination Team,51 a subcommittee of the State Informatization Leading Group subsumed by the CILG in 2014.52 Notably, ''MIIT also regulates China's six Internet service providers (ISPs), which in turn are expected to monitor and filter content on their networks according to censorship guidelines established by the State Council Information Office and the SIIO.''53 Those ISPs include China Telecom and China Unicom, on the links of which we co-located the GFW and GC (see above).
It is unknown whether the GFW and/or the GC are in fact maintained (or may have been developed in whole or in part) by the National Computer Network and Information Security Management Center. However, patent applications filed by this entity, taken together, appear to indicate a mandate for large scale network surveillance, filtering, and defense. The Center has filed nearly 100 patent applications,54 for designs such as ''Method for detecting unexpected hot topics in Chinese microblogs;'' ''Method and system for recognizing Tibetan dialects;'' ''Website classifying method;'' ''Method and system for intelligent monitoring and analyzing under cloud computing;'' ''Method and device for managing global indexes of mass structured log data;'' ''Method, device and system for traffic monitoring and switching;'' ''Image searching/matching method and system for the same;'' and ''Internet basic information management system'' (this last ''comprises a national-level management sub-system, a provincial management sub-system and an enterprise management sub-system'' that ''can perform effective supervision on the Internet basic information throughout the country''). Moreover, according to state media, during the time of the GFW's development the so-called ''father of the Great Firewall,'' Fang Binxing, was employed at CNCERT/CC,55 an entity that appears closely tied to the Center.56 Fang is likewise listed as an inventor on a 2008 patent application by the Center, indicating some collaboration with the Center prior to that point.
While we cannot determine the exact role played by the Center, the patent documentation and the Center itself require further research and analysis to determine whether they are relevant to operation of the GC, or present other human rights-related concerns.
Section 6: Concluding Remarks: The Capability for Targeted Exploitation by ChinaWe conclude with some remarks about the precedent set by China in the use of the GC and outline further implications for targeted exploitation.
The attack launched by the Great Cannon appears relatively obvious and coarse: a denial-of-service attack on services objectionable to the Chinese government. Yet the attack itself indicates a far more significant capability: an ability to ''exploit by IP address''. This possibility, not yet observed but a feature of its architecture, represents a potent cyberattack capability.
A technically simple change in the Great Cannon's configuration, switching to operating on trafficfroma specific IP address rather thantoa specific address, would allow its operator to deliver malware to targeted individuals who communicates with any Chinese server not employing cryptographic protections. The GC operator first needs to discover the target's IP address and identify a suitable exploit. The operator then tasks the GC to intercept traffic from the target's IP address, and replace certain responses with malicious content. If the target ever made a single request to a server inside China not employing encryption (e.g., Baidu's ad network), the GC could deliver a malicious payload to the target. A target might not necessarily realize that their computer was communicating with a Chinese server, as a non-Chinese website located outside China could (for example) serve ads ultimately sourced from Chinese servers.
Since the GC operates as a full man-in-the-middle, it would also be straightforward to have it intercept unencrypted email to or from a target IP address and undetectably replace any legitimate attachments with malicious payloads, manipulating email sent from China to outside destinations. Even email transmission protected by standard encryption (STARTTLS) can be undermined because the GC is in a position to launch a ''downgrade'' attack, steering the transmission to only use legacy, unencrypted communication.
Our findings in China add another documented case to at least two other known instances of governments tampering with unencrypted Internet traffic to control information or launch attacks '-- the other two being the use of QUANTUM by the US NSA and UK's GCHQ. In addition, product literature from two companies, FinFisher and Hacking Team, indicate that they sell similar ''attack from the Internet'' tools to governments around the world.57 These latest findings emphasize the urgency of replacing legacy web protocols, like HTTP, with their cryptographically strong versions, like HTTPS.
We remain puzzled as to why the GC's operator chose to first employ its capabilities in such a publicly visible fashion. Conducting such a widespread attack clearly demonstrates the weaponization of the Chinese Internet to co-opt arbitrary computers across the web and outside of China to achieve China's policy ends. The repurposing of the devices of unwitting users in foreign jurisdictions for covert attacks in the interests of one country's national priorities is a dangerous precedent '-- contrary to international norms and in violation of widespread domestic laws prohibiting the unauthorized use of computing and networked systems.
AcknowledgementsSpecial thanks to: Adam Senft (Citizen Lab) and Paul Pearce (UC Berkeley, ICSI).
We wish to acknowledge GreatFire for making their logs available to us for analysis.
We also express our deep gratitude to several individuals, anonymous or pseudonymous at their request, including ''Jack B,'' who aided us in understanding elements of the attack in the early days, and others who helped us formulate and develop this report.
Footnotes1 Using Baidu ç¾åº... to steer millions of computers to launch denial of service attacks,'' Anonymous author, March 25, 2015 (https://drive.google.com/file/d/0ByrxblDXR_yqeUNZYU5WcjFCbXM/view?pli=1)2http://www.theverge.com/2015/3/27/8299555/github-china-ddos-censorship-great-firewall3Appendix C: Related Technical Reports4http://www.wired.com/2014/03/quantum/5 As discussed further below, this specific URL consistently triggers GFW responses, even though if actually sent to www.google.com it simply returns the Google home page.6 See https://www.cs.unm.edu/~crandall/concept_doppler_ccs07.pdf for a description of the GFW's general operation using injected Reset packets.7 Although, the GFW does send injected RSTs to both the requester and destination, these RSTs may arrive too late to suppress transmission of some subsequent packets.8 See http://www.icsi.berkeley.edu/pubs/networking/ndss09-resets.pdf for a description of how to detect injected RST packets. The same techniques apply to detecting injected data packets.9 For information on both the parallel nature and the TTL sidechannel present in the GFW, see https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf10https://www.cs.unm.edu/~crandall/concept_doppler_ccs07.pdf11 The packet capture also confirms the stateful nature of the GFW's content analysis: it does not inject a TCP Reset unless it first observes a TCP SYN and an ACK for the SYN/ACK for the connection.12 If the GC did not drop requests sent to Baidu, then Baidu would have received our first request (which the GC responded to), and would have ignored our subsequent, duplicate request, as dictated by the TCP protocol. We verified that when the GC did not inject a response, Baidu did indeed ignore the duplicate request.13 Technically complex situations exist in which an on-path system like the GFW could conceivably prevent the appearance of a response from Baidu by disrupting session initiation. We conducted extensive measurements assessing this possibility. We omit those results from this report because the ''retransmission'' measurement discussed above definitively rules out that possibility, rendering the measurements moot.14 Analogous systems to the GC, like QUANTUM, make the architectural decision of having the injector as a distinct device from the rest of the system.15http://blog.erratasec.com/2015/04/pin-pointing-chinas-attack-against.html16 1.1TB, compressed. Note that the logs include both malicious and non-malicious traffic17https://drive.google.com/file/d/0ByrxblDXR_yqeUNZYU5WcjFCbXM/view?pli=118 Files were randomly selected amongst a list of files that were near 30MB. This size was selected because it was largest file size that was present in all timestamp hours we focused on.19http://dev.maxmind.com/geoip/legacy/geolite/20 Note that the malicious requests are being generated by Javascript. When a script makes a web request, the web browser sets the ''Referer'' header on the request to the URL of the page that loaded the script.21 It is typical for web advertisements to be displayed in iframes. This causes the ''Referer'' header to report the advertisement service, not the hosting page.22 See Appendix A.23 Alexa, ''The top 500 sites on the web,'' http://www.alexa.com/topsites (accessed April 8, 2015).24 Alexa, ''Site overview: baidu.com,'' http://www.alexa.com/siteinfo/baidu.com (accessed April 8, 2015).25 Ministry of Foreign Affairs of the People's Republic of China, ''Foreign Ministry Spokesperson Hua Chunying's Regular Press Conference,'' March 30, 2015, http://www.fmprc.gov.cn/mfa_eng/xwfw_665399/s2510_665401/2511_665403/t1250354.shtml.26http://www.cac.gov.cn/2015-01/22/c_1114097853.htm27http://www.computerworld.com/article/2493478/internet/github-unblocked-in-china-after-former-google-head-slams-its-censorship.html28 Particularly after the Snowden disclosures, and the public / state outcry associated with the NSA's QUANTUM system and other programs, the Chinese government would presumably be aware of the significant international political ramifications of a decision to use the GC to target overseas entities, and escalate the matter accordingly.29 Note: also referred to as the Cyberspace Administration of China. ''China sets up State Internet information office,'' Xinhua, May 4, 2011, at http://www.chinadaily.com.cn/china/2011-05/04/content_12440782.htm.30 See Jon R. Lindsay, ''Introduction''China and Cybersecurity: Controversy and Context,'' in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon R. Lindsay et al. [New York: Oxford University Press, 2015], 13-14; Adam Segal, ''China's New Small Leading Group on Cybersecurity and Internet Management,'' Council on Foreign Relations: Asia Unbound, February 27, 2014, http://blogs.cfr.org/asia/2014/02/27/chinas-new-small-leading-group-on-cybersecurity-and-internet-management/.31 For discussion and a diagram of institutions involved in China's national cybersecurity system, see Jon R. Lindsay, ''Introduction''China and Cybersecurity: Controversy and Context,'' in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon R. Lindsay et al. [New York: Oxford University Press, 2015], 6-15.32 Charlie, ''Collateral Freedom and the not-so-Great Firewall,'' GreatFire.org, March 12, 2015, https://en.greatfire.org/blog/2015/mar/collateral-freedom-and-not-so-great-firewall.33 Charlie, ''We Are Under Attack,'' GreatFire.org, March 19, 2015, https://en.greatfire.org/blog/2015/mar/we-are-under-attack.34 For further discussion see Sarah McKune, '''Foreign Hostile Forces': The Human Rights Dimension of China's Cyber Campaigns,'' in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon R. Lindsay et al. [New York: Oxford University Press, 2015], 260-293. See also Wang Chen, ''Concerning the Development and Administration of Our Country's Internet,'' translation by Human Rights in China, China Rights Forum: ''China's Internet'': Staking Digital Ground, no. 2 (2010), http://www.hrichina.org/en/content/3241, at para. III.6 (''We will perfect our system to monitor harmful information on the Internet, and strengthen the blocking of harmful information from outside China, to effectively prevent it from being disseminated in China through the Internet, and to withstand infiltration of the Internet by overseas hostile forces.''); Central Committee of the Communist Party of China's General Office, ''Communiqu(C) on the Current State of the Ideological Sphere,'' April 22, 2013, English translation by ChinaFile available at https://www.chinafile.com/document-9-chinafile-translation; Chris Buckley, ''China's New Leadership Takes Hard Line in Secret Memo,'' New York Times, August 20, 2013, http://cn.nytimes.com/china/20130820/c20document/dual/.35 Shuli Ren, ''China Internet: Alibaba, Tencent, Baidu To Continue Buying Spree, R&D,'' Barron's Asia, January 7, 2015, http://blogs.barrons.com/asiastocks/2015/01/07/china-internet-alibaba-tencent-baidu-to-continue-buying-spree-rd/.36 Alexa, ''Top Sites in China,'' http://www.alexa.com/topsites/countries/CN (accessed April 8, 2015).37 Doug Young, ''Investors Burn Out On Baidu Mobile Story,'' Forbes Asia, February 12, 2015, http://www.forbes.com/sites/dougyoung/2015/02/12/investors-burn-out-on-baidu-mobile-story/.38 ''Baidu Announces Fourth Quarter and Fiscal Year 2014 Results,'' PR Newswire, February 11, 2015, http://www.prnewswire.com/news-releases/baidu-announces-fourth-quarter-and-fiscal-year-2014-results-300034622.html.39 Baidu, Inc. SEC Form 20-F, FY 2011, http://www.sec.gov/Archives/edgar/data/1329099/000119312512139789/d243699d20f.htm.40 Sebastian Anthony, ''GitHub battles 'largest DDoS' in site's history, targeted at anti-censorship tools,'' ArsTechnica, March 30, 2015, http://arstechnica.com/security/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/.41 Baidu, Inc. SEC Form 20-F, FY 2011 http://www.sec.gov/Archives/edgar/data/1329099/000119312512139789/d243699d20f.htm42 Baidu, Inc. SEC Form 20-F, FY 2011 http://www.sec.gov/Archives/edgar/data/1329099/000119312512139789/d243699d20f.htm43 State Council of the People's Republic of China, Report on the Work of the Government (2015), delivered by Li Keqiang, Premier of the State Council, to the National People's Congress, March 5, 2015, http://english.gov.cn/archive/publications/2015/03/05/content_281475066179954.htm (emphasis added); see also Simon Sharwood, ''China reveals 'Internet Plus' plan to modernise and go cloudy,'' The Register, March 9, 2015, http://www.theregister.co.uk/2015/03/09/china_reveals_internet_plus_plan_to_modernise_and_go_cloudy/; ''When China's tech 'big four' meet 'Internet Plus,''' Xinhua, March 11, 2015, at http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20150311000020&cid=1102.44 The sixth point of the declaration was to ''vigorously develop the Internet economy. We should improve cyberspace trade rules, step up cross-border e-commerce cooperation, facilitate customs clearance and logistics, expand information consumption, and quicken steps to form a global Internet market.'' Organizing Committee of the World Internet Conference, Wuzhen Declaration, November 21, 2014, available at http://www.scribd.com/doc/247566581/World-Internet-Conference-Draft-Declaration; see also Catherine Shu, ''China Tried To Get World Internet Conference Attendees To Ratify This Ridiculous Draft Declaration,'' TechCrunch, November 20, 2014, http://techcrunch.com/2014/11/20/worldinternetconference-declaration/; Franz-Stefan Gady, ''The Wuzhen Summit and Chinese Internet Sovereignty,'' Huffington Post, December 9, 2014, http://www.huffingtonpost.com/franzstefan-gady/the-wuzhen-summit-and-chi_b_6287040.html.45 ''Baidu Founder Li and Politburo's Yu Join Top China Advisory Body,'' Bloomberg, February 4, 2013, http://www.bloomberg.com/news/articles/2013-02-02/baidu-chief-li-politburo-s-yu-join-china-s-top-advisory-body.46 Hsu Chang-ping, ''Baidu welcomes China's military to join China Brain project on AI systems,'' WantChinaTimes, March 7, 2015, http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20150307000015&cid=1101.47 For further discussion of this framework see Crandall et al., ''China Chats: Tracking Surveillance and Censorship in TOM-Skype and Sina UC,'' in First Monday 18, no. 7 (2013), http://firstmonday.org/ojs/index.php/fm/article/view/4628/3727.48 See Canada: Immigration and Refugee Board of Canada, China: The Public Security Bureau (PSB) Golden Shield Project, including implementation and effectiveness; Policenet, including areas of operation; level and effectiveness of information sharing by the authorities (2010-February 2014), March 7, 2014, CHN104762.E, available at http://www.refworld.org/docid/543ba3824.html.49 See GFWçšå‰ä¸–ä>>Šç--Ÿ¼Œä¸éƒ¨GFW之ç¶æ–¹æ>>¨å…´çšå‘家史 [''GFW Past and Present, Family History of the Father of the GFW Fang Binxing''], August 10, 2010, https://fangbinxing.appspot.com/2010/08/10/fangbingxing.html; see also Daniel Anderson, ''Splinternet Behind the Great Firewall of China,'' ACM Queue, November 30, 2012, http://queue.acm.org/detail.cfm?id=2405036; Australian Centre on China in the World, ''Fang Binxing and the Great Firewall,'' The China Story, https://www.thechinastory.org/yearbooks/yearbook-2013/chapter-6-chinas-internet-a-civilising-process/fang-binxing-and-the-great-firewall/.50 See GFWçšå‰ä¸–ä>>Šç--Ÿ¼Œä¸éƒ¨GFW之ç¶æ–¹æ>>¨å…´çšå‘家史 [''GFW Past and Present, Family History of the Father of the GFW Fang Binxing''], August 10, 2010, https://fangbinxing.appspot.com/2010/08/10/fangbingxing.html (''国家è®ç®—æ'ºç½‘ç>>'与ä息安全ç®ç†ä¸­åƒ(å®‰ç® ä¸­åƒ)æ¯åŽŸä产部现工ä部çšç›´å±žéƒ¨é—¨ã‚ 安ç®ä¸­åƒä¸Žå›½å®¶ä息化工ä½'é†å¯¼å°ç>>è®ç®—æ'ºç½‘ç>>'与ä息安全ç®ç†å·¥ä½'办公室与国家è®ç®—æ'ºç½‘ç>>'åº--æ¥æŠæ'¯å¤ç†åè°ƒä¸­åƒ (CNCERT/CC,äº'è--网åº--æ¥ä¸­åƒ)æ¯ä¸ä¸ª æ'ºæžå‡ å'—牌子çšå…"ç">>ã‚æ¯--å...‚æ–¹æ>>¨å…´ç®åŽ† 中''1999­-2000å¹´å'¨å›½å®¶è®ç®—æ'ºç½‘ç>>'åº--æ¥æŠæ'¯ å¤ç†åè°ƒä¸­åƒä>>>>副æ>>å·¥''与''è®ç®—æ'ºç½‘ç>>'åº--æ¥ å¤ç†åè°ƒä¸­åƒ''çšæç‹æ—¶é—´ä¸¤ç§è¯´æ"•å°±æ'‰ç' å¾®å...çšçŸ›ç›¾ã‚实é…ä¸Šå‡ 个æ'ºæžçšäººå‘基æ'¬ä¸ 致ã‚''). An official diagram mapping the relationship between CNCERT/CC, MIIT, and the National Network and Information Security Coordination Team is available in Zhou Yonglin, ''Introduction on Chinese Network Emergency Response System & CNCERT/CC's Activities,'' CNCERT/CC, March 2004, p. 10, at http://unpan1.un.org/intradoc/groups/public/documents/apcity/unpan016388.pdf.51 This entity is also known in English as the State Network and Information Security Coordination Group. Its responsibilities included: ''researching and enacting strategy and policy of national information security safeguard[;] organizing and coordinating related departments of government to protect critical information infrastructure[;] mobilizing and directing computer emergency response[;] improving information sharing and notification.'' Li Jingjing, ''Trends and Tactics in Cyber-Terrorism,'' Information Security Supervision Bureau, Ministry of Public Security, p. 13, at http://www.asean.org/archive/arf/13ARF/2nd-Cyber-Terrorism/Doc-7.PDF.52 Jon R. Lindsay, ''Introduction''China and Cybersecurity: Controversy and Context,'' in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon R. Lindsay et al. [New York: Oxford University Press, 2015], 8.53 Jon R. Lindsay, ''Introduction''China and Cybersecurity: Controversy and Context,'' in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon R. Lindsay et al. [New York: Oxford University Press, 2015], 11.54 It is important to note that patent applications do not necessarily reflect current capacities or actual deployment of a technology. They do, however, provide insight into the designs, focus, and goals of the filing entities.55 ''Great Firewall father speaks out,'' Global Times, February 18, 2011, at http://english.sina.com/china/p/2011/0217/360411.html. This article presents the following timeline of Fang's career: ''1984­1999 Teaches at Harbin Institute of Technology[;] 1999 Starts work at National Computer Network Emergency Response Technical Team/ Coordination Center of China as deputy chief engineer[;] 2000-2007 Appointed chief engineer and director of the center[;] 2001 Awarded special allowance by the State Council . . . .''56 See supra n. 50 and accompanying text.57 https://citizenlab.org/2014/08/cat-video-and-the-death-of-clear-text/58 http://www.secdev.org/projects/scapy/59 Although the GC will respond to a ''naked'' data packet, this tool first sends a SYN packet and an ACK packet to prevent NATs or conventional firewalls between the user and Baidu from dropping the probe packets. This test also first probes for the GC before probing for the GFW. Once the GFW decides to block two hosts from communicating, for the next minute it injects RSTs in response to any data packet it sees between those two hosts, which would confound the GC measurements somewhat.60 ''Baidu's traffic hijacked to DDoS GitHub.com [Updated],'' Anthr@X, Insight Labs, March 27, 2015 (GitHub.com(http://insight-labs.org/?p=1682); ''China's Man-on-the-Side Attack on GitHub,'' NETRESC AB, March 31, 2015 (http://www.netresec.com/?month=2015-03&page=blog&post=china%27s-man-on-the-side-attack-on-github); ''Pin-pointing China's attack against GitHub,'' Robert Graham, April 1, 2015 (http://blog.erratasec.com/2015/04/pin-pointing-chinas-attack-against.html#.VSBOpHXd9hE)61 http://insight-labs.org/?p=168262 http://www.netresec.com/?month=2015-03&page=blog&post=china%27s-man-on-the-side-attack-on-github63 http://blog.erratasec.com/2015/04/pin-pointing-chinas-attack-against.html
Appendix A: Link between GreatFire.org referrers and BaiduThis table lists the top 25 referrers seen in our sample of the GreatFire.org server logs, and links each one to Baidu.
DomainRequest CountLink to Baidu Propertiespos.baidu.com6,273,809.00direct Baidu propertytieba.baidu.com384,173.00direct Baidu propertyzhidao.baidu.com321,619.00direct Baidu propertywww.dm5.com207,398.00does a GET to Baidu imagewww.piaotian.net187,894.00uses jquery library from Baidu libscpro.baidu.com155,007.00direct Baidu propertywenku.baidu.com143,271.00direct Baidu propertycomic.sfacg.com114,382.00uses Baidu adsbbs.miercn.com111,478.00uses Baidu analyticswww.7k7k.com94,994.00uses Baidustatic.com resourcesmangapark.com94,986.00uses Baidu analyticsad.docer.wps.cn93,881.00uses Baidustatic.com resourcesmanhua.dmzj.com93,622.00uses Baidustatic.com resourceswww.iciba.com91,626.00uses Baidu analyticsm.movietube.pw87,396.00uses Baidu analyticspan.baidu.com84,974.00direct Baidu propertywww.douyutv.com84,945.00uses Baidu analyticswww.lwxs520.com75,964.00does a GET to Baidu imagewww.17k.com75,514.00uses Baidu analyticswww.jjwxc.net71,385.00uses Baidustatic.com resourcesimages.sohu.com67,170.00uses Baidu analyticstw.zhsxs.com65,896.00uses Baidu analyticsm.yy.com62,990.00uses Baidu adswww.4399.com60,630.00uses Baidu adswww.zhibo8.cc57,374.00uses Baidu ads
Appendix B: A Tool for Tracerouting the GC and GFWWe wrote cannon_traceroute.py, a tool that aims to trace the first hop between the user and Baidu at which the GFW and GC are active. As the GC no longer appears to be targeting Baidu traffic, this tool will not detect the GC, but will still detect the GFW. Our tool uses the scapy58 library to first craft raw packets designed to trigger the GC at each hop,59 and to then craft fake flows to trigger the GFW at each hop. An example output for a test:
> sudo ./cannon_traceroute.py 123.125.65.120WARNING: No route found for IPv6 destination :: (no default route?)Sniffer started................................................Great Firewall and Great Cannon traceroute from 192.150.187.17 to 123.125.65.120Traceroute for the Great FirewallHop 1: ICMPs: 192.150.187.1Hop 2: ICMPs: 192.150.187.251Hop 3: ICMPs: 169.229.0.140Hop 4: ICMPs: 128.32.0.80Hop 5: ICMPs: 128.32.0.64Hop 6: ICMPs: 137.164.50.16Hop 7: ICMPs: 137.164.22.7Hop 8: ICMPs: 4.53.16.185Hop 9: *Hop 10: ICMPs: 144.232.19.33Hop 11: ICMPs: 144.232.0.167Hop 12: ICMPs: 144.232.12.211 144.232.12.213 144.232.9.177Hop 13: ICMPs: 144.232.25.78 144.232.7.164Hop 14: ICMPs: 144.232.19.24 144.232.6.104 144.232.6.41 144.232.9.192Hop 15: ICMPs: 144.228.17.98Hop 16: ICMPs: 219.158.102.125Hop 17: ICMPs: 219.158.101.61Hop 18: Firewall ICMPs: 219.158.101.49Hop 19: Firewall ICMPs: 124.65.194.54Hop 20: Firewall ICMPs: 202.106.34.6Hop 21: Firewall ICMPs: 123.125.128.14Traceroute for the Great CannonHop 1: ICMPs: 192.150.187.1Hop 2: ICMPs: 192.150.187.251Hop 3: ICMPs: 169.229.0.140Hop 4: ICMPs: 128.32.0.80Hop 5: ICMPs: 128.32.0.64Hop 6: ICMPs: 137.164.50.16Hop 7: ICMPs: 137.164.22.7Hop 8: ICMPs: 4.53.16.185Hop 9: ICMPs: 4.69.152.144 4.69.152.16 4.69.152.208 4.69.152.80Hop 10: ICMPs: 144.232.19.33Hop 11: ICMPs: 144.232.0.167Hop 12: ICMPs: 144.232.12.211 144.232.12.213 144.232.9.177Hop 13: ICMPs: 144.232.25.78 144.232.7.164Hop 14: ICMPs: 144.232.19.24 144.232.6.104 144.232.6.106 144.232.6.41 144.232.6.43 144.232.9.192Hop 15: ICMPs: 144.228.17.98Hop 16: ICMPs: 219.158.102.125Hop 17: ICMPs: 219.158.101.61Hop 18: Cannon ICMPs: 219.158.101.49Hop 19: Cannon ICMPs: 124.65.194.54Hop 20: Cannon ICMPs: 202.106.34.6Hop 21: Cannon ICMPs: 123.125.128.14In this example, the first hop at which the GC and GFW are active is hop 18, between 219.158.101.69 and 219.158.101.49 (a link apparently belonging to China Unicom).
Appendix C: Selected Related Technical ReportsThe DDoS attack on GreatFire has been described in a range of technical reports.60 This section provides a quick chronology and summary of several recent technical posts and discussions. On March 25, the first official report with technical details, written by an anonymous author, was released by Greatfire.org. This analysis was based on logs collected from one of the attacked sites (d19r410x06nzy6.cloudfront.net) that formed part of GreatFire's infrastructure. The report observed strange timestamps in some of the packets in the logs, which it linked to malicious Javascript code sent when some clients loaded resources from Baidu's servers, including dup.baidustatic.com and ecomcbjs.jomodns.com.
As the attack gained visibility, other researchers contributed analysis. On March 27, Anthr@X did the first analysis61 on the malicious Javascript returned by Baidu, and pointed out that the packets containing the malicious code had different TTLs than the normal, non-malicious Baidu responses. Then, on March 31, NETRESEC62 provided more details on the malicious packets' TTLs, determining that they varied between 30 and 229. On April 1, Robert Graham published a careful and detailed analysis63 indicating that the GFW was injecting these packets. His findings match ours regarding localization of the injector; his report did not delve into the fine-grained workings of the injection that reveal the presence of a separate system from the GFW.
China Is Said to Use Powerful New Weapon to Censor Internet - NYTimes.com
Fri, 10 Apr 2015 18:06
PhotoThe Great Cannon system was used to intercept web and advertising traffic intended for Baidu, China's biggest search engine company, researchers said.Credit ReutersSAN FRANCISCO '-- Late last month, China began flooding American websites with a barrage of Internet traffic in an apparent effort to take out services that allow China's Internet users to view websites otherwise blocked in the country.
Initial security reports suggested that China had crippled the services by exploiting its own Internet filter '-- known as the Great Firewall '-- to redirect overwhelming amounts of traffic to its targets. Now, researchers at the University of California, Berkeley, and the University of Toronto say China did not use the Great Firewall after all, but rather a powerful new weapon that they are calling the Great Cannon.
The Great Cannon, the researchers said in a report published Friday, allows China to intercept foreign web traffic as it flows to Chinese websites, inject malicious code and repurpose the traffic as Beijing sees fit.
The system was used, they said, to intercept web and advertising traffic intended for Baidu '-- China's biggest search engine company '-- and fire it at GitHub, a popular site for programmers, and GreatFire.org, a nonprofit that runs mirror images of sites that are blocked inside China. The attacks against the services continued on Thursday, the researchers said, even though both sites appeared to be operating normally.
PhotoBill Marczak, right, a co-author of the report on a powerful new Chinese cyberweapon, with Morgan Marquis-Boire, a fellow Citizen Lab researcher.Credit Thor Swift for The New York TimesBut the researchers suggested that the system could have more powerful capabilities. With a few tweaks, the Great Cannon could be used to spy on anyone who happens to fetch content hosted on a Chinese computer, even by visiting a non-Chinese website that contains Chinese advertising content.
''The operational deployment of the Great Cannon represents a significant escalation in state-level information control,'' the researchers said in their report. It is, they said, ''the normalization of widespread and public use of an attack tool to enforce censorship.''
The researchers, who have previously done extensive research into government surveillance tools, found that while the infrastructure and code for the attacks bear similarities to the Great Firewall, the attacks came from a separate device. The device has the ability not only to snoop on Internet traffic but also to alter the traffic and direct it '-- on a giant scale '-- to any website, in what is called a ''man in the middle attack.''
China's new Internet weapon, the report says, is similar to one developed and used by the National Security Agency and its British counterpart, GCHQ, a system outlined in classified documents leaked by Edward J. Snowden, the former United States intelligence contractor. The American system, according to the documents, which were published by The Intercept, can deploy a system of programs that can intercept web traffic on a mass scale and redirect it to a site of their choosing. The N.S.A. and its partners appear to use the programs for targeted surveillance, whereas China appears to use the Great Cannon for an aggressive form of censorship.
The similarities of the programs may put American officials on awkward footing, the researchers argue in their report. ''This precedent will make it difficult for Western governments to credibly complain about others utilizing similar techniques,'' they write.
Still, the Chinese program illustrates how far officials in Beijing are willing to go to censor Internet content they deem hostile. ''This is just one part of President Xi Jinping's push to gain tighter control over the Internet and remove any challenges to the party,'' said James A. Lewis, a cybersecurity expert at the Center for Strategic Studies in Washington.
Beijing continues to increase its censorship efforts under its State Internet Information Office, an office created under Mr. Xi to gain tighter control over the Internet within the country and to clamp down on online activism. In a series of recent statements, Lu Wei, China's Internet czar, has called on the international community to respect China's Internet policies.
Sarah McKune, a senior legal adviser at the Citizen Lab at the Munk School of Global Affairs at the University of Toronto and a co-author of the report, said, ''The position of the Chinese government is that efforts to serve what it views as hostile content inside China's borders is a hostile and provocative act that is a threat to its regime stability and ultimately its national security.''
The attacks also show the extent to which Beijing is willing to sacrifice other national goals, even economic ones, in the name of censorship. Baidu is China's most visited site, receiving an estimated 5.2 million unique visitors from the United States in the past 30 days, according to Alexa, a web ranking service.
Kaiser Kuo, a Baidu spokesman, said that Baidu was not complicit in the attacks and that its own networks had not been breached. But by sweeping up Baidu's would-be visitors in its attacks, researchers and foreign policy experts say, Beijing could harm the company's reputation and market share overseas.
Beijing has recently said that it plans to help Chinese Internet companies extend their influence and customer base abroad. At a meeting of the National People's Congress in China last month, Premier Li Keqiang announced a new ''Internet Plus'' action plan to ''encourage the healthy development of e-commerce, industrial networks and Internet banking and to guide Internet-based companies to increase their presence in the international market.''
Yet the latest censorship offensive could become a major problem for Chinese companies looking to expand overseas. ''They know one of their biggest obstacles is the perception that they are tools of the Chinese government,'' Mr. Lewis said. ''This is going to hurt Baidu's chances of becoming a global competitor.''
Researchers say they were able to trace the Great Cannon to the same physical Internet link as China's Great Firewall and found similarities in the source code of the two initiatives, suggesting that the same authority that operates the Great Firewall is also behind the new cyberweapon.
''Because both the Great Cannon and Great Firewall are operating on the same physical link, we believe they are both being run under the same authority,'' said Bill Marczak, a co-author of the report who is a computer science graduate student at the University of California, Berkeley, and a research fellow at Citizen Lab.
Mr. Marczak said researchers' fear is that the state could use its new weapon to attack Internet users, particularly dissidents, without their knowledge. If they make a single request to a server inside China or even visit a non-Chinese website that contains an ad from a Chinese server, the Great Cannon could infect their web communications and those of everyone they communicate with and spy on them.
Ultimately, researchers say, the only way for Internet users and companies to protect themselves will be to encrypt their Internet traffic so that it cannot be intercepted and diverted as it travels to its intended target.
''Put bluntly,'' the researchers said, ''unprotected traffic is not just an opportunity for espionage but a potential attack vector.''
Paul Mozur contributed reporting from Hong Kong.
Loading...
Hillary 2016
Vaccine$
Swearing is emotional and creative language say researchers who claim it is GOOD for you | Daily Mail Online
Fri, 10 Apr 2015 17:27
Theory presented to British Psychological Society conference in BirminghamParticipants played aggressive video game and held ice-cold glass of waterDr Richard Stephens of Keele University added it explains why we swear'We want to use more taboo words when we're emotional', he saidBy Dan Bloom
Published: 09:55 EST, 11 May 2014 | Updated: 04:56 EST, 12 May 2014
Scroll down for an audio interview
Swearing is a harmless emotional release which could make you feel stronger, researchers have claimed - though only in moderation.
Participants were made to play aggressive computer games and could recall a wider variety of swear words after their session, as well as turning the air blue much more often.
Rather than just proving we swear more when we're angry, the psychologists insisted, the study showed profanity can be an emotional coping mechanism which makes us feel more resilient.
Letting off steam: Swearing could be a harmless emotional release, at least in moderation, researchers claim
And it showed the reasons for swearing were far more complicated than simple rudeness, they said.
The psychologists at Keele University in Staffordshire have spent several years trying to understand why we swear and what it does to our brains.
They presented the findings of their latest study to the British Psychological Society's annual conference this week.
TURNING THE NET BLUE: TOP 10 UK SWEAR WORDS ON FACEBOOK1. F***
2. S***
3. Bloody
4. P***
5. B****
6. Crap
7. C***
8. C***
9. Damn
10. D***
Source:Slate
In the video game study, they said, participants were asked to recall as many profanities as they could before and after playing.
Beforehand they could only recall an average of seven, but afterwards the total rose to eight.
Senior lecturer Dr Richard Stephens said: 'The video games made people feel more aggressive so their language became more emotional and they swore. This explains swearing and makes it more acceptable.
'We want to use more taboo words when we are emotional. We grow up learning what these words are and using these words while we are emotional can help us to feel stronger.
'Some words are more taboo than others - but the effects can be greater, the stronger the word.'
Speaking before the gathering of top psychologists, Dr Stephens also mentioned a previous study by his team which showed swearing made us feel less pain.
Participants were handed a glass of water filled with ice, and split into two groups - one told to swear and another told to keep quiet.
Intelligent: Dr Stephens said the average profile of a swearer is often sophisticated, like that of the spin doctor Malcolm Tucker (played by Peter Capaldi) in TV political satire The Thick of It
The group allowed to swear held the ice-cold glass for longer, they discovered.
Dr Stephens' interest in swearing began after he heard his wife cursing while she was in labour with their second daughter.
He has also studied research which he says debunks the theory that swearing is the language of the ignorant.
Instead, he said, the highly intelligent but foul-mouthed spin doctor Malcolm Tucker in political satire The Thick of It could be more accurate.
'The stereotype is that those who swear have a low IQ or are inarticulate is wrong. It is rich emotional language,' he said.
However, he warned: 'The more often someone swears, the less effective it is.'
Not everyone agrees that swearing is a harmless creative output.
BT Sport had to abandon post-match interviews outside grounds because fans could not be relied upon not to swear following an Arsenal-Liverpool match report in February which was repeatedly interrupted by foul language.
And Vladimir Putin reportedly signed a new law this week which bans swearing in Russian plays, films and books.
Researcher explains why swearing is GOOD.
Share or comment on this article
Parents who refuse to vaccinate children to be denied childcare rebates | Society | The Guardian
Sun, 12 Apr 2015 13:59
A one-year-old is administered with a vaccination '' the government will now close a loophole that allowed parents who refused to vaccinate children to still receive welfare payments. Photograph: David Levene for the Guardian
The Abbott government will tighten vaccination rules to ensure that people who refuse to immunise their children are stripped of family and childcare payments worth thousands of dollars a year.
The prime minister, Tony Abbott, said people would no longer be able to claim a ''conscientious objection'' to vaccination and still receive the childcare benefit, childcare rebate and the Family Tax Benefit part A end-of-year supplement.
The childcare benefit is currently set at $205 a week or close to $10,000 a year, the childcare rebate is worth up to $7,500 a year, and the Family Tax Benefit A annual supplement is $726. But the structure of childcare subsidies is complex and the total amounts vary based on family circumstances.
The policy, to take effect early next year, will continue to leave open exemptions on medical or religious grounds.
But the social services minister, Scott Morrison, said the new policy represented ''a very significant narrowing'' of the exemptions. A religion's governing body would have to formally register its objection with the government, which would have to approve it.
''There are no mainstream religions who have such objections registered,'' Morrison said. ''Those would apply to a very very small number of people. It would be likely to be in the thousands.''
Abbott and Morrison announced the ''no jab, no pay'' policy in Sydney on Sunday, saying 97% of families receiving family tax benefits met the current immunisation requirement at relevant age points.
''However more than 39,000 children aged under seven are not vaccinated because their parents are vaccine objectors. This is an increase of more than 24,000 children over 10 years,'' Abbott and Morrison said in a statement.
''The government is extremely concerned at the risk this poses to other young children and the broader community.
''The choice made by families not to immunise their children is not supported by public policy or medical research nor should such action be supported by taxpayers in the form of child care payments.''
Morrison urged parents to listen to ''the overwhelming advice'' of health professionals that ''it's the smart thing and the right thing to do to immunise your children''.
''If they're not going to do that, then the taxpayers are not going to subsidise that choice for them,'' Morrison said.
Abbott declined to say how much the policy might save the budget. ''This isn't a savings measure; this is a public health measure.''
The prime minister said he believed the policy should have bipartisan support but he did not take anything for granted.
The opposition leader, Bill Shorten, who has previously expressed support for the government taking a tougher stance, said on Sunday that Labor would work with the Coalition to increase immunisation rates.
''Labor understands that there are a small number of people who have deeply-held religious convictions, but other than that, Labor sees no case at all for parents not to be encouraged to immunise their children,'' Shorten said.
''What I don't accept is people just claiming some sort of loose, undefined conscientious objection and using that as an excuse not to do the right thing by their children.''
Shorten said political leaders should work with the childcare sector to ensure vulnerable children were not inadvertently excluded from early education and care as a result of the policy.
The president of the Australian Medical Association, Brian Owler, underlined the importance of people talking to their general practitioner as a credible source of information about vaccination.
Owler said the AMA had not originally supported revoking payments because it was worried about children being alienated or punished for the decisions of their parents. He said the policy would not eliminate the need for other initiatives to increase vaccination rates.
''You have parents coming through all the time,'' Owler said. ''You have to keep going with the education, the right messaging, to the media and the public to get parents to the right sources of information and to call out the anti-vax lobby for what it is: essentially scaremongering conspiracy theorists and peddling a load of rubbish and endangering lives doing it.''
The government is considering other elements of the Productivity Commission report '' including an overhaul of childcare subsidies '' as part of the ''families package'' to form part of the budget next month.
F-Russia
Ruble Set for Best Week Since 1998 as Russians Convert Dollars - Bloomberg Business
Fri, 10 Apr 2015 13:35
The ruble climbed, capping its biggest weekly gain in almost 17 years, as Russians moved their dollar savings into the local currency to take advantage of the world's biggest appreciation.
The ruble increased 1.3 percent to 51.20 by 2:18 p.m. in Moscow, taking its advance for the week to 11 percent, the most among currencies tracked by Bloomberg globally. Government bonds known as OFZs rose, pushing five-year yields down 31 basis points to 11.23 percent, the lowest since Dec. 2, as the ruble's rally spurred bets the central bank will take steps to stem the jump.
After rushing to buy dollars as the ruble lost almost half its value last year, Russian households have sold three times the amount of foreign currency this month as they did in all of March, according to Sberbank CIB's estimates. The nation's assets were also bolstered by oil, Russia's main export earner, which surged 3.3 percent this week.
''Factors including the oil's stabilization and the population's conversion of foreign currencies into rubles has created conditions for the ruble rally,'' Maxim Korovin, an analyst at VTB Capital in Moscow, said by phone. ''The ruble's strengthening has been heating up the appetite for OFZs and giving the regulator more scope for easing of the monetary policy.''
Forward-rate agreements show traders are betting on a 1.70 percentage-point reduction in benchmark borrowing costs in the next three months, 20 basis points more than at the start of April. The central bank has lowered its key rate twice this year to 14 percent.
Currency OverboughtPolicy makers are already taking steps to damp demand for rubles. The currency pared gains on Friday after the Bank of Russia announced it will increase its minimum interest rate on foreign-currency repurchase agreements.
The ruble's relative-strength index climbed to 82 on Friday, above the threshold of 70 that signals to some analysts that an asset has overshot.
While easing inflationary pressures, the rising ruble hurts Russia's budget by reducing the local-currency value of dollar-denominated energy export revenue. Converted into rubles, the price of Brent is at 2,865, the lowest level since January 2011.
This poses a risk for the country in a year when analysts are projecting a fiscal shortfall of 2.3 percent of gross domestic product, the biggest since 2010.
Exporters SellingThe scope for further appreciation remains as exporters convert foreign-currency revenues early to prepare for the next tax period, betting the ruble will only get stronger if they wait, according to Sberbank CIB's Iskander Abdullaev.
The weekly appreciation against the dollar was the largest since a temporary rebound in October 1998 following a government default that triggered a 71 percent depreciation for the year. Russia's dollar-denominated RTS stock index rose 1 percent to 1,013.14 on Friday, the highest level since November and the fifth day of gains.
Capital outflows slowed to $32.6 billion in the first three months of the year, less than half the amount in the previous three months, according to initial central bank estimates.
''The oil price has stopped falling and is behaving better now, the geopolitical noise has subsided, financial stress in the local market has been reduced dramatically and at the margin, macro conditions are showing some modest signs of improvement,'' Benoit Anne, the head of emerging-market strategy at Societe Generale SA in London, said by e-mail. ''You put all these in a blender and you end up with a good ruble cocktail.''
More Western Corp Expansion in Russia'...'...Dutch Spar International Opening 45 Stores in Moscow
Fri, 10 Apr 2015 16:09
SEE ALSO: Starbucks Expands Outlets in Russia
SEE ALSO: U.S. Martin Engineering Opens New Division in Moscow
.
Spar International pushes ahead with Russian expansion
08 Apr 2015 |Helen Gilbert
Spar International has secured new licence agreements with two partners in Russia as it forges ahead with plans to expand Spar retail operations in the country.
The deal with Intertorg and Azbuka Vkusa will result in the opening of 45 Spar stores in the Moscow region over the next 12 months and comes on the back of a record year for Spar Russia, in which retail sales grew by more than 30% to 74.06 billion rubles '' equating to '‚¬1.45 billion.
At present, Intertorg holds a licence with Spar in the St. Petersburg region and operates 56 Spar supermarkets, including two hypermarkets. The company also runs 38 supermarkets in Moscow which will transition to the Spar brand as part of the latest licence agreement.
Azbuka Vkusa currently manages eight Spar supermarkets in the Moscow region.
''The agreements with Intertorg and Azbuka Vkusa mark the next phase in the development of Spar in Russia,'' CEO of Spar Russia, Sergey Loktev, said.
''The non-exclusive licences mean our partners in the Moscow region will work together to maximise the growth of the brand in the city, utilising their deep understanding of the Russian consumer and sharing Spar's commitment to delivering freshness, value, service and quality.''
Dr Gordon Campbell, CEO of Spar International described the retailer as having a 'proven record of resonating with Russian shoppers' over the past 15 years.
''The results announced today are proof of the increasing popularity of the brand to a point where, taken collectively, the Spar Brand now ranks among the top 10 retailers in Russia.''
SOURCE: http://www.thegrocer.co.uk/stores/property-and-planning/spar-international-pushes-ahead-with-russian-expansion/516695.article
.
SPAR, is a Dutch multinational retail chain and franchise with approximately 12,500 stores in 35 countries worldwide. It was founded in the Netherlands in 1932 by retailer Adriaan van Well. Through its affiliate organisations, Spar operates through most European countries, parts of Africa, Asia and Oceania. Its headquarters are in Amsterdam
SOURCE: http://en.wikipedia.org/wiki/Spar_%28retailer%29
FACT SHEET: U.S.-CARICOM Summit '' Deepening Energy Cooperation
Fri, 10 Apr 2015 17:33
The White House
Office of the Press Secretary
For Immediate Release
April 09, 2015
Today, President Obama met with Caribbean leaders in a U.S.-CARICOM Summit in Kingston, Jamaica. President Obama reaffirmed the importance of our relationship with the region, and the United States' commitment to partner with Caribbean countries to advance economic development, security, and good governance. Leaders discussed a broad range of issues, from our important trade and investment linkages to security cooperation. The leaders' discussion focused on the importance of improving energy security, reducing energy costs, and fighting climate change. This follows robust engagement on these issues over the last year, including the White House Caribbean Energy Security Summit hosted by the Vice President in January 2015 and the launch of the Caribbean Energy Security Initiative (CESI) coordinated by the Department of State. The United States is deepening this collaboration through the following initiatives: Clean Energy Finance Facility for the Caribbean and Central American (CEFF-CCA): The United States will launch a $20 million facility to encourage investment in clean energy projects. The facility will provide early-stage funding to catalyze greater private and public sector investment in clean energy projects. It will draw on the expertise of the U.S. Overseas Private Investment Corporation (OPIC) and the U.S. Trade and Development Agency (USTDA) in coordination with the U.S. Agency for International Development (USAID) and the Department of State. Energy Security Task Force: The United States will partner with Caribbean and Central American countries in a task force to evaluate progress in our cooperation and identify concrete steps to advance energy sector reform, regional integration, and clean energy development. Clean Energy Finance: In January, OPIC formed a dedicated financing and insurance team to advance development of the Caribbean renewable energy sector. OPIC is in advanced talks to finance a 20 MW solar farm in Jamaica, and has already committed financing to Jamaica's largest private-sector wind farm, a 36 MW facility in Malvern, St. Elizabeth Parish. OPIC is actively looking for opportunities to support solar and wind energy projects in Jamaica and throughout the broader Caribbean region. Clean Energy Technology Collaboration: The U.S. Department of Energy (DOE) and Jamaica's Ministry of Science, Technology, Energy, and Mining signed a statement of intent today to advance our shared interest in sustainable energy. Areas for potential cooperation include energy conservation and efficiency, energy infrastructure, micro grids and energy storage, fuel diversification, and energy policy. Clean Energy Economy Transition: The Department of Energy assembled U.S. and Caribbean stakeholder working groups to look at opportunities ranging from clean energy, efficiency, diversifying electricity generation, clean transportation and energy education, at the Caribbean Clean Energy Technology Symposium, held in St. Thomas in March. The working groups will report on progress at the 2016 Symposium to be hosted by Jamaica. Also, the Department of Energy will launch a new Energy Scenario Planning Tool¸ building on its Energy Transitions: Island Playbook, to help island communities plan clean energy projects that are most likely to attract investment, capitalize on local resources, and meet energy needs. Greening Tourism: The tourism industry is the largest energy user in the Caribbean. The Department of Energy, with its Pacific Northwest National Laboratory, and OPIC are undertaking the Caribbean Hotel Energy Efficiency and Renewables (CHEER) initiative, which supports projects to improve energy and water efficiency as well as the exchange of best practices in the hotel and tourism industry. USAID is launching a complementary project focused on the Eastern Caribbean that will develop new financing tools for energy efficiency and renewables. Jamaica Clean Energy Program: USAID is working with the Government of Jamaica and the private sector on a new integrated Clean Energy Program to establish the pre-conditions for clean energy development, optimize renewable energy integration, and accelerate private-sector clean energy investment.
Russian-Ukrainian relations thaw slightly over new gas deal
Fri, 10 Apr 2015 17:54
Alexander Novak, Russia's energy minister.
Two weeks ago, Ukraine said it would suspend importing Russian gas when the countries' contract expired on March 31, primarily because of the high price, especially when it can get the fuel at lower cost from Europe.Apparently that pressure worked. The two countries' state-owned gas companies, Ukraine's Naftogaz and Russia's Gazprom, signed a three-month contract on April 2 that would supply Ukraine with less costly gas from Russia through June.
And the gas will flow regardless of the $5 billion debt, disputed by Kiev, that Naftogaz owes to Gazprom, according to Alexander Novak, Russia's energy minister. He said the debt, subject to an eventual ruling by an arbitration court in Stockholm, would not interfere with the April-June deliveries of gas to Ukraine.
"We currently have a prepayment system," Novak said April 4. "As far as I am aware, they have paid $30 million, which means that there will be supplied gas for this amount."
This is major departure from the history of sour relations between Kiev and Moscow over gas supplies, which are supplied via pipelines to Ukraine, which itself serves as a transit region for Russian gas to customers farther west in the European Union.
Three times - in 2006, 2009 and 2014 - disputes over Ukraine's payments have led Russia to shut down the flow of gas, affecting not only Ukraine but the EU customers downstream. Traditionally the Europeans had relied on Russia for about 30 percent of their gas needs, with half of it flowing through Ukraine. Now that amount has reduced somewhat as the EU has found alternatives to Russian gas.
The 2014 shutdown lasted six months until the European Commission (EC) helped Kiev and Moscow reach a temporary deal in October to provide Ukraine with gas through March 31, covering the country's harsh winter.
Now Ukraine's Naftogaz has another three months to stock up on fuel in case it falls short next winter. Novak said that probably would require Ukraine's purchase of between 11 billion and 12 billion cubic meters this summer. That will begin with the purchase of 1 billion cubic meters of gas in April, he said, three times as much as it received in March.
Under the new three-month deal, Naftogaz will pay even less for the fuel from Gazprom than it did under the "winter package" that expired on March 31. The new price will be $248 per 1,000 cubic meters, compared with $329 under the previous contract, Ukraine's Energy Ministry said April 2.
Ukrainian Energy Minister Volodymyr Demchyshyn called this a "victory" because it shifted the focus between the two countries to an economic rather than a political approach.
Anna-Kaisa Itkonen, a spokeswoman for the EC, agreed, calling Moscow's offer of a lower price "good and welcome."
How to win hearts and minds: Putin returns Nazi-looted icon to Greek prime minister -- Puppet Masters -- Sott.net
Sun, 12 Apr 2015 14:39
(C) Sergei Karpukhin / ReutersGreek Prime Minister Alexis Tsipras meets with Patriarch of Moscow and All Russia Kirill in Moscow Apr. 9.
President Vladimir Putin has presented Greek Prime Minister Alexis Tsipras with an ancient Greek icon that had been looted decades earlier, during the Nazi occupation of Greece.Putin's spokesman Dmitry Peskov said in comments to news site Vesti.ru on Thursday that Putin personally gave Tsipras the icon, which depicts Saint Nicholas and Saint Spyridon, following their talks at the Kremlin on Wednesday.
Peskov said the icon was stolen by a Nazi officer when Greece was under German occupation during World War II, and had recently been purchased from the officer's descendants by an unnamed Russian man.
With many private partners, Russia is eager to establish strong financial and political cooperation, but also cultural exchange.
"The Prime Minister of Greece Alexis Tsipras gave an icon of St. Nicholas the Wonderworker and St. Spyridon, which was stolen during the occupation of the monastery of Sparta Nazi officer Friedrich-Wilhelm M¼ller", - quotes RIA Novosti source in the Greek government. Now, the relic will be able to return to their own rightful owners.
Friedrich-Wilhelm M¼ller - Nazi officer who stole the icon from Greek monastery - during the war, earned the nickname the Butcher of Crete. He has sanctioned the so-called massacre in Viannos, when in early September 1943, the German troops destroyed the inhabitants of almost 20 villages. In retaliation for their support of the guerrillas were killed over 500 people. In 1945 Mueller was arrested by the red army and handed over to Greek authorities. In 1947, he was executed in Crete.
He added that later, the icon was purchased by patrons from the descendants of the Nazis. "And thus the icon was back where she promised to be historically," said Sands. He stressed that the Russian President Vladimir Putin gave the relic directly to the Prime Minister of Greece Alexis Tsipras.
News of the icon's return broke as the State Duma, Russia's lower house of parliament, prepares to host the relics of St. George, which hail from Greece's Mount Athos.
Saint George is one of the most venerated saints in the Russian Orthodox Church. Seen as the patron of warriors, he is portrayed on Moscow's coat of arms.
The Russian Orthodox Church has been the bulwark of President Vladimir Putin's turn toward conservatism and traditionalist values during his third term in the Kremlin.
In recent months, the federal government has sided with the church in a scandal with over a rendition of Richard Wagner's opera Tannh¤user in the Siberian city of Novosibirsk, and Patriarch Kirill has delivered his first speech in the State Duma this January.
Fascist Kiev junta confiscates newspaper and blocks 10,000 websites
Sun, 12 Apr 2015 14:10
As confirmed in an earlier report April 9, 2015, the Security Bureau of Ukraine, on April 7th, had seized and disappeared two Odessa bloggers, who were trying to get an independent investigation, and ultimate prosecution, of the individuals who participated in the 2 May 2014 massacre of regime opponents, and who burned, shot, and clubbed to death perhaps over 200 in the Odessa Trade Unions Building '-- the event that precipitated the breakaway of Donbass from the rest of the former Ukraine, the country's civil war. (See Ukraine "Disappears" Opponents of the Kiev Regime. Abductions of Independent Journalists By Eric Zuesse, April 09, 2015)And I also reported that April 7th saw the official announcement that,
"The security service of Ukraine ... has discontinued operation of a number of Internet sites that were used to perpetrate information campaigns of aggression on the part of the Russian Federation aimed at violent change or overthrow of the constitutional order and territorial integrity and inviolability of Ukraine."
The follow-up to that story is the news on April 9th, which was reported in the courageous independent Kiev newspaper,Vesti, that"SBU has blocked more than 10,000 websites."It says that, "Law enforcers seized the servers," and that one SBU official told the newspaper, "'We have made the decision of the court and confiscated equipment.' He promised to return the servers in two months."Another news report on April 9th in Vesti tells of seizures of that day's edition of newspapers by far-right toughs at news stands throughout the city, and the story even shows a video of Right Sector toughs raiding and emptying a Vesti delivery van headed out for distribution. The report also said:
"On Thursday, April 9, machines [coin-operated distribution boxes] that were transporting part of the circulation of the Kiev edition of the newspaper 'Vesti' were attacked. The attacks occurred around the metro stations 'Heroes of Dnepr' and 'Vasylkivska.' In both cases, the scenario was the same: the circulation machine was blocked by two cars that emerged containing unidentified men wearing symbols of the 'Right Sector' who illegally seized the circulation. In the case near the metro station 'Vasylkivska,' a driver was beaten, and the attackers threatened to burn his car."
Back on 5 July 2014, Vesti had headlined, "Masked men smashed and fired into 'Vesti': broke windows, spread tear gas." A video accompanied that news report, too. The video showed a man outside the newspaper's office, opening the door, being suddenly attacked by approximately a hundred men who rushed at him from hiding and beat him.The accompanying news report from a witness said:
"I first heard several shots. Then stones and Molotov cocktails were hurled at windows on the first and second floors. After that, the room filled with tear gas, which quickly spread throughout the office, and it's still very hard to breathe. One of the guards who tried to stop the thugs was beaten."
The video shows all of this from the outside of the building.There are accompanying photos of the ransacked office.
That news report, in turn, linked to an earlier one, on 27 June 2014. That report had said: "Suddenly, four dozen masked strangers came, headed by the controversial deputy of Kyiv City Council, Igor Lutsenko." These men "began to shout anti-Putin slogans, and then climbed onto the improvised stage" where there was to be presentation of a Constitution Day award. "Finally, radicals tried to throw bricks at our editors, but Maidan volunteers blocked that."
The head of the Security Bureau of Ukraine, Valentyn Nalyvaychenko, the man who closed 10,000 online sites on April 7th, was reported, a week earlier, on April 1st, (translation here) saying:
"SBU does not need to invent anything new. It is necessary only to build on the traditions and approaches that were set forth by the Security Service of the OUN-UPA in the 1930-1950 years. They battled against the aggressor [Russia] during the temporary occupation of the territory [Ukraine, which 'temporary' period was already 350 years], had a patriotic education, military counterintelligence, and relied on the peaceful Ukrainian population, using its unprecedented support."
This videorecounts and shows the history of "OUN-UPA in the 1930-1950 years" and documents that it carried out most of Adolf Hitler's extermination program in Ukraine during World War II '-- including 80% of the Babi Yar massacre of Jews, which the Russian poetYevtushenkomemorialized. To the people that the Obama Administration hasplaced in power in Ukraine, it was a heroic achievement. And yet, far-right Jews are part of it '-- ideological brothers-under-the-skin, and it also has the support of98%+ of the U.S. Congress.The head of the Security Bureau of Ukraine lied about the 'temporary' inclusion of Ukraine as part of Russia, and also about how 'peaceful' was the reign of Ukraine's and Germany's nazis over Ukraine during 1940-1944. But at least he was honest that he is returning to those "traditions and approaches."
Barack Obamareigned over the entire process andinstalled these peopleinto power over Ukraine. He has almost 100% congressional support for that within both the Republican and Democratic Parties, even though over two-thirds of Americans who have an opinion on the matter are opposed to his policy. America's Establishment wants him to pursue this policy more aggressively. And the West's newsmedia blame Russia's Vladimir Putin.
Here is a video of Ukraine's troops shelling the Donbass village of Slavyansk and joking that they'll turn it into a "crematorium."
As I reported earlier, the founder of Right Sector, Dmitriy Yarosh, was the leader of the thugs who perpetrated the May 2nd massacre, and who also carried out the February 2014 coup that brought these people to power in Ukraine. Starting on April 20th (Hitler's birthday), his men will be receiving military training and weapons from U.S. troops, whom Obama is sending in to help them and other executioners with their program of exterminating the residents in Donbass '-- the region that rejects the coup-imposed government. So, Yarosh helps Obama not only by terrorizing the few remaining independent news media in Ukraine, but also by installing Obama's regime there, and now, increasingly, by fighting his war there. Yarosh is already the most powerful person in Ukraine, and yet his power is still increasing there. He's a man to watch. He wants Putin dead, so Putin is probably watching him carefully. Obama meanwhile, is watching Putin's 'aggression.'
Investigative historian Eric Zuesse is the author, most recently, of They're Not Even Close: The Democratic vs. Republican Economic Records, 1910-2010, and of CHRIST'S VENTRILOQUISTS: The Event that Created Christianity, and of Feudalism, Fascism, Libertarianism and Economics.
The Kremlin Declares War on Memes · Global Voices
Sun, 12 Apr 2015 13:46
A declaration of war on Internet memes. Edited by Kevin Rothrock.
Russian censors have determined that one of the most popular forms of Internet meme is illegal. According to Roskomnadzor, the Kremlin's media watchdog, it's now against the law to use celebrities' photographs in a meme, ''when the image has nothing to do with the celebrity's personality.''
The new policy comes on the heels of a court decision in Moscow, where a judge ruled that a particular photo meme violates the privacy of Russian singer Valeri Syutkin. The court's decision targets an article on Lurkmore, a popular Wikipedia-style Russian website that focuses on Internet subcultures and memes.
An illegal memeThe meme in question is an image macro built on a lyric from an obscene Russian song from 2005. The phrase, ''Bei Babu po Ebalu'' (usually shortened to ''BBPE''), translates roughly to ''Smack the Bitch in the Face.'' The song belongs to an obscure musician named Nambavan (''Number One''), and appeared on an album titled ''Sex, Drugs, and Russian Girls.''
According to Lurkmore, the meme based on Nambavan's offensive lyrics first emerged in 2008 on the Russian imageboard 2ch.ru, where users posted links to the music video, as a way of insulting each other. 2ch users then toyed with different image macros, overlaying the ''BBPE'' phrase on photos of pop star Philipp Kirkorov and actor Aleksey Panin, but singer Valeri Syutkin eventually became the face of the meme.
''Bei Babu po Ebalu,'' featuring Valeri Syutkin.
The meme seems to work best with Syutkin because of the singer's reputation for saccharine, romantic music that is especially popular among women. In other words, the joke is that he is perhaps the last person anyone would expect to attack a woman.
So long, image macros?An image macro is ''an image superimposed with text for humorous effect.'' Even if you've never seen this term before, chances are you've already encountered more than a few image macros.
One of the most common ways to get laughs with this type of meme is juxtaposition. The obscene sexist lyrics of Nambavan's song are basically the opposite of what you'll find in a song by Valeri Syutkin.
In this sense, it would be fair to compare the ''BBPE'' meme to something like ''Advice Dog,'' where Internet users start with a photograph of an adorable puppy and attach advice that is often unethical or deplorable.
''Advice dog.''
Roskomnadzor's vague new policy threatens to do more than crack down on potentially defamatory juxtaposition, however. By saying it is illegal to add celebrities' images to memes that ''have nothing to do with the celebrity's personality,'' the Kremlin could be opening the door to banning a whole genre of absurdist online humor.
Jeff Goldblum is, well, you know the rest.
Consider some other popular image macros, like ''Jeff Goldblum Is Watching You Poop'' (a bathroom joke based on a screencap from the 1986 horror remake The Fly) or Eduard Khil's ''Trololo'' (another music-based meme), which use celebrities to make jokes that are so senseless or obscure that it would be easy to conclude such memes ''have nothing to do with the celebrity's personality.'' If Roskomnadzor wants, it could use this new policy to ban a wide variety of Internet memes.
Three lousy optionsRuNet Echo spoke to Lurkmore's founder and chief administrator, Dmitry (David) Homak, who said one of the problems with challenging the court decision against the article about ''BBPE'' and Valeri Syutkin is that he's received no official documents from the Russian government:
They evade the defendant [Lurkmore] by any means necessary. 'You can't challenge it,' they tell you. 'We don't know if you're the guys who own the site, and we don't want to hear from you.'''
Homak says he now has to choose between three unappealing alternatives: (1) he can try to find a way to establish standing and challenge the ruling in court, (2) he can block the article for Internet users based in Russia, or (3) ''there's always the option of telling them to fuck off, which would get us blocked in Russia, but that's probably not the smartest move.''
If history is any indication, Lurkmore will probably opt to block the ''BBPE'' page for Russian users, which is the strategy it's taken several times already, when Roskomnadzor has blacklisted or threatened to blacklist the website for content about suicide and illegal drugs. Homak has until early May to decide what to do.
What's the point of banning this stuff?Besides musicians with hurt feelings, it's not unthinkable that Roskomnadzor might one day apply its new policy on memes to other kinds of public figures, like politicians. If this ever happens, it could theoretically become illegal to photoshop a shirtless Vladimir Putin onto a bird, or a bear, or any of the other dozens of animals you can find the Russian President riding in a cursory search on Google Images.
Vladimir Putin, as the Internet knows him.
Banning all shirtless Putin memes, let alone trying to close down the ''BBPE'' photo of Syutkin, is an impossible task, of course. Roskomnadzor's pressure on Lurkmore, like much of its policing of the RuNet, is meant instead to scare other websites into censoring their own content.
As for Syutkin, he says his mother is the one who convinced him to take Lurkmore to court over the meme. ''I know I'm not alone here,'' he told the newspaper Izvestia. ''I want to help instill some order on the RuNet, so personal data is used with respect.''
Given that the ''BBPE'' meme is more than six years old, however, many RuNet users'--including most people in the Lurkmore community'--suspect that Syutkin's concerns have less to do with Russia's Internet culture than with promoting his name to rescue sales of his latest album, which debuted last month.
Russia just made a ton of Internet memes illegal - The Washington Post
Sun, 12 Apr 2015 13:43
(Imgflp.com)
In post-Soviet Russia, you don't make memes. Memes make (or unmake?) you.
That is, at least, the only conclusion we can draw from an announcement made this week by Russia's three-year-old media agency/Internet censor Roskomnadzor, which made it illegal to publish any Internet meme that depicts a public figure in a way that has nothing to do with his ''personality.''
Sad Keanu? Nope.
Sad Putin? Absolutely not.
''These ways of using [celebrities' images] violate the laws governing personal data and harm the honor, dignity and business of public figures,'' reads the policy announcement from Roskomnadzor.
To be clear, this isn't a new law passed by parliament or anything '-- it's just a (pretty startling) clarification of existing policy, published to the popular social network Vkontakte. According to Russian media, the announcement came in light of a lawsuit filed by the Russian singer Valeri Syutkin, who sued an irreverent Wikipedia-style culture site over an image macro that paired his picture with some less-than-tasteful lyrics from another artist's song. On Tuesday, a Moscow judge ruled for Syutkin, prompting the Roskomnadzor to publish an update to its ''personal data laws.''
The meme in question. That test translates to ''smack the b'--- in the face.'' (Via Global Voices)
Those laws now ban, per Roskomnadzor's announcement, memes that picture public figures in a way that ''has no relation to [their] personality,'' parody accounts and parody Web sites. If a public figure believes such a site or meme has been made about him, the announcement continues, he can report them to the Roskomnadzor, which '-- in addition to overseeing Russia's Internet censorship program '-- can file claims in court. Web sites are essentially given the choice of blocking the offending content in Russia, or seeing their whole sites get blocked across the country.
If that sounds crazy to U.S. readers, it probably should: U.S. law gives a very, very wide berth to Internet speech, even when it depicts private people or children '-- and especially when it depicts public figures.
(Imgflip.com)
Russia, on the other hand, has taken a series of steps to increase government control of the Internet in recent months. Just last August, Russia enacted a law that forced all bloggers with more than 3,000 daily readers to register with the Roskomnadzor, basically outlawing anonymous blogs. Earlier in the year, Russia approved a law that lets Roskomnadzor unilaterally block Web sites without explanation; the sites of prominent Putin critics were among the first to go dark.
It is impossible to know, of course, exactly how much of the Russian Internet will be affected by the change and to what degree this new policy will be pursued or enforced. (It is worth noting that public figures have to take their complaints to the Roskomnadzor, which many presumably will not do.)
Still, if the policy is enforced, the implications for the Russian memeosphere could be huge: According to a recent academic census of English-speaking memes, nearly a third of the Internet's most popular memes depict a specific person. Just think of how many excellent memes depict Vladimir Putin!
(Imgflp.com)
(Zofia Smardz kindly translated all the Russian referenced in this post.)
Liked that? Try these:
Caitlin Dewey runs The Intersect blog, writing about digital and Internet culture. Before joining the Post, she was an associate online editor at Kiplinger's Personal Finance.
Continue reading
Yemen
Dead or alive: Al-Qaeda in Yemen offers 20kg gold for Houthi leader, ex-president
Fri, 10 Apr 2015 15:59
(C) Reuters / Mohamed al-SayaghiLeader of the Houthi group Abdel-Malek al-Houthi.
A bounty of 20 kilograms of gold has been promised by Al-Qaeda for the capture or killing of the leader of Yemen's Houthi rebels and his closest ally, ex-president Ali Abdullah Saleh, SITE monitoring group said.Al-Qaeda in the Arabian Peninsula (AQAP) announced the bounty in a video released through its media arm on Wednesday.The Shiite Muslim Houthi rebels, who took control of Yemen's capital, Sanaa, in 2014 and are now on the offensive in the southern part of the country, are led by Abdel-Malek al-Houthi.
Al-Houthi, known to be an efficient battlefield commander, established himself as a revolutionary leader, following mass protests in Yemen 2011.
There's little information about the rebel strong man, reportedly in his early 30s, as he tries to keep a low profile, rarely appearing in public or talking to the press.
The Houthi offensive is supported by soldiers loyal to former President Saleh, who was forced to give up power in Yemen after a 33-year rule in 2012.
Being a radical Sunni Islamist movement, Al-Qaeda views the Houthis and Saleh, representing the Shiite Zaydi minority in Yemen, as heretics.
Al-Qaeda's Yemeni wing has bolstered its activities in the country in recent weeks as the group assaulted the town of Mukalla in early April and freed prominent local terrorist leader, Khaled Batarfi.
On Tuesday, the jihadists reportedly assaulted a remote Yemeni military post near the border with Saudi Arabia, killing several officers.
The attacks came amid Saudi-led coalition's airstrikes on Yemen, which were launched two weeks ago with an aim of surprising the Iran-liked Houthis and reinstating deposed president Abd-Rabbu Mansour Hadi to power.
Caliphate!
'Cyber Caliphate' overtake French TV station
Fri, 10 Apr 2015 16:09
(C) Reuters / Thaier Al-Sudani
Pro-Islamic State (IS, previously ISIS/ISIL) hackers attacked French television network TV5Monde on Wednesday evening, taking hostage the broadcast of its TV channels, websites and Facebook page, according to the network."We are no longer able to broadcast any of our channels. Our websites and social media sites are no longer under our control and are all displaying claims of responsibility by the Islamic State," the broadcaster's director general Yves Bigot told AFP.
The hackers reportedly uploaded various photos to TV5Monde's Facebook page, claiming to be personal IDs and resumes of relatives of French soldiers who fought in anti-IS operations. Threats were issued towards them. The pictures were allegedly visible for a short time and then disappeared.Director of TV5Monde, H(C)l¨ne Zemmour, said this was the biggest cyber-attack the network has seen in the past 30 years, FranceTVInfo reported. Zemmour said that right after the attack, the channel's social network and website displayed threats in French, Arabic and English.TV5Monde's Facebook page briefly showed the logo of 'Cyber Caliphate' in the profile picture slot.
Loyalists of the IS have become more and more active online under that name.
Back in January the Cyber Caliphate group even hacked into the official Twitter account of the United States Central Command - CENTCOM. The hackers sent out a series of tweets from the @CENTCOM account warning "AMERICAN SOLDIERS, WE ARE COMING, WATCH YOUR BACK. ISIS."
Similar cyber-attacks were reported at local Maryland television station and a New Mexico newspaper in the US. The incidents even prompted an FBI investigation into the Cyber Caliphate group.
Newsweek's Twitter feed was also taken over by hackers, claiming to be part of the Cyber Caliphate.
Other incidents claimed by the group included gaining access to Twitter feed of military spouses, including the account of support group called Military Spouses of Strength.
The pro-IS hacking group also attacked the website of the troubled Malaysia Airlines, with the message "Hacked by Cyber Caliphate" appearing on the homepage underneath a picture of a well-dressed lizard in a top hat.
Southern Poverty Law Center: The Age of the Wolf. [This thing is hilarious. So many memes. So little time.]
Wed, 08 Apr 2015 22:06
Pondering the case later, Louis Beam, a violent Klansman and movement theoretician, republished an influential essay on ''leaderless resistance'' he'd written in 1983. In it, he advocated the end of large groups with a pyramid leadership structure, arguing that such organizations were too easy to infiltrate and destroy. In their place, he called for lone wolf action or leaderless resistance, by which he meant cells of no more than six men. The idea was these cells and individuals would act on their own, with no direction or contact with other radicals. In that way, he reasoned, even the destruction of a single cell would have little effect on the larger movement.
''As honest men who have banded together into groups or associations of a political or religious nature are falsely labeled 'domestic terrorists' or 'cultists' and suppressed,'' he wrote, ''it will become necessary to consider other methods of organization '-- or as the case may very call for: non-organization.''
Tom Metzger, a prominent neo-Nazi who long operated from California but now lives in Indiana, took up the leaderless banner after Beam, tirelessly promoting his ideas with such publications as his ''Laws for the Lone Wolf,'' carried on his Resist.com website. Metzger advised fellow racists to avoid membership in groups, keep cash on hand for emergencies, and ''never truly admit to anything.''
''Never keep any records of your activities that can connect you to the activity,'' he wrote as part of a raft of suggestions. ''Keep in mind that repeated activity in one area will lead to increased attention to the area and possibly to you. The more you change your tactics, the more effective you will become.''
Whether because of the admonitions of Beam, Metzger and others, or simply because the tactic makes obvious operational sense, there is little question that the vast majority of recent terror attacks in the United States have been by lone wolves or very small leaderless cells. There's also little question that the political violence is continuing apace and that little seems to have been effective in stopping it. It may not have had to be this bad.
DHS Weighs In, Then Out
On April 7, 2009, the team of Department of Homeland Security analysts who study non-Islamic domestic terrorism issued a confidential report to law enforcement agencies entitled ''Right-wing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment.'' The report, which noted the effect the economy and the election of the nation's first black president was having on the radical right, was almost immediately leaked to the right-wing media.
There, it was pilloried, with right-wing pundits and groups like the American Legion falsely claiming that it attacked military veterans, conservatives and others on the political right. That was clearly not true '-- in fact, the report was remarkably accurate in its analysis and warnings (which included the assertion that the threat of lone wolves and small cells was growing) '-- but enough of a political firestorm was created that then-DHS Secretary Janet Napolitano renounced its findings. The team that wrote it and lead analyst Daryl Johnson were falsely accused of failing to follow DHS' procedures and were criticized by Napolitano and others in public.
But then undeniable reality began to kick in.
Even before the DHS report's publication '-- three days earlier, to be exact '-- the evidence was mounting. On April 4, 2009, Richard Poplowski, an extremist who believed the government was about to unleash troops against American citizens, ambushed and killed three Pittsburgh police officers responding to Poplowski's mother's call reporting a domestic disturbance at her home. Poplowski, who also had racist and anti-Semitic views, was eventually sentenced to death in the killings.
Three weeks later, a Florida National Guardsman named Joshua Cartwright, who had earlier expressed interest in joining a militia group and also was ''severely disturbed'' about Obama's election, shot two Okaloosa County sheriff's deputies to death as they attempted to arrest Cartwright on domestic violence charges.
About a month after that, on May 31 '-- after Napolitano had withdrawn the April DHS report and apologized for its contents '-- an anti-abortion activist who had also been involved in the antigovernment ''freemen'' movement of the 1990s shot and killed Kansas abortion provider Dr. George Tiller in Tiller's church. A few days later, on June 10, an elderly neo-Nazi named James von Brunn opened fire at the U.S. Holocaust Memorial Museum and killed a guard. He clearly intended to get into the museum and kill many more, but was himself shot and later died.
From there, the roster of human carnage continued without pause. A nativist extremist murdered a Latino man and his 9-year-old daughter; a long-time white supremacist was indicted and later convicted of sending a mail bomb that injured a diversity officer in Arizona; an angry tax protester flew an airplane into an Austin IRS building, killing himself and an IRS manager and injuring 13 others.
The Federal Response
But by then, almost the entire DHS team led by Daryl Johnson had left, discouraged by their treatment and DHS' new reluctance to issue any reports because of the fear that they might become controversial. They were exhausted and perplexed by the criticisms of Napolitano, who accused them of violating vetting procedures. And Napolitano was not the only political figure that criticized Johnson and his colleagues. Then-House Minority Leader John Boehner (R-Ohio), for instance, described the DHS report as ''offensive and unacceptable'' and charged, without any basis, that DHS had abandoned the word ''terrorist'' to describe Al Qaeda and instead was using ''the same term to describe American citizens who disagree with the direction Washington Democrats are taking our nation.''
In the years since then, the DHS has held up or canceled a number of planned reports on domestic terrorism of various types. Even some law enforcement briefings were cancelled. At the same time, in the aftermath of the Sept. 11, 2001, Al Qaeda attacks, the Justice Department's Domestic Terrorism Executive Committee was allowed to go fallow for more than a decade. But in the aftermath of the April 2014 murder of three people at two Kansas Jewish institutions, allegedly by a well-known neo-Nazi, Attorney General Eric Holder announced that he was bringing the committee back to life. It had held no meetings, however, as of press time.
Johnson's DHS unit was not a law enforcement agency, but it did play a key role in providing law enforcement with intelligence assessments. While it certainly could not prevent most terrorist attacks, the information it once produced was of high interest and importance to many police agencies. Former West Memphis, Ark., Police Chief Bob Paudert, whose police officer son was murdered by a father-and-son team of antigovernment extremists in 2010, has denounced the government for failing to brief police on such things as the ''sovereign citizens'' movement. His son's killers were sovereigns, who reject the laws of the federal government, and Paudert believes that if his son had been briefed on them he might have lived.
The FBI has taken up some of the slack left by DHS with occasional reports on extremism. And more than 70 fusion centers '-- regional centers where federal, state and local law enforcement agencies share information about threats '-- put out occasional papers and warnings to possible targets. But those who study terrorism are still deeply worried by the virtual dissolution of the DHS team. ''It was a big mistake to take those people off the radar,'' said Mark Hamm, a criminologist at Indiana State University. ''As soon as Barack Obama was elected, we could almost see it in the wind that there was going to be a revival of the radical right.''
Still, there does seem to be some new activity on the part of the federal government, including the planned reactivation of the Domestic Terrrorism Executive Committee. The government is funding a number of studies on radicalization and other matters related to domestic terrorism. But it still remains to be seen if these initiatives and others really deal effectively with the threat.
For his part, Daryl Johnson, who warned in 2009 of the increasing move toward lone wolf and leaderless terrorism '-- criminal acts that are almost impossible to stop in advance because so few people are involved in their planning '-- worries that the government still concentrates too much on foreign Muslim extremists, and that the recent Charlie Hebdo attack in Paris could add to that bias. He says that another extreme-right attack on the order of Oklahoma City, which was facilitated by the fact that only four people knew of the plot in advance, is entirely likely.
''We're long overdue for a much greater attack from the far right,'' Johnson said as he weighed the prospects for violence by terrorists like Larry McQuilliams, who clearly intended to kill as many people as possible. ''We are long overdue.''
Back to the top of the page
SPLC: Timeline of Terror!!!! [PDF]
Wed, 08 Apr 2015 22:07
16 southern poverty law centerTHE PLOTS A TIMELINE OF TERRORIn the last six years, incidents of domestic terrorism in the United States have been overwhelmingly car-ried out by solitary ''lone wolves'' or leaderless groups of just two people. The Southern Poverty Law Center's study of the nature of these attacks is based on the following 63 incidents, which occurred between April 1, 2009, and Feb. 1, 2015. The list includes both terrorist attacks and foiled terrorist plots, as well as unplanned situations, such as traf¬c stops, where extremists were confronted by law enforce-ment of¬cials and reacted with major violence. The ideologies driving the homegrown extremists in each incident are divided into two broad categories: ''antigovernment,'' meaning the perpetrators see the federal government as their chief enemy and generally subscribe to the tenets of the so-called ''Patriot'' movement; and ''hate,'' which encompasses hatred based on race, religion, gender, and sexual orientation, among others ( jihadist attacks and anti-abortion violence are included in this category). An asterisk in the ''outcome'' ¬eld, which lists the number of people killed, indicates that one or more assailants died during the terrorist incident. If the incident is listed as a ''group'' attack, there were at least two assail-ants involved. The ''perpetrator'' ¬eld includes a few cases where the defendant has been accused, but not convicted, of a crime. The cases that mention ''sovereign citizens'' refer to people with radical anti-government views who believe most laws don't apply to them.
special report | the rise of lone wolf and leaderless resistance terrorism 17APRIL 4, 2009 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARMS | OUTCOME 3 KILLED PERPETRATOR | MALE, 22 | PITTSBURGH, PENNSYLVANIARICHARD ANDREW POPLAWSKI shoots and kills three Pittsburgh police of¬cers responding to a call about a domestic dispute with his mother, who wanted t o k i c k h i m o u t o f h e r h o u s e . Poplawski believed that an attack on gun rights was imminent and that U.S. troops would be used against U.S. citizens; he also thought a secret cabal of Jews ran the United States. Poplawski was heav-ily in¬‚uenced by radio radical Alex Jones, many of whose conspiracy theories he believed.APRIL 25, 2009 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME 3 KILLED (INCLUDING ASSAILANT)PERPETRATOR MALE, 28 | CRESTVIEW, FLA. Florida National Guardsman JOSHUA CARTWRIGHT s h o o t s t o d e a t h t wo Okaloosa County, Fla., sheriff 's dep-u t i e s '-- Bu r t L o p e z a n d Wa r re n ''S k i p '' Yo r k , b o t h 4 5 '-- a s t h e y attempt to arrest him on domestic violence charges at a shooting range in Crestview. After ¬‚eeing the scene, Cartwright is fatally shot during a gun bat-tle with pursuing of¬cers. Cartwright's wife later tells investigators that her husband was ''severely disturbed'' that Barack Obama was elected presi-d e n t . He a l s o r e p o r t e d l y b e l i e v e d t h e U. S. g o v e r n m e n t w a s conspiring against h i m . T h e c o u n t y sheriff tells reporters that Cartwright had been interested in joining a mili-tia group.MAY 30, 2009 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME 2 KILLEDPERPETRATORS FEMALE, 41; MALES, 34 AND 42 | ARIVACA, ARIZ. SHAWNA FORDE '-- the executive direc-tor of Minutemen American Defense (MAD), an anti-immigrant vigilante group that conducts armed ''citizen patrols'' on Arizona's border with Mexico '-- leads a trio that invades the home of a Latino family, shooting to death a man and his 9-year-old daughter and wounding his wife. Forde believed the man was a narcotics trafficker and wanted to steal drugs and cash to fund her group's activities. Forde is eventually convicted and sen-tenced to death. The triggerman, MAD Operations Director JASON EUGENE ''GUNNY'' BUSH, 34, also is sen-tenced to death, while ALBERT ROBERT GAXIOLA, 42, a local member of MAD, gets life in prison. Authorities say that Bush had ties to the neo-Nazi Aryan Nations in Idaho and that Forde has spoken of recruiting its members. MAY 31, 2009 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 1 KILLED PERPETRATOR MALE, 51 | WICHITA, KAN.SCOTT ROEDER, a n a n t i - a b o r t i o n ex t re m-i s t w h o w a s i n v o l v e d w i t h t h e antigovernment ''freemen'' move-ment in the 1990s, shoots to death Kansas abortion provider George Tiller as the doctor is serving as an usher in his Wichita church. Adherents of the freemen move-ment describe themselves as sovereign citizens not subject to federal and other laws, and often issue their own vehicle license plates. It was one of those unauthorized homemade plates that led Topeka police to stop Roeder in 1996, when a search of his trunk revealed a pound of gunpowder, a 9-volt bat-
18 southern poverty law centertery wired to a switch, blasting caps and ammunition. A prosecutor in that case called Roeder a ''substan-tial threat to public safety,'' but his conviction in that case is overturned later. In 2010, Roeder is sentenced to life in prison for the Tiller murder.JUNE 10, 2009 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 1 KILLEDPERPETRATOR MALE, 88 | WASHINGTON, D.C . JAMES VON BRUNN, a longtime neo-Nazi, s h o o t s t o d e a t h s e c u r i t y g u a r d Stephen Johns at the U.S. Holocaust Memorial Museum, but is critically wounded by other of¬cers as he tries to storm into the facility. Von Brunn had a long his-tory in the white supremacist movement. In the early 1970s, he worked at the Holocaust-denying Noontide Press and in subsequent decades he came to know many of the key leaders of the radial right. In 1981, von Brunn used a sawed-off shotgun to attempt unsuccessfully to kidnap members of the Federal Reserve Board in Washington, and served six years in prison as a result. A search of Von Brunn's car after the museum attack turns up a list of apparent targets including the White House, the Capitol, the National Cathedral and The Washington Post. A note left there by von Brunn reads: ''You want my weapons; this how you'll get them '... the Holocaust is a lie '... Obama was created by Jews. Obama does what his Jew owners tell him to do. Jews captured America's money. Jews control the mass media.'' Von Brunn is charged with murder-ing Johns but dies in 2010 while awaiting trial.OCT. 28, 2009 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME 1 KILLED *PERPETRATOR MALE, 53 | DEARBORN, MICH. LUQMAN AMEEN ABDULLAH, identi¬ed by authorities as a member of a black Muslim group hoping to create an Islamic state within U.S. borders, is shot dead at a warehouse after he ¬res at FBI agents trying to arrest him on conspir-acy and weapons charges. The FBI says Abdulla encouraged violence against the United States. Several other members of his Sunni Muslim group also are arrested.NOV. 5, 2009 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 13 KILLEDPERPETRATOR MALE, 39 | FORT HOOD, TEXAS MAJOR NIDAL MALIK HASAN, a U.S. Army psychiatrist, fatally shoots 13 people and injures more than 30 others at Fo r t H o o d . A l t h o u g h t h e U. S . Department of Defense and federal law enforcement agencies later classify the mass murder as an act of workplace violence and not ter-rorism, a series of E-mails between Hasan and Yemen-based imam Anwar al-Awlaki, who had been monitored by U.S. intelligence as a security threat, are found and military colleagues report that they were aware of his growing radicalization. Hassan is eventually convicted of 13 counts of pre-meditated murder and 32 counts of attempted murder and sentenced to death.
special report | the rise of lone wolf and leaderless resistance terrorism 19FEB. 18, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON AIRPLANE | OUTCOME 2 KILLED *PERPETRATOR MALE, 53 | AUSTIN, TEXASANDREW JOSEPH STACK, ye a r s a f t e r attending a series of meetings of rad-ical anti-tax groups in California, sets ¬re to his own house and then ¬‚ies his single-engine private plane into a building housing Internal Revenue Service (IRS) of¬ces. Stack and an IRS manager are killed and 13 others are injured. Stack leaves behind a long online rant about the IRS and the tax code, politicians and corporations.MARCH 25, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME NO FATALITIESPERPETRATOR MALE, 37 | SUMTER COUNTY, FLA. A man later identi¬ed as BRODY JAMES WHITAKER opens ¬re on two Florida state troopers during a routine traf¬c stop on I-75 in Sumter County. Whitaker ¬‚ees, crashing his vehicle and continuing on foot. He is arrested two weeks later in Connecticut, where he challenges the authority of a judge and declares himself a ''sover-eign citizen'' immune to the laws of the land. Whitaker is later extradited to Florida to face charges of assaulting and ¬‚eeing from a police of¬-cer. In 2012, he is sentenced to life in prison.MARCH 28, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE UNKNOWN | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR UNKNOWN | SPOKANE, WASH. Federal authorities discover a pipe bomb along the perimeter of the federal courthouse in Spokane, Wa s h . , b u t f a i l t o i d e n t i f y o r a r r e s t a p e r p e t r a t o r. T h e bomb was planted during a wave of threats against politicians and other government officials that was triggered by anger over the passage President Obama's health care reforms just ¬ve days earlier.APRIL 15, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 30 | CLEVELAND, OHIOMATTHEW FAIRFIELD '-- president of a local chapter of the Oath Keepers, a radical antigovernment organization given to baseless conspiracy theories and largely composed of police and military of¬cers and veterans '-- is indicted on 28 explosives charges, 25 counts of receiving stolen property and one count of possessing criminal tools. Authorities searching Fair¬eld's home also discover a napalm bomb he built and a computer containing child pornography. Fairfield pleads guilty to explosives charges and is sentenced in 2011 to 16 years in prison. That September, prose-cutors drop child porn charges in exchange for Fair¬eld's guilty plea to obstruction of justice. He is sentenced to four additional years in prison, to be served concurrently with his initial sentence.APRIL 30, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON UNKNOWN | OUTCOME NO FATALITIESPERPETRATOR MALE, 41 | MADISONVILLE, TENN. DARREN HUFF, an Oath Keeper from Georgia, is arrested and charged with planning the armed takeover of a Madisonville, Tenn., courthouse and ''arrest'' of 24 local, state and federal of¬cials. Huff was angry about the arrest the same month of Walter Francis Fitzpatrick III, a leader of the far-right American Grand Jury movement that sought to have grand juries indict President Obama for treason. At the time, several others in the antigovernment movement accuse Huff of white supremacist and anti-Semitic attitudes in
20 southern poverty law centerInternet postings. He is sentenced to four years in federal prison.MAY 10, 2010 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME 1 KILLED *PERPETRATOR MALE, 46 | JACKSONVILLE, FLA.SANDLIN MATTHEW SMITH sets off a pipe bomb at the rear entrance of the Islamic Center of Northeast Florida. No o n e i s i n j u re d i n t h e a t t a c k . Surveillance videotape from the mosque shows a white man setting the bomb, and law enforcement interest quickly turns to Smith. FBI agents are later tipped off to the man's location in a tent at Glass Mountain State Park in northwest Oklahoma. When police approach Smith, he draws a weapon and is shot and killed by of¬cers. The FBI later reports that Smith's marriage was falling apart and that he was increasingly angry that American soldiers were dying in Iraq and Afghanistan. MAY 20, 2010 | IDEOLOGY ANTIGOVERNMENT INCIDENT TYPE GROUP | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME 4 KILLED *PERPETRATORS MALES, 16 AND 45 | WEST MEMPHIS, ARK. A father-and-son team of sovereign citizens, who believe police have no right to regulate road t r av e l , m u r d e r We s t Memphis, Ark., police officers Robert Brandon Paudert, 39, and Thomas William ''Bill'' Evans, 38, during a routine traffic stop on an I - 4 0 ex i t r a m p. T h e v i o l e n c e begins to unfold when JERRY KANE, 45, starts to argue with the officers o v e r h i s b o g u s vehicle registration paperwork and then pushes Evans into a roadside ditch. At that point, Kane's 16-year-old son, JOSEPH KANE, kills both of¬cers with an AK-47 before the pair ¬‚ees. Authorities catch up with them about 45 minutes later. In the ensu-ing shootout, two more of¬cers are badly wounded and both Kanes are killed. The pair had been trav-eling the country offering seminars in bogus sovereign techniques for avoiding foreclosure and related matters.MAY 20, 2010 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON ARSON | OUTCOME NO FATALITIESPERPETRATOR MALE, 23 | CONNEAUT, OHIORONALD J. PUDDER sets ¬re to the front entrance of the First Azusa Apostolic Faith Church of Go d, a pred omi-nantly African-American church in northeast Ohio. The church is only lightly damaged. Pudder later pleads guilty to intentionally destroying religious property for rea-sons of race. He is sentenced to 51 months in prison. JULY 18, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME NO FATALITIESPERPETRATOR MALE, 45 | OAKLAND, CALIF. BYRON WILLIAMS, a n u n e m p l o y e d parolee with two bank robbery convic-tions who is apparently enraged at liberals and what he sees as the ''left-wing agenda'' of Congress, opens ¬re on California Highway Patrol troopers after they pull him over. No one is killed, but two troopers are slightly injured. Williams, who is shot in the arms and legs, later tells authorities that he was on his way to carry out an attack of¬ces of the American Civil Liberties Union and the Tides Foundation, a liberal organiza-tion that, although little known to most Americans, had been repeatedly pilloried by then-Fox News host Glenn Beck. In 2014, a jury convicts Williams of four
special report | the rise of lone wolf and leaderless resistance terrorism 21counts of premeditated attempted murder of a peace of¬cer and three counts of being a felon in possession of a ¬rearm. He is sentenced to 401 years in prison.JULY 21, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 1 KILLEDPERPETRATOR MALE, 64 | CUMBERLAND COUNTY, PENN. Attorney Todd Getgen is shot to death at a gun range in Cumberland County, Penn., and his weapon, a silenced AR-15 ri¬‚e, is stolen. Nine days later, a u t h o r i t i e s a r r e s t p r i s o n g u a r d RAYMOND PEAKE, saying Peake was trying to accumu-late weapons for an unnamed organization that intended to overthrow the government. Fellow prison guard Thomas Tuso is also arrested for help-ing Peake hide Getgen's custom-built weapon. Peake is sentenced in 2012 to life in prison. The next year, Tuso is sentenced to between 11 and 23 months in prison.AUG. 17, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 1 KILLED *PERPETRATOR MALE, 29 | MCKINNEY, TEXASPAT R I C K G R AY S H A R P sets ¬re to his truck outside the McKinney Public Safety Building and then begins ¬ring at ¬rst responders from a makeshift sniper's nest. Police estimate Sharp ¬red more than 100 rounds at the building, which houses the town's police department. McKinney of¬cers ¬re back at Sharp and, when they later close in on his position, ¬nd him dead of gunshot wounds.AUGUST 30, 2010 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME NO FATALITIESPERPETRATOR MALE, 52 | SPOKANE, WASH. White supremacist WAYDE LYNN KURT is arrested in Spokane on federal gun and forgery charges. Authorities later release audio recordings to support their allegation that he was planning a terrorist attack that he called his ''¬nal solution'' and which included assassinating President Obama. Kurt, a convicted felon who is associated with neo-Nazis and racist Odinists, is sentenced in 2012 to 13 years in prison on ¬rearms and false identi¬cation convictions after federal prosecu-tors seek and receive a ''terrorism enhancement'' to his sentence.SEPT. 2, 2010 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 37 | MADERA, CALIF. A pipe bomb is thrown through the w i n d o w o f a c l o s e d P l a n n e d Parenthood clinic along with a note that reads, ''Murder our children? We have a 'choice' too.'' The note is signed ANB, apparently short for the American Nationalist Brotherhood. Six months later, law enforcement officials arrest school bus driver DONNY EUGENE MOWER, who allegedly also threat-ened a local Islamic center and has the word ''Peckerwood,'' a white supremacist reference, tat-tooed on his chest. Mower confesses to the attack and pleads guilty to arson, damaging religious property and violating the Freedom of Access to Clinics Act. He is sentenced in 2012 to ¬ve years in prison and three years of supervised release.
22 southern poverty law centerSEPT. 7, 2010 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 26 | CONCORD, N.C. The FBI arrests 26-year-old JUSTIN CARL MOOSE, a self-described ''freedom ¬ghter'' and ''Christian counterpart to Osama bin Laden,'' for allegedly plan-ning to blow up a North Carolina abortion clinic. After earlier receiving tips that Moose was posting threats of violence against abor-tion providers and information about explosives on his Facebook page, the FBI set up a sting operation to capture him. Moose ultimately pleads guilty to distributing information on manufacturing and use of an explosive and is sentenced to 30 months in prison. He is released in 2012.SEPT. 17, 2010 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME NO FATALITIESPERPETRATOR MALE, 55 | WEST ODESSA, TEXASVICTOR DEWAYNE WHITE, a so - called sov-ereign citizen, shoots and wounds three people, including two sheriff 's deputies, before surrendering at the end of a 22-hour standoff. The inci-dent began when an oil company employee went to White's property with Ector County Sheriff 's Deputy Ricky Tijerina and Sgt. Steve McNeil to access an oil well to which the company owned rights. White '-- who had ties to the separatist Republic of Texas, which claims Texas is a sover-eign nation never legally annexed by the United States '-- eventually surrenders and is charged with three counts of attempted capital murder of a peace of¬cer, one count of attempted capital murder, and aggravated assault. He is sentenced to life in prison in 2012. NOV. 17, 2010 | IDEOLOGY ANTIGOVERNMENT INCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME 1 KILLED *PERPETRATOR MALE, 47 | RIGGINS, IDAHOCURTIS SCRIVER, a sovereign citizen facing charges of menacing with a deadly weapon, disorderly conduct and two counts of possession of a danger-ous weapons, is killed in a gun battle in Riggins, Idaho, that begins after law enforcement of¬cers try to arrest him for sending a threatening letter to the court. In the letter, Scrivner had warned that police had violated his rights ''protected by the sec-ond and fourth amendments to the Constitution,'' and added, ''I know this as I have studied law as an ex-cop. Your court and attorneys should know this, as it is your job to know.''NOV. 26, 2010 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 19 | PORTLAND, ORE.MOHAMED OSMAN MOHAMUD is arrested i n a n F B I s t i n g o p e r a t i o n a f t e r attempting to set off what he thought was a car bomb at a Christmas tree lighting. He is charged with and even-tually convicted of attempting to use a weapon of mass destruction, although his attorney claims he was entrapped. Mohamud is sentenced in 2014 to 30 years in federal prison.NOV. 28, 2010 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON ARSON | OUTCOME NO FATALITIESPERPETRATOR MALE, 24 | CORVALLIS, ORE. CODY SETH CRAWFORD allegedly fire-bombs the Salman Alfarisi Islamic Center in Corvallis just two days after a former Oregon State University stu-dent was arrested in a plot to detonate
special report | the rise of lone wolf and leaderless resistance terrorism 23a car bomb during Portland's annual Christmas tree lighting. Crawford had reportedly ranted about Muslims and describes himself as a Christian war-rior after the arson. But complex legal questions surrounding Crawford's mental health and actions of the prosecution delay the scheduling of a trial.JAN. 14, 2011 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 28 | APACHE JUNCTION, ARIZ.Federal agents arrest JEFFERY HARBIN, a member of the neo-Nazi National Socialist Movement, for building homemade grenades and pipe bombs that he intended to supply to anti-im-migrant groups patrolling the Arizona-Mexico border. A prosecutor says that Harbin constructed the devices, using model rocket engines and alumi-num powder, ''in such a way as to maximize human carnage.'' In September 2011, Harbin '-- the son of Jerry Harbin, a Phoenix-area activist with past ties to the neo-Nazi National Alliance and the racist Council of Conservative Citizens '-- pleads guilty to making and transporting bombs and is sentenced to two years in prison.JAN. 14, 2011 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREBOMB | OUTCOME NO FATALITIESPERPETRATOR MALES, 32 AND 37 | HARDY, ARK. JASON WALTER BARNWELL, 37, of Evening Shade, Ark., and GARY DON DODSON of Waldron throw a Molotov cocktail through the window of an interracial couple's home in Hardy. Barnwell, described as a leader of a ''combat division'' of a neo-Nazi skinhead gang, pleads guilty to federal civil rights and ¬rearms charges in 2011 and is sen-tenced to 20 years in prison. Dodson pleads guilty to similar charges later that year and is eventually sentenced to 15 years in prison.JAN. 17, 2011 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 36 | SPOKANE, WASH.A sophisticated improvised explosive device is discovered in a backpack p l a c e d o n t h e ro u t e o f a Ma r t i n Luther King Jr. Day parade that included some 1,500 participants. Police bomb technicians manage to defuse the device, which eventually yields forensic clues that lead of¬cials to KEVIN WILLIAM HARPHAM. Harpham is a one-time member of the neo-Nazi National Alliance and has posted more than 1,000 messages to the neo-Nazi Vanguard News Network since 2004 and contributed articles to the white suprem-acist Aryan Alternative tabloid. Harpham is accused of attempted use of a weapon of mass destruction, and in December 2011 pleads guilty to that charge and another of planting a bomb as part of a hate crime. He is sentenced to 32 years in prison.MARCH 10, 2011 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME NO FATALITIESPERPETRATORS MALES, 26, 36 AND 55; FEMALE, 64 | FA I R BA N KS , A L AS KASeveral members of the antigovernment Alaska Peacemakers Militia, including its 26-year-old leader, FRANCIS SCHAEFFER COX, are arrested and charged with plot-ting to kill or kidnap state troopers and a Fairbanks judge. The group already has a large cache of weapons, including a .50-caliber machine gun, gre-nades and a grenade launcher. Cox, who had earlier identi¬ed himself as a sovereign citizen, is convicted in 2012 of 12 counts, including conspiracy to kill a judge and law enforcement of¬cials. He is sentenced the next year to almost 26 years in federal prison. A couple, LONNIE and KAREN VERNON, plead guilty to simi-lar charges and are sentenced to almost 25 years and 12 years, respectively. Another member of the group, COLEMAN BARNEY, is found guilty of weapons charges and sentenced to ¬ve years in federal prison.
24 southern poverty law centerMAY 11, 2011 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME NO FATALITIESPERPETRATOR MALES, 20 AND 26 | NEW YORK, N.Y.AHMED FERHANI, a 2 6 - y e a r-o l d a s p i r i n g f a s h i o n model who once sold cosmetics at Saks Fifth Avenue, and taxi service dispatcher MOHAMED MAMDOUH are arrested after purchasing three semiautomatic pistols, 150 rounds of ammunition and a hand grenade from an under-cover police of¬cer. The pair, who plotted to blow up synagogues across New York City, are charged with second-degree conspiracy as a crime of terror-ism, second-degree conspiracy as a hate crime and second-degree criminal possession of a weapon as a crime of terrorism. Of¬cials say the two have no known connection to Islamic extremist groups. Both men are convicted and, in 2013, Ferhani is sentenced to 10 years in prison, while Mamdouh gets ¬ve years.MAY 14, 2011 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON ARSON | OUTCOME NO FATALITIESPERPETRATOR 3 MALES, AGES UNKNOWN | HOUSTON, TEXASThree masked men break into the Madrasah Islamiah, an Islamic center in Houston, and douse prayer rugs with gasoline in an apparent attempt to burn the center down. Images of the men are captured on sur-veillance cameras, but they are not identi¬ed. The ¬re is put out before doing major damage.MAY 25, 2011 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME NO FATALITIESPERPETRATOR MALE, 63 | MADISON, WIS. A man with a long history of menac-ing abortion clinics is arrested on weapons charges after he accidentally shoots a pistol through the door of a motel room. When confronted, RALPH LANG tells police he had planned to kill a doctor and workers at a nearby Planned Parenthood clinic. Lang is sentenced to 10 years in prison in 2013.JUNE 12, 2011 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME NO FATALITIES PERPETRATOR MALE, 50 | LOLO, MONT. Longtime militia activist DAV I D BURGERT '-- a former convicted burglar who once led a group that planned to assassinate of¬cials and later spent time in prison for being a felon in pos-session of a weapon '-- leads Missoula County sheriff 's deputies on a car chase when they come to investigate reports of his car being parked for a lengthy time at a picnic area near Lolo. After sev-eral miles, Burgert pulls over and begins ¬ring at the deputies before ¬‚eeing on foot into the woods. He escapes his pursuers and is still a fugitive as of early 2015.JULY 21, 2011 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME NO FATALITIESPERPETRATOR MALE, 48 | HURST, TEXASSelf- described ''Moorish national'' JOSEPH M. TESI o p e n s f i r e o n a Colleyville police officer who fol-lowed him to Hurst, but instead is shot himself, in the face and the foot,
special report | the rise of lone wolf and leaderless resistance terrorism 25by the officer. (Virtually all so-called Moorish nationals are black, but Tesi is white.) The of¬cer had recognized Tesi as the man who had sent a court a note threatening ''deadly force'' against of¬-cials in a long-running dispute over traf¬c tickets. In his writings, Tesi used the obscure language favored by sovereign citizens, arguing that police had no right to regulate his travel. He is found guilty of aggravated assault on a public servant in 2012 and sentenced to 35 years in state prison.OCT. 5, 2011 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME 4 KILLEDPERPETRATOR MALE, 31; FEMALE, 24EVERETT, WASH./LAFAYETTE, ORE./EUREKA, CALIF. W h i t e s u p r e m a c i s t ex-convict DAVID ''JOEY'' PEDERSEN and his girl-friend HOLLY ANN GRIGSBY a r e a r r e s t e d i n California after a murderous rampage in three states. At the time, Grigsby tells police that she and Pedersen ''were on their way to Sacramento to kill more Jews.'' The ¬rst to be killed were Pedersen's father and stepmother in Everett, followed by another man in Oregon, who was slain because the couple thought he was Jewish. An African-American man was also found shot to death in Eureka. Earlier, Pederson served time for threat-ening to kill the federal judge who handled the Ruby Ridge, Idaho, case of white supremacist Randy Weaver. Pedersen is eventually sentenced to four life terms without the possibility of parole, while Grigsby is handed a single life sentence.NOV. 1, 2011 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES, RICIN | OUTCOME NO FATALITIESPERPETRATOR MALES, 65, 67, 68 AND 73 | CLEVELAND, GA./TOCCOA, GA.Four members o f a n o r t h Georgia mili-tia are arrested i n a p l o t t o bomb federal buildings, attack Atlanta and other cities with deadly ricin, and murder law enforcement of¬cials. The men '-- FREDERICK THOMAS, 73, SAMUEL J. CRUMP, 68, DAN ROBERTS, 67, and RAY H. ADAMS, 65 '-- discussed ''taking out'' a list of of¬cials to ''make the country right again'' and scouted buildings in Atlanta to bomb. Authorities say the plot was inspired by an online novel, Absolved, written by longtime Alabama militiaman Mike Vanderboegh. Thomas, the ringleader, and Roberts plead guilty in 2012 to charges of conspiring to pos-sess explosives and ¬rearms and are each sentenced to ¬ve years in federal prison for conspiring to obtain an unregistered explosive device. Crump and Adams are convicted in January 2014 of conspiring to pro-duce a toxic agent to poison government of¬cials, and are each sentenced later in the year to 10 years in prison followed by ¬ve years of supervised release.DEC. 5, 2011 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME 2 KILLEDPERPETRATORS MALES, 19, 25, 25 AND 26 | FORT STEWART, GA. Four Army soldiers at Fort Stewart, Ga., later identi¬ed as members o f t h e t e r r o r g r o u p F o r e v e r E n d u r i n g , Always Ready (FEAR), participate in the mur-d e r o f 1 9 - y e a r - o l d f o r m e r s o l d i e r a n d FEAR member Michael Roark and his 17-year-
26 southern poverty law centerold girlfriend, Tiffany York. The four are arrested ¬ve days later, after the victims' bodies are discov-ered in a stand of dense woods. The two were killed because FEAR leader ISAAC AGUIGUI, 19, feared Roark would talk about the group's plans to take over the Army base, overthrow the government, assassinate a future president, blow up a dam and poison the apple crop in the state of Washington. Pfc. Aguigui funded the group, buying $87,000 in weapons and a large amount of drugs with a $500,000 insurance payment he received after the death of his pregnant wife. PFC. MICHAEL BURNETT pleads guilty and agrees to testify against his FEAR comrades. In April 2013, the Army charges Aguigui with killing his wife, whose death was initially ruled accidental, and their unborn child. In July 2013, Aguigui pleads guilty in the murders of York and Roark, and is sen-tenced to life in prison. He subsequently is convicted in military court of the murder of his wife and is sentenced to life in prison without the possibility of parole. Two other soldiers, PVT. CHRISTOPHER SALMON and SGT. ANTHONY PEDEN, plead guilty in 2014 and receive life sentences.DEC. 18, 2011 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME 2 KILLED *PERPETRATOR MALE, 58 | WASHINGTON, PA. Survivalist ELI FRANKLIN MYERS III shoots two Pennsylvania state troop-ers after they pull him over and cite him for expired vehicle registration a n d n o p r o o f o f i n s u r a n c e . Immediately after being cited, Myers gets out of his car and begins ¬ring at the two of¬cers. John David Dryer, a 46-year-old part-time officer, is killed in the encounter, and a second of¬cer, Robert V. Caldwell III, is badly injured. Myers, a former police of¬cer himself, is also killed in the shootout. APRIL 1, 2012 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 50 | GRAND CHUTE, WIS.Using a homemade device fashioned from a plastic bottle ¬lled with incen-diary chemicals, FRANCIS G. GRADY bombs the Grand Chute Planned Parenthood clinic. No one was injured, and Grady is arrested the next day. In early 2013, Grady is con-victed and sentenced to 11 years in prison. APRIL 6, 2012 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME 3 KILLEDPERPETRATOR MALES, 19 AND 32 | TULSA, OK. Tw o w h i t e m e n , JAKE ENGLAND, 1 9, a n d h i s friend ALVIN WATTS, drive through black neigh-borhoods in northern Tulsa randomly shooting ¬ve African Americans, three of whom die. The spree, which comes to be known as the ''Good Friday Shootings,'' coincides with the second anniversary of the death of England's father, who was killed by a black man in the same area. In 2013, both men plead guilty, avoiding the possibil-ity of the death penalty, and are each sentenced to life in prison without the possibility of parole. APRIL 17, 2012 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREBOMBS | OUTCOME NO FATALITIESPERPETRATOR MALES, 31 AND 42 | MENDOTA HEIGHTS, MINN. JOSEPH BENJAMIN THOMAS and S A M U E L J A M E S JOHNSON o f Me n d o t a Heights are indicted on federal weapons and drug charges after a probe of their alleged plans to
special report | the rise of lone wolf and leaderless resistance terrorism 27create an ''Aryan Liberation Movement'' and attack minorities, leftists and government officials. Prosecutors say Thomas, 42, also planned to attack the Mexican consulate in St. Paul with a truck loaded with ¬‚aming barrels of oil and gasoline. Johnson, a former leader of the neo-Nazi National Socialist Movement with prior convictions for armed crimes, was scouting for a training compound in Illinois or Minnesota and seeking to recruit others into his group, court papers say. In the end, Johnson pleads guilty to being a felon in possession of weapons and is sentenced to 15 years in prison. Thomas pleads to intent to distribute 50 grams of methamphetamine and, in 2013, is sentenced to 10 years in prison.JUNE 17, 2012 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 33 | PLANO, TEXAS ANSON CHI is seriously injured when he detonates a bomb in an effort to destroy an Atmos Energy natural gas pipeline in Plano. Chi is an avid tax protester who has posted numerous videos, statements and rants on the Internet about the alleged evils of the Federal Reserve, the IRS, President Obama and the federal government. He had been a fugitive since 2009, when he violated probation in California on a weapons charge. Chi pleads guilty in 2013 to possessing an unregistered explosive and malicious use of an explosive and is sentenced to 22 years in prison.AUG. 5, 2012 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 7 KILLED *PERPETRATOR MALE, 40 | OAK CREEK, WIS. Longtime neo-Nazi skinhead WADE MICHAEL PAGE opens ¬re with a 9 mm handgun inside a Sikh temple, kill-i n g s i x p e o p l e a n d c r i t i c a l l y wounding three, including a police of¬cer. Wounded by police, Page then shoots and kills himself at the scene. Page, an Army veteran who was discharged in 1998 for ''patterns of mis-conduct,'' was a ''patched'' member of the Northern Hammerskins, a division of the violent racist skin-head group Hammerskin Na t i o n . He wa s a l s o a well-known ¬xture on the white power music scene, playing in the band End Apathy and several others.AUG. 16, 2012 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE GROUP | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARMS | OUTCOME 2 KILLEDPERPETRATOR MALES, 22, 24, 28 AND 44; FEMALES, 23 AND 37 | LAPLACE, LA. Seven people, six of t h e m d e e p l y e n m e s h e d i n t h e sovereign citizens m o v e m e n t , allegedly ambush a n d m u r d e r S t . Jo h n t h e Ba p t i st Parish sheriff 's deputies Brandon Nielsen, 34, and Jeremy Triche, 27. The attack comes in a trailer park about 30 miles from New Orleans, after deputies pursue them there from a nearby oil re¬nery, where they are sus-pected of shooting another deputy who was working as an off-duty guard. Authorities arrest the group's leader, TERRY LYN SMITH, 44, Smith's wife, CHANEL SKAINS, and his sons, DERRICK SMITH and BRIAN SMITH. Others are BRITTANY KEITH, KYLE DAVID JOEKEL and TENIECHA BRIGHT, 21. Bright is released when of¬cials decide she is telling the truth about having merely hitched a ride with the Smith clan. Eventually, Skains and Keith plead guilty as accessories and agree to testify against the others. Derrick Smith pleads to the same charge, receiving a ¬ve-year sentence, and also to being a felon in possession of a weapon, getting another 12 years as a result. Brian Smith and Joekel are charged with capital murder and Terry Smith is charged with being a principal to attempted ¬rst-degree murder.
28 southern poverty law centerSEPT. 4, 2012 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME 2 KILLED *PERPETRATOR MALE, 36 | ALAMO, CALIF. CHRISTOPHER LACY shoots California H i g h w a y Pa t r o l o f f i c e r Ke n y o n Yo u n g s t r o m a t c l o s e r a n g e a f t e r t h e of¬cer stops Lacy's vehicle, which had an obstructed license plate, on I-680 near Alamo. Lacy is fatally shot by another trooper, and Youngstrom dies the next day. An investigation into Lacy's background reveals a large amount of antigovernment sovereign citizens literature on sev-eral computers at his home.DEC. 21, 2012 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARMS | OUTCOME NO FATALITIESPERPETRATOR MALE, 47 | BOWLING GREEN, OHIOFBI agents arrest RICHARD SCHMIDT, the owner of a sporting goods store in Bowling Green, for trafficking in counterfeit goods and discover a cache of 18 weapons in his home and store, including AR-15 assault ri¬‚es, 9 mm and Sig Sauer pistols and shotguns, and more than 40,000 rounds of ammunition. Schmidt is unable to own the weapons legally because he is a felon who served 13 years for murdering a Latino man and wounding two others in a 1989 traffic dispute. Of¬cials also ¬nd evidence of Schmidt's neo-Nazi views, including video and Nazi paraphernalia, and the Anti-Defamation League identi¬es him as a l o n g t i m e m e m b e r o f t h e n e o - Na z i Na t i o n a l Alliance. Authorities also discover a notebook they say Schmidt was using to track Detroit-area Jewish and African-American leaders, apparently as a pre-lude to some kind of attack. Schmidt is indicted in Toledo in January 2013 on three federal counts of possessing illegal ¬rearms, body armor and ammu-nition, and one count of traf¬cking in counterfeit goods. He pleads guilty in July of that year to vio-lating federal ¬rearms laws and is later sentenced to nearly six years in prison.APRIL 15, 2013 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME 5 KILLED *PERPETRATOR MALES, 19 AND 26 | BOSTONDZHOKHAR and TAMERLAN TSARNAEV, brothers from Chechnya, allegedly set off bombs made from pressure cookers at the ¬nish line of the Boston Marathon, killing three peo-ple and injuring more than 260 others, including more than a dozen who must have limbs amputated. Several days later, after the FBI releases pictures of the Tsarnaevs taken from surveillance video along the marathon route, the brothers allegedly ambush and kill a Massachusetts Institute of Technology police of¬cer. Tamerlan Tsarnaev is shot multiple times during that April 18 ¬re¬ght on and dies after his brother runs him over with a stolen SUV while escaping. A day later, Dzohkhar Tsarnaev is found hiding in a boat parked in the backyard of a residence in Watertown, Mass. He is charged with 30-plus counts of homegrown terrorism, including the use of a weapon of mass destruction and malicious destruction of property resulting in death. According to interrogation reports, Dzhokhar claims he and his brother were self-radicalized in their extremist Islamic beliefs and angered by the U.S.-led wars in Iraq and Afghanistan. His trial is set for early 2015.
special report | the rise of lone wolf and leaderless resistance terrorism 29MAY 3, 2013 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 24 | MONTEVIDEO, MINN. BUFORD ''BUCKY'' ROGERS of Montevideo, a self-proclaimed member of the Black Snake Militia, is arrested when agents ¬nd homemade bombs and ¬rearms at his father's home. It is at least the third time Rogers has been arrested. Profanity-laced postings on Rogers' Facebook page, beginning in June 2011, express his antigov-ernment views. ''The NOW [New World Order] has taken all your freedoms the right to bear arms freedom of speech [sic] freedom to the press,'' one of his postings says. He pleads guilty to two counts of weapons violations in early 2014 and is subse-quently sentenced to three years and four months in prison.JUNE 18, 2013 | IDEOLOGY HATEINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON RADIATION DEVICE | OUTCOME NO FATALITIESPERPETRATOR MALES, 49 AND 54 | PROVIDENCE, N.Y./STOCKPORT, N.Y. GLENDON SCOTT CRAWFORD, 49, and ERIC J. FEIGHT are arrested at their homes i n u p st a t e Ne w Yo r k after a year-long inves-tigation and charged with conspiracy to provide material support to terrorists for use of a weapon of mass destruction. Crawford is a member of the United Northern and Southern Knights of the Ku K l u x K l a n a n d a n i n d u st r i a l m e c h a n i c w i t h General Electric; Feight is an outside contractor for the company with engineering skills. Of¬cials say the two men, who call themselves ''The Guild,'' are well on the way to building a truck-borne radi-ation weapon that can be turned on remotely and that they hoped to see used in the mass murder of Muslims and others. Crawford allegedly refers to the device as ''Hiroshima on a light switch.'' The men are arrested after allegedly seeking funding for the weapon from Jewish groups and the Loyal White Knights of the Ku Klux Klan without suc-cess. In 2014, Crawford is indicted for conspiring to use a weapon of mass destruction and related charges, while his alleged accomplice is report-edly in talks about a plea agreement that would involve testifying against Crawford. AUG. 18, 2013 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON UNKNOWN | OUTCOME NO FATALITIESPERPETRATOR MALE, 42; FEMALE, 67 | LAS VEGAS DAVID ALLEN BRUTSCHE and a woman described as Brutsche's roommate, DEVON CAMPBELL NEWMAN, a r e a r r e s t e d i n L a s Vegas after a months-long investigation into an alleged plot to kidnap and execute police of¬cers. Both Brutsche, a convicted felon and registered sex offender, and Newman consider themselves sovereign citizens and have conducted recruiting seminars on sovereign ideology, officials say. Authorities say they intended to kidnap a police of¬cer at random, detain the of¬cer in a crude jail in a vacant house, ''try'' the officer in a ''com-mon-law'' court, then execute the of¬cer. The two are charged with felony conspiracy to commit murder, conspiracy to commit kidnapping and attempted kidnapping. Newman pleads guilty in December 2013 to conspiracy to commit false imprisonment, a misdemeanor, and is sentenced to a year of probation and ordered to have no con-tact with Brutsche. Brutsche, who renounces sovereign citizen ideology during court proceed-ings, pleads guilty in February 2014 to conspiracy to kidnap police of¬cers and receives ¬ve years of probation. In a separate case involving failure to register as a sex offender, he receives 188 days in jail in addition to time served.
30 southern poverty law centerNOV. 1, 2013 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 1 KILLEDPERPETRATOR MALE, 23 | LOS ANGELESPAU L A N T H O N Y C I A N C I A allegedly opens fire at Los Angeles International Airport, killing U.S. Transportation S e c u r i t y Ad m i n i s t ra t i o n o f f i c e r Gerardo Hernandez at a security checkpoint and injuring six others. Police say he was carrying a bag packed with a semiautomatic .223-cal-iber Smith & Wesson M&P-15 ri¬‚e, ¬ve 30-round magazines and hundreds of additional rounds of ammunition. When he is arrested, sources say, Ciancia is carrying a note mentioning ''¬at currency'' and the New World Order, both topics of high inter-est to the militia movement. Ciancia is charged with the murder of a federal of¬cer and committing vio-lence at an international airport, with prosecutors saying they will seek the death penalty.MARCH 27, 2014 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 38 | KATY, TEXASROBERT JAMES TALBOT JR. is arrested in Katy by FBI agents who say he was about to rob an armored car and kill its driver. The FBI opened an investi-gation into Talbot 's activities in August 2013 after learning of his desire to recruit others into terrorist activities. Of¬cials say Talbot was plotting to use C-4 explosives and weapons to rob banks and armored cars, kill police of¬cers, and blow up government buildings and crowded mosques. Talbot is also behind a Facebook page called ''American Insurgent Movement,'' on which he posted antigovernment screeds, called for vio-lence against public officials, and ranted about Muslims and LGBT people. In October 2014, Talbot pleads guilty to federal charges of attempted inter-ference with commerce by robbery and solicitation to commit a crime of violence. He faces up 20 years on the ¬rst charge and another 10 on the second charge when he is sentenced.APRIL 13, 2014 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARM | OUTCOME 3 KILLEDPERPETRATOR MALE, 73 | OVERLAND PARK, KAN. FRAZIER GLENN MILLER (aka Frazier Glenn Cross), a longtime racist and anti- Semite, is arrested after he allegedly opens ¬re at a Jewish com-m u n i t y c e n t e r a n d a J e w i s h retirement community in a suburb of Kansas City. Three people are killed, including a 14-year-old Eagle Scout and his grandfather, all of them Christians. Miller is charged with capital murder and three counts of attempted murder. Miller, a retired Army veteran and Green Beret, is the founder and former leader of both the Carolina Knights of the Ku Klux Klan and the White Patriot Party, which he ran as paramilitary organizations in the 1980s. He was successfully sued by the SPLC for operating an illegal paramilitary organization and for using intimidation tactics against African Americans. Miller went underground in 1987 after he violated the court settlement and was facing criminal contempt charges. He was later caught and served three years in federal prison on weap-ons charges in connection with plans to commit robberies and assassinate SPLC co-founder Morris Dees. As part of a plea deal, he testified against other Klan members in a 1988 sedition trial.
special report | the rise of lone wolf and leaderless resistance terrorism 31MAY 23, 2014 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME 7 KILLED *PERPETRATOR MALE, 22 | ISLA VISTA, CALIF. ELLIOT RODGER goes on a killing spree in Isla Vista, Calif., shortly after uploading a video to YouTube titled ''Elliot Rodger 's Retribution'' and E-mailing what was subsequently described as his manifesto, titled ''My Twisted Wo r l d ,'' t o a n u m b e r o f p e o p l e. I n t h e v i d e o a n d m a n-ifesto, he lays out the reasons behind the killings: his frustration over not being able to ¬nd a girlfriend, his hatred of women, and his contempt for racial minorities and interracial couples. Rodger stabs to death three men in his apartment before driving to a nearby sorority house, where he kills two sorority members, and a delicatessen, where he shot to death another student. He then speeds through Isla Vista, shooting at pedestrians before exchanging gun¬re with police. Rodger crashes his car and police ¬nd him dead with a self-in¬‚icted gunshot wound to the head. Rodger had e x p r e s s e d h i s v i o l e n t hatred for women earlier in several postings at a m i s o g y n i s t i c w e b s i t e called PUAHate.JUNE 1, 2014 | IDEOLOGY HATEINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME NO FATALITIESPERPETRATOR MALE, 35 | WILLISTON, FLA. DUSTIN HAROLD HEATHMAN is arrested after ¬ring more than 50 rounds at police officers outside his home. Foll owi ng a se arc h, p oli ce fo und ne o -Nazi literature as well as a cache of guns and ammunition. Following his arrest, Heathman reportedly makes suicidal comments and expresses antigovernment views similar to those of a sovereign citizen. He is charged with 10 counts of attempted murder. JUNE 6, 2014 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS, EXPLOSIVES | OUTCOME 1 KILLED *PERPETRATOR MALE, 48 | CUMMING, GA. Armed with multiple guns and explo-sives, DENNIS MARX, a man described by law enforcement as an antigovern-ment sovereign citizen, enters the Forsyth County Courthouse in subur-ban Atlanta and opens fire. Marx is reportedly wearing a bulletproof vest and a gas mask. As he approaches the building, he throws out homemade smoke grenades that brie¬‚y cover his approach with orange smoke. He shoots one of¬cer in the leg before being killed by deputies in a hail of gun¬re. JUNE 8, 2014 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE GROUP | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME 5 KILLED *PERPETRATOR MALE, 31; FEMALE, 22 | LAS VEGASJERAD MILLER and his wife, AMANDA, enter a pizza restaurant where two police of¬cers are eat-ing lunch. Jerad Miller fatally shoots of¬cer Igor Soldo, 31. As his partner, Alyn Beck, 41, tries to react, Miller shoots him in the throat, then both Millers shoot Beck several times. The pair leave a swastika and a Gadsden ¬‚ag on Beck's body. The yellow ¬‚ag, a symbol used by the antigovernment Patriot movement, features a c o i l e d s n a ke w i t h t h e wo r d s '' D o n ' t Tread On Me.'' On Soldo's body, they place a note: ''This is the start of the revo-lution.'' The couple leaves the restaurant a n d w a l k s t o a n e a r b y Wa l m a r t s t o r e , w h e r e A m a n d a M i l l e r
32 southern poverty law centers h o o t s a n d k i l l s Joseph Wilcox, 31, before the Millers barricade them-selves in the back of the store. Jerad is s h o t t o d e a t h b y police, and Amanda k i l l s h e r s e l f. T h e couple held strong a n t i g o v e r n m e n t views, with Jerad Miller's Facebook page contain-ing calls to impeach President Obama as well as statements about conspiracy theories popular among Patriot groups. Two months earlier, the cou-ple was at the Cliven Bundy ranch in Nevada, where militias had gathered in an armed standoff with the federal Bureau of Land Management over a grazing fee dispute. The Millers saw law enforce-ment of¬cers as ''oppressors'' and reportedly told a neighbor they planned to kill police.JUNE 15, 2014 | IDEOLOGY ANTIGOVERNMENT INCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC UNPLANNEDWEAPON FIREARM | OUTCOME NO FATALITIESPERPETRATOR MALE, 60 | NEVADA CITY, CALIF. BRENT DOUGLAS COLE, a sovereign citi-zen camping out in the woods of northern California, opens fire on two law enforcement officers who were investigating vehicles that had been parked for a long time at a wooded camp-ground near Nevada City. Cole had a history of run-ins with law enforcement, including several other weapons-related incidents, and an even lon-ger history of interest in far-right conspiracies on the Internet. At one site, Cole described himself as a ''sovereign American Citizen attempting to thwart the obvious conspiracy and subterfuges of powers inimical to the United States.'' In October 2014, a federal grand jury returns a three-count indictment against Cole, charging him with assault on a federal officer with a deadly weapon that in¬‚icted bodily injury and discharge of a ¬rearm during a crime of violence. JULY 10, 2014 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 47 | TREMONTON, UTAHJOHN DAVID HUGGINS is arrested after police learn he was building a gre-nade-like bomb and discussing plans to kill police of¬cers in Tremonton. In charging documents, the U.S. Attorney's of¬ce says Huggins also had instruc-tions for making bombs and had planned on blowing up bridges and other infrastructure to prevent any help from reaching his intended vic-t i m s . H u g g i n s h a s a l o n g h i s t o r y o n t h e antigovernment right, and records obtained by the SPLC show that he bought material in 1992 from the National Alliance, then the largest neo-Nazi organization in the United States. A trial is sched-uled for early 2015.AUG. 11, 2014 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS, EXPLOSIVES | OUTCOME NO FATALITIESPERPETRATOR MALE, 60 | DALLAS, TEXAS DOUGLAS LEE LEGUIN, a sovereign citizen, reports a dumpster fire in a well-to- do neighborhood of Dallas and begins shooting at ¬re¬ghters who respond. Hours before the attack, police say that Leguin left his house with his AK-47, ammunition and propane canisters. Later, it was learned that he also told operators he was ''seced-ing from the nation'' because he was upset with the current state of the government, and that he was heavily armed, CBS reported. Negotiators eventu-ally persuade Leguin to surrender. According to police, Leguin had recently become depressed and spent hours watching Al-Jazeera, dreaming of starting his own country. No one was hurt in the gun¬re. Leguin is charged with seven counts of aggravated assault.
special report | the rise of lone wolf and leaderless resistance terrorism 33SEPT. 12, 2014 | IDEOLOGY ANTIGOVERNMENTINCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME 1 KILLEDPERPETRATOR MALE, 31 | BLOOMING GROVE, PA.ERIC MATTHEW FREIN, an antigovernment survivalist and crack marksman, a l l e g e d l y s h o o t s a n d k i l l s Pennsylvania State Police Cpl. Byron Dickson, 38, as he walks to his patrol car in front of a police barracks in rural northeast-ern Pennsylvania. Moments later, Frein allegedly shoots Trooper Alex T. Douglass, seriously wound-ing him. He then disappears into a wooded area and is not found for weeks despite a huge and intensive manhunt and being placed on the FBI's Top 10 Most Wanted List. On Oct. 30, however, he is captured without incident at an abandoned air-port. In November, Frein is charged with two counts of terrorism after police say he told them he carried out the attack to ''wake people up.'' A crim-inal complaint says Frein ''wanted to make a change [in government] and [believed] that voting was insufficient to do so, because there was no one worth voting for.'' Frein is charged with murder and attempted murder. NOV. 28, 2014 | IDEOLOGY HATE INCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS, EXPLOSIVES | OUTCOME 1 KILLED * PERPETRATOR MALE, 49 | AUSTIN, TEXASLARRY STEVE MCQUILLIAMS goes on a shooting spree, ¬ring at government buildings including the Mexican con-sulate and Austin police headquarters. He ¬res more than 100 rounds, injur-ing no one, but is then killed by a near-miraculous pistol shot ¬red by an of¬cer standing 312 feet away. McQuilliams, who also brought propane cylinders with him in a van to ¬rebomb buildings at the time he was killed, was a devotee of a doctrine known as the Phineas Priesthood, an ideology that calls violence divinely justi¬ed if used against race-mix-ers, gay people, abortion proponents and others. ''He is a homegrown American extremist,'' Austin Police Chief Art Acevedo said of McQuilliams later. ''Hate in his heart was part of his problem. '... What keeps me up at night is these guys. The lone wolf.''JAN. 14, 2015 | IDEOLOGY HATE INCIDENT TYPE LONE WOLF | INCIDENT DYNAMIC PLANNEDWEAPON FIREARMS | OUTCOME NO FATALITIESPERPETRATOR MALE, 20 | GREEN TOWNSHIP, OHIO CHRISTOPHER LEE CORNELL is arrested and charged with attempting to kill a fed-eral of¬cer and with possession of a ¬rearm with the intent to commit a violent crime. Cornell, who uses the name Raheel Mahrus Ubaydah, allegedly told an FBI informant that he had been in contact with ter-rorist groups overseas and was moving forward in planning an attack. ''I just believe that we should wage jihad under our own orders and plan attacks on everything,'' Cornell reportedly said. Cornell also allegedly told the informant that he considered members of Congress to be enemies and that he intended to conduct an attack on the Capitol using bombs and firearms. Officials say plans for the attack were found on Cornell's computer. He was arrested after buying semiautomatic ri¬‚es and 600 rounds of ammunition. s
Karma's an ITCH! Daesh attacked by skin disease | Al Bawaba
Thu, 09 Apr 2015 02:26
The extremists' poor hygiene conditions have led to more than 100,000 cases. (AFP/File)
Islamic State (Daesh) militants are being attacked by a debilitating skin disease called leishmaniasis.
The disease, which is spread by sandflies, is quickly spreading thanks to pollution and poor hygiene conditions and there have been more than 100,000 cases reported, British media outlets reported earlier this week.
The extremist fighters are refusing medical treatment which has led to more outbreaks, according to the reports.
Medical centers have closed since medical staff have fled the violence making the spread of the disease more acute, according to the reports.
Dubbed ''Rose of Jericho,'' the disease is caused by protozoan parasites that belong to the genus Leishmania and is transmitted by the bite of female sand fly that bite infected rodents called rock hyraxes.
Cutaneous leishmaniasis is the most common form of leishmaniasis, while visceral leishmaniasis is a severe form in which the parasites have migrated to the vital organs. The infection appears as red sores (hence its nickname) on the skin a few weeks or months after being bitten by the sand fly that erupt weeks to months after the person affected is bitten by sand flies. The infection can also damage the liver and spleen and cause anemia. The sores can cause permanent, ugly scars if untreated.
Israel launched a program to fight the spread of the serious skin disease in 2012.
Judy Siegel-Itzkovich contributed to this report.
Common Core
Education and the death of creativity
Fri, 10 Apr 2015 16:02
(C) Wikimedia
Is it a coincidence that pretty much all children love to write stories, have fantastic imaginations, enjoy getting messy, painting, making music, inventing characters, acting out plays, drawing and making things? Why don't we carry this natural capacity throughout adulthood? Why would nature intend us to lose these gifts?Eight years ago, a man named Ken Robinson made a TED speech that revolutionized the topic of education. It caused many parents to pull their kids out of school, it was a matter of hot debate among experts, and it has been watched on the TED website over 31 million times to date (not including over 7 million more times on YouTube). Many of you may be familiar with this lecture, but for those who aren't, we highly recommend you take the next twenty minutes to sit down and listen to what this man has to say.
Robinson is an expert on creativity and education, and he strongly believes that at the moment, the two concepts don't seem to co-exist. In this speech, Robinson argues eloquently and passionately thateducationis destroying our childrens' capacity to think outside the box. Ken Robinson led the British government's 1998 advisory committee on creative and cultural education, an inquiry into the significance of creativity in the educational system and the economy, and he was knighted in 2003 for his achievements.
There were no public systems of education before the 19th Century; all of them came into being to meet the needs of the Industrial Revolution. "At school, you were probably steered away from subjects you enjoyed because 'you would never get a job doing that'," Robinson points out. "Many creative, brilliant, talented people think they're not, because everything they were good at at school wasn't valued, or was stigmatized."
"All children have tremendous talent and we squander them pretty ruthlessly," he goes on to say. "Picasso once said that all children are born artists. The problem is to remain an artist as we grow up. I believe passionately that we don't growintocreativity, we growoutof it. We areeducatedout of it."
Robinson argues that society also has a very limited definition of intelligence; a definition that looks to numeracy and literacy only, and stigmatizes children who cannot read and write fluently (but may excel at other subjects) as 'not very bright'. But is that fair, or true?
"If you visited Earth as an alien, I think you'd have to conclude that the whole purpose of public education throughout the world is to produce university professors," Robinson says. "They're the people who come out on top. Our education system is predicated on the idea of academic ability."
In short, we've been educated to become good workers, rather than creative thinkers. We teach children to be part of the system governing our society- uniformed, respectful of authority, scared of making mistakes. "If you're not prepared to be wrong, you'll never come up with anything original," Robinson points out. "Kids aren't afraid to make mistakes. If they don't know, they'll take a chance. But by the time they become adults most kids have lost that capacity. They have become frightened of being wrong. We run our companies this way. And we're now running national education systems where mistakes are the worst thing you can make."
His opinions are not an attack on teachers or schools (who I'm sure we all agree, do a fantastic job within the boundaries of the curriculum they must follow)- they refer instead to the whole system of education, throughout the world. As Robinson points out, "Every education system on earth has the same hierarchy of subjects. At the top are mathematics and languages, then the humanities, and at the bottom are the arts. Why? As children grow up, we start to educate them progressively from the waist up. Then we focus on their heads, and slightly to one side."
According to Robinson, our education system places so much emphasis on the academic subjects that natural gifts for art, music or acting are often brushed aside as we get older. Restless children may be stigmatized as hyperactive and diagnosed with ADHD. One moving example of this is a story Robinson tells about world-class dancer and choreographer Gillian Lynne (responsible for the success of Cats and Phantom of the Opera), whose mother became increasingly worried when she was a child because she found it impossible to sit still or concentrate in class. After taking her daughter to a specialist in the 1970's, her mother was told: "Gillian isn't sick. She's a dancer. Take her to a dance school." This was done, and the rest is history. But as Robinson points out, "Someone else might have put her on medication and told her to calm down."
Please watch, comment and share if you agree we need a paradigm shift in the education system!
Hundreds of Seattle high school students boycott Common Core test
Fri, 10 Apr 2015 17:52
At a news conference Tuesday, Garfield history teacher Jesse Hagopian said about half the juniors at the school '-- the site of a testing boycott in 2013 '-- have refused to take new, computerized tests, called Smarter Balanced, which are designed to measure whether students understand new learning standards known as the Common Core.
Several hundreds students in and around Seattle are refusing to take a new standardized test as part of the Common Core standards."There's actually a growing movement - in fact, probably the largest in Seattle's history," said Jesse Hagopian, a Garfield High School teacher.
Common Core standards, developed by educators across the country and bankrolled by the Gates Foundation, have been adopted in most states in the country.
In Washington, the test to ensure students have achieved these standards is called Smarter Balanced Assessment Consortium, or SBAC.
This is the first year that all students in Washington state must take the test. It is administered to students in third through eighth grade, as well as tenth grade.
The test given for tenth graders is used as part of a high school graduation requirement. A statement from Seattle Public Schools said students who refuse to take the test will receive a zero score, which could mean they will need to take remedial courses in college.
Opponents of the test said it is unfair, especially for underprivileged students. The entire test is done on a computer, which they said is challenging for students who may not have access to computers or who haven't been taught typing skills.
Hagopian and other Seattle teachers gathered at the local chapter office of the NAACP to denounce the test and urge others to do the same.
Hagopian told KIRO 7 that since the inception of No Child Left Behind, there has been a series of standardized tests.
"It hasn't worked, and we need to move to more holistic forms of thinking rather than A-B-C-D bubble thinking," he said.
Of the dozens of schools listed as having students refusing the test, three schools have more than 100 students opting out: Nathan Hale High School, Ingraham High School, and Garfield High School.
Several districts outside of Seattle also have confirmed students opting out, according to the opponents.
But Kelly James, whose children are in third and sixth grades, likes getting important information about her children's progress.
"Are they on track? Are they having growth every year? Are they meeting higher standards?" James said.
James said she also likes the Common Core way of teaching math and English skills, which are focused more on the process of arriving at an answer.
"I'd rather have my daughter going back to the book and actually drawing a conclusion from what they've read, as opposed to 'oh, I had an experience,'" she said, referring to questions that ask for evidence to support answers.
But many parents have posted homework problems online that show convoluted processes to solve math problems.
Proponents said asking students for multiple ways to arrive at one answer creates deeper understanding of what's happening with the numbers.
NA-Tech News
Row R
Microsoft seeks to recruit autistic workers - BBC News
Thu, 09 Apr 2015 03:13
The new jobs will be based at Microsoft's HQ in Redmond, USA Microsoft says it wants to hire more people with autism in full-time roles.
The tech giant is to start by offering 10 places on a pilot scheme based at its Redmond headquarters.
Senior executive Mary Ellen Smith said: "People with autism bring strengths that we need at Microsoft."
The UK's National Autistic Society welcomed the move but said that other firms should do more to tap into the skills offered by many people with autism.
Announcing the new scheme in a blog, Ms Smith said: "Each individual is different, some have an amazing ability to retain information, think at a level of detail and depth or excel in math or code."
Specialist recruitment firm, Specialisterne, will help run a new hiring scheme.
The firm, which operates in Denmark and the UK, works with several IT companies, and in other sectors, to promote the skills of people with autism for specific vacancies.
Sarah Lambert, from the National Autistic Society, said: "It's encouraging to see a global company like Microsoft recognise the untapped potential of adults with autism.
"Many may have strengths such as accuracy, a good eye for detail and reliability, which can benefit all sorts of businesses, not just the technology industry.
"However, at the moment, just 15% of adults with autism in the UK are in full-time employment.
"Simple adjustments, like making job interviews more accessible and providing support to help those in work understand the 'unwritten rules' of the workplace can unlock the potential of a whole section of society."
Federal Register | Protecting and Promoting the Open Internet
Sun, 12 Apr 2015 14:58
DATES:FOR FURTHER INFORMATION CONTACT:SUPPLEMENTARY INFORMATION:SynopsisI. IntroductionII. Executive SummaryA. Strong Rules That Protect Consumers From Past and Future Tactics That Threaten the Open Internet1. Clear, Bright-Line Rules2. No Unreasonable Interference or Unreasonable Disadvantage to Consumers or Edge Providers3. Enhanced Transparency4. Scope of the Rules5. EnforcementB. Promoting Investment With a Modern Title IIC. Sustainable Open Internet RulesD. Broad ForbearanceIII. Report and Order on Remand: Protecting and Promoting the Open InternetA. History of Openness RegulationB. The Continuing Need for Open Internet Protections1. An Open Internet Promotes Innovation, Competition, Free Expression, and Infrastructure Deployment2. Broadband Providers Have the Incentive and Ability To Limit Opennessa. Economic Incentives and Abilityb. Technical Ability3. Mobile Broadband Services4. The Commission Must Act To Preserve Internet OpennessC. Strong Rules That Protect Consumers From Practices That Can Threaten the Open Internet1. Clear, Bright Line Rulesa. Preventing Blocking of Lawful Content, Applications, Services, and Non-Harmful Devicesb. Preventing Throttling of Lawful Content, Applications, Services, and Non-Harmful Devicesc. No Paid Prioritization2. No Unreasonable Interference or Unreasonable Disadvantage Standard for Internet Conducta. Factors To Guide Application of the Ruleb. Application to Mobilec. Rejection of the ''Commercially Reasonable'' Standardd. Sponsored Data and Usage Allowances3. Transparency Requirements To Protect and Promote Internet Opennessa. The Existing Transparency Ruleb. Enhancing the Transparency Rule(i) Enhancements to Content of Required Disclosures(ii) Enhancements to the Means of Disclosure(iii) Small Businesses(iv) Safe Harbor for Form of Disclosure to Consumersc. Enforcement and Relationship to the Existing Transparency Ruled. Role of Further Advisory GuidanceD. Scope of the Rules1. Broadband Internet Access Service2. Internet Traffic Exchange3. Non-BIAS Data Services4. Reasonable Network ManagementE. Enforcement of the Open Internet Rules1. Background2. Designing an Effective Enforcement Processa. Legal Certainty(i) Advisory Opinions(ii) Enforcement Advisoriesb. Flexibility(i) Means of Enforcement and General Enforcement Mechanisms(ii) Case-by-Case Analysis(iii) Fact-Finding Processesc. Effective Access To Dispute Resolution3. Complaint Processes and Forms of Dispute Resolutiona. Complaint Filing Proceduresb. Alternative Dispute Resolutionc. Multistakeholder Processes and Technical Advisory GroupsF. Legal Authority1. Section 706 Provides Affirmative Legal Authority for Our Open Internet Rules2. Authority for the Open Internet Rules Under Title II with Forbearance3. Title III Provides Additional Authority for Mobile Broadband Services4. Applying These Legal Authorities to Our Open Internet RulesG. Other Laws and Considerations1. Emergency Communications and Safety and Security Authorities2. Transfers of Unlawful Content and Unlawful Transfers of ContentIV. Declaratory Ruling: Classification of Broadband Internet Access ServicesA. History of Broadband Internet ClassificationB. Rationale for Revisiting the Commission's Classification of Broadband Internet Access ServicesC. Classification of Broadband Internet Access Service1. Scope2. The Market Today: Current Offerings of Broadband Internet Access Servicea. Broadband Internet Access Services at Time of Classificationb. The Growth of Consumer Demand and Market Supplyc. Marketing3. Broadband Internet Access Service Is a Telecommunications Servicea. Broadband Internet Access Service Involves Telecommunicationsb. Broadband Internet Access Service Is a ''Telecommunications Service''c. Broadband Internet Access Service Is Not an ''Information Service''d. Opponents' Remaining Challenges Are Insubstantial4. Mobile Broadband Internet Access Service Is Commercial Mobile Service5. The Reclassification of Broadband Internet Access Service Will Preserve Investment IncentivesD. Judicial Estoppel Does Not Apply HereE. State and Local Regulation of Broadband ServicesV. Order: Forbearance for Broadband Internet Access ServicesA. Forbearance FrameworkB. Maintaining the Customer Safeguards Critical to Protecting and Preserving the Open Internet1. Authority To Protect Consumers and Promote Competition: Sections 201 and 2022. EnforcementC. Forbearance Analysis Specific to Broadband Internet Access Service1. Provisions That Protect Customer Privacy, Advance Access for Persons With Disabilities, and Foster Network Deploymenta. Customer Privacy (Section 222)b. Disability Access Provisions (Sections 225, 255, 251(a)(2))c. Access to Poles, Ducts, Conduit and Rights-of-Way (section 224)d. Universal Service Provisions (sections 254, 214(e))2. Broad Forbearance From 27 Title II Provisions for Broadband Internet Access Servicea. Tariffing (Sections 203, 204)b. Enforcement-Related Provisions (Sections 205, 212)c. Information Collection and Reporting Provisions (Sections 211, 213, 215, 218 Through 220)d. Discontinuance, Transfer of Control, and Network Reliability Approval (Section 214)e. Interconnection and Market-Opening Provisions (Sections 251, 252, 256)f. Subscriber Changes (Section 258)g. Other Title II Provisionsh. Truth-in-Billing Rulesi. Roaming-Related Provisions and Regulationsj. Terminal Equipment Rules3. Other Provisions and RegulationsD. Potential Objections to Our General Approach to Forbearance for Broadband Internet Access ServiceVI. Constitutional ConsiderationsA. First Amendment1. Free Speech Rights2. Compelled DisclosureB. Fifth Amendment Takings1. Per Se Takings2. Regulatory TakingsVII. SeverabilityVIII. Procedural MattersA. Regulatory Flexibility AnalysisB. Paperwork Reduction Act of 1995 AnalysisC. Congressional Review ActD. Data Quality ActE. Accessible FormatsIX. Ordering ClausesX. Final Regulatory Flexibility AnalysisA. Need for, and Objectives of, the Proposed RulesB. Summary of Significant Issues Raised by Public Comments in Response to the IRFAC. Description and Estimate of the Number of Small Entities To Which the Rules Would Apply1. Total Small Entities2. Broadband Internet Access Service Providers3. Wireline Providers4. Wireless Providers'--Fixed and Mobile5. Satellite Service Providers6. Cable Service Providers7. Electric Power Generators, Transmitters, and DistributorsD. Description of Projected Reporting, Recordkeeping, and Other Compliance Requirements for Small EntitiesE. Steps Taken To Minimize the Significant Economic Impact on Small Entities, and Significant Alternatives ConsideredF. Report to CongressList of Subjects in 47 CFR Parts 1, 8, and 20Final RulesPART 1'--PRACTICE AND PROCEDUREPART 8'--PROTECTING AND PROMOTING THE OPEN INTERNETPART 20'--COMMERCIAL MOBILE SERVICESThis rule is effective June 12, 2015.
The modified information collection requirements in paragraphs 164, 166, 167, 169, 173, 174, 179, 180, and 181 of this document are not applicable until approved by the Office of Management and Budget (OMB). The Federal Communications Commission will publish a separate document in the Federal Register announcing such approval and the relevant effective date(s).
Kristine Fargotstein, Competition Policy Division, Wireline Competition Bureau, at (202) 418-2774 or by email at Kristine.Fargotstein@fcc.gov.
This is a summary of the Commission's Report and Order on Remand, Declaratory Ruling, and Order (''Open Internet Order'' or ''Order'') in GN Docket No. 14-28, adopted on February 26, 2015 and released on March 12, 2015. The full text of this document can be viewed at the following Internet address: https://apps.fcc.gov/edocs_public/attachmatch/FCC-15-24A1.docx. The full text of this document is also available for public inspection during regular business hours in the FCC Reference Center, 445 12th Street SW., Room CY-A257, Washington, DC 20554. To request materials in accessible formats for people with disabilities (e.g. braille, large print, electronic files, audio format, etc.) or to request reasonable accommodations (e.g. accessible format documents, sign language interpreters, CART, etc.), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at (202) 418-0530 (voice) or (202) 418-0432 (TTY).
In the Report and Order on Remand, Declaratory Ruling, and Order, we establish rules to protect and promote the open Internet, reclassify broadband Internet access service as a telecommunications service subject to Title II of the Communications Act, and forbear from the majority of Title II provisions.
1. The open Internet drives the American economy and serves, every day, as a critical tool for America's citizens to conduct commerce, communicate, educate, entertain, and engage in the world around them. The benefits of an open Internet are undisputed. But it must remain open: Open for commerce, innovation, and speech; open for consumers and for the innovation created by applications developers and content companies; and open for expansion and investment by America's broadband providers. For over a decade, the Commission has been committed to protecting and promoting an open Internet.
2. Four years ago, the Commission adopted open Internet rules to protect and promote the ''virtuous cycle'' that drives innovation and investment on the Internet'--both at the ''edges'' of the network, as well as in the network itself. In the years that those rules were in place, significant investment and groundbreaking innovation continued to define the broadband marketplace. For example, according to US Telecom, broadband providers invested $212 billion in the three years following adoption of the rules'--from 2011 to 2013'--more than in any three year period since 2002.
3. Likewise, innovation at the edge moves forward unabated. For example, 2010 was the first year that the majority of Netflix customers received their video content via online streaming rather than via DVDs in red envelopes. Today, Netflix sends the most peak downstream traffic in North America of any company. Other innovative service providers have experienced extraordinary growth'--Etsy reports that it has grown from $314 million in merchandise sales in 2010 to $1.35 billion in merchandise sales in 2013. And, just as importantly, new kinds of innovative businesses are busy being born. In the video space alone, in just the last sixth months, CBS and HBO have announced new plans for streaming their content free of cable subscriptions; DISH has launched a new package of channels that includes ESPN, and Sony is not far behind; and Discovery Communications founder John Hendricks has announced a new over-the-top service providing bandwidth-intensive programming. This year, Amazon took home two Golden Globes for its new series ''Transparent.''
4. The lesson of this period, and the overwhelming consensus on the record, is that carefully-tailored rules to protect Internet openness will allow investment and innovation to continue to flourish. Consistent with that experience and the record built in this proceeding, today we adopt carefully-tailored rules that would prevent specific practices we know are harmful to Internet openness'--blocking, throttling, and paid prioritization'--as well as a strong standard of conduct designed to prevent the deployment of new practices that would harm Internet openness. We also enhance our transparency rule to ensure that consumers are fully informed as to whether the services they purchase are delivering what they expect.
5. Carefully-tailored rules need a strong legal foundation to survive and thrive. Today, we provide that foundation by grounding our open Internet rules in multiple sources of legal authority'--including both section 706 of the Telecommunications Act and Title II of the Communications Act. Moreover, we concurrently exercise the Commission's forbearance authority to forbear from application of 27 provisions of Title II of the Communications Act, and over 700 Commission rules and regulations. This is a Title II tailored for the 21st century, and consistent with the ''light-touch'' regulatory framework that has facilitated the tremendous investment and innovation on the Internet. We expressly eschew the future use of prescriptive, industry-wide rate regulation. Under this approach, consumers can continue to enjoy unfettered access to the Internet over their fixed and mobile broadband connections, innovators can continue to enjoy the benefits of a platform that affords them unprecedented access to hundreds of millions of consumers across the country and around the world, and network operators can continue to reap the benefits of their investments.
6. Informed by the views of nearly 4 million commenters, our staff-led roundtables, numerous ex parte presentations, meetings with individual Commissioners and staff, and more, our decision today'--once and for all'--puts into place strong, sustainable rules, grounded in multiple sources of our legal authority, to ensure that Americans reap the economic, social, and civic benefits of an open Internet today and into the future.
7. The benefits of rules and policies protecting an open Internet date back over a decade and must continue. Just over a year ago, the D.C. Circuit in Verizon v. FCC struck down the Commission's 2010 conduct rules against blocking and unreasonable discrimination. But the Verizon court upheld the Commission's finding that Internet openness drives a ''virtuous cycle'' in which innovations at the edges of the network enhance consumer demand, leading to expanded investments in broadband infrastructure that, in turn, spark new innovations at the edge. The Verizon court further affirmed the Commission's conclusion that ''broadband providers represent a threat to Internet openness and could act in ways that would ultimately inhibit the speed and extent of future broadband deployment.''
8. Threats to Internet openness remain today. The record reflects that broadband providers hold all the tools necessary to deceive consumers, degrade content, or disfavor the content that they don't like. The 2010 rules helped to deter such conduct while they were in effect. But, as Verizon frankly told the court at oral argument, but for the 2010 rules, it would be exploring agreements to charge certain content providers for priority service. Indeed, the wireless industry had a well-established record of trying to keep applications within a carrier-controlled ''walled garden'' in the early days of mobile applications. That specific practice ended when Internet Protocol (IP) created the opportunity to leap the wall. But the Commission has continued to hear concerns about other broadband provider practices involving blocking or degrading third-party applications.
9. Emerging Internet trends since 2010 give us more, not less, cause for concern about such threats. First, mobile broadband networks have massively expanded since 2010. They are faster, more broadly deployed, more widely used, and more technologically advanced. At the end of 2010, there were about 70,000 devices in the U.S. that had LTE wireless connections. Today, there are more than 127 million. We welcome this tremendous investment and innovation in the mobile marketplace. With carefully-tailored rules in place, that investment can continue to flourish and consumers can continue to enjoy unfettered access to the Internet over their mobile broadband connections. Indeed, mobile broadband is becoming an increasingly important pathway to the Internet independent of any fixed broadband connections consumers may have, given that mobile broadband is not a full substitute for fixed broadband connections. And consumers must be protected, for example from mobile commercial practices masquerading as ''reasonable network management.'' Second, and critically, the growth of online streaming video services has spurred further evolution of the Internet. Currently, video is the dominant form of traffic on the Internet. These video services directly confront the video businesses of the very companies that supply them broadband access to their customers.
10. The Commission, in its May Notice of Proposed Rulemaking, asked a fundamental question: ''What is the right public policy to ensure that the Internet remains open?'' It proposed to enhance the transparency rule, and follow the Verizon court's blueprint by relying on section 706 to adopt a no-blocking rule and a requirement that broadband providers engage in ''commercially reasonable'' practices. The Commission also asked about whether it should adopt other bright-line rules or different standards using other sources of Commission authority, including Title II. And if Title II were to apply, the Commission asked about how it should exercise its authority to forbear from Title II obligations. It asked whether mobile services should also be classified under Title II.
11. Three overarching objectives have guided us in answering these questions, based on the vast record before the Commission: America needs more broadband, better broadband, and open broadband networks. These goals are mutually reinforcing, not mutually exclusive. Without an open Internet, there would be less broadband investment and deployment. And, as discussed further below, all three are furthered through the open Internet rules and balanced regulatory framework we adopt today. (Consistent with the Verizon court's analysis, this Order need not conclude that any specific market power exists in the hands of one or more broadband providers in order to create and enforce these rules. Thus, these rules do not address, and are not designed to deal with, the acquisition or maintenance of market power or its abuse, real or potential. Moreover, it is worth noting that the Commission acts in a manner that is both complementary to the work of the antitrust agencies and supported by their application of antitrust laws. See generally47 U.S.C. 152(b) (''[N]othing in this Act . . . shall be construed to modify, impair, or supersede the applicability of any of the antitrust laws.''). Nothing in this Order in any way precludes the Antitrust Division of the Department of Justice or the Commission itself from fulfilling their respective responsibilities under section 7 of the Clayton Act (15 U.S.C. 18), or the Commission's public interest standard as it assesses prospective transactions.)
12. In enacting the Administrative Procedure Act (APA), Congress instructed expert agencies conducting rulemaking proceedings to ''give interested persons an opportunity to participate in the rule making through submission of written data, views, or arguments.'' It is public comment that cements an agency's expertise. As was explained in the seminal report that led to the enactment of the APA:
13. Congress could not have imagined when it enacted the APA almost seventy years ago that the day would come when nearly 4 million Americans would exercise their right to comment on a proposed rulemaking. But that is what has happened in this proceeding and it is a good thing. The Commission has listened and it has learned. Its expertise has been strengthened. Public input has ''improve[d] the quality of agency rulemaking by ensuring that agency regulations will be `tested by exposure to diverse public comment.' '' There is general consensus in the record on the need for the Commission to provide certainty with clear, enforceable rules. There is also general consensus on the need to have such rules. Today the Commission, informed by all of those views, makes a decision grounded in the record. The Commission has considered the arguments, data, and input provided by the commenters, even if not in agreement with the particulars of this Order; that public input has created a robust record, enabling the Commission to adopt new rules that are clear and sustainable.
A. Strong Rules That Protect Consumers From Past and Future Tactics That Threaten the Open Internet1. Clear, Bright-Line Rules14. Because the record overwhelmingly supports adopting rules and demonstrates that three specific practices invariably harm the open Internet'--Blocking, Throttling, and Paid Prioritization'--this Order bans each of them, applying the same rules to both fixed and mobile broadband Internet access service.
15. No Blocking. Consumers who subscribe to a retail broadband Internet access service must get what they have paid for'--access to all (lawful) destinations on the Internet. This essential and well-accepted principle has long been a tenet of Commission policy, stretching back to its landmark decision in Carterfone, which protected a customer's right to connect a telephone to the monopoly telephone network. Thus, this Order adopts a straightforward ban:
16. No Throttling. The 2010 open Internet rule against blocking contained an ancillary prohibition against the degradation of lawful content, applications, services, and devices, on the ground that such degradation would be tantamount to blocking. This Order creates a separate rule to guard against degradation targeted at specific uses of a customer's broadband connection:
17. The ban on throttling is necessary both to fulfill the reasonable expectations of a customer who signs up for a broadband service that promises access to all of the lawful Internet, and to avoid gamesmanship designed to avoid the no-blocking rule by, for example, rendering an application effectively, but not technically, unusable. It prohibits the degrading of Internet traffic based on source, destination, or content. (To be clear, the protections of the no-blocking and no-throttling rules apply to particular classes of applications, content and services as well as particular applications, content, and services.) It also specifically prohibits conduct that singles out content competing with a broadband provider's business model.
18. No Paid Prioritization. Paid prioritization occurs when a broadband provider accepts payment (monetary or otherwise) to manage its network in a way that benefits particular content, applications, services, or devices. To protect against ''fast lanes,'' this Order adopts a rule that establishes that:
19. The record demonstrates the need for strong action. The Verizon court itself noted that broadband networks have ''powerful incentives to accept fees from edge providers, either in return for excluding their competitors or for granting them prioritized access to end users.'' Mozilla, among many such commenters, explained that ''[p]rioritization . . . inherently creates fast and slow lanes.'' Although there are arguments that some forms of paid prioritization could be beneficial, the practical difficulty is this: The threat of harm is overwhelming, case-by-case enforcement can be cumbersome for individual consumers or edge providers, and there is no practical means to measure the extent to which edge innovation and investment would be chilled. And, given the dangers, there is no room for a blanket exception for instances where consumer permission is buried in a service plan'--the threats of consumer deception and confusion are simply too great.
2. No Unreasonable Interference or Unreasonable Disadvantage to Consumers or Edge Providers20. The key insight of the virtuous cycle is that broadband providers have both the incentive and the ability to act as gatekeepers standing between edge providers and consumers. As gatekeepers, they can block access altogether; they can target competitors, including competitors to their own video services; and they can extract unfair tolls. Such conduct would, as the Commission concluded in 2010, ''reduce the rate of innovation at the edge and, in turn, the likely rate of improvements to network infrastructure.'' In other words, when a broadband provider acts as a gatekeeper, it actually chokes consumer demand for the very broadband product it can supply.
21. The bright-line bans on blocking, throttling, and paid prioritization will go a long way to preserve the virtuous cycle. But not all the way. Gatekeeper power can be exercised through a variety of technical and economic means, and without a catch-all standard, it would be that, as Benjamin Franklin said, ''a little neglect may breed great mischief.'' Thus, the Order adopts the following standard:
22. This ''no unreasonable interference/disadvantage'' standard protects free expression, thus fulfilling the congressional policy that ''the Internet offer[s] a forum for a true diversity of political discourse, unique opportunities for cultural development, and myriad avenues for intellectual activity.'' And the standard will permit considerations of asserted benefits of innovation as well as threatened harm to end users and edge providers.
3. Enhanced Transparency23. The Commission's 2010 transparency rule, upheld by the Verizon court, remains in full effect:
24. Today's Order reaffirms the importance of ensuring transparency, so that consumers are fully informed about the Internet access they are purchasing and so that edge providers have the information they need to understand whether their services will work as advertised. To do that, the Order builds on the strong foundation established in 2010 and enhances the transparency rule for both end users and edge providers, including by adopting a requirement that broadband providers always must disclose promotional rates, all fees and/or surcharges, and all data caps or data allowances; adding packet loss as a measure of network performance that must be disclosed; and requiring specific notification to consumers that a ''network practice'' is likely to significantly affect their use of the service. Out of an abundance of caution and in response to a request by the American Cable Association, we also adopt a temporary exemption from these enhancements for small providers (defined for the purposes of the temporary exception as providers with 100,000 or fewer subscribers), and we direct our Consumer & Governmental Affairs Bureau to adopt an Order by December 15, 2015 concerning whether to make the exception permanent and, if so, the appropriate definition of ''small.'' Lastly, we create for all providers a ''safe harbor'' process for the format and nature of the required disclosure to consumers, which we believe will result in more effective presentation of consumer-focused information by broadband providers.
4. Scope of the Rules25. The open Internet rules described above apply to both fixed and mobile broadband Internet access service. Consistent with the 2010 Order, today's Order applies its rules to the consumer-facing service that broadband networks provide, which is known as ''broadband Internet access service'' (BIAS) (We note that our use of the term ''broadband'' in this Order includes but is not limited to services meeting the threshold for ''advanced telecommunications capability,'' as defined in section 706 of the Telecommunications Act of 1996, as amended. 47 U.S.C. 1302(b). Section 706 defines that term as ''high-speed, switched, broadband telecommunications capability that enables users to originate and receive high-quality voice, data, graphics, and video telecommunications using any technology.'' 47 U.S.C. 1302(d)(1). The 2015 Broadband Progress Report specifically notes that ''advanced telecommunications capability,'' while sometimes referred to as ''broadband,'' differs from the Commission's use of the term ''broadband'' in other contexts. 2015 Broadband Progress Report at n.1 (rel. Feb. 4, 2015)) and is defined to be:
26. As in 2010, BIAS does not include enterprise services, virtual private network services, hosting, or data storage services. Further, we decline to apply the open Internet rules to premises operators to the extent they may be offering broadband Internet access service as we define it today.
27. In defining this service we make clear that we are responding to the Verizon court's conclusion that broadband providers ''furnish a service to edge providers'' (and that this service was being treated as common carriage per se). As discussed further below, we make clear that broadband Internet access service encompasses this service to edge providers. Broadband providers sell retail customers the ability to go anywhere (lawful) on the Internet. Their representation that they will transport and deliver traffic to and from all or substantially all Internet endpoints includes the promise to transmit traffic to and from those Internet endpoints back to the user.
28. Interconnection. BIAS involves the exchange of traffic between a broadband Internet access provider and connecting networks. The representation to retail customers that they will be able to reach ''all or substantially all Internet endpoints'' necessarily includes the promise to make the interconnection arrangements necessary to allow that access.
29. As discussed below, we find that broadband Internet access service is a ''telecommunications service'' and subject to sections 201, 202, and 208 (along with key enforcement provisions). As a result, commercial arrangements for the exchange of traffic with a broadband Internet access provider are within the scope of Title II, and the Commission will be available to hear disputes raised under sections 201 and 202 on a case-by-case basis: An appropriate vehicle for enforcement where disputes are primarily over commercial terms and that involve some very large corporations, including companies like transit providers and Content Delivery Networks (CDNs), that act on behalf of smaller edge providers.
30. But this Order does not apply the open Internet rules to interconnection. Three factors are critical in informing this approach to interconnection. First, the nature of Internet traffic, driven by massive consumption of video, has challenged traditional arrangements'--placing more emphasis on the use of CDNs or even direct connections between content providers (like Netflix or Google) and last-mile broadband providers. Second, it is clear that consumers have been subject to degradation resulting from commercial disagreements, perhaps most notably in a series of disputes between Netflix and large last-mile broadband providers. But, third, the causes of past disruption and'--just as importantly'--the potential for future degradation through interconnection disputes'--are reflected in very different narratives in the record.
31. While we have more than a decade's worth of experience with last-mile practices, we lack a similar depth of background in the Internet traffic exchange context. Thus, we find that the best approach is to watch, learn, and act as required, but not intervene now, especially not with prescriptive rules. This Order'--for the first time'--provides authority to consider claims involving interconnection, a process that is sure to bring greater understanding to the Commission.
32. Reasonable Network Management. As with the 2010 rules, this Order contains an exception for reasonable network management, which applies to all but the paid prioritization rule (which, by definition, is not a means of managing a network):
33. Recently, significant concern has arisen when mobile providers' have attempted to justify certain practices as reasonable network management practices, such as applying speed reductions to customers using ''unlimited data plans'' in ways that effectively force them to switch to price plans with less generous data allowances. For example, in the summer of 2014, Verizon announced a change to its ''unlimited'' data plan for LTE customers, which would have limited the speeds of LTE customers using grandfathered ''unlimited'' plans once they reached a certain level of usage each month. Verizon briefly described this change as within the scope of ''reasonable network management,'' before changing course and withdrawing the change.
34. With mobile broadband service now subject to the same rules as fixed broadband service, the Order expressly recognizes that evaluation of network management practices will take into account the additional challenges involved in the management of mobile networks, including the dynamic conditions under which they operate. It also recognizes the specific network management needs of other technologies, such as unlicensed Wi-Fi networks.
35. Non-Broadband Internet Access Service Data Services. The 2010 rules included an exception for ''specialized services.'' This Order likewise recognizes that some data services'--like facilities-based VoIP offerings, heart monitors, or energy consumption sensors'--may be offered by a broadband provider but do not provide access to the Internet generally. The term ''specialized services'' can be confusing because the critical point is not whether the services are ''specialized;'' it is that they are not broadband Internet access service. IP-services that do not travel over broadband Internet access service, like the facilities-based VoIP services used by many cable customers, are not within the scope of the open Internet rules, which protect access or use of broadband Internet access service. Nonetheless, these other non-broadband Internet access service data services could be provided in a manner that undermines the purpose of the open Internet rules and that will not be permitted. The Commission expressly reserves the authority to take action if a service is, in fact, providing the functional equivalent of broadband Internet access service or is being used to evade the open Internet rules. The Commission will vigilantly watch for such abuse, and its actions will be aided by the existing transparency requirement that non-broadband Internet access service data services be disclosed.
5. Enforcement36. The Commission may enforce the open Internet rules through investigation and the processing of complaints (both formal and informal). In addition, the Commission may provide guidance through the use of enforcement advisories and advisory opinions, and it will appoint an ombudsperson. In order to provide the Commission with additional understanding, particularly of technical issues, the Order delegates to the Enforcement Bureau the authority to request a written opinion from an outside technical organization or otherwise to obtain objective advice from industry standard-setting bodies or similar organizations.
B. Promoting Investment With a Modern Title II37. Today, our forbearance approach results in over 700 codified rules being inapplicable, a ''light-touch'' approach for the use of Title II. This includes no unbundling of last-mile facilities, no tariffing, no rate regulation, and no cost accounting rules, which results in a carefully tailored application of only those Title II provisions found to directly further the public interest in an open Internet and more, better, and open broadband. Nor will our actions result in the imposition of any new federal taxes or fees; the ability of states to impose fees on broadband is already limited by the congressional Internet tax moratorium.
38. This is Title II tailored for the 21st Century. Unlike the application of Title II to incumbent wireline companies in the 20th Century, a swath of utility-style provisions (including tariffing) will not be applied. Indeed, there will be fewer sections of Title II applied than have been applied to Commercial Mobile Radio Service (CMRS), where Congress expressly required the application of sections 201, 202, and 208, and permitted the Commission to forbear from others. In fact, Title II has never been applied in such a focused way.
39. History demonstrates that this careful approach to the use of Title II will not impede investment. First, mobile voice services have been regulated under a similar light-touch Title II approach since 1994'--and investment and usage boomed. For example, between 1993 and 2009 (while voice was the primary driver of mobile revenues), the mobile industry invested more than $271 billion in building out networks, during a time in which industry revenues increased by 1300 percent and subscribership grew over 1600 percent. Moreover, more recently, Verizon Wireless has invested tens of billions of dollars in deploying mobile wireless services since being subject to the 700 MHz C Block open access rules, which overlap in significant parts with the open Internet rules we adopt today. But that is not all. Today, key provisions of Title II apply to certain enterprise broadband services that AT&T has described as ''the epicenter of the broadband investment'' the Commission seeks to promote. Title II has been maintained by more than 1000 rural local exchange carriers that have chosen to offer their DSL and fiber broadband services as common carrier offerings. And, of course, wireline DSL was regulated as a common-carrier service until 2005'--including a period in the late '90s and the first five years of this century that saw the highest levels of wireline broadband infrastructure investment to date.
40. In any event, recent events have demonstrated that our rules will not disrupt capital markets or investment. Following recent discussions of the potential application of Title II to consumer broadband, investment analysts have issued reports concluding that Title II with appropriate forbearance is unlikely to alter broadband provider conduct or have any negative effect on their value or future profitability. Executives from large broadband providers have also repeatedly represented to investors that the prospect of regulatory action will not influence their investment strategies or long-term profitability; indeed, Sprint has gone so far to say that it ''does not believe that a light touch application of Title II, including appropriate forbearance, would harm the continued investment in, and deployment of, mobile broadband services.'' Finally, the recent AWS auction, conducted under the prospect of Title II regulation, generated bids (net of bidding credits) of more than $41 billion'--further demonstrating that robust investment is not inconsistent with a light-touch Title II regime.
C. Sustainable Open Internet Rules41. We ground our open Internet rules in multiple sources of legal authority'--including both section 706 and Title II of the Communications Act. The Verizon court upheld the Commission's use of section 706 as a substantive source of legal authority to adopt open Internet protections. But it held that, ''[g]iven the Commission's still-binding decision to classify broadband providers . . . as providers of `information services,' '' open Internet protections that regulated broadband providers as common carriers would violate the Act. Rejecting the Commission's argument that broadband providers only served retail consumers, the Verizon court went on to explain that ''broadband providers furnish a service to edge providers, thus undoubtedly functioning as edge providers' 'carriers,' '' and held that the 2010 no blocking and no unreasonable discrimination rules impermissibly ''obligated [broadband providers] to act as common carriers.''
42. The Verizon decision thus made clear that section 706 affords the Commission substantive authority, and that open Internet protections are within the scope of that authority. And this Order relies on section 706 for the open Internet rules. But, in light of Verizon, absent a classification of broadband providers as providing a ''telecommunications service,'' the Commission could only rely on section 706 to put in place open Internet protections that steered clear of regulating broadband providers as common carriers per se. Thus, in order to bring a decade of debate to a certain conclusion, we conclude that the best path is to rely on all available sources of legal authority'--while applying them with a light touch consistent with further investment and broadband deployment. Taking the Verizon decision's implicit invitation, we revisit the Commission's classification of the retail broadband Internet access service as an information service and clarify that this service encompasses the so-called ''edge service.''
43. Exercising our delegated authority to interpret ambiguous terms in the Communications Act, as confirmed by the Supreme Court in Brand X, today's Order concludes that the facts in the market today are very different from the facts that supported the Commission's 2002 decision to treat cable broadband as an information service and its subsequent application to fixed and mobile broadband services. Those prior decisions were based largely on a factual record compiled over a decade ago, during an earlier time when, for example, many consumers would use homepages supplied by their broadband provider. In fact, the Brand X Court explicitly acknowledged that the Commission had previously classified the transmission service, which broadband providers offer, as a telecommunications service and that the Commission could return to that classification if it provided an adequate justification. Moreover, a number of parties who, in this proceeding, now oppose our reclassification of broadband Internet access service, previously argued that cable broadband should be deemed a telecommunications service. As the record reflects, times and usage patterns have changed and it is clear that broadband providers are offering both consumers and edge providers straightforward transmission capabilities that the Communications Act defines as a ''telecommunications service.''
44. The Brand X decision made famous the metaphor of pizza delivery. Justice Scalia, in dissent, concluded that the Commission had exceeded its legal authority by classifying cable-modem service as an ''information service.'' To make his point, Justice Scalia described a pizzeria offering delivery services as well as selling pizzas and concluded that, similarly'--broadband providers were offering ''telecommunications services'' even if that service was not offered on a ''stand-alone basis.''
45. To take Justice Scalia's metaphor a step further, suppose that in 2014, the pizzeria owners discovered that other nearby restaurants did not deliver their food and thus concluded that the pizza-delivery drivers could generate more revenue by delivering from any neighborhood restaurant (including their own pizza some of the time). Consumers would clearly understand that they are being offered a delivery service.
46. Today, broadband providers are offering stand-alone transmission capacity and that conclusion is not changed even if, as Justice Scalia recognized, other products may be offered at the same time. The trajectory of technology in the decade since the Brand X decision has been towards greater and greater modularity. For example, consumers have considerable power to combine their mobile broadband connections with the device, operating systems, applications, Internet services, and content of their choice. Today, broadband Internet access service is fundamentally understood by customers as a transmission platform through which consumers can access third-party content, applications, and services of their choosing.
47. Based on this updated record, this Order concludes that the retail broadband Internet access service available today is best viewed as separately identifiable offers of (1) a broadband Internet access service that is a telecommunications service (including assorted functions and capabilities used for the management and control of that telecommunication service) and (2) various ''add-on'' applications, content, and services that generally are information services. This finding more than reasonably interprets the ambiguous terms in the Communications Act, best reflects the factual record in this proceeding, and will most effectively permit the implementation of sound policy consistent with statutory objectives, including the adoption of effective open Internet protections.
48. This Order also revisits the Commission's prior classification of mobile broadband Internet access service as a private mobile service, which cannot be subject to common carrier regulation, and finds that it is best viewed as a commercial mobile service or, in the alternative, the functional equivalent of commercial mobile service. Under the statutory definition, commercial mobile services must be ''interconnected with the public switched network (as such terms are defined by regulation by the Commission).'' Consistent with that delegation of authority to define these terms, and with the Commission's previous recognition that the public switched network will grow and change over time, this Order updates the definition of public switched network to reflect current technology, by including services that use public IP addresses. Under this revised definition, the Order concludes that mobile broadband Internet access service is interconnected with the public switched network. In the alternative, the Order concludes that mobile broadband Internet access service is the functional equivalent of commercial mobile service because, like commercial mobile service, it is a widely available, for profit mobile service that offers mobile subscribers the capability to send and receive communications, including voice, on their mobile device.
49. By classifying broadband Internet access service under Title II of the Act, in our view the Commission addresses any limitations that past classification decisions placed on the ability to adopt strong open Internet rules, as interpreted by the D.C. Circuit in the Verizon case.
50. Having classified broadband Internet access service as a telecommunications service, we respond to the Verizon court's holding, supporting our open Internet rules under the Commission's Title II authority and removing any common carriage limitation on the exercise of our section 706 authority. For mobile broadband services, we also ground the open Internet rules in our Title III authority to protect the public interest through the management of spectrum licensing.
D. Broad Forbearance51. In finding that broadband Internet access service is subject to Title II, we simultaneously exercise the Commission's forbearance authority to forbear from 30 statutory provisions and render over 700 codified rules inapplicable, to establish a light-touch regulatory framework tailored to preserving those provisions that advance our goals of more, better, and open broadband. We thus forbear from the vast majority of rules adopted under Title II. We do not, however, forbear from sections 201, 202, and 208 (or from related enforcement provisions), (Specifically, we do not forbear from the enforcement authorities set forth in sections 206, 207, 208, 209, 216, and 217. To preserve existing CALEA obligations that already apply to broadband Internet access service, we also decline to forbear from section 229.) which are necessary to support adoption of our open Internet rules. We also grant extensive forbearance, minimizing the burdens on broadband providers while still adequately protecting the public.
52. In addition, we do not forbear from a limited number of sections necessary to ensure consumers are protected, promote competition, and advance universal access, all of which will foster network investment, thereby helping to promote broadband deployment.
53. Section 222: Protecting Consumer Privacy. Ensuring the privacy of customer information both directly protects consumers from harm and eliminates consumer concerns about using the Internet that could deter broadband deployment. Among other things, section 222 imposes a duty on every telecommunications carrier to take reasonable precautions to protect the confidentiality of its customers' proprietary information. We take this mandate seriously. For example, the Commission recently took enforcement action under section 222 (and section 201(b)) against two telecommunications companies that stored customers' personal information, including social security numbers, on unprotected, unencrypted Internet servers publicly accessible using a basic Internet search. This unacceptably exposed these consumers to the risk of identity theft and other harms.
54. As the Commission has recognized, ''[c]onsumers' privacy needs are no less important when consumers communicate over and use broadband Internet access than when they rely on [telephone] services.'' Thus, this Order finds that consumers concerned about the privacy of their personal information will be more reluctant to use the Internet, stifling Internet service competition and growth. Application of section 222's protections will help spur consumer demand for those Internet access services, in turn ''driving demand for broadband connections, and consequently encouraging more broadband investment and deployment,'' consistent with the goals of the 1996 Act.
55. Sections 225/255/251(a)(2): Ensuring Disabilities Access. We do not forbear from those provisions of Title II that ensure access to broadband Internet access service by individuals with disabilities. All Americans, including those with disabilities, must be able to reap the benefits of an open Internet, and ensuring access for these individuals will further the virtuous cycle of consumer demand, innovation, and deployment. This Order thus concludes that application of sections 225, 255, and 251(a)(2) is necessary to protect consumers and furthers the public interest, as explained in greater detail below.
56. Section 224: Ensuring Infrastructure Access. For broadband Internet access service, we do not forbear from section 224 and the Commission's associated procedural rules (to the extent they apply to telecommunications carriers and services and are, thus, within the Commission's forbearance authority). Section 224 of the Act governs the Commission's regulation of pole attachments. In particular, section 224(f)(1) requires utilities to provide cable system operators and telecommunications carriers the right of ''nondiscriminatory access to any pole, duct, conduit, or right-of-way owned or controlled'' by a utility. Access to poles and other infrastructure is crucial to the efficient deployment of communications networks including, and perhaps especially, new entrants.
57. Section 254: Promoting Universal Broadband. Section 254 promotes the deployment and availability of communications networks to all Americans, including rural and low-income Americans'--furthering our goals of more and better broadband. With the exception of section 254(d), (g), and (k) as discussed below, we therefore do not find the statutory test for forbearance from section 254 (and the related provision in section 214(e)) is met. We recognize that supporting broadband-capable networks is already a key component of Commission's current universal service policies. The Order concludes, however, that directly applying section 254 provides both more legal certainty for the Commission's prior decisions to offer universal service subsidies for deployment of broadband networks and adoption of broadband services and more flexibility going forward.
58. We partially forbear from section 254(d) and associated rules insofar as they would immediately require mandatory universal service contributions associated with broadband Internet access service.
59. Below, we first adopt three bright-line rules banning blocking, throttling, and paid prioritization, and make clear the no-unreasonable interference/disadvantage standard by which the Commission will evaluate other practices, according to their facts. These rules are grounded in multiple sources of statutory authority, including section 706 and Titles II and III of the Communications Act. Second, based on a current factual record, we reclassify broadband Internet access service as a telecommunications service under Title II. And, third, guided by our goals of more, better, and open broadband, we exercise our forbearance authority to put in place a ''light touch'' Title II regulatory framework that protects consumers and innovators, without deterring investment.
III. Report and Order on Remand: Protecting and Promoting the Open Internet Back to TopA. History of Openness Regulation60. These rules are the latest in a long line of actions by the Commission to ensure that American communications networks develop in ways that foster economic competition, technological innovation, and free expression. Ever since the landmark 1968 Carterfone decision, the Commission has recognized that communications networks are most vibrant, and best able to serve the public interest, when consumers are empowered to make their own decisions about how networks are to be accessed and utilized. Openness regulation aimed at safeguarding consumer choice has therefore been a hallmark of Commission policy for over forty years.
61. In Carterfone, the Commission confronted AT&T's practice of preventing consumers from attaching any equipment not supplied by AT&T to their home telephones, even if the attachment did not put the underlying network at risk. Finding AT&T's ''foreign attachment'' provisions unreasonable and unlawful, the Commission ruled that AT&T customers had the right to connect useful devices of their choosing to their home telephones, provided these devices did not adversely affect the telephone network.
62. Carterfone and subsequent regulatory actions by the Commission severed the market for customer premises equipment (CPE) from that for telephone service. In doing so, the Commission allowed new participants and new ideas into the market, setting the stage for a wave of innovation that produced technologies such as the answering machine, fax machine, and modem'--thereby removing a barrier to the development of the packet switched network that would eventually become the Internet.
63. Commitment to robust competition and open networks defined Commission policy at the outset of the digital revolution as well. In a series of influential decisions, known collectively as the Computer Inquiries, the Commission established a flexible regulatory framework to support development of the nascent information economy. The Computer Inquiries decisions separated the market for information services from the underlying network infrastructure, and imposed firm non-discrimination rules for network access. This system prevented network owners from engaging in anti-competitive behavior and spurred the development and adoption of new technologies.
64. The principles of open access, competition, and consumer choice embodied in Carterfone and the Computer Inquires have continued to guide Commission policy in the Internet era. As former Chairman Michael Powell noted in 2004, ''ensuring that consumers can obtain and use the content, applications and devices they want . . . is critical to unlocking the vast potential of the broadband Internet.'' In recognition of this fact, in 2005, the Commission unanimously approved the Internet Policy Statement, which laid out four guiding principles designed to encourage broadband deployment and ''preserve and promote the open and interconnected nature of the Internet.'' These principles sought to ensure that consumers had the right to access and use the lawful content, applications, and devices of their choice online, and to do so in an Internet ecosystem defined by competitive markets.
65. From 2005 to 2011, the principles embodied in the Internet Policy Statement were incorporated as conditions by the Commission into several merger orders and a key 700 MHz license, including the SBC/AT&T, Verizon/MCI, and Comcast/NBCU mergers and the Upper 700 MHz C block open platform requirements. Commission approval of these transactions was expressly conditioned on compliance with the Internet Policy Statement. During this time, open Internet principles were also applied to particular enforcement proceedings aimed at addressing anti-competitive behavior by service providers.
66. In June 2010, following a D.C. Circuit decision invalidating the Commission's exercise of ancillary authority to provide consumers basic protections in using broadband Internet services, the Commission initiated a Notice of Inquiry to ''seek comment on our legal framework for broadband Internet service.'' The Notice of Inquiry recognized that ''the current legal classification of broadband Internet service is based on a record that was gathered a decade ago.'' It sought comment on three separate alternative legal frameworks for classifying and regulating broadband Internet service: (1) As an information service, (2) as a telecommunications service ''to which all the requirements of Title II of the Communications Act would apply,'' and (3) solely as to the ''Internet connectivity service,'' as a telecommunications service with forbearance from most Title II obligations. The Notice of Inquiry sought comment on both wired and wireless broadband Internet services, ''as well as on other factual and legal issues specific to . . . wireless services that bear on their appropriate classification.''
67. In December 2010, the Commission adopted the Open Internet Order (76 FR 59192-01, Sept. 23, 2011), a codification of the policy principles contained in the Internet Policy Statement. The Open Internet Order was based on broadly accepted Internet norms and the Commission's long regulatory experience in preserving open and dynamic communications networks. The Order adopted three fundamental rules governing Internet service providers: (1) No blocking; (2) no unreasonable discrimination; and (3) transparency. The no-blocking rule and no-unreasonable discrimination rules prevented broadband service providers from deliberately interfering with consumers' access to lawful content, applications, and services, while the transparency rule promoted informed consumer choice by requiring disclosure by service providers of critical information relating to network management practices, performance, and terms of service.
68. The antidiscrimination rule contained in the Open Internet Order operated on a case-by-case basis, with the Commission evaluating the conduct of fixed broadband service providers based on a number of factors, including conformity with industry best practices, harm to competing services or end users, and impairment of free expression. This no unreasonable discrimination framework applied to commercial agreements between fixed broadband service providers and third parties to prioritize transmission of certain traffic to their subscribers. The Open Internet Order also specifically addressed paid prioritization arrangements. It did not entirely rule out the possibility of such agreements, but made clear that such ''pay for priority'' deals and the associated ''paid prioritization'' network practices were likely to be problematic in a number of respects. Paid prioritization ''represented a significant departure from historical and current practice'' that threatened ''great harm to innovation'' online, particularly in connection with the market for new services by edge providers. Paid priority agreements were also viewed as a threat to non-commercial end users, ''including individual bloggers, libraries, schools, advocacy organizations, and other speakers'' who would be less able to pay for priority service. Finally, paid prioritization was seen giving fixed broadband providers ''an incentive to limit the quality of service provided to non-prioritized traffic.'' As a result of these concerns, the Commission explicitly stated in the Open Internet Order that it was ''unlikely that pay for priority would satisfy the `no unreasonable discrimination' standard.''
69. In order to maintain flexibility, the Commission tailored the rules contained in the Open Internet Order to fit the technical and economic realities of the broadband ecosystem. To this end, the restrictions on blocking and discrimination were made subject to an exception for ''reasonable network management,'' allowing service providers the freedom to address legitimate needs such as avoiding network congestion and combating harmful or illegal content. Additionally, in order to account for then-perceived differences between the fixed and mobile broadband markets, the Open Internet Order exempted mobile service providers from the anti-discrimination rule, and only barred mobile providers from blocking ''consumers from accessing lawful Web sites'' or ''applications that compete with the provider's voice or video telephony services.'' Lastly, the Open Internet Order made clear that the rules did not prohibit broadband providers from offering specialized services such as VoIP; instead, the Commission announced that it would continue to monitor such arrangements to ensure that they did not pose a threat to Internet openness.
70. Verizon subsequently challenged the Open Internet Order in the U.S. Court of Appeals for the D.C. Circuit, arguing, among other things, that the Open Internet Order exceeded the Commission's regulatory authority and violated the Act. In January 2014, the D.C. Circuit upheld the Commission's determination that section 706 of the Telecommunications Act of 1996 granted the Commission authority to regulate broadband Internet service providers, and that the Commission had demonstrated a sound policy justification for the Open Internet Order. Specifically, the court sustained the Commission's findings that ''absent rules such as those set forth in the Open Internet Order, broadband providers represent a threat to Internet openness and could act in ways that would ultimately inhibit the speed and extent of future broadband deployment.''
71. Despite upholding the Commission's authority and the basic rationale supporting the Open Internet Order, the court struck down the no-blocking and antidiscrimination rules as at odds with section 3(51) of the Communications Act, holding that it prohibits the Commission from exercising its section 706 authority to impose common carrier regulation on a service not classified as a ''telecommunications service,'' and section 332(c)(2), which prohibits common carrier treatment of ''private mobile services.'' The D.C. Circuit vacated the no-blocking and antidiscrimination rules because it found that they impermissibly regulated fixed broadband providers as common carriers, which conflicted with the Commission's prior classification of fixed broadband Internet access service as an ''information service'' rather than a telecommunications service. Likewise, the court found that the no-blocking rule as applied to mobile broadband conflicted with the Commission's earlier classification of mobile broadband service as a private mobile service rather than a ''commercial mobile service.'' The Verizon court held that the ''no unreasonable discrimination'' standard adopted in the Open Internet Order was insufficiently distinguishable from the ''nondiscrimination'' standard applicable to common carriers. Central to the court's rationale was its finding that, as formulated in the Open Internet Order, both rules improperly limited fixed broadband Internet access providers' ability to engage in ''individualized bargaining.''
72. Following the D.C. Circuit's ruling, on May 15, 2014 the Commission issued a Notice of Proposed Rulemaking (2014 Open Internet NPRM) to respond to the lack of conduct-based rules to protect and promote an open Internet following the D.C. Circuit's opinion in Verizon v. FCC. The Commission began the NPRM with a fundamental question: ''What is the right public policy to ensure that the Internet remains open?'' While the NPRM put forth various proposals, it sought broad comment on alternative paths to the right public policy solution'--including areas such as the proper scope of the rules; the best ways to define, prevent, and treat violations of practices that may threaten an open Internet (including paid prioritization); enhancements to the transparency rule; and the appropriate source of legal authority to support new open Internet rules.
73. The Commission took many steps to facilitate public engagement in response to the 2014 Open Internet NPRM'--including the establishment of a dedicated email address to receive comments, a mechanism for submitting large numbers of comments in bulk via a Comma Separated Values (CSV) file, and the release of the entire record of comments and reply comments as Open Data in a machine-readable format, so that researchers, journalists, and other parties could analyze and create visualizations of the record. In addition, Commission staff hosted a series of roundtables covering a variety of topics related to the open Internet proceeding, including events focused on different policy approaches to protecting the open Internet, mobile broadband, enforcement issues, technology, broadband economics, and the legal issues surrounding the Commission's proposals.
74. The public seized on these opportunities to comment, submitting an unprecedented 3.7 million comments by the close of the reply comment period on September 15, 2014, with more submissions arriving after that date. This record-setting level of public engagement reflects the vital nature of Internet openness and the importance of our getting the answer right in this proceeding. Quantitative analysis of the comment pool reveals a number of key insights. For example, by some estimates, nearly half of all comments received by the Commission were unique. While there has been some public dispute as to the percentage of comments taking one position or another, it is clear that the majority of comments support Commission action to protect the open Internet. Comments regarding the continuing need for open Internet rules, their legal basis, and their substance formed the core of the overall body of comments. In particular, support for the reclassification of broadband Internet access under Title II, opposition to fast lanes and paid prioritization, and unease regarding the market power of broadband Internet access service providers were themes frequently addressed by commenters. In offering this summary, we do not mean to overlook the diversity of views reflected in the impressively large record in this proceeding. Most of all, we are grateful to the public for using the power of the open Internet to guide us in determining how best to protect it.
B. The Continuing Need for Open Internet Protections75. In its remand of the Commission's Open Internet Order, the D.C. Circuit affirmed the underlying basis for the Commission's open Internet rules, holding that ''the Commission [had] more than adequately supported and explained its conclusion that edge provider innovation leads to the expansion and improvement of broadband infrastructure.'' The court also found ''reasonable and grounded in substantial evidence'' the Commission's finding that Internet openness fosters the edge provider innovation that drives the virtuous cycle. The record on remand continues to convince us that broadband providers'--including mobile broadband providers'--have the incentives and ability to engage in practices that pose a threat to Internet openness, and as such, rules to protect the open nature of the Internet remain necessary. Today we take steps to ensure that the substantial benefits of Internet openness continue to be realized.
1. An Open Internet Promotes Innovation, Competition, Free Expression, and Infrastructure Deployment76. In the 2014 Open Internet NPRM, we sought comment on and expressed our continued commitment to an important principle underlying the Commission's prior policies'--that the Internet's openness promotes innovation, investment, competition, free expression, and other national broadband goals. The record before us convinces us that these findings, made by the Commission in 2010 and upheld by the D.C. Circuit, remain valid. If anything, the remarkable increases in investment and innovation seen in recent years'--while the rules were in place'--bear out the Commission's view. For example, in addition to broadband infrastructure investment, there has been substantial growth in the digital app economy, video over broadband, and VoIP, as well as a rise in mobile e-commerce. Overall Internet adoption has also increased since 2010. Both within the network and at its edges, investment and innovation have flourished while the open Internet rules were in force.
77. The record before us also overwhelmingly supports the proposition that the Internet's openness is critical to its ability to serve as a platform for speech and civic engagement, and that it can help close the digital divide by facilitating the development of diverse content, applications, and services. The record also supports the proposition that the Internet's openness continues to enable a ''virtuous [cycle] of innovation in which new uses of the network'--including new content, applications, services, and devices'--lead to increased end-user demand for broadband, which drives network improvements, which in turn lead to further innovative network uses.'' End users experienced the benefits of Internet openness that stemmed from the Commission's 2010 open Internet rules'--increased consumer choice, freedom of expression, and innovation.
2. Broadband Providers Have the Incentive and Ability To Limit Openness78. Broadband providers function as gatekeepers for both their end user customers who access the Internet, and for various transit providers, CDNs, and edge providers attempting to reach the broadband provider's end-user subscribers. As discussed in more detail below, broadband providers (including mobile broadband providers) have the economic incentives and technical ability to engage in practices that pose a threat to Internet openness by harming other network providers, edge providers, and end users.
a. Economic Incentives and Ability79. In the 2014 Open Internet NPRM, we sought to update the record with information about new and continuing incentives for broadband providers to limit Internet openness. As explained in detail in the Open Internet Order, broadband providers not only have the incentive and ability to limit openness, but they had done so in the past. (As the Commission explained in the Open Internet Order, examples such as the Madison River case, the Comcast-Bit Torrent case, and various mobile wireless Internet providers restricting customers' use of competitive payment applications, competitive voice applications, and remote video applications, indicate that broadband providers have the technical ability to act on incentives to harm the open Internet. The D.C. Circuit also found that these examples buttressed the Commission's conclusion that broadband providers' incentives and ability to restrict Internet traffic could interfere with the Internet's openness.) The D.C. Circuit found that the Commission ''adequately supported and explained'' that, absent open Internet rules, ''broadband providers represent a threat to Internet openness and could act in ways that would ultimately inhibit the speed and extent of future broadband deployment.'' The record generated in this proceeding convinces us that the Commission's conclusion in the Open Internet Order'--that providers of broadband have a variety of strong incentives to limit Internet openness'--remains valid today.
80. Broadband providers' networks serve as platforms for Internet ecosystem participants to communicate, enabling broadband providers to impose barriers to end-user access to the Internet on one hand, and to edge provider access to broadband subscribers on the other. This applies to both fixed and mobile broadband providers. Although there is some disagreement among commenters, the record provides substantial evidence that broadband providers have significant bargaining power in negotiations with edge providers and intermediaries that depend on access to their networks because of their ability to control the flow of traffic into and on their networks. Another way to describe this significant bargaining power is in terms of a broadband provider's position as gatekeeper'--that is, regardless of the competition in the local market for broadband Internet access, once a consumer chooses a broadband provider, that provider has a monopoly on access to the subscriber. Many parties demonstrated that both mobile and fixed broadband providers are in a position to function as a gatekeeper with respect to edge providers. Once the broadband provider is the sole provider of access to an end user, this can influence that network's interactions with edge providers, end users, and others. As the Commission and the court have recognized, broadband providers are in a position to act as a ''gatekeeper'' between end users' access to edge providers' applications, services, and devices and reciprocally for edge providers' access to end users. Broadband providers can exploit this role by acting in ways that may harm the open Internet, such as preferring their own or affiliated content, demanding fees from edge providers, or placing technical barriers to reaching end users. Without multiple, substitutable paths to the consumer, and the ability to select the most cost-effective route, edge providers will be subject to the broadband provider's gatekeeper position. The D.C. Circuit noted that the Commission ''convincingly detailed'' broadband providers' market position, which gives them ''the economic power to restrict edge-provider traffic and charge for the services they furnish edge providers,'' and further stated that the Commission reasonably explained that ''this ability to act as a `gatekeeper' distinguishes broadband providers from other participants in the Internet marketplace who have no similar `control [over] access to the Internet for their subscribers and for anyone wishing to reach those subscribers.''' (We find, for example, that even though edge providers may possess bargaining power, they do not have the same ability as broadband providers to control the flow of traffic or block access to the Internet. With respect to mobile, the presence of some additional retail competition is not enough to alter our conclusion here.) The ability of broadband providers to exploit this gatekeeper role could be mitigated if consumers multi-homed (i.e., bought broadband service from multiple networks). However, multi-homing is not widely practiced and imposes significant additional costs on consumers. The gatekeeper role could also be mitigated if a consumer could easily switch broadband providers. But, as discussed further below, the evidence suggests otherwise.
81. The broadband provider's position as gatekeeper is strengthened by the high switching costs consumers face when seeking a new service. Among the costs that consumers may experience are: High upfront device installation fees; long-term contracts and early termination fees; the activation fee when changing service providers; and compatibility costs of owned equipment not working with the new service. Bundled pricing can also play a role, as ''single-product subscribers are four times more likely to churn than triple-play subscribers.'' These costs may limit consumers' willingness and ability to switch carriers, if such a choice is indeed available. Commenters also point to an information problem, whereby consumers are unsure about the causes of problems or limitations with their services'--for example, whether a slow speed on an application is caused by the broadband provider or the edge provider'--and as such consumers may not feel that switching providers will resolve their Internet access issues. Additionally, consumers on unlimited data plans may be confused by slowed data speeds because broadband providers have not adequately communicated contractually-imposed data management practices and usage thresholds. Switching costs are also a critical factor that negatively impacts mobile broadband consumers, in particular due to the informational uncertainties mentioned below, among other reasons. Ultimately, when consumers face this kind of friction in switching to meaningful competitive alternatives, it decreases broadband provider' responsiveness to consumer demands and limits the provider's incentives to improve their networks. Additionally, 45 percent of households have only a single provider option for 25 Mbps/3 Mbps broadband service, indicating that 45 percent of households do not have any choices to switch to at this critical level of service.
82. Broadband providers may seek to gain economic advantages by favoring their own or affiliated content over other third-party sources. Technological advances have given broadband providers the ability to block content in real time, which allows them to act on their financial incentives to do so in order to cut costs or prefer certain types of content. Data caps or allowances, which limit the amount and type of content users access online, can have a role in providing consumers options and differentiating services in the marketplace, but they also can negatively influence customer behavior and the development of new applications. Similarly, broadband providers have incentives to charge for prioritized access to end users or degrade the level of service provided to non-prioritized content. When bandwidth is limited during peak hours, its scarcity can cause reliability and quality concerns, which increases broadband providers' ability to charge for prioritization. Such practices could result in so-called ''tolls'' for edge providers seeking to reach a broadband provider's subscribers, leading to reduced innovation at the edge, as well as increased rates for end users, reducing consumer demand, and further disrupting the virtuous cycle. Commenters expressed considerable concern regarding the harmful effects of paid prioritization on Internet openness. Further, as discussed above, a broadband provider's incentive to favor affiliated content or the content of unaffiliated firms that pay for it to do so, to block or degrade traffic, to charge edge providers for access to end users, and to disadvantage non-prioritized transmission all increase when end users are less able to respond by switching to rival broadband providers.
83. In addition to the harms outlined above, broadband providers' behavior has the potential to cause a variety of other negative externalities that hurt the open nature of the Internet. Broadband providers have incentives to engage in practices that will provide them short term gains but will not adequately take into account the effects on the virtuous cycle. In the Open Internet Order, the Commission found that the unaccounted-for harms to innovation are negative externalities, and are likely to be particularly large because of the rapid pace of Internet innovation, and wide-ranging because of the role of the Internet as a general purpose technology. Further, the Commission noted that a broadband provider may hesitate to impose costs on its own subscribers, but it will typically not take into account the effect that reduced edge provider investment and innovation has on the attractiveness of the Internet to end users that rely on other broadband providers'--and will therefore ignore a significant fraction of the cost of forgone innovation. The record supports our view that these negative externality problems have not disappeared, and in some cases, may be more prevalent. In order to mitigate these negative results, the Commission needs to act to promote Internet openness.
84. A final point on this question of economic incentives and ability is worth noting. Broadband providers have the ability to act as gatekeepers even in the absence of ''the sort of market concentration that would enable them to impose substantial price increases on end users.'' We therefore need not consider whether market concentration gives broadband providers the ability to raise prices. The Commission came to this conclusion in the Open Internet Order, and we conclude the same here. As the Commission noted in the Open Internet Order, threats to Internet-enabled innovation, growth, and competition do not depend on broadband providers having market power with respect to their end users. In Verizon, the court agreed, explaining that ''broadband providers' ability to impose restrictions on edge providers simply depends on end users not being fully responsive to the imposition of such restrictions.'' (We note further that, of course, our reclassification of broadband Internet access service as a ''telecommunications service'' subject to Title II below likewise does not rely on such a test or any measure of market power. Indeed, our reclassification decision is based on whether BIAS meets the statutory definition of a ''telecommunications service,'' and not any additional economic circumstances.) As we have concluded in this section, this remains true today. (We note, however, that in areas where there are limited competitive alternatives, this may exacerbate other problems such as the ability to switch from one provider to another.)
b. Technical Ability85. As the Commission explained in the Open Internet Order, past instances of abuse indicate that broadband providers have the technical ability to act on incentives to harm the open Internet. Broadband providers have a variety of tools at their disposal that can be used to monitor and regulate the flow of traffic over their networks'--giving them the ability to discriminate should they choose to do so. Techniques used by broadband providers to identify and select traffic may include approaches based on packet payloads (using deep packet inspection), network or transport layer headers (e.g., port numbers or priority markings), or heuristics (e.g., the size, sequencing, and/or timing of packets). Using these techniques, broadband providers may apply network practices to traffic that has a particular source or destination, that is generated by a particular application or by an application that belongs to a particular class of applications, that uses a particular application- or transport-layer protocol, or that is classified for special treatment by the user, application, or application provider. Application-specific network practices depend on the broadband provider's ability to identify the traffic associated with particular uses of the network. Some of these application-specific practices may be reasonable network management, e.g., tailored network security practices. However, some of these techniques may also be abused. Deep packet inspection, for example, may be used in a manner that may harm the open Internet, e.g., to limit access to certain Internet applications, to engage in paid prioritization, and even to block certain content. Similarly, traffic control algorithms can be abused, e.g., to give certain packets favorable placement in queues or to send packets along less congested routes in a manner contrary to end user preferences. Use of these techniques may ultimately affect the quality of service that users receive, which could effectively force edge providers to enter into paid prioritization agreements to prevent poor quality of content to end users.
3. Mobile Broadband Services86. We have discussed above the incentives and ability of broadband providers to act in ways that limit Internet openness, regardless of the specific technology platform used by the provider. A significant subject of discussion in the record, however, concerned mobile broadband providers specifically, and we therefore believe it is appropriate to address here the incentive and ability that these providers have to limit Internet openness. As the Commission noted in the Open Internet Order,''[c]onsumer choice, freedom of expression, end-user control, competition, and the freedom to innovate without permission are as important when end users are accessing the Internet via mobile broadband as via fixed.'' The Commission noted that ''there have been instances of mobile providers blocking certain third-party applications, particularly applications that compete with the provider's own offerings . . . .'' However, the Commission also noted the nascency of the mobile broadband industry, citing the recent development of ''app'' stores, and what it characterized at the time as ''new business models for mobile broadband providers, including usage-based pricing.'' Furthermore, the Commission at that time found that ''[m]obile broadband speeds, capacity, and penetration [were] typically much lower than for fixed broadband'' and noted that carriers had only begun to offer 4G service.
87. Citing these factors, as well as greater consumer choice, ''meaningful recent moves toward openness in and on mobile broadband networks,'' and the operational constraints faced by mobile broadband providers, the Commission applied its open Internet rules to mobile broadband, but distinguished between fixed and mobile broadband in some regards: While it applied the same transparency rule to both fixed and mobile network providers, it adopted a different no-blocking standard for mobile broadband Internet access service, and excluded mobile broadband from the unreasonable discrimination rule. In the 2014 Open Internet NPRM, the Commission tentatively concluded that it should maintain the same approach going forward, but recognized that there have been significant changes since 2010 in the mobile marketplace. The Commission sought comment on whether those changes should lead it to revisit the treatment of mobile broadband services.
88. Today, we find that changes in the mobile broadband marketplace warrant a revised approach. We find that the mobile broadband marketplace has evolved, and continues to evolve, but is no longer in a nascent stage. As discussed below, mobile broadband networks are faster, more broadly deployed, more widely used, and more technologically advanced than they were in 2010. We conclude that it would benefit the millions of consumers who access the Internet on mobile devices to apply the same set of Internet openness protections to both fixed and mobile networks.
89. Network connection speed and data consumption have exploded. For 2010, Cisco reported an average mobile network connection speed of 709 kbps. Since that time there has been massive expansion of mobile broadband networks, providing vastly increased download speeds. For 2013, Cisco reported an average mobile connection speed of 2,058 kbps. This increase in speed is partially due to the deployment of faster network technologies. Currently, mobile broadband networks provide coverage and services using a variety of 3G and 4G technologies, including, most importantly, LTE. As a consequence of the growing deployment of next generation networks, there has been an increase of more than 200,000 percent in the number of LTE subscribers, from approximately 70,000 in 2010 to over 140 million in 2014. Concurrent with these substantial changes in mobile broadband deployment and download speeds, mobile data traffic has exploded, increasing from 388 billion MB in 2010 to 3.23 trillion MB in 2013. AT&T reports that its wireless data traffic has grown 100,000 percent between 2007 and 2014 and 20,000 percent over the past five years. T-Mobile states that ''data usage continues to expand exponentially, with year-to-year increases of roughly 120 percent.''
90. As consumers use smartphones and tablets more, they increasingly rely on mobile broadband as a pathway to the Internet. The Internet Association argues that mobile Internet access is essential, since many Americans ''are wholly reliant on mobile wireless for Internet access.'' In addition, evidence shows that consumers in certain demographic groups, including low income and rural consumers and communities of color, are more likely to rely on mobile as their only access to the Internet. Citing data from the Pew Research Center's Internet & American Life Project, OTI states that ''[t]he share of Americans relying exclusively on their smartphone[s] to access the Internet is far higher among Hispanics, Blacks, and adults aged 18-29, and households earning less than $30,000 a year.'' According to data from the National Health Interview Survey, 44 percent of households were ''wireless-only'' during January-June 2014, compared to 31.6 percent during January-June 2011. These data also show that 59.1 percent of adults living in poverty reside in wireless-only households, relative to 40.8 percent of higher income adults. Additionally, rural consumers and businesses often have access to fewer options for Internet service, meaning that these customers may have limited alternatives when faced with restrictions to Internet openness imposed by their mobile provider. Furthermore, just as consumer reliance on mobile broadband has grown, edge providers increasingly rely on mobile broadband to reach their customers. Microsoft states, for example, that, ''with `the pressure . . . only increasing to either go mobile or go home,' edge providers frequently introduce new edge services on mobile platforms first, and the success or failure of these edge providers' businesses often depends in large part on their mobile offerings.''
91. Furthermore, the technology underlying today's mobile broadband networks, as compared to those deployed in 2010, not only provides operators with a greater ability to manage their networks consistent with the rules we adopt today, but also gives those operators a greater ability to engage in conduct harmful to the virtuous cycle in the absence of open Internet rules. As discussed above, certain behaviors by broadband providers may impose negative externalities on the Internet ecosystem, resulting in less innovation from edge providers. We find that the same is true today for mobile wireless broadband providers, particularly as mobile broadband technology has become more widespread and mobile broadband services have become more integrated into the economy.
92. In view of the evidence showing the evolution of the mobile broadband marketplace, we conclude that it would best serve the public interest to revise our approach for mobile broadband services and apply the same openness requirements as those applied to providers of fixed broadband services. The Commission has long recognized that the Internet should remain open for consumers and innovators alike, regardless of the different technologies and services through which it may be accessed. Although the Commission found in 2010 that conditions at that time warranted a more limited application of open Internet rules to mobile broadband services, it nevertheless recognized the importance of freedom and openness for users of mobile broadband networks, finding that ''consumer choice, freedom of expression, end-user control, competition, and the freedom to innovate without permission are as important when end users are accessing the Internet via mobile broadband as via fixed.'' In contrast to the state of the mobile broadband marketplace when the Commission adopted the 2010 open Internet rules, the evidence in the record today shows how mobile broadband services have evolved to become essential, critical means of access to the Internet for millions of consumers every day. Because of this evolution and the widespread use of mobile broadband services, maintaining a regime under which fewer protections apply in a mobile environment risks creating a substantively different Internet experience for mobile broadband users as compared to fixed broadband users. Broadband users should be able to expect that they will be entitled to the same Internet openness protections no matter what technology they use to access the Internet. We agree with arguments made by a large number of commenters that applying a consistent set of requirements will help ensure that all consumers can benefit from full access to an open and robust Internet. We note that evidence in the record indicates that mobile broadband providers themselves have recognized the importance of open Internet practices for mobile broadband consumers.
93. Despite their support of open Internet principles, several of the nationwide mobile providers oppose broader openness requirements for mobile broadband, arguing that additional rules are unnecessary in the mobile broadband market. T-Mobile, for example, argues that ''robust retail competition in the mobile broadband market already constrains mobile provider behavior.'' Verizon comments that ''consumer choice and competition also have ensured a differentiated marketplace in which providers routinely develop innovative offerings designed to outcompete competitors' offerings.'' AT&T contends that additional rules are unnecessary as mobile broadband providers are already investing in the networks, innovating, reducing prices, and thriving. CTIA contends that ''the robust competitive conditions in the mobile broadband marketplace are a defining differentiator'' and that ''any new open Internet framework should account for the competitive mobile dynamic.''
94. Based upon the significant changes in mobile broadband since 2010 discussed above, including the increased use of mobile broadband and the greater ability of mobile broadband providers to engage in conduct harmful to the virtuous cycle, we are not persuaded that maintaining fewer open Internet protections for consumers of mobile broadband services would serve the public interest. Contrary to provider arguments that applying a broader set of openness requirements will stifle innovation and chill investment, we find that the rules we adopt today for all providers of services will promote innovation, investment, and competition. As we discuss above, an open Internet enables a virtuous cycle where new uses of the network drive consumer demand, which drives network improvements, which result in further innovative uses. We agree with commenters that ''mobile is a key component'' of the virtuous cycle. OTI comments that ''a variety of economic analyses suggest that the Internet's openness is a key driver of its value . . . . Other economic studies have found that non-neutral conditions in the broadband market might maximize profits for broadband providers but would ultimately minimize consumer welfare . . . . There is significant evidence that a vibrant and neutral online economy is critical for a healthy technology industry, which is a significant creator of jobs in the U.S.'' We find that these arguments apply to mobile broadband providers as well as to fixed, and apply even though there may be more competition among mobile broadband providers.
95. We note that the Commission's experience with applying open platform rules to Upper 700 MHz C Block licensees, including Verizon Wireless, has shown that openness principles can be applied to mobile services without inhibiting a mobile provider's ability to compete and be successful in the marketplace. We find that it is reasonable to conclude that, even with broader application of Internet openness requirements, mobile broadband providers will similarly continue to compete and develop innovative products and services. We also expect that the force of consumer demand that led mobile broadband providers to invest in their networks over the past four years will likely continue to drive substantial investments in mobile broadband networks under the open Internet regime we adopt today.
96. Although mobile providers generally argue that additional rules are not necessary to deter practices that would limit Internet openness, concerns related to the openness practices of mobile broadband providers have arisen. As we noted in the 2014 Open Internet NPRM, in 2012, the Commission reached a $1.25 million settlement with Verizon for restricting tethering apps on Verizon smartphones, based on openness requirements attached to Verizon's Upper 700 MHz C Block licenses. Also in 2012, consumers complained when they encountered problems accessing Apple's FaceTime application on AT&T's network. More recently, significant concern has arisen when mobile providers' have attempted to justify certain practices as reasonable network management practices, such as applying speed reductions to customers using ''unlimited data plans'' in ways that effectively force them to switch to price plans with less generous data allowances. As Consumers Union observes, many mobile broadband provider practices are non-transparent, because customers receive ''no warning or explanation of when their speeds will be slowed down.'' Other commenters such as OTI also cite mobile providers' blocking of the Google Wallet e-payment application. Although providers claimed that the blocking was justified based on security concerns, OTI notes that ''this carrier behavior raised anticompetitive concerns when AT&T, Verizon and T-Mobile later unveiled their own mobile payment application, a competitor to Google Wallet . . . .'' Microsoft also describes further potential for abuse based on its experience in other countries without open Internet protections, claiming, for example, that ''several broadband access providers around the world have interfered or degraded Skype traffic on their networks.'' A recent survey of European Internet users found that respondents reported experiencing problems with ''blocking of internet content.'' Mobile services notably accounted for a significant percentage of negative experiences reported in the survey. OTI argues that, even with competition, mobile providers have an interest in seeking rents from edge providers and ''in securing a competitive advantage for their own competing apps, content and services.'' We agree, and find that the rules we adopt today for mobile network providers will help guard against future incidents that have the potential to affect Internet openness and undermine a mobile broadband consumer's right to access a free and open Internet.
97. In addition, we agree with those commenters that argue that mobile broadband providers have the incentives and ability to engage in practices that would threaten the open nature of the Internet, in part due to consumer switching costs. Switching costs are a significant factor in enabling the ability of mobile broadband providers to act as gatekeepers. Microsoft states that ''for the large number of applications that are available only in the mobile context, mobile broadband access providers today can be an edge provider's only option for reaching a particular end user,'' and argues that, because of high switching costs, few mobile broadband consumers routinely switch providers. Therefore, Microsoft argues, ''even if there is more than one mobile broadband access provider in a specific market, there may not be effective competitive alternatives (for edge providers or consumers) and these mobile broadband access providers retain the ability to act in a manner that undermines the competitive neutrality of the online marketplace.''
98. The level of wireless churn, when viewed in conjunction with data on consumer satisfaction, is consistent with the existence of important switching costs for customers. Based on results from surveys, OTI and Consumers Union argue that switching costs have depressed mobile wireless churn rates, meaning that customers may remain with their service providers even when they are dissatisfied. Consumers Union cites a February 2015 Consumer Reports survey showing that ''27 percent of mobile broadband consumer[s] who are dissatisfied with their mobile broadband service provider are reluctant to switch carriers'' due to several factors. That many customers stay with their mobile wireless providers, despite expressing dissatisfaction with their current provider and despite the availability of alternate plans from other providers, suggests the presence of significant barriers to switching. Furthermore, this has been a period of market and spectrum consolidation, which has decreased the choices available to consumers in many parts of the country. For example, Vonage argues that ''recent mergers between AT&T and Leap, and T-Mobile and MetroPCS have reduced the ability of wireless end users to switch to competing providers in the event of potential discrimination against the edge services they may want to access.'' Choices may be particularly limited in rural areas, both because fewer service providers tend to operate in these regions and because consumers may encounter difficulties in porting their numbers from national to local service providers.
99. Switching costs may arise due to a number of factors that affect mobile consumers. For example, consumers may face costs due to informational uncertainty, particularly in the context of concerns over open Internet restrictions. The provision of wireless service involves the interaction between the wireless network operator, the various edge providers, the customer's handset or other equipment, and the conditions present in the specific location the customer wishes to use the service. In this environment, it can be very difficult for customers to ascertain the source of a service disruption, and hence whether switching wireless providers would solve the problem. Additionally, product differentiation can make it difficult for consumers to compare plans, which may also increase switching costs. Finally, customers may face a variety of hassle-related and financial switching costs. Disconnecting an existing service and activating a new one may involve early termination fees (ETFs), coordinating with multiple members of a family plan, billing set-up, transferring personal files, and porting phone numbers, each of which may create delays or difficulties for customers. As part of this process, some customers may need to replace their equipment, which may not be compatible with their new mobile service provider's network. OTI and Consumers Union argue that moving multiple members of a shared or family plan may be particularly expensive, since ''[n]ot only do groups face the cost of multiple ETFs, but frequently the contract termination dates become nonsynchronous due to the addition of new lines and individuals upgrading their devices at different points in time.'' Furthermore, OTI and Consumers Union argue that these costs affect an increasingly large proportion of consumers, since the penetration of shared plans has increased such that the majority of AT&T and Verizon Wireless customers now have shared plans.
100. AT&T, T-Mobile, and Verizon argue that the factors that led the Commission to adopt a more limited set of openness rules for mobile in 2010 remain valid today. They argue that mobile broadband networks should not be viewed as mature as mobile technologies continue to develop and evolve. They also contend that the extraordinary growth in use of mobile broadband services requires that providers have more flexibility to be able to handle the increased traffic and ensure quality of service for subscribers. T-Mobile, for example, asserts that ''while mobile networks are more robust and offer greater speeds and capacity than they did when the 2010 rules were enacted, they also face greater demands; their need for agile and dynamic network management tools has actually increased.''
101. We recognize that mobile service providers must take into account factors such as mobility and reliance on spectrum. As discussed more fully below in the context of each of the rules, however, we find that the requirements we adopt today are sufficiently tailored to provide carriers with the flexibility they need to accommodate these conditions. Moreover, as described further below, we conclude that retaining an exception to the no-blocking rule, the no-throttling rule, and the no-unreasonable interference/disadvantage standard we adopt today for reasonable network management will allow sufficient flexibility for mobile service providers.
4. The Commission Must Act To Preserve Internet Openness102. Given that broadband providers'--both fixed and mobile'--have both the incentives and ability to harm the open Internet, we again conclude that the relatively small incremental burdens imposed by our rules are outweighed by the benefits of preserving the open nature of the Internet, including the continued growth of the virtuous cycle of innovation, consumer demand, and investment. We note, for example, that the disclosure requirements adopted in this order are widely understood, have industry-based definitions, and are commonly used in commercial Service Level Agreements by many broadband providers. Open Internet rules benefit investors, innovators, and end users by providing more certainty to each regarding broadband providers' behavior, and helping to ensure the market is conducive to optimal use of the Internet. Open Internet rules are also critical for ensuring that people living and working in rural areas can take advantage of the substantial benefits that the open Internet has to offer. In minority communities where many individuals' only Internet connection may be through a mobile device, robust open Internet rules help make sure these communities are not negatively impacted by harmful broadband provider conduct. Such rules additionally provide essential safeguards to ensure that the Internet flourishes as a platform for education and research.
103. The Commission's historical open Internet policies and rules have blunted the incentives, discussed above, to engage in behavior harmful to the open Internet. Commenters who argue that rules are not necessary overlook the role that the Commission's rules and policies have played in fostering that result. Without rules in place to protect the open Internet, the overwhelming incentives broadband providers have to act in ways that are harmful to investment and innovation threaten both broadband networks and edge content. Paid prioritization agreements, for example, have the potential to distort the market by causing prices not to reflect efficient cost recovery and by altering consumer choices for content and edge providers. The record reflects the view that paid arrangements for priority treatment, such as broadband providers discriminating among content providers or prioritizing one provider's or its own content over others, likely damage the open Internet, harming competition and consumer choice. Additionally, blocking and throttling harm a consumer's right to access lawful content, applications, and services, and to use non-harmful devices.
C. Strong Rules That Protect Consumers From Practices That Can Threaten the Open Internet104. We are keenly aware that in the wake of the Verizon decision, there are no rules in place to prevent broadband providers from engaging in conduct harmful to Internet openness, such as blocking a consumer from accessing a requested Web site or degrading the performance of an innovative Internet application. (We acknowledge other laws address behavior similar to that which our rules are designed to prevent; however, as discussed below, we do not find existing laws sufficient to adequately protect consumers' access to the open Internet. For example, some parties have suggested that existing antitrust laws would address discriminatory conduct of an anticompetitive nature. We also note that certain ''no blocking'' obligations continue to apply to the use of Upper 700 MHz C Block licenses.) While many providers have indicated that, at this time, they do not intend to depart from the previous rules, an open Internet is too important to consumers and innovators to leave unprotected. Therefore, we today reinstate strong, enforceable open Internet rules. As in 2010, we believe that conduct-based rules targeting specific practices are necessary.
105. No-Blocking. First, we adopt a bright-line rule prohibiting broadband providers from blocking lawful content, applications, services, or non-harmful devices. This ''no-blocking'' principle has long been a cornerstone of the Commission's policies. While first applied in the Internet context as part of the Commission's Internet Policy Statement, the no-blocking concept dates back to the Commission's protection of end users' rights to attach lawful, non-harmful devices to communications networks.
106. No-Throttling. Second, we adopt a separate bright-line rule prohibiting broadband providers from impairing or degrading lawful Internet traffic on the basis of content, application, service, or use of non-harmful device. This conduct was prohibited under the commentary to the no-blocking rule adopted in the 2010 Open Internet Order. However, to emphasize the importance of this concept we delineate under a separate rule a ban on impairment or degradation, to prevent broadband providers from engaging in behavior other than blocking that negatively impacts consumers' use of content, applications, services, and devices.
107. No Paid Prioritization. Third, we respond to the deluge of public comment expressing deep concern about paid prioritization. Under the rule we adopt today, the Commission will ban all paid prioritization subject to a narrow waiver process.
108. No-Unreasonable Interference/Disadvantage Standard. In addition to these three bright-line rules, we also set forth a no-unreasonable interference/disadvantage standard, under which the Commission can prohibit practices that unreasonably interfere with the ability of consumers or edge providers to select, access, and use broadband Internet access service to reach one another, thus causing harm to the open Internet. This no-unreasonable interference/disadvantage standard will operate on a case-by-case basis and is designed to evaluate other current or future broadband Internet access provider policies or practices'--not covered by the bright-line rules'-- and prohibit those that harm the open Internet.
109. Transparency Requirements. We also adopt enhancements to the existing transparency rule to more effectively serve end-user consumers, edge providers of broadband products and services, and the Internet community. These enhanced transparency requirements are modest in nature, and we decline to adopt requirements proposed in the NPRM that raised concern for smaller broadband providers in particular, such as disclosures as to the source of congestion.
1. Clear, Bright Line Rules110. The record in this proceeding reveals that three practices in particular demonstrably harm the open Internet: Blocking, throttling, and paid prioritization. For the reasons described below, we find each of these practices is inherently unjust and unreasonable, in violation of section 201(b) of the Act, and that these practices threaten the virtuous cycle of innovation and investment that the Commission intends to protect under its obligation and authority to take steps to promote broadband deployment under section 706 of the 1996 Act. We accordingly adopt bright-line rules banning blocking, throttling, and paid prioritization by providers of both fixed and mobile broadband Internet access service.
a. Preventing Blocking of Lawful Content, Applications, Services, and Non-Harmful Devices111. We continue to find, for the same reasons the Commission found in the 2010 Open Internet Order and reiterated in the 2014 Open Internet NPRM, that ''the freedom to send and receive lawful content and to use and provide applications and services without fear of blocking is essential to the Internet's openness.'' Because of broadband providers' incentives to block competitors' content, the need to protect a consumer's right to access lawful content, applications, services, and to use non-harmful devices is as important today as it was when the Commission adopted the first no-blocking rule in 2010.
112. In the 2014 Open Internet NPRM, the Commission tentatively concluded that it should re-adopt the text of the vacated no-blocking rule. The record overwhelmingly supports the notion of a no-blocking principle and re-adopting the text of the original rule. (A broad cross-section of broadband providers, edge providers, public interest organizations, and individuals support this approach.) Further, we note that many broadband providers still voluntarily continue to abide by the 2010 no-blocking rule, even though they have not been legally required to do so by a rule of general applicability since the Verizon decision. After consideration of the record and guidance from the D.C. Circuit, we adopt the following no-blocking rule applicable to both fixed and mobile broadband providers of broadband Internet access service:
113. Similar to the 2010 no-blocking rule, the phrase ''content, applications, and services'' again refers to all traffic transmitted to or from end users of a broadband Internet access service, including traffic that may not fit clearly into any of these categories. Further, the no-blocking rule adopted today again applies to transmissions of lawful content and does not prevent or restrict a broadband provider from refusing to transmit unlawful material, such as child pornography or copyright-infringing materials. (Similar to the 2010 no-blocking rule, this obligation does not impose any independent legal obligation on broadband providers to be the arbiter of what is lawful.) Today's no-blocking rule also entitles end users to connect, access, and use any lawful device of their choice, provided that the device does not harm the network. The no-blocking rule prohibits network practices that block a specific application or service, or any particular class of applications or services, unless it is found to be reasonable network management. Finally, as with the 2010 no-blocking rule, today's no-blocking rule prohibits broadband providers from charging edge providers a fee to avoid having the edge providers' content, service, or application blocked from reaching the broadband provider's end-user customer. (We note that during oral argument in the Verizon case, Verizon told the court that ''in paragraph 64 of the Order the Agency also sets forth the no charging of edge providers rule as a corollary to the no blocking rule, and that's a large part of what is causing us our harm here.'' In response, Judge Silberman stated, ''if you were allowed to charge, which are you assuming you're allowed to charge because of the anti-common carrier point of view, if somebody refused to pay then just like in the dispute between C[B]S and Warner, Time Warner . . . you could refuse to carry.'' Verizon's counsel responded: ''[r]ight.'' Verizon Oral Arg. Tr. at 28.)
114. Rejection of the Minimum Level of Access Standard. The 2014 Open Internet NPRM proposed that the no-blocking rule would prohibit broadband providers from depriving edge providers of a minimum level of access to the broadband provider's subscribers and sought comment on how to define that minimum level of service. After consideration of the record, we reject the minimum level of access standard. Broadband providers, edge providers, public interest organizations, and other parties note the practical and technical difficulties associated with setting any such minimum level of access. For example, some parties note the uncertainty created by an indefinite standard. Other parties observe that in creating any such standard of service for no-blocking, the Commission risks jeopardizing innovation. We agree with these arguments and many others in the record expressing concern with the proposed minimum level of access standard.
115. The no-blocking rule we adopt today prohibits broadband providers from blocking access to lawful Internet content, applications, services, and non-harmful devices. We believe that this approach will allow broadband providers to honor their service commitments to their subscribers without relying upon the concept of a specified level of service to those subscribers or edge providers under the no-blocking rule. We further believe that the separate no-throttling rule discussed below provides appropriate protections against harmful conduct that degrades traffic but does not constitute outright blocking.
116. Application of the No-Blocking Rule to Mobile. In 2010, the Commission limited the no-blocking rule for mobile to lawful Web sites and applications that competed with a provider's voice or video telephony services, subject to reasonable network management. The 2014 Open Internet NPRM, citing ''the operational constraints that affect mobile broadband services, the rapidly evolving nature of the mobile broadband technologies, and the generally greater amount of consumer choice for mobile broadband services than for fixed,'' proposed to retain the 2010 no-blocking rule. The Commission sought comment on this proposal.
117. For the reasons set forth above, including consumer expectations, the Commission's experience with open Internet regulations in the 700 MHz C Block, and the advances in the mobile broadband industry since 2010, we conclude instead that the same no-blocking rule should apply to both fixed and mobile broadband Internet access services. Accordingly, as with fixed service, a consumer's mobile broadband provider cannot block a consumer from accessing lawful content, applications, services, or non-harmful devices, regardless of whether the content, applications, services, or devices (In evaluating the reasonable network management exception to the no-blocking rule, the Commission will drawing upon its experience with the no-blocking rule in the 700 MHz C Block.) compete with a provider's own offerings, subject to reasonable network management.
118. All national mobile broadband providers, among others, opposed the application of the broader no-blocking rule to mobile broadband, arguing, for example, that mobile broadband providers need the ability to block unwanted traffic and spam. They also argue that the particular challenges of managing a mobile broadband network, for example the unknown effects of apps, require additional flexibility to block traffic. As discussed below, we recognize that additional flexibility may be required in mobile network management practices, but find that the reasonable network management exception we adopt today allows sufficient flexibility: The blocking of harmful or unwanted traffic remains a legitimate network management purpose, and is permissible when pursued through reasonable network management practices.
b. Preventing Throttling of Lawful Content, Applications, Services, and Non-Harmful Devices119. In the 2014 Open Internet NPRM, the Commission proposed that degradation of lawful content or services below a specified level of service would violate a no-blocking rule. While certain broadband Internet access provider conduct may result in degradation of an end user's Internet experience that is tantamount to blocking, we believe that this conduct requires delineation in an explicit rule rather than through commentary as part of the no-blocking rule. Thus, we adopt a separate no-throttling rule applicable to both fixed and mobile providers of broadband Internet access service:
120. With the no-throttling rule, we ban conduct that is not outright blocking, but inhibits the delivery of particular content, applications, or services, or particular classes of content, applications, or services. Likewise, we prohibit conduct that impairs or degrades lawful traffic to a non-harmful device or class of devices. We interpret this prohibition to include, for example, any conduct by a broadband Internet access service provider that impairs, degrades, slows down, or renders effectively unusable particular content, services, applications, or devices, that is not reasonable network management. For purposes of this rule, the meaning of ''content, applications, and services'' has the same as the meaning given to this phrase in the no-blocking rule. Like the no-blocking rule, broadband providers may not impose a fee on edge providers to avoid having the edge providers' content, service, or application throttled. Further, transfers of unlawful content or unlawful transfers of content are not protected by the no-throttling rule. We will consider potential violations of the no-throttling rule under the enforcement provisions outlined below.
121. We find that a prohibition on throttling is as necessary as a rule prohibiting blocking. Without an equally strong no-throttling rule, parties note that the no-blocking rule will not be as effective because broadband providers might otherwise engage in conduct that harms the open Internet but falls short of outright blocking. For example, the record notes the existence of numerous practices that broadband providers can engage in to degrade an end user's experience.
122. Because our no-throttling rule addresses instances in which a broadband provider targets particular content, applications, services, or non-harmful devices, it does not address a practice of slowing down an end user's connection to the Internet based on a choice made by the end user. For instance, a broadband provider may offer a data plan in which a subscriber receives a set amount of data at one speed tier and any remaining data at a lower tier. If the Commission were concerned about the particulars of a data plan, it could review it under the no-unreasonable interference/disadvantage standard. In contrast, if a broadband provider degraded the delivery of a particular application (e.g., a disfavored VoIP service) or class of application (e.g., all VoIP applications), it would violate the bright-line no-throttling rule. We note that user-selected data plans with reduced speeds must comply with our transparency rule, such that the limitations of the plan are clearly and accurately communicated to the subscriber.
123. The no-throttling rule also addresses conduct that impairs or degrades content, applications, or services that might compete with a broadband provider's affiliated content. For example, if a broadband provider and an unaffiliated entity both offered over-the-top applications, the no-throttling rule would prohibit broadband providers from constraining bandwidth for the competing over-the-top offering to prevent it from reaching the broadband provider's end user in the same manner as the affiliated application.
124. As in the 2010 Open Internet Order, we continue to recognize that in order to optimize the end-user experience, broadband providers must be permitted to engage in reasonable network management practices. We emphasize, however, that to be eligible for consideration under the reasonable network management exception, a network management practice that would otherwise violate the no-throttling rule must be used reasonably and primarily for network management purposes, and not for business purposes. (While not within the definition of ''throttling'' for purposes of our no-throttling rule, the slowing of subscribers' content on an application agnostic basis, including as an element of subscribers' purchased service plans, will be evaluated under the transparency rule and the no-unreasonable interference/disadvantage standard.)
c. No Paid Prioritization125. In the 2014 Open Internet NPRM, the Commission sought comment on suggestions to impose a flat ban on paid prioritization services, including whether all paid prioritization practices, or some of them, could be treated as per se violations of the commercially-reasonable standard or any other standard based on any source of legal authority. For reasons explained below, we conclude that paid prioritization network practices harm consumers, competition, and innovation, as well as create disincentives to promote broadband deployment and, as such, adopt a bright-line rule against such practices. Accordingly, today we ban arrangements in which the broadband service provider accepts consideration (monetary or otherwise) from a third party to manage the network in a manner that benefits particular content, applications, services, or devices. We also ban arrangements where a provider manages its network in a manner that favors the content, applications, services or devices of an affiliated entity. (We consider arrangements of this kind to be paid prioritization, even when there is no exchange of payment or other consideration between the broadband Internet access service provider and the affiliated entity.) Any broadband provider that engages in such practices will be subject to enforcement action, including forfeitures and other penalties. (Other forms of traffic prioritization, including practices that serve a public safety purpose, may be acceptable under our rules as reasonable network management.) We adopt the following rule banning paid prioritization arrangements:
126. The paid prioritization ban we adopt today is based on the record that has developed in this proceeding. The record is rife with commenter concerns regarding preferential treatment arrangements, with many advocating a flat ban on paid prioritization. Commenters assert that permitting paid prioritization will result in the bifurcating of the Internet into a ''fast'' lane for those willing and able to pay and a ''slow'' lane for everyone else. As several commenters observe, allowing for the purchase of priority treatment can lead to degraded performance'--in the form of higher latency, increased risk of packet loss, or, in aggregate, lower bandwidth'--for traffic that is not covered by such an arrangement. Commenters further argue that paid prioritization will introduce artificial barriers to entry, distort the market, harm competition, harm consumers, discourage innovation, undermine public safety and universal service, and harm free expression. Vimeo, for instance, argues that paid prioritization ''would disadvantage user-generated video and independent filmmakers'' that lack the resources of major film studios to pay priority rates for dissemination of content. Engine Advocacy meanwhile asserts that ''[s]ome unfunded early startups may not be able to afford [to pay for priority treatment] (particularly if the product would be data-intensive) and will not start a company,'' resulting in ''reduce[d] entrepreneurship.'' Commenters assert that if paid prioritization became widespread, it would make reliance on consumers' ordinary, non-prioritized access to the Internet an increasingly unattractive and competitively nonviable option. The Commission's conclusion is supported by a well-established body of economic literature, (The access provided by the core network is an intermediate input into the myriad of final products produced by edge providers. While it is granted that for a firm selling final goods, price discrimination can be both profitable and enhance welfare, it has been argued that the reverse is also true when intermediate goods are considered.) including Commission staff working papers.
127. It is well-established that broadband providers have both the incentive and ability to engage in paid prioritization. In its Verizon opinion, the DC Circuit noted that providers ''have powerful incentives to accept fees from edge providers, either in return for excluding their competitors or for granting them prioritized access to end users.'' Indeed, at oral argument Verizon's counsel announced that ''but for [the 2010 Open Internet Order] rules we would be exploring [such] commercial arrangements.'' While we appreciate that several broadband providers have claimed that they do not engage in paid prioritization or that they have no plans to do so, (For example, we note that in Verizon's letter to Chairman Leahy, the company states ''[a]s we have said before, and affirm again here, Verizon has no plans to engage in paid prioritization of Internet traffic.'' Verizon Letter to Leahy at 1. However, in contrast to this statement, at oral argument in the Verizon case, counsel for Verizon explained that the company would pursue such arrangements if not for the 2010 Open Internet rules which prevented them.) such statements do not have the force of a legal rule that prevents them from doing so in the future. The future openness of the Internet should not turn on the decision of a particular company. We are concerned that if paid prioritization practices were to become widespread, the damage to Internet openness could be difficult to reverse. We agree that ''[u]nraveling a web of discriminatory deals after significant investments have been made, business plans have been built, and technologies have been deployed would be a complicated undertaking both logistically and politically.'' Further, documenting the harms could prove challenging, as it is impossible to identify small businesses and new applications that are stifled before they become commercially viable. Prioritizing some traffic over others based on payment or other consideration from an edge provider could fundamentally alter the Internet as a whole by creating artificial motivations and constraints on its use, damaging the web of relationships and interactions that define the value of the Internet for both end users and edge providers, and posing a risk of harm to consumers, competition, and innovation. Thus, because of the very real concerns about the chilling effects that preferential treatment arrangements could have on the virtuous cycle of innovation, consumer demand, and investment, we adopt a bright-line rule banning paid prioritization arrangements. (Some commenters argue that consumer disclosures about such practices are sufficient. However, the average consumer does not have the time or specialized knowledge to sort through the implications, and regardless, in many areas of the country, consumers simply do not have multiple, equivalent choices.)
128. In arguing against such a ban, ADTRAN asserts that it would ''cement the advantages enjoyed by the largest edge providers that presently obtain the functional equivalent of priority access by constructing their own extensive networks that interconnect directly with the ISPs.'' We reject this argument. CDT correctly observes that ''[e]stablished entities with substantial resources will always have a variety of advantages'' over less established ones, notwithstanding any rules we adopt. We do not seek to disrupt the legitimate benefits that may accrue to edge providers that have invested in enhancing the delivery of their services to end users. On the contrary, such investments may contribute to the virtuous cycle by stimulating further competition and innovation among edge providers, to the ultimate benefit of consumers. We also clarify that the ban on paid prioritization does not restrict the ability of a broadband provider and CDN to interconnect.
129. We find that a flat ban on paid prioritization has advantages over alternative approaches identified in the record. Prohibiting this practice outright will help to foster broadband network investment by setting clear boundaries of acceptable and unacceptable behavior. It will also protect consumers against a harmful practice that may be difficult to understand, even if disclosed. In addition, this approach relieves small edge providers, innovators, and consumers of the burden of detecting and challenging instances of harmful paid prioritization. Given the potential harms to the virtuous cycle, we believe it is more appropriate to impose an ex ante ban on such practices, while entertaining waiver requests under exceptional circumstances.
130. Under our longstanding waiver rule, the Commission may waive any rule ''in whole or in part, for good cause shown.'' General waiver of the Commission's rules is appropriate only if special circumstances warrant a deviation from the general rule, and such a deviation will serve the public interest. In some cases, however, the Commission adopts specific rules concerning the factors that will be used to examine a waiver or exemption request. We believe that such guidance is appropriate here to make clear the very limited circumstances in which the Commission would be willing to allow paid prioritization. Accordingly, we adopt a rule concerning waiver of the paid prioritization ban that establishes a balancing test, as follows:
131. In support of any waiver request, the applicant therefore must make two related showings. First, the applicant must demonstrate that the practice will have some significant public interest benefit, such as providing evidence that the practice furthers competition, innovation, consumer demand, or investment. Second, the applicant must demonstrate that the practice does not harm the nature of the open Internet, including, but not limited to, providing evidence that the practice:
Does not materially degrade or threaten to materially degrade the broadband Internet access service of the general public;does not hinder consumer choice;does not impair competition, innovation, consumer demand, or investment; anddoes not impede any forms of expressions, types of service, or points of view.132. An applicant seeking waiver relief under this rule faces a high bar. We anticipate granting such relief only in exceptional cases. (For instance, several commenters argue that paid prioritization arrangements could improve the provision of telemedicine services.)
2. No Unreasonable Interference or Unreasonable Disadvantage Standard for Internet Conduct133. In the 2014 Open Internet NPRM, the Commission tentatively concluded that it should adopt a rule requiring broadband providers to use ''commercially reasonable'' practices in the provision of broadband Internet access service, and sought comment on this approach. (The Commission also tentatively concluded that it should operate separately from the proposed no-blocking rule, i.e., conduct acceptable under the no-blocking rule would still be subject to independent examination under the ''commercially reasonable'' standard, and sought comment on this approach.) The Commission also sought comment on whether there were alternative legal standards that the Commission should consider, or whether it should adopt a rule that prohibits unreasonable discrimination and, if so, what legal authority and theories it should rely upon to do so. In addition, the Commission sought comment on how it can ensure that the rule it adopts sufficiently protects against harms to the open Internet, including broadband providers' incentives to disadvantage edge providers or classes of edge providers in ways that would harm Internet openness.
134. The Commission sought comment on what factors it should adopt to ensure commercially reasonable practices that will protect and promote Internet openness, and tentatively concluded that a review of the totality of the circumstances should be preserved to ensure that rules can be applied evenly and fairly in response to changing circumstances. The Commission also recognized that there have been significant changes in the mobile marketplace since 2010, and sought comment on whether and, if so, how these changes should affect the Commission's treatment of mobile services under the rules. (Specifically, the Commission sought comment on whether, under the commercially reasonable rule, mobile networks should be subject to the same totality-of-the circumstances test as fixed broadband, and whether the Commission should apply the commercially reasonable legal standard to mobile broadband.)
135. Preventing Unreasonable Interference or Unreasonable Disadvantage that Harms Consumers and Edge Providers. The three bright-line rules that we adopt today prohibit specific conduct that harms the open Internet. The open nature of the Internet has allowed new products and services to flourish and has broken down geographic barriers to communication, allowing information to flow freely. We believe the rules we adopt today will alleviate many of the concerns identified in the record regarding broadband provider practices that could upset these positive outcomes. However, while these three bright-line rules comprise a critical cornerstone in protecting and promoting the open Internet, we believe that there may exist other current or future practices that cause the type of harms our rules are intended to address. For that reason, we adopt a rule setting forth a no-unreasonable interference/disadvantage standard, under which the Commission can prohibit, on a case-by-case basis, practices that unreasonably interfere with or unreasonably disadvantage the ability of consumers to reach the Internet content, services, and applications of their choosing or of edge providers to access consumers using the Internet.
136. It is critical that access to a robust, open Internet remains a core feature of the communications landscape, but also that there remains leeway for experimentation with innovative offerings. Based on our findings that broadband providers have the incentive and ability to discriminate in their handling of network traffic in ways that can harm the virtuous cycle of innovation, increased end-user demand for broadband access, and increased investment in broadband network infrastructure and technologies, we conclude that a no-unreasonable interference/disadvantage standard to protect the open nature of the Internet is necessary. We adopt this standard to prohibit practices in the broadband Internet access provider's network that harm Internet openness, similar to the approach proposed by the Higher Education coalition and the Center for Democracy and Technology. Specifically, we require that:
137. This ''no-unreasonable interference/disadvantage'' standard will be applied to carefully balance the benefits of innovation against harm to end users and edge providers. It also protects free expression, thus fulfilling the congressional policy that the Internet ''offer[s] a forum for true diversity of political discourse, unique opportunities for cultural development, and myriad avenues for intellectual activity.'' As the Commission found in 2010, and the Verizon court upheld, ''[r]estricting edge providers' ability to reach end users, and limiting end users' ability to choose which edge providers to patronize, would reduce the rate of innovation at the edge and, in turn, the likely rate of improvements to network infrastructure. Similarly, restricting the ability of broadband providers to put the network to innovative uses may reduce the rate of improvements to network infrastructure.'' Under the standard that we adopt today, the Commission can protect against harm to end users' or edge providers' ability to use broadband Internet access service to reach one another. Compared to the no unreasonable discrimination standard adopted by the Commission in 2010, the standard we adopt today is specifically designed to protect against harms to the open nature of the Internet. We note that the standard we adopt today represents our interpretation of sections 201 and 202 in the broadband Internet access context and, independently, our interpretation'--upheld by the Verizon court'--that rules to protect Internet openness promote broadband deployment via the virtuous cycle under section 706 of the 1996 Act.
a. Factors To Guide Application of the Rule138. We adopt our tentative conclusion to follow a case-by-case approach, considering the totality of the circumstances, when analyzing whether conduct satisfies the no-unreasonable interference/disadvantage standard to protect the open Internet. Below we discuss a non-exhaustive list of factors we will use to assess such practices. In adopting this standard, we enable flexibility in business arrangements and ensure that innovation in broadband and edge provider business models is not unduly curtailed. We are mindful that vague or unclear regulatory requirements could stymie rather than encourage innovation, and find that this approach combined with the factors set out below will provide sufficient certainty and guidance to consumers, broadband providers, and edge providers'--particularly smaller entities that might lack experience dealing with broadband providers'--while also allowing parties flexibility in developing new services. (We also note that this Order permits parties to seek advisory opinions regarding application of the Commission's open Internet rules. We view these processes as complementary methods by which parties can seek guidance as to how the open Internet rules apply to particular conduct.) We note that in addition to the following list, there may be other considerations relevant to determining whether a particular practice violates the no-unreasonable interference/disadvantage standard. This approach of adopting a rule of general conduct, followed by guidance as to how to apply it on a case-by-case basis, is not novel. The Commission took a similar approach in 2010 when it adopted the ''no unreasonable discrimination'' rule, which was followed by a discussion of four factors (end-user control, use-agnostic discrimination, standard practices, and transparency). Indeed, for this new rule, we are providing at least as much guidance, if not more, as we did in 2010 for the application of the no unreasonable discrimination rule.
139. End-User Control. A practice that allows end-user control and is consistent with promoting consumer choice is less likely to unreasonably interfere with or cause an unreasonable disadvantage affecting the end user's ability to use the Internet as he or she sees fit. The Commission has long recognized that enabling consumer choice is the best path toward ensuring competitive markets, economic growth, and technical innovation. It is therefore critical that consumers' decisions, rather than those of service providers, remain the driving force behind the development of the Internet. To this end, practices that favor end-user control and empower meaningful consumer choice are more likely to satisfy the no-unreasonable interference/disadvantage standard than those that do not. However, as was true in 2010, we are cognizant that user control and network control are not mutually exclusive, and that many practices will fall somewhere on a spectrum from more end-user-controlled to more broadband provider-controlled. Further, there may be practices controlled entirely by broadband providers that nonetheless satisfy the no-unreasonable interference/disadvantage standard. In all events, however, we emphasize that such practices should be fully transparent to the end user and effectively reflect end users' choices.
140. Competitive Effects. As the Commission has found previously, broadband providers have incentives to interfere with and disadvantage the operation of third-party Internet-based services that compete with the providers' own services. Practices that have anti-competitive effects in the market for applications, services, content, or devices would likely unreasonably interfere with or unreasonably disadvantage edge providers' ability to reach consumers in ways that would have a dampening effect on innovation, interrupting the virtuous cycle. As such, these anticompetitive practices are likely to harm consumers' and edge providers' ability to use broadband Internet access service to reach one another. Conversely, enhanced competition leads to greater options for consumers in services, applications, content, and devices, and as such, practices that would enhance competition would weigh in favor of promoting consumers' and edge providers' ability to use broadband Internet access service to reach one another. In examining the effect on competition of a given practice, we will also review the extent of an entity's vertical integration as well as its relationships with affiliated entities.
141. Consumer Protection. The no-unreasonable interference/disadvantage standard is intended to serve as a strong consumer protection standard. It prohibits broadband providers from employing any deceptive or unfair practice that will unreasonably interfere with or disadvantage end-user consumers' ability to select, access, or use broadband services, applications, or content, so long as the services are lawful, subject to the exception for reasonable network management. For example, unfair or deceptive billing practices, as well as practices that fail to protect the confidentiality of end users' proprietary information, will be unlawful if they unreasonably interfere with or disadvantage end-user consumers' ability to select, access, or use broadband services, applications, or content, so long as the services are lawful, subject to the exception for reasonable network management. While each individual case will be evaluated on its own merits, this rule is intended to include protection against fraudulent practices such as ''cramming'' and ''slamming'' that have long been viewed as unfair and disadvantageous to consumers.
142. Effect on Innovation, Investment, or Broadband Deployment. As the Verizon court recognized, Internet openness drives a ''virtuous cycle'' in which innovations at the edges of the network enhance consumer demand, leading to expanded investments in broadband infrastructure that, in turn, spark new innovations at the edge. As such, practices that stifle innovation, investment, or broadband deployment would likely unreasonably interfere with or unreasonably disadvantage end users' or edge providers' use of the Internet under the legal standard we set forth today.
143. Free Expression. As Congress has recognized, the Internet ''offer[s] a forum for a true diversity of political discourse, unique opportunities for cultural development, and myriad avenues for intellectual activity.'' Practices that threaten the use of the Internet as a platform for free expression would likely unreasonably interfere with or unreasonably disadvantage consumers' and edge providers' ability to use BIAS to communicate with each other, thereby causing harm to that ability. Further, such practices would dampen consumer demand for broadband services, disrupting the virtuous cycle, and harming end user and edge provider use of the Internet under the legal standard we set forth today. (We also note that the no-unreasonable interference/disadvantage standard does not unconstitutionally burden any of the First Amendment rights held by broadband providers because broadband providers are conduits, not speakers, with respect to broadband Internet access services.)
144. Application Agnostic. Application-agnostic (sometimes referred to as use-agnostic) practices likely do not cause an unreasonable interference or an unreasonable disadvantage to end users' or edge providers' ability to use BIAS to communicate with each other. (A network practice is application-agnostic if it does not differentiate in treatment of traffic, or if it differentiates in treatment of traffic without reference to the content, application, or device. A practice is application-specific if it is not application-agnostic. Application-specific network practices include, for example, those applied to traffic that has a particular source or destination, that is generated by a particular application or by an application that belongs to a particular class of applications, that uses a particular application- or transport-layer protocol, or that has particular characteristics (e.g., the size, sequencing, and/or timing of packets). We note, however, that there do exist circumstances where application-agnostic practices raise competitive concerns, and as such may violate our standard to protect the open Internet.) Application-agnostic practices do not interfere with end users' choices about which content, applications, services, or devices to use, nor do they distort competition and unreasonably disadvantage certain edge providers. As such, they likely would not cause harm by unreasonably interfering with or disadvantaging end users or edge providers' ability to communicate using BIAS.
145. Standard Practices. In evaluating whether a practice violates our no-unreasonable interference/disadvantage standard to protect Internet openness, we will consider whether a practice conforms to best practices and technical standards adopted by open, broadly representative, and independent Internet engineering, governance initiatives, or standards-setting organization. Consideration of input from technical advisory groups accounts for the important role these organizations have to play in developing communications policy. We make clear, however, that we are not delegating authority to interpret or implement our rules to outside bodies.
b. Application to Mobile146. As discussed earlier, because of changes that have occurred in the mobile marketplace since 2010, including the widespread deployment of 4G LTE networks and the significant increase in use of mobile broadband Internet access services, we find that it is appropriate to revise our approach for mobile broadband and apply the same openness protections to both fixed and mobile broadband Internet access services, including prohibiting mobile broadband providers from engaging in practices that harm Internet openness. We find that applying the no-unreasonable interference/disadvantage standard to mobile broadband services will help ensure that consumers using mobile broadband services are protected against provider practices that would unreasonably restrict their ability to access a free and open Internet.
147. AT&T, T-Mobile, and Verizon oppose application of a ''commercially reasonable practices'' rule to mobile broadband networks. They argue that competition in the mobile broadband market already ensures that service providers have no incentive to discriminate. CTIA argues that applying a commercial reasonableness standard would deter innovation and limit the ability of providers to differentiate themselves in the marketplace because providers would have to factor in the risk of complaints and investigations. Nokia argues that the Commission should ensure that its rules allow a range of service options. Free State recommends that if the Commission adopts a legally enforceable standard, it should establish a presumption that mobile network management practices benefit consumer welfare and that presumption could only be overcome ''by actual evidence of anticompetitive conduct.''
148. We find that even if the mobile market were sufficiently competitive, competition alone is not sufficient to deter mobile providers from taking actions that would limit Internet openness. As noted above, there have been incidents where mobile providers have acted in a manner inconsistent with open Internet principles and we find that there is a risk that providers will continue to have the incentive to take actions that would favor their own content or services. We also agree with commenters that mobile providers' need for flexibility to manage their network can be accommodated through the reasonable network management exception.
149. In addition, we find that applying the no-unreasonable interference/disadvantage standard to mobile broadband will not affect providers' ability to differentiate themselves in the marketplace. We have crafted the standard we adopt today to prohibit these practices that harm Internet openness while still permitting innovation and experimentation. Nothing in the standard restricts carriers from developing new services or implementing new business models.
c. Rejection of the ''Commercially Reasonable'' Standard150. Based on the record before us, we are persuaded that adopting a legal standard prohibiting commercially unreasonable practices is not the most effective or appropriate approach for protecting and promoting an open Internet. Internet openness involves many relationships that are not business-to-business and serves many purposes that are noncommercial. (In the data roaming context, two commercial entities deal directly with one another to negotiate a fee-for-service agreement, and there is a direct business relationship with contractual privity and a purely commercial purpose on both sides of the transaction. Open Internet protections, by contrast, apply to a context where there may be no direct negotiation and no direct agreement between key parties. Moreover, while broadband providers are commercial entities with commercial purposes, many of the parties seeking to route traffic to broadband subscribers are not.) Commenters also expressed concerns that the commercially reasonable standard would involve a multifactor framework that was not focused on the goals of this open Internet proceeding. In addition, some commenters expressed concern that the legal standard would require permission before innovation, thus creating higher barriers to entry and attendant transaction costs. Smaller edge providers expressed concern that they do not have the resources to fight against commercially unreasonable practices, which could result in an unfair playing field before the Commission. Still others argued that the standard would permit paid prioritization, which could disadvantage smaller entities and individuals. Given these concerns, we decline to adopt our proposed rule to prohibit practices that are not commercially reasonable. Instead, as discussed above, we adopt a governing standard that looks to whether consumers or edge providers face unreasonable interference or unreasonable disadvantages, and makes clear that the standard is not limited to whether a practice is agreeable to commercial parties.
d. Sponsored Data and Usage Allowances151. While our bright-line rule to treat paid prioritization arrangements as unlawful addresses technical prioritization, the record reflects mixed views about other practices, including usage allowances and sponsored data plans. Sponsored data plans (sometimes called zero-rating) enable broadband providers to exclude edge provider content from end users' usage allowances. On the one hand, evidence in the record suggests that these business models may in some instances provide benefits to consumers, with particular reference to their use in the provision of mobile services. Service providers contend that these business models increase choice and lower costs for consumers. Commenters also assert that sophisticated approaches to pricing also benefit edge providers by helping them distinguish themselves in the marketplace and tailor their services to consumer demands. Commenters assert that such sponsored data arrangements also support continued investment in broadband infrastructure and promote the virtuous cycle, and that there exist spillover benefits from sponsored data practices that should be considered. On the other hand, some commenters strongly oppose sponsored data plans, arguing that ''the power to exempt selective services from data caps seriously distorts competition, favors companies with the deepest pockets, and prevents consumers from exercising control over what they are able to access on the Internet,'' again with specific reference to mobile services. In addition, some commenters argue that sponsored data plans are a harmful form of discrimination. The record also reflects concerns that such arrangements may hamper innovation and monetize artificial scarcity.
152. We are mindful of the concerns raised in the record that sponsored data plans have the potential to distort competition by allowing service providers to pick and choose among content and application providers to feature on different service plans. At the same time, new service offerings, depending on how they are structured, could benefit consumers and competition. Accordingly, we will look at and assess such practices under the no-unreasonable interference/disadvantage standard, based on the facts of each individual case, and take action as necessary.
153. The record also reflects differing views over some broadband providers' practices with respect to usage allowances (also called ''data caps''). Usage allowances place limits on the volume of data downloaded by the end user during a fixed period. Once a cap has been reached, the speed at which the end user can access the Internet may be reduced to a slower speed, or the end user may be charged for excess data. Usage allowances may benefit consumers by offering them more choices over a greater range of service options, and, for mobile broadband networks, such plans are the industry norm today, in part reflecting the different capacity issues on mobile networks. Conversely, some commenters have expressed concern that such practices can potentially be used by broadband providers to disadvantage competing over-the-top providers. Given the unresolved debate concerning the benefits and drawbacks of data allowances and usage-based pricing plans, (Regarding usage-based pricing plans, there is similar disagreement over whether these practices are beneficial or harmful for promoting an open Internet.) we decline to make blanket findings about these practices and will address concerns under the no-unreasonable interference/disadvantage on a case-by-case basis.
3. Transparency Requirements To Protect and Promote Internet Openness154. In this section, we adopt enhancements to the existing transparency rule, which covers both content and format of disclosures by providers of broadband Internet access service. As the Commission has previously noted, disclosure requirements are among the least intrusive and most effective regulatory measures at its disposal. We find that the enhanced transparency requirements adopted in the present Order serve the same purposes as those required under the 2010 Open Internet Order: Providing critical information to serve end-user consumers, edge providers of broadband products and services, and the Internet community. The transparency rule, including the enhancements adopted today, also will aid the Commission in enforcing the other open Internet rules and in ensuring that no service provider can evade them through exploitation of narrowly-drawn exceptions for reasonable network management or through evasion of the scope of our rules.
155. In the 2014 Open Internet NPRM, we tentatively concluded that we should enhance the existing transparency rule for end users, edge providers, the Internet community, and the Commission to have the information they need to understand the services they receive and to monitor practices that could undermine the open Internet. The NPRM sought comment on a variety of possible enhancements, including whether to require tailored disclosures for specific constituencies (end users, edge providers, the Internet community); ways to make the content and format of disclosures more accessible and understandable to end users; specific changes to disclosures for network practices that would benefit edge providers; whether there are more effective or more comprehensive ways to measure network performance; whether to require providers to disclose meaningful information regarding source, location, speed, packet loss, and duration of congestion; and whether and how any enhancements should apply to mobile broadband providers in a manner different from their application to fixed broadband providers.
156. Based on the record compiled in response to those proposals, below we set forth targeted, incremental enhancements to the existing transparency rule. We first recap the existing transparency rule, which forms the baseline off of which we build today. Having established that baseline, we describe specific enhancements'--including refinements and expansions in the required disclosures of commercial terms, performance characteristics, and network practices; adoption of a requirement that broadband providers notify end users directly if their individual use of a network will trigger a network practice, based on their demand prior to a period of congestion, that is likely to have a significant impact on the use of the service. We then address a request to exempt small providers from enhancements to the transparency rule, discuss the relationship of the enhancements to the existing transparency rule, and note the role that we anticipate further guidance from Commission staff will continue to play in applying the transparency rule in practice. Lastly, we adopt a voluntary safe harbor (but not a requirement) for a standalone disclosure format that broadband providers may use in meeting the existing requirement to disclose information that meets the needs of end users.
a. The Existing Transparency Rule157. The D.C. Circuit in Verizon upheld the transparency rule, which remains in full force, applicable to both fixed and mobile providers. In enhancing this rule, we build off of the solid foundation established by the Open Internet Order. In that Order, the Commission concluded that effective disclosure of broadband providers' network management practices, performance, and commercial terms of service promotes competition, innovation, investment, end-user choice, and broadband adoption. As a result, the Commission adopted a transparency rule requiring both fixed and mobile providers to ''publicly disclose accurate information regarding the network management practices, performance, and commercial terms'' of their broadband Internet access service. The rule specifies that such disclosures be ''sufficient for consumers to make informed choices regarding the use of such services and for content, application, service, and device providers to develop, market, and maintain Internet offerings.''
158. The 2010 Open Internet Order went on to provide guidance on both the information to be disclosed and the method of disclosure. Within each category of required disclosure (network management practices, performance characteristics, and commercial terms), the Open Internet Order described the type of information to be disclosed. For example, under performance characteristics, the Commission specified, among other things, disclosure of ''expected and actual access speed and latency'' as well as the ''impact of specialized services.'' All disclosures were required to be made ''timely and prominently[,] in plain language accessible to current and prospective end users and edge providers, the Commission, and third parties who wish to monitor network management practices for potential violations of open Internet principles.''
159. In 2011 and 2014, Commission staff provided guidance on interpreting the transparency rule. For example, in addition to other points, the 2011 guidance issued by the Enforcement Bureau and Office of General Counsel (2011 Advisory Guidance) described the means by which fixed and mobile broadband providers should meet the requirement to disclose actual performance of the broadband Internet access services they offer and to disclose network management practices, performance, characteristics, and commercial terms ''at the point of sale.'' The 2011 Advisory Guidance also clarified the statement in the Open Internet Order that effective disclosures ''will likely include some or all of the'' information listed in paragraphs 56 and 98, but also that the list was ''not necessarily exhaustive, nor is it a safe harbor,'' and that ''there may be additional information, not included [in paragraphs 56 and 98], that should be disclosed for a particular broadband service to comply with the rule in light of relevant circumstances.'' Acknowledging the concern of some providers that ''they could be liable for failing to disclose additional types of information that they may not be aware are subject to disclosure,'' the 2011 Advisory Guidance stated that disclosure of the information described in those paragraphs ''will suffice for compliance with the transparency rule at this time.''
160. In an advisory issued in July 2014 (2014 Advisory Guidance), the Enforcement Bureau explained that the transparency rule ''prevents a broadband Internet access provider from making assertions about its service that contain errors, are inconsistent with the provider's disclosure statement, or are misleading or deceptive.'' Accurate disclosures ''ensure that consumers'--as well as the Commission and the public as a whole'--are informed about a broadband Internet access provider's network management practices, performance, and commercial terms.'' As the 2014 Advisory Guidance recognized, the transparency rule ''can achieve its purpose of sufficiently informing consumers only if advertisements and other public statements that broadband Internet access providers make about their services are accurate and consistent with any official disclosures that providers post on their Web sites or make available in stores or over the phone.'' Thus, ''a provider making an inaccurate assertion about its service performance in an advertisement, where the description is most likely to be seen by consumers, could not defend itself against a transparency rule violation by pointing to an `accurate' official disclosure in some other public place.'' Allowing such defenses would undermine the core purpose of the transparency rule.
161. Today, we build off of this baseline: The transparency rule requirements established in 2010, and interpreted by the 2011 and 2014 Advisory Guidance. We also take this opportunity to make two clarifications to the existing rule. First, all of the pieces of information described in paragraphs 56 and 98 of the Open Internet Order have been required as part of the current transparency rule, and we will continue to require the information as part of our enhanced rule. The only exception is the requirement to disclose ''typical frequency of congestion,'' which we no longer require since it is superseded by more precise disclosures already required by the rule, such as actual performance. Second, the requirement that all disclosures made by a broadband provider be accurate includes the need to maintain the accuracy of these disclosures. Thus, whenever there is a material change in a provider's disclosure of commercial terms, network practices, or performance characteristics, the provider has a duty to update the disclosure in a manner that is ''timely and prominently disclosed in plain language accessible to current and prospective end users and edge providers, the Commission, and third parties who wish to monitor network management practices for potential violations of open Internet principles.'' (We decline, however, to adopt a specific timeframe concerning the updating of disclosures following a material change (e.g., 24 hours).) For these purposes, a ''material'' change is any change that a reasonable consumer or edge provider would consider important to their decisions on their choice of provider, service, or application.
b. Enhancing the Transparency Rule162. We adopt the tentative conclusion in the 2014 Open Internet NPRM to enhance the existing transparency rule in certain respects. We conclude that enhancing the existing transparency rule as described below will better enable end-user consumers to make informed choices about broadband services by providing them with timely information tailored more specifically to their needs, and will similarly provide edge providers with the information necessary to develop new content, applications, services, and devices that promote the virtuous cycle of investment and innovation.
(i) Enhancements to Content of Required Disclosures163. As noted above, the existing transparency rule requires specific disclosures with respect to network practices, performance characteristics, and commercial terms. As we noted in the 2014 Open Internet NPRM, the Commission has continued to receive numerous complaints from consumers suggesting that broadband providers are not providing information that end users and edge providers need to receive. We noted that consumers continue to express concern that the speed of their service falls short of advertised speeds, that billed amounts are greater than advertised rates, and that consumers are unable to determine the source of slow or congested service. In addition, we noted that end users are often surprised that broadband providers slow or terminate service based on ''excessive use'' or based on other practices, and that consumers report confusion regarding data thresholds or caps. Further, the need for enhanced transparency is bolstered by the needs of certain user groups who rely on broadband as their primary avenue for communications, such as people with disabilities. These enhancements will also serve edge providers. The record supports our conclusions that more specific and detailed disclosures are necessary to ensure that edge providers can ''develop, market, and maintain Internet offerings.'' Such disclosures will also help the wider Internet community monitor provider practices to ensure compliance with our Open Internet rules and providers' own policies.
164. Commercial Terms. The existing transparency rule defines the required disclosure of ''commercial terms'' to include pricing, privacy policies, and redress options. While we do not take additional action concerning the requirement to disclose privacy policies and redress options, the record demonstrates need for specific required disclosures about price and related terms. In particular, we specify the disclosures of commercial terms for prices, other fees, and data caps and allowances as follows:
Price'--The full monthly service charge. Any promotional rates should be clearly noted as such, specify the duration of the promotional period, and note the full monthly service charge the consumer will incur after the expiration of the promotional period.Other Fees'--All additional one time and/or recurring fees and/or surcharges the consumer may incur either to initiate, maintain, or discontinue service, including the name, definition, and cost of each additional fee. (The Commission agrees that the magnitude of these fees bears on consumer decision-making when choosing or switching providers. As a result, the provision of explicit information regarding these fees by providers both promotes competition and assists in consumer decision making.) These may include modem rental fees, installation fees, service charges, and early termination fees, among others. Data Caps and Allowances'--Any data caps or allowances that are a part of the plan the consumer is purchasing, as well as the consequences of exceeding the cap or allowance (e.g., additional charges, loss of service for the remainder of the billing cycle).To be clear, these disclosures may have been required in certain circumstances under the existing transparency rule in order to provide information ''sufficient for consumers to make informed choices.'' Here, we now require that this information always be disclosed. In addition, per the current rule, disclosures of commercial terms shall also include the provider's privacy policies (''[f]or example, whether network management practices entail inspection of network traffic, and whether traffic information is stored, provided to third parties, or used by the carrier for non-network management purposes'') and redress options (''practices for resolving end-user and edge provider complaints and questions'').
165. Performance Characteristics. The existing transparency rule requires broadband providers to disclose accurate information regarding network performance for each broadband service they offer. This category includes a service description (''[a] general description of the service, including the service technology, expected and actual access speed and latency, and the suitability of the service for real-time applications'') and the impact of specialized services (''[i]f applicable, what specialized services, if any, are offered to end users, and whether and how any specialized services may affect the last-mile capacity available for, and the performance, or broadband Internet access service'').
166. With respect to network performance, we adopt the following enhancements:
The existing transparency rule requires disclosure of actual network performance. In adopting that requirement, the Commission mentioned speed and latency as two key measures. Today we include packet loss as a necessary part of the network performance disclosure.We expect that disclosures to consumers of actual network performance data should be reasonably related to the performance the consumer would likely experience in the geographic area in which the consumer is purchasing service.We also expect that network performance will be measured in terms of average performance over a reasonable period of time and during times of peak usage. (We recognize that parties have expressed concern about providing disclosures about network performance on a real-time basis. The enhancements to the transparency rule we adopt today do not include such a requirement. Given that the performance of mobile broadband networks is subject to a greater array of factors than fixed networks, we note that disclosure of a range of speeds may be more appropriate for mobile broadband consumers.)We clarify that, for mobile broadband providers, the obligation in the existing transparency rule to disclose network performance information for ''each broadband service'' refers to separate disclosures for services with each technology (e.g., 3G and 4G). Furthermore, with the exception of small providers, mobile broadband providers today can be expected to have access to reliable actual data on performance of their networks representative of the geographic area in which the consumer is purchasing service'--through their own or third-party testing'--that would be the source of the disclosure. (Per the 2011 Advisory Guidance, those mobile broadband providers that ''lack reasonable access'' to reliable information on their network performance metrics may disclose a ''Typical Speed Range (TSR)'' to meet the requirement to disclose actual performance. In any event, we expect that mobile broadband providers' disclosure of actual performance data will be based on accepted industry practices and principles of statistical validity.) Commission staff also continue to refine the mobile MBA program, which could at the appropriate time be declared a safe harbor for mobile broadband providers. (Participation in the Measuring Broadband America (MBA) program continues to be a safe harbor for fixed broadband providers in meeting the requirement to disclose actual network performance. The 2011 Advisory Guidance further stated that fixed providers that choose not to participate in MBA may measure and disclose performance of their broadband offerings using the MBA's methodology, internal testing, consumer speed data, or other data, including reliable, relevant data from third-party sources. Various software-based broadband performance tests are available as potential tools for end users and companies to estimate actual broadband performanceAs noted above, we anticipate that the measurement methodology used for the MBA project will continue to be refined, which in turn will enhance the effectiveness of network performance disclosures generally.)We decline to otherwise codify specific methodologies for measuring the ''actual performance'' required by the existing transparency rule. We find that, as in 2010, there is benefit in permitting measurement methodologies to evolve and improve over time, with further guidance from Bureaus and Offices'--like in 2011'--as to acceptable methodologies. (We expect that acceptable methodologies will be grounded in commonly accepted principles of scientific research, good engineering practices, and transparency.) We delegate authority to our Chief Technologist to lead this effort.
167. In addition, the existing rule concerning performance characteristics requires disclosure of the ''impact'' of specialized services, including ''what specialized services, if any, are offered to end users, and ''whether and how any specialized services may affect the last-mile capacity available for, and the performance of, broadband Internet access service.'' As discussed below, today we more properly refer to these services as ''non-BIAS data services.'' Given that the Commission will closely scrutinize offerings of non-BIAS data services and their impact on competition, we clarify that in addition to the requirements of the existing rule concerning what was formerly referred to as ''specialized services,'' disclosure of the impact of non-BIAS data services includes a description of whether the service relies on particular network practices and whether similar functionality is available to applications and services offered over broadband Internet access service.
168. The 2014 Open Internet NPRM tentatively concluded that we should require that broadband providers disclose meaningful information regarding the source, location, timing, speed, packet loss, and duration of network congestion. As discussed above, we continue to require disclosure of actual network speed and latency (as in 2010), and also require disclosure of packet loss. We decline at this time to require disclosure of the source, location, timing, or duration of network congestion, noting that congestion may originate beyond the broadband provider's network and the limitations of a broadband provider's knowledge of some of these performance characteristics. (Short-term congestion occurs whenever instantaneous demand exceeds capacity. Since demand often consists of the aggregation of a large number of users' traffic, it is technologically difficult to determine the sources of each component of the aggregate traffic) We also asked whether the Commission should expand its transparency efforts to include measurement of other aspects of service. We decline at this time to require disclosure of packet corruption or jitter, noting that commenters expressed concerns regarding the difficulty of defining metrics for such performance characteristics. (Furthermore, corrupted packets may be included in the packet loss performance characteristic.)
169. Network Practices. The existing transparency rule requires disclosure of network practices, including specific disclosures related to congestion management, application-specific behavior, device attachment rules, and security. (Additionally, ''mobile broadband providers should follow the guidance the Commission provided to licensees of the upper 700 MHz C Block spectrum regarding compliance with their disclosure obligations, particularly regarding disclosure to third-party application developers and device manufacturers of criteria and approval procedures (to the extent applicable). For example, these disclosures include, to the extent applicable, establishing a transparent and efficient approval process for third parties, as set forth in section 27.16(d).''2010 Open Internet Order (76 FR 59129-01, 59210, Sept. 23, 2011), 25 FCC Rcd at 17959, para. 98 As discussed above, this information remains part of the transparency rule, with the exception of the requirement to disclose the ''typical frequency of congestion.'') Today, in recognition of significant consumer concerns presented in the record, we further clarify that disclosure of network practices shall include practices that are applied to traffic associated with a particular user or user group, including any application-agnostic degradation of service to a particular end user. (For example, a broadband Internet access service provider may define user groups based on the service plan to which users are subscribed, the volume of data that users send or receive over a specified time period of time or under specific network conditions, or the location of users.) We also clarify that disclosures of user-based or application-based practices should include the purpose of the practice, which users or data plans may be affected, the triggers that activate the use of the practice, the types of traffic that are subject to the practice, and the practice's likely effects on end users' experiences. While some of these disclosures may have been required in certain circumstances under the existing transparency rule, here we clarify that this information should always be disclosed. These disclosures with respect to network practices are necessary: for the public and the Commission to know about the existence of network practices that may be evaluated under the rules, for users to understand when and how practices may affect them, and for edge providers to develop Internet offerings.
170. The 2014 Open Internet NPRM asked whether we should require disclosures that permit end users to identify application-specific usage or to distinguish which user or device contributed to which part of the total data usage. We decline at this time to require such disclosures, noting that collection of application-specific usage by a broadband provider may require use of deep packet inspection practices that may pose privacy concerns for consumers.
(ii) Enhancements to the Means of Disclosure171. The existing transparency rule requires, at a minimum, the prominent display of disclosures on a publicly available Web site and disclosure of relevant information at the point of sale. (Broadband providers must actually disclose information required for consumers to make an ''informed choice'' regarding the purchase or use of broadband services at the point of sale. It is not sufficient for broadband providers simply to provide a link to their disclosures.) We enhance the rule to require a mechanism for directly notifying end users if their individual use of a network will trigger a network practice, based on their demand prior to a period of congestion, that is likely to have a significant impact on the end user's use of the service. The purpose of such notification is to provide the affected end users with sufficient information and time to consider adjusting their usage to avoid application of the practice.
(iii) Small Businesses172. The record reflects the concerns of some commenters that enhanced transparency requirements will be particularly burdensome for smaller providers. ACA, for example, suggests that smaller providers be exempted from the provision of such disclosures. ACA states that its member companies are complying with the current transparency requirements, which ''strike the right balance between edge provider and consumer needs for pertinent information and the need to provide ISPs with some flexibility in how they disclose pertinent information.'' We believe that the transparency enhancements adopted today are modest in nature. For example, we have declined to require certain disclosures proposed in the 2014 Open Internet NPRM such as the source of congestion, packet corruption, and jitter in recognition of commenter concerns with the benefits and difficulty of making these particular disclosures. We also do not require ''real-time'' disclosures. These proposed disclosures appear to form the bulk of ACA's concerns. Nevertheless, we take seriously the concerns that ACA raises and those of smaller broadband providers generally.
173. Out of an abundance of caution, we grant a temporary exemption for these providers, with the potential for that exemption to become permanent. It is unclear, however, how best to delineate the boundaries of this exception. Clearly, it should include those providers likely to be most disproportionately affected by new disclosure requirements. ACA ''acknowledge[s] that Congress and the Commission have defined `small' in various ways.'' One metric to which ACA points is the approach that the Commission used in its 2013 Rural Call Completion Order, which excepted providers with 100,000 or fewer subscriber lines, aggregated across all affiliates, from certain recordkeeping, retention, and reporting rules. We adopt this definition for purposes of the temporary exemption that we adopt today. Accordingly, we hereby adopt a temporary exemption from the enhancements to the transparency rule for those providers of broadband Internet access service (whether fixed or mobile) with 100,000 or fewer broadband subscribers as per their most recent Form 477, aggregated over all the providers' affiliates.
174. Yet we believe that both the appropriateness of the exemption and the threshold require further deliberation. Accordingly, the exemption we adopt is only temporary. We delegate to the Consumer & Governmental Affairs Bureau (CGB) the authority to determine whether to maintain the exemption and, if so, the appropriate threshold for it. We direct CGB to seek comment on the question and to adopt an Order announcing whether it is maintaining an exemption and at what level by no later than December 15, 2015. Until such time, notwithstanding any approval received by the Office of Management & Budget for the enhancements adopted today, such enhancements will not apply to providers of broadband Internet access service with 100,000 or fewer subscribers.
175. To be clear, all providers of broadband Internet access service, including small providers, remain subject to the existing transparency rule adopted in 2010. The temporary exemption adopted today, and any permanent exemption adopted by CGB, applies only to the enhanced disclosures described above. As ACA states in its request for an exemption for small providers, ''[i]rrespective of which definition of small that is chosen by the Commission, exempt ISPs would still be required to comply with the transparency requirements contained in section 8.3 of the Commission's rules today.''
(iv) Safe Harbor for Form of Disclosure to Consumers176. The existing transparency rule requires disclosures sufficient both to enable ''consumers to make informed choices regarding use of [broadband] services''and''content, application, service, and device providers to develop, market, and maintain Internet offerings.'' As in 2010, a central purpose of the transparency rule remains to provide information useful to both constituencies. As we noted in the 2014 Open Internet NPRM, we are concerned that disclosures are not consistently provided in a manner that adequately satisfies the divergent informational needs of all affected parties. For example, disclosures at times are ill-defined; do not consistently measure service offerings, making comparisons difficult; or are not easily found on provider Web sites. In the 2014 Open Internet NPRM, we therefore proposed requiring separate disclosure statements to meet both the basic informational needs of consumers and the more technical needs of edge providers.
177. The record reflects concerns, however, as to a requirement to offer tailored disclosures. For example, ACA states that disclosures tailored to edge providers ''would require small ISPs, who manage their own networks and may only have a handful of network operators, engineers, and head end staff to make onerous expenditures of both personnel hours and financial resources.'' Bright House ''question[s] the feasibility of creating disclosures tailored to the varied and potentially unique needs of the hundreds of such providers, particularly with no reciprocal obligation.'' Similarly, Tech Freedom and the International Center for Law and Economics assert that ''requiring ISPs to tailor their disclosures to the various parties the ISPs deal with (i.e., consumers, edge providers, the Internet community, and the FCC) greatly increases the burden of complying with these disclosures, especially as such disclosures must be periodically updated to reflect changes to ISPs' network management practices.'' In light of these concerns, we decline to require separate disclosures at this time.
178. In declining to mandate separate disclosures, however, we do not intend to diminish the existing requirement for disclosure of information sufficient for both end users and edge providers. The Commission has not established that a single disclosure would always satisfy the rule; rather, it merely stated broadband providers ''may be able'' to satisfy the transparency rule through a single disclosure. We are especially concerned that in some cases a single disclosure statement may be too detailed and technical to meet the needs of consumers, rather than a separate consumer-focused disclosure. As noted in the 2014 Open Internet NPRM, both academic research and the Commission's experience with consumer issues have demonstrated that the manner in which providers display information to consumers can have as much impact on consumer decisions as the information itself. A stand-alone format has proven effective in conveying useful information in other contexts. We also note that the OIAC and OTI have proposed the use of a label to disclose the most important information to users of broadband service. In addition, the United Kingdom's largest Internet service providers agreed to produce a comparable table of traffic management information called a Key Facts Indicator.
179. Therefore, we are establishing a voluntary safe harbor for the format and nature of the required disclosure to consumers. To take advantage of the safe harbor, a broadband provider must provide a consumer-focused, standalone disclosure. We decline, however, to mandate the exact format for such disclosures at this time. (We note that although we have sought comment on what format would be most effective, the record is lacking on specific details as to how such a disclosure should be formatted.) Rather, we seek the advice of our Consumer Advisory Committee, which is composed of both industry and consumer interests, including those representing people with disabilities. (The Committee's purpose is to make recommendations to the Commission regarding consumer issues within Commission's jurisdiction and to facilitate the participation of consumers (including people with disabilities and underserved populations, such as Native Americans and persons living in rural areas) in proceedings before the Commission.) We find that the Committee's experience with consumer disclosure issues (For example, the Committee has studied the value of standardized disclosures and their contents.) makes it an ideal body to recommend a disclosure format that should be clear and easy to read'--similar to a nutrition label'--to allow consumers to easily compare the services of different providers. We believe the CAC is uniquely able to recommend a disclosure format that both anticipates and addresses provider compliance burdens while ensuring the utility of the disclosures for consumers.
180. We direct the CAC to formulate and submit to the Commission a proposed disclosure format, based on input from a broad range of stakeholders, within six months of the time that its new membership is reconstituted, but, in any event, no later than October 31, 2015. The disclosure format must be accessible to persons with disabilities. We expect that the CAC will consider whether to propose the same or different formats for fixed and mobile broadband providers. In addition, we expect that the CAC will consider whether and how a standard format for mobile broadband providers will allow providers to continue to differentiate their services competitively, as well as how mobile broadband providers can effectively disclose commercial terms to consumers regarding myriad plans in a manner that is not administratively burdensome. The Commission delegates authority to the Wireline Competition Bureau, Wireless Telecommunications Bureau, and Consumer & Governmental Affairs Bureau to issue a Public Notice announcing whether the proposed format or formats meet its expectations for the safe harbor for making consumer-facing disclosures. If the format or formats do not meet such expectations, the Bureaus may ask the CAC to consider changes and submit a revised proposal for the Bureaus' review within 90 days of the Bureaus' request.
181. Broadband providers that voluntarily adopt this format will be presumed to be in compliance with the requirement to make transparency disclosures in a format that meets the needs of consumers. Providers that choose instead to maintain their own format'--for example, a unitary disclosure intended both for consumers and edge providers'--will bear the burden, if challenged, of explaining how a single disclosure statement meets the needs of both consumers and edge providers. To be clear, use of the consumer disclosure format is a safe harbor with respect to the format of the required disclosure to consumers. A broadband provider meeting the safe harbor could still be found to be in violation of the rule, for example, if the content of that disclosure (e.g., prices) is misleading or inaccurate, or the provider makes misleading or inaccurate statements in another context, such as advertisements or other statements to consumers. Moreover, broadband providers using the safe harbor should continue to provide the more detailed disclosure statement for the benefit of edge providers.
c. Enforcement and Relationship to the Existing Transparency Rule182. Despite these enhancements to the existing transparency rule, we clarify that we are being specific in order to provide additional guidance. The transparency rule has always required broadband providers to disclose information ''sufficient for consumers to make informed choices'' (Even where a particular category of information discussed above was not specified in the 2010 Open Internet Order that does not mean that disclosure of that information has not consistently been required under the transparency rule. If such information is necessary for a consumer to make an ''informed choice'' regarding the purchase or use of broadband service, disclosure of that information is a fundamental requirement of the transparency rule.) and that test could, in particular circumstances, include the enhancements that we expressly adopt today. We also reiterate that under both the existing transparency rule and the enhancements adopted in this Order, all disclosures that broadband providers make about their network practices, performance, and commercial terms of broadband services must be accurate and not misleading.
183. In the 2014 Open Internet NPRM we also requested comment on how the Commission could best enforce the transparency rule. In particular, we noted that a key objective of the transparency rule is to enable the Commission to collect information necessary to access, report, and enforce the open Internet rules. For example, we sought comment on whether to require broadband providers to certify that they are in compliance with the required disclosures and/or submit reports containing descriptions of current disclosure practices, particularly if the existing flexible approach is amended to require more specific disclosures. Some commenters caution against measures that are unnecessary, susceptible to abuse, or burdensome. Others express support for stronger or more efficient enforcement mechanisms. At this time we decline to require certification by broadband providers. Should evidence be provided, however, that certification is necessary, we will revisit this issue at a later date.
184. We also remind providers that if their disclosure statements fail to meet the requirements established in 2010 and enhanced today, they may be subject to investigation and forfeiture. The Enforcement Bureau will closely scrutinize failure by providers to meet their obligations in fulfilling the transparency rule.
d. Role of Further Advisory Guidance185. The 2011 and 2014 Advisory Guidance documents illustrate the role of further guidance from Commission staff in interpreting and applying the general requirements of the transparency rule. We anticipate that as technology, the marketplace, and the needs of consumers, edge providers, and other stakeholders evolve, further such guidance may be appropriate concerning the transparency rule, including with respect to the enhancements adopted today. The most immediate example concerns ongoing improvements and evolutions in the methodologies for measuring broadband providers' actual performance, as discussed in further detail above. We also point out that broadband providers are able to seek advisory opinions from the Enforcement Bureau concerning any of the open Internet regulations, including the transparency rule.
D. Scope of the Rules186. The open Internet rules we adopt today apply to fixed and mobile broadband Internet access service. We make clear, however, that while the definition of broadband Internet access service encompasses arrangements for the exchange of Internet traffic, the open Internet rules we adopt today do not apply to that portion of the broadband Internet access service.
1. Broadband Internet Access Service187. As discussed below, we continue to define ''broadband Internet access service'' (BIAS) as:
188. ''Broadband Internet access service'' continues to include services provided over any technology platform, including but not limited to wire, terrestrial wireless (including fixed and mobile wireless services using licensed or unlicensed spectrum), and satellite. ''Broadband Internet access service'' encompasses all providers of broadband Internet access service, as we delineate them here, regardless of whether they lease or own the facilities used to provide the service. (The Commission has consistently determined that resellers of telecommunications services are telecommunications carriers, even if they do not own any facilities. We note that the rules apply not only to facilities-based providers of broadband service but also to resellers of that service. In applying these obligations to resellers, we recognize, as the Commission has in other contexts, that consumers will expect the protections and benefits afforded by providers' compliance with the rules, regardless of whether the consumer purchase service from a facilities-based provider or a reseller. We note that a reseller's obligation under the rules is independent from the obligation of the facilities-based provider that supplies the underlying service to the reseller, though the extent of compliance by the underlying facilities-based provider will be a factor in assessing compliance by the reseller.) ''Fixed'' broadband Internet access service refers to a broadband Internet access service that serves end users primarily at fixed endpoints using stationary equipment, such as the modem that connects an end user's home router, computer, or other Internet access device to the network. The term encompasses the delivery of fixed broadband over any medium, including various forms of wired broadband services (e.g., cable, DSL, fiber), fixed wireless broadband services (including fixed services using unlicensed spectrum), and fixed satellite broadband services. ''Mobile'' broadband Internet access service refers to a broadband Internet access service that serves end users primarily using mobile stations. It also includes services that use smartphones or mobile-network-enabled tablets as the primary endpoints for connection to the Internet, (We note that ''public safety services,'' as defined in section 337 of the Act, are excluded from the definition of mobile broadband Internet access service.) as well as mobile satellite broadband services. (We provide these definitions of ''fixed'' and ''mobile'' for illustrative purposes. In contrast to the Commission's 2010 Open Internet Order, here we are applying the same regulations to both fixed and mobile broadband Internet access services.)
189. We continue to define ''mass market'' as ''a service marketed and sold on a standardized basis to residential customers, small businesses, and other end-user customers such as schools and libraries.'' To be clear, ''mass market'' includes broadband Internet access services purchased with support of the E-rate and Rural Healthcare programs, as well as any broadband Internet access service offered using networks supported by the Connect America Fund (CAF). (In the 2010 Open Internet Order, the Commission found that ''mass market'' included broadband Internet access services purchased with support of the E-rate program. Since that time, the Commission has extended universal service support for broadband services through the Lifeline and Rural Health Care programs. Thus, for the same reasons the Commission defined mass market services to include BIAS purchased with the support of the E-rate program in 2010, we now find that mass market also includes BIAS purchased with the support of Lifeline and Rural Health Care programs.) To the extent that institutions of higher learning purchase mass market services, those institutions would be included within the scope of the schools and libraries portion of our definition. The term ''mass market'' does not include enterprise service offerings, which are typically offered to larger organizations through customized or individually-negotiated arrangements, or special access services.
190. We adopt our tentative conclusion in the 2014 Open Internet NPRM that broadband Internet access service does not include virtual private network (VPN) services, content delivery networks (CDNs), hosting or data storage services, or Internet backbone services (to the extent those services are separate from broadband Internet access service). The Commission has historically distinguished these services from ''mass market'' services and, as explained in the 2014 Open Internet NPRM, they ''do not provide the capability to receive data from all or substantially all Internet endpoints.'' We do not disturb that finding here. Likewise, when a user employs, for example, a wireless router or a Wi-Fi hotspot to create a personal Wi-Fi network that is not intentionally offered for the benefit of others, he or she is not providing a broadband Internet access service under our definition.
191. We again decline to apply the open Internet rules to premises operators'--such as coffee shops, bookstores, airlines, private end-user networks (e.g. libraries and universities), and other businesses that acquire broadband Internet access service from a broadband provider to enable patrons to access the Internet from their respective establishments'--to the extent they may be offering broadband Internet access service as we define it today. (While we decline to apply open Internet rules to premises operators to the extent they may offer broadband Internet access service, that decision does not affect other obligations that may apply to premises operators under the Act.) We find, as we did in 2010, that a premises operator that purchases BIAS is an end user and that these services ''are typically offered by the premise operator as an ancillary benefit to patrons.'' Further, applying the open Internet rules to the provision of broadband service by premises operators would have a dampening effect on these entities' ability and incentive to offer these services. As such, we do not apply the open Internet rules adopted today to premises operators. (We reiterate the guidance in the 2010 Open Internet Order that although not bound by our rules, we encourage premises operators to disclose relevant restrictions on broadband service they make available to their patrons.) The record evinces no significant disagreement with this analysis. (We note, however, that this exception does not affect other obligations that a premise operator may have independent of our open Internet rules.)
192. Our definition of broadband Internet access service includes services ''by wire or radio,'' which encompasses mobile broadband service. Thus, our definition of broadband Internet access service also extends to the same services provided by mobile providers. As discussed above, the record demonstrates the pressing need to apply open Internet rules to fixed and mobile broadband services alike, and changes in the mobile marketplace no longer counsel in favor of treating mobile differently under the rules. Thus, we apply the open Internet rules adopted today to both fixed and mobile networks. (Although we adopt the same rules for both fixed and mobile services, we recognize that with respect to the reasonable network management exception, the rule may apply differently to fixed and mobile broadband providers.)
193. As we discuss more fully below, broadband Internet access service encompasses the exchange of Internet traffic by an edge provider or an intermediary with the broadband provider's network. Below, we find that broadband Internet access service is a telecommunications service, subject to sections 201, 202, and 208 (along with key enforcement provisions). (We note that broadband Internet access services are also subject to sections 222, 224, 225, 254, and 255.) As a result, the Commission will be available to hear disputes regarding arrangements for the exchange of traffic with a broadband Internet access provider raised under sections 201 and 202 on a case-by-case basis: an appropriate vehicle for enforcement where disputes are primarily over commercial terms and that involve some very large corporations, including companies like transit providers and CDNs, that act on behalf of smaller edge providers. However, for reasons discussed more fully below, we exclude this portion of broadband Internet access service'--interconnection with a broadband Internet access service provider's network'--from application of our open Internet rules. We note that this exclusion also extends to interconnection with CDNs.
2. Internet Traffic Exchange194. In the 2010 Open Internet Order, the Commission applied its open Internet rules ''only as far as the limits of a broadband provider's control over the transmission of data to or from its broadband customers,'' and excluded the exchange of traffic between networks from the scope of the rules. In the 2014 Open Internet NPRM, the Commission tentatively concluded that it should maintain this approach, but explicitly sought comment on suggestions that the Commission should expand the scope of the open Internet rules to cover issues related to Internet traffic exchange. (As a general matter, Internet traffic exchange involves the exchange of IP traffic between networks. An Internet traffic exchange arrangement determines which networks exchange traffic and the destinations to which those networks will deliver that traffic. In aggregate, Internet traffic exchange arrangements allow an end user of the Internet to interact with other end users on other Internet networks, including content or services that make themselves available by having a public IP address, similar to how the global public switched telephone network consists of networks that route calls based on telephone numbers. When we adopted the 2014 Open Internet NPRM, the Chairman issued a separate, written statement suggesting that ''the question of interconnection (`peering') between the consumer's network provider and the various networks that deliver to that ISP . . . is a different matter that is better addressed separately.''2014 Open Internet NPRM, 29 FCC Rcd at 5647. While this statement reflected the Notice's tentative conclusion concerning Internet traffic exchange, it in no way detracts from the fact that the Notice also sought comment on ''whether we should change our conclusion,'' whether to adopt proposals to ''expand the scope of the open Internet rules to cover issues related to traffic exchange,'' and how to ''ensure that a broadband provider would not be able to evade our open Internet rules by engaging in traffic exchange practices that would be outside the scope of the rules as proposed.'')
195. As discussed below, we classify fixed and mobile broadband Internet access service as telecommunications services. The definition for broadband Internet access service includes the exchange of Internet traffic by an edge provider or an intermediary with the broadband provider's network. We note that anticompetitive and discriminatory practices in this portion of broadband Internet access service can have a deleterious effect on the open Internet, and therefore retain targeted authority to protect against such practices through sections 201, 202, and 208 of the Act (and related enforcement provisions), but will forbear from a majority of the other provisions of the Act. Thus, we conclude that, at this time, application of the no-unreasonable interference/disadvantage standard and the prohibitions on blocking, throttling, and paid prioritization to the Internet traffic exchange arrangements is not warranted.
196. Trends in Internet Traffic Exchange. Internet traffic exchange is typically based on commercial negotiations. Changes in consumer behavior, traffic volume, and traffic composition have resulted in new business models for interconnection. Since broadband Internet access service providers cannot, on their own, connect to every end point on the Internet in order to provide full Internet access to their customers, they historically paid third-party backbone service providers for transit. Backbone service providers interconnected upstream until traffic reached Tier 1 backbone service providers, which peered with each other and thereby provided their customer networks with access to the full Internet. In this hierarchical arrangement of networks, broadband Internet access providers negotiated with backbone service providers; broadband Internet access providers generally did not negotiate with edge providers to gain access to content. However, in recent years, new business models of Internet traffic exchange have emerged, premised on changes in traffic flows and in broadband Internet access provider networks. A number of factors drive these trends in Internet traffic exchange.
197. Critically, the growth of online streaming video services has sparked further evolution of the Internet. Content providers have come to rely on the services of commercial and private CDNs, which cache content close to end users, providing increased quality of service and avoiding transit costs. While CDNs rely on transit to feed the array of CDN cache servers, they deliver traffic to broadband Internet access service providers via transit service or by entering into peering arrangements, directly interconnecting with broadband Internet access service providers.
198. In addition, several large broadband Internet access service providers, such as AT&T, Comcast, Time Warner Cable, and Verizon, have built or purchased their own backbones, giving them the ability to directly interconnect with other networks and edge providers and thereby lowering and eliminating payments to third-party transit providers. These interconnection arrangements are ''peering,'' involving the exchange of traffic only between the two networks and their customers, rather than paid transit, which provides access to the full Internet over a single interconnection. Peering gives the participants greater control over their traffic and any issues arising with the traffic exchange are limited to those parties, and not other parties over other interconnection links. Historically, broadband Internet access service providers paid for transit and therefore had an incentive to agree to settlement-free peering with a CDN to reduce transit costs; however, where large broadband Internet access service providers have their own national backbones and have settlement-free peering with other backbones, they may no longer have an incentive to agree to settlement-free peering with CDNs in order to avoid transit costs. As shown below in Chart 1, the evolution from reliance on transit to peering arrangements also means an evolution from a traffic exchange arrangement that provides access to the full Internet to a traffic exchange arrangement that only provides for the exchange of traffic from a specific network provider and its customers.
199. Recent Disputes. Recently, Internet traffic exchange disputes have reportedly involved not de-peering, as was more frequently the case in the last decade, but rather degraded experiences caused by congested ports between providers. In addition, these disputes have evolved from conflicts that may last a few days, to disputes that have been sustained for well over a year, and have gone from disputes between backbone service networks, to disputes between providers of broadband Internet access service and transit service providers, CDNs, or edge providers. The typical dispute has involved, on one side, a large broadband provider, and on the other side, a commercial transit provider (such as Cogent or Level 3) and/or a large CDN. Multiple parties point out, however, that interconnection problems can harm more than just the parties in a dispute. When links are congested and capacity is not augmented, the networks'--and applications, large and small, running over the congested links into and out of those networks'--experience degraded quality of service due to reduced throughput, increased packet loss, increased delay, and increased jitter. At the end of the day, consumers bear the harm when they experience degraded access to the applications and services of their choosing due to a dispute between a large broadband provider and an interconnecting party. Parties also assert that these disputes raise concerns about public safety and network reliability. To address these growing concerns, a number of parties have called for extending the rules proposed in the 2014 Open Internet NPRM to Internet traffic exchange practices.
200. The record reflects competing narratives. Some edge and transit providers assert that large broadband Internet access service providers are creating artificial congestion by refusing to upgrade interconnection capacity at their network entrance points for settlement-free peers or CDNs, thus forcing edge providers and CDNs to agree to paid peering arrangements. These parties suggest that paid arrangements resulting from artificially congested interconnection ports at the broadband Internet access service provider network edge could create the same consumer harms as paid arrangements in the last-mile, and lead to paid prioritization, fast lanes, degradation of consumer connections, and ultimately, stifling of innovation by edge providers. Further, edge providers argue that they are covering the costs of carrying this traffic through the network, bringing it to the gateway of the Internet access service, unlike in the past where both parties covered their own costs to reach the Tier 1 backbones where traffic would then be exchanged on a settlement-free basis. Edge and transit providers argue that the costs of adding interconnection capacity or directly connecting with edge providers are de minimis. Further, they assert that traffic ratios ''are arbitrarily set and enforced and are not reflective of how [broadband providers] sell broadband connections and how consumers use them.'' Thus, these edge and transit providers assert that a focus on only the last-mile portion of the Internet traffic path will fail to adequately constrain the potential for anticompetitive behavior on the part of broadband Internet access service providers that serve as gatekeepers to the edge providers, transit providers, and CDNs seeking to deliver Internet traffic to the broadband providers' end users.
201. In contrast, large broadband Internet access service providers assert that edge providers such as Netflix are imposing a cost on broadband Internet access service providers who must constantly upgrade infrastructure to keep up with the demand. Large broadband Internet access service providers explain that when an edge provider sends extremely large volumes of traffic to a broadband Internet access service provider'--e.g., through a CDN or a third-party transit service provider'--the broadband provider must invest in additional interconnection capacity (e.g., new routers or ports on existing routers) and middle-mile transport capacity in order to accommodate that traffic, exclusive of ''last-mile'' costs from the broadband Internet access provider's central offices, head ends, or cell sites to end-user locations. Commenters assert that if the broadband Internet access service provider absorbs these interconnection and transport costs, all of the broadband provider's subscribers will see their bills rise. They argue that this is unfair to subscribers who do not use the services, like Netflix, that are driving the need for additional capacity. Broadband Internet access service providers explain that settlement-free peering fundamentally is a barter arrangement in which each side receives something of value. These parties contend that if the other party is only sending traffic, it is not contributing something of value to the broadband Internet access service provider.
202. Mechanism to Resolve Traffic Exchange Disputes. As discussed, Internet traffic exchange agreements have historically been and will continue to be commercially negotiated. We do not believe that it is appropriate or necessary to subject arrangements for Internet traffic exchange (which are subsumed within broadband Internet access service) to the rules we adopt today. We conclude that it would be premature to adopt prescriptive rules to address any problems that have arisen or may arise. (We decline to adopt these and similar types of proposals for the same reasons we decline to apply the open Internet rules to traffic exchange.) It is also premature to draw policy conclusions concerning new paid Internet traffic exchange arrangements between broadband Internet access service providers and edge providers, CDNs, or backbone services. (For instance, Akamai expresses concern that adoption of rules governing interconnection could be used as a justification by some broadband providers to refuse direct interconnection to CDNs and other content providers generally, on the theory that connecting with any CDN necessitates connecting with all CDNs, regardless of technical feasibility. We do not intend such a result by our decision today to assert authority over interconnection.) While the substantial experience the Commission has had over the last decade with ''last-mile'' conduct gives us the understanding necessary to craft specific rules based on assessments of potential harms, we lack that background in practices addressing Internet traffic exchange. For this reason, we adopt a case-by-case approach, which will provide the Commission with greater experience. Thus, we will continue to monitor traffic exchange and developments in this market.
203. At this time, we believe that a case-by-case approach is appropriate regarding Internet traffic exchange arrangements between broadband Internet access service providers and edge providers or intermediaries'--an area that historically has functioned without significant Commission oversight. (We note, however, that the Commission has looked at traffic exchange in the context of mergers and, sometimes imposed conditions on traffic exchange.) Given the constantly evolving market for Internet traffic exchange, we conclude that at this time it would be difficult to predict what new arrangements will arise to serve consumers' and edge providers' needs going forward, as usage patterns, content offerings, and capacity requirements continue to evolve. Thus, we will rely on the regulatory backstop prohibiting common carriers from engaging in unjust and unreasonable practices. Our ''light touch'' approach does not directly regulate interconnection practices. Of course, this regulatory backstop is not a substitute for robust competition. The Commission's regulatory and enforcement oversight, including over common carriers, is complementary to vigorous antitrust enforcement. Indeed, mobile voice services have long been subject to Title II's just and reasonable standard and both the Commission and the Antitrust Division of the Department of Justice have repeatedly reviewed mergers in the wireless industry. Thus, it will remain essential for the Commission, as well as the Department of Justice, to continue to carefully monitor, review, and where appropriate, take action against any anti-competitive mergers, acquisitions, agreements or conduct, including where broadband Internet access services are concerned.
204. Broadband Internet access service involves the exchange of traffic between a last-mile broadband provider and connecting networks. (We disagree with commenters who argue that arrangements for Internet traffic exchange are private carriage arrangements, and thus not subject to Title II. As we explain below in today's Declaratory Ruling, Internet traffic exchange is a component of broadband Internet access service, which meets the definition of ''telecommunications service.'') The representation to retail customers that they will be able to reach ''all or substantially all Internet endpoints'' necessarily includes the promise to make the interconnection arrangements necessary to allow that access. As a telecommunications service, broadband Internet access service implicitly includes an assertion that the broadband provider will make just and reasonable efforts to transmit and deliver its customers' traffic to and from ''all or substantially all Internet endpoints'' under sections 201 and 202 of the Act. In any event, BIAS provider practices with respect to such arrangements are plainly ''for and in connection with'' the BIAS service. Thus, disputes involving a provider of broadband Internet access service regarding Internet traffic exchange arrangements that interfere with the delivery of a broadband Internet access service end user's traffic are subject to our authority under Title II of the Act. (We note that the Commission has forborne from application of many of the requirements of Title II to broadband Internet access service.)
205. We conclude that our actions regarding Internet traffic exchange arrangements are reasonable based on the record before us, which demonstrates that broadband Internet access providers have the ability to use terms of interconnection to disadvantage edge providers and that consumers' ability to respond to unjust or unreasonable broadband provider practices are limited by switching costs. These findings are limited to the broadband Internet access services we address today. (We observe that should a complaint arise regarding BIAS provider Internet traffic exchange practices, practices by edge providers (and their intermediaries) would be considered as part of the Commission's evaluation as to whether BIAS provider practices were ''just and reasonable'' under the Act.) When Internet traffic exchange breaks down'--regardless of the cause'--it risks preventing consumers from reaching the services and applications of their choosing, disrupting the virtuous cycle. We recognize the importance of timely review in the midst of commercial disputes. The Commission will be available to hear disputes raised under sections 201 and 202 on a case-by-case basis. We believe this is an appropriate vehicle for enforcement where disputes are primarily between sophisticated entities over commercial terms and that include companies, like transit providers and CDNs, that act on behalf of smaller edge providers. We also observe that section 706 provides the Commission with an additional, complementary source of authority to ensure that Internet traffic exchange practices do not harm the open Internet. As explained above, we have decided not to adopt specific regulations that would detail the practices that would constitute circumvention of the open Internet regulations we adopt today. Instead, and in a manner similar to our treatment of non-BIAS services, we will continue to monitor Internet traffic exchange arrangements and have the authority to intervene to ensure that they are not harming or threatening to harm the open nature of the Internet.
206. The record also reflects a concern that our decision to adopt this regulatory backstop violates the Administrative Procedure Act. (Verizon claims that ''in light of the Commission's past statements on interconnection, to suddenly regulate [interconnection] agreements for the first time in a final rule in this proceeding would violate the notice and comment requirements of the Administrative Procedure Act'' and that even issuing a Further Notice of Proposed Rulemaking would not allow the Commission to impose Title II regulations on interconnection services. The dissenting statements likewise assert that the 2014 Open Internet NPRM did not provide notice of the possibility that the Commission would assert authority over interconnection.) We disagree. To be clear, consistent with the NPRM's proposal, we are not applying the open Internet rules we adopt today to Internet traffic exchange. Rather, certain regulatory consequences flow from the Commission's classification of BIAS, including the traffic exchange component, as falling within the ''telecommunications services'' definition in the Act. In all events, the 2014 Open Internet NPRM provided clear notice about the possibility of expanding the scope of the open Internet rules to cover issues related to traffic exchange. (Section 553 provides that ''[g]eneral notice of proposed rulemaking shall be published in the Federal Register,'' and that ''[a]fter notice required by this section, the agency shall give interested persons an opportunity to participate in the rule making'' through submission of comments. 5 U.S.C. 553(b), (c). The Commission published the NPRM in the Federal Register at 79 FR 37448, July 1, 2014. It also made clear that the Commission was considering whether to reclassify retail broadband services. In addition, the 2014 Open Internet NPRM asked: ''How can we ensure that a broadband provider would not be able to evade our open Internet rules by engaging in traffic exchange practices that would be outside the scope of the rules as proposed?'' As discussed above, our assertion of authority over Internet traffic exchange practices addresses that question by providing us with the necessary case-by-case enforcement tools to identify practices that may constitute such evasion and address them. Further, to the extent that any doubts remain about whether the 2014 Open Internet NPRM provided sufficient notice, the approach adopted today is also a logical outgrowth of the original proposal included in the 2014 Open Internet NPRM. The numerous submissions in the record at every stage of the proceeding seeking to influence the Commission in its decision to adopt policies regulating Internet traffic exchange illustrate that the Commission not only gave interested parties adequate notice of the possibility of a rule, but that parties considered Commission action on that proposal a real possibility.
3. Non-BIAS Data Services207. In the 2014 Open Internet NPRM, the Commission tentatively concluded that it should not apply its conduct-based rules to services offered by broadband providers that share capacity with broadband Internet access service over providers' last-mile facilities, while closely monitoring the development of these services to ensure that broadband providers are not circumventing the open Internet rules. After reviewing the record, we believe the best approach is to adopt this tentative conclusion to permit broadband providers to offer these types of services while continuing to closely monitor their development and use. While the 2010 Open Internet Order and the 2014 Open Internet NPRM used the term ''specialized services'' to refer to these types of services, the term ''non-BIAS data services'' is a more accurate description for this class of services. While the services discussed below are not broadband Internet access service, and thus the rules we adopt do not apply to these services, we emphasize that we will act decisively in the event that a broadband provider attempts to evade open Internet protections (e.g., by claiming that a service that is the equivalent of Internet access is a non-BIAS data service not subject to the rules we adopt today).
208. We provide the following examples of services and characteristics of those services that, at this time, likely fit within the category of services that are not subject to our conduct-based rules. As indicated in the 2010 Open Internet Order, some broadband providers' existing facilities-based VoIP and Internet Protocol-video offerings would be considered non-BIAS data services under our rules. Further, the 2010 Open Internet Order also noted that connectivity bundled with e-readers, heart monitors, or energy consumption sensors would also be considered other data services to the extent these services are provided by broadband providers over last-mile capacity shared with broadband Internet access service. Additional examples of non-BIAS data services may include limited-purpose devices such as automobile telematics, and services that provide schools with curriculum-approved applications and content.
209. These services may generally share the following characteristics identified by the Open Internet Advisory Committee. First, these services are not used to reach large parts of the Internet. Second, these services are not a generic platform'--but rather a specific ''application level'' service. And third, these services use some form of network management to isolate the capacity used by these services from that used by broadband Internet access services.
210. We note, however, that non-BIAS data services may still be subject to enforcement action. Similar to the Commission's approach in 2010, if the Commission determines that a particular service is ''providing a functional equivalent of broadband Internet access service, or . . . is [being] used to evade the protections set forth in these rules,'' we will take appropriate enforcement action. Further, if the Commission determines that these types of service offerings are undermining investment, innovation, competition, and end-user benefits, we will similarly take appropriate action. We are especially concerned that over-the-top services offered over the Internet are not impeded in their ability to compete with other data services. (Further, we anticipate that consumers of competing over-the-top services will not be disadvantaged in their ability to access 911 service.)
211. The record overwhelmingly supports our decision to continue treating non-BIAS data services differently than broadband Internet access service under the open Internet rules. This approach will continue to drive additional investment in broadband networks and provide end users with valued services without otherwise constraining innovation. Further, as noted by numerous commenters, since other data services were permitted in the 2010 Open Internet Order, we have seen little resulting evidence of broadband providers using these services to undermine the 2010 rules.
212. Nevertheless, non-BIAS data services still could be used to evade the open Internet rules. Due to these concerns, we will continue to monitor the market for non-BIAS data services to ensure that these services are not causing or threatening to cause harm to the open nature of the Internet. Since the 2010 Open Internet Order, broadband Internet access providers have been required to disclose the impact of non-BIAS data services on the performance of and the capacity available for broadband Internet access services. As discussed in detail above, we will continue to monitor the existence and effects of non-BIAS data services under the broadband providers' transparency obligations.
213. We disagree with commenters who argue that the Commission should adopt a more-detailed definition for non-BIAS data services to safeguard against any such circumvention of the rules. Several commenters provided definitions of what they believe should constitute non-BIAS data services. Others, however, expressed concerns that a formal definition of non-BIAS data services risks potentially limiting future innovation and investment, ultimately negatively impacting consumer welfare. We share these concerns and thus decline to further define what constitutes ''non-BIAS data services'' or adopt additional policies specific to such services at this time. Again, however, we will closely monitor the development and use of non-BIAS data services and have authority to intervene if these services are utilized in a manner that harms the open Internet.
4. Reasonable Network Management214. The 2014 Open Internet NPRM proposed to retain a reasonable network management exception to the conduct-based open Internet rules, following the approach adopted in the 2010 Open Internet Order that permitted exceptions for ''reasonable network management'' practices to the no-blocking and no unreasonable discrimination rules. The 2014 Open Internet NPRM also tentatively concluded that the Commission should retain the definition of reasonable network management adopted as part of the 2010 rules that ''[a] network management practice is reasonable if it is appropriate and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service.''
215. The record broadly supports maintaining an exception for reasonable network management. We agree that a network management exception to the no-blocking rule, the no-throttling rule, and the no-unreasonable interference/disadvantage standard is necessary for broadband providers to optimize overall network performance and maintain a consistent quality experience for consumers while carrying a variety of traffic over their networks. (As discussed above, the transparency rule does not include an exception for reasonable network management. We clarify, however, that the transparency rule ''does not require public disclosure of competitively sensitive information or information that would compromise network security or undermine the efficacy of reasonable network management practices.'') Therefore, the no-blocking rule, the no-throttling rule, and the no-unreasonable interference/disadvantage standard will be subject to reasonable network management for both fixed and mobile providers of broadband Internet access service. In addition to retaining the exception, we retain the definition of reasonable network management with slight modifications:
216. For a practice to even be considered under this exception, a broadband Internet access service provider must first show that the practice is primarily motivated by a technical network management justification rather than other business justifications. If a practice is primarily motivated by such an other justification, such as a practice that permits different levels of network access for similarly situated users based solely on the particular plan to which the user has subscribed, then that practice will not be considered under this exception. The term ''particular network architecture and technology'' refers to the differences across broadband access platforms of any kind, including cable, fiber, DSL, satellite, unlicensed Wi-Fi, fixed wireless, and mobile wireless.
217. As noted above, reasonable network management is an exception to the no-blocking rule, no-throttling rule, and no-unreasonable interference/disadvantage standard, but not to the rule against paid prioritization. (Paid prioritization would be evaluated under the standards set forth in section II.C.1.c supra) This is because unlike conduct implicating the no-blocking, no-throttling, or no-unreasonable interference/disadvantage standard, paid prioritization is not a network management practice because it does not primarily have a technical network management purpose. (For purposes of the open Internet rules, prioritization of affiliated content, applications, or services is also considered a form of paid prioritization.) When considering whether a practice violates the no-blocking rule, no-throttling rule, or no-unreasonable interference/disadvantage standard, the Commission may first evaluate whether a practice falls within the exception for reasonable network management.
218. Evaluating Network Management Practices. The 2014 Open Internet NPRM proposed that the Commission adopt the same approach for determining the scope of network management practices considered to be reasonable as adopted in the 2010 Open Internet Order. (The Commission decided to determine the scope of reasonable network management on a case-by-case basis in the Open Internet Order and we maintain those same factors today.) We recognize the need to ensure that the reasonable network management exception will not be used to circumvent the open Internet rules while still allowing broadband providers flexibility to experiment and innovate as they reasonably manage their networks. We therefore elect to maintain a case-by-case approach. The case-by-case review also allows sufficient flexibility to address mobile-specific management practices because, by the terms of our rule, a determination of whether a network management practice is reasonable takes into account the particular network architecture and technology. We also note that our transparency rule requires disclosures that provide an important mechanism for monitoring whether providers are inappropriately exploiting the exception for reasonable network management.
219. To provide greater clarity and further inform the Commission's case-by-case analysis, we offer the following guidance regarding legitimate network management purposes. We also note that, similar to the 2010 reasonable network management exception, broadband providers may request a declaratory ruling or an advisory opinion from the Commission before deploying a network management practice, but are not required to do so.
220. As with the network management exception in the 2010 Open Internet Order, broadband providers may implement network management practices that are primarily used for, and tailored to, ensuring network security and integrity, including by addressing traffic that is harmful to the network, such as traffic that constitutes a denial-of-service attack on specific network infrastructure elements. Likewise, broadband providers may also implement network management practices that are primarily used for, and tailored to, addressing traffic that is unwanted by end users. Further, we reiterate the guidance of the 2010 Open Internet Order that network management practices that alleviate congestion without regard to the source, destination, content, application, or service are also more likely to be considered reasonable network management practices in the context of this exception. (As in the no throttling rule and the no unreasonable interference or unreasonable disadvantage standard, we include classes of content, applications, services, or devices.) In evaluating congestion management practices, a subset of network management practices, we will also consider whether the practice is triggered only during times of congestion and whether it is based on a user's demand during the period of congestion.
221. We also recognize that some network management practices may have a legitimate network management purpose, but also may be exploited by a broadband provider. We maintain the guidance underlying the 2010 Open Internet Order' s case-by-case analysis that a network management practice is more likely to be found reasonable if it is transparent, and either allows the end user to control it or is application-agnostic.
222. As in 2010, we decline to adopt a more detailed definition of reasonable network management. For example, one proposal suggests that the Commission limit the circumstances in which network management techniques can be used so they would only be reasonable if they were used temporarily, for exceptional circumstances, and have a proportionate impact to solve a targeted problem. We acknowledge the advantages a more detailed definition of network management can have on long-term network investment and transparency, but at this point, there is not a need to place such proscriptive limits on broadband providers. (While some commenters note that there have not been any major technological changes in how broadband providers manage traffic since 2010, others indicate that broadband providers have acquired additional techniques that allow them to manage traffic in real-time.) Furthermore, a more detailed definition of reasonable network management risks quickly becoming outdated as technology evolves. Case-by-case analysis will allow the Commission to use the conduct-based rules adopted today to take action against practices that are known to harm consumers without interfering with broadband providers' beneficial network management practices. (Beneficial practices include protecting their Internet access services against malicious content or offering a service limited to offering ''family friendly'' materials to end users who desire only such content.)
223. We believe that the reasonable network management exception provides both fixed and mobile broadband providers sufficient flexibility to manage their networks. We recognize, consistent with the consensus in the record, that the additional challenges involved in mobile broadband network management mean that mobile broadband providers may have a greater need to apply network management practices, including mobile-specific network management practices, and to do so more often to balance supply and demand while accommodating mobility. As the Commission observed in 2010, mobile network management practices must address dynamic conditions that fixed, wired networks typically do not, such as the changing location of users as well as other factors affecting signal quality. The ability to address these dynamic conditions in mobile network management is especially important given capacity constraints many mobile broadband providers face. Moreover, notwithstanding any limitations on mobile network management practices necessary to protect the open Internet, we anticipate that mobile broadband providers will continue to be able to use a multitude of tools to manage their networks, including an increased number of network management tools available in 4G LTE networks.
224. We note in a similar vein that providers relying on unlicensed Wi-Fi networks have specific network management needs. For example, these providers can ''face spectrum constraints and congestion issues that can pose particular network-management challenges'' and also ''must accept and manage interference from other users in the unlicensed bands.'' Again, the Commission will take into account when and how network management measures are applied as well as the particular network architecture and technology of the broadband Internet access service in question, in determining if a network management practice is reasonable. For these reasons, we reject the argument that rules with exceptions only for reasonable network management practices would ''tie the hands of operators and make it more challenging to meet consumers' needs'' or that ''the mere threat of post hoc regulatory review . . . would disrupt and could chill optimal network management practices.'' In recognizing the unique challenges, network architecture, and network management of mobile broadband networks (and others, such as unlicensed Wi-Fi networks), we conclude that the reasonable network management exception addresses this concern and strikes an appropriate balance between the need for flexibility and ensuring the Commission has the tools necessary to maintain Internet openness.
E. Enforcement of the Open Internet Rules1. Background225. Timely and effective enforcement of the rules we adopt in this Order is crucial to preserving an open Internet, enhancing competition and innovation, and providing clear guidance to consumers and other stakeholders. As has been the case since we adopted our original open Internet rules in 2010, we anticipate that many disputes that will arise can and should be resolved by the parties without Commission involvement. We encourage parties to resolve disputes through informal discussions and private negotiations whenever possible. To the extent disputes are not resolved, the Commission will continue to provide backstop mechanisms to address them. We also will proactively monitor compliance and take strong enforcement action against parties who violate the open Internet rules.
226. In the 2010 Open Internet Order, the Commission established a two-tiered framework for enforcing open Internet rules. The Commission allowed parties to file informal complaints pursuant to section 1.41 of our rules and promulgated new procedures to govern formal complaints alleging violations of the open Internet rules. This framework was not affected by the D.C. Circuit's decision in Verizon. It therefore remains in effect and will apply to complaints regarding the rules we adopt in this Order. Informal complaints provide end users, edge providers, and others with a simple and efficient vehicle for bringing potential open Internet violations to the attention of the Commission. The formal complaint rules permit any person to file a complaint with the Commission alleging an open Internet rule violation and to participate in an adjudicatory proceeding to resolve the complaint. In addition to these mechanisms for resolving open Internet complaints, the Commission continuously monitors press reports and other public information, which may lead the Enforcement Bureau to initiate an investigation of potential open Internet rule violations.
227. In the 2014 Open Internet NPRM, the Commission sought comment on the efficiency and functionality of the complaint processes adopted in the 2010 Open Internet Order and on mechanisms we should consider to improve enforcement and dispute resolution. We tentatively concluded that our open Internet rules should include at least three fundamental elements: (1) Legal certainty, so that broadband providers, edge providers, and end users can plan their activities based on clear Commission guidance; (2) flexibility to consider the totality of the facts in an environment of dynamic innovation; and (3) effective access to dispute resolution. We affirm the importance of these principles below and discuss several enhancements to our existing open Internet complaint rules to advance them. In addition, we adopt changes to our complaint processes to ensure that they are accessible and user-friendly to consumers, small businesses, and other interested parties, as well as changes to ensure that that our review of complaints is inclusive and informed by groups with relevant technical or other expertise.
2. Designing an Effective Enforcement Processa. Legal Certainty228. We sought comment in the 2014 Open Internet NPRM on ways to design an effective enforcement process that provides legal certainty and predictability to the marketplace. In addition to our current complaint resolution framework, we requested input on what other forms of guidance would be helpful. We solicited feedback on whether the Commission should: (1) Establish an advisory opinion process, akin to ''business review letters'' issued by the Department of Justice (DOJ), and/or non-binding staff opinions, through which parties could ask the Commission for a statement of its current enforcement intentions with respect to certain practices under the new rules; and (2) publish enforcement advisories that provide additional insight into the application of the rules. Many commenters recognized the benefits of clear rules and greater predictability regarding open Internet protections.
(i) Advisory Opinions229. We conclude that use of advisory opinions similar to those issued by DOJ's Antitrust Division is in the public interest and would advance the Commission's goal of providing legal certainty. (We decline to adopt non-binding staff opinions in light of our decision to establish an advisory opinion process similar to the DOJ Antitrust Division's business review letter approach, as well as existing voluntary mediation processes to resolve open Internet disputes that are available through the Enforcement Bureau's Market Disputes and Resolutions Division.) Although the Commission historically has not used advisory opinions to promote compliance with our rules, we conclude that they have the potential to serve as useful tools to provide clarity, guidance, and predictability concerning the open Internet rules. (Parties also have the option to file a petition for declaratory ruling under section 1.2 of the Commission's rules, 47 CFR 1.2. In contrast to declaratory rulings, advisory opinions may only relate to prospective conduct, and the Enforcement Bureau will not seek comment on advisory opinions via public notice.) Advisory opinions will enable companies to seek guidance on the propriety of certain open Internet practices before implementing them, enabling them to be proactive about compliance and avoid enforcement actions later. The Commission may use advisory opinions to explain how it will evaluate certain types of behavior and the factors that will be considered in determining whether open Internet violations have occurred. Because these opinions will be publicly available, we believe that they will reduce the number of disputes by providing guidance to the industry.
230. In this Order, we adopt rules promulgating basic requirements for obtaining advisory opinions, as well as limitations on their issuance. Any entity that is subject to the Commission's jurisdiction may request an advisory opinion regarding its own proposed conduct that may implicate the rules we adopt in this Order, the rules that remain in effect from the 2010 Open Internet Order, or any other rules or policies related to the open Internet that may be adopted in the future.
231. Requests for advisory opinions may be filed via the Commission's Web site or with the Office of the Secretary and must be copied to the Commission staff specified in the rules. We delegate authority to issue advisory opinions to the Enforcement Bureau, which will coordinate with other Bureaus and Offices on the issuance of opinions. The Enforcement Bureau will have discretion to choose whether it will respond to the request. If the Bureau declines to respond to a request, it will inform the requesting party in writing. As a general matter, the Bureau will be more likely to respond to requests where the proposed conduct involves a substantial question of fact or law and there is no clear Commission or court precedent, or the subject matter of the request and consequent publication of Commission advice is of significant public interest. In addition, the Bureau will decline to respond to requests if the same conduct is the subject of a current government investigation or proceeding, including any ongoing litigation or open rulemaking.
232. Requests for advisory opinions must relate to prospective or proposed conduct that the requesting party intends to pursue. The Enforcement Bureau will not respond to hypothetical questions or inquiries about proposals that are mere possibilities. The Bureau also will not respond to requests for opinions that relate to ongoing or prior conduct, and the Bureau may initiate an enforcement investigation to determine whether such conduct violates the open Internet rules.
233. Requests for advisory opinions should include all material information sufficient for Commission staff to make a determination on the proposed conduct; however, staff will have discretion to ask parties requesting opinions, as well as other parties that may have information relevant to the request or that may be impacted by the proposed conduct, for additional information that the staff deems necessary to respond to the request. Because advisory opinions will rely on full and truthful disclosures by the requesting entities, requesters must certify that factual representations made to the Enforcement Bureau are truthful and accurate, and that they have not intentionally omitted any material information from the request. Advisory opinions will expressly state that they rely on the representations made by the requesting party, and that they are premised on the specific facts and representations in the request and any supplemental submissions.
234. Although the Enforcement Bureau will attempt to respond to requests for advisory opinions expeditiously, we decline to establish any firm deadlines to rule on them or issue response letters. The Commission appreciates that if the advisory opinion process is not timely, it will be less valuable to interested parties. However, response times will likely vary based on numerous factors, including the nature and complexity of the issues, the magnitude and sufficiency of the request and the supporting information, and the time it takes for the requester to respond to staff requests for additional information. An advisory opinion will provide the Enforcement Bureau's conclusion regarding whether or not the proposed conduct will comply with the open Internet rules. The Bureau will have discretion to indicate in an advisory opinion that it does not intend to take enforcement action based on the facts, representations, and warranties made by the requesting party. The requesting party may rely on the opinion only to the extent that the request fully and accurately contains all the material facts and representations necessary for the opinion and the situation conforms to the situation described in the request for opinion. The Enforcement Bureau will not bring an enforcement action against a requesting party with respect to any action taken in good faith reliance upon an advisory opinion if all of the relevant facts were fully, completely, and accurately presented to the Bureau, and where such action was promptly discontinued upon notification of rescission or revocation of the Commission's or the Bureau's approval.
235. Advisory opinions will be issued without prejudice to the Enforcement Bureau's ability to reconsider the questions involved, or to rescind or revoke the opinion. Similarly, because advisory opinions issued at the staff level are not formally approved by the full Commission, they will be issued without prejudice to the Commission's right to later rescind the findings in the opinion. Because advisory opinions will address proposed future conduct, they necessarily will not concern any case or controversy that is ripe for appeal.
236. The Enforcement Bureau will make advisory opinions available to the public. In order to provide meaningful guidance to other stakeholders, the Bureau will also publish the initial request for guidance and any associated materials. Thus, the rules that we adopt establish procedures for entities soliciting advisory opinions to request confidential treatment of certain information.
237. Many commenters support the use of advisory opinions as a means for the Commission to provide authoritative guidance to parties about the application of open Internet rules and the Commission's enforcement intentions. In addition, some commenters suggest that review letters and staff opinions should be voluntary. We agree that solicitation of advisory opinions should be purely voluntary, and that failure to seek such an opinion will not be used as evidence that an entity's practices are inconsistent with our rules.
238. The Wireless Internet Service Providers Association (WISPA) opposes the adoption of an advisory opinion process ''because it assumes an inherent uncertainty in the rules and creates a `mother may I' regime'--essentially creating a system where a broadband provider must ask the Commission for permission when making business decisions.'' According to WISPA, ''[t]his system would increase regulatory uncertainty and stifle broadband providers from innovating new technologies or business methods. It also would be expensive for a small provider to implement, requiring legal and professional expertise.''
239. We find that WISPA's concerns are misguided. Because requests for advisory opinions will be entirely voluntary, we disagree with the contention that their use would force broadband providers to seek permission before implementing new policies or technologies and thereby stifle innovation. In addition, we agree with other commenters that advisory opinions would provide more, not less, certainty regarding the legality of proposed business practices.
(ii) Enforcement Advisories240. We conclude that the periodic publication of enforcement advisories will advance the Commission's goal of promoting legal certainty regarding the open Internet rules. In the 2014 Open Internet NPRM, we inquired whether the Commission should issue guidance in the form of enforcement advisories that provide insight into the application of Commission rules. Enforcement advisories are a tool that the Commission has used in numerous contexts, including the current open Internet rules. We asked whether continued use of such advisories would be helpful where issues of potential general application come to the Commission's attention, and whether these advisories should be considered binding policy of the Commission or merely a recitation of staff views.
241. Numerous commenters maintain that the Commission should continue to use enforcement advisories to offer clarity, guidance, and predictability concerning the open Internet rules. We agree. Enforcement advisories do not create new policies, but rather are recitations and reminders of existing legal standards and the Commission's current enforcement intentions. (We disagree with the contention that public notice and comment should be a prerequisite for the Commission to issue an enforcement advisory. The Commission uses its rulemaking procedures when we are adopting rule changes that require notice and comment. Conversely, enforcement advisories are used to remind parties of existing legal standards.) We see no need to deviate from our current practice of issuing such advisories to periodically remind parties about legal standards regarding the open Internet rules.
b. Flexibility(i) Means of Enforcement and General Enforcement Mechanisms242. We will preserve the Commission's existing avenues for enforcement of open Internet rules'--self-initiated investigation by the Enforcement Bureau, informal complaints, and formal complaints. Commenters agree with the value of retaining these three main mechanisms for commencing enforcement of potential open Internet violations, as this combination ensures multiple entry points to the Commission's processes and gives both complainants and the Commission enforcement flexibility.
243. In addition, the Commission will continue to honor requests for informal complaints to remain anonymous, and will also continue to maintain flexible channels for reporting suspected violations, like confidential calls to the Enforcement Bureau. Although some commenters raise concerns about anonymous complaint filings, others stress the importance of having the option to request anonymity when filing an informal complaint. We note, however, that complainants who are not anonymous frequently have better success getting their concerns addressed because the service provider can then troubleshoot their specific concerns.
244. We also adopt our tentative conclusion in the 2014 Open Internet NPRM that enforcement of the transparency rule should proceed under the same dispute mechanisms that apply to other rules contained in this Order. We believe that providing both complainants and the Commission with flexibility to address violations of the transparency rule will continue to be important and that the best means to ensure compliance with both the transparency rule and the other rules we adopt today is to apply a uniform and consistent enforcement approach.
245. Finally, we conclude that violations of the open Internet rules will be subject to any and all penalties authorized under the Communications Act and rules, (Section 706 was enacted as part of the 1996 Telecommunications Act, and it is therefore subject to any and all penalties under the Act and our rules. See Verizon, 740 F.3d at 650 (''Congress expressly directed that the 1996 Act . . . be inserted into the Communications Act of 1934.'') (quoting AT&T Corp. v. Iowa Utilities Board, 525 U.S. 366, 377 (1999)).) including but not limited to admonishments, citations, notices of violation, notices of apparent liability, monetary forfeitures and refunds, cease and desist orders, revocations, and referrals for criminal prosecution. Moreover, negotiated Consent Decrees can contain damages, restitution, compliance requirements, attorneys' fees, declaratory relief, and equitable remedies like injunctions, equitable rescissions, reformations, and specific performance.
(ii) Case-by-Case Analysis246. The 2014 Open Internet NPRM emphasized that the process for providing and promoting an open Internet must be flexible enough to accommodate the ongoing evolution of Internet technology. We therefore tentatively concluded that the Commission should continue to use a case-by-case approach, taking into account the totality of the circumstances, in considering alleged violations of the open Internet rules.
247. We affirm our proposal to continue to analyze open Internet complaints on a case-by-case basis. (We reject the suggestion that the Commission promulgate additional rules of conduct because it is unrealistic to expect that in this varied and rapidly evolving technological environment the agency will be able to anticipate the specific conduct that will give rise to future disputes.) We agree with commenters that flexible rules, administered through case-by-case analysis, will enable us to pursue meaningful enforcement, consider consumers' individual concerns, and account for rapidly changing technology.
(iii) Fact-Finding Processes248. In the 2014 Open Internet NPRM, we sought comment about how to most effectively structure a flexible fact finding process in analyzing open Internet complaints. We asked what level of evidence should be required in order to bring a claim. With regard to formal complaint proceedings, we also asked what showing should be required for the burden of production to shift from the party bringing the claim to the defendant, as well as whether parties could seek expedited treatment.
249. Informal Complaints. Our current rules permitting the filing of informal complaints include a simple and straightforward evidentiary standard. Under section 1.41 of our rules, ''[r]equests should set forth clearly and concisely the facts relied upon, the relief sought, the statutory and/or regulatory provisions (if any) pursuant to which the request is filed and under which relief is sought, and the interest of the person submitting the request.'' Although our rules do not establish any specific pleading requirements for informal complaints, parties filing them should attempt to provide the Commission with sufficient information and specific facts that, if proven true, would constitute a violation of the open Internet rules.
250. We find that our existing informal complaint rule offers an accessible and effective mechanism for parties'--including consumers and small businesses with limited resources'--to report possible noncompliance with our open Internet rules without being subject to burdensome evidentiary or pleading requirements. We conclude that there is no basis in the record for modifying the existing standard and decline to do so.
251. Formal Complaints. Our current open Internet formal complaint rules provide broad flexibility to adapt to the myriad potential factual situations that might arise. For example, as noted in the 2010 Open Internet Order, some cases can be resolved based on the pleadings if the complaint and answer contain sufficient factual material to decide the case. A simple case could thus be adjudicated in an efficient, streamlined manner. For more complex matters, the existing rules give the Commission discretion to require other procedures, including discovery, briefing, a status conference, oral argument, an evidentiary hearing, or referral to an administrative law judge (ALJ). Similarly, the rules provide the Commission discretion to grant temporary relief where appropriate.
252. In addition, our open Internet formal complaint process already contemplates burden shifting. (As we noted in the 2010 Open Internet Order, our current processes permit the Commission to shift the burden of production where appropriate.) Generally, complainants bear the burden of proof and must demonstrate by a preponderance of the evidence that an alleged violation has occurred. A complainant must plead with specificity the basis of its claim and provide facts and documentation, when possible, to establish a prima facie rule violation. Defendants must answer each claim with particularity and furnish facts, supported by documentation or affidavit, demonstrating that the challenged practice complies with our rules. Defendants do not have the option of merely pointing out that the complainant has failed to meet his or her burden; they must show that they are in compliance with the rules. The complainant then has an opportunity to respond to the defendant's submission. We retain our authority to shift the burden of production when, for example, the evidence necessary to assess the alleged unlawful practice is predominately in the possession of the broadband provider. If a complaining party believes the burden of production should shift, it should explain why in the complaint. Complainants also must clearly state the relief requested. We conclude that we should retain our existing open Internet procedural rules and that all formal complaints that relate to open Internet disputes, including Internet traffic exchange disputes, will be subject to those rules. Although comparable to the section 208 formal complaint rules, the open Internet rules are less burdensome on complainants, who in this context are likely to be consumers or small edge providers with limited resources. (The section 208 rules, for example, require complainants to submit information designations, proposed findings of fact and conclusions of law, and affidavits demonstrating the basis for complainant's belief for unsupported allegations and why complainant could not ascertain facts from any source. See, e.g.,47 CFR 1.721(a) (5), (6), (10). The open Internet formal complaint rules do not contain similar requirements.) Moreover, as described above, the open Internet procedural rules allow the Commission broader flexibility in tailoring proceedings to fit particular cases. (For example, under the open Internet rules, the Commission may order an evidentiary hearing before an administrative law judge (ALJ) or Commission staff. See47 CFR 8.14(e)(1), (g). The section 208 rules contain no such provision. In addition, unlike the section 208 rules, the open Internet rules do not contain numerical limits on discovery requests. Compare id. section 8.14(f) with id. section 1.729(a).)
253. Several commenters stress the need for speedy resolution of complaints, given the rapid pace of Internet commerce and the potential consumer harms and market chilling effects deriving from slow resolution. While we share these concerns, we decline to adopt fixed, short deadlines for resolving formal complaints but pledge to move expeditiously. As noted in the 2010 Open Internet Order, the Commission may shorten deadlines or otherwise revise procedures to expedite the adjudication of complaints. Additionally, the Commission will determine, on the basis of the evidence before it, whether temporary relief should be afforded any party pending final resolution of a complaint and, if so, the nature of any such temporary relief. (The Supreme Court has affirmed the Commission's authority to impose interim injunctive relief pursuant to section 4(i) of the Act.) As noted above, some open Internet cases may be straightforward and suitable for decision in a 60 to 90 day timeframe. Other cases may be more factually and technologically complex, requiring more time for the parties to pursue discovery and build an adequate record, and sufficient time for the Commission to make a reasoned decision. Therefore, we find that the existing process'--allowing parties to request expedited treatment'--best fits the needs of potential open Internet formal complaints.
c. Effective Access To Dispute Resolution254. In this section, we adopt the proposal from the 2014 Open Internet NPRM to establish an ombudsperson to assist consumers, businesses, and organizations with open Internet complaints and questions by ensuring these parties have effective access to the Commission's processes that protect their interests. The record filed supports our conclusion that these parties would benefit from having an ombudsperson as a point of contact within the Commission for questions and complaints.
255. Comments in support of the establishment of an ombudsperson clearly demonstrate the range of groups a dedicated ombudsperson can serve. For example, the American Association of People with Disabilities expressed particular interest in the potential of the ombudsperson to monitor concerns regarding accessibility and the open Internet. In addition, the comments of Higher Education Libraries asked that libraries be amongst the groups served by the ombudsperson and those of the Alaska Rural Coalition expressed interest in the ombudsperson also being accessible to small carriers with concerns. In contrast, some commenters expressed concerns about the creation of a dedicated ombudsperson. However, as described below, the ombudsperson will work as a point of contact and a source of assistance as needed, not as an advocate or as an officer who must be approached for approval, addressing many of these concerns.
256. The Open Internet Ombudsperson will serve as a point of contact to provide assistance to individuals and organizations with questions or complaints regarding the open Internet to ensure that small and often unrepresented groups reach the appropriate bureaus and offices to address specific issues of concern. For example, the ombudsperson will be able to provide initial assistance with the Commission's dispute resolution procedures by directing such parties to the appropriate templates for formal and informal complaints. We expect the ombudsperson will assist interested parties in less direct but equally important ways. These could include conducting trend analysis of open Internet complaints and, more broadly, market conditions, that could be summarized in reports to the Commission regarding how the market is functioning for various stakeholders. The ombudsperson may investigate and bring attention to open Internet concerns, and refer matters to the Enforcement Bureau for potential further investigation. The ombudsperson will be housed in the Consumer & Governmental Affairs Bureau, which will remain the initial informal complaint intake point, and will coordinate with other bureaus and offices, as appropriate, to facilitate review of inquiries and complaints regarding broadband services.
3. Complaint Processes and Forms of Dispute Resolutiona. Complaint Filing Procedures257. In the 2014 Open Internet NPRM, we sought comment on how open Internet complaints should be received, processed, and enforced. We asked if there were ways to improve access to our existing informal and formal complaint processes, especially for consumers, small businesses, and other entities with limited resources and knowledge of how our complaint processes work. We also asked whether the current enforcement and dispute resolution tools at the Commission's disposal are sufficient for resolving violations of open Internet rules.
258. Informal Complaints. First, we will implement processes to make it easier to lodge informal open Internet complaints, including a new, more intuitive online complaint interface. The Commission recently launched a new Consumer Help Center, which provides a user-friendly, streamlined means to access educational materials on consumer issues and to file complaints. Consumers who seek to file an open Internet complaint should visit the Consumer Help Center portal and click the Internet icon for the materials or the online intake system for complaints. The complaint intake system is designed to guide the consumer efficiently through the questions that need to be answered in order to file a complaint. The Consumer Help Center will make available aggregate data about complaints received, including those pertaining to open Internet issues. Some data is currently available, with additional and more granular data to be provided over time. We believe these efforts will improve access to the Commission's open Internet complaint processes.
259. Formal Complaints. With respect to formal complaints, we amend the Commission's Part 8 open Internet rules to require electronic filing of all pleadings in open Internet formal complaint proceedings. Currently, parties to such proceedings must file hard copies of pleadings with the Office of the Secretary. This process is time-consuming for the parties and makes it difficult for the public to track case developments. Although members of the public may obtain copies of the pleadings from the Commission's Reference Information Center, there is no way to search for or view pleadings electronically. Today's actions modernize and reform these existing procedures. (The rule changes described in this section do not apply to open Internet informal complaints. Consumers will continue to have the ability to file informal complaints electronically with the Consumer & Governmental Affairs Bureau. The form for filing an informal complaint is available at https://consumercomplaints.fcc.gov/hc/en-us.)
260. In 2011, the Commission released a Report and Order revising part 1 and part 0 of its rules. One aspect of the Part 1 Order was a requirement that docketing and electronic filing begin to be utilized in proceedings involving ''[n]ewly filed section 208 formal common carrier complaints and newly filed section 224 pole attachment complaints before the Enforcement Bureau.'' On November 12, 2014, the Commission released an Order that amended its procedural rules governing formal complaints under section 208 and pole attachment complaints under section 224 to require electronic filing. We established within ECFS a ''Submit a Non-Docketed Filing'' module where all such complaints must be filed because staff must review a complaint for conformance with the Commission's rules before the matter can receive its own unique ECFS proceeding number.
261. We now extend those rule changes to open Internet formal complaints. (We hereby amend the caption for the ECFS docket to ''section 208 and 224 and Open Internet Complaint Inbox, Restricted Proceedings.'' We also amend rule 8.16, which governs confidentiality of proprietary information, to conform to the changes we made regarding confidentiality in the section 208 and section 224 complaint rules. See infraAppendix (detailing revisions to 47 CFR 8.16).) When filing such a complaint, as of the effective date of this Order, the complainant will be required to select ''Open Internet Complaint: Restricted Proceeding'' from the ''Submit a Non-Docketed Filing'' module in ECFS. The filing must include the complaint, as well as all attachments to the complaint. (All electronic filings must be machine-readable, and files containing text must be formatted to allow electronic searching and/or copying (e.g., in Microsoft Word or PDF format). Non-text filings (e.g., Microsoft Excel) must be submitted in native format. Be certain that filings submitted in .pdf or comparable format are not locked or password-protected. If those restrictions are present (e.g., a document is locked), the ECFS system may reject the filing, and a party will need to resubmit its document within the filing deadline. The Commission will consider granting waivers to this electronic filing requirement only in exceptional circumstances.) When using ECFS to initiate new proceedings, a complainant no longer will have to file its complaint with the Office of the Secretary unless the complaint includes confidential information.
262. Enforcement Bureau staff will review new open Internet formal complaints for conformance with procedural rules (including fee payment). As of the effective date of this Order, complainants no longer will submit a hard copy of the complaint with the fee payment as described in rule 1.1106. Instead, complainants must first transmit the complaint filing fee to the designated payment center and then file the complaint electronically using ECFS. (Complainants may transmit the complaint filing fee via check, wire transfer, or electronically using the Commission's Fee Filer System (Fee Filer).)
263. Assuming a complaint satisfies this initial procedural review, Enforcement Bureau staff then will assign an EB file number to the complaint (EB Identification Number), give the complaint its own case-specific ECFS proceeding number, and enter both the EB Identification Number and ECFS proceeding number into ECFS. At that time, Enforcement Bureau staff will post a Notice of Complaint Letter in the case-specific ECFS proceeding and transmit the letter (and the complaint) via email to the defendant. On the other hand, if a filed complaint does not comply with the Commission's procedural rules, Enforcement Bureau staff will serve a rejection letter on the complainant and post the rejection letter and related correspondence in ECFS. Importantly, the rejection letter will not preclude the complainant from curing the procedural infirmities and refiling the complaint.
264. As of the effective date of this Order, all pleadings, attachments, exhibits, and other documents in open Internet formal complaint proceedings must be filed using ECFS, both in cases where the complaint was initially filed in ECFS and in pending cases filed under the old rules. With respect to complaints filed prior to the effective date of this Order, Enforcement Bureau staff will assign an individual ECFS proceeding number to each existing proceeding and notify existing parties by email of this new ECFS number. This ECFS proceeding number will be in addition to the previously-assigned number. The first step in using ECFS is to input the individual case's ECFS proceeding number or EB Identification Number. The new rules allow parties to serve post-complaint submissions on opposing parties via email without following up by regular U.S. mail. Parties must provide hard copies of submissions to staff in the Market Disputes Resolution Division of the Enforcement Bureau upon request.
265. Consistent with existing Commission electronic filing guidelines, any party asserting that materials filed in an open Internet formal complaint proceeding are proprietary must file with the Commission, using ECFS, a public version of the materials with any proprietary information redacted. The party also must file with the Secretary's Office an unredacted hard copy version that contains the proprietary information and clearly marks each page, or portion thereof, using bolded brackets, highlighting, or other distinct markings that identify the sections of the filing for which a proprietary designation is claimed. (Filers must ensure that proprietary information has been properly redacted and thus is not viewable. If a filer inadvertently discloses proprietary information, the Commission will not be responsible for that disclosure.) Each page of the redacted and unredacted versions must be clearly identified as the ''Public Version'' or the ''Confidential Version,'' respectively. Both versions must be served on the same day.
b. Alternative Dispute Resolution266. The Commission sought comment on various modes of alternative dispute resolution for resolving open Internet disputes. Currently, parties with disputes before the Commission are free to voluntarily engage in mediation, which is offered by the Market Disputes Resolution Division (MDRD) at no charge to the parties. This process has worked well and has led to the effective resolution of numerous complaints. We will take steps to improve awareness of this approach. In the 2014 Open Internet NPRM, we asked whether other approaches, such as arbitration, should be considered, in order to ensure access to dispute resolution by smaller edge providers and other entities without resources to engage in the Commission's formal complaint process.
267. We decline to adopt arbitration procedures or to mandate arbitration for parties to open Internet complaint proceedings. Under the rules adopted today, parties are still free to engage in mediation and outside arbitration to settle their open Internet disputes, but alternative dispute resolution will not be required. (As a general matter, the Commission lacks the ability to subdelegate its authority over these disputes to a private entity, like a third-party arbitrator, see U.S. Telecom Ass'n v. FCC, 359 F.3d 554, 566 (D.C. Cir. 2004) (''[W]hile federal agency officials may subdelegate their decision-making authority to subordinates absent evidence of contrary congressional intent, they may not subdelegate to outside entities-private or sovereign-absent affirmative evidence of authority to do so''), and ''may not require any person to consent to arbitration as a condition of entering into a contract or obtaining a benefit.'' As noted in the 2014 Open Internet NPRM, however, mandatory third-party arbitration may be allowed so long as it is subject to de novo review by the Commission.) Commenters generally do not favor arbitration in this context and recommend that the Commission not adopt it as the default method for resolving complaints. Commenters suggest that mandatory arbitration, in particular, may more frequently benefit the party with more resources and more understanding of dispute procedure, and therefore should not be adopted. We agree with these concerns and conclude that adoption of arbitration rules is not necessary or appropriate in this context.
c. Multistakeholder Processes and Technical Advisory Groups268. In the 2014 Open Internet NPRM, the Commission sought comment on whether enforcement of open Internet rules'--including resolution of open Internet disputes'--could be supported by multistakeholder processes that enable the development of independent standards to guide the Commission in compliance determinations. The Commission also asked whether it should incorporate the expertise of technical advisory groups into these determinations.
269. We conclude that incorporating groups with technical expertise into our consideration of formal complaints has the potential to inform the Commission's judgment and improve our understanding of complex and rapidly evolving technical issues. By requiring electronic filing of all pleadings in open Internet formal complaint proceedings, we will enable interested parties to more easily track developments in the proceedings and participate as appropriate. Although formal complaint proceedings are generally restricted for purposes of the Commission's ex parte rules, interested parties may seek permission to file an amicus brief. The Commission ''consider[s] on a case-by-case basis motions by non-parties wishing to submit amicus-type filings addressing the legal issues raised in [a] proceeding,'' and grants such requests when warranted. (If a party to the proceeding is a member of or is otherwise represented by an entity that requests leave to file an amicus brief, the entity must disclose that affiliation in its request.) Thus, for example, the Commission granted a motion for leave to file an amicus brief in a section 224 pole attachment complaint proceeding ''in light of the broad policy issues at stake.
270. To further advance the values underlying multistakeholder processes'--inclusivity, transparency, and expertise'--we also amend our Part 8 formal complaint rules by delegating authority to the Enforcement Bureau, in its discretion, to request a written opinion from an outside technical organization. As reviewing courts have established, ''[a] federal agency may turn to an outside entity for advice and policy recommendations, provided the agency makes the final decisions itself.''
271. In this instance, given the potential complexity of the issues in open Internet formal complaint proceedings, it may be particularly useful to obtain objective advice from industry standard-setting bodies or other similar organizations. Providing Commission staff with this flexibility also will enable more informed determinations of technical Internet issues that reflect current industry standards and permit staff to keep pace with rapidly changing technology. (Whenever possible, the Enforcement Bureau should request advisory opinions from expert organizations whose members do not include any of the parties to the proceeding. If no such organization exists, the Enforcement Bureau may refer issues to an expert organization with instructions that representatives of the parties to the complaint proceeding may not participate in the organization's consideration of the issues referred or the drafting of its advisory opinion.) Expert organizations will not be required to respond to requests from the Enforcement Bureau for opinions; however, any organization that elects to do so must provide the opinion within 30 days of the request'--unless otherwise specified by the staff'--in order to facilitate timely dispute resolution. We find that this approach will allow for the inclusivity the multistakeholder process offers, while also providing the predictability and legal certainty of the Commission's formal dispute resolution process.
272. For informal complaints and investigations, the Enforcement Bureau's efforts will continue to be informed by resolutions of formal complaints, and will also continue to be informed by the standards developed by existing multistakeholder, industry, and consumer groups. The Enforcement Bureau will also work with interested parties on an informal basis to identify ways to promote compliance with the open Internet rules.
F. Legal Authority273. We ground the open Internet rules we adopt today in multiple sources of legal authority'--section 706, Title II, and Title III of the Communications Act. We marshal all of these sources of authority toward a common statutorily-supported goal: To protect and promote Internet openness as platform for competition, free expression and innovation; a driver of economic growth; and an engine of the virtuous cycle of broadband deployment.
274. We therefore invoke multiple, complementary sources of legal authority. As a number of parties point out, our authority under section 706 is not mutually exclusive with our authority under Titles II and III of the Act. Rather, we read our statute to provide several, alternative sources of authority that work in concert toward common ends. As described below, under section 706, the Commission has the authority to adopt these open Internet rules to encourage and accelerate the deployment of broadband to all Americans. In the Declaratory Ruling and Order below, we find, based on the current factual record, that BIAS is a telecommunications service subject to Title II and exercise our forbearance authority to establish a ''light-touch'' regulatory regime, which includes the application of sections 201 and 202. This finding both removes the common carrier limitation from the exercise of our affirmative section 706 authority and also allows us to exercise authority directly under sections 201 and 202 of the Communications Act in adopting today's rules. Finally, these rules are also supported by our Title III authority to protect the public interest through spectrum licensing. In this section, we discuss the basis and scope of each of these sources of authority and then explain their application to the open Internet rules we adopt today.
1. Section 706 Provides Affirmative Legal Authority for Our Open Internet Rules275. Section 706 affords the Commission affirmative legal authority to adopt all of today's open Internet rules. Section 706(a) directs the Commission to take actions that ''shall encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans.'' To do so, the Commission may utilize ''in a manner consistent with the public interest, convenience, and necessity, price cap regulation, regulatory forbearance, measures that promote competition in the local telecommunications market, or other regulating methods that remove barriers to infrastructure investment.'' Section 706(b), in turn, directs that the Commission ''shall take immediate action to accelerate deployment of such capability by removing barriers to infrastructure investment and by promoting competition in the telecommunications market,'' if it finds after inquiry that advanced telecommunications capability is not being deployed to all Americans in a reasonable and timely fashion. ''Advanced telecommunications capability'' is defined as ''high-speed, switched, broadband telecommunications capability that enables users to originate and receive high-quality voice, data, graphics, and video telecommunications using any technology.'' Sections 706(a) and (b) each provide an express, affirmative grant of authority to the Commission and the rules we adopt today fall well within their scope.
276. Section 706(a) and (b) Are Express Grants of Authority. In Verizon, the D.C. Circuit squarely upheld as reasonable the Commission's reading of section 706(a) as an affirmative grant of authority. (Verizon, 740 F.3d at 637 (''The question, then, is this: Does the Commission's current understanding of section 706(a) as a grant of regulatory authority represent a reasonable interpretation of an ambiguous statute? We believe it does.'') A few commenters argue that the court incorrectly concluded that section 706(a) and (b) are express grants of authority. For the reasons discussed in the text, by the Commission in the 2010 Open Internet Order, and the court in Verizon and In re FCC, we disagree.) Finding that provision ambiguous, the court upheld the Commission's interpretation as consistent with the statutory text, (As the Verizon court explained, for example, ''section 706(a)'s reference to state commissions does not foreclose such a reading'' of section 706(a) as an express grant of authority. Id. at 638. Nor, as one of the dissents suggests, (see Pai Dissent at 55), is the statute's reference to ''[s]tate commission'' rendered meaningless by the Commission's reaffirmation that BIAS is an interstate service for regulatory purposes. The Commission's interpretation does not preclude all state commission action in this area, just that which is inconsistent with the federal regulatory regime we adopt today.) legislative history, and the Commission's lengthy history of regulating Internet access.
277. Separately addressing section 706(b), the D.C. Circuit held, citing similar reasons, that the ''Commission has reasonably interpreted section 706(b) to empower it to take steps to accelerate broadband deployment if and when it determines that such deployment is not ''reasonable and timely.'' The 10th Circuit, in upholding the Commission's reform of our universal service and inter-carrier compensation regulatory regime, likewise concluded that the Commission reasonably construed section 706(b) as an additional source of authority for those regulations.
278. In January, the Commission adopted the 2015 Broadband Progress Report, which determined that advanced telecommunications capability is not being deployed in a reasonable and timely manner to all Americans. That determination triggered our authority under section 706(b) to take immediate action, including the adoption of today's open Internet rules, to accelerate broadband deployment to all Americans.
279. We interpret sections 706(a) and 706(b) as independent, complementary sources of affirmative Commission authority for today's rules. Our interpretation of section 706(a) as a grant of express authority is in no way dependent upon our findings in the section 706(b) inquiry. Thus, even if the Commission's inquiry were to have resulted in a positive conclusion such that our section 706(b) authority were not triggered this would not eliminate the Commission's authority to take actions to encourage broadband deployment under section 706(a). (The Commission takes such measures precisely to achieve section 706(b)'s goal of accelerating deployment. That they may succeed in achieving that goal so as to contribute to a positive section 706(b) finding does not subsequently render them unnecessary or unauthorized without any further Commission process. Even if that were not the case, independent section 706(a) authority would remain. We mention, however, two legal requirements that appear relevant. First, section 408 of the Act mandates that ''all'' FCC orders (other than orders for the payment of money) ''shall continue in force for the period of time specified in the Order or until the Commission or a court of competent jurisdiction issues a superseding Order.'' 47 U.S.C. 408. Second, the Commission has a ''continuing obligation to practice reasoned decisionmaking'' that includes revisiting prior decisions to the extent warranted. Aeronautical Radio v. FCC, 928 F.2d 428 (D.C. Cir. 1991). We are aware of no reason why these requirements would not apply in this context.)
280. We reject arguments that we lack rulemaking authority to implement section 706 of the 1996 Act. In Verizon, the D.C. Circuit suggested that section 706 was part of the Communications Act of 1934. Under such a reading, the Commission would have all its standard rulemaking authority under sections 4(i), 201(b) and 303(r) to adopt rules implementing that provision. (47 U.S.C. 154(i) (''The Commission may . . . make such rules and regulations . . . not inconsistent with this chapter, as may be necessary in the execution of its functions.''); 47 U.S.C. 201(b) (''The Commission may prescribe such rules and regulations as may be necessary in the public interest to carry out the provisions of this chapter.''); 47 U.S.C. 303(r) (''Except as otherwise provided in this chapter, the Commission from time to time, as public convenience, interest, or necessity requires, shall . . . [m]ake such rules and regulations and prescribe such restrictions and conditions, not inconsistent with law, as may be necessary to carry out the provisions of this chapter''). Even if this were not the case, by its terms our section 4(i) rulemaking authority is not limited just to the adoption of rules pursuant to substantive jurisdiction under the Communications Act, and the Verizon court cited as reasonable the Commission's view that Congress, in placing upon the Commission the obligation to carry out the purposes of section 706, ''necessarily invested the Commission with the statutory authority to carry out those acts.''
281. The Open Internet Rules Fall Well Within the Scope of Our section 706 Authority. In Verizon, the D.C. Circuit agreed with the Commission that while authority under section 706 may be broad, it is not unbounded. Both the Commission and the court have articulated its limits. First, section 706 regulations must be within the scope of the Commission's subject matter jurisdiction over ''interstate and foreign communications by wire and radio.'' (Some have read this to require that regulations under section 706 must be ancillary to existing Commission authority in Title II, III or VI of the Act. We disagree. To be sure, with the Commission's exercise of both section 706 and ancillary authority, regulations must be within the Commission's subject matter jurisdiction. Indeed, this is the first prong of the test for ancillary jurisdiction. American Library Ass'n v. FCC, 406 F.3d 689, 703-04 (D.C. Cir. 2005). But we do not read the Verizon decision as applying the second prong'--which requires that the regulation be sufficiently linked to another provision of the Act'--to our exercise of section 706 authority. Section 706 ''does not limit the Commission to using other regulatory authority already at its disposal, but instead grants it the power necessary to fulfill the statute's mandate.''See Verizon, 740 F.3d at 641 (citing 2010 Open Internet Order, 25 FCC Rcd at 17972, para. 123)) And second, any such regulations must be designed to achieve the purpose of section 706(a)'--to ''encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans.''
282. In Verizon, the court firmly concluded that the Commission's 2010 Open Internet Order regulations fell within the scope of section 706. It explained that the rules ''not only apply directly to broadband providers, the precise entities to which section 706 authority to encourage broadband deployment presumably extends, but also seek to promote the very goal that Congress explicitly sought to promote.'' Further, the court credited ''the Commission's prediction that the Open Internet Order regulations will encourage broadband deployment.'' The same is true of the open Internet rules we adopt today. Our regulations again only apply to last-mile providers of broadband services'--services that are not only within our subject matter jurisdiction, but also expressly within the terms of section 706. (In response to parties expressing concerns that section 706 could be read to impose regulations on edge providers or others in the Internet ecosystem, we emphasize that today's rules apply only to last-mile broadband providers. We reject calls from other commenters to exercise our section 706 authority to adopt open Internet regulations for edge providers. Today's rules are specifically designed to address broadband providers' incentives and ability to erect barriers that harm the virtuous cycle. We see no basis for applying these rules to any other providers.) And, again, each of our rules is designed to remove barriers in order to achieve the express purposes of section 706. We also find that our rules will provide additional benefits by promoting competition in telecommunications markets, for example, by fostering competitive provision of VoIP and video services and informing consumers' choices.
2. Authority for the Open Internet Rules Under Title II with Forbearance283. In light of our Declaratory Ruling below, the rules we adopt today are also supported by our legal authority under Title II to regulate telecommunications services. For the reasons set forth below, we have found that BIAS is a telecommunications service and, for mobile broadband, commercial mobile services or its functional equivalent. While we forbear from applying many of the Title II regulations to this service, we have applied sections 201, 202, and 208 (along with related enforcement authorities). These provisions provide an alternative source of legal authority for today's rules.
284. Section 201(a) places a duty on common carriers to furnish communications services subject to Title II ''upon reasonable request'' and ''establish physical connections with other carriers'' where the Commission finds it to be in the public interest. Section 201(b) provides that ''[a]ll charges, practices, classifications, and regulations for and in connection with such communication service, shall be just and reasonable, and any such charge, practice, classification, or regulation that is unjust or unreasonable is declared to be unlawful.'' It also gives the Commission the authority to ''prescribe such rules and regulations as may be necessary in the public interest to carry out the provisions of this chapter.'' Section 202(a) makes it ''unlawful for any common carrier to make any unjust or unreasonable discrimination in charges, practices, classifications, regulations, facilities, or services for or in connection with like communication service, directly or indirectly, by any means or device, or to make or give any undue or unreasonable preference or advantage to any particular person, class of persons, or locality, or to subject any particular person, class of persons, or locality to any undue or unreasonable prejudice or disadvantage.'' As described below, these provisions provide additional independent authority for the rules we adopt today.
3. Title III Provides Additional Authority for Mobile Broadband Services285. With respect to mobile broadband Internet access services, today's open Internet rules are further supported by our authority under Title III of the Act to protect the public interest through spectrum licensing. While this authority is not unbounded, we exercise it here in reliance upon particular Title III delegations of authority.
286. Section 303(b) directs the Commission, consistent with the public interest, to ''[p]rescribe the nature of the service to be rendered by each class of licensed stations and each station within any class.'' Today's conduct regulations do precisely this. They lay down rules about ''the nature of the service to be rendered'' by licensed entities providing mobile broadband Internet access service, making clear that this service may not be offered in ways that harm the virtuous cycle. Today's rules specify the form this service must take for those who seek licenses to offer it. In providing such licensed service, broadband providers must adhere to the rules we adopt today.
287. This authority is bolstered by at least two additional provisions. First, as the D.C. Circuit has explained, section 303(r) supplements the Commission's ability to carry out its mandates via rulemaking. Second, section 316 authorizes the Commission to adopt new conditions on existing licenses if it determines that such action ''will promote the public interest, convenience, and necessity.'' (The Commission also has ample authority to impose conditions to serve the public interest in awarding licenses in the first instance. See47 U.S.C. 309(a); 307(a).) Nor do today's rules work any fundamental change to those licenses. Rather we understand our rules to be largely consistent with the current operation of the Internet and the current practices of mobile broadband service providers.
4. Applying These Legal Authorities to Our Open Internet Rules288. Bright line rules. Applying these statutory sources of authority, we have ample legal bases on which to adopt the three bright-line rules against blocking, throttling, and paid prioritization. To begin, we have found that broadband providers have the incentive and ability to engage in such practices'--which disrupt the unity of interests between end users and edge providers and thus threaten the virtuous cycle of broadband deployment. As the D.C. Circuit found with respect to the 2010 conduct rules, such broadband provider practices fall squarely within our section 706 authority. The court struck down the 2010 conduct rules after finding that the Commission failed to provide a legal justification that would take the rules out of the realm of impermissibly mandating common carriage, but did not find anything impermissible about the need for such rules to protect the virtuous cycle. Given our classification of broadband Internet access service as a telecommunications service, the court's rationale for vacating our 2010 conduct rules no longer applies and, for the reasons discussed above, we have legal justification to support our bright-line rules under section 706.
289. Our bright-line rules are also well grounded in our Title II authority. In Title II contexts, the Commission has made clear that blocking traffic generally is unjust and unreasonable under section 201. The Commission has likewise found it unjust and unreasonable for a carrier to refuse to allow non-harmful devices to attach to the network. And with respect to throttling, Commission precedent has likewise held that ''no carriers . . . may block, choke, reduce or restrict traffic in any way.'' We see no basis for departing from such precedents in the case of broadband Internet access services. As discussed above, the record here demonstrates that blocking and throttling broadband Internet access services harm consumers and edge providers, threaten the virtuous cycle, and deter broadband deployment. Consistent with our prior Title II precedents, we conclude that blocking and throttling of broadband Internet access services is an unjust and unreasonable practice under section 201(b).
290. Some parties have suggested that the Commission cannot adopt a rule banning paid prioritization under Title II. We disagree and conclude that paid prioritization is an unjust and unreasonable practice under section 201(b). The unjust and unreasonable standards in sections 201 and 202 afford the Commission significant discretion to distinguish acceptable behavior from behavior that violates the Act. Indeed, the very terms ''unjust'' and ''unreasonable'' are broad, inviting the Commission to undertake the kind of line-drawing that is necessary to differentiate just and reasonable behavior on the one hand from unjust and unreasonable behavior on the other. (As the D.C. Circuit has stated, for example, ''the generality of these terms . . . opens a rather large area for the free play of agency discretion, limited of course by the familiar `arbitrary' and `capricious' standard in the Administrative Procedure Act.''Bell Atlantic Tel. Co. v. FCC, 79 F.3d 1195, 1202 (D.C. Cir. 1996). Stated differently, because both sections ''set out broad standards of conduct,'' it is up to the ''Commission [to] give[] the standards meaning by defining practices that run afoul of carriers' obligation, either by rulemaking or by case-by-case adjudication.'')
291. Acting within this discretion, the Commission has exercised its authority, both through adjudication and rulemaking, under section 201(b) to ban unjust and unreasonable carrier practices as unlawful under the Act. (The Commission need not proceed through adjudication in announcing a broad ban on a particular practice. Indeed, the text of section 201(b) itself gives the Commission authority to ''prescribe such rules and regulations as may be necessary in the public interest to carry out the provisions of this chapter.'' 47 U.S.C. 201(b).) Although the particular circumstances have varied, in reviewing these precedents, we find that the Commission generally takes this step where necessary to protect competition and consumers against carrier practices for which there was either no cognizable justification for the action or where the public interest in banning the practice outweighed any countervailing policy concerns. Based on the record here, we find that paid prioritization presents just such a case, threatening harms to consumers, competition, innovation, and deployment that outweigh any possible countervailing justification of public interest benefit. Our interpretation and application of section 201(b) in this case to ban paid prioritization is further bolstered by the directive in section 706 to take actions that will further broadband deployment.
292. Several commenters argue that we cannot ban paid prioritization under section 202(a), pointing to Commission precedents allowing carriers to engage in discrimination so long as it is reasonable. As discussed above, however, we adopt this rule pursuant to sections 201(b) and 706, not 202(a). And nothing about section 202(a) prevents us from doing so. We recognize that the Commission has historically interpreted section 202(a) to allow carriers to engage in reasonable discrimination, including by charging some customers more for better, faster, or more service. But those precedents stand for the proposition that such discrimination is permitted, not that it must be allowed in all cases. (To be sure, section 202(a) prohibits ''unreasonable discrimination'' for ''like'' communications services. But this provision does not, on its face, deprive the Commission of the authority to take actions under other provisions of the Act against discrimination that may not constitute ''unreasonable discrimination'' under section 202(a).) None of those cases of discrimination presented the kinds of harms demonstrated in the record here'--harms that form the basis of our decision to ban the practice as unjust and unreasonable under section 201(b), not 202(a). Furthermore, none of those precedents involved practices that the Commission has twice found threaten to create barriers to broadband deployment that should be removed under section 706. In light of our discretion in interpreting and applying sections 201 and 202 and insofar as section 706(a) is ''a `fail-safe' that `ensures' the Commission's ability to promote advanced services,'' we decline to interpret section 202(a) as preventing the Commission from exercising its authority under sections 201(b) and 706 to ban paid prioritization practices that harm Internet openness and deployment. (To the extent our prior precedents suggest otherwise, for the reasons discussed in the text, we disavow such an interpretation as applied to the open Internet context.)
293. With respect to mobile broadband Internet access services, our bright-line rules are also grounded in the Commission's Title III authority to ensure that spectrum licensees are providing service in a manner consistent with the public interest.
294. No-Unreasonable Interference/Disadvantage Standard. As with our bright-line rules, the no-unreasonable interference/disadvantage standard we adopt today is supported by our section 706 authority. Beyond the practices addressed by our bright-line rules, we recognize that broadband providers may implement unknown practices or engage in new types of practices in the future that could threaten harm by unreasonably interfering with the ability of end users and edge providers to use broadband Internet access services to reach one another. Such unreasonable interference creates a barrier that impedes the virtuous cycle, threatening the open nature of the Internet to the detriment of consumers, competition, and deployment. For conduct outside the three bright-line rules, we adopt the no-unreasonable interference/disadvantage standard to ensure that broadband providers do not engage in practices that threaten the open nature of the Internet in other or novel ways. This standard is tailored to the open Internet harms we wish to prevent, including harms to consumers, competition, innovation, and free expression'--all of which could impair the virtuous cycle and thus deter broadband deployment, undermining the goals of section 706.
295. The no-unreasonable interference/disadvantage standard is also supported by section 201 and 202 of the Act, which require broadband providers to engage in practices that are just and reasonable, and not unreasonably discriminatory. The prohibition on no-unreasonable interference/disadvantage represents our interpretation of these 201 and 202 obligations in the open Internet context'--an interpretation that is informed by section 706's goals of promoting broadband deployment. (Given the generality of the terms in sections 201 and 202, the Commission has significant discretion when interpreting how those sections apply to the different services subject to Title II.) In other words, for BIAS, we will evaluate whether a practice is unjust, unreasonable, or unreasonably discriminatory using this no-unreasonable interference/disadvantage standard. We note, however, that this rule'--on its own'--does not constitute common carriage per se. (Not all requirements which apply to common carriers need impose common carriage per se. See Verizon, 740 F.3d at 652 (citing Cellco, 700 F.3d at 547 (''[C]ommon carriage is not all or nothing'--there is a gray area in which although a given regulation might be applied to common carriers, the obligations imposed are not common carriage per se. It is in this realm'--the space between per se common carriage and per se private carriage'--that the Commission's determination that a regulation does or does not confer common carrier status warrants deference.'')); Id. at 653 (citing NARUC v. FCC, 533 F.2d 601, 608 (D.C. Cir. 1976) (NARUC II) (''Since it is clearly possible for a given entity to carry on many types of activities, it is at least logical to conclude that one may be a common carrier with regard to some activities but not others.'')).) The no-unreasonable interference/disadvantage standard, standing alone, contains no obligation to provide broadband service to any consumer or edge provider and would not, in its isolated application, necessarily preclude individualized negotiations so long as they do not otherwise unreasonably interfere with the ability of end users and edge providers to use broadband Internet access services to reach one another. Rather, particular practices or arrangements that are not barred by our rules against blocking, throttling, and paid prioritization will be evaluated based on the facts and circumstances they present using a series of factors specifically designed to protect the virtuous cycle of innovation and deployment. Thus, this is a rule tied to particular harms. Broadband providers, having chosen to provide BIAS, may not do so in a way that harms the virtuous cycle.
296. For mobile broadband providers, the no-unreasonable interference/disadvantage standard finds additional support in the Commission's Title III authority as discussed above. The Commission has authority to ensure that broadband providers, having obtained a spectrum license to provide mobile broadband service, must provide that service in a manner consistent with the public interest. (The Commission has broad authority to prescribe the nature of services to be rendered by licensed stations, consistent with the public interest. 47 U.S.C. 303(b); Cellco Partnership v. FCC, 700 F.3d 534, 542 (D.C. Cir. 2012) (''Although Title III does not `confer an unlimited power,' the Supreme Court has emphasized that it does endow the Commission with `expansive powers' and a `comprehensive mandate to `encourage the larger and more effective use of radio in the public interest.' '') (internal citations omitted) (quoting NBC v. United States, 319 U.S. 190, 216, 219 (1943)).) This standard provides guidance on how the Commission will evaluate particular broadband practices, not otherwise barred by our bright-line rules, to ensure that they are consistent with the public interest.
297. Transparency Rule. The D.C. Circuit severed and upheld the Commission's 2010 transparency rule in Verizon. While the majority did not expressly opine on the legal authority for the Commission's prior transparency rule, we feel confident that like the 2010 transparency rule, the enhanced transparency rule we adopt today falls well within multiple, independent sources of the Commission's authority. Beginning with section 706, the transparency rule ensures that consumers have sufficient information to make informed choices thereby facilitating competition in the local telecommunications market (to the extent competitive choices are available). (To encourage deployment of ''advanced telecommunications capability,'' section 706(a) authorizes the Commission to engage in measures that ''promote competition in the local telecommunications market.'' 47 U.S.C. 1302(a). And section 706(b) references ''promoting competition in the telecommunications market'' as among the immediate actions that Commission shall take to accelerate deployment of ''advanced telecommunications capability'' upon a determination that it is not being reasonably and timely deployed. 47 U.S.C. 1302(b). We interpret these references to the ''telecommunications market'' to include the market for ''advanced telecommunications capability.'' In any event, having classified broadband Internet access services as ''telecommunications services,'' the Commission actions to promote competition among broadband Internet access services clearly promote competition in the ''telecommunications market.'') Furthermore, these disclosures remove potential information barriers by ensuring that edge providers have the necessary information to develop innovative products and services that rely on the broadband networks to reach consumers, a crucial arc of the virtuous cycle of broadband deployment. Our transparency rule is also supported by Title II. The Commission has relied on section 201(b) in related billing contexts to ensure that carriers convey accurate and sufficient information about the services they provide to consumers. We do so here as well. (For the reasons discussed above, we likewise rely on Title III to ensure that spectrum licensees provide mobile broadband Internet access service consistent with the public interest.)
298. Enforcement. We also make clear that we have ample authority to enforce the rules we adopt today. Our rules today carry out the provisions of the Communications Act and are thus are covered by our Title IV and V authorities to investigate and enforce violations of these rules. With specific respect to section 706, as noted above, in Verizon, the D.C. Circuit suggested that section 706 was part of the Communications Act of 1934. Under such a reading, rules adopted pursuant to section 706 fall within our Title IV and V authorities. But even if this were not the case, we believe it reasonable to interpret section 706 itself as a grant of authority to investigate and enforce our rules. (Moreover, as discussed above, to the extent that section 706 was not viewed as part of the Communications Act, we have authority under section 4(i) of the Communications Act to adopt rules implementing section 706. Thus, even then the Commission's rules, insofar as they are based on our substantive jurisdiction under section 706, nonetheless would be issued under the Communications Act.) Our enforcement authority was not explicitly discussed in either the 2010 Open Internet Order or the Verizon case. As noted above, the court did cite as reasonable, however, the Commission's view that Congress, in placing upon the Commission the obligation to carry out the purposes of section 706, ''necessarily invested the Commission with the statutory authority to carry out those acts.'' We believe it likewise reasonable to conclude that, having provided the Commission with affirmative legal authority to take regulatory measures to further section 706's goals, Congress invested the Commission with the authority to enforce those measures as needed to ensure those goals are achieved. Indeed, some have suggested that the Commission could take enforcement action pursuant to section 706 itself, without adopting rules.
G. Other Laws and Considerations299. In the 2014 Open Internet NPRM, the Commission tentatively concluded that it should retain provisions which make clear that the open Internet rules do not alter broadband providers' rights or obligations with respect to other laws, safety and security considerations, or the ability of broadband providers to make reasonable efforts to address transfers of unlawful content and unlawful transfers of content. We affirm this tentative conclusion and reiterate today that our rules are not intended to expand or contract broadband providers' rights or obligations with respect to other laws or safety and security considerations'--including the needs of emergency communications and law enforcement, public safety, and national security authorities. Similarly, open Internet rules protect only lawful content, and are not intended to inhibit efforts by broadband providers to address unlawful transfers of content or transfers of unlawful content.
1. Emergency Communications and Safety and Security Authorities300. In the 2010 Open Internet Order we adopted a rule that acknowledges the ability of broadband providers to serve the needs of law enforcement and the needs of emergency communications and public safety, national, and homeland security authorities. This rule remains in effect today. To make clear that open Internet protections coexist with other legal frameworks governing the needs of safety and security authorities, we retain this rule, which reads as follows:
301. In retaining this rule, we reiterate that the purpose of the safety and security provision is first to ensure that open Internet rules do not restrict broadband providers in addressing the needs of law enforcement authorities, and second to ensure that broadband providers do not use the safety and security provision without the imprimatur of a law enforcement authority, as a loophole to the rules. Application of the safety and security rule should be tied to invocation by relevant authorities rather than to a broadband provider's independent notion of the needs of law enforcement.
302. The record is generally supportive of our proposal to reiterate that open Internet rules do not supersede any obligation a broadband provider may have'--or limit its ability'--to address the needs of emergency communications or law enforcement, public safety, or homeland or national security authorities (together, ''safety and security authorities''). Broadband providers have obligations under statutes such as the Communications Assistance for Law Enforcement Act, the Foreign Intelligence Surveillance Act, and the Electronic Communications Privacy Act that could in some circumstances intersect with open Internet protections. Likewise, in connection with an emergency, there may be federal, state, tribal, and local public safety entities, homeland security personnel, and other authorities that need guaranteed or prioritized access to the Internet in order to coordinate disaster relief and other emergency response efforts, or for other emergency communications. Most commenters recognize the benefits of clarifying that these obligations are not inconsistent with open Internet rules.
303. Some commenters have proposed revisions to the existing rule which would expand its application to public utilities and other critical infrastructure operators. Because we make sufficient accommodation for these concerns elsewhere, we choose not to modify this provision to include critical infrastructure.
2. Transfers of Unlawful Content and Unlawful Transfers of Content304. In the NPRM, we tentatively concluded that we should retain the definition of reasonable network management we previously adopted, which does not include preventing transfer of unlawful content or the unlawful transfer of content as a reasonable practice. We affirm this tentative conclusion and re-state that open Internet rules do not prohibit broadband providers from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content to ensure that open Internet rules are not used as a shield to enable unlawful activity or to deter prompt action against such activity. For example, the no-blocking rule should not be invoked to protect copyright infringement, which has adverse consequences for the economy, nor should it protect child pornography. We reiterate that our rules do not alter the copyright laws and are not intended to prohibit or discourage voluntary practices undertaken to address or mitigate the occurrence of copyright infringement. After consideration of the record, we retain this rule, which is applicable to both fixed and mobile broadband providers engaged in broadband Internet access service and reads as follows:
305. Some commenters contend that this rule promotes the widespread use of intrusive packet inspection technologies by broadband providers to filter objectionable content and that such monitoring poses a threat to customers' privacy rights. Certainly, many broadband providers have the technical tools to conduct deep packet inspection of unencrypted traffic on their networks, and consumer privacy is a paramount concern in the Internet age. Nevertheless, we believe that broadband monitoring concerns are adequately addressed by the rules we adopt today, so we decline to alter this provision. This rule is limited to protecting ''reasonable efforts . . . to address copyright infringement or other unlawful activity.'' We retain the discretion to evaluate the reasonableness of broadband providers' practices under this rule on a case-by-case basis. Consumers also have many tools at their disposal to protect their privacy against deep packet inspection'--including SSL encryption, virtual private networks, and routing methods like TOR. Further, the complaint processes we adopt today add to these technical methods and advance consumer interests in this area.
IV. Declaratory Ruling: Classification of Broadband Internet Access Services Back to Top306. The Verizon court upheld the Commission's use of section 706 as a substantive source of legal authority to adopt open Internet protections. But it held that, ''[g]iven the Commission's still-binding decision to classify broadband providers . . . as providers of `information services,' '' open Internet protections that regulated broadband providers as common carriers would violate the Act. Rejecting the Commission's argument that broadband providers only served retail consumers, the Verizon court went on to explain that ''broadband providers furnish a service to edge providers, thus undoubtedly functioning as edge providers' `carriers,' '' and held that the 2010 no-blocking and no-unreasonable discrimination rules impermissibly ''obligated [broadband providers] to act as common carriers.''
307. The Verizon decision thus made clear that section 706 affords the Commission with substantive authority and that open Internet protections are within the scope of that authority. And this Order relies on section 706 for the open Internet rules. But, in light of Verizon, absent a classification of broadband providers as providing a ''telecommunications service,'' the Commission may only rely on section 706 to put in place open Internet protections that steer clear of what the court described as common carriage per se regulation.
308. Taking the Verizon decision's implicit invitation, we revisit the Commission's classification of the retail broadband Internet access service as an information service (The Commission has previously classified cable modem Internet access service, wireline broadband Internet access service, and Broadband over Power Line (BPL)-enabled Internet access service as information services. The Commission has referred to these services as ''wired'' broadband Internet access services. The Commission has also previously classified ''wireless'' broadband Internet access, which it defined as a service that ''uses spectrum, wireless facilities and wireless technologies to provide subscribers with high-speed (broadband) Internet access capabilities, . . . whether offered using mobile, portable, or fixed technologies,'' as information services) and clarify that this service encompasses the so-called ''edge service.'' Based on the updated record, we conclude that retail broadband Internet access service is best understood today as an offering of a ''telecommunications service.'' (As discussed in greater detail below, our classification decision arises from our reconsideration of past interpretations and applications of the Act. We thus conclude that the classification decisions in this Order appropriately apply only on a prospective basis. See, e.g., Verizon v. FCC, 269 F.3d 1098 (D.C. Cir. 2001) (''In a case in which there is a substitution of new law for old law that was reasonably clear, a decision to deny retroactive effect is uncontroversial.'') (internal quotations omitted).)
309. Below we discuss the history of the classification of broadband Internet access service, describe our rationale for revisiting that classification, and provide a detailed explanation of our reclassification of broadband Internet access service.
A. History of Broadband Internet Classification310. Congress created the Commission ''[f]or the purpose of regulating interstate and foreign commerce in communication by wire and radio so as to make available, so far as possible, to all people of the United States . . . a rapid, efficient, Nation-wide, and world-wide wire and radio communication service with adequate facilities at reasonable charges, for the purpose of the national defense, [and] for the purpose of promoting safety of life and property through the use of wire and radio communication.'' section 2 of the Communications Act grants the Commission jurisdiction over ''all interstate and foreign communication by wire or radio.'' As the Supreme Court explained in the radio context, Congress charged the Commission with ''regulating a field of enterprise the dominant characteristic of which was the rapid pace of its unfolding'' and therefore intended to give the Commission sufficiently ''broad'' authority to address new issues that arise with respect to ''fluid and dynamic'' communications technologies. (National Broadcasting Co., Inc. v. United States, 319 U.S. 190, 219 (1943). The Court added that ''[i]n the context of the developing problems to which it was directed, the Act gave the Commission . . . expansive powers . . . [and] a comprehensive mandate.'') No one disputes that Internet access services are within the Commission's subject-matter jurisdiction and historically have been supervised by the Commission.
311. The Computer Inquiries. In 1966, the Commission initiated its Computer Inquiries''to ascertain whether the services and facilities offered by common carriers are compatible with the present and anticipated communications requirements of computer users.'' In the decision known as Computer I, the Commission required ''maximum separation'' between large carriers that offered data transmission services subject to common carrier requirements and their affiliates that sold data processing services. Refining this approach, in Computer II and Computer III the Commission required telephone companies that provided ''enhanced services'' over their own transmission facilities to separate out and offer on a common carrier basis the transmission component underlying their enhanced services.
312. Commenters disagree about the significance of the Computer Inquiries. We believe the Computer Inquiries are relevant in at least two important respects. First, in Computer II the Commission distinguished ''basic'' from ''enhanced'' services, a distinction that Congress embraced when it adopted the Telecommunications Act of 1996. Basic services offered on a common carrier basis were subject to Title II; enhanced services were not. When Congress enacted the definitions of ''telecommunications service'' and ''information service'' in the Telecommunications Act of 1996, it substantially incorporated the ''basic'' and ''enhanced'' service classifications. Because the statutory definitions substantially incorporated the Commission's terminology under the Computer Inquiries, Commission decisions regarding the distinction between basic and enhanced services'--in particular, decisions regarding features that are ''adjunct to basic'' services'--are relevant in this proceeding. (The Commission's definition of ''adjunct to basic'' services has been instrumental in determining which functions fall within the ''telecommunications systems management'' exception to the ''information service'' definition.)
313. Second, the Computer Inquiries disprove the claim that the Commission has never before mandatorily applied Title II to the transmission component of Internet access service. (As discussed below, a large number of rural local exchange carriers (LECs) have also chosen to offer broadband transmission service as a telecommunications service subject to the provisions of Title II.) From 1980 to 2005, facilities-based telephone companies were obligated to offer the transmission component of their enhanced service offerings'--including broadband Internet access service offered via digital subscriber line (DSL)'--to unaffiliated enhanced service providers on nondiscriminatory terms and conditions pursuant to tariffs or contracts governed by Title II. There is no disputing that until 2005, Title II applied to the transmission component of DSL service.
314. Prior Classification Decisions. Several commenters, as well as the dissenting statements, claim that an unbroken line of Commission and court precedent, dating back to the Stevens Report in 1998, supports the classification of Internet access service as an information service, and that this classification is effectively etched in stone. These commenters ignore not only the Supreme Court but our precedent demonstrating that the relevant statutory definitions are ambiguous, and that classifying broadband Internet access service as a telecommunications service is a permissible interpretation of the Act. Indeed, several of the most vocal opponents of reclassification previously argued that the Commission not only may, but should, classify the transmission component of broadband Internet access service as a telecommunications service. (Contemporaneously, Verizon and the United States Telecom Association argued in the Gulf Power litigation before the Supreme Court that cable modem service includes a telecommunications service.)
315. To begin with, these commenters misconstrue the scope of the Stevens Report, which was a report to Congress concerning the implementation of universal service mandates, and not a binding Commission Order classifying Internet access services. Moreover, when the Commission issued that report, in 1998, broadband Internet access service was at ''an early stage of deployment to residential customers'' and constituted a tiny fraction of all Internet connections. Virtually all households with Internet connections used traditional telephone service to dial-up their Internet Service Provider (ISP), which was typically a separate entity from their telephone company. In the Stevens Report, the Commission stated that Internet access service as it was then typically being provided was an ''information service.'' The Stevens Report reserved judgment on whether entities that provided Internet access over their own network facilities were offering a separate telecommunications service. The Commission further noted that ''the question may not always be straightforward whether, on the one hand, an entity is providing a single information service with communications and computing components, or, on the other hand, is providing two distinct services, one of which is a telecommunications service.'' A few months after sending the Stevens Report to Congress, the Commission concluded that ''[a]n end-user may utilize a telecommunications service together with an information service, as in the case of Internet access.'' In a follow-up order, the Commission affirmed its conclusion that ''xDSL-based advanced services constitute telecommunications services as defined by section 3(46) of the Act.'' (The definition of telecommunications service is now in section 3(53) of the Act, 47 U.S.C. 153(53). The Advanced Services Remand Order was vacated in part by the D.C. Circuit in WorldCom v. FCC, 246 F.3d 690 (D.C. Cir. 2001). Specifically, the D.C. Circuit vacated the remand of the Commission's classification of DSL-based advanced services as ''telephone exchange service'' or ''exchange access.'' ''Telephone exchange service'' and ''exchange access'' are relevant in determining whether a provider is a ''local exchange carrier.'' It has no bearing on the classification of a particular service offering as a telecommunications or information service under the Act. As such, the further history of the Advanced Services Remand Order is inapposite to the Commission's discussion of telecommunications and information services in that Order.)
316. The courts addressed the statutory classification of broadband Internet access service in June 2000, when the United States Court of Appeals for the Ninth Circuit held in AT&T Corp. v. City of Portland that cable modem service is a telecommunications service to the extent that the cable operator ''provides its subscribers Internet transmission over its cable broadband facility,'' and an information service to the extent the operator acts as a ''conventional'' ISP. The Ninth Circuit's decision thus put cable companies' broadband transmission service on a regulatory par with DSL transmission service. (In 2001, SBC Communications and BellSouth acknowledged the significance of the Computer Inquiries, the Advanced Services Order, and the Ninth Circuit's decision in City of Portland:''The Commission currently views the DSL-enabled transmission path underlying incumbent LEC broadband Internet services as a `telecommunications service' under the Act. As the Ninth Circuit recognized, the exact same logic applies to cable broadband: `to the extent that [a cable ISP] provides its subscribers Internet transmission over its cable broadband facility, it is providing a telecommunications service as defined in the Communications Act.' '')
317. Three months later, the Commission issued the Cable Modem Notice of Inquiry, which sought comment on whether cable modem service should be treated as a telecommunications service under Title II or an information service subject to Title I. In response, the Bell Operating Companies (BOCs) unanimously argued that the Commission lawfully could determine that cable modem service includes a telecommunications service. Verizon and Qwest argued that the transmission component of cable modem service is a telecommunications service. SBC Communications and BellSouth (both now part of AT&T) argued that the Commission should classify cable modem service as an integrated information service subject to Title I, but acknowledged that the Commission could lawfully find that cable modem service includes both a telecommunications service and an information service. Verizon, SBC, and BellSouth also agreed that the Commission could adopt a ''middle ground'' legal framework by finding that cable modem service is, in part, a telecommunications service, but grant relief from pricing and tariffing obligations by either declaring all providers of broadband Internet access service to be nondominant or by forbearing from enforcing those obligations. (Cable operators generally argued that the Commission should classify cable modem service as either a cable service or an information service, but not as a telecommunications service.)
318. In March 2002, the Commission exercised its authority to interpret ambiguous language in the Act and addressed the classification of cable modem service in the Cable Modem Declaratory Ruling. The Commission stated that ''[t]he Communications Act does not clearly indicate how cable modem service should be classified or regulated.'' Based on a factual record that had been compiled at that time, the Commission described cable modem service as ''typically includ[ing] many and sometimes all of the functions made available through dial-up Internet access service, including content, email accounts, access to news groups, the ability to create a personal Web page, and the ability to retrieve information from the Internet.'' The Commission noted that cable modem providers often consolidated these functions ''so that subscribers usually do not need to contract separately with another Internet access provider to obtain discrete services or applications.'' (The Commission defined cable modem service as ''a service that uses cable system facilities to provide residential subscribers with high-speed Internet access, as well as many applications or functions that can be used with high-speed Internet access.'')
319. The Commission identified a portion of cable modem service as ''Internet connectivity,'' which it described as establishing a physical connection to the Internet and operating or interconnecting with the Internet backbone, and sometimes including protocol conversion, Internet Protocol (IP) address number assignment, DNS, network security, caching, network monitoring, capacity engineering and management, fault management, and troubleshooting. The Ruling also noted that ''[n]etwork monitoring, capacity engineering and management, fault management, and troubleshooting are Internet access service functions that . . . serve to provide a steady and accurate flow of information between the cable system to which the subscriber is connected and the Internet.'' The Commission distinguished these functions from ''Internet applications provided through cable modem services,'' including ''email, access to online newsgroups, and creating or obtaining and aggregating content,'' ''home pages,'' and ''the ability to create a personal Web page.''
320. The Commission found that cable modem service was ''an offering . . . which combines the transmission of data with computer processing, information provision, and computer interactivity, enabling end users to run a variety of applications.'' The Commission further concluded that, ''as it [was] currently offered,'' cable modem service as a whole met the statutory definition of ''information service'' because its components were best viewed as a ''single, integrated service that enables the subscriber to utilize Internet access service,'' with a telecommunications component that was ''not . . . separable from the data processing capabilities of the service.'' Significantly, the Commission did not address whether DNS or any other features of cable modem service fell within the telecommunications systems management exception to the definition of ''information service'' as there was no reason to do so. The Cable Modem Declaratory Ruling also included a notice of proposed rulemaking seeking comment on, among other things, whether the Commission should require cable operators to give unaffiliated broadband Internet access service providers access to cable broadband networks.
321. In October 2003, the United States Court of Appeals for the Ninth Circuit vacated the Commission's finding that cable modem service is an integrated information service. The court concluded that it was bound by the prior decision in City of Portland that ''the transmission element of cable broadband service constitutes telecommunications service under the terms of the Communications Act.''
322. In 2005, the Supreme Court reversed the Ninth Circuit's decision and upheld the Cable Modem Declaratory Ruling in Brand X. The Court held that the word ''offering'' in the Communications Act's definitions of ''telecommunications service'' and ''information service'' is ambiguous, and that the Commission's finding that cable modem service is a functionally integrated information service was a permissible, though perhaps not the best, interpretation of the Act.
323. Following Brand X, the Commission issued the Wireline Broadband Classification Order, which applied the ''information services'' classification at issue in the Cable Modem Declaratory Ruling to facilities-based wireline broadband Internet access services as well and eliminated the resulting regulatory asymmetry between cable companies and telephone companies offering wired Internet access service via DSL and other facilities. The Wireline Broadband Classification Order based this decision on a finding that ''providers of wireline broadband Internet access service offer subscribers the ability to run a variety of applications'' that fit the definition of information services, including those that enable access to email and the ability to establish home pages. The Commission therefore concluded that ''[w]ireline broadband Internet access service, like cable modem service, is a functionally integrated, finished service that inextricably intertwines information-processing capabilities with data transmission such that the consumer always uses them as a unitary service.'' The Commission also eliminated the Computer Inquiry requirements for wireline Internet access service. In 2006, the Commission issued the BPL-Enabled Broadband Order, which extended the information service classification to Internet access service provided over power lines.
324. Subsequently, in 2007 the Commission released the Wireless Broadband Classification Order, which determined that wireless broadband Internet access service was likewise an information service under the Communications Act. The Wireless Broadband Classification Order also found that although ''the transmission component of wireless broadband Internet access service is `telecommunications' . . . the offering of the telecommunications transmission component as part of a functionally integrated Internet access service offering is not `telecommunications service' under section 3 of the [Communications] Act.''
325. The Wireless Broadband Classification Order also considered the application of section 332 of Title III to wireless broadband Internet access service and concluded that ''mobile wireless broadband Internet access service does not meet the definition of `commercial mobile service' within the meaning of section 332 of the Act as implemented by the Commission's CMRS rules because such broadband service is not an `interconnected service,' as defined in the Act and the Commission's rules.''
326. In 2010, the D.C. Circuit rejected the Commission's attempt to enforce open Internet principles based on the Commission's Title I ancillary authority in Comcast v. FCC. Following Comcast, the Commission issued a Notice of Inquiry (Broadband Classification NOI) that sought comment on the appropriate approach to broadband policy in light of the D.C. Circuit's decision. Shortly thereafter, the Commission released the 2010 Open Internet Order. The 2010 Order was based in part on a revised understanding of the Commission's Title I authority'--as well as a variety of other statutory provisions including section 706'--and was again challenged before the D.C. Circuit in Verizon v. FCC. Although the Verizon court accepted the Commission's reinterpretation of section 706 as an independent grant of legislative authority over broadband services, the court nonetheless vacated the no-blocking and antidiscrimination provisions of the Order as imposing de facto common carrier status on providers of broadband Internet access service in violation of the Commission's classification of those services as information services. (The Court also found that that authority did not allow the Commission to subject information services or providers of private mobile services to treatment as common carriers.)
327. In response to the Verizon decision, the Commission released a Notice of Proposed Rulemaking (NPRM) seeking public input on the ''best approach to protecting and promoting Internet openness.'' Among other things, the 2014 Open Internet NPRM asked for discussion of the proper legal authority on which to base open Internet rules. The Commission proposed to rely on section 706 of the Telecommunications Act of 1996, but at the same time stated that it would ''seriously consider the use of Title II of the Communications Act as the basis for legal authority.'' The NPRM sought comment on the benefits of both section 706 and Title II, and emphasized its recognition that ''both section 706 and Title II are viable solutions.''
B. Rationale for Revisiting the Commission's Classification of Broadband Internet Access Services328. We now find it appropriate to revisit the classification of broadband Internet access service as an information service. The Commission has steadily and consistently worked to protect the open Internet for the last decade, starting with the adoption of the Internet Policy Statement up through its recent 2014 Open Internet NPRM following the D.C. Circuit's Verizon decision. Although the Verizon court accepted the Commission's interpretation of section 706 as an independent grant of authority over broadband services, it nonetheless vacated the no-blocking and antidiscrimination provisions of the Open Internet Order. As the Verizon decision explained, to the extent that conduct-based rules remove broadband service providers' ability to enter into individualized negotiations with edge providers, they impose per se common carrier status on broadband Internet access service providers, and therefore conflict with the Commission's prior designation of broadband Internet access services as information services. Thus, absent a finding that broadband providers were providing a ''telecommunications service,'' the D.C. Circuit's Verizon decision defined the bounds of the Commission's authority to adopt open Internet protections to those that do not amount to common carriage.
329. The Brand X Court emphasized that the Commission has an obligation to consider the wisdom of its classification decision on a continuing basis. An agency's evaluation of its prior determinations naturally includes consideration of the law affecting its ability to carry out statutory policy objectives. As discussed above, the record in the Open Internet proceeding demonstrates that broadband providers continue to have the incentives and ability to engage in practices that pose a threat to Internet openness, and as such, rules to protect the open nature of the Internet remain necessary. To protect the open Internet, and to end legal uncertainty, we must use multiple sources of legal authority to protect and promote Internet openness, to ensure that the Internet continues to grow as a platform for competition, free expression, and innovation; a driver of economic growth; and an engine of the virtuous cycle of broadband deployment, innovation, and consumer demand. Thus, we now find it appropriate to examine how broadband Internet access services are provided today.
330. Changed factual circumstances cause us to revise our earlier classification of broadband Internet access service based on the voluminous record developed in response to the 2014 Open Internet NPRM. In the 2002 Cable Modem Declaratory Ruling, the Commission observed that ''the cable modem service business is still nascent, and the shape of broadband deployment is not yet clear. Business relationships among cable operators and their service offerings are evolving.'' However, despite the rapidly changing market for broadband Internet access services, the Commission's decisions classifying broadband Internet access service are based largely on a factual record compiled over a decade ago, during this early evolutionary period. The premises underlying that decision have changed. As the record demonstrates and we discuss in more detail below, we are unable to maintain our prior finding that broadband providers are offering a service in which transmission capabilities are ''inextricably intertwined'' with various proprietary applications and services. Rather, it is more reasonable to assert that the ''indispensable function'' of broadband Internet access service is ''the connection link that in turn enables access to the essentially unlimited range of Internet-based services.'' This is evident, as discussed below, from: (1) Consumer conduct, which shows that subscribers today rely heavily on third-party services, such as email and social networking sites, even when such services are included as add-ons in the broadband Internet access provider's service; (2) broadband providers' marketing and pricing strategies, which emphasize speed and reliability of transmission separately from and over the extra features of the service packages they offer; and (3) the technical characteristics of broadband Internet access service. We also note that the predictive judgments on which the Commission relied in the Cable Modem Declaratory Ruling anticipating vibrant intermodal competition for fixed broadband cannot be reconciled with current marketplace realities.
C. Classification of Broadband Internet Access Service331. In this section, we reconsider the Commission's prior decisions that classified wired and wireless broadband Internet access service as information services, and conclude that broadband Internet access service is a telecommunications service subject to our regulatory authority under Title II of the Communications Act regardless of the technological platform over which the service is offered. (A ''telecommunications service'' is ''the offering of telecommunications for a fee directly to the public, or to such classes of users as to be effectively available directly to the public, regardless of the facilities used.'' 47 U.S.C. 153(53). ''Telecommunications'' is ''the transmission, between or among points specified by the user, of information of the user's choosing, without change in the form or content of the information as sent and received.''Id. 153(50).) We both revise our prior classifications of wired broadband Internet access service and wireless broadband Internet access service, and classify broadband Internet access service provided over other technology platforms. In doing so, we exercise the well-established power of federal agencies to interpret ambiguous provisions in the statutes they administer. The Supreme Court summed up this principle in Brand X:
332. The Court's application of this Chevron test in Brand X makes clear our delegated authority to revisit our prior interpretation of ambiguous statutory terms and reclassify broadband Internet access service as a telecommunications service. The Court upheld the Commission's prior information services classification because ''the statute fails unambiguously to classify the telecommunications component of cable modem service as a distinct offering. This leaves federal telecommunications policy in this technical and complex area to be set by the Commission. . . .'' Where a term in the Act ''admit[s] of two or more reasonable ordinary usages, the Commission's choice of one of them is entitled to deference.'' The Court concluded, given the ''technical, complex, and dynamic'' questions that the Commission resolved in the Cable Modem Declaratory Ruling,''[t]he Commission is in a far better position to address these questions than we are.''
333. Furthermore, reading the Brand X majority, concurring, and dissenting opinions together, it is apparent that most, and perhaps all, of the nine Justices believed that it would have been at least permissible under the Act to have classified the transmission service included with wired Internet access service as a telecommunications service. Justice Thomas, writing for the majority, noted that ''our conclusion that it is reasonable to read the Communications Act to classify cable modem service solely as an `information service' leaves untouched Portland's holding that the Commission's interpretation is not the best reading of the statute.'' Justice Breyer concurred with Justice Thomas, stating that he ''believe[d] that the Federal Communications Commission's decision f[e]ll[ ] within the scope of its statutorily delegated authority,'' although ''perhaps just barely.'' And in dissent, Justice Scalia, joined by Justices Souter and Ginsburg, found that the Commission had adopted ''an implausible reading of the statute'' and that ''the telecommunications component of cable-modem service retains such ample independent identity'' that it could only reasonably be classified as a separate telecommunications service.
334. It is also well settled that we may reconsider, on reasonable grounds, the Commission's earlier application of the ambiguous statutory definitions of ''telecommunications service'' and ''information service.'' Indeed, in Brand X, the Supreme Court, in the specific context of classifying cable modem service, instructed the Commission to reexamine its application of the Communications Act to this service ''on a continuing basis'':
335. More recently, in FCC v. Fox Television Stations, Inc., the Supreme Court emphasized that, although an agency must acknowledge that it is changing course when it adopts a new construction of an ambiguous statutory provision, ''it need not demonstrate to a court's satisfaction that the reasons for the new policy are better than the reasons for the old one. . . .'' Rather, it is sufficient that ''the new policy is permissible under the statute, that there are good reasons for it, and that the agency believes it to be better, which the conscious change of course adequately indicates.'' We discuss in detail below why our conclusion that broadband Internet access service is a telecommunications service is well within our authority. Having determined that Congress gave the Commission authority to determine the appropriate classification of broadband Internet access service'--and having provided sufficient justification of changed factual circumstances to warrant a reexamination of the Commission's prior classification'--we find, upon interpreting the relevant statutory terms, that broadband Internet access service, as offered today, includes ''telecommunications,'' and falls within the definition of a ''telecommunications service.''
1. Scope336. As discussed below, we conclude that broadband Internet access service is a telecommunications service. We define ''broadband Internet access service'' as a mass-market (By mass market, we mean services marketed and sold on a standardized basis to residential customers, small businesses, and other end-user customers such as schools and libraries. ''Schools'' would include institutions of higher education to the extent that they purchase these standardized retail services. See Higher Education and Libraries Comments at 11 (noting that institutions of higher education are not ''residential customers'' or ''small businesses'' and uncertainty about whether institutions of higher education (and their libraries) are included in the term ''schools'' because the term is sometimes interpreted as applying only to K through 12 schools). For purposes of this definition, ''mass market'' also includes broadband Internet access service purchased with the support of the E-rate, and Rural Healthcare programs, as well as any broadband Internet access service offered using networks supported by the Connect America Fund (CAF), but does not include enterprise service offerings or special access services, which are typically offered to larger organizations through customized or individually negotiated arrangements.) retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service. (As explained above, see supra note, our use of the term ''broadband'' in this Order includes but is not limited to services meeting the threshold for ''advanced telecommunications capability.'') This term also encompasses any service that the Commission finds to be providing a functional equivalent of the service described in the previous sentence. (The Verizon decision upheld the Commission's regulation of broadband Internet access service pursuant to section 706 and the definition of ''broadband Internet access service'' has remained part of the Commission's regulations since adopted in 2010. Certain parties have raised issues in the record regarding the regulatory status of mobile messaging services, e.g., SMS/MMS. We note that the rules we adopt today prohibit broadband providers from, for example, blocking messaging services that are delivered over a broadband Internet access service. We decline to further address here arguments regarding the status of messaging within our regulatory framework, but instead plan to address these issues in the context of the pending proceeding considering a petition to clarify the regulatory status of text messaging services.)
337. The term ''broadband Internet access service'' includes services provided over any technology platform, including but not limited to wire, terrestrial wireless (including fixed and mobile wireless services using licensed or unlicensed spectrum), and satellite. (In classifying wireless broadband Internet access as an information service, the Commission excluded broadband provided via satellite from classification. Thus, our action here expressly classifies the service for the first time. We observe that while our classification includes broadband Internet access services provided using capacity over fixed or mobile satellite or submarine cable landing facilities, our classification of these services as telecommunications services or CMRS does not require changes to the authorizations for satellite earth stations, satellite space stations, or submarine cable landing facilities.) For purposes of our discussion, we divide the various forms of broadband Internet access service into the two categories of ''fixed'' and ''mobile,'' rather than between ''wired'' and ''wireless'' service. With these two categories of services'--fixed and mobile'--we intend to cover the entire universe of Internet access services at issue in the Commission's prior broadband classification decisions as well as all other broadband Internet access services offered over other technology platforms that were not addressed by prior classification orders. We also make clear that our classification finding applies to all providers of broadband Internet access service, as we delineate them here, regardless of whether they lease or own the facilities used to provide the service. (The Commission has consistently determined that resellers of telecommunications services are telecommunications carriers, even if they do not own any facilities. Further, as the Supreme Court observed in Brand X,''the relevant definitions do not distinguish facilities-based and non-facilities-based carriers.'') ''Fixed'' broadband Internet access service refers to a broadband Internet access service that serves end users primarily at fixed endpoints using stationary equipment, such as the modem that connects an end user's home router, computer, or other Internet access device to the network. The term encompasses the delivery of fixed broadband over any medium, including various forms of wired broadband services (e.g., cable, DSL, fiber), fixed wireless broadband services (including fixed services using unlicensed spectrum), and fixed satellite broadband services. ''Mobile'' broadband Internet access service refers to a broadband Internet access service that serves end users primarily using mobile stations. Mobile broadband Internet access includes, among other things, services that use smartphones or mobile-network-enabled tablets as the primary endpoints for connection to the Internet. (We note that section 337(f)(1) of the Act excludes public safety services from the definition of mobile broadband Internet access service. 47 U.S.C. 337(f)(1).) The term also encompasses mobile satellite broadband services.
338. In the Verizon opinion, the D.C. Circuit concluded that, in addition to the retail service provided to consumers, ''broadband providers furnish a service to edge providers, thus undoubtedly functioning as edge providers `carriers.' '' It was because the court concluded that the Commission had treated this distinct service as common carriage, that it ''remand[ed] the case to the Commission for further proceedings consistent with this opinion.'' We conclude now that the failure of the Commission's analysis was a failure to explain that the ''service to edge providers'' is subsumed within the promise made to the retail customer of the BIAS service. For the reasons we review herein, the reclassification of BIAS necessarily resolves the edge-provider question as well. In other words, the Commission agrees that a two-sided market exists and that the beneficiaries of the non-consumer side either are or potentially could be all edge providers. Because our reclassification decision treats BIAS as a Title II service, Title II applies, as well, to the second side of the market, which is always a part of, and subsidiary to, the BIAS service. The Verizon court implicitly followed that analysis when it treated the classification of the retail end user service as controlling with respect to its analysis of the edge service; its conclusion that an edge service could be not be treated as common carriage turned entirely on its understanding that the provision of retail broadband Internet access services had been classified as ''information services.'' The reclassification of BIAS as a Title II service thus addresses the court's conclusion that ''the Commission would violate the Communications Act were it to regulate broadband providers as common carriers.''
339. Many commenters, while holding vastly different views on our reclassification of BIAS, are united in the view we need not reach the regulatory classification of the service that the Verizon court identified as being furnished to the edge. (We thus decline to adopt proposals identifying and classifying a separate service provided to edge providers that were presented in the record, and on which we sought comment, including those by Mozilla, the Center for Democracy and Technology, and Professors Wu and Narechania. We believe that our actions here adequately address the concerns raised by these proposals, consistent with both law and fact.) We agree. Our reclassification of the broadband Internet access service means that we can regulate, consistent with the Communications Act, broadband providers to the extent they are ''engaged'' in providing the broadband Internet access service. As discussed above, a broadband Internet access service provider's representation to its end-user customer that it will transport and deliver traffic to and from all or substantially all Internet endpoints necessarily includes the promise to transmit traffic to and from those Internet end points back to the user. Thus, the so-called ''edge service'' is secondary, and in support of, the promise made to the end user, and broadband provider practices with respect to edge providers'--including terms and conditions for the transfer and delivery of traffic to (and from) the BIAS subscriber'--impact the broadband provider's provision of the Title II broadband Internet access service. (This is not a novel arrangement. Under traditional contract principles, Party A (a broadband provider) can contract with Party B (a consumer) to provide services to Party C (an edge provider). That the service is being provided to Party C does not, in any way, conflict with the legal conclusion that the terms and conditions under which that service is being provided are governed by the agreement'--and here the regulatory framework'-- between Parties A and B. Most content that flows across the broadband provider's ''last-mile'' network to the retail consumer does not involve a direct agreement between Parties B and C but, as the Verizon court observed, an edge provider, like Amazon, could enter into an agreement with a broadband provider, like Comcast.) For example, where an edge provider attempts to purchase favorable treatment for its traffic (such as through zero rating), that treatment would be experienced by the BIAS subscriber (such as through an exemption of the edge-provider's data from a usage limit) and the impact on the BIAS subscriber, if any, would be assessed under Title II. That is, the legal question before the Commission turns on whether the provision of that service to the edge provider would be inconsistent with the provision of the retail service under Title II. That is because the same data is flowing between end user and edge consumer. (This conclusion does not contradict the economic view that a broadband provider is operating in a two-sided market. See, e.g.,supra note. A newspaper looks the same whether viewed by an advertiser or a subscriber, even though their economic relationship with the newspaper publisher is different. Here the operation of the broadband Internet access service is so intertwined with the edge service so as to compel the conclusion that the BIAS reclassification controls any service that is being provided to an edge provider.) In other words, to the extent that it is necessary to examine a separate edge service, that service is simply derivative of BIAS, constitutes the same traffic, and, in any event, fits comfortably within the command that practices provided ''in connection with'' a Title II service that must themselves be just and reasonable.
340. Broadband Internet access service does not include virtual private network (VPN) services, content delivery networks (CDNs), hosting or data storage services, or Internet backbone services. The Commission has historically distinguished these services from ''mass market'' services and, as explained in the 2014 Open Internet NPRM, they ''do not provide the capability to transmit data to and receive data from all or substantially all Internet endpoints.'' (In classifying broadband Internet access service as a telecommunications service today, the Commission does not, and need not, reach the question of whether and how these services are classified under the Communications Act.) We do not disturb that finding here. Finally, we observe that to the extent that coffee shops, bookstores, airlines, private end-user networks such as libraries and universities, and other businesses acquire broadband Internet access service from a broadband provider to enable patrons to access the Internet from their respective establishments, provision of such service by the premise operator would not itself be considered a broadband Internet access service unless it was offered to patrons as a retail mass market service, as we define it here. Likewise, when a user employs, for example, a wireless router or a Wi-Fi hotspot to create a personal Wi-Fi network that is not intentionally offered for the benefit of others, he or she is not offering a broadband Internet access service, under our definition, because the user is not marketing and selling such service to residential customers, small business, and other end-user customers such as schools and libraries.
2. The Market Today: Current Offerings of Broadband Internet Access Service341. We begin our analysis by examining how broadband Internet access service was and currently is offered. In the 2002 Cable Modem Declaratory Ruling, the Commission observed that ''the cable modem service business is still nascent, and the shape of broadband deployment is not yet clear. Business relationships among cable operators and their service offerings are evolving.'' Despite the rapidly changing market for broadband Internet access services, the Commission's decisions classifying broadband Internet access service are based largely on a factual record compiled over a decade ago, during this early evolutionary period. The record in this proceeding leads us to the conclusion that providers today market and offer consumers separate services that are best characterized as (1) a broadband Internet access service that is a telecommunications service; and (2) ''add-on'' applications, content, and services that are generally information services.
342. In the past, the Commission has identified a number of ways to determine what broadband providers ''offer'' consumers. In the Cable Modem Declaratory Ruling, for example, the Commission concluded that ''the classification of cable modem service turns on the nature of the functions that the end user is offered.'' In the Wireline Broadband Classification Order, the Commission noted that ''whether a telecommunications service is being provided turns on what the entity is `offering . . . to the public,' and customers' understanding of that service.'' In the Wireless Broadband Classification Order, the Commission stated that ''[a]s with both cable and wireline Internet access, [the] definition appropriately focuses on the end user's experience, factoring in both the functional characteristics and speed of transmission associated with the service.'' Similarly, in Brand X, both the majority and dissenting opinions examined how consumers perceive and use cable modem service, technical characteristics of the services and how it is provided, and analogies to other services.
a. Broadband Internet Access Services at Time of Classification343. ''Wired'' Broadband Services. The Commission's Cable Modem Declaratory Ruling described cable modem service as ''typically includ[ing] many and sometimes all of the functions made available through dial-up Internet access service, including content, email accounts, access to news groups, the ability to create a personal Web page, and the ability to retrieve information from the Internet, including access to the World Wide Web.'' The Commission also identified functions provided with cable modem service that it called ''Internet connectivity functions.'' (Earlier, in its 2001 AOL/Time Warner merger order describing the emerging high speed Internet access services offered through cable modems, the Commission found that ''Internet access services consist principally of connectivity to the Internet provided to end users.'') These included establishing a physical connection to the Internet and interconnecting with the Internet backbone, protocol conversion, Internet Protocol address number assignment, domain name resolution through DNS, network security, caching, network monitoring, capacity engineering and management, fault management, and troubleshooting. In addition, the Commission noted that ''[n]etwork monitoring, capacity engineering and management, fault management, and troubleshooting are Internet access service functions that . . . . serve to provide a steady and accurate flow of information between the cable system to which the subscriber is connected and the Internet.'' The Ruling noted that ''[c]omplementing the Internet access functions are Internet applications provided through cable modem service. These applications include traditional ISP services such as email, access to online newsgroups, and creating or obtaining and aggregating content. The cable modem service provider will also typically offer subscribers a `first screen' or `home page' and the ability to create a personal Web page.'' The Commission explained that ''[e]-mail, newsgroups, the ability for the user to create a Web page that is accessible by other Internet users, and DNS are applications that are commonly associated with Internet access service,'' and that ''[t]aken together, they constitute an information service.'' In the Wireline Broadband Classification Order, the Commission found that end users subscribing to wireline broadband Internet access service ''expect to receive (and pay for) a finished, functionally integrated service that provides access to the Internet.''
344. The Commission's subsequent wired broadband classification decisions did not describe wired broadband Internet access services with any greater detail.
345. Wireless Broadband Services. In 2007, the Commission described wireless broadband Internet access service as a service ''that uses spectrum, wireless facilities and wireless technologies to provide subscribers with high-speed (broadband) Internet access capabilities.'' The Commission noted that ''many of the mobile telephone carriers that provide mobile wireless broadband service for mobile handsets offer a range of IP-based multimedia content and services'--including ring tones, music, games, video clips and video streaming'--that are specially designed to work with the small screens and limited keypads of mobile handsets. This content is typically sold through a carrier-branded, carrier-controlled portal.''
b. The Growth of Consumer Demand and Market Supply346. The record in this proceeding reveals that, since we collected information to address the classification of cable modem service over a decade ago, the market for both fixed and mobile broadband Internet access service has changed dramatically. Between December 2000 and December 2013, the number of residential Internet connections with speeds over 200 kbps in at least one direction increased from 5.2 million to 87.6 million. In 2000, only 5 percent of American households had a fixed Internet access connection with speeds of over 200 kbps in at least one direction, as compared to approximately 72 percent of American households with this same connection today. Indeed, as of December 2013, 60 percent of households have a fixed Internet connection with minimum speeds of at least 3 Mbps/768 kbps. Moreover, between December 2009 and December 2013, the number of mobile handsets with a residential data plan with a speed of at least 200 kbps in one direction increased from 43.7 million to 159.2 million, a 265 percent increase. (In addition, the mobile residential figures may overstate residential handsets because mobile filers report the number of ''consumer'' handsets that are not billed to a corporate, non-corporate business, government, or institutional customer account, and thus could include handsets for which the subscriber is reimbursed by their employee.) By November 2014, 73.6 percent of the entire U.S. age 13+ population was communicating with smart phones, a figure which has continued to rise rapidly over the past several years. Cisco forecasts that by 2019, North America will have nearly 90 percent of its installed base converted to smart devices and connections, and smart traffic will grow to 97 percent of the total global mobile traffic. In 2013, the United States and Canada were home to almost 260 million mobile subscriptions for smartphones, mobile PCs, tablets, and mobile routers. In 2014, that number was expected to increase by 20 percent, to 300 million subscriptions; by 2020, to 450 million, or a population penetration rate of almost 124 percent. In addition, the explosion in the deployment of Wi-Fi technology in the past few years has resulted in consumers increasingly using that technology to access third party content, applications, and services on the Internet, in connection with either a fixed broadband service or a mobile broadband service.
347. This widespread penetration of broadband Internet access service has led to the development of third-party services and devices and has increased the modular way consumers have come to use them. As more American households have gained access to broadband Internet access service, the market for Internet-based services provided by parties other than broadband Internet access providers has flourished. Consumers' appetite for third-party services has also received a boost from the shift from dial-up to broadband, as a high-speed connection makes the Internet much more useful to consumers. (For example, early studies showed that broadband users are far more likely than dial-up users to go online to seek out news, look for travel information, share computer files with others, create content, and download games and videos.) The impact of broadband on consumers' demand for third-party services is evident in the explosive growth of online content and application providers. In early 2003, a year after the Cable Modem Declaratory Ruling, there were approximately 36 million Web sites. Today there are an estimated 900 million. When the Commission assessed the cable modem service market in the Cable Modem Declaratory Ruling, the service at issue was offered with various online applications, including email, newsgroups, and the ability to create a Web page. The Commission observed that subscribers to cable modem services ''usually d[id] not need to contract separately'' for ''discrete services or applications'' such as email. Today, broadband service providers still provide various Internet applications, including email, online storage, and customized homepages, in addition to newer services such as music streaming and instant messaging. But consumers are very likely to use their high-speed Internet connections to take advantage of competing services offered by third parties.
348. For example, companies such as Google and Yahoo! offer popular alternatives to the email services provided to subscribers as part of broadband Internet access service packages. According to Experian, Gmail and Yahoo! Mail were among the ten Internet sites most frequently visited during the week of January 17, 2015, with approximately 400 million and 350 million visits respectively. Some parties even advise consumers specifically not to use a broadband provider-based email address; because a consumer cannot take that email address with them if he or she switches providers, some assert that using a broadband provider-provided email address results in a disincentive to switch to a competitive provider due to the attendant difficulties in changing an email address. Third-party alternatives are also widely available for other services that may be provided along with broadband Internet access service. (DNS, caching, and other services that enable the efficient transmission of data over broadband connections are considered in section IV.C.3. below.) For example, firms such as Apple, Dropbox, and Carbonite provide ''cloud-based'' storage; services like Go Daddy provide Web site hosting; users rely on companies such as WordPress and Tumblr to provide blog hosting; and firms such as Netvibes and Yahoo! provide personalized homepages. GigaNews and Google provide access to newsgroups, while many broadband providers have themselves ceased offering this service entirely.
349. More generally, both fixed and mobile consumers today largely use their broadband Internet access connections to access content and services that are unaffiliated with their broadband Internet access service provider. In this regard, perhaps the most significant trend is the growing popularity of third-party video streaming services. By one estimate, Netflix and YouTube alone account for 50 percent of peak Internet download traffic in North America. Other sites among the most popular in the United States include the search engines Google and Yahoo!; social networking sites Facebook and LinkedIn; e-commerce sites Amazon, eBay and Craigslist; the user-generated reference site Wikipedia; a diverse array of user-generated media sites including Reddit, Twitter, and Pinterest; and news sources such as nytimes.com and CNN.com. Overall, broadband providers themselves operate very few of the Web sites that broadband Internet access services are most commonly used to access.
350. Thus, as a practical matter, broadband Internet access service is useful to consumers today primarily as a conduit for reaching modular content, applications, and services that are provided by unaffiliated third parties. As the Center for Democracy & Technology puts it, ''[t]he service that broadband providers offer to the public is widely understood today, by both the providers and their customers, as the ability to connect to anywhere on the Internet'--to any of the millions of Internet endpoints'--for whatever purposes the user may choose.'' (CDT contrasts the current state of affairs with an earlier time ''when Internet access service providers sought to differentiate themselves by offering `walled gardens' of proprietary content and users looked to their access provider to serve as a kind of curator of the chaos of the Internet.'') Indeed, the ability to transmit data to and from Internet endpoints has become the ''one indispensable function'' that broadband Internet access service uniquely provides.
c. Marketing351. That broadband Internet access services today are primarily offerings of Internet connectivity and transmission capability is further evident by how these services are marketed and priced. Commenters cite numerous examples of advertisements that emphasize transmission speed as the predominant feature that characterizes broadband Internet access service offerings. For example, Comcast advertises that its XFINITY Internet service offers ''the consistently fast speeds you need, even during peak hours,'' and RCN markets its high-speed Internet service as providing the ability ''to upload and download in a flash.'' Verizon claims that ''[w]hatever your life demands, there's a Verizon FiOS plan with the perfect upload/download speed for you,'' while the name of Verizon's DSL-based service is simply ''High Speed Internet.'' Furthermore, fixed broadband providers use transmission speeds to classify tiers of service offerings and to distinguish their offerings from those of competitors. AT&T U-Verse, for instance, offers four ''Internet Package[s]'' at different price points, differentiated in terms of the ''Downstream Speeds'' they provide. Verizon meanwhile asserts that ''the 100% fiber-optic network that powers FiOS'' enables ''a level of speed and capacity that cable can't always compete with'--especially when it comes to upload speeds.'' On the mobile side, mobile broadband providers similarly emphasize transmission speed as well as reliability and coverage as factors that characterize their mobile broadband Internet access service offering. AT&T, for example, claims that it has the ''[n]ation's most reliable 4G LTE network'' and that what 4G LTE means is ''speeds up to 10x faster than 3G.'' Sprint advertises its ''Sprint Spark'' service as having its ''fastest ever data speeds and stronger in-building signal.''
352. The advertisements discussed above link higher transmission speeds and service reliability with enhanced access to the Internet at large'--to any ''points'' a user may wish to reach'--not only to Internet-based applications or services that are provided in conjunction with broadband access. RCN, for instance, claims that its ''110 Mbps High-Speed Internet'' offering is ''ideal for watching Netflix,'' a third-party video streaming service. Verizon claims that FiOS's ''75/75 Mbps'' speed ''works well for uploading and sharing videos on YouTube and serious multi-user gaming'' presumably by using the FiOS service to access any combination of third-party and Verizon-affiliated content and services the user chooses. AT&T notes that its 4G LTE service ''lets you stream clear, crisp video faster than ever before, download songs in a few beats, apps almost instantly, and so much more.'' Broadband providers also market access to the Internet through Wi-Fi. Comcast, for example, notes that with its XFinity Internet services, subscribers can enjoy ''access to millions of hotspots nationwide and stay connected while away from home.'' T-Mobile advertises the ability to place calls and send messages over Wi-Fi.
353. Fixed and mobile broadband Internet access service providers also price and differentiate their service offerings on the basis of the quality and quantity of data transmission the offering provides. AT&T U-Verse, for instance, offers four ''Internet Package[s]'' at different price points, differentiated in terms of the ''Downstream Speeds'' they provide. On the mobile side, monthly data allowances'--i.e., caps on the amount of data a user may transmit to and from Internet endpoints'--are among the features that factor most heavily in the pricing of service plans.
354. In short, broadband Internet access service is marketed today primarily as a conduit for the transmission of data across the Internet. (The marketing materials discussed here also indicate that broadband providers hold themselves out indifferently to the public when offering broadband Internet access service. Within particular service areas, broadband providers tend to offer uniform prices and services to potential customers. As discussed above, these offers are widely available through advertisements and marketing materials.) The record suggests that fixed broadband Internet access service providers market distinct service offerings primarily on the basis of the transmission speeds associated with each offering. Similarly, mobile providers market their service offerings primarily on the basis of the speed, reliability, and coverage of their network. Marketing broadband services in this way leaves a reasonable consumer with the impression that a certain level of transmission capability'--measured in terms of ''speed'' or ''reliability'''--is being offered in exchange for the subscription fee, even if complementary services are also included as part of the offer.
3. Broadband Internet Access Service Is a Telecommunications Service355. We now turn to applying the statutory terms at issue in light of our updated understanding of how both fixed and mobile broadband Internet access services are offered. Three definitional terms are critical to a determination of the appropriate classification of broadband Internet access service. First, the Act defines ''telecommunications'' as ''the transmission, between or among points specified by the user, of information of the user's choosing, without change in the form or content of the information as sent and received.'' Second, the Act defines ''telecommunications service'' as ''the offering of telecommunications for a fee directly to the public, or to such classes of users as to be effectively available directly to the public, regardless of the facilities used.'' Finally, ''information service'' is defined in the Act as ''the offering of a capability for generating, acquiring, storing, transforming, processing, retrieving, utilizing, or making available information via telecommunications . . . , but does not include any use of any such capability for the management, control, or operation of a telecommunications system or the management of a telecommunications service.'' We observe that the critical distinction between a telecommunications and an information service turns on what the provider is ''offering.'' If the offering meets the statutory definition of telecommunications service, then the service is also necessarily a common carrier service.
356. In reconsidering our prior decisions and reaching a different conclusion, we find that this result best reflects the factual record in this proceeding, and will most effectively permit the implementation of sound policy consistent with statutory objectives. For the reasons discussed above, we find that broadband Internet access service, as offered by both fixed and mobile providers, is best seen, and is in fact most commonly seen, as an offering (in the words of Justice Scalia, dissenting in Brand X) ''consisting of two separate things'': ''Both`high-speed access to the Internet'and other `applications and functions.' '' Although broadband providers in many cases provide broadband Internet access service along with information services, such as email and online storage, we find that broadband Internet access service is today sufficiently independent of these information services that it is a separate ''offering.'' We also find that domain name service (DNS) (DNS is most commonly used to translate domain names, such as ''nytimes.com,'' into numerical IP addresses that are used by network equipment to locate the desired content.) and caching, (Caching is the storing of copies of content at locations in a network closer to subscribers than the original source of the content. This enables more rapid retrieval of information from Web sites that subscribers wish to see most often.) when provided with broadband Internet access services, fit squarely within the telecommunications systems management exception to the definition of ''information service.'' (Hereinafter, we refer to this exception as the ''telecommunications systems management'' exception.) Thus, when provided with broadband Internet access services, these integrated services do not convert broadband Internet access service into an information service. (One of the dissenting statements asserts that Congress could not have delegated to the Commission the authority to determine whether broadband Internet access service is a telecommunications service because ''[h]ad Internet access service been a basic service, dominant carriers could have offered it (and all related computer-processing functionality) outside the parameters of the Computer Inquiries,'' but ''I cannot find a single suggestion that anyone in Congress, anyone at the FCC, anyone in the courts, or anyone at all thought this was the law during the passage of the Telecommunications Act'' in 1996. See Pai Dissent at 37. We disagree with this line of reasoning. First, it contradicts the Supreme Court's 2005 holding in Brand X, where the Court explicitly acknowledged that the Commission had previously classified the transmission service, which broadband providers offer, as a telecommunications service and that the Commission could return to that classification if it provided an adequate justification. Second, and underscoring the ambiguity that the Brand X court identified in finding that the Commission had Chevron deference in its classification of broadband Internet access service, the dissenting statement fails to identify any compelling evidence that Congress thought broadband Internet access service was an information service.)
357. The Commission Does Not Bear a Special Burden in This Proceeding. Opponents of classifying broadband Internet access service as a telecommunications service advocate a narrow reading of the Supreme Court's decision in Brand X. They contend that the Court's decision to affirm the classification of cable modem service as an information service was driven by specific factual findings concerning DNS and caching, and argue that the Commission may not revisit its decision unless it can show that the facts have changed. Opponents also cite a passage from the Supreme Court's Fox decision suggesting that an agency must provide ''a more detailed justification than what would suffice for a new policy on a blank slate'' where the agency's ''new policy rests upon factual findings that contradict those which underlay its prior policy,'' or ''when its prior policy has engendered serious reliance interests that must be taken into account.''
358. We disagree with these commenters on both counts. The Fox court explained that in these circumstances, ''it is not that further justification is demanded by the mere fact of policy change; but that a reasoned explanation is needed for disregarding facts and circumstances that underlay or were engendered by the prior policy.'' As the D.C. Circuit more recently confirmed, ''[t]his does not . . . equate to a `heightened standard' for reasonableness.'' The Commission need only show ''that the new policy is permissible under the statute, that there are good reasons for it, and that the agency believes it to be better.'' Above, we more than adequately explain our changed view of the facts and circumstances in the market for broadband Internet access services'--which is evident from consumers' heavy reliance on third-party services and broadband Internet access providers' emphasis on speed and reliability of transmission separately from and over the extra features of the service packages they offer. Furthermore, our understanding of the facts of how the elements of broadband Internet access service work has not changed. No one has ever disputed what DNS is or how it works. The issue is whether it falls within the definition of ''information service'' or the telecommunications systems management exception. If the latter, as we find below, prior factual findings that DNS was inextricably intertwined with the transmission feature of cable modem service do not provide support for the conclusion that cable modem service is an integrated information service.
359. Moreover, opponents' reading of Brand X ignores the reasoning and holding of the Court's opinion overall. As discussed above, the Brand X opinion confirms that the Supreme Court viewed the statutory classification of cable modem service as a judgment call for the Commission to make. If the Commission had concluded that the transmission component of cable modem service was a telecommunications service, and provided a reasoned explanation for its decision, it is evident that the Court would have deferred to that finding.
360. In Fox, the Supreme Court also suggested that an agency may need to provide ''a more detailed justification'' for a change in policy when the prior policy ''has engendered serious reliance interests.'' Opponents of reclassification contend that broadband providers have invested billions of dollars to deploy new broadband network facilities in reliance on the Title I classification decisions and it would be unreasonable to change course now. We disagree. As a factual matter, the regulatory status of broadband Internet access service appears to have, at most, an indirect effect (along with many other factors) on investment. Moreover, the regulatory history regarding the classification of broadband Internet access service would not provide a reasonable basis for assuming that the service would receive sustained treatment as an information service in any event. As noted above, the history of the Computer Inquiries indicates that, at a minimum the regulatory status of these or similar offerings involved a highly regulated activity for many years. The first formal ruling on the classification of broadband Internet access service came from the Ninth Circuit in 2000, which held that the best reading of the relevant statutory definitions was that cable modem service in fact includes a telecommunications service. The Cable Modem Declaratory Ruling was expressly limited to cable modem service ''as it [was] currently offered.'' The lawfulness of the Commission's 2002 Cable Modem Declaratory Ruling remained unsettled until the Supreme Court affirmed it in 2005, and the Commission's Wireline Broadband Classification Order was not affirmed until two years later, in 2007. In 2010, the Commission sought comment on reclassifying broadband Internet access services, and sought to refresh the record again in 2014. While the Commission did classify wireless broadband Internet access service as an information service in 2007, the Comcast and Verizon decisions, in 2009 and 2014 respectively, called into doubt the Commission's ability to rely upon its Title I ancillary authority to protect the public interest and carry out its statutory duties to promote broadband investment and deployment. The legal status of the information service classification thus has been called into question too consistently to have engendered such substantial reliance interests that our reclassification decision cannot now be sustained absent extraordinary justifications. Finally, the forbearance relief we grant in the accompanying order in conjunction with our reclassification decision keeps the scope of our proposed regulatory oversight within the same general boundaries that the Commission earlier anticipated drawing under its Title I authority. We thus reject the claims that our action here unlawfully upsets reasonable reliance interests. In any event, we provide in this ruling a compelling explanation of why changes in the marketing, pricing, and sale of broadband Internet access service, as well as the technical characteristics of how the service is offered, now justify a revised classification of the service. (In response to arguments raised in the dissenting statements, we clarify that, even assuming, arguendo, that the facts regarding how BIAS is offered had not changed, in now applying the Act's definitions to these facts, we find that the provision of BIAS is best understood as a telecommunications service, as discussed below, see infra sections IV.C.3.b., IV.C.3.c., and disavow our prior interpretations to the extent they held otherwise.)
a. Broadband Internet Access Service Involves Telecommunications361. Broadband Internet Access Service Transmits Information of the User's Choosing Between Points Specified by the User. As discussed above, the Act defines ''telecommunications'' as ''the transmission, between or among points specified by the user, of information of the user's choosing, without change in the form or content of the information as sent and received.'' It is clear that broadband Internet access service is providing ''telecommunications.'' Users rely on broadband Internet access service to transmit ''information of the user's choosing,'' ''between or among points specified by the user.'' Time Warner Cable asserts that broadband Internet access service cannot be a telecommunications service because'--as end users do not know where online content is stored'--Internet communications allegedly do not travel to ''points specified by the user'' within the statutory definition of ''telecommunications.'' We disagree. We find that the term ''points specified by the user'' is ambiguous, and conclude that uncertainty concerning the geographic location of an endpoint of communication is irrelevant for the purpose of determining whether a broadband Internet access service is providing ''telecommunications.'' Although Internet users often do not know the geographic location of edge providers or other users, there is no question that users specify the end points of their Internet communications. (For example, in transmissions from the user to an edge provider, a user either directly specifies the domain name of the edge provider or utilizes a search engine to determine the domain name. The application that a user chooses then uses DNS to translate the domain name into an IP address associated with the edge provider, which is placed into the packet as its destination. For transmissions from an edge provider to a user, the edge provider places the user's IP address into the packet as the destination IP address.) Consumers would be quite upset if their Internet communications did not make it to their intended recipients or the Web site addresses they entered into their browser would take them to unexpected Web pages. Likewise, numerous forms of telephone service qualify as telecommunications even though the consumer typically does not know the geographic location of the called party. These include, for example, cell phone service, toll free 800 service, and call bridging service. In all of these cases, the user specifies the desired endpoint of the communication by entering the telephone number or, in the case of broadband Internet access service, the name or address of the desired Web site or application. More generally, we have never understood the definition of ''telecommunications'' to require that users specify'--or even know'--information about the routing or handling of their transmissions along the path to the end point, nor do we do so now. Further, that there is not a one-to-one correspondence between IP addresses and domain names, and that DNS often routes the same domain name to different locations based on its inference of which location is most likely to be the one the end user wants, does not alter this analysis. It is not uncommon in the toll-free arena for a single number to route to multiple locations, and such a circumstance does not transform that service to something other than telecommunications.
362. Information is Transmitted Without Change in Form or Content. Broadband Internet access service may use a variety of protocols to deliver content from one point to another. However, the packet payload (i.e., the content requested or sent by the user) is not altered by the variety of headers that a provider may use to route a given packet. The information that a broadband provider places into a packet header as part of the broadband Internet access service is for the management of the broadband Internet access service and it is removed before the packet is handed over to the application at the destination. Broadband providers thus move packets from sender to recipient without any change in format or content, and ''merely transferring a packet to its intended recipient does not by itself involve generating, acquiring, transforming, processing, retrieving, utilizing, or making available information.'' (A BIAS provider, when utilizing the Internet Protocol, may fragment packets into multiple pieces. However, such fragmentation does not change the form or content, as the pieces are reassembled before the packet is handed over to the application at the destination.) Rather, ''it is the nature of [packet delivery] that the `form and content of the information' is precisely the same when an IP packet is sent by the sender as when that same packet is received by the recipient.'' (For example, when a person sends an email, he or she expects that the content of the email, and any attachments, to be delivered to the recipient unaltered in content or form. We note that a user may choose to use an application, such as email, that is a separate information service offered by the BIAS provider. When this occurs, the provider of the information service may place information into the packet payload that changes the form or content. However, this change in form or content is purely implemented as part of the separable information service. The broadband provider, in transmitting the packet via BIAS, does not alter the form or content of the packet payload.)
b. Broadband Internet Access Service Is a ''Telecommunications Service''363. Having affirmatively determined that broadband Internet access service involves ''telecommunications,'' we also find that broadband Internet access service is a ''telecommunications service.'' A ''telecommunications service'' is the ''offering of telecommunications for a fee directly to the public, . . . regardless of the facilities used.'' We find that broadband Internet access service providers offer broadband Internet access service ''directly to the public.'' As discussed above, the record indicates that broadband providers routinely market broadband Internet access services widely and to the general public. Because a provider is a common carrier ''by virtue of its functions,'' we find that such offerings are made directly to the public within the Act's definition of telecommunications service. We draw this conclusion based upon the common circumstances under which providers offer the service, and we reject the suggestion that we must evaluate such offerings on a narrower carrier-by-carrier or geographic basis. Further, that some broadband providers require potential broadband customers to disclose their addresses and service locations before viewing such an offer does not change our conclusion. The Commission has long maintained that offering a service to the public does not necessarily require holding it out to all end users. Some individualization in pricing or terms is not a barrier to finding that a service is a telecommunications service. (To the extent our prior precedents might suggest otherwise, we disavow such an interpretation in this context.)
364. In addition, the implied promise to make arrangements for exchange of Internet traffic as part of the offering of broadband Internet access service does not constitute a private carriage arrangement. (Commission precedent ''holds that a carrier will not be a common carrier `where its practice is to make individualized decisions in particular cases whether and on what terms to serve.' '') First, in offering broadband Internet access service to its end-user customers, the broadband provider has voluntarily undertaken an obligation to arrange to transfer that traffic on and off its network. Broadband providers hold themselves out to carry all edge provider traffic to the broadband provider's end user customers regardless of source and regardless of whether the edge provider itself has a specific arrangement with the broadband provider. Merely asserting that the traffic exchange component of the service may have some individualized negotiation does not alter the nature of the underlying service. Second, the record reflects that broadband providers assert that multiple routes to reach their networks are widely and readily available. They cannot, at the same time, assert that all arrangements for delivering traffic to their end-user subscribers are individually negotiated with every edge provider. Third, the record reflects that the majority of arrangements for traffic exchange are informal handshake agreements without formalized terms and conditions that would indicate any kind of individualized negotiations. We recognize that there are some interconnection agreements that do contain more individualized terms and conditions. However, this circumstance is not inherently different from similarly individualized commercial agreements for certain enterprise broadband services, which the Commission has long held to be common carriage telecommunications services subject to Title II. That the individualized terms may be negotiated does not change the underlying fact that a broadband provider holds the service out directly to the public. As discussed above, it must necessarily do so, in order to offer and provide its broadband Internet access service. Further, we note that these types of individualized negotiations are analogous to other telecommunications providers whose customer service representatives may offer variable terms and conditions to customers in circumstances where the customer threatens to switch service providers. We therefore find that the implied representation that broadband Internet access service providers will arrange for transport of traffic on and off their networks as part of the BIAS offering does not constitute private carriage. As such, we find that broadband Internet access service is offered ''directly to the public,'' and falls within the definition of ''telecommunications service.'' (If an offering meets the definition of telecommunications service, then the service is also necessarily a common carrier service.)
c. Broadband Internet Access Service Is Not an ''Information Service''365. We further find that broadband Internet access service is not an information service. The Act defines ''information service'' as ''the offering of a capability for generating, acquiring, storing, transforming, processing, retrieving, utilizing, or making available information via telecommunications . . . but does not include any use of any such capability for the management, control, or operation of a telecommunications system or the management of a telecommunications service.'' To the extent that broadband Internet access service is offered along with some capabilities that would otherwise fall within the information service definition, they do not turn broadband Internet access service into a functionally integrated information service. To the contrary, we find these capabilities either fall within the telecommunications systems management exception or are separate offerings that are not inextricably integrated with broadband Internet access service, or both.
366. DNS Falls Within the Telecommunications Systems Management Exception to the Definition of Information Services. As the Supreme Court spotlighted in Brand X, the Commission predicated its prior conclusion that cable modem service was an integrated information service at least in part on the view that it ''transmits data only in connection with the further processing of information.'' That was so, under the theory of the Cable Modem Declaratory Ruling, because ''[a] user cannot reach a third-party's Web site without DNS, which (among other things) matches the Web site address the end user types into his browser (or `clicks' on with his mouse) with the IP address of the Web page's host server.'' The Commission had assumed without analysis that DNS, when provided with Internet access service, is an information service. The Commission credited record evidence that DNS ''enable[s] routing'' and that ''[w]ithout this service, Internet access would be impractical for most users.'' In his Brand X dissent, however, Justice Scalia correctly observed that DNS ''is scarcely more than routing information, which is expressly excluded from the definition of `information service' '' by the telecommunications systems management exception set out in the last clause of section 3(24) of the Act. (The definition of ''information service'' has since been moved from subsection 20 to subsection 24 of section 3 but has not itself been revised. The telecommunications systems management exception in section 3(24) provides that the term ''information service'' ''does not include'' the use of any data processing, storage, retrieval or similar capabilities ''for the management, control, or operation of a telecommunications system or the management of a telecommunications service.'') Thus, in his view, such functions cannot be relied upon to convert what otherwise would be a telecommunications service into an information service. Therefore, consideration of whether DNS service falls within the telecommunications systems management exception could have been determinative in the Court's outcome in Brand X, had it considered the question.
367. Although the Commission assumed in the Cable Modem Declaratory Ruling'--sub silentio'--that DNS fell outside the telecommunications systems management exception, (The Commission's subsequent conclusions that wireline broadband services offered by telephone companies and broadband offered over power lines were unitary information services followed the same theory, also without any analysis of the telecommunications systems management exception.) Justice Scalia's assessment finds support both in the language of section 3(24), and in the Commission's consistently held view that ''adjunct-to-basic'' functions fall within the telecommunications systems management exception to the ''information service'' definition. (Throughout the history of computer-based communication, Title II covered more than just the simple transmission of data. Some features and services that met the literal definition of ''enhanced service,'' but did not alter the fundamental character of the associated basic transmission service, were considered ''adjunct-to-basic'' and treated as basic (i.e., telecommunications) services even though they went beyond mere transmission. Thus, the Commission's definition of ''basic services'' (the regulatory predecessor to ''telecommunications services'') includes, among other things, those intelligent features that run the network or improve its usefulness to consumers, such as a carrier's use of ''companding [compressing/expanding] techniques, bandwidth compression techniques, circuit switching, message or packet switching, error control techniques, etc. that facilitate economical, reliable movement of information does not alter the nature of the basic service.'' Basic service can also include ''memory or storage within the network . . . used only to facilitate the transmission of the information from the origination to its destination,'') Such functions, the Commission has held: (1) Must be ''incidental'' to an underlying telecommunications service'--i.e.,'' `basic' in purpose and use'' in the sense that they facilitate use of the network; and (2) must ''not alter the fundamental character of [the telecommunications service].'' By established Commission precedent, they include ''speed dialing, call forwarding, [and] computer-provided directory assistance,'' each of which shares with DNS the essential characteristic of using computer processing to convert the number or keystroke that the end user enters into another number capable of routing the communication to the intended recipient. Similarly, traditional voice telephone calls to toll free numbers, pay-per-call numbers, and ported telephone numbers require a database query to translate the dialed telephone number into a different telephone number and/or to otherwise determine how to route the call properly, and there is no doubt that the inclusion of that functionality does not somehow convert the basic telecommunications service offering into an information service. (Consider also the role that telephone operators traditionally played in routing telephone calls. Traditional telephony required a telephone operator to route and place calls requested by the customer. We do not believe that anyone would argue that such arrangements would turn traditional telephone service into an information service.)
368. Citing language from a staff decision to the effect that adjunct-to-basic functions do not include functions that are ''useful to end users, rather than carriers,'' AT&T argues that DNS must fall outside of the telecommunications systems management exception because ''Internet access providers use DNS functionality not merely (or even primarily) to `manage' their networks more efficiently, but to make the Internet as a whole easily accessible and convenient for their subscribers.'' We disagree. The particular function at issue in the cited staff decision'--the ''storage and retrieval of information that emergency service personnel use to respond to E911 calls'''--was not instrumental in placing calls or managing the communications network, but simply allowed certain telecommunications consumers (E911 answering centers and first responders) to identify the physical location of the distressed caller in order to render assistance, a benefit to be sure, but one unrelated to telecommunications. By contrast, DNS'--like the speed dialing, call forwarding, and computer-provided directory assistance functions that already have been definitively classified as falling within the telecommunications systems management exception to section 3(24)'--allows more efficient use of the telecommunications network by facilitating accurate and efficient routing from the end user to the receiving party. (Notwithstanding the close resemblance between DNS and these features that the Commission previously has found to be within the telecommunications systems management exception, USTelecom contends that ''DNS does not manage or control a telecommunications system or a telecommunications service.'' USTelecom Reply at 32. As with call forwarding, speed dialing, and computer-provided directory assistance, however, DNS manages the network in the sense of facilitating efficient routing and call completion. In any event, even if DNS were not viewed as facilitating network management, it clearly would fall within the exception as a capability used for the ''operation of a telecommunications system.'' 47 U.S.C. 153(24). Responding to assertions in one of the dissenting statements, (Pai Dissent at 36 through 37), we expressly find this rationale applies equally to other services that arguably serve the interests of subscribers, such as, for example, caching. While these services do provide a benefit to subscribers in the form of faster, more efficient service, they also serve to manage the network by facilitating efficient retrieval of requested information, reducing a broadband provider's costs in the provision of the service. In addition, caching and other services which provide a benefit to subscribers, like DNS, also serve as a capability used for the operation of a telecommunications system by enabling the efficient retrieval of information.)
369. AT&T's other arguments regarding DNS also fail. Contrary to its suggestion, the fact that the analogous speed dialing, call forwarding, and computer-provided directory assistance functions that the Commission has designated as falling within the telecommunications systems management exception were adjunct to ''legacy telephone (`basic') services'' rather than to ''Internet-based services'' provides no basis to discard the logic of that analysis in the broadband context. Nor are we persuaded by AT&T's observation that DNS systems provide additional ''reverse look-up'' functions (i.e., converting a numeric IP address into a domain name) that are ''analogous to (though far more sophisticated than) `reverse directory assistance' '' services that were deemed to be enhanced services in the legacy circuit-switched telephone service environment. Even assuming, arguendo, that such ''reverse look-up'' functions were analogous, we do not believe that the inclusion of such functionality would convert what was otherwise a telecommunications service into an information service. As the Supreme Court recognized, an entity may not avoid Title II regulation of its telecommunications service simply by packaging that service with an information service. As the Court explained, ''a telephone company that packages voice mail with telephone service offers a transparent transmission path'--telephone service'--that transmits information independent of the information-storage capabilities provided by voice mail. For instance, when a person makes a telephone call, his ability to convey and receive information using the call is only trivially affected by the additional voice-mail capability.'' Likewise, we find that to the extent a DNS ''reverse look-up'' functionality is included with the offering of broadband Internet access service, the service itself'--the transmission of data to and from all or substantially all Internet endpoints'--is only trivially dependent on, if at all, the ''reverse look-up'' function cited by AT&T. We find that this analysis applies equally to the DNS ''assist capabilities'' cited by AT&T, in which the provider's DNS functionality may also be used occasionally to guess what a user meant when she mistyped an address. (In the context of voice telephone service, the Commission has recognized that the availability of reverse directory capability does not transform that service from a telecommunications service into an information service.)
370. Although we find that DNS falls within the telecommunications systems management exception, even if did not, DNS functionality is not so inextricably intertwined with broadband Internet access service so as to convert the entire service offering into an information service. First, the record indicates that ''IP packet transfer does work just as well without DNS, but is simply less useful, just as a telephone system is less useful without a phone book.'' Indeed, ''[t]here is little difference between DNS support offered by a broadband Internet access provider and the 411 directory service offered by many providers of telephone service. Both allow a user to discover how to reach another party, but no one argued that telephone companies were not providing a telecommunications service because they offered 411.'' Second, the factual assumption that DNS lookup necessarily is provided by the broadband Internet access provider is no longer true today, if it ever was. While most users rely on their broadband providers to provide DNS lookup, the record indicates that third-party-provided-DNS is now widely available, (To be clear, we do not find that DNS is a telecommunications service (or part of one) when provided on a stand-alone basis by entities other than the provider of Internet access service. In such instances, there would be no telecommunications service to which DNS is adjunct, and the storage functions associated with stand-alone DNS would likely render it an information service.) and the availability of the service from third parties cuts against a finding that Internet transmission and DNS are inextricably intertwined, whether or not they were at the time of the Commission's earlier classification decisions. In any event, the fact that DNS may be offered by a provider of broadband Internet access service does not affect our conclusion that the telecommunications is offered directly to the public.
371. Accordingly, we now reconsider our prior analysis and conclude for two reasons that the bundling of DNS by a provider of broadband Internet access service does not convert the broadband Internet access service offering into an integrated information service. (We also observe that add-on services to DNS, such as DNS security extensions, do not convert BIAS into an information service. DNS security extensions provide authentication that the messages sent between DNS servers, and between a DNS server and a DNS client, are not altered. As such, DNS security extensions facilitate accurate DNS information, and, like DNS itself, are incidental to BIAS, and do not alter the fundamental character of BIAS. We accordingly disagree with the contrary interpretation of the role of DNS security extensions described in one of the dissenting statements.) This is both because DNS falls within the telecommunications systems management exception to the definition of information service and because, regardless of its classification, it does not affect the fundamental nature of broadband Internet access service as a distinct offering of telecommunications.
372. Caching Falls Within the Telecommunications Systems Management Exception. Opponents of revisiting the Commission's earlier classification decisions also point to caching as another feature of broadband Internet access service packages that the Commission relied upon to find such packages to be information services. In the Cable Modem Declaratory Ruling, the Commission described caching as ''the storing of copies of content at locations in the network closer to subscribers than their original sources.'' While the Commission noted the caching function in the Cable Modem Declaratory Ruling, it did not rely on the caching function (as opposed to the DNS capability) as a basis for its classification determination. (To the extent that Brand X can be read as reaching a different conclusion, we find the Court's characterization of ''caching'' as enabling ''subscribers [to] reach third-party Web sites via the World Wide Web, and browse their contents, [only] because their service provider offers the capability for . . . acquiring, [storing] . . . retrieving [and] utilizing information'' to be technically inaccurate.) When offered as part of a broadband Internet access service, caching, like DNS, is simply used to facilitate the transmission of information so that users can access other services, in this case by enabling the user to obtain ''more rapid retrieval of information'' through the network. (Caching is akin to a ''store and forward technology [used] in routing messages through the network as part of a basic service.'') Thus, it falls easily within the telecommunications systems management exception to the information service definition. We observe that this caching function provided by broadband providers as part of a broadband Internet service, is distinct from third party caching services provided by parties other than the provider of Internet access service (including content delivery networks, such as Akamai), which are separate information services. (Third party ''content delivery networks'' provide extensive caching services. See Akamai Comments at 3 (explaining that it deploys its technologies deep in the networks of last-mile broadband Internet providers and caches content locally, and stating that it has deployed approximately 150,000 servers in thousands of locations inside over 1,200 global networks located in over 650 cities and 92 countries))
373. Other Features Within the Telecommunications Systems Management Exception. Opponents raise, as well, a variety of new network-oriented, security-related computer processing capabilities that are used to address broader threats to their broadband networks and customers, including the processing of Internet traffic to check for worms and viruses and features that block access to certain Web sites. They claim that, as with DNS, a consumer cannot utilize the service without also receiving many of these security mechanisms. Whether or not a consumer necessarily must utilize security-related blocking functions when using a provider's broadband Internet access service, we find that, like DNS and caching, such capabilities provide telecommunications systems management functions that do not transform what otherwise would be a telecommunications service into an information service. Some security functions, e.g., blocking denial of service attacks, fall within the telecommunications systems management exception because they are used exclusively for the management, control, or operation of the telecommunications system. Many such network security functions are analogs of outbound and inbound ''call blocking'' services, such as those blocking calls to 900 and 976 numbers and those blocking calls from telemarketers, that have always been considered adjunct-to-basic with respect to voice telephony. Other security functions'--firewalls and parental controls, for example'--either fall within the telecommunications systems management exception because they are used exclusively for management of the telecommunication service or are separable information services that are offered by providers other than providers of broadband Internet access service. Such security features simply filter out unwanted traffic, and do not alter the fundamental character of the underlying telecommunications service offered to users. All of these functions ensure that users can use other Internet applications and services without worrying about interference from third parties.
374. CTIA contends that the integration between transmission and processing that characterizes mobile broadband Internet access service requires that it be classified as an information service, and notes that such integration is essential ''whether a user is browsing a Web site, engaged in mobile video conferencing, or undertaking any of the myriad other activities made possible by mobile broadband.'' We find that that, rather than transforming what otherwise would be a telecommunications service into an information service, the functions CTIA describes fall within the telecommunications management exception because they serve to facilitate the transmission of information and allow mobile subscribers to make use of other Internet applications and services. Other commenters contend that broadband providers' assignment of Internet Protocol (IP) addresses is also an information service that renders broadband Internet access service an information service. We disagree. IP address assignment is akin to telephone number assignment, making a user's computer locatable by other users on the network. Thus, this function serves to enable the transmission of information for the use of other services. The fact that the end user's equipment must periodically obtain an IP address from the broadband provider's server does not change the fundamental purpose of the service. It is analogous to adjunct-to-basic services that the Commission has held fall squarely within the telecommunications systems management exception.
375. Finally, Comcast asserts that ''with the rise of IPv6 as the eventual replacement for IPv4 as the protocol for identifying and routing Internet content, Comcast and other [providers] also now provide the functionality necessary to transform an IPv4 address into an IPv6 address (and vice versa),'' a ''processing function'' it claims is ''part and parcel of broadband Internet access service.'' We conclude that, as with DNS functions, the IP conversion functionality is akin to traditional adjunct-to-basic services, which fall under the telecommunications systems management exception. As discussed above, such functions must be ''incidental'' to an underlying telecommunications service, and must not alter the fundamental character of the telecommunications service. We find that the conversion of IPv4 to IPv6 and vice versa does not alter the information being transmitted, but rather enables the transmission of the information, analogous to traditional voice telephone calls to toll free numbers, pay-per-call numbers, and ported telephone numbers that require a database query to translate the dialed telephone number into a different telephone number and/or to otherwise determine how to route the call properly. As with these traditional services, the inclusion of this functionality does not somehow convert the basic telecommunications service offering into an information service.
376. Broadband Internet Access Service Is Not Inextricably Intertwined With Add-On Information Services. Some commenters contend that broadband Internet access service must be a functionally integrated information service because it is offered in conjunction with information services, such as cloud-based storage services, email, and spam protection. We find that such services are not inextricably intertwined with broadband transmission service, but rather are a ''product of the [provider's] marketing decision not to offer the two separately.'' The transmission service provided by broadband providers is functionally distinguishable from the Internet application add-ons they provide. Service providers cannot avoid the scope of Title II merely by bundling broadband Internet access service with information services. As the Supreme Court majority in Brand X recognized, citing the Stevens Report,''a company `cannot escape Title II regulation' '' of a telecommunications service ''`simply by packaging that service with voice mail' '' or similar information services.
377. We find that these services identified in the record'--email, cloud-based storage, and spam protection'--are separable information services. We conclude that email accounts and cloud-based storage provided along with broadband Internet access services are akin to voicemail services offered along with traditional telephone service. As the Court found, ''a telephone company that packages voice mail with telephone service offers a transparent transmission path'--telephone service'--that transmits information independent of the information-storage capabilities provided by voicemail . . . . [W]hen a person makes a telephone call, his ability to convey and receive information using the call is only trivially affected by the additional voice-mail capability.'' Likewise, the broadband Internet access service that consumers purchase is only trivially affected, if at all, by the email and cloud-based storage functionalities that broadband providers may offer with broadband Internet access service. Finally, security functions such as spam blocking are add-ons to separable information services such as email, and are themselves separable information services.
378. It is also notable that engineers view the Internet in terms of network ''layers'' that perform distinct functions. Each network layer provides services to the layer above it. Thus the lower layers, including those that provide transmission and routing of packets, do not rely on the services provided by the higher layers. In particular, the transmission of information of a user's choosing (which is a service offered by lower layers) does not depend on add-on information services such as cloud-based storage services, email, or spam protection (which are services offered at the application layer). Also, application layer services that fall within the telecommunications management exception (e.g., DNS, caching, or security services offered as part of broadband Internet access service) similarly do not depend on add-on information services. As such, add-on information services are separated from the functions, like DNS, that facilitate transmission, and are not ''inextricably intertwined'' with broadband Internet access services.
379. Other recent developments also show that consumers' use of today's Internet to access content and applications is not inextricably intertwined with the underlying transmission component. For instance, consumers are increasingly accessing content and applications on the Internet using Wi-Fi-only devices that take advantage of Wi-Fi hotspots not provided by the consumer's underlying broadband service provider. Similarly, consumers can sometimes use Wi-Fi-enabled smartphones not only to access the Internet via their service provider's mobile broadband network or Wi-Fi hotspots, but also using Wi-Fi hotspots offered by premises operators. Further, many consumers purchase content that can be accessed over any of a number of different transmission paths and devices over the Internet'--for example, video over a fixed broadband connection to a flat-screen television, or over a Wi-Fi router connected to a fixed broadband connection to a tablet, or over a mobile broadband network to a smartphone.
380. In addition, countless third parties are now embedding electronics, software, sensors, and other forms of connectivity into a wide variety of everyday devices, such as wearables, appliances, thermostats, and parking meters that rely on Internet connectivity to provide value to the American consumer, including through mHealth, Smart Grid, connected education, and other initiatives. The growth of the Internet of Things is yet another clear indication that devices and services that consumers use with today's Internet are not inextricably intertwined with the underlying transmission component.
381. Finally, we observe that the Commission itself recognized in 2005 that the ''link'' between the transmission element of broadband Internet access service and the information service was not inextricable. Specifically, the 2005 Wireline Broadband Classification Order granted wireline broadband providers the option of offering the transmission component of broadband Internet access as a distinct common carrier service under Title II on a permissive basis, and a large number of rural carriers have exercised this option for nearly a decade. As NTCA explains, ''[t]he fact that the Commission recognized as far back as 2005 that the transmission component could be separated out, and the fact that it has been separated out and offered separately on a tariffed basis by a large number of carriers undercuts any argument'' that the transmission service and the services that ride atop that service are inextricably intertwined. Further, the 2007 Wireless Broadband Classification Order permitted providers of mobile broadband Internet access service to offer the ''transmission component [of wireless broadband Internet access service] as a telecommunications service.
d. Opponents' Remaining Challenges Are Insubstantial382. Some commenters contend that our ruling is contrary to a Congressional intent for keeping the Internet unregulated. We are not, however, regulating the Internet, per se, or any Internet applications or content. Rather, our reclassification of broadband Internet access service involves only the transmission component of Internet access service. As the D.C. Circuit has explained, ''Congress did not choose between'' competing ''market-based'' and ''common-carrier, equal access'' philosophies for broadband regulation; rather, ''the FCC possesses significant, albeit not unfettered, authority and discretion to settle on the best regulatory or deregulatory approach to broadband'--a statutory reality that assumes great importance when parties implore courts to overrule FCC decisions on this topic.'' We recognize that the Commission's previous classification decisions concluded that classifying broadband Internet access service as an information service would ''establish a minimal regulatory environment'' that would promote the Commission's goal of ''ubiquitous availability of broadband to all Americans.'' We do not today abandon that goal but instead seek to promote it through a ''light-touch'' regulatory framework for broadband Internet access services under Title II. As noted earlier, there will be no rate regulation, no unbundling of last-mile facilities, no tariffing, and a carefully tailored application of only those Title II provisions found to directly further the public interest in an open Internet.
383. Several commenters argue that we should rely exclusively on industry self-regulation to promote the policies discussed above. While we applaud voluntary industry initiatives, we find the self-regulation option to be lacking in a number of respects. First, for the reasons discussed in our forbearance analysis in section IV, we find that applying the few provisions in Title II necessary to implement the policy objectives identified above is in the public interest. We conclude that in the absence of credible Commission authority to step in when necessary in the public interest, voluntary measures will prove inadequate. Second, even the best-intentioned voluntary regulation initiatives are more likely to protect consumers when there is an expert agency that can provide a backstop to inadequate industry action that may result from collective action or coordination problems beyond any single firm's control.
384. Other commenters argue that classifying broadband Internet access service as a telecommunications service would impermissibly compel providers of broadband Internet access service to operate as common carriers. This argument misconstrues the nature of our ruling. Our decision to classify broadband Internet access service as a telecommunications service subject to the requirements of Title II derives from the characteristics of this service as it exists and is offered today. We do not ''require'' that any service ''be offered on a common carriage basis,'' but rather identify an existing service that is appropriately offered on a common carriage basis ''by virtue of its functions,'' as explained in detail above. Our classification decision is easily distinguished from the rules struck down in Midwest Video II, as those rules impermissibly attached common carrier obligations to services the Commission plainly lacked statutory authority to regulate in this manner. Congress has not spoken directly to the regulatory treatment of broadband Internet access services. Our classification of these services as telecommunications services is a permissible exercise of our delegated authority, one which we have adequately justified and defended based on the record before us. Because we have appropriately classified these services as telecommunications services, we do not run afoul of the Act's provision that a ''tele-com-muni-ca-tions carrier shall be treated as a common carrier under this Act only to the extent that it is engaged in providing telecommunications services.'' We thus reject the argument that our ruling impermissibly compels common carriage.
385. Commenters also argue that the classification of broadband Internet access service as a telecommunications service results in this service being classified as both a telecommunications service and an information service, in violation of Congressional intent. We agree with commenters that these are best construed as mutually exclusive categories, and our classification ruling appropriately keeps them distinct. In classifying broadband Internet access service as a telecommunications service, we conclude that this service is not a functionally integrated information service consisting of a telecommunications component ''inextricably intertwined'' with information service components. Rather, we conclude, for the reasons explained above, that broadband Internet access service as it is offered and provided today is a distinct offering of telecommunications and that it is not an information service. As further explained above, any functional integration of DNS or caching with broadband Internet access service does not disrupt this classification, as both of those functions fall within the ''telecommunications systems management exception'' to the definition of an information service. Nor does the mere ''packaging'' of information services such as email with broadband Internet access service convert the latter into an information service. Our classification of broadband Internet access service therefore does not create any definitional inconsistency.
386. We also reject the argument that the classification of broadband Internet access service as an information service is implicit in the definition of ''interactive computer service'' set forth in section 230 of the Communications Act, a provision focused on the blocking and screening of offensive material. We find it unlikely that Congress would attempt to settle the regulatory status of broadband Internet access services in such an oblique and indirect manner, especially given the opportunity to do so when it adopted the Telecommunications Act of 1996. At any rate, the definition does not expressly classify broadband Internet access service, as we define that term herein, as an information service. (For one thing, the phrase ''any information service, system or access software provider'', see47 U.S.C. 230 (f), may be broader in scope than the term ''information service'' as defined in section 3 of Act. To read the text otherwise would suggest that Congress intended the liability protections of section 230 to apply narrowly, excluding, for example, local exchange carriers that offered DSL, which as noted above was classified as a telecommunications service until 2005.) We therefore find no basis in section 230 for reconsidering our judgment that this service is properly understood to be a telecommunications service, for the reasons explained above.
387. Finally, we disagree with the suggestion that our decision to ''reclassify, to forbear, and to adopt rules grounded in Title II'' is not a ''logical outgrowth'' of the 2014 Open Internet NPRM. The approach we adopt today is more than a logical outgrowth of the NPRM; it is one that the NPRM expressly identified as an alternative course of action. It is one on which the Commission sought comment in almost every section of the NPRM. (Thus, at the very outset, in addition to ''the [section 706] blueprint offered by the D.C. Circuit'' on which the dissent now seeks to focus, Pai Dissent at 16-19, the Commission made clear that in looking for the ''best approach to protecting and promoting Internet openness,'' it ''will seriously consider the use of Title II,'' ''seeks comment on the benefits of both . . ., including the benefits of one approach over the other,'' and ''emphasize[s] . . . that the Commission recognizes that both section 706 and Title II are viable solutions and seek[s] comment on their potential use.'' The NPRM in this proceeding is thus nothing like the NPRM that was at issue in Prometheus. Prometheus Radio Project v. FCC, 652 F.3d 431 (3rd Cir. 2011). We also note that, under the APA, notice-and-comment rulemaking requirements apply only to the extent that we herein adopt legislative rules. 5 U.S.C. 553(b)(A), 553(d)(2).) It is one that several broadband Internet access service providers vigorously opposed in their comments in light of their own reading of the NPRM. (Dissents to the NPRM likewise reflect that this approach was on the table. See 2014 Open Internet NPRM, 29 FCC Rcd at 5653-55 (dissenting Statement of Commissioner Pai) (recognizing ''[i]t's not news that people of good faith disagree'' on the right approach, stating that ''[s]ome would like to regulate broadband providers as utilities under Title II,'' and discussing the scope of Title II's ''unjust or unreasonable discrimination'' requirement, the consequences of reclassification under Title II, and the alleged regulatory uncertainties posed under either section 706 ''or Title II''). Dissents to the NPRM likewise reflect that this approach was on the table. See 2014 Open Internet NPRM, 29 FCC Rcd at 5653 through 55 (dissenting Statement of Commissioner Pai) (recognizing ''[i]t's not news that people of good faith disagree'' on the right approach, stating that ''[s]ome would like to regulate broadband providers as utilities under Title II,'' and discussing the scope of Title II's ''unjust or unreasonable discrimination'' requirement, the consequences of reclassification under Title II, and the alleged regulatory uncertainties posed under either section 706 ''or Title II'').)
4. Mobile Broadband Internet Access Service Is Commercial Mobile Service388. As outlined above, we conclude that broadband Internet access service, whether provided by fixed or mobile providers, is a telecommunications service. We also find that mobile broadband Internet access service is a commercial mobile service. In any event, however, even if that service falls outside the definition of ''commercial mobile service,'' we find that it is the functional equivalent of a commercial mobile service and, thus, not a private mobile service.
389. Congress adopted the commercial mobile service provisions in the Act with the goal of creating regulatory symmetry among similar mobile services. Section 332(d)(1) of the Communications Act defines ''commercial mobile service'' as ''any mobile service . . . that is provided for profit and makes interconnected service available (A) to the public or (B) to such classes of eligible users as to be effectively available to a substantial portion of the public, as specified by regulation by the Commission.'' We find that mobile broadband Internet access service meets this definition. First, we find that mobile broadband Internet access service is a ''mobile service'' because subscribers access the service through their mobile devices. Next, we find that mobile broadband Internet access service is provided ''for profit'' because service providers offer it to subscribers with the intent of receiving compensation. We also conclude the mobile broadband Internet access services are widely available to the public, without restriction on who may receive them.
390. Finally, we conclude that mobile broadband Internet access service is an interconnected service. Section 332(d)(2) states that the term ''interconnected service'' means ''service that is interconnected with the public switched network (as such terms are defined by regulation by the Commission) . . . .'' The Commission has defined ''interconnected service'' as a service ''that gives subscribers the capability to communicate to or receive communication from all other users on the public switched network.'' The Commission has defined the term ''public switched network'' to mean ''[a]ny common carrier switched network, whether by wire or radio, including local exchange carriers, interexchange carriers, and mobile service providers, that use[s] the North American Numbering Plan in connection with the provision of switched services.''
391. While mobile broadband Internet access service does not use the North American Numbering Plan, we conclude for the reasons set out below that we should update our definition of public switched network pursuant to the authority granted to the Commission in section 332 so that our definition reflects the current network landscape rather than that existing more than 20 years ago. In its Order defining the terms ''interconnected'' and ''public switched network'' the Commission concluded that the term ''public switched network'' should not be defined in a static way, recognizing that the network is continuously growing and changing because of new technology and increasing demand. The purpose of the public switched network, the Commission noted, is ''to allow the public to send or receive messages to or from anywhere in the nation.'' This quality of ''ubiquitous access,'' for which the NANP was viewed as a proxy in 1994, was consistent with the key distinction underlying the formulation of the CMRS definition by Congress'--differentiating the emerging cellular-based technology for ''commercial'' SMR service being deployed by Nextel's predecessor as a mass market service from the traditional ''private'' SMR dispatch services employed by taxi services and other private fleets. Today, consistent with our authority under the Act, and with the Commission's previous recognition that the ''public switched network'' will grow and change over time, we update the definition of public switched network to reflect current technology. Specifically, we revise the definition of ''public switched network'' to mean ''the network that includes any common carrier switched network, whether by wire or radio, including local exchange carriers, interexchange carriers, and mobile service providers, that use[s] the North American Numbering Plan, or public IP addresses, in connection with the provision of switched services.'' This definition reflects the emergence and growth of packet switched Internet Protocol-based networks. Revising the definition of public switched network to include networks that use standardized addressing identifiers other than NANP numbers for routing of packets recognizes that today's broadband Internet access networks use their own unique addressing identifier, IP addresses, to give users a universally recognized format for sending and receiving messages across the country and worldwide. (This definitional change to our regulations in no way asserts Commission jurisdiction over the assignment or management of IP addressing by the Internet Numbers Registry System.) We find that mobile broadband Internet access service is interconnected with the ''public switched network'' as we define it today and is therefore an interconnected service.
392. Contrary to these arguments, we find that revising the definition of ''public switched network'' and classifying mobile broadband Internet access service as a commercial mobile service is a logical outgrowth of the proposals in the 2014 Open Internet NPRM. As discussed above, in the NPRM, the Commission proposed relying on section 706 of the Telecommunications Act of 1996 for legal authority to adopt rules to protect the open Internet but indicated that it would also seriously consider the use of Title II of the Communications Act as a basis for legal authority. The Commission sought comment on whether, in the event that it decided to reclassify broadband Internet access service under Title II, mobile broadband Internet access service would fit within the definition of ''commercial mobile service'' under section 332 of the Act and the Commission's rules implementing that section. In addition, the NPRM noted that the Commission's Broadband Classification NOI also asked whether the Commission should revisit its classification of wireless broadband Internet access services, noted that the NOI docket ''remains open,'' and directed that the record be refreshed in that proceeding ''including the inquiries contained herein.'' In the Broadband Classification NOI, the Commission sought comment on ''legal issues specific to . . . wireless services that bear on their appropriate classification.'' More specifically, it asked ''which of the three legal frameworks'' described therein (which included a Title II approach) ''would best support the Commission's policy goals for wireless broadband.'' In particular, it asked ''[t]o what extent should section 332 of the Act affect our classification of wireless broadband Internet services?'' In the 2014 Open Internet NPRM, the Commission also noted that section 332 requires that wireless services that meet the definition of commercial mobile services be regulated as common carriers under Title II. The NPRM also asked about the extent to which forbearance should apply, if the Commission were to classify mobile broadband Internet access service as a CMRS service subject to Title II, and noted that the Broadband Classification NOI also asked whether the Commission could and should apply section 332(c)(1) as well as section 10 in its forbearance analysis for mobile services. The 2014 Open Internet NPRM also sought comment on defining mobile broadband Internet access service and on application of Internet openness requirements to mobile broadband services.
393. We find that our decision today to classify mobile broadband Internet access service as both a telecommunications service under Title II and CMRS is a logical outgrowth of these discussions and requests for comments. The discussion and questions posed in the 2014 Open Internet NPRM gave clear notice that the Commission was considering whether to reclassify mobile broadband Internet access under Title II as a telecommunications service and whether mobile broadband Internet access service would fit within the definition of ''commercial mobile service'' under the Act and the Commission's rules, including whether mobile broadband would meet the ''interconnected service'' component of the commercial mobile service definition. It was ''reasonably foreseeable'' that in answering that question the Commission would explore the scope of that component of the definition. Stated another way, ''interested parties should have anticipated that the change [in that definition] was possible, and thus reasonably should have filed their comments on the subject during the notice-and-comment period.'' While we think this proposition is clear from the questions posed by the 2014 Open Internet NPRM, we further note that in this case mobile broadband providers ''themselves had no problem understanding the scope of the issues up for consideration; several . . . submitted comments'' on the issue. And, other parties commented that the Commission should update its definition of the term ''public switched network.'' Moreover, as referenced above, evidence in the record shows that a number of parties have directly addressed the application of section 332(d) and the Commission's implementing rules to mobile broadband Internet access and thus have been aware that the Commission was considering taking action to update the definition of ''public switched network'' and reclassify mobile broadband Internet access as commercial mobile service.
394. We also disagree with arguments that we are barred from updating the definition of public switched network to include networks that use addressing identifiers beyond NANP numbers associated with traditional telephone networks. CTIA, Verizon, and AT&T argue that the history of the legislation that defined ''commercial mobile service'' indicates that Congress intended the term ''public switched network'' to mean the ''public switched telephone network.'' CTIA, for example, argues that when Congress used the term ''public switched network'' in 1993, ''it did so knowing that the Commission and the courts routinely used that term interchangeably with `public switched telephone network' '' and that ''[i]t is axiomatic that, when Congress `borrows' a term of art that has been given meaning by the courts or the relevant agency, it `intended [that term] to have its established meaning.' '' It argues also that ''the Conference Report accompanying the legislation confirms that, although Congress used the term `public switched network,' it viewed that term as synonymous with `the [p]ublic switched telephone network.' '' AT&T notes that Congress ''used the term `the public switched network' '' and that ''Congress's use of the definite article `the' and the singular `network' makes clear that it was referring to a single `public switched network' '' The parties also argue that the text of the FirstNet public safety legislation supports their argument because it distinguishes between the ''public switched network'' and the ''public Internet. AT&T contends also that the text of section 230 supports its views.
395. We agree with other commenters that these arguments do not give sufficient weight to Congressional intent as reflected in the text of the statute itself. As noted above, section 332(d)(2) of the Act uses the term ''public switched network'' rather than ''public switched telephone network.'' Moreover, as CTIA, Verizon, and AT&T acknowledge, the statute expressly delegates authority to the Commission to define the term ''public switched network.'' While we agree with CTIA that the delegation of authority does not provide boundless discretion, we find that what is clear from the statutory language is not what the definition of ''public switched network'' was intended to cover but rather that Congress expected the notion to evolve and therefore charged the Commission with the continuing obligation to define it. In short, by defining such terms by reference to the way they ''are defined by regulation by the Commission,'' Congress expressly delegated this policy judgment to the Commission. As noted above, in defining the terms ''interconnected service'' and ''public switched network,'' the Commission concluded that the term ''public switched network'' should not be defined in a static way and recognized that the network is continuously growing and changing because of new technology and increasing demand. The Commission expressly rejected calls in 1994 to define the public switched network as the ''public switched telephone network'' finding that a broader definition was consistent with Congress's decision to use the term ''public switched network,'' rather ''than the more technologically based term `public switched telephone network.' '' (Contrary to one of the dissenting statements, (Pai Dissent at 46-47 & n.337), the Commission made clear it was not limiting the term ''public switched network'' to the traditional network. First, as noted above, it rejected that view in favor of the position of other commenters that ''the network should not be defined in a static way,'' an interpretation it found more consistent with the determination by Congress not to employ the term ''public switched telephone network.'' Second, it stated that any switched common carrier service that is interconnected with the traditional local or interexchange switched network would be defined ''as part of'' the public switched network ''for purposes of our definition,''Second CMRS Report and Order, 9 FCC Rcd at 1436 through 1437, 59 FR 18493, Apr. 19, 1994. Even as early as 1994, the comments on which the Commission relied for its definition, id. at 1437, para. 60, made this very point. Comments of other wireless providers, with whom the Commission agreed about avoiding ''a static way'' of defining the network, id. at 1436, para. 59, made the same point.) Today, we build upon this analysis and update our definition of ''public switched network'' to reflect changes in technology. Reflecting the foregoing changes in technology and telecommunications infrastructure, our definition contemplates a single network comprised of all users of public IP addresses and NANP numbers, and not two separate networks as AT&T argues. We find that this action is consistent both with the text of the statute and Congressional intent. (We are not persuaded by AT&T's arguments that rely, not on the foregoing language or purpose of the 1993 statute at issue, but on subsequent statutes enacted for different purposes in 1996 and 2012. Quite apart from canons of statutory construction, this argument disregards the signal difference in section 332(d), which delegates the question of the scope of its terms to the Commission in light of its experience and market developments over time. We note, however, that AT&T's reliance on the ''policy'' of the 1996 Act reflected in section 230 is similar to one that Verizon made but that was not found by the Verizon court to be a bar to its conclusion that ''section 706 grants the Commission authority to promote broadband deployment by regulating how broadband providers treat edge providers.'')
396. We recognize that, in the 2007 Wireless Broadband Classification Order, the Commission previously concluded that section 332'--''as implemented by the Commission's CMRS rules'''--did not contemplate wireless broadband Internet access service ''as provided today,'' citing the Second CMRS Report and Order's finding that '' `commercial mobile service' must still be interconnected with the local exchange or interexchange switched network as it evolves.'' The Commission also found that mobile broadband Internet access was not an ''interconnected service'' based on its reading of the Commission's existing rule, because the service did not provide its users with the capability to reach all other users of the public switched network. In addition, in 2011, in its order adopting data roaming requirements, the Commission defined services subject to the data roaming rule as services that are not interconnected with the public switched network. (The Commission defined ''commercial mobile data service'' which is subject to the data roaming rule as ''any mobile data service that is not interconnected with the public switched network.'' Opponents of reclassifying mobile broadband Internet access services have argued that the D.C. Circuit's decisions on data roaming and on the 2010 Open Internet Order bar the Commission from reclassifying mobile broadband Internet access as commercial mobile service. First, we note that the issue of revising the Commission's definitions was neither raised nor discussed in the data roaming or open Internet decisions. Moreover, contrary to these arguments, we find that the Court's acceptance of the Commission's previous decisions based on its existing definitions does not preclude the Commission from revisiting and revising its definitions, as expressly permitted by the language of section 332. We note that if a mobile service is not interconnected to the public switched network (as updated herein) and otherwise meets the definition of ''commercial mobile data service'' in section 20.3 of the Commission's rules, it will continue to be subject to the data roaming rules.) However, the 2007 Wireless Broadband Classification Order (on which the 2011 Data Roaming Order also relied) was premised both on its view of the service ''as provided today'' and on ''an internal contradiction'' that a finding that wireless broadband Internet access was a commercial mobile would have caused with the finding that it was an ''information service.'' Moreover, in neither instance did the Commission consider whether it should revise the definition of ''public switched network,'' on which its conclusion in the 2007 Wireless Broadband Classification Order was premised.
397. Today, we update the definition of ''public switched network'' to reflect current technology and conclude that mobile broadband Internet access is an interconnected service. First, as outlined above, we find that mobile broadband is an ''interconnected service'' because it interconnects with ''public switched network'' as we define it today. We find also that mobile broadband is an interconnected service because it gives its users the capability to send and receive communications from all other users of the Internet. In defining the term ''interconnected service'' in the Second CMRS Report and Order, the Commission indicated its belief that, by using the term ''interconnected service,'' Congress intended to focus on whether mobile services ''make interconnected service broadly available through their use of the public switched network.'' In addition, the Commission noted that Congress's purpose was to ''ensure that a mobile service that gives its customers the capability to communicate or to receive communications from other users of the public switched network should be treated as a common carriage offering.'' This was by contrast with the alternative ''private mobile service'' classification, which by statute includes services not ''effectively available to a substantial portion of the public.'' Mobile broadband Internet access service fits the former classification as millions of subscribers use it to send and receive communications on their mobile devices every day. In sharp contrast to 2007 when the Commission characterized mobile broadband Internet access services as being in a nascent stage, today the mobile broadband marketplace has evolved such that hundreds of millions of consumers now use mobile broadband to access the Internet. For example, as noted earlier, by November 2014, 73.6 percent of the entire U.S. age 13+ population was communicating with smart phones, a figure which has continued to rise rapidly over the past several years. In addition, the number of mobile connections already exceeds the U.S. population and Cisco forecasts that by 2019, North America will have nearly 90% of its installed based converted to smart devices and connections, and smart traffic will grow to 97% of the total global mobile traffic. Mobile broadband subscribers, who use the same devices to receive voice and data communications, can also send or receive communications to or from anywhere in the nation, whether connected with other mobile broadband subscribers, fixed broadband subscribers, or the hundreds of millions of Web sites available to them over the Internet. This evidence of the extensive changes that have occurred in the mobile marketplace demonstrates the ubiquity and wide scale use of mobile broadband Internet access service today.
398. Today we update the definition of ''public switched network'' to reflect current mass market communications network technologies and configurations, and the rapidly growing and virtually universal use of mobile broadband service. It also is more consistent with Congressional intent to recognize as an ''interconnected service'' today's broadly available mobile broadband Internet access service, which connects with the Internet and provides its users with the ability to send and receive communications from all other users connected to the Internet, (whether fixed or mobile). As CTIA recognizes, Congress's intent in enacting section 332 was to create a symmetrical regulatory framework among similar mobile services that were made available ''to the public or . . . to such classes of eligible users as to be effectively available to a substantial portion of the public.'' Given the universal access provided today and in the foreseeable future by and to mobile broadband and its present and anticipated future penetration rates in the United States, we find that our decision today classifying mobile broadband Internet access as a commercial mobile service is consistent with Congress's objective. As noted above, that is a policy judgment that section 332(d) expressly delegated to the Commission, consistent with its broad spectrum management authority under Title III.
399. Moreover, we agree with commenters who argue that mobile broadband Internet access service meets the definition of interconnected service for a wholly independent reason: Because'--even under our existing definition of ''public switched network'' adopted in 1994'--users have the ''capability,'' as provided in section 20.3 of our rules, to communicate with NANP numbers using their broadband connection through the use of VoIP applications. Other parties disagree, arguing that, regardless of the attributes of VoIP services that ride over broadband Internet access networks, broadband Internet access service itself does not offer the ability to reach all NANP endpoints. These parties note also that the Commission itself has previously concluded that mobile broadband Internet access, in and of itself, does not provide the ability to reach all other users of the public switched network.
400. We find that the Commission's previous determination about the relationship between mobile broadband Internet access and VoIP applications in the context of section 332 no longer accurately reflects the current technological landscape. Today, users on mobile networks can communicate with users on traditional copper based networks and IP based networks, making more and more networks using different technologies interconnected. In addition, mobile subscribers continue to increase their use of smartphones and tablets and the significant growth in the use of mobile broadband Internet access services has spawned a growing mobile application ecosystem. The changes in the marketplace have increasingly blurred the distinction between services using NANP numbers and services using public IP addresses and highlight the convergence between mobile voice and data networks that has occurred since the Commission first addressed the classification of mobile broadband Internet access in 2007. Today, mobile VoIP, as well as over-the-top mobile messaging, is among the increasing number of ways in which users communicate indiscriminately between NANP and IP endpoints on the public switched network. In view of these changes in the nature of mobile broadband service offerings, we find that mobile broadband Internet access service today, through the use of VoIP, messaging, and similar applications, effectively gives subscribers the capability to communicate with all NANP endpoints as well as with all users of the Internet. (In support of arguments regarding interconnection, one of the dissents (Pai Dissent at 51 n.362), cites the inapposite Time Warner Cable Request for Declaratory Ruling That Competitive Local Exchange Carriers May Obtain Interconnection under section 251 of the Communications Act of 1934, as Amended, to Provide Wholesale Telecommunications Services to VoIP Providers, Memorandum Opinion and Order, 22 FCC Rcd 3513, 3520, paras. 15 through 16 (Wireline Comp. Bur. 2007). Our interpretation here of the Commission's own rule as to what constitutes the ''capability'' to communicate with NANP endpoints is a completely different question from whether wholesale carriers are entitled to interconnection rights under section 251 of the Act regardless of the regulatory status of VoIP services provided to end users, which was the issue addressed by the staff in the Time Warner Cable request for a Declaratory Ruling.)
401. We also note that, under the Commission's definition of ''interconnected service'' in section 20.3 of the rules, a service is interconnected even if ''. . . the service provides general access to points on the public switched network but also restricts access in certain limited ways.'' Thus, the Commission's definition, while requiring that the interconnected service provide the ''capability'' for access to all other users of the public switched network, also recognizes that services that restrict access to the public switched network, in certain limited ways, should also be viewed as interconnected. (In adopting the definition of interconnected service in the Second CMRS Report and Order, the Commission recognized that interconnected services could be limited and noted that ''[i]n defining interconnected service in terms of transmissions to or from `anywhere' on the PSN, we note that it is necessary to qualify the scope of the term `anywhere'; if a service that provides general access to points on the PSN also restricts calling in certain limited ways (e.g., calls attempted to be made by the subscriber to `900' telephone numbers are blocked), then it is our intention still to include such a service within the definition of `interconnected service' for purposes of our part 20 rules.'') Accordingly, to the extent that there is an argument that, even with an updated definition of public switched network, mobile broadband Internet access still would not meet the definition of interconnected because it would only enable communications with some rather than all users of the public switched network, i.e., users with NANP numbers, we disagree and find that the Commission's rules recognize that interconnected services may be limited in certain ways. Our interpretation of the Commission's rules is consistent with their purpose, which is to ascertain whether the interconnected service is ''broadly available.'' It is also most consistent with, and must be informed by, the key section 332(d) guidepost that Congress provided to the Commission in granting it authority to define these terms. This guidepost refers to a service available to ''the public'' or to such classes of eligible users as to be effectively available ''to a substantial portion of the public.'' This focus of the inquiry on availability to the public or a substantial portion of it is also consistent with the specific purpose of the statute, which was to create a symmetrical regulatory framework for similar commercial services then being offered to consumers by cellular licenses and by SMR licensees who were using licenses that traditionally had been used to provide wireless service only to limited groups of users (e.g., taxi fleets). (To make this point clear, and in the exercise of our authority to ''specif[y] by regulation'' what services qualify as CMRS services that make interconnected service available to the public or to such classes of eligible users as to be effectively available to a substantial portion of the public, we have made a conforming change to the definition of Interconnected Service in section 20.3 of the Commission's rules.)
402. Lastly, because today we classify mobile broadband Internet access service as a telecommunications service, designating it also as commercial mobile service subject to Title II is most consistent with Congressional intent to apply common carrier treatment to telecommunications services. Specifically, as in 2007, but for different reasons in light of our reclassification of the service as a ''telecommunications service,'' we find that classifying mobile broadband Internet access service as a commercial mobile service is necessary to avoid a statutory contradiction that would result if the Commission were to conclude both that mobile broadband Internet access was a telecommunications service and also that it was not a commercial mobile service. A statutory contradiction would result from such a finding because, while the Act requires that providers of telecommunications services be treated as common carriers, it prohibits common carrier treatment of mobile services that do not meet the definition of commercial mobile service. Finding mobile broadband Internet access service to be commercial mobile service avoids this statutory contradiction and is most consistent with the Act's intent to apply common carrier treatment to providers of telecommunication services.
403. Mobile Broadband Internet Access Service Is Not a Private Mobile Service. Our conclusion that mobile broadband Internet access service is a commercial mobile service, through the application of our updated definition of ''public switched network,'' leads unavoidably to the conclusion that it is not a private mobile service. Indeed, we believe that today's mobile broadband Internet access service, with hundreds of millions of subscribers and the characteristics discussed above, is not akin to the private mobile service of 1994, such as a private taxi dispatch service, services that offered users access to a discrete and limited set of endpoints. Even, however, if that were not so, there is another reason that mobile broadband Internet access service is not a private mobile service: It is the functional equivalent of a commercial mobile service, even under the previous definition of ''public switched network.'' As with the policy judgments reflected in the other two definitional subsections of section 332(d) and described above, Congress expressly delegated authority to the Commission to determine whether a particular mobile service may be the functional equivalent of a commercial mobile service. Specifically, section 332 of the Act defines ''private mobile service'' as ''any mobile service . . . that is not a commercial mobile service or the functional equivalent of a commercial mobile service, as specified by regulation by the Commission.'' We find that mobile broadband Internet access service is functionally equivalent to commercial mobile service because, like commercial mobile service, it is a widely available, for profit mobile service that offers mobile subscribers the capability to send and receive communications on their mobile device to and from the public. Although the services use different addressing identifiers, from an end user's perspective, both are commercial services that allow users to communicate with the vast majority of the public.
404. CTIA, Verizon, and AT&T argue that mobile broadband Internet access service cannot be considered the functional equivalent of commercial mobile service. First, they argue that the Commission failed to provide notice that it might deem mobile broadband the functional equivalent of CMRS. Next, CTIA argues that ''Congress intended the hallmark of CMRS to be the provision of interconnected service through use of the PSTN. No service lacking this essential attribute could amount to a functional equivalent of CMRS.'' Verizon argues that ''because mobile broadband Internet access service cannot, on its own, be used to place calls to telephone numbers, and CMRS cannot be used to connect with (for example) Google's search engine or Amazon.com or any of the millions of other sources of online content, these two services are not substitutes, and cannot be deemed functionally equivalent.'' AT&T and CTIA argue that mobile broadband Internet access is not a substitute for CMRS and therefore is not the functional equivalent of CMRS. Verizon, CTIA, and AT&T argue that the issue of whether or not mobile VoIP applications or services themselves may be interconnected with the public switched network should have no bearing on the determination of whether mobile broadband Internet access service itself may be viewed as the functional equivalent of commercial mobile service.
405. We disagree with these arguments. First, for the reasons discussed above, we disagree with the parties' arguments regarding notice. We find that our decision today that mobile broadband Internet access service may be viewed as the functional equivalent of commercial mobile service is a logical outgrowth of the discussions and questions presented in the 2014 Open Internet NPRM. As noted above, our 2014 Open Internet NPRM sought comment on the option of revising the classification of mobile broadband Internet access service and on whether it would fit within the definition of commercial mobile service under section 332 of the Act and the Commission's rules implementing that section, including section 20.3. Section 20.3 of the Commission's rules defines commercial mobile radio service as a mobile service that is: ''Provided for profit, i.e., with the intent of receiving compensation or monetary gain; an interconnected service; and available to the public or to such classes of eligible users as to be effectively available to a substantial portion of the public; or the functional equivalent of such a mobile service . . . .'' Interested parties should have reasonably foreseen and in fact were aware that the Commission would analyze the functional equivalence of mobile broadband Internet access service as part of its consideration of whether it should revise the classification of mobile broadband Internet access and whether mobile broadband Internet access would fit within the definition of commercial mobile service under section 332. Indeed, several parties have submitted comments on this question.
406. We also disagree with CTIA's contention that, if a mobile service is not an interconnected service through the use of the public switched telephone network, it may not be considered the functional equivalent of commercial mobile service. This argument would render the functional equivalence language in the statute superfluous by essentially requiring a functionally equivalent service to meet the literal definition of commercial mobile service. We find that Congress included the functional equivalence provision in the statute precisely to address such new developments for services that may not meet the literal definition of commercial mobile service. We also disagree with Verizon that, because mobile broadband subscribers may use their service to communicate with a different and broader range of entities, the two services cannot be functionally equivalent. As noted above, both mobile broadband Internet access service and commercial mobile service provide their users with a service that enables ubiquitous access to the vast majority of the public. The fact that the services may also enable communications in other ways or with different groups does not make them less useful as substitutes for commercial mobile service. Moreover, regardless of whether providers may offer voice and data services separately, as discussed above, from both a technical as well as a consumer perspective, there are increasingly fewer distinctions or interoperability issues between these types of services. The marketplace changes that have occurred since the Commission first addressed the classification of mobile broadband Internet access service in 2007 support our finding that mobile broadband Internet access service offered to the mass market must be viewed today as the functional equivalent of commercial mobile service.
407. We recognize that, in the Second CMRS Report and Order, the Commission created a petition-based process for parties interested in challenging the classification of a particular service as private mobile service, and indicated that it would consider a variety of factors to determine whether a particular service is the functional equivalent of a CMRS service. Specifically, as AT&T and CTIA point out, the Commission said it would consider consumer demand for the service in question to determine whether the service is closely substitutable for a commercial mobile radio service; whether changes in price for the service under examination, or for the comparable commercial mobile radio service, would prompt customers to change from one service to the other; and market research information identifying the targeted market for the service under review. Section 20.9 of the Commission's rules articulates the same standard for parties interested in challenging the classification of a service as a private mobile service. While we do not amend section 20.9's separate provision for a petition process in other contexts, for the reasons stated above related to today's widespread distribution and use of mobile broadband devices, we are amending section 20.3 to reflect our conclusion that mobile broadband Internet access service is the functional equivalent of CMRS.
5. The Reclassification of Broadband Internet Access Service Will Preserve Investment Incentives408. In this section, we address potential effects of our classification decision on investment and innovation in the Internet ecosystem. Our classification of broadband Internet access service flows from the marketplace realities in how this service is offered. In reaching these conclusions, we also consider whether the resulting regulatory environment produces beneficial conditions for investment and innovation while also ensuring that we are able to protect consumers and foster competition. We find that classifying broadband Internet access service as a telecommunications service'--but forbearing from applying all but a few core provisions of Title II'--strikes an appropriate balance by combining minimal regulation with meaningful Commission oversight. This approach is based on the proven model Congress and the Commission have applied to CMRS, under which investment has flourished.
409. Based on our review of the record, the proven application of the CMRS model, and our predictive judgment about the future of the ecosystem under our new legal framework, we conclude that the new framework will not have a negative impact on investment and innovation in the Internet marketplace as a whole. As is often the case when we confront questions about the long-term effects of our regulatory choices, the record in this proceeding presents conflicting viewpoints regarding the likely impact of our decisions on investment. We cannot be certain which viewpoint will prove more accurate, and no party can quantify with any reasonable degree of accuracy how either a Title I or a Title II approach may affect future investment. Moreover, regulation is just one of many factors affecting investment decisions. Although we appreciate carriers' concerns that our reclassification decision could create investment-chilling regulatory burdens and uncertainty, we believe that any effects are likely to be short term and will dissipate over time as the marketplace internalizes our Title II approach, as the record reflects and we discuss further, below. More significantly, to the extent that our decision might in some cases reduce providers' investment incentives, we believe any such effects are far outweighed by positive effects on innovation and investment in other areas of the ecosystem that our core broadband policies will promote. Industry representatives support this judgment, stating that combined reclassification and forbearance decisions will provide the regulatory predictability needed to spur continued investment and innovation not only in infrastructure but also in content and applications.
410. Investment Incentives. The 2014 Open Internet NPRM generated spirited debate about the consequences that classifying broadband Internet access service as a telecommunications service would have for investment incentives. Opponents of reclassification assert that Title II requirements will stifle innovation and investment. Other commenters vigorously support the opposite position, asserting that reliance on section 706 authority to support open Internet rules is a course fraught with prolonged uncertainty that will stifle investment and that has already had detrimental economic effects. These and other commenters claim that a cautious regulatory approach based on Title II will provide much-needed predictability to investors and consumers alike, while ensuring that the Commission has the statutory authority necessary to protect the open Internet, promote competition, and protect consumers.
411. The key drivers of investment are demand and competition. Internet traffic is expected to grow substantially in the coming years, and the profits associated with satisfying that growth provide a strong incentive for broadband providers to continue to invest in their networks. In addition, continuing advances in technology are lowering the cost of providing Internet access service. The possibility of enhancing profit margins can be expected to induce broadband providers to make the appropriate network investments needed to capture a reduction in costs made possible only through technological advances.
412. Competition not only creates the correct incentives for investment and promotes innovation in the broadband infrastructure needed to support robust and ubiquitous Internet access service, but also spurs innovation and investment at the ''edge'' of the network, where content and applications are created and deployed. As one commenter explains, ''Title II promotes competitive entry in at least two ways.'' First, section 224 (from which we do not forbear in the context of broadband Internet access service, as discussed below) ''ensures that telecommunications carriers receive access to the poles of local exchange carriers and other utilities at just, reasonable, and nondiscriminatory rates,'' an ''important investment benefit that will enable those deploying fiber-to-the-home or other competitive networks to deploy more expeditiously and efficiently.'' (Conversely, ACA asserts that reclassification would result in increased pole attachment rates for many of its members, which would have the effect of lowering investment incentives both for continued investment in existing facilities and for new deployments. We do not agree with ACA's prediction concerning investment incentives. As we explain further below, we are committed to avoiding an outcome in which entities misinterpret today's decision as an excuse to increase pole attachment rates of cable operators providing broadband Internet access service. It is not the Commission's intent to see any increase in the rates for pole attachments paid by cable operators that also provide broadband Internet access service, and we caution utilities against relying on this decision to that end. This Order does not itself require any party to increase the pole attachment rates it charges attachers providing broadband Internet access service, and we would consider such outcomes unacceptable as a policy matter. We will be monitoring marketplace developments following this Order and will promptly take further action in that regard if warranted. In any case, such arguments do not persuade us not to reclassify broadband Internet access service, since in reclassifying that service we simply acknowledge the reality of how it is being offered today.) Title II also ''offers other benefits at the state level, including access to public rights of way,'' which some broadband providers reportedly utilize to deploy networks.
413. Further, contrary to the assertions of opponents of reclassification, sensible regulation and robust investment are not mutually exclusive. The investment record of incumbent LECs since passage of the 1996 Act calls into question claims that regulation necessarily stifles investment. Indeed, it appears that AT&T, Verizon, and Qwest (now CenturyLink) increased their capital investments as a percentage of revenues immediately after the Commission expanded Title II requirements pursuant to the Telecommunications Act of 1996, (The 1996 Telecom Act imposed a set of new obligations on incumbent local exchange carriers, including, most importantly, the duty to provide competing carriers access to unbundled network elements at cost-based rates. See47 U.S.C. 251(c)(3), 252(d)(1). The Commission adopted rules implementing the unbundling requirements in 1996.) while investment levels decreased after 2001, during a period when the Commission relieved providers of many unbundling requirements and other regulatory obligations. And, of course, wireline DSL was regulated as a common-carrier service until 2005'--a period in the late `90s and the first five years of this century, which saw the highest levels of wireline broadband infrastructure investment to date. At a minimum, this evidence demonstrates that robust investment can and does occur even when new regulations are adopted. Our conclusions are not premised on the assumption that regulation never harms investment, nor do we deny that deregulation often promotes investment; rather, we reject assertions that reclassification will substantially diminish overall broadband investment. This is further supported by examining broadband providers' investment histories since the announcement of the Broadband Classification NOI in 2010. While the Commission did not utilize reclassification to support its 2010 Open Internet Order, it did not close the docket on the Broadband Classification NOI, indicating that reclassification remained an open question. The record demonstrates that broadband providers continued to invest, at ever increasing levels, in their networks post-2010, after which broadband providers were clearly on notice that the Commission was considering reclassifying broadband Internet access service as a telecommunications service and imposing certain Title II regulations upon them.
414. A number of market analysts concur that dire predictions of disastrous effects on investment are overblown. Although some commenters claim that then-Chairman Genachowski's May 6, 2010 announcement that the Commission would consider adopting a Title II approach prompted analysts to downgrade the ratings of Internet access service providers and sent stock prices downward, the effect of this announcement on stock prices, if any, is by no means clear. (Free Press explains that following the announcement of the 2010 Broadband Classification NOI,''[m]ost of the ISP stocks barely moved from this announcement. Verizon and AT&T each fell 2 percent. Cable stocks did drop more (on substantially higher volume), but this was primarily due to . . . over-valuation of these stocks following better-than-expected Q1 earnings reports. This was compounded by the broader market concerns stemming from the EU debt crisis.'' Free Press Comments at 114. In the months following the announcement the ''ILECs, Cable and Wireless companies were outperforming the broader market, and vastly outperforming the edge companies' stocks. Comcast was the only ISP in negative territory, yet still outperformed the broader market. And its issues were more related to the merger than the [NOI].'') Further, there was no appreciable movement in capital markets following substantial public discussion of the potential use of Title II in November. What is clear from this debate is that stock price fluctuations can be caused by many different factors and are susceptible to various interpretations. (At any moment in time, the price of a stock reflects the market's valuation of the cash-flow-generating capability of the firm. Because a firm's cash flow is based on a multitude of factors, it is improper to infer that observed stock price changes reflect the market's belief that infrastructure investment will decline.) Accordingly, we find unpersuasive the arguments that Title II classification would have a negative impact on stock value.
415. Tellingly, major infrastructure providers have indicated that they will in fact continue to invest under the framework we adopt, despite suggesting otherwise in their filed comments in this proceeding. For example, Sprint asserts in a letter in this proceeding that ''[s]o long as the FCC continues to allow wireless carriers to manage our networks and differentiate our products, Sprint will continue to invest in data networks regardless of whether they are regulated by Title II, section 706, or some other light touch regulatory regime.'' It adds that ''Sprint does not believe that a light touch application of Title II, including appropriate forbearance, would harm the continued investment in, and deployment of, mobile broadband services.'' Verizon's chief financial officer, Francis Shammo, told investors in a conference call in response to a question about the effect of ''this move to Title II,'' that ''I mean to be real clear, I mean this does not influence the way we invest. I mean we're going to continue to invest in our networks and our platforms, both in Wireless and Wireline FiOS and where we need to. So nothing will influence that. I mean if you think about it, look, I mean we were born out of a highly regulated company, so we know how this operates.''
416. Today's Order addressing forbearance from Title II and accompanying rules for BIAS will resolve concerns about uncertainty regarding the application of Title II to these services, which some argue could chill investment. By grounding our regulatory authority on firm statutory footing and defining the scope of our intended regulation, our decision establishes the regulatory predictability needed by all sectors of the Internet industry to facilitate prudent business planning, without imposing undue burdens that might interfere with entrepreneurial opportunities. Moreover, the forbearance we grant we today is broad in scope and extends to obligations that might be viewed as characteristic of ''utility-style'' regulation. In particular, we forbear from imposing last-mile unbundling requirements, a regulatory obligation that several commenters argue has led to depressed investment in the European broadband marketplace. As such, we disagree with commenters who assert that classification of BIAS as a telecommunications service would chill investment due to fears that future Commissions will reverse our forbearance decision, and that forbearance will engender protracted litigation. (Other commenters also wrongly suggest that we plan to apply ''old world'' common carrier rules to Internet access service, conjuring the specter of pervasive and intrusive cost-of-service rate regulation.)
417. Some opponents argue that classifying broadband Internet access services as telecommunications services will necessarily lead to regulation of Internet backbone services, CDNs, and edge services, compounding the suppressive effects on investment and innovation throughout the ecosystem. Our findings today regarding the changed broadband market and services offered are specific to the manner in which these particular broadband Internet access services are offered, marketed, and function. We do not make findings with regard to the other services, offerings, and entities over which commenters raise concern, and in fact explicitly exclude such services from our definition of broadband Internet access services.
418. CALinnovates submitted a commissioned White Paper by NERA Economic Consulting, asserting that reclassification will have a strong negative effect on innovation (with associated harms to investment and employment). The White Paper asserts that small edge providers will be harmed by reclassification, as Title II provisions ''will serve to increase the capital costs for innovators both directly and indirectly as well as to foster the sort of regulatory uncertainty that deters investors from ever investing.'' We disagree. The White Paper assumes that broadband Internet access services will be subject to the full scope of Title II provisions, and ascribes increased costs to regulatory uncertainty. As discussed below, we forbear from application of many of Title II's provisions to broadband Internet access services, and in doing so, provide the regulatory certainty necessary to continued investment and innovation. We also reject the argument, set forth by the Phoenix Center, that reclassification would require broadband providers ''to create, and then tariff, a termination service for Internet content under section 203 of the Communications Act.''
419. US Telecom submitted a study finding that under Title II regulation, wireline broadband providers are likely to invest significantly less than they would absent Title II regulation over the next five years, putting at risk much of the large capital investments that will be needed to meet the expected increases in demand for data service. The study contains several substantial analytical flaws which call its conclusions into question. First, the study inaccurately assumes that no wireless services are Title II services. In fact, wireless voice service is subject to Title II with forbearance, similar to the approach that we adopt here for BIAS. Second, the empirical models in the study incorrectly leave out factors that are important determinants of the dependent variables. For example, the level of the firm's demand for wireline services and its predicted rate of growth are left out as factors that clearly should be considered as determinants of wireline capital expenditures in Table 1. The statistical models in the paper are thus forced to either over- or under-estimate the role of the variables that are considered in the study, and as a result the predicted level of wireline investment subject to Title II regulation and its predicted rate of growth are not correct. We also agree with Free Press' argument that the study ignores the reality that once last-mile networks are built, the substantial initial investment has already been outlayed. For example, for the authors to observe that there was less investment in wireline networks than in wireless networks following the 2009 recession merely observes that wireline networks were largely constructed prior to 2009, while mobile wireless data networks were not. Further, as Free Press asserts, the study ignores evidence of massive network investments by incumbent LECs in the Ethernet market, which is regulated under Title II. The US Telecom study also did not factor in the potential effect of forbearance on investment decisions. We are thus unpersuaded that this study is determinative regarding the effect that reclassification will have on investment.
420. CMRS, Enterprise Broadband, and Voluntary Title II. Our conclusions are further borne out in examining the market for those services that are already subject to Title II. The Commission's experience with CMRS, to which Title II explicitly applies, demonstrates that application of Title II is not inconsistent with robust investment in a service. The sizable investments made by CMRS providers, who operate under a market-based Title II regulatory regime, allow us to predict with ample confidence that our narrowly circumscribed application of Title II to broadband Internet access service will not cripple the regulated industries or deprive consumers of the benefits of continued investment and innovation in network infrastructure and Internet applications.
421. In 1993, Congress established a new regulatory framework for CMRS by giving the Commission the authority to forbear from applying any provision of Title II to CMRS except sections 201, 202, or 208. (This statutory framework, set forth in section 332 of the Communications Act, also preempts State or local government regulation of CMRS rates and entry, but permits State or local regulation of other CMRS terms and conditions.) Congress prescribed the standard for forbearance in terms nearly identical to the standard it later adopted for common carriage services in the Telecommunications Act of 1996. In 1994, the Commission implemented its new authority by forbearing from applying sections 203, 204, 205, 211, 212, and portions of 214, thereby relieving providers of the burdens associated with the filing of tariffs, Commission investigation of new and existing rates, rate prescription and refund orders, regulations governing interlocking directorates, and regulatory control of market entry and exit. CMRS providers remain subject to the remaining provisions in parts I and II of Title II. Recognizing that the ''continued success of the mobile telecommunications industry is significantly linked to the ongoing flow of investment capital into the industry,'' the Commission sought to ensure that its policies fostered robust investment, and it chose a regulatory path intended to establish ''a stable, predictable regulatory environment that facilitates prudent business planning.''
422. Mobile providers have thrived under a market-based Title II regime. During the period between 1993 and the end of 2009, while mobile voice was the primary driver of mobile revenues, wireless subscribership grew over 1600 percent, with more than 285 million subscribers at the end of 2009. Industry revenues increased from $10.9 billion in 1993 to over $152 billion'--a 1300 percent increase. Further, between 1993 and 2009, the industry invested more than $271 billion in building out their wireless networks, which was in addition to monies spent acquiring spectrum. (We note that Verizon argues that wireless investment began increasing around 2003 due to growth in mobile broadband, and disputes the idea that this investment was driven by CMRS voice services. However, given that mobile broadband was not classified as a Title I information service until 2007, it is not clear the extent to which increases in investment before then can be attributed to a non-CMRS regulatory environment. Furthermore, voice service has continued to account for a significant portion of revenues. Free Press cites data showing substantial investment growth in the late 1990s (a time of increased demand for voice services) and the late 2000s to present (a period of increased smartphone use). During the latter years, as discussed above, Verizon's LTE network was subject to openness rules imposed by spectrum licensing conditions. Regardless of which assumptions are made, it is clear that there has been substantial network investment by mobile wireless providers during a significant period of time in which these providers' services have been subject to Title II regulation or openness requirements. Indeed, the data suggest that network investments have been driven more by overall market conditions, including consumer demand, than by the particular regulatory framework in place.) Verizon Wireless, in particular, has invested tens of billions of dollars in deploying mobile wireless services since being subject to the 700 MHz C Block open access rules, which overlap in significant parts with the open Internet rules we adopt today. Similarly, during this period, the wireless industry built nearly 235,000 cell sites across the country'--more than an 1800 percent increase over the approximately 13,000 sites at the end of 1993. Wireless voice service is now available to over 99.9 percent of the U.S. population. More than 99.4 percent of subscribers are served by at least two providers, and more than 96 percent are served by at least three providers. Finally, the recent AWS auction, conducted under the specter of Title II regulation, generated bids (net of bidding credits) of more than $41 billion'--demonstrating that robust investment is not inconsistent with a light-touch Title II regime. Fears that our classification decision will lead to excessive regulation of Internet access service should be dispelled by our record of regulating the wireless voice industry for nearly twenty years under Title II.
423. In addition, the key provisions of Title II apply to certain enterprise broadband services. In a series of forbearance orders in 2007 and 2008, the Commission forbore from application of a number of Title II's provisions to AT&T, Qwest, Embarq, and Frontier. Since that time, those services have been subject to sections 201, 202, and 208, as well as certain other provisions that the Commission determined were in the public interest. AT&T has recently called this framework an ''unqualified regulatory success story,'' and claimed that these services ''represent the epicenter of broadband investment that the Commission's national broadband policies seek to promote.'' The record does not evince any evidence that continued ''light touch'' Title II regulation has hindered investment in these services.
424. We observe that Title II currently applies not just to interconnected mobile voice and data services and to enterprise broadband services, but also the wired broadband offerings of more than 1000 rural local exchange carriers (LECs) that voluntarily offer their DSL and fiber broadband services as common carrier offerings ''in order to participate in National Exchange Carrier Association (NECA) tariff pools, which allow small carriers to spread costs and risks amongst themselves,'' without harmful effects on investment. (As discussed above, see section IV.C.1., the broadband Internet access service we define today is itself a transmission service. We disagree with the argument that in classifying BIAS, rather than a transmission ''component'' of BIAS, we are diverging from prior precedent regarding these DSL services and what the Justices were debating in Brand X. See Pai Dissent at 40 through 42. Whether we refer to that function as ''access,'' ''connectivity,'' or ''transmission,'' we have defined BIAS today such that it is the capability to send and receive packets to all or substantially all Internet endpoints. Thus, the service we define and classify today is the same transmission service as that discussed in prior Commission orders.) As NTCA, which represents many of these entities, explained, ''[c]ontrary to the dire, and somewhat hyperbolic, predictions of a few, the application of Title II only and strictly to the transport and transmission component underpinning retail broadband service will not cause investment in broadband networks and the services that ride atop them to grind to a halt. To the contrary, a continued lack of clear `rules of the road' is far more likely to have a deleterious effect on investment nationwide by providers large and small.'' Thus, we disagree with assertions by the American Cable Association that ''Title II `reclassification' or partial `classification' of broadband Internet access service would have immediate and disastrous economic consequences for small and medium-sized ISPs.''
D. Judicial Estoppel Does Not Apply Here425. Finally, we reject the argument that we are judicially estopped from finding that broadband Internet access service is a telecommunications service. Judicial estoppel is an equitable doctrine that courts may invoke at their discretion to prevent a party that prevailed on an issue in one case from taking a contrary position in another case. Several commenters contend that because the Commission successfully argued before the Supreme Court in Brand X that cable modem service is an information service, the Commission is judicially estopped from finding that broadband Internet access service is a telecommunications service.
426. We disagree. Although the Supreme Court has not adopted a blanket rule barring estoppel against the government, if it exists at all it is ''hen's teeth rare.'' Judicial estoppel may be invoked against the government only when ''it conducts what `appears to be a knowing assault upon the integrity of the judicial system,''' such as when the inconsistent positions are tantamount to a knowing misrepresentation or even fraud upon the court. Judicial estoppel will not be applied when the shift in position ''is the result of a change in public policy.''
427. In Brand X, the Supreme Court confirmed not only that an administrative agency can change its interpretation of an ambiguous statute, but that it ''`must consider varying interpretations and the wisdom of its policy on a continuing basis.''' Following that directive, we have reexamined the Commission's prior classification decisions and now conclude that broadband Internet access service is a telecommunications service. This Declaratory Ruling is the result of what we believe to be the better reading of the Communications Act under current factual and legal circumstances; it manifestly is not the product of fraud or other egregious misconduct.
428. Moreover, judicial estoppel does not apply unless a party's current position is ''clearly inconsistent'' with its position in an earlier legal proceeding. In the Brand X litigation and now, the Commission has consistently maintained the position that the relevant statutory provisions are susceptible to more than one reasonable interpretation. Counsel for the Commission argued in Brand X that the Commission reasonably construed ambiguous statutory language in finding that cable modem service is an information service. The Supreme Court agreed and deferred to the Commission's judgment, but recognized that a contrary interpretation also would be permissible: ''[O]ur conclusion that it is reasonable to read the Communications Act to classify cable modem service solely as an `information service' leaves untouched Portland's holding that the Commission's interpretation is not the best reading of the statute.'' Although we respect the Commission's prior classification decisions and the policy considerations underlying them, we believe the better view at this time is that broadband Internet access is a telecommunications service as defined in the Act. Because our decision does not result in ''`the perversion of the judicial process,''' judicial estoppel should not be applied here.
E. State and Local Regulation of Broadband Services429. We reject the argument that ''potential state tax implications'' counsel against the classification of broadband Internet access service as a telecommunications service. Our classification of broadband Internet access service as a telecommunications service appropriately derives from the factual characteristics of these services as they exist and are offered today. At any rate, we observe that the recently reauthorized Internet Tax Freedom Act (ITFA) prohibits states and localities from imposing ''[t]axes on Internet access.'' This prohibition applies notwithstanding our regulatory classification of broadband Internet access service. Indeed, the legislative history of ITFA emphasizes that Congress drafted its definition of ''Internet access'' to be independent of the regulatory classification determination in order to ''clarify that all transmission components of Internet access, regardless of the regulatory treatment of the underlying platform, are covered under the ITFA's Internet tax moratorium.'' (Moreover, today's decision would not bring broadband providers within the ambit of any state or local laws that impose property taxes on ''telephone companies'' or ''utilities,'' as those terms are commonly understood. As noted herein, we are not regulating broadband Internet access service as a utility or telephone company.)
430. Today, we reaffirm the Commission's longstanding conclusion that broadband Internet access service is jurisdictionally interstate for regulatory purposes. (The record generally supports the continued application of this conclusion to broadband Internet access service.) As a general matter, mixed-jurisdiction services are typically subject to dual federal/state jurisdiction, except where it is impossible or impractical to separate the service's intrastate from interstate components and the state regulation of the intrastate component interferes with valid federal rules or policies. (Notwithstanding the interstate nature of BIAS, states of course have a role with respect to broadband. As the Commission has stated ''finding that this service is jurisdictionally interstate [] does not by itself preclude'' all possible state requirements regarding that service.) With respect to broadband Internet access services, the Commission has previously found that, ''[a]lthough . . . broadband Internet access service traffic may include an intrastate component, . . . broadband Internet access service is properly considered jurisdictionally interstate for regulatory purposes.'' The Commission thus has evaluated possible state regulations of broadband Internet access service to guard against any conflict with federal law. Though we adopt some changes to the legal framework regulating broadband, the Commission has consistently applied this jurisdictional conclusion to broadband Internet access services, and we see no basis in the record to deviate from this established precedent. The ''Internet's inherently global and open architecture'' enables edge providers to serve content through a multitude of distributed origination points, making end-to-end jurisdictional analysis extremely difficult'--if not impossible'--when the services at issue involve the Internet.
431. We also make clear that the states are bound by our forbearance decisions today. Under section 10(e), ''[a] State commission may not continue to apply or enforce any provision'' from which the Commission has granted forbearance. With respect to universal service, we conclude that the imposition of state-level contributions on broadband providers that do not presently contribute would be inconsistent with our decision at the present time to forbear from mandatory federal USF contributions, and therefore we preempt any state from imposing any new state USF contributions on broadband'--at least until the Commission rules on whether to provide for such contributions. (Preemptive delay of state and local regulations is appropriate when the Commission determines that such action best serves federal communications policies. We note that we are not aware of any current state assessment of broadband providers for state universal service funds, as we understand that those carriers that have chosen voluntarily to offer Internet transmission as a Title II service classify such revenues as 100 percent interstate.) We recognize that section 254 expressly contemplates that states will take action to preserve and advance universal service, but as discussed below, our actions in this regard will benefit from further deliberation.
432. Finally, we announce our firm intention to exercise our preemption authority to preclude states from imposing obligations on broadband service that are inconsistent with the carefully tailored regulatory scheme we adopt in this Order. While we establish a comprehensive regulatory framework governing broadband Internet access services nationwide today, situations may nonetheless arise where federal and state actions regarding broadband conflict. (We note also that we do not believe that the classification decision made herein would serve as justification for a state or local franchising authority to require a party with a franchise to operate a ''cable system'' (as defined in section 602 of the Act) to obtain an additional or modified franchise in connection with the provision of broadband Internet access service, or to pay any new franchising fees in connection with the provision of such services.) The Commission has used preemption to protect federal interests when a state regulation conflicts with federal rules or policies, and we intend to exercise this authority to preempt any state regulations which conflict with this comprehensive regulatory scheme or other federal law. For example, should a state elect to restrict entry into the broadband market through certification requirements or regulate the rates of broadband Internet access service through tariffs or otherwise, we expect that we would preempt such state regulations as in conflict with our regulations. While we necessarily proceed on a case-by-case basis in light of the fact specific nature of particular preemption inquiries, we will act promptly, whenever necessary, to prevent state regulations that would conflict with the federal regulatory framework or otherwise frustrate federal broadband policies.
V. Order: Forbearance for Broadband Internet Access Services Back to Top433. Having classified broadband Internet access service as a telecommunications service, we now consider whether the Commission should grant forbearance as to any of the resulting requirements of the Act or Commission rules. As proposed in the 2014 Open Internet NPRM, we do not forbear from sections 201, 202, and 208, along with key enforcement authority under the Act, both as a basis of authority for adopting open Internet rules as well as for the additional protections those provisions directly provide. As discussed below, we also do not forbear from certain provisions in the context of broadband Internet access service to protect customer privacy, advance access for persons with disabilities, and foster network deployment. Because we believe that those protections and our open Internet rules collectively will strike the right balance at this time of minimizing the burdens on broadband providers while still adequately protecting the public, particularly given the objectives of section 706 of the 1996 Act, we otherwise grant substantial forbearance.
A. Forbearance Framework434. Section 10 provides that the Commission ''shall'' forbear from applying any regulation or provision of the Communications Act to telecommunications carriers or telecommunications services if the Commission determines that:
435. The Commission previously has considered whether a current need exists for a rule in evaluating whether a rule is ''necessary'' under the first two prongs of the three-part section 10 forbearance test. In particular, the current need analysis assists in interpreting the word ''necessary'' in sections 10(a)(1) and 10(a)(2). For those portions of our forbearance analysis that do require us to assess whether a rule is necessary, the D.C. Circuit concluded that ''`it is reasonable to construe `necessary' as referring to the existence of a strong connection between what the agency has done by way of regulation and what the agency permissibly sought to achieve with the disputed regulation.''' In contrast, section 10(a)(3) requires the Commission to consider whether forbearance is consistent with the public interest, an inquiry that also may include other considerations.
436. Also central to our analysis, section 706 of the 1996 Act ''explicitly directs the FCC to `utiliz[e]' forbearance to `encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans.''' In its most recent Broadband Progress Report, the Commission found ''that broadband is not being deployed to all Americans in a reasonable and timely fashion.'' This, in turn, triggers a duty under section 706 for the Commission to ''take immediate action to accelerate deployment.'' Within the statutory framework that Congress established, the Commission ''possesses significant, albeit not unfettered, authority and discretion to settle on the best regulatory or deregulatory approach to broadband.''
437. This proceeding is unlike typical forbearance proceedings in that, often, a petitioner files a petition seeking relief pursuant to section 10(c). In such proceedings, ''the petitioner bears the burden of proof'--that is, of providing convincing analysis and evidence to support its petition for forbearance.'' However, under section 10, the Commission also may forbear on its own motion. Because the Commission is forbearing on its own motion, it is not governed by its procedural rules insofar as they apply, by their terms, to section 10(c) petitions for forbearance. (We thus also reject criticisms of possible forbearance based on arguments that the 2014 Open Internet NPRM would not satisfy those rules. Indeed, while the Commission modeled its forbearance procedural rules on procedures from the notice and comment rulemaking context in certain ways, in other, significant ways it drew upon procedures used outside that context. Thus, the Commission's adoption of these rules neither expressly bound the Commission nor reflected its view of the general standards relevant to a notice and comment rulemaking.) Further, the fact that the Commission may adopt a rule placing the burden on a party filing a section 10(c) petition for forbearance in implementing an ambiguous statutory provision in section 10 of the Act, does not require the Commission to assume that burden where it forbears on its own motion, and we reject suggestions to the contrary. Because the Commission is not responding to a petition under section 10(c), we conduct our forbearance analysis under the general reasoned decision making requirements of the Administrative Procedure Act, without the burden of proof requirements that section 10(c) petitioners face. We conclude that the analysis below readily satisfies both the standards of section 10 (We conclude that the section 10 analytical framework described above comports with the statutory requirements, and is largely consistent with alternative formulations suggested by others. To the extent that such comments could be read to suggest different analyses in any respects, we reject them as not required by section 10, as we interpret it above.) and the reasoned decision making requirements of the APA and thus reject claims that broad forbearance accompanying classification decisions necessarily would be arbitrary and capricious.
438. We reject arguments suggesting that persuasive evidence of competition is a necessary prerequisite to granting forbearance under section 10 even if the section 10 criteria otherwise are met. For example, the Commission has in the past granted forbearance from particular provisions of the Act or regulations where it found the application of other requirements (rather than marketplace competition) adequate to satisfy the section 10(a) criteria, and nothing in the language of section 10 precludes the Commission from proceeding on that basis where warranted. (Section 10(b) does direct the Commission to consider whether forbearance will promote competitive market conditions as part of the public interest analysis under section 10(a)(3). However, while a finding that forbearance will promote competitive market conditions may provide sufficient grounds to find forbearance in the public interest under section 10(a)(3), see id., nothing in the text of section 10 makes such a finding a necessary prerequisite for forbearance where the Commission can make the required findings under section 10(a) for other reasons. For similar reasons we reject the suggestion that more geographically granular data or information or an otherwise more nuanced analysis are needed with respect to some or all of the forbearance granted in this Order. The record and our analysis supports forbearance from applying the statutory provisions and Commission regulations to the extent described below based on considerations that we find to be common nationwide, and as discussed in our analysis of the record below, we do not find persuasive evidence or arguments to the contrary in the record as to any narrower geographic area(s) or as to particular provisions or regulations.) Thus, although, in appropriate circumstances, persuasive evidence of competition can be a sufficient basis to grant forbearance, it is not inherently necessary to a grant of forbearance under section 10. The Qwest Phoenix Order, cited by some commenters in this regard, is not to the contrary. Unlike here, the Commission in the Qwest Phoenix Order was addressing a petition where the rationale for forbearance was premised on the state of competition. (Insofar as the Commission likewise was responding to arguments that competition was sufficient to warrant forbearance when acting on other forbearance petitions, this distinguishes those decisions, as well. Likewise, to the extent that the Commission has found competition to be a sufficient basis to grant forbearance on its own motion in the past, that does not dictate that it only can grant forbearance under such circumstances. Rather, the Commission grants forbearance where it finds that the section 10(a) criteria are met.) This proceeding does not involve a similar request for relief, and, indeed, the Qwest Phoenix Order itself specifically observed that ''a different analysis may apply when the Commission addresses advanced services, like broadband services,'' where the Commission, among other things, ''must take into consideration the direction of section 706.'' For similar reasons we reject as inconsistent with the text of section 10 and our associated precedent the argument that forbearance only is appropriate when the grant of forbearance will itself spur conduct that mitigates the need for the forborne-from requirements.
B. Maintaining the Customer Safeguards Critical to Protecting and Preserving the Open Internet439. As discussed below, we find sections 201 and 202 of the Act, along with section 208 and certain fundamental Title II enforcement authority, necessary to ensure just and reasonable conduct by broadband providers and necessary to protect consumers under sections 10(a)(1) and (a)(2). We also find that forbearance from these provisions would not be in the public interest under section 10(a)(3), and therefore do not grant forbearance from those provisions and associated enforcement procedural rules with respect to the broadband Internet access service at issue here.
1. Authority To Protect Consumers and Promote Competition: Sections 201 and 202440. The Commission has found that sections 201 and 202 ''lie at the heart of consumer protection under the Act,'' and we find here that forbearance from those provisions would not be in the public interest under section 10(a)(3). The Commission has never previously forborne from applying these ''bedrock consumer protection obligations,'' and we generally do not find forbearance warranted here. This conclusion is consistent with the views of many commenters that any service classified as a telecommunications service should remain subject to those provisions. However, particularly in light of the protections the open Internet rules provide and the ability to employ sections 201 and 202 in case-by-case adjudications, we are otherwise persuaded to forbear from applying sections 201 and 202 of the Act in a manner that would enable the adoption of ex ante rate regulation of broadband Internet access service in the future, as discussed below. (To be clear, this ex ante rate regulation forbearance does not extend to inmate calling services and therefore has no effect on our ability to address rates for inmate calling services under section 276.)
441. For one, sections 201 and 202 help enable us to preserve and protect Internet openness broadly, and applying those provisions benefits the public broadly by helping foster innovation and competition at the edge, thereby promoting broadband infrastructure investment nationwide. As explained above, the open Internet rules adopted in this Order reflect more specific protections against unjust or unreasonable rates or practices for or in connection with broadband Internet access service. These benefits'--which can extend beyond the specific dealings between a given broadband provider and a given customer'--persuade us that forbearance from sections 201 and 202 here is not in the public interest.
442. Retaining these provisions, moreover, is in the public interest because it provides the Commission direct statutory authority to protect Internet openness and promote fair competition while allowing the Commission to adopt a tailored approach and forbear from most other requirements. As discussed below, this includes forbearance from the pre-existing ex ante rate regulations and other Commission rules implementing sections 201 and 202. (We thus reject the arguments of some commenters against the application of these provisions insofar as they assume that such additional regulatory requirements also will apply in the first instance.) As another example, this authority supports our forbearance from other interconnection requirements in the Act. Such considerations provide additional grounds for our conclusion that section 10(a)(3) is not satisfied as to forbearance from sections 201 and 202 of the Act with respect to broadband Internet access service.
443. We also conclude that it would not be in the public interest to forbear from applying sections 201 and 202 given concerns that limited competition could, absent the backstop provided by that authority, result in harmful effects. Among other things, broadband providers are in a position to be gatekeepers to the end-user customers of their broadband Internet access service. In addition, although there is some amount of competition for broadband Internet access service, it is limited in key respects. While harmful practices by broadband providers'--whether in general or as to particular customers'--conceivably could motivate an end user to select a different provider of broadband Internet access service, the record does not provide convincing evidence of the nature or extent of such effects in particular. (Commenters citing generalized information about the extent of switching among broadband providers does not address the specific concerns that we identify here about consumers' likelihood and ability to switch broadband providers based on particular practices by those providers, nor on the likelihood that any such switching would deter the harmful conduct.) To the contrary, for example, data show that the majority of Americans face a choice of only two providers of fixed broadband for service at speeds of 3 Mbps/768 kbps to 10 Mbps/768 kbps, and no choice at all (zero or one service provider) for service at 25/3 Mbps. We also find significant costs associated with switching service that further limit the potential benefits of any competition that would otherwise exist. These collectively persuade us that we cannot simply conclude, as a general matter, that there is extensive competition sufficient to constrain providers' conduct here. Moreover, as the Commission found in the CMRS context, competition would ''not necessarily protect all consumers from all unfair practices. The market may fail to deter providers from unreasonably denying service to, or discriminating against, customers whom they may view as less desirable.'' In addition, and again similar to the Commission's conclusion in the CMRS context, even in a competitive market certain conditions could create incentives and opportunities for service providers to engage in discriminatory and unfair practices. (For the same reasons discussed above, we are not persuaded to reach a different forbearance decision based on asserted levels of competition faced by small- or mid-sized broadband providers.) Furthermore, no matter how many options end users have in selecting a provider of Internet access service, or how readily they could switch providers, an edge provider only can reach a particular end user through his or her broadband provider. We thus reject suggestions that market forces will be sufficient to ensure that providers of broadband Internet access service do not act in a manner contrary to the public interest.
444. Against this backdrop we are unpersuaded by arguments seeking forbearance from sections 201 and 202 based on generalized arguments about marketplace developments, such as network investment or changes in performance or price per megabit, in the recent past. However, counterarguments in the record, longer-term trends, and our experience in the CMRS context where sections 201 and 202 have applied, leave us unpersuaded that the inapplicability of sections 201 and 202 were a prerequisite for any such marketplace developments. We are similarly unpersuaded by arguments comparing the U.S. broadband marketplace with those in Europe, given, among other things, the differences between the regulatory approach there and the regulatory framework that results from this Order. We thus find those arguments for forbearance sufficiently speculative and subject to debate that they do not overcome our public interest analysis above.
445. For these same reasons, we are not persuaded that application of sections 201 and 202 is not necessary to ensure just, reasonable, and nondiscriminatory conduct by broadband providers and for the protection of consumers under sections 10(a)(1) and (a)(2). As discussed above, applying these provisions enables us to protect customers of broadband Internet access service from potentially harmful conduct by broadband providers both by providing a basis for our open Internet rules and for the important statutory backstop they provide regarding broadband provider practices more generally.
446. We also observe that our forbearance decision as to sections 201 and 202 for broadband Internet access service is informed by the CMRS experience, where Congress specifically recognized the importance of sections 201 and 202 (along with section 208) in excluding those provisions from possible forbearance under section 332(c)(1)(A). Application of sections 201 and 202 has not frustrated investment in the wireless marketplace, nor has it led to ex ante regulation of rates charged to consumers for wireless voice service. Indeed, we find that the successful application of this legal framework in the CMRS context responds to the concerns of some commenters about the potential burdens, or uncertainty, resulting from the application of sections 201 and 202, which they contend could create disincentives for investment even standing alone and apart from ex ante rules. (While Verizon attempts to distinguish the CMRS experience by claiming that, unlike voice service, ''broadband has never been subject to Title II,'' Verizon Jan. 26, 2015 Ex Parte Letter at 5, this is both factually incorrect for the reasons described above, nor does it meaningfully address the fact that the CMRS marketplace has seen substantial growth and investment under the regulatory framework that the Commission did apply.) Moreover, within their scope, our open Internet rules reflect our interpretation of how sections 201 and 202 apply, providing further guidance and addressing possible concerns about uncertainty regarding the application of sections 201 and 202. Beyond that, we are not persuaded that concerns about the burdens or uncertainty associated with sections 201 and 202 counsel in favor of a contrary public interest finding under section 10(a)(3), particularly given the very generalized concerns commenters raised.
447. Although some have argued that section 706 of the 1996 Act provides sufficient authority to adopt open Internet protections, and we do, in fact, conclude that section 706 provides additional support here, we nonetheless conclude that the application of sections 201 and 202 is appropriate to remove any ambiguity regarding our authority to enforce strong, clear open Internet rules. (For example, although we find that we have authority under section 706 of the 1996 Act to implement appropriate enforcement mechanisms, our reliance on sections 201 and 202 as additional sources of authority (coupled with the enforcement provisions from which we do not forbear, as discussed below), eliminates possible arguments to the contrary.) Further, comments focused exclusively on section 706 authority neglect the direct role that sections 201 and 202 will play in the overall regulatory framework we adopt, with respect to practices for or in connection with broadband Internet access service that are not directly governed by our rules.
448. We are persuaded, in part, by arguments that we should forbear from sections 201 and/or 202 outside the open Internet context, although we reject calls to entirely forbear from applying sections 201 and 202 outside that context or that we otherwise adopt a more granular decision regarding forbearance from provisions in sections 201 and/or 202. While open Internet considerations have led the Commission to revisit its prior decisions, our ultimate classification decision here simply acknowledges the reality of how these services are being offered today. (We thus reject claims that we somehow are using forbearance to increase regulation. Rather, we are using it to tailor the regulatory regime otherwise applicable to these telecommunications services.) Having classified BIAS as a telecommunications service, we exercise our forbearance authority to establish a tailored Title II regulatory framework that adequately protects consumers, ensures just and reasonable broadband provider conduct, and furthers the public interest'--consistent with our goals of more, better, and open broadband. In addition, insofar as commenters cite the same arguments about past network investment or changes in performance or price per megabit in the recent past that we discussed above, we again find them sufficiently speculative and subject to debate that they do not overcome our forbearance analysis for sections 201 and 202 above. Moreover, as we noted above, our decision not to forbear from applying sections 201 and 202 not only enables our open Internet regulatory framework but supports our grant of broad forbearance from other provisions and regulations, as discussed below. In particular, as discussed below, we find that our sections 201 and 202 authority provides a more flexible framework better suited to this marketplace than many of the alternative regulations that otherwise would apply.
449. Nor do commenters adequately explain how forbearance could be tailored in these ways, at least in the context of case-by-case adjudication. For broadband providers' interconnection practices, which are not covered by the open Internet rules we adopt today, we expressly rely on the backstop of sections 201 and 202 for case-by-case decision making. We also rely on both sections 201 and 202 for conduct that is covered by the open Internet rules adopted here. Those rules reflect the Commission's interpretation of how sections 201 and 202 apply in that context, and thus the requirements of section 201 and 202 are coextensive as to broadband Internet access service covered by those rules. Commenters do not indicate, nor does the record otherwise reveal, an administrable way for the Commission to grant the requested partial forbearance while still pursuing such case-by-case decisions in the future. Further, while section 706 of the 1996 Act would remain, as well, we find that sections 201 and 202 provide a more certain foundation for evaluating providers' conduct and pursuing enforcement if warranted in relevant circumstances arising in the future. We thus are not persuaded that even these more limited proposals for forbearance from provisions in sections 201 and/or 202 as applied on a case-by-case basis would be in the public interest under section 10(a)(3).
450. Although we conclude that the section 10 criteria are not met with respect to the full scope of forbearance that these commenters seek, because we do not and cannot envision adopting new ex ante rate regulation of broadband Internet access service in the future, we forbear from applying sections 201 and 202 to broadband services to that extent. As described above, our approach here is informed by the success of the CMRS framework, which has not, in practice, involved ex ante rate regulation. In addition, as courts have recognized, when exercising its section 10 forbearance authority ''[g]uided by section 706,'' the Commission permissibly may ''decide[ ] to balance the future benefits'' of encouraging broadband deployment ''against [the] short term impact'' from a grant of forbearance. Under the totality of the circumstances here, including the protections of our open Internet rules'--which focus on what we identify and the most significant problems likely to arise regarding these broadband services'--and our ability to address issues ex post under sections 201 and 202 we do not find ex ante rate regulations necessary for purposes of section 10(a)(1) and (a)(2). Further, guided by section 706, and reflecting the tailored regulatory approach we adopt in this item, we find it in the public interest to forbear from applying sections 201 and 202 insofar as they would support the adoption of ex ante rate regulations for broadband Internet access service in the future.
451. To the extent some commenters express concern about future rules that the Commission might adopt based on this section 201 and 202 authority, we cannot, and do not, envision going beyond our open Internet rules to adopt ex ante rate regulations based on that section 201 and 202 authority in this context. Consequently, we forbear from sections 201 and 202 in that respect, as discussed above. In this Order, we decide only that forbearance from sections 201 and 202 of the Act to broadband Internet access service is not warranted under section 10 to the extent described above. Indeed, we find here that the application of sections 201 and 202 of the Act enable us to forbear from other requirements, including pre-existing tariffing requirements and Commission rules governing rate regulation, which we find are not warranted here. Thus, any pre-existing rate regulations adopted by the Commission under its Title II authority'--including any regulations adopted under sections 201 and 202'--will not be imposed on broadband Internet access service as a result of this Order. Finally, while other types of rules also potentially could be adopted based on section 201 and 202 authority, any Commission rules adopted in the future would remain subject to judicial review under the APA. (In this regard, commenters advocating forbearance from sections 201 and 202 to guard against new rules that the Commission might adopt pursuant to that authority do not meaningfully explain what incremental benefit that would achieve given that any future Commission proceeding would be required to adopt such rules in any case.)
2. Enforcement452. We also retain certain fundamental Title II enforcement provisions, as well as the Commission's rules governing section 208 complaint proceedings. In particular, we decline to forbear from applying section 208 of the Act and the associated procedural rules, which provide a complaint process for enforcement of applicable provisions of the Act or any Commission rules. Section 208 permits ''[a]ny person, any body politic, or municipal organization, or State commission, complaining of anything done or omitted to be done by any common carrier subject to this chapter in contravention of the provisions thereof'' to file a complaint with the Commission and seek redress. We also retain additional statutory provisions that we find necessary to ensuring a meaningful enforcement process. In particular, we decline to forbear from sections 206, 207, and 209 as a necessary adjunct to the section 208 complaint process. As the Commission has held previously, forbearing from sections 206, 207, and 209 ''would eviscerate the protections of section 208'' because ''[w]ithout the possibility of obtaining redress through collection of damages, the complaint remedy is virtually meaningless.'' We similarly do not forbear from sections 216 and 217, which ''merely extend the Title II obligations of [carriers] to their trustees, successors in interest, and agents. The sections were intended to ensure that a common carrier could not evade complying with the Act by acting through others over whom it has control or by selling its business.'' Thus, we decline to forbear from enforcing these key Title II enforcement provisions with respect to broadband Internet access service.
453. We find that forbearance from these key enforcement provisions and the associated procedural rules does not satisfy any of the section 10(a) criteria. As discussed above, we decline to forbear from enforcement of sections 201 and 202 as they apply to broadband Internet access service. To make application of these provisions meaningful, the possibility of enforcement needs to be available. Consequently, insofar as we find above that sections 201 and 202 are necessary to guard against unjust, unreasonable, or unjustly or unreasonably discriminatory conduct by broadband providers and to protect consumers, that presumes the viability of enforcement. For these same reasons, forbearance from these key Title II enforcement provisions would not be in the public interest. Thus, our conclusion that section 10(a) is not met as to these key Title II enforcement provisions builds on our prior conclusion to that effect as to sections 201 and 202. (Consistent with our analysis above, see supra para.447, although section 706 of the 1996 Act would remain, these Title II enforcement provisions provide a more certain foundation for pursuing enforcement if warranted in relevant circumstances arising in the future.)
454. In the event that a carrier violates its common carrier duties, the section 208 complaint process would permit challenges to a carrier's conduct, and many commenters advocate for section 208 to apply. The Commission's procedural rules establish mechanisms to carry out that enforcement function in a manner that is well-established and clear for all parties involved. The Commission has never previously forborne from section 208. Indeed, we find it instructive that in the CMRS context Congress specifically precluded the Commission from using section 332 to forbear from section 208. Commenters also observe the important interrelationship between section 208 and sections 206, 207, 209, 216, and 217, which the Commission itself has recognized in the past, as discussed above. In addition, to forbear from sections 216 and 217 would create a loophole in our ability to evenly enforce the Act, which would imperil our ability to protect consumers and to protect against unjust or unreasonable conduct, and would be contrary to the public interest. The prospect that carriers may be forced to defend their practices before the Commission supports the strong public interest in ensuring the reasonableness and non-discriminatory nature of those actions, protecting consumers, and advancing our overall public interest objectives. (For the reasons discussed above, we thus reject the assertions of some commenters that enforcement is unduly burdensome. In particular, we are not persuaded that such concerns outweigh the overarching interest advanced by the enforceability of sections 201 and 202. Nothing in the record demonstrates that our need for enforcement differs among broadband providers based on their size, and we thus are not persuaded that a different conclusion in our forbearance analysis should be reached in the case of small broadband providers, for example.) While some commenters express fears of ''threats of abusive litigation'' or other burdens arising from the application of these provision, other commenters correctly note the speculative nature of those arguments given the lack of evidence of such actions where those provisions historically have applied (including in the CMRS context). In hearing section 207 claims, courts have historically been careful to consider the Commission's views as a matter of primary jurisdiction on the reasonableness of a practice under section 201(b), both in general and before awarding damages under section 207. In a number of cases, courts have held that there is no entitlement to damages under section 207 for a claim under section 201(b) unless the Commission has already determined that a particular practice is ''unreasonable.'' We endorse that approach here. At a minimum, we believe that courts reviewing BIAS practices under section 207 in the first instance should recognize the Commission's primary jurisdiction in a context such as this. The doctrine of primary jurisdiction is particularly important here, because the broadband Internet ecosystem is highly dynamic and the Commission has carefully designed a regulatory framework for BIAS to protect Internet openness and other important communications network values without deterring broadband investment and innovation. As a result, for all of the forgoing reasons, we conclude that none of the section 10(a) criteria are met as to forbearance from these fundamental Title II enforcement provisions and the associated Commission procedural rules with respect to the broadband Internet access service.
C. Forbearance Analysis Specific to Broadband Internet Access Service455. As discussed elsewhere, with respect to broadband Internet access service we find that the standard for forbearance is not met with respect to the following limited provisions:
456. We naturally also do not forbear from applying open Internet rules and section 706 of the 1996 Act itself. For convenience, we collectively refer to these provisions and regulations for purposes of this Order as the ''core broadband Internet access service requirements.''
457. Beyond those core broadband Internet access service requirements we grant extensive forbearance as permitted by our authority under section 10 of the Act. As described in greater detail below, it is our predictive judgment that the statutory and regulatory requirements that remain are sufficient to ensure just, reasonable, and not unjustly or unreasonably discriminatory conduct by providers of broadband Internet access service and to protect consumers with respect to broadband Internet access service. Those same considerations, plus the overlay of section 706 of the 1996 Act and our desire to proceed incrementally when considering what new requirements that should apply here, likewise persuade us that this forbearance is in the public interest.
458. Our forbearance decision in this subsection focuses on addressing consequences arising from the classification decision in this Order regarding broadband Internet access service. (The 2014 Open Internet NPRM here did not contemplate possible forbearance from the open Internet rules themselves, and thus they are beyond the scope of regulations addressed by this forbearance decision. In any case, the very reasons that persuade us to adopt the rules in the Order likewise demonstrate that forbearance from those rules would not satisfy the section 10(a) criteria here.) Thus, we do not forbear with respect to requirements to the extent that they already applied prior to this Order without regard to the classification of broadband Internet access service. For example, as discussed in greater detail below, this includes things like certain requirements of the Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA), as well as things like liability-limitation provisions that do not vary in application based on the classification of broadband Internet access service. Similarly, to the extent that provisions or regulations apply to an entity by virtue of other services it provides besides broadband Internet access service, the forbearance in this Order does not extend to that context. (This Order does not alter any additional or broader forbearance previously granted that already might encompass broadband Internet access service in certain circumstances, for example, insofar as broadband Internet access service, when provided by mobile providers, is a CMRS service. As one example, the Commission has granted some forbearance from section 310(d) for certain wireless licensees that meet the definition of ''telecommunications carrier,'' but section 310(d) is not itself framed in terms of ''common carriers'' or ''telecommunications carriers'' or providers of ''CMRS'' or the like, nor is it framed in terms of ''common carrier services,'' ''telecommunications services,'' ''CMRS services'' or the like. To the extent that such forbearance thus goes beyond the forbearance for wireless providers granted in this Order, this Order does not narrow or otherwise modify that pre-existing grant of forbearance. For clarity, we observe, however, that the broadband Internet access service covered by our open Internet rules is beyond the scope of a petition for forbearance from Verizon regarding certain broadband services that was deemed granted by operation of law on March 19, 2006.)
459. In addition, prior to this Order some incumbent local exchange carriers or other common carriers chose to offer Internet transmission services as telecommunications services subject to the full range of Title II requirements. Our forbearance with respect to broadband Internet access service does not encompass such services. As a result, such providers remain subject to the rights and obligations that arise under Title II and the Commission's rules by virtue of their elective provision of such services, (For example, if a rate-of-return incumbent LEC (or other provider) voluntarily offers Internet transmission outside the forbearance framework adopted in this Order, it remains subject to the pre-existing Title II rights and obligations, including those from which we forbear in this Order.) along with the rules adopted to preserve and protect the open Internet to the extent that those services fall within the scope of those rules. (If such a provider wants to change to offer Internet access services pursuant to the construct adopted in this Order, it should notify the Wireline Competition Bureau 60 days prior to implementing such a change.)
1. Provisions That Protect Customer Privacy, Advance Access for Persons With Disabilities, and Foster Network Deployment460. We generally grant extensive forbearance from the provisions and requirements that newly apply by virtue of our classification of broadband Internet access service. However, the record persuades us that we should not forbear with respect to certain key provisions that protect customer privacy, advance access for persons with disabilities, and foster network deployment.
a. Customer Privacy (Section 222)461. As supported by a number of commenters, we decline to forbear from applying section 222 of the Act in the case of broadband Internet access service. We do, however, find the section 10(a) criteria met to forbear at this time from applying our implementing rules, pending the adoption of rules to govern broadband Internet access service in a separate rulemaking proceeding. Section 222 of the Act governs telecommunications carriers' protection and use of information obtained from their customers or other carriers, and calibrates the protection of such information based on its sensitivity. Congress provided protections for proprietary information, according the category of customer proprietary network information (CPNI) the greatest level of protection. Section 222 imposes a duty on every telecommunications carrier to protect the confidentiality of its customers' private information. Section 222 also imposes restrictions on carriers' ability to use, disclose, or permit access to customers' CPNI without their consent.
462. We find that forbearance from the application of section 222 with respect to broadband Internet access service is not in the public interest under section 10(a)(3), and that section 222 remains necessary for the protection of consumers under section 10(a)(2). The Commission has long supported protecting the privacy of users of advanced services, and retaining this provision thus is consistent with the general policy approach. The Commission has emphasized that ''[c]onsumers' privacy needs are no less important when consumers communicate over and use broadband Internet access than when they rely on [telephone] services.'' As broadband Internet access service users access and distribute information online, the information is sent through their broadband provider. Broadband providers serve as a necessary conduit for information passing between an Internet user and Internet sites or other Internet users, and are in a position to obtain vast amounts of personal and proprietary information about their customers. Absent appropriate privacy protections, use or disclosure of that information could be at odds with those customers' interests.
463. We find that if consumers have concerns about the privacy of their personal information, such concerns may restrain them from making full use of broadband Internet access services and the Internet, thereby lowering the likelihood of broadband adoption and decreasing consumer demand. As the Commission has found previously, the protection of customers' personal information may spur consumer demand for those services, in turn ''driving demand for broadband connections, and consequently encouraging more broadband investment and deployment'' consistent with the goals of the 1996 Act. Notably, commenters opposing the application of section 222 to broadband Internet access service make general arguments about the associated burdens, but do not include a meaningful analysis of why the section 10(a) criteria are met (or why relief otherwise should be granted) nor why the concerns they identify'--even assuming arguendo that they were borne out by evidence beyond that currently in the record'--should outweigh the privacy concerns identified here. We therefore conclude that the application and enforcement of section 222 to broadband Internet access services is in the public interest, and necessary for the protection of consumers. (We are not persuaded that those arguments justify a different outcome here, both for the reasons discussed previously, and because commenters do not meaningfully explain how these arguments impact the section 10 analysis here, given that the need to protect consumer privacy is not self-evidently linked to such marketplace considerations. Nothing in the record suggests that concerns about consumer privacy are limited to broadband providers of a particular size, and we thus are not persuaded that a different conclusion in our forbearance analysis should be reached in the case of small broadband providers, for example.)
464. We also reject arguments that section 706 itself provides adequate protections such that forbearance from section 222 is warranted. While section 706 of the 1996 Act would continue to apply even if we granted forbearance here, we find that section 222 provides a more certain foundation for evaluating providers' conduct and pursuing enforcement if warranted in relevant circumstances arising in the future. (We also note, for example, that this approach obviates the need to determine whether or to what extent section 222 is more specific than section 706 of the 1996 Act in relevant respects, and thus could be seen as exclusively governing over the provisions of section 706 of the 1996 Act as to some set of privacy issues. The approach we take avoids this potential uncertainty, and we thus need not and do not address this question.) Among other things, while the concerns discussed in the preceding paragraph have a nexus with the standards of sections 706(a) and (b), as discussed earlier in this section, the public interest in protecting customer privacy is not limited to the universe of concerns encompassed by section 706.
465. We recognize that some commenters, while expressing concern about consumer privacy, nonetheless suggest that the Commission conceivably need not immediately apply section 222 and its implementing rules, pending further proceedings. (While CDT references the questions regarding the application of section 222 and our implementing rules raised in the 2010 Broadband Classification NOI, that NOI cited reasons why the Commission might immediately apply section 222 and the Commission's implementing rules if it reclassified broadband Internet access service as well as reasons why it might defer the application of those requirements. We thus find that the 2010 NOI does not itself counsel one way or the other, and in light of the record here, we decline to defer the application of section 222) We are persuaded by those arguments, but only as to the Commission's rules. With respect to the application of section 222 of the Act itself, as discussed above, with respect to broadband Internet access service the record here persuades us that the section 10(a) forbearance criteria are not met to justify such relief. Indeed, even as to services that historically have been subject to section 222, questions about the application of those privacy requirements can arise and must be dealt with by the Commission as technology evolves, and the record here does not demonstrate specific concerns suggesting that Commission clarification of statutory terms as needed would be inadequate in this context.
466. We are, however, persuaded that the section 10(a) criteria are met for us to grant forbearance from applying our rules implementing section 222 insofar as they would be triggered by the classification of broadband Internet access service here. Beyond the core broadband Internet access service requirements, we apply section 222 of the Act, which itself directly provides important privacy protections. Further, on this record, we are not persuaded that the Commission's current rules implementing section 222 necessarily would be well suited to broadband Internet access service. The Commission fundamentally modified these rules in various ways subsequent to decisions classifying broadband Internet access service as an information service, and certain of those rules appear more focused on concerns that have been associated with voice service. For example, the current rules have requirements with respect to ''call detail information,'' defined as ''[a]ny information that pertains to the transmission of specific telephone calls, including, for outbound calls, the number called, and the time, location, or duration of any call and, for inbound calls, the number from which the call was placed, and the time, location, or duration of any call.'' More generally, the existing CPNI rules do not address many of the types of sensitive information to which a provider of broadband Internet access service is likely to have access, such as (to cite just one example) customers' web browsing history. Insofar as rules focused on addressing problems in the voice service context are among the central underpinnings of our CPNI rules, we find the better course to be forbearance from applying all of our CPNI rules at this time. As courts have recognized, when exercising its section 10 forbearance authority ''[g]uided by section 706,'' the Commission permissibly may ''decide[ ] to balance the future benefits'' of encouraging broadband deployment ''against [the] short term impact'' from a grant of forbearance. In light of the record here and given that the core broadband Internet access requirements and section 222 itself will apply, and guided by section 706, we find that applying our current rules implementing sections 222'--which, in critical respects, appear to be focused on addressing problems that historically arise regarding voice service'--is not necessary to ensure just and reasonable rates and practice or for the protection of consumers under sections 10(a)(1) and (a)(2) and that forbearance is in the public interest under section 10(a)(3). We emphasize, however, that forbearance from our existing CPNI rules in the context of broadband Internet access services does not in any way diminish the applicability of these rules to services previously found to be within their scope.
b. Disability Access Provisions (Sections 225, 255, 251(a)(2))467. We agree with commenters that we should apply section 225 and the Commission's implementing rules'--rather than forbear for broadband Internet access service'--because of the need to ensure meaningful access to all Americans, except to the extent provided below with respect to contributions to the Interstate TRS Fund. Section 225 mandates the availability of interstate and intrastate TRS to the extent possible and in the most efficient manner to individuals in the United States who are deaf, hard of hearing, deaf-blind, and who have speech disabilities. The Act directs that TRS provide the ability for such individuals to engage in communication with other individuals, in a manner that is ''functionally equivalent to the ability of a hearing individual who does not have a speech disability to communicate using voice communication services.'' To achieve this, the Commission has required all interstate service providers (other than one-way paging services) to provide TRS. People who are blind, hard of hearing, deaf-blind, and who have speech disabilities increasingly rely upon Internet-based video communications, both to communicate directly (point-to-point) with other persons who are deaf or hard of hearing who use sign language and through video relay service (VRS) with individuals who do not use the same mode of communication that they do. In doing so, they rely on high definition two-party or multiple-party video conferencing that necessitates a broadband connection. As technologies advance, section 225 maintains our ability to ensure that individuals who are deaf, hard of hearing, deaf-blind, and who have speech disabilities can engage in service that is functionally equivalent to the ability of a hearing individuals who do not have speech disabilities to use voice communication services. Limits imposed on bandwidth use through network management practices that might otherwise appear neutral, could have an adverse effect on iTRS users who use sign language to communicate by degrading the underlying service carrying their video communications. The result could potentially deny these individuals functionally equivalent communications service. Additionally, if VRS and other iTRS users are limited in their ability to use Internet service or have to pay extra for iTRS and point-to-point services, this could cause discrimination against them because for many such individuals, TRS is the only form of communication that affords service that is functionally equivalent to what voice users have over the telephone. Moreover, limiting their bandwidth capacity could compromise their ability to obtain access to emergency services via VRS and other forms of iTRS, which is required by the Commission's rules implementing section 225.
468. While we base the open Internet rules adopted here solely on section 706 of the 1996 Act and other provisions of the Act besides section 225'--and thus do not adopt any new section 225-based rules in this Order'--largely preserving this provision is important not only to the extent that it might be used in the future as the basis for new rules adopting additional protections but also to avoid any inadvertent uncertainty regarding Internet-based TRS providers' obligations under existing rules. To be compensated from the federal TRS fund, providers must provide service in compliance with section 225 and the Commission's TRS rules and orders. As discussed in the prior paragraph, however, a number of TRS services are carried via users' broadband Internet access services. Forbearing from applying section 225 and our TRS service requirements would risk creating loopholes in the protections otherwise afforded users of iTRS services or even just uncertainty that might result in degradation of iTRS. More specifically, if we forbear from applying these provisions, we run the risk of allowing actions taken by Internet access service providers to come into conflict with the overarching goal of section 225, i.e., ensuring that the communication services made available through TRS are functionally equivalent, that is, mirror as closely as possible the voice communication services available to the general public. Enforcement of this functional equivalency mandate will protect against such degradation of service. In sum, with the exception of TRS contribution requirements discussed below, we find that the enforcement of section 225 is necessary for the protection of consumers under section 10(a)(2), and that forbearance would not be in the public interest under section 10(a)(3).
469. Notwithstanding the foregoing, for now we do forbear in part from the application of TRS contribution obligations that otherwise would newly apply to broadband Internet access service. Section 225(d)(3)(B) and our implementing rules require federal TRS contributions for interstate telecommunications services, which now would uniformly include broadband Internet access service by virtue of the classification decision in this order. Applying new TRS contribution requirements on broadband Internet access potentially could spread the base of contributions to the TRS Fund, having the benefit of adding to the stability of the TRS Fund. Nevertheless, before taking any steps that would depart from the status quo in this regard, the Commission would like to assess the need for such additional funding, and the appropriate contribution level, given the totality of concerns implicated in this context. As courts have recognized, when exercising its section 10 forbearance authority ''[g]uided by section 706,'' the Commission permissibly may ''decide[ ] to balance the future benefits'' of encouraging broadband deployment ''against [the] short term impact'' from a grant of forbearance. Our decision, guided by section 706, to tailor the regulations applied to broadband Internet access service thus tips the balance in favor of the finding that applying new TRS fund contribution requirements at this time is not necessary to ensure just, reasonable and nondiscriminatory conduct by the provider of broadband Internet access service or for the protection of consumers under sections 10(a)(1) and (a)(2) and that forbearance is in the public interest under section 10(a)(3). The competing considerations here make this a closer call under our section 10(a) analysis, however, and thus we limit our action only to forbearing from applying section 225(d)(3)(B) and our implementing rules insofar as they would immediately require new TRS contributions from broadband Internet access services but not insofar as they authorize the Commission to require such contributions should the Commission elect to do so in a rulemaking in the future. In particular, we find it in the public interest to limit our forbearance in this manner to enable us to act even more nimbly in the future should we need to do so based on future developments.
470. Nothing in our forbearance from TRS Fund contribution requirements for broadband Internet access service is intended to encompass, however, situations where incumbent local exchange carriers or other common carriers voluntarily choose to offer Internet transmission services as telecommunications services subject to the full scope of Title II requirements for such services. As a result, such providers remain subject to the Interstate TRS Fund contribution obligations that arise under section 225 and the Commission's rules by virtue of their elective provision of such services until such time as the Commission further addresses such contributions in the future.
471. Consistent with some commenters' proposals, with respect to broadband Internet access service we also do not forbear from applying sections 255 and the associated rules, which require telecommunications service providers and equipment manufacturers to make their services and equipment accessible to individuals with disabilities, unless not readily achievable. We also do not find the statutory forbearance test met for related protections afforded under section 251(a)(2) and our implementing rules, which precludes the installation of ''network features, functions, or capabilities that do not comply with the guidelines and standards established pursuant to section 255.'' We therefore do not forbear from this provision and our associated rules. In prior proceedings, the Commission has emphasized its commitment to implementing the important policy goals of section 255 in the Internet service context. Evidence cited in the National Broadband Plan also demonstrated that, while broadband adoption has grown steadily, it ''lags considerably'' among certain groups, including individuals with disabilities. Adoption of Internet access services by persons with disabilities can enable these individuals to achieve greater productivity, independence, and integration into society in a variety of ways. (Moreover, broadband can make telerehabilitation services possible, by providing long-term health and vocational support within the individual's home. Broadband can also provide increased access to online education classes and digital books and will offer real time interoperable voice, video and text capabilities for E911. In addition, as commenters note, ''society as a whole'' can ''benefit[] when people with disabilities have access to [broadband Internet access] services in a manner equivalent to the non-disabled population.'' CFILC Dec. 17, 2014 Ex Parte Letter at 1.) These capabilities, however, are not available to persons with disabilities if they face barriers to Internet service usage, such as inaccessible hardware, software, or services. We anticipate that increased adoption of services and technologies accessible to individuals with disabilities will, in turn, spur further availability of such capabilities, and of Internet access services more generally.
472. Our forbearance analysis regarding sections 255, 251(a)(2), and our implementing rules also is informed by the incremental nature of the requirements imposed. In particular, the Twenty-First Century Communications and Video Accessibility Act of 2010 (CVAA), expanding beyond the then-existing application of section 255, adopted new section 716 of the Act, which requires that providers of advanced communications services (ACS) and manufacturers of equipment used for ACS make their services and products accessible to people with disabilities, unless it is not achievable to do so. These mandates already apply according to their terms in the context of broadband Internet access service. The CVAA also adopted a requirement, in section 718, that ensures access to Internet browsers in wireless phones for people who are blind and visually impaired. In addition, the CVAA directs the Commission to enact regulations to prescribe, among other things, that networks used to provide ACS ''may not impair or impede the accessibility of information content when accessibility has been incorporated into that content for transmission through . . . networks used to provide [ACS].'' Finally, new section 717 creates new enforcement and recordkeeping requirements applicable to sections 255, 716, and 718. Thus, a variety of accessibility requirements already have applied in the context of broadband Internet access service under the CVAA.
473. We are persuaded by the record of concerns about accessibility in the context of broadband Internet access service that we should not rest solely on the protections of the CVAA, however. But we do clarify the interplay of those provisions. At the time of section 255's adoption in the 1996 Act, Congress stated its intent to ''foster the design, development, and inclusion of new features in communications technologies that permit more ready accessibility of communications technology by individuals with disabilities . . . as preparation for the future given that a growing number of Americans have disabilities.'' More recently, Congress adopted the CVAA after recognizing that since it added section 255 to the Communications Act, ''Internet-based and digital technologies . . . driven by growth in broadband . . . are now pervasive, offering innovative and exciting ways to communicate and share information.'' Congress thus clearly had Internet-based communications technologies in mind when enacting the accessibility provisions of sections section 716 (as well as the related provisions of sections 717 through 718), and in providing important protections with respect to ACS. Thus, insofar as there is any conflict between the requirements of sections 255, 251(a)(2), and our implementing rules, on the one hand, and sections 716 through 718 and our implementing rules on the other hand, we interpret the latter requirements as controlling. On the other hand, insofar as sections 255, 251(a)(2), and our implementing rules impose different requirements that are reconcilable with the CVAA, we find it appropriate to apply those additional protections in the context of broadband Internet access service for the reasons described above. (We recognize that the Commission previously has held that ''[s]ection 2(a) of the CVAA exempts entities, such as Internet service providers, from liability for violations of section 716 when they are acting only to transmit covered services or to provide an information location tool. Thus, service providers that merely provide access to an electronic messaging service, such as a broadband platform that provides an end user with access to a web-based email service, are excluded from the accessibility requirements of section 716.'' Our decision here is not at odds with Congress' approach to such services under the CVAA, however, because we also have found that ''relative to section 255, section 716 requires a higher standard of achievement for covered entities.'' Thus, under our decision here, broadband Internet access service will remain excluded from the ''higher standard of achievement'' required by the CVAA to the extent provided by that law, and instead will be subject to the lower standard imposed under section 255 in those cases where the CVAA does not apply.) Thus, for example, outside the self-described scope of the CVAA, providers of broadband Internet access services must ensure that network services and equipment do not impair or impede accessibility pursuant to the sections 255/251(a)(2) framework. (Because this section requires pass through of telecommunications in an accessible format, and 47 CFR 14.20(c) requires pass through of ACS in an accessible format, the two sections work in tandem with each other, and forbearance from sections 255 and 251(a)(2) would therefore result in a diminution of accessibility.) In particular, we find that these provisions and regulations are necessary for the protection of consumers and forbearance would not be in the public interest. (We recognize that section 716 provides that ''[t]he requirements of this section shall not apply to any equipment or services, including interconnected VoIP service, that are subject to the requirements of section 255 of this title on the day before October 8, 2010. Such services and equipment shall remain subject to the requirements of section 255 of this title.'' 47 U.S.C. 617(f). We do not read that as requiring that section 716 must necessarily be mutually exclusive with section 255, however. Had Congress wished to achieve that result, it easily instead could have stated that ''the requirements of this section shall not apply to any equipment or services . . . that are subject to the requirements of section 255'' (or vice versa) and left it at that. By also including the limiting language ''that are subject to the requirements of section 255 of this title on the day before October 8, 2010,'' we believe the statute reasonably is interpreted as leaving open the option that services that become subject to section 255 thereafter also could be subject to both the requirements of section 255 and the requirements of the CVAA. Indeed, although broadband Internet access previously was classified as an information service and thus not subject to section 255 on October 8, 2010, at the time the CVAA was enacted the Commission had initiated the 2010 NOI to consider whether to reclassify that service as a telecommunications service, which would, at that time, become subject to section 255 as a default matter.)
474. We reject the cursory or generalized arguments of some commenters that we need not apply these protections, or that we might defer doing so, pending further proceedings. For the reasons discussed above, with respect to broadband Internet access service the record here persuades us that the application of these requirements is necessary for the protection of consumers under section 10(a)(2) and that forbearance is not in the public interest under section 10(a)(3). Nor are we otherwise persuaded to stay or waive our implementing rules based on this record. Commenters opposing the application of these protections with respect to broadband Internet access service either with no limit on time, or specifically in the near term, make general arguments about the associated burdens. However, they do not include a meaningful analysis of why the section 10(a) criteria are met (or why relief otherwise should be granted) nor why the concerns they identify'--even assuming arguendo that they were borne out by evidence beyond that currently in the record'--should outweigh the disability access concerns identified here. (Some commenters contend that the Commission should forbear from all of Title II based on generalized arguments about the marketplace, such as past network investment or changes in performance or price per megabit in the recent past. We are not persuaded that those arguments justify a different outcome as to any of the disability access provisions or requirements at issue in this section, both for the reasons discussed previously, and because commenters do not meaningfully explain how these arguments impact the section 10 analysis here, given that the need to protect disability access is not self-evidently linked to such marketplace considerations. Nothing in the record suggests that concerns about disability access are limited to broadband providers of a particular size, and we thus are not persuaded that a different conclusion in our forbearance analysis should be reached in the case of small broadband providers, for example.)
475. We also reject arguments that section 706 itself provides adequate protections such that forbearance from the disability access provisions of sections 225, 255 and 251(a)(2) and associated regulations is warranted. While section 706 of the 1996 Act would continue to apply even if we granted forbearance here, consistent with our conclusions in other sections, we find that these disability access provisions provide a more certain foundation for evaluating providers' conduct and pursuing enforcement if warranted in relevant circumstances arising in the future. (We also note, for example, that this approach obviates the need to determine whether or to what extent these disability access provisions are more specific than section 706 of the 1996 Act in relevant respects, and thus could be seen as exclusively governing over the provisions of section 706 of the 1996 Act as to some set of disability access issues. The approach we take avoids this potential uncertainty, and we thus need not and do not address this question.) Among other things, while our interest in ensuring disability access often may have a nexus with the standards of sections 706(a) and (b), the record does not reveal that the public interest in ensuring access for persons with disabilities is limited just to the universe of concerns encompassed by section 706.
476. In addition to the provisions discussed above, section 710 of the Act addresses hearing aid compatibility. Given the important additional protections for persons with disabilities enabled by this provision, (For reasons similar to those discussed in the text above regarding other disability access provisions, we do not find it in the public interest to grant forbearance from section 710 of the Act, nor do we find such forbearance otherwise warranted under the section 10(a) criteria.) we anticipate addressing the applicability of mobile wireless hearing aid compatibility requirements to mobile broadband Internet access service devices in the pending rulemaking proceeding. (We note that the Commission's existing implementing rules do not immediately impose the Commission's hearing aid compatibility requirements implementing section 710 of the Act on mobile wireless broadband providers by virtue of the classification decisions in this Order. We note, however, that certain obligations in the Commission's rules implementing section 255 addressing interference with hearing technologies and the effective wireless coupling to hearing aids, may be appropriately imposed on such providers by virtue of this Order, given our decision not to forbear from application of section 255 and its implementing regulations.)
c. Access to Poles, Ducts, Conduit and Rights-of-Way (section 224)477. Consistent with the recommendations of certain broadband provider commenters, because we find that the section 10(a) criteria are not met, we decline to forbear from applying section 224 and the Commission's associated rules with respect to broadband Internet access service. Section 224 of the Act governs the Commission's regulation of pole attachments. The Commission has recognized repeatedly the importance of pole attachments to the deployment of communications networks, and we thus conclude that applying these provisions will help ensure just and reasonable rates for broadband Internet access service by continuing pole access and thereby limiting the input costs that broadband providers otherwise would need to incur. Leveling the pole attachment playing field for new entrants that offer solely broadband services also removes barriers to deployment and fosters additional broadband competition. For similar reasons we find that applying these provisions will protect consumers and advance the public interest under sections 10(a)(2) and (a)(3). (Some commenters contend that the Commission should forbear from all of Title II based on generalized arguments about the marketplace, such as past network investment or changes in performance or price per megabit in the recent past. We are not persuaded that those arguments justify a different outcome regarding section 224 and our associated rules, both for the reasons discussed previously, and because commenters do not meaningfully explain how these arguments impact the section 10 analysis here, given that the need for regulated access to access to poles, ducts, conduit, and rights-of-way is not self-evidently linked to such marketplace considerations. Nor does the record reveal that concerns about adequate access to poles, ducts, conduit and rights-of-way are limited to broadband providers of a particular size, and we thus are not persuaded that these concerns would differ in the case of small broadband providers, for example.)
478. Further, in significant part, section 224 imposes obligations on utilities, as owners of poles, ducts, conduits, or rights-of-way, to ensure that cable operators and telecommunications carriers obtain access to poles on just, reasonable, and nondiscriminatory rates, terms and conditions. The definition of a utility, however, includes entities other than telecommunications carriers, and pole attachments themselves are not ''telecommunications services.'' Section 10 allows the Commission to forbear from statutory requirements and implementing regulations as applied to ''a telecommunications carrier or telecommunications service,'' or class thereof, if the statutory criteria are satisfied. To the extent that section 224 imposes obligations on entities other than telecommunications carriers, it is not within the Commission's authority to forbear from this provision and our implementing rules under section 10.
479. Moreover, even if the Commission could forbear from the entirety of section 224 notwithstanding the concerns with such forbearance noted above, it is doubtful that this approach would leave us with authority to regulate the rates for attachments used for broadband Internet access service. In particular, such forbearance seemingly would eliminate any requirements governing pole owners' rates for access to poles by telecommunications carriers or cable operators. Such an outcome would not serve the public interest.
480. We also are not persuaded that we could forbear exclusively from the telecom rate formula in section 224(e), and then adopt a lower rate'--such as the cable rate'--pursuant to section 224(b). In particular, applying the `specific governs the general' canon of statutory interpretation, the Supreme Court interpreted the rate formulas in sections 224(d) and (e) as controlling, within their self-described scope, over the Commission's general authority to ensure just and reasonable rates for pole attachments under section 224(b). We question whether forbearing from applying section 224(e) would actually alter the scope of our authority under section 224(b), or if instead rates for carriers' telecommunications service attachments would remain governed by the (now forborne-from) section 224(e), leaving a void as to regulation of rates for such attachments. Further, attempting to use an approach like this to regulate pole rental rates more stringently to achieve lower rates, the Commission seemingly would be using forbearance to increase regulation. Given the deregulatory purposes underlying the adoption of section 10, we do not believe that the use of forbearance in that manner would be in the public interest.
481. Although we are not persuaded that forbearance would be appropriate to address these concerns, we are committed to avoiding an outcome in which entities misinterpret today's decision as an excuse to increase pole attachment rates of cable operators providing broadband Internet access service. To be clear, it is not the Commission's intent to see any increase in the rates for pole attachments paid by cable operators that also provide broadband Internet access service, and we caution utilities against relying on this decision to that end. This Order does not itself require any party to increase the pole attachment rates it charges attachers providing broadband Internet access service, and we would consider such outcomes unacceptable as a policy matter.
482. We note in this regard that in the 2011 Pole Attachment Order, the Commission undertook comprehensive reform of pole attachment rules'--including by revising the telecommunications rate formula for pole attachments in a way that ''generally will recover the same portion of pole costs as the current cable rate.'' As NCTA, COMPTEL and tw telecom observed following that Order, the Commission's ''expressed intent of providing rate parity between telecommunications providers and cable operators by amending the telecommunications formula to produce rates comparable to the cable formula'--thereby removing the threat of potential rate increases associated with new services and reducing the incentives for pole owners to dispute the legal classification of communications services'--will provide much-needed regulatory certainty that will permit broadband providers to extend their networks to unserved communities while fairly compensating pole owners.'' However, these parties also expressed concern that the particular illustration used by the Commission in the rule text could be construed as suggesting that the new formula includes only instances where there are three and five attaching entities, rather than providing the ''corresponding cost adjustments scaled to other entity counts.'' We are concerned by any potential undermining of the gains the Commission achieved by revising the pole attachment rates paid by telecommunications carriers. We accordingly will be monitoring marketplace developments following this Order and can and will promptly take further action in that regard if warranted.
483. To the extent that there is a potential for an increase in pole attachment rates for cable operators that also provide broadband Internet access service, we are highly concerned about its effect on the positive investment incentives that arise from new providers' access to pole infrastructure. We are encouraged by entry into the marketplace of parties that offer broadband Internet access service, and we believe that providing these new parties with access to pole infrastructure under section 224 would outweigh any hypothetical rise in pole attachment rates for some incumbent cable operators in some circumstances '--particularly in light of our expressed intent to take prompt action if necessary to address the application of the Commission's pole rental rate formulas in a way that removes any doubt concerning the advancement of the goals intended by our 2011 reforms. Moreover, subsumed within our finding that today's decision does not justify any increase in pole attachment rates is an emphatic conclusion that no utility could impose any increase retroactively.
484. We also reject arguments that section 706 itself provides adequate protections such that forbearance from the pole access provisions of section 224 and related regulations is warranted. While section 706 of the 1996 Act would continue to apply even if we granted forbearance here, consistent with our conclusions in other sections, we find that section 224 and our implementing regulations provide a more certain foundation for evaluating providers' conduct and pursuing enforcement if warranted in relevant circumstances arising in the future. (We also note, for example, that this approach obviates the need to determine whether or to what extent section 224's pole access provisions are more specific than section 706 of the 1996 Act in relevant respects, and thus could be seen as exclusively governing over the provisions of section 706 of the 1996 Act as to some set of pole access issues. The approach we take avoids this potential uncertainty, and we thus need not and do not address this question.)
d. Universal Service Provisions (sections 254, 214(e))485. We find the statutory test is met to grant certain forbearance under section 10(a) from applying sections 254(d), (g), and (k), as discussed below, but we otherwise will apply section 254, section 214(e) and our implementing rules with respect to broadband Internet access service, as recommended by a number of commenters. Section 254, the statutory foundation of our universal service programs, requires the Commission to promote universal service goals, including ''[a]ccess to advanced telecommunications and information services . . . in all regions of the Nation.'' Section 214(e) provides the framework for determining which carriers are eligible to participate in universal service programs. Even prior to the classification of broadband Internet access service adopted here, the Commission already supported broadband services to schools, libraries, and health care providers and supported broadband-capable networks in high-cost areas. Broadband Internet access service was, and is, a key focus of those universal service policies, and classification today simply provides another statutory justification in support of these policies going forward. Under our broader section 10(a)(3) public interest analysis, the historical focus of our universal service policies on advancing end-users' access to broadband Internet access service persuades us to give much less weight to arguments that we should proceed incrementally in this context. In particular, the Commission already has provided support for deployment of broadband-capable networks and imposed associated public interest obligations requiring the provision of broadband Internet access service. In connection with the Lifeline program, for instance, the Commission has established the goal of ''ensuring the availability of broadband service for low-income Americans.'' We therefore conclude that these universal service policy-making provisions of section 254, and the interrelated requirements of section 214(e), give us greater flexibility in pursuing those policies, and outweighs any limited incremental effects (if any) on broadband providers in this context. (We note that commenters opposing the application of section 254 as a whole (or those provisions of section 254 from which we do not forbear below) or arguing that such action could be deferred pending future proceedings, appear to make only generalized, non-specific arguments, which we do not find sufficient to overcome our analysis above. In addition, some commenters contend that the Commission should forbear from all of Title II based on generalized arguments about the marketplace, such as past network investment or changes in performance or price per megabit in the recent past. We are not persuaded that those arguments justify a different outcome regarding section 254, both for the reasons discussed previously, and because commenters do not meaningfully explain how these arguments impact the section 10 analysis here, given that, even taken at face value, arguments based on such marketplace considerations do not purport to sufficiently address the policy concerns underlying section 254 and our universal service programs. Nothing in the record suggests that we should tailor our advancement of universal service policies to broadband providers of a particular size, and we thus are not persuaded that a different conclusion in our forbearance analysis should be reached in the case of small broadband providers, for example.) Because forbearance would not be in the public interest under section 10(a)(3), we apply these provisions of section 254 and 214(e) and our implementing rules with respect to broadband Internet access service.
486. We also reject arguments that section 706 itself provides adequate protections such that forbearance from the provisions of sections 254 and 214(e) discussed above is warranted. While section 706 of the 1996 Act would continue to apply even if we granted forbearance here, we find that these provisions provide a more certain foundation for implementing our universal service policies and enforcing our associated rules, consistent with our conclusions in other sections. (We also note, for example, that this approach obviates the need to determine whether or to what extent these universal service provisions are more specific than section 706 of the 1996 Act in relevant respects, and thus could be seen as exclusively governing over the provisions of section 706 of the 1996 Act as to some set of universal issues. The approach we take avoids this potential uncertainty, and we thus need not and do not address this question.) Among other things, while our interest in ensuring universal service often may have a nexus with the standards of sections 706(a) and (b), the record does not reveal that the public interest in ensuring universal access is limited just to the universe of concerns encompassed by section 706.
487. Notwithstanding the foregoing, for now we do forbear in part from the first sentence of section 254(d) and our associated rules insofar as they would immediately require new universal service contributions associated with broadband Internet access service. The first sentence of section 254(d) authorizes the Commission to impose universal service contributions requirements on telecommunications carriers'--and, indeed, goes even further to require ''[e]very telecommunications carrier that provides interstate telecommunications services'' to contribute. (In implementing that statutory provision, the Commission concluded that federal contributions would be based on end-user telecommunications revenues.) Under that provision and our implementing rules, providers are required to make federal universal service support contributions for interstate telecommunications services, which now would include broadband Internet access service by virtue of the classification decision in this order.
488. Consistent with our analysis of TRS contributions above, we note that on one hand, newly applying universal service contribution requirements on broadband Internet access service potentially could spread the base of contributions to the universal service fund, providing at least some benefit to customers of other services that contribute, and potentially also to the stability of the universal service fund through the broadening of the contribution base. We note, however, that the Commission has sought comment on a wide range of issues regarding how contributions should be assessed, including whether to continue to assess contributions based on revenues or to adopt alternative methodologies for determining contribution obligations. (Moreover, the Commission has referred the question of how the Commission should modify the universal service contribution methodology to the Federal-State Joint Board on Universal Service (Joint Board) and requested a recommended decision by April 7, 2015. We recognize that a short extension of that deadline for the Joint Board to make its recommendation to the Commission may be necessary in light of the action we take today. Our action in this Order thus will not ''short circuit'' the rulemaking concerning contributions issues as some commenters fear.) We therefore conclude that limited forbearance is warranted at the present time in order to allow the Commission to consider the issues presented based on a full record in that docket. (As noted below, we do not forbear from the mandatory obligation of carriers that have chosen voluntarily to offer broadband as a Title II service to contribute to the federal universal service fund. Because we do nothing today to disturb the status quo with respect to current contributions obligations for the reasons explained above, and there will be a future opportunity to consider these issues in the contributions docket, we find that certain arguments raised in the record today are better taken up in that proceeding.)
489. As reiterated in our discussion of TRS contributions above, courts have recognized when exercising its section 10 forbearance authority ''[g]uided by section 706,'' the Commission permissibly may ''decide[] to balance the future benefits'' of encouraging broadband deployment ''against [the] short term impact'' from a grant of forbearance. Our decision, guided by section 706, to tailor the regulations applied to broadband Internet access service thus tips the balance in favor of the finding that applying new universal service fund contribution requirements at this time is not necessary to ensure just and reasonable rates and practices or for the protection of consumers under sections 10(a)(1) and (a)(2), and that forbearance is in the public interest under section 10(a)(3) while the Commission completes its pending rulemaking regarding contributions reform. (While some commenters cite regulatory parity as a reason not to forbear from universal service contribution requirements, they do not explain how such concerns are implicated insofar as every provider's broadband Internet access service is subject to this same forbearance from universal service contribution requirements. In any event, those arguments are better addressed in the contributions rulemaking docket based on the full record developed therein) The competing considerations here make this a closer call under our section 10(a) analysis, however, and thus as in the TRS contribution context, we limit our action only to forbearing from applying the first sentence of section 254(d) and our implementing rules insofar as they would immediately require new universal service contributions for broadband Internet access services sold to end users but not insofar as they authorize the Commission to require such contributions in a rulemaking in the future. Thus, while broadband Internet access services will not be subject to new universal service contributions at this time, our action today is not intended to prejudge or limit how the Commission may proceed in the future. (Because our action today precludes for the time being federal universal service contribution assessments on broadband Internet access services that are not currently assessed, we conclude that any state requirements to contribute to state universal service support mechanisms that might be imposed on such broadband Internet access services would be inconsistent with federal policy and therefore are preempted by section 254(f)'--at least until such time that the Commission rules on whether to require federal universal service contributions by providers of broadband Internet access service. We note that we are not aware of any current state contribution obligation for broadband Internet access service; our understanding is that broadband providers that voluntarily offer Internet transmission as a Title II service treat 100 percent of those revenues as interstate. We recognize that section 254 expressly contemplates that states will take action to preserve and advance universal service, and our actions in this regard will benefit from further deliberation.)
490. Nothing in our forbearance with respect to the first sentence of section 254(d) for broadband Internet access service is intended to encompass, however, situations where incumbent local exchange carriers or other common carriers voluntarily choose to offer Internet transmission services as telecommunications services subject to the full scope of Title II requirements for such services. As a result, such providers remain subject to the mandatory contribution obligations that arise under section 254(d) and the Commission's rules by virtue of their elective provision of such services until such time as the Commission further addresses contributions reform in the pending proceeding.
491. We also forbear from applying sections 254(g) and (k) and our associated rules. Section 254(g) requires ''that the rates charged by providers of interexchange telecommunications services to subscribers in rural and high cost areas shall be no higher than the rates charged by each such provider to its subscribers in urban areas.'' Section 254(k) prohibits the use of revenues from a non-competitive service to subsidize a service that is subject to competition. Commenters' arguments to apply provisions of section 254 appear focused on the provisions dealt with above'--i.e., provisions providing for support of broadband networks or services or addressing universal service contributions'--and do not appear to focus at all on why we should not forbear from applying the requirements of sections 254(g) and (k) and our implementing rules. In particular, consistent with the more detailed discussion in our analysis below, we are not persuaded that applying these provisions is necessary for purposes of sections 10(a)(1) and (a)(2), particularly given the availability of the core broadband Internet access service requirements. Likewise, under the tailored regulatory approach we find warranted here, informed by our responsibilities under section 706, we conclude that forbearance from enforcing sections 254(g) and (k) is in the public interest under section 10(a)(3). We thus forbear from applying these provisions insofar as they would be newly triggered by the classification of broadband Internet access service in this Order. Nothing in our forbearance with respect to section 254(k) for broadband Internet access service is intended to encompass, however, situations where incumbent local exchange carriers or other common carriers voluntarily choose to offer Internet transmission services as telecommunications services subject to the full scope of Title II requirements such services. As a result, such providers remain subject to the obligations that arise under section 254(k) and the Commission's rules by virtue of their elective provision of such services. (For example, if a rate-of-return incumbent LEC (or other provider) voluntarily offers Internet transmission outside the forbearance framework adopted in this Order, it remains subject to the pre-existing Title II rights and obligations, including those from which we forbear in this Order.)
2. Broad Forbearance From 27 Title II Provisions for Broadband Internet Access Service492. Beyond those core broadband Internet access service requirements we grant extensive forbearance as permitted by our authority under section 10 of the Act based on our predictive judgment regarding the adequacy of other protections where needed, coupled with the role of section 706 of the 1996 Act and our desire to tailor the requirements that should apply here, likewise persuade us that this forbearance is in the public interest. The analyses and forbearance decisions regarding broadband Internet access service reflect the broad support in the record for expansive forbearance. With respect to proposals to retain particular statutory provisions or requirements, we are not persuaded by the record here that forbearance is not justified for the reasons discussed below.
493. As a threshold matter, we reject arguments from certain commenters that include bare assertions that we should not forbear as to particular provisions or regulations without any meaningful supporting analysis or discussion under the section 10(a) framework. To the extent that these commenters argue for a narrower result than the forbearance we grant here, such conclusory arguments do not undercut our finding that the section 10(a) criteria are met as to the forbearance granted here with respect to broadband Internet access service. For similar reasons we reject arguments that the Commission should ''exempt from forbearance . . . Section 228 . . . provid[ing] customers with protections from abusive practices by pay-per-call service providers'' insofar as they do not explain how such a provision meaningfully would apply in the context of broadband Internet access service or why the section 10(a) criteria are not met in that context. As a result, these arguments do not call into question our section 10(a) findings below in the context of the broadband Internet access service. With respect to proposals to retain other statutory provisions, we conclude that commenters fail to demonstrate at this time that other, applicable requirements or protections are inadequate, for the reasons discussed below.
494. For each of the remaining statutory and regulatory obligations triggered by our classification decision, the realities of the near-term past under the prior ''information service'' classification inform our section 10(a) analysis. Although that practical baseline is not itself dispositive of the appropriate regulatory treatment of broadband Internet access service, the record reveals numerous concerns about the burdens'--or, at a minimum, regulatory uncertainty'--that would be fostered by a sudden, substantial expansion of the actual or potential regulatory requirements and obligations relative to the status quo from the near-term past. (We are not persuaded by arguments that a tailored regulatory approach like that adopted here inherently would be inferior to the adoption of a more regulatory approach in this Order. Rather, we base our decision to adopt such a tailored approach based both on our own analysis of the overall record regarding investment incentives (which can involve multifaceted considerations), and the wisdom we see in exercising our discretion to proceed incrementally, as discussed in greater detail below.) It is within the agency's discretion to proceed incrementally, and we find that adopting an incremental approach here'--by virtue of the forbearance granted here'--guards against any unanticipated and undesired detrimental effects on broadband deployment that could arise. We note in this regard that when exercising its section 10 forbearance authority ''[g]uided by section 706,'' the Commission permissibly may ''decide[ ] to balance the future benefits'' of encouraging broadband deployment ''against [the] short term impact'' from a grant of forbearance. Under the section 10(a) analysis, we are particularly persuaded to give greater weight at this time to the likely benefits of proceeding incrementally given the speculative or otherwise limited nature of the arguments in the current record regarding the possible near-term harms from forbearance of the scope adopted here.
495. We further conclude that our analytical approach as to all the provisions and regulations from which we forbear in this Order is consistent with section 10(a). Under section 10(a)(1), we consider here whether particular provisions and regulations are ''necessary'' to ensure ''just and reasonable'' conduct by broadband Internet access service providers. Interpreting those ambiguous terms, we conclude that we reasonably can account for policy trade-offs that can arise under particular regulatory approaches. (While the specific balancing at issue in EarthLink v. FCC, 462 F.3d at 8-9, may have involved trade-offs regarding competition, we nonetheless believe the view expressed in that decision accords with our conclusion here that we permissibly can interpret and apply all the section 10(a) criteria to also reflect the competing policy concerns here. As the D.C. Circuit also has observed, within the statutory framework that Congress established, the Commission ''possesses significant, albeit not unfettered, authority and discretion to settle on the best regulatory or deregulatory approach to broadband.'') For one, we find it reasonable in the broadband Internet access service context for our interpretation and application of section 10(a)(1) to be informed by section 706 of the 1996 Act. (Given the characteristics specific to broadband Internet access service that we find on the record here'--including, among other things, protections from the newly-adopted open Internet rules and the overlay of section 706'--we limit our forbearance from the relevant provisions and regulations to the context of broadband Internet access service. Outside that context, they will continue to apply as they have previously, unaffected by this Order. We thus reject claims that the actions or analysis here effectively treat forborne-from provisions or regulations as surplusage or that we are somehow ignoring significant portions of the Act.) As discussed above, section 706 of the 1996 Act ''explicitly directs the FCC to `utiliz[e]' forbearance to `encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans,' '' and our recent negative section 706(b) determination triggers a duty under section 706 for the Commission to ''take immediate action to accelerate deployment.'' As discussed in greater detail below, a tailored regulatory approach avoids disincentives for broadband deployment, which we weigh in considering what outcomes are just and reasonable'--and whether the forborne-from provisions are necessary to ensure just and reasonable conduct'--under our section 10(a)(1) analyses in this item. Furthermore, our forbearance in this Order, informed by recent experience and the record in this proceeding, reflects the recognition that, beyond the specific bright-line rules adopted above, particular conduct by a broadband Internet access service provider can have mixed consequences, rendering case-by-case evaluation superior to bright-line rules. Consequently, based on those considerations, it is our predictive judgment that, outside the bright line rules applied under this Order, just and reasonable conduct by broadband providers is better ensured under section 10(a)(1) by the case-by-case regulatory approach we adopt'--which enables us to account for the countervailing policy implications of given conduct'--rather than any of the more bright-line requirements that would have flowed from the provisions and regulations from which we forbear. (As explained above, we conclude that while competition can be a sufficient basis to grant forbearance, it is not inherently necessary in order to find section 10 satisfied. Given our assessment of the advantages of the regulatory framework applied under this Order, we also reject suggestions that, where the Commission does not rely on sufficient competition to justify forbearance, alternative ex ante regulations would always be necessary to ensure just and reasonable conduct and otherwise provide a basis for finding the section 10(a) criteria to be met. Further, while the Final Regulatory Flexibility Analysis estimates a large possible universe of broadband Internet access service providers, we do not find a basis to conclude that they all'--or a sufficiently significant number of them'--are likely to be simultaneously subject to complaints to render the case-by-case approach unworkable or inferior to additional bright line rules, and thus reject concerns to the contrary.) These same considerations underlie our section 10(a)(2) analyses, as well, since advancing broadband deployment and ensuring appropriately nuanced evaluations of the consequences of broadband provider conduct better protects consumers. Likewise, these same policy considerations are central to the conclusion that the forbearance granted in this Order, against the backdrop of the protections that remain, best advance the public interest under section 10(a)(3).
a. Tariffing (Sections 203, 204)496. We find the section 10(a) criteria met and forbear from applying section 203 of the Act insofar as it newly applies to providers by virtue of our classification of broadband Internet access service. That provision requires common carriers to file a schedule of rates and charges for interstate common carrier services. As a threshold matter, we find broad support in the record for expansive forbearance, as discussed above. Moreover, as advocated by some commenters, it is our predictive judgment that other protections that remain in place are adequate to guard against unjust and unreasonable and unjustly and unreasonably discriminatory rates and practices in accordance with section 10(a)(1) and to protect consumers under section 10(a)(2). We likewise conclude that those other protections reflect the appropriate calibration of regulation of broadband Internet access service at this time, such that forbearance is in the public interest under section 10(a)(3).
497. As discussed below, sections 201 and 202 of the Act and our open Internet rules are designed to preserve and protect Internet openness, prohibiting unjust and unreasonable and unjustly or unreasonably discriminatory conduct by providers of broadband Internet access service for or in connection with broadband Internet access service and protecting the retail mass market customers of broadband Internet access service. In particular, under our open Internet rules and the application of sections 201 and 202, we establish both ex ante legal requirements and a framework for case-by-case evaluations governing broadband providers' actions. In calibrating the legal framework in that manner, we consider, among other things, the operation of the marketplace in conjunction with open Internet protections. It is our predictive judgment that these protections will be adequate to protect the interests of consumers'--including the interest in just, reasonable, and nondiscriminatory conduct'--that might otherwise be threatened by the actions of broadband providers. Importantly, broadband providers also are subject to complaints and Commission enforcement in the event that they violate sections 201 or 202 of the Act, the open Internet rules, or other elements of the core broadband Internet access requirements. We thus find on the record here that section 203's requirements are not necessary to ensure just and reasonable and not unjustly or unreasonably discriminatory rates and practices under section 10(a)(1) nor for the protection of consumers under 10(a)(2).
498. The predictive judgment underlying our section 10 analysis is informed by recent experience. Historically, tariffing requirements were not applied to broadband Internet access service under our prior ''information service'' classification. This provides us a practical reference point as part of our overall evaluation of the types of concerns that are likely to arise in this context, underlying our predictive judgment regarding the sufficiency of the rules and requirements that remain. Consequently, providers will not be subject to ex ante rate regulation nor any requirement of advanced Commission approval of rates and practices as otherwise would have been imposed under section 203.
499. We also find that the forbearance for broadband Internet access service satisfies sections 10(a)(1) and (a)(2) and is consistent with the public interest under section 10(a)(3) in light of the objectives of section 706. In addition to our specific conclusions above, we find more broadly that forbearing from section 203 is consistent with the overall approach that we conclude strikes the right regulatory balance for broadband Internet access service at this time. In particular, given the overlay of section 706 of the 1996 Act, we conclude that the better approach at this time is to focus on applying the core broadband Internet access service requirements rather than seeking to apply the additional provisions and regulations triggered by the classification of broadband Internet access service from which we forbear. As explained above, section 706 of the 1996 Act ''explicitly directs the FCC to `utiliz[e]' forbearance to `encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans.' '' The D.C. Circuit has further held that the Commission ''possesses significant, albeit not unfettered, authority and discretion to settle on the best regulatory or deregulatory approach to broadband.'' We find that the scope of forbearance adopted in this order strikes the right balance at this time between, on the one hand, providing the regulatory protections clearly required by the evidence and our analysis to, among other things, guard the virtuous cycle of Internet innovation and investment and, on the other hand, avoiding additional regulations that do not appear required at this time and that risk needlessly detracting from providers' broadband investments.
500. Additionally, section 10(b) requires the Commission, as part of its public interest analysis, to analyze the impact forbearance would have on competitive market conditions. Although there is some evidence of competition for broadband Internet access service, it appears to be limited in key respects, and the record also does not provide a strong basis for concluding that the forbearance granted in this Order is likely to directly impact the competitiveness of the marketplace for broadband Internet access services. We note that the forbearance we grant is part of an overall regulatory approach designed to promote infrastructure investment in significant part by preserving and promoting innovation and competition at the edge of the network. Thus, even if the grant of forbearance does not directly promote competitive market conditions, it does so indirectly by enabling us to strike the right balance at this time in our overall regulatory approach. Our regulatory approach, viewed broadly, thus does advance competition in important ways. Ultimately, however, while we consider the section 10(b) criteria in our section 10(a)(3) public interest analysis, our public interest determination rests on other grounds. In particular, under the entirety of our section 10(a)(3) analysis, as discussed above, we conclude that the public interest supports the forbearance adopted in this Order. (These same section 10(b) findings likewise apply in the case of our other section 10(a)(3) public interest evaluations with respect to broadband Internet access service, and should be understood as incorporated there.)
501. We thus are not persuaded by other commenters arguing that the Commission's ability to forbear from section 203 depends on findings of sufficient competition. As explained above, persuasive evidence of competition is not the sole possible grounds for granting forbearance. As also explained above, we conclude at this time that the Open Internet rules and other elements of the core broadband Internet access service requirements meet our identified needs in this specific context. The Commission also has recognized previously that tariffing imposes administrative costs. We also consider our objective of striking the right balance of a regulatory and deregulatory approach, consistent with section 706 of the 1996 Act. (Indeed, even when forbearing from section 203 in the CMRS context, the Commission not only relied in part on the presence of competition, but also that continued application of sections 201, 202, and 208 ''provide[s] an important protection in the event there is a market failure,'' and ''tariffing imposes administrative costs and can themselves be a barrier to competition in some circumstances.'' Those are in accord with key elements of our conclusions here.) Collectively, these persuade us not to depart from the section 10(a) analysis above, irrespective of the state of competition.
502. Nor are we persuaded by commenters' specific arguments that tariffs filed under section 203 provide ''the necessary information to distinguish between providers'' and thus should not be subject to forbearance for broadband Internet access service. As certain of these commenters themselves note, such objectives might be met in other ways. To the extent that disclosures regarding relevant broadband provider practices are needed, our Open Internet transparency rule is designed to serve those ends. Commenters do not meaningfully explain why the transparency rule is inadequate, and thus their arguments do not persuade us to depart from our section 10(a) findings above in the case of section 203.
503. We likewise reject the proposals of other commenters that we structure our forbearance from section 203 to permissively, rather than mandatorily, detariff broadband Internet access service. As a threshold matter, we note that, as discussed above, our forbearance with respect to broadband Internet access services does not encompass incumbent local exchange carriers or other common carriers that offer Internet transmission services as telecommunications services subject to the full range of Title II requirements under the pre-existing legal framework, which does provide for permissive detariffing. Under the framework adopted in this Order, however, we are not persuaded that our open Internet rules provide for readily administrable evaluation of the justness and reasonableness of tariff filings. Nor does the record reveal that we can rely on competitive constraints to help ensure the justness and reasonableness of tariff filings. Furthermore, as the Commission previously has recognized, permitting voluntary tariff filings can raise a number of public interest concerns, and consistent with those findings, we mandatorily detariff broadband Internet access service for purposes of the regulatory framework adopted in this Order.
504. Some commenters also advocate that the Commission retain section 204. Section 204 provides for Commission investigation of a carrier's rates and practices newly filed with the Commission, and to order refunds, if warranted. For the reasons described above, however, we forbear from sections 203's tariffing requirements for broadband Internet access service, and adopt mandatory detariffing. Given that decision, commenters do not indicate what purpose section 204 still would serve, and we thus do not depart in this context from our overarching section 10(a) forbearance analysis above.
b. Enforcement-Related Provisions (Sections 205, 212)505. We find forbearance from applying certain enforcement-related provisions of Title II beyond the core Title II enforcement authority discussed above warranted under section 10(a), and we reject arguments to the contrary. Section 205 provides for Commission investigation of existing rates and practices and to prescribe rates and practices if it determines that the carrier's rates or practices do not comply with the Communications Act. The Commission previously has forborne from enforcing section 205 where it sought to adopt a tailored, limited regulatory environment and where, notwithstanding that forbearance, given the continued application of sections 201 and 202 and other complaint processes. For similar reasons here, we find at this time that the core Title II enforcement authority, along with the ability to pursue claims in court, as discussed below, provide adequate enforcement options and the statutory forbearance test is met for section 205. Consistent with our analysis above, it thus is our predictive judgment that these provisions are not necessary to ensure just, reasonable and nondiscriminatory conduct by providers of broadband Internet access service or to protect consumers under sections 10(a)(1) and (a)(2). In addition, as above, under the tailored regulatory approach we find warranted here, informed by our responsibilities under section 706, we conclude that forbearance is in the public interest under section 10(a)(3). We thus reject claims that forbearance from section 205, insofar as it is triggered by our classification of broadband Internet access service, is not warranted. (Although Public Knowledge et al. cite marketplace differences between CMRS and broadband Internet access service, they do not explain why those differences necessitate a narrower forbearance decision in this context'--particularly since we do not rely on the state of competition as a rationale for our forbearance decision'--whether as to section 205, or as to the other provisions discussed there (sections 204, 211, 212).)
506. We also forbear from applying section 212 to the extent that it newly applies by virtue of our classification of broadband Internet access service. Section 212 empowers the Commission to monitor interlocking directorates, i.e., the involvement of directors or officers holding such positions in more than one common carrier. In the CMRS context, the Commission granted forbearance from section 212 on the grounds that forbearance would reduce regulatory burdens without adversely affecting rates in the CMRS market. The Commission noted that section 212 was originally placed in the Communications Act to prevent interlocking officers from engaging in anticompetitive practices, such as price fixing. The Commission found, however, that protections of section 201(b), 221, (The Commission noted that section 221 provided protections against interlocking directorates, but section 221(a) was repealed in the Telecommunications Act of 1996. This section gave the Commission the power to review proposed consolidations and mergers of telephone companies. While section 221(a) allowed the Commission to bolster its analysis to forbear from section 212 in the Wireless Forbearance Order, the protections against interlocking directorates provided by section 201(b) and 15 U.S.C. 19 provide sufficient protection to forbear from section 212 for broadband Internet access services.) and antitrust laws were sufficient to protect consumers against the potential harms from interlocking directorates. Forbearance also reduced an unnecessary regulatory cost imposed on carriers. The Commission later extended this forbearance to dominant carriers and carriers not yet found to be non-dominant, repealing part 62 of its rules and granting forbearance from the provisions of section 212. Commenters have not explained why we should not find the protections of section 201(b) and antitrust law adequate here, as well. It likewise is our predictive judgment that other protections will adequately ensure just, reasonable, and nondiscriminatory conduct by providers of broadband Internet access service and protect consumers here, and thus conclude that the application of section 212 is not necessary for purposes of sections 10(a)(1) or (a)(2). Moreover, as above, under the tailored regulatory approach we find warranted here, informed by our responsibilities under section 706, we conclude that forbearance is in the public interest under section 10(a)(3).
c. Information Collection and Reporting Provisions (Sections 211, 213, 215, 218 Through 220)507. In addition, although some commenters advocate that the Commission retain provisions of the Act that provide ''discretionary powers to compel production of useful information or the filing of regular reports,'' we find the section 10(a) factors met and grant forbearance. However, the cited provisions principally are used by the Commission to implement its traditional rate-making authority over common carriers. Here, we do not apply tariffing requirements or ex ante rate regulation of broadband Internet access service of the sort for which these requirements would be needed. Indeed, we cannot and do not envision adopting such requirements in the future. Thus, we do not find it necessary or in the public interest to apply these provisions simply in anticipation of such an exceedingly unlikely scenario. Moreover, as particularly relevant here, section 706 of the 1996 Act, along with other statutory provisions, give the Commission authority to collect necessary information. We recognize that the Commission generally did not forbear from these requirements in the CMRS context, noting the minimal regulatory burdens they imposed on such providers, and observing that reservation of this Commission authority would allow further consideration of possible information collection requirements, given that ''the cellular market is not yet fully competitive.'' As explained above, in this context, however, we find forbearance to be the more prudent course, and therefore in the public interest under section 10(a)(3), given both our intention of tailoring the regulations applicable to broadband Internet access service given our responsibility under section 706 to encourage deployment. Because we also do not find the information collection and reporting provisions raised by commenters to be necessary at this time within the meaning of sections 10(a)(1) and (a)(2), we forbear from applying these provisions insofar as they otherwise newly would apply by virtue of our classification of broadband Internet access service.
d. Discontinuance, Transfer of Control, and Network Reliability Approval (Section 214)(Unless otherwise indicated, for convenience, this item uses ''discontinuance,'' to also include reduction or impairment of service under section 214.)
508. We also find section 10(a) met for purposes of forbearing from applying section 214 discontinuance approval requirements. We reject the arguments of some commenters that we should not forbear, which focus in particular on concerns about discontinuances in rural areas or areas with only one provider. As a threshold matter, our universal service rules are designed to advance the deployment of broadband networks, including in rural and high-cost areas. Notably, this includes certain public interest obligations on the part of high-cost universal service support recipients to offer broadband Internet access service. Consequently, these provide important protections, especially in rural areas or areas that might only have one provider. Further, the conduct standards in our open Internet rules provide important protections against reduction or impairment of broadband Internet access service short of the complete cessation of providing that service. Thus, while we agree with commenters regarding the importance of broadband Internet access service, including in rural areas or areas served by only one provider, the generalized arguments of those commenters do not explain why the protections described above, in conjunction with the core broadband Internet access service requirements more broadly, are not likely to be sufficient to guard against unjust or unreasonable conduct by providers of broadband Internet access service or to protect consumers.
509. Moreover, the Commission has recognized in the past that section 214 discontinuance requirements impose some costs, although the significance of those costs is greater where (unlike here) the marketplace for the relevant service is competitive. Further, as discussed above, we find the most prudent regulatory approach at this time is to proceed incrementally when adding regulations beyond what had been the prior status quo. (The overlay of section 706 of the 1996 Act here, including how it informs our decision to proceed incrementally, distinguishes this from the Commission's prior evaluation of relief from Title II for CMRS. Consequently, although we look to the precedent from the CMRS context'--as we do other forbearance precedent'--to the extent that it is instructive, the mere fact that we declined to forbear from applying a provision in the CMRS context does not demonstrate that we should continue to apply it here as some suggest.) Given those considerations, and against the backdrop of other protections here, as discussed above, commenters have not persuaded us that applying section 214 discontinuance requirements with respect to broadband Internet access service is necessary within the meaning of sections 10(a)(1) and (a)(2) or that forbearance would not be in the public interest under section 10(a)(3). We thus forbear from applying section 214 discontinuance requirements to the extent that they would be triggered by our classification of broadband Internet access service here.
510. We also reject arguments against forbearance from applying section 214 to enable the Commission to engage in merger review. As these commenters recognize, prior to this Order the Commission already has commonly reviewed acquisitions of or mergers among entities that provide broadband services. (For example, the Commission reviews all applications for transfer or assignment of a wireless license, including licenses used to provide broadband services, pursuant to section 310(d) of the Act to determine whether the applicants have demonstrated that the proposed transfer or assignment will serve the public interest, convenience, and necessity. As this review is not triggered by reclassification, nothing in this Order limits or otherwise affects our review under section 310.) Although these comments speculate about a future time when communications services have evolved in such a way that the Commission would lack some other basis for its review, the record here does not demonstrate that it is sufficiently imminent to warrant deviating from our section 10 analysis regarding section 214 above. Notably, today we apply the core broadband Internet access service requirements that provide important constraints on broadband providers' conduct and protections for consumers. Thus, similar to our analysis above, it is our predictive judgment that other protections will be sufficient to ensure just, reasonable, and nondiscriminatory conduct by providers of broadband Internet access service and to protect consumers for purposes of sections 10(a)(1) and (a)(2). Given our objective to proceed in a tailored manner, we likewise find it in the public interest to forbear from applying section 214 with respect to broadband Internet access service insofar as that provision would require Commission approval of transfers of control involving that service.
511. We also grant forbearance with respect to section 214(d), under which the Commission may require a common carrier ''to provide itself with adequate facilities for the expeditious and efficient performance of its service.'' The duty to maintain ''adequate facilities'' includes ''undertak[ing] improvements in facilities and expansion of services to meet public demand.'' In practice, we expect that the exercise of this duty here would overlap significantly with the sorts of behaviors we would expect providers to have marketplace incentives to engage in voluntarily as part of the ''virtuous cycle.'' (Thus, even if our open Internet rules do not directly address this issue, by helping promote the virtuous cycle more generally, they also will help ensure that broadband providers have marketplace incentives to behave in this manner.) Beyond that, comments contending that the Commission should not forbear as to that provision do not explain why the core broadband Internet access service requirements do not provide adequate protection at this time. Thus, as under our analysis above, it is our predictive judgment that other protections will be sufficient to ensure just, reasonable, and nondiscriminatory conduct by providers of broadband Internet access service and to protect consumers for purposes of sections 10(a)(1) and (a)(2). Likewise, informed by section 706 we have an objective of tailoring the regulatory approach here, and thus find forbearance warranted under section 10(a)(3) insofar as section 214(d) would apply by virtue of our classification of broadband Internet access service.
e. Interconnection and Market-Opening Provisions (Sections 251, 252, 256)512. At this time, we conclude that the availability of other protections adequately address commenters' concerns about forbearance from the interconnection (Although commenters appear to use the term ''interconnection'' to mean a potentially wide range of different things, for purposes of this section we use that term solely in the manner it is used and defined for purpose of these provisions.) provisions under the section 251/252 framework (As discussed above, however, we do not forbear from applying section 251(a)(2) with respect to broadband Internet access service, and that provision thus is outside the scope of the discussion here.) and under section 256. (As a result of the forbearance granted from section 251 below, section 252 thus is inapplicable, insofar it is simply a tool for implementing the section 251 obligations. Although we do not forbear from applying section 251(a)(2) with respect to broadband Internet access service, we note that the Commission previously has held that the procedures of section 252 are not applicable in matters simply involving section 251(a). To the extent that the Commission nonetheless could be seen as newly applying section 252 with respect to broadband Internet access service as a result of our classification decision here, we find the section 10 criteria met to grant forbearance from that provision for the same reasons discussed with respect to section 251 in the text above.) We thus forbear from applying those provisions to the extent that they are triggered by the classification of broadband Internet access service in this Order. The Commission retains authority under sections 201, 202 and the open Internet rules to address interconnection issues should they arise, including through evaluating whether broadband providers' conduct is just and reasonable on a case-by-case basis. We therefore conclude that these remaining legal protections that apply with respect to providers of broadband Internet access service will enable us to act if needed to ensure that a broadband provider does not unreasonably refuse to provide service or interconnect. (Our finding of significant overlap between the authority retained by the Commission under section 201 and the interconnection requirements of section 251 is reinforced by Congress' inclusion of section 251(g) and (i), which, notwithstanding the requirements of section 251, preserve the Commission's pre-1996 Act interconnection requirements as well as its ongoing authority under section 201.) Further, we find that applying the legal structure adopted in this Order better enables us to achieve a tailored framework than requiring compliance with interconnection under section 251, in that the application of that framework leaves more to the Commission's discretion, rather than being subject to mandatory regulation under section 251. Because we retain our authority to apply and enforce these other protections, we reject commenters' suggestion that the section 10(a) forbearance criteria are not met as to sections 251 and 256. (This is particularly true as to section 256, which does not provide the Commission any additional authority that it does not otherwise have.) Rather, consistent with our analysis for other provisions, we find that other protections render application of these provisions unnecessary for purposes of sections 10(a)(1) and (a)(2) and the forbearance reflects our tailored regulatory approach, informed by section 706, and thus is in the public interest under section 10(a)(3).
513. We also reject arguments suggesting that we should not forbear from applying sections 251(b) and (c) with respect to broadband Internet access service. For example, sections 251(b)(1), (4), and (5) impose obligations on LECs regarding resale, access to rights-of-way, and reciprocal compensation. Section 251(c) subjects incumbent LECs to unbundling, resale, collocation, and other competition policy obligations. (We reject claims that section 251(c) has not been fully implemented ''[b]ecause the Commission has never applied section 251(c) to the provision of broadband Internet access service'' as at odds with that precedent. The Commission has adopted rules implementing section 251(c), and the fact that the manner in which those rules apply might vary with the classification of a particular service (or changes in that classification) does not alter that fact. Therefore, the prohibition in section 10(d) of the Act against forbearing from section 251(c) prior to such a determination is not applicable.) While we recognize the important competition policy goals that spurred Congress' adoption of these requirements in the 1996 Act, we are persuaded to forbear from applying these provisions under the circumstances here. In particular, we find the interests of customers of customers of broadband Internet access service, under section 10(a)(1) and (a)(2), and the public interest more generally, under section 10(a)(3) is best served by an overall regulatory framework that includes forbearance from these provisions, which balances the need for appropriate Commission oversight with the goal of tailoring its regulatory requirements. The Commission previously has sought to balance the advancement of competition policy with the duty to encourage advanced services deployment pursuant to section 706. Moreover, to the extent that entities otherwise are LECs or incumbent LECs, the forbearance granted in this decision does not eliminate any previously-applicable requirements of sections 251(b) and (c) and our implementing rules. In addition, the Commission retains authority to address unjust or unreasonable conduct through its section 201 and 202 authority. Thus, we do not find the competition policy requirements of sections 251 and 259 and the implementing rules necessary within the meaning of section 10(a)(1) or (2), and conclude that forbearance would be in the public interest under section 10(a)(3). As a result, we forbear from those requirements in the context of broadband Internet access service to the extent that those provisions newly apply by virtue of our classification of that service here.
f. Subscriber Changes (Section 258)514. We also are persuaded, under the section 10(a) framework, to forbear from applying section 258's prohibition on unauthorized carrier changes, and we reject suggestions to the contrary by some commenters. In the voice service context, that provision, and the Commission's implementing rules, provide important protections given the ability of a new provider to effectuate a carrier change not only without the consent of the customer but also without direct involvement of the customer's existing carrier. While unauthorized carrier change problems theoretically might arise even outside such a context, the record here does not reveal whether or how, in practice, unauthorized changes in broadband Internet access service providers could occur. As a result, on this record we are not persuaded what objective would be served by application of this provision at all, particularly given the protections provided by the core broadband Internet access service requirements. As under our analysis of other provisions, we conclude that application of section 258 is not necessary for purposes of sections 10(a)(1) and (a)(2) and that forbearance is in the public interest. Therefore, insofar as our classification of broadband Internet access service would newly give rise to the application of section 258, we forbear from applying section 258 to that service.
g. Other Title II Provisions515. Beyond the provisions already addressed above, we also forbear from applying those additional Title II provisions that could give rise to new requirements by virtue of our classification of broadband Internet access service to the extent of our section 10 authority. We find it notable that no commenters raised significant concerns about forbearing from these requirements, which reinforces our analysis below.
516. For one, we conclude the three-party statutory test under section 10(a) is met to forbear from applying certain provisions concerning BOCs in sections 271 through 276 of the Act to the extent that they would impose new requirements arising from the classification of broadband Internet access service in this Order. Sections 271, 272, 274, and 275 establish requirements and safeguards regarding the provision of interLATA services, electronic publishing, and alarm monitoring services by the Bell Operating Companies (BOCs) and their affiliates. Section 273 addresses the manufacturing, provision, and procurement of telecommunications equipment and customer premises equipment (CPE) by the BOCs and their affiliates, the establishment and implementation of technical standards for telecommunications equipment and CPE, and joint network planning and design, among other matters. Section 276 addresses the provision of ''payphone service,'' and in particular establishes nondiscrimination standards applicable to BOC provision of payphone service.
517. With one exception (discussed below), we conclude that the application of any newly-triggered provisions of sections 271 through 276 to broadband Internet access service is not necessary within the meaning of section 10(a)(1) or (2), and that forbearance from these requirements is consistent with the public interest under section 10(a)(3). Many of the provisions in these sections have no current effect. Other provisions in these sections impose continuing obligations that are at most tangentially related to the provision of broadband Internet access service. Forbearance from any application of these provisions with respect to broadband Internet access service insofar as they are newly triggered by our classification of that service will not meaningfully affect the charges, practices, classifications, or regulations for or in connection with that service, consumer protection, or the public interest. (Consistent with our general approach to forbearance here, which seeks to address new requirements that could be triggered by our classification of broadband Internet access service, we do not forbear with respect to provisions to the extent that they already applied prior to this Order. For example, section 271(c) establishes substantive standards that a BOC was required to meet in order to obtain authorization to provide interLATA services in an in-region state, and which it and must continue to meet in order to retain that authorization. In addition, section 271(c)(2)(B)(iii), requires that a BOC provide nondiscriminatory access to poles, ducts, conduits, and rights-of-way in accordance with the requirements of section 224 of the Act, does not depend upon the classification of BOCs' broadband Internet access service. In combination with section 271(d)(6), this provision provides the Commission with an additional mechanism to enforce section 224 against the BOCs. We also do not forbear from section 271(d)(6) to the extent that it provides for enforcement of the provisions we do not forbear from here. In addition, while the BOC-specific provisions of section 276 theoretically could be newly implicated insofar as the reclassification of broadband Internet access service might result in some entities newly being treated as a BOC, the bulk of section 276 appears independent of the classification of broadband Internet access service and we thus do not forbear as to those provisions.)
518. Forbearance for certain other provisions not meaningfully addressed by commenters also flows from our analysis of certain provisions that commenters did raise or that are discussed in greater detail elsewhere. First, as described elsewhere, we forbear from all ex ante rate regulations, tariffing and related recordkeeping and reporting requirements insofar as they would arise from our classification of broadband Internet access service. Second, we likewise forbear from unbundling and network access requirements that would newly apply based on the classification decision in this Order. It is our predictive judgment that other protections'--notably the core broadband Internet access service requirements'--will be adequate to ensure just, reasonable, and nondiscriminatory conduct by providers of broadband Internet access service and to protect consumers for purposes of sections 10(a)(1) and (a)(2). Further, informed by our responsibilities under section 706, we adopt an incremental regulatory approach that we find strikes the appropriate public interest balance under section 10(a)(3). For these same reasons, we forbear from section 221's property records classification and valuation provisions, which would be used in the sort of ex ante rate regulation that we do not find warranted for broadband Internet access service. Likewise, just as we forbear from broader unbundling obligations, that same analysis persuades us to forbear from applying section 259's infrastructure sharing and notification requirements.
519. We also grant forbearance from other miscellaneous provisions to the extent that they would newly apply as a result of our classification insofar as they do not appear necessary or even relevant for broadband Internet access service of broadband Internet access service. For one, section 226, the Telephone Operator Consumer Services Improvement Act (''TOCSIA''), protects consumers making interstate operator services calls from pay telephones, and other public telephones, against unreasonably high rates and anti-competitive practices. Section 227(c)(3) provides for carriers to have certain notification obligations as it relates to the requirements of the Telephone Consumer Protection Act (TCPA), and section 227(e) restricts the provision of inaccurate caller identification information associated with any telecommunications service. Section 228 regulates the offering of pay-per-call services and requires carriers, inter alia, to maintain lists of information providers to whom they assign a telephone number, to provide a short description of the services the information providers offer, and a statement of the cost per minute or the total cost for each service. Section 260 regulates local exchange carrier practices with respect to the provision of telemessaging services. It is not clear how these provisions would be relevant to broadband Internet access service, and commenters to not provide meaningful arguments in that regard. Thus, for that reason, as well as the continued availability of the core broadband Internet access service requirements, we find enforcement of these provisions, to the extent they would newly apply by virtue of our classification of broadband Internet access service, is not necessary to ensure that the charges, practices, classifications, or regulations by, for, or in connection with broadband providers are just and reasonable and are not unjustly or unreasonably discriminatory under section 10(a)(1). Enforcement also is not necessary for the protection of consumers under section 10(a)(2), and forbearance from applying these provisions is consistent with the public interest under section 10(a)(3), particularly given our conclusion, informed by section 706, that it is appropriate to proceed incrementally here.
520. We also note that the provisions of section 276 underlying the Commission's regulation of inmate calling services (ICS) and the ICS rules themselves do not appear to vary depending on whether broadband Internet access service is an ''information service'' or ''telecommunications service.'' We note, however, that The DC Prisoners' Legal Services Project, Inc., et al. (the ICS Petitioners) express concern that forbearance under this order could be misconstrued as a limitation on the Commission's authority with respect to any advanced ICS services (such as video visitation) that may replace or supplement traditional ICS telephone calls. It is not our intent to limit in any way the Commission's ability to address ICS, particularly given the Commission's finding in 2013 that the ICS market ''is failing to protect the inmates and families who pay [ICS] charges.'' We therefore find that forbearance would fail to meet the statutory test of section 10 of the Act, in that the protections of section 276 remain necessary to protect consumers and serve the public interest. Accordingly, out of an abundance of caution we make clear that we are not forbearing from applying section 276 to the extent applicable to ICS, as well as the ICS rules.
h. Truth-in-Billing Rules521. We also find the section 10(a) criteria met and forbear from applying our truth-in-billing rules insofar as they are triggered by our classification of broadband Internet access service here. The core broadband Internet access requirements, including the requirement of just and reasonable conduct under section 201(b), will provide important protections in this context even without specific rules. Moreover, even advocates of such protections observe that this ''may require further examination by the Commission,'' and do not actually propose that the current truth-in-billing rules immediately apply in practice, instead recommending that the Commission ''temporarily stay these rules [and] implement interim provisions.'' They do not explain what such interim provisions should be, however, and as we explain below we are not persuaded that a stay or time-limited forbearance provides advantages relative to the approach we adopt here. Consequently, as in our analysis above, we are not persuaded that our truth-in-billing rules are necessary for purposes of sections 10(a)(1) and (a)(2), particularly given the availability of the core broadband Internet access service requirements. Likewise, as above, under the tailored regulatory approach we find warranted here, informed by our responsibilities under section 706, we conclude that forbearance is in the public interest under section 10(a)(3).
i. Roaming-Related Provisions and Regulations522. We find section 10(a) met for purposes of granting certain conditional forbearance from roaming regulations. We recognize that the reclassification decisions elsewhere in this Order potentially alter the scope of an MBIAS provider's roaming obligations. The Commission has previously established two different regimes to govern the roaming obligations of commercial mobile providers. The first regime, established in 2007 pursuant to authority under sections 201 and 202 of the Act, imposes obligations to provide automatic roaming on CMRS carriers that ''offer real-time, two-way switched voice or data service that is interconnected with the public switched network and utilizes an in-network switching facility.'' Such carriers were required, on reasonable request, to provide automatic roaming on reasonable and not unreasonably discriminatory terms and conditions.
523. Because this regime did not extend to data services that were not at that time classified as CMRS, the Commission adopted another roaming regime in 2011 under its Title III authority, applicable to ''commercial mobile data services,'' which were defined to include all those commercial mobile services that are not interconnected with the public switched network, including (under the definition of ''public switched network'' applicable at that time) MBIAS. Under this data roaming provision, covered service providers were required to offer roaming arrangements to other such providers on commercially reasonable terms and conditions, subject to certain specified limits.
524. Our determination herein to reclassify MBIAS as CMRS potentially affects the roaming obligations of MBIAS providers in two ways. First, absent any action by the Commission to preserve data roaming obligations, the determination that MBIAS is an interconnected service would result in providers of MBIAS no longer being subject to the data roaming rule, which as noted above, applies only to non-interconnected services. Second, the determination that MBIAS is CMRS potentially subjects MBIAS providers to the terms of the CMRS roaming rules.
525. We decide to retain for MBIAS, at this time, the roaming obligations that applied prior to reclassification of that service, consistent with our intent to proceed incrementally with regard to regulatory changes for MBIAS, and in the absence of significant comment in the instant record regarding the specific roaming requirements that should apply to MBIAS after reclassification. We therefore forbear from the application of the CMRS roaming rule, section 20.12(d), to MBIAS providers, conditioned on such providers continuing to be subject to the obligations, process, and remedies under the data roaming rule codified in section 20.12(e). That condition, coupled with the core broadband Internet access service requirements that remain, persuade us that the forborne-from rules are not necessary at this time for purposes of sections 10(a)(1) and (a)(2) and that such conditional forbearance is in the public interest under section 10(a)(3). We commit, however, to commence in the near term a separate proceeding to revisit the data roaming obligations of MBIAS providers in light of our reclassification decisions today. Such a proceeding will permit us to make an informed decision, based on a complete and focused record, on the proper scope of MBIAS providers' roaming obligations after reclassification. Pending the outcome of that reexamination, MBIAS providers covered by our conditional forbearance continue to be subject to the obligations under the data roaming rule, and we will take any action necessary to enforce those obligations. To ensure, however, that providers have certainty regarding their roaming obligations pending the outcome of the roaming proceeding, we further provide that determinations adopted in that proceeding will apply only prospectively, i.e. only to conduct occurring after the effective date of any rule changes. The data roaming rule, rather than the automatic roaming rule or Title II, will govern conduct prior to any such changes.
j. Terminal Equipment Rules526. We also determine under section 10(a) to forbear from applying certain terminal equipment rules to the extent that they would newly apply by virtue of the classification of broadband Internet access service. (While Full Service Network/TruConnect refer generally to our ''Part 68'' rules, that Part also includes our hearing aid compatibility rules, and as described above, the Commission's existing hearing aid compatibility rules do not immediately impose new hearing aid compatibility requirements on mobile wireless broadband providers by virtue of the classification decisions in this Order, and we do not forbear from applying those rules or section 710 of the Act. Section 710 of the Act and our hearing aid compatibility rules thus are not encompassed by the discussion here.) Notably, our open Internet rules themselves prevent broadband Internet access service providers from restricting the use of non-harmful devices, subject to reasonable network management. (Insofar as any Part 68 rules subject to forbearance here also permitted carriers to take steps to protect their networks, we expect that such steps also would constitute reasonable network management under our open Internet rules.) Consequently, as in our analysis above, we are not persuaded that the application of terminal equipment rules, insofar as they would newly apply to broadband Internet access service providers by virtue of our classification decision here, are necessary for purposes of sections 10(a)(1) and (a)(2), particularly given the availability of the core broadband Internet access service requirements, and in particular our bright-line rules. Likewise, as above, under the tailored regulatory approach we find warranted here, informed by our responsibilities under section 706, we conclude that forbearance is in the public interest under section 10(a)(3).
3. Other Provisions and Regulations527. Having discussed in detail here and above the analyses that persuade us to grant broad forbearance from Title II provisions to the extent of our section 10 authority, we conclude that the same analysis justifies forbearance from other provisions and regulations insofar as they would be triggered by the classification of broadband Internet access service in this Order. In particular, beyond the Title II provisions and certain implementing rules discussed above, the classification of broadband Internet access service could give rise to obligations related to broadband providers' provision of that service under Title III, Title VI and Commission rules.
First, certain provisions of Titles III and VI and Commission rules (For clarity, we note that by ''rules'' we mean both codified and uncodified rules. In addition, by ''associated'' Commission rules, we mean rules implementing requirements or substantive Commission jurisdiction under provisions in Title II, III, and/or VI of the Act from which we forbear.) associated with those Titles or the provisions of Title II from which we forbear may apply by their terms to providers classified in particular ways. (The Order's classification of broadband Internet access service could trigger requirements that apply by their terms to ''common carriers,'' ''telecommunications carriers,'' ''providers'' of common carrier or telecommunications services, or ''providers'' of CMRS or commercial mobile services. Similarly, other provisions of the Act and Commission rules may impose requirements on entities predicated on the entities' classification as a ''common carrier,'' ''telecommunications carrier,'' ''provider'' of common carrier or telecommunications service, or ''provider'' of CMRS or commercial mobile service without being framed in those terms.) As to this first category of requirements, and except as to the core broadband Internet access service requirements, we forbear from any such provisions and regulations to the full extent of our authority under section 10, but only insofar as a broadband provider falls within those categories or provider classifications by virtue of its provision of broadband Internet access service, but not insofar as those entities fall within those categories of classifications by virtue of other services they provide.Second, certain provisions of Titles III and VI and Commission rules associated with those Titles or the provisions of Title II from which we forbear may apply by their terms to services classified in particular ways. (The classification of broadband Internet access service as a telecommunications service and, in the mobile context, also CMRS service under the Communications Act, thus could trigger any requirements that apply by their terms to ''common carrier services,'' ''telecommunications services,'' or ''CMRS'' or ''commercial mobile'' services. Similarly, other provisions of the Act and Commission rules may impose requirements on services predicated on a service's classification as a ''common carrier service,'' ''telecommunications service,'' ''CMRS'' or ''commercial mobile'' service without being framed in those terms.) Regarding this second category of requirements (to the extent not already covered by the first category, above), and except as to the core broadband Internet access service requirements, we forbear from any such provisions and regulations to the full extent of our authority under section 10 specifically with respect to broadband Internet access service, but do not forbear from these requirements as to any other services (if any) that broadband providers offer that are subject to these requirements.Third, while commenters do not appear to have identified such rules, there potentially could be other Commission rules for which our underlying authority derives from provisions of the Act all of which we forbear from under the first two categories of requirements identified above, or under our Title II forbearance discussed above, but which are not already subject to that identified scope of forbearance. To the extent not already identified in the first two categories of requirements above, and except as to the core broadband Internet access service requirements, we forbear to the full extent of our authority under section 10 from rules based entirely on our authority under provisions we forbear from under the first and second categories above (or for which the forborne-from provisions provide essential authority) insofar as the rules newly apply as a result of the classification of broadband Internet access service.Fourth, we include within the scope of our broad forbearance for broadband Internet access service any pre-existing rules with the primary focus of implementing the requirements and substantive Commission jurisdiction in sections 201 and/or 202, including forbearing from pre-existing pricing, accounting, billing and recordkeeping rules. (This forbearance would not include rules implementing our substantive jurisdiction under provisions of the Act from which we do not forbear that merely cite or rely on sections 201 or 202 in some incidental way, such as by, for example, relying on the rulemaking authority provided in section 201(b). Consistent with our discussions above, this category also does not include our open Internet rules.) As with the rules identified under the first and second categories above, we do not forbear insofar as a provider is subject to these rules by virtue of some other service it provides.Fifth, the classification of broadband Internet access service as a telecommunications service could trigger certain contributions to support mechanisms or fee payment requirements under the Act and Commission rules, including some beyond those encompassed by the categories above. Insofar as any provisions or regulations not already covered above would immediately require the payment of contributions or fees by virtue of the classification of broadband Internet access service (rather than merely providing Commission authority to assess such contributions or fees) they are included within the scope of our forbearance. As under the first and second categories above, we do not forbear insofar as a provider is subject to these contribution or fee payments by virtue of some other service it provides.Just as we found in our analysis of Title II provisions, it is our predictive judgment that other protections'--notably the core broadband Internet access service requirements'--will be adequate to ensure just, reasonable, and nondiscriminatory conduct by providers of broadband Internet access service and to protect consumers for purposes of sections 10(a)(1) and (a)(2). Further, informed by our responsibilities under section 706, we adopt an incremental regulatory approach that we find strikes the appropriate public interest balance under section 10(a)(3). These collectively persuade us that forbearance for the additional categories of provisions and regulations above is justified to the extent of our section 10 authority.
528. We further make clear that our approach to forbearance in this Order, which excludes certain categories of provisions and regulations, effectively addresses the concerns of a number of commenters regarding the scope of our forbearance. First, we forbear here only to the extent of our authority under section 10 of the Act. Section 10 provides that ''the Commission shall forbear from applying any regulation or any provision of this chapter to a telecommunications carrier or telecommunications service, or class of telecommunications carriers or telecommunications services'' if certain conditions are met. Certain provisions or regulations do not fall within the categories of provisions of the Act or Commission regulations encompassed by that language because they are not applied to telecommunications carriers or telecommunications services, and we consequently do not forbear as to those provisions or regulations.
529. Second, we do not forbear from provisions or regulations that are not newly triggered by the classification of broadband Internet access service. The 2014 Open Internet NPRM sought comment on possible forbearance premised on addressing the consequences that flowed from any classification decisions it might adopt. Although some commenters include sweeping requests that we forbear from all of Title II or the like, in practice, they, too, appear focused on the consequences of classification decisions. Nor do we find on the record here that the section 10 criteria met with respect to such forbearance, and in particular do not find it in the public interest, in the context of this item, to forbear with respect to requirements that already applied to broadband Internet access service and providers of that service prior to this Order. Rather, broadband providers remain free to seek relief from such provisions or regulations through appropriate filings with the Commissions.
530. A number of commenters' arguments are addressed on one or more of these grounds. (In addition to those discussed below, these considerations explain, for example, why we do not grant forbearance with respect to sections 303(b), 303(r) and 316, upon which we rely for authority for our open Internet rules.) For example, as to the first set of exclusions, we note that section 257 imposes certain obligations on the Commission without creating enforceable obligations that the Commission would apply to telecommunications carriers or telecommunications services, so we do not forbear from applying those provisions. For the same reasons, we do not forbear with respect to provisions insofar as they merely reserve state authority.
531. We further note, for example, that the immunity from liability in section 230(c) applies to providers or users of an ''interactive computer service,'' and its application does not vary based on the classification of broadband Internet access service here. Consequently, it is not covered by the scope of forbearance in this order. We also note that the restrictions on obscene and illicit content in sections 223 and 231(to the extent enforced)'--as well as the associated limitations on liability'--in many cases, do not vary with the classification decisions in this Order, and thus likewise are not encompassed by the forbearance in this Order. (As a narrow exception to this general conclusion, section 223(c)(1) conceivably could be newly applied to broadband providers by virtue of the classification decisions in this Order. No commenter meaningfully argues that the Commission should apply this provision to broadband providers, and that fact, coupled with the other protections that remain, persuade us that, insofar as the Commission would apply this provision, such application is not necessary for purposes of sections 10(a)(1) and (a)(2). Likewise, consistent with the tailored regulatory approach adopted in this Order, we find it in the public interest under section 10(a)(3) to forbear insofar as the Commission otherwise would newly apply that provision to a broadband provider as a result of this Order.) To the extent that certain of these provisions would benefit broadband providers and could instead be viewed as provisions that are newly applied to broadband providers by virtue of the classification decisions in this Order, it would better promote broadband deployment, and thus better serve the public interest, if we continue to apply those provisions. We thus find that such forbearance would not be in the public interest under section 10(a)(3).
532. Some commenters also advocate that the Commission not forbear from applying ''the provisions of the Communications Assistan[ce] for Law Enforcement Act under section 229.'' Section 229(a)-(d) direct the Commission to adopt rules implementing the requirements of CALEA and authorize the Commission to investigate and enforce those rules. Section 229(e) enables providers to recover certain costs of CALEA compliance. Section 229 is not, by its terms, limited to ''telecommunications services'' as defined by the Communication Act, and CALEA obligations already apply to broadband Internet access service. Thus, in carrying out section 229, the Commission's role already extended to broadband Internet service, and all telecommunications carriers subject to CALEA are already required to comply with all Commission rules adopted pursuant to section 229. Declining to forbear from applying section 229 and our associated rules is consistent with the overall approach, discussed above, of focusing on addressing newly-arising requirements flowing from our classification decision, and thus is in the public interest. Given that CALEA's statutory obligations will apply regardless of any forbearance granted by the Commission under the Communications Act, and given the lack of any substantial argument in the record in favor of forbearance from section 229, we conclude that maintaining the Commission's existing rulemaking and oversight role as established by section 229 better advances the public interest. As services and technologies evolve over time, CALEA implementation will need to evolve as well. Section 229 establishes a rulemaking and oversight role for the Commission that helps enable those future changes. If we were to forbear from section 229 (assuming arguendo that we could find the forbearance standard to be satisfied), we thus would frustrate the ability of CALEA implementation to evolve with technology, an outcome that we find fundamentally inconsistent with the continued applicability of CALEA itself and therefore with the public interest.
533. We also do not forbear from certain rules governing the wireless licensing process. First, our rules require applicants for licenses under our flexible use rules to designate the regulatory status of proposed services (i.e., common carrier, non-common carrier, or both) in the initial license application, and make subsequent amendment to the designation, as necessary. With regard to these rules, we find that forbearance of the regulatory status designation would result in inaccurate license information and therefore is not warranted. In particular, we conclude that such forbearance would be contrary to the public interest under section 10(a)(3).
534. Second, sections 1.933 and 1.939 of our rules, 47 CFR 1.933, 1.939, implementing sections 309(b) and (d)(1) of the Act, 47 U.S.C. 309(b), (d)(1), set out processes for license applications for authorization, major modification, major amendment, substantial assignment, or transfer. Applications that involve, in whole or in part, licenses to be used for ''Wireless Telecommunications Services,'' as defined in section 1.907 of our rules, are subject to a public notice process providing opportunity for petitions to deny, but applications that involve only ''Private Wireless Services,'' as defined in section 1.907 of our rules are not subject to that process.
535. With regard to these rules, we find that reclassification is unlikely to trigger a different process under these rules, for two reasons. We note that mobile BIAS today is being provided using licenses that are governed under our flexible use rules (i.e., under parts 20, 22, 24, 26, and 27) and that are being used as well to provide services, such as mobile voice, already provided as CMRS. Thus, these applications have been subject to these provisions because they have also been used to provide CMRS services. To the extent applicants seek licenses for reclassified service under other parts, such as Part 101, or are otherwise not covered by the above reasoning, we find that forbearance from these procedures is not warranted, as the public notice process requirements are important to ensure that common carrier licensing serves the public interest. Accordingly, we do not find forbearance from applying these rules in the public interest under section 10(a)(3), and thus we do not forbear from application of section 309(b) and (d)(1) of the Act, or from rules 1.931, 1.933, 1.939, 22.1110, and 27.10.
D. Potential Objections to Our General Approach to Forbearance for Broadband Internet Access Service536. While we address above specific arguments against forbearance as to particular provisions or requirements, we note that we also reject certain overarching concerns about our forbearance decision here. For one, we grant substantial forbearance in this item, rather than deferring such forbearance decisions to future proceedings. We are able to conclude on this record that the section 10(a) criteria are met with respect to the forbearance we grant, and taking such action here enables us to strike the right regulatory and deregulatory balance regarding broadband Internet access service, as discussed above. Under these circumstances we reject arguments that we should defer forbearance to future proceedings. Likewise, given our finding that the section 10(a) criteria are met for the forbearance adopted here, we reject generalized arguments that the scope of forbearance here should be the same as that historically granted in the CMRS context. We conclude that such overarching claims do not address distinguishing factors here, including our decision that it is in the public interest to proceed incrementally given the regulatory experience of the near-term past coupled with the Commission's responsibilities under section 706 of the 1996 Act, as discussed above. Further, because we grant substantial forbearance in this Order rather than deferring those issues to a future proceeding, we also reject concerns that the process of obtaining forbearance will be burdensome or uncertain, insofar as they are based on a presumption that such relief only would be granted via subsequent proceedings. (The posture here is distinguishable from the circumstances underlying the Brand X case, where a court had classified cable modem service as a telecommunications service without simultaneous forbearance of the sort we adopt here, and thus we reject arguments seeking to rely on court filings there.)
537. Nor are we persuaded by arguments that the adoption of interim rules or the stay of all but certain rules should be used in lieu of forbearance, since those arguments do not explain in meaningful detail what specific interim rules would be adopted or the scope of what rules would be excluded from any stay, nor how, absent forbearance, interim rules or a stay by the Commission could address requirements imposed by the Act, rather than merely by Commission regulation. To the extent that commenters' arguments instead advocate that forbearance should be interim or time-limited, under today's approach, we retain adequate authority to modify our regulatory approach in the future, should circumstances warrant. We thus are not persuaded that there is any material, incremental advantage or benefit to adopting forbearance on an interim or time-limited basis.
538. We also reject claims that the Commission cannot grant forbearance here because it did not provide adequate notice and an opportunity for comment. We need not and do not address here whether forbearance is, in all cases, informal rulemaking, because in this instance we have, in fact, proceeded via rulemaking and provided sufficient notice and an opportunity to comment in that regard. section 553(b) and (c) of the APA requires agencies to give public notice of a proposed rulemaking that includes ''either the terms or substance of the proposed rule or a description of the subjects and issues involved'' and to give interested parties an opportunity to submit comments on the proposal. The notice ''need not specify every precise proposal which [the agency] may ultimately adopt as a rule''; it need only ''be sufficient to fairly apprise interested parties of the issues involved.'' Moreover, the APA's notice requirements are satisfied where the final rule is a ''logical outgrowth'' of the actions proposed. As long as parties should have anticipated that the rule ultimately adopted was possible, it is considered a ''logical outgrowth'' of the original proposal, and there is no violation of the APA's notice requirements.
539. Those notice standards are satisfied with respect to the forbearance adopted here. The 2014 Open Internet NPRM observed:
Citing section 10 of the Act, the Commission then sought comment ''on the extent to which forbearance from certain provisions of the Act or our rules would be justified'' should the Commission adopt such an approach ''in order to strike the right balance between minimizing the regulatory burden on providers and ensuring that the public interest is served.'' (The Commission further sought comment on ''which provisions should be exempt from forbearance and which should receive it'' based on whether such action would ''protect and promote Internet openness.''Id. at 5616, para. 154. These are the factors that the Commission did, in fact, use in evaluating the section 10(a) criteria and deciding whether and how much forbearance to grant here.) ''For mobile broadband services,'' the Commission also sought ''comment on the extent to which forbearance should apply, if the Commission were to classify mobile broadband Internet access service as a CMRS service subject to Title II.'' Collectively, the Commission thus provided notice of possible forbearance as to any provision of the Act or Commission rules triggered by the classification of broadband Internet access service of the sort we adopt in this Order. (Within that scope, the Commission also sought more detailed comment on specific aspects of the possible forbearance it might adopt, discussing similar questions raised in the 2010 Broadband Classification NOI, particular statutory provisions from which the Commission might not forbear, and particular approaches the Commission might use to evaluating forbearance. Moreover, as discussed in the preceding sections above, the 2014 Open Internet NPRM yielded a robust record regarding forbearance.) The forbearance we grant here from applying certain provisions and regulations newly triggered by our classification decisions in order to strike the right regulatory balance for broadband Internet access services consistent with the objective of preserving and protecting Internet openness is squarely within that scope of notice provided by the 2014 Open Internet NPRM.
540. We also view as misguided complaints about the potential for our forbearance decisions to be challenged in court or reversed in the future by the Commission. Having concluded that broadband Internet access service is a telecommunications service, certain legal consequences under the Act flow from that by default. We grant in this order the substantial forbearance from those provision and other Commission regulations to the extent that we find warranted at this time under the section 10 framework. We thereby provide broadband providers significant regulatory certainty. (Perfect regulatory certainty would not be feasible under any classification. For example, even just as to rules adopted under section 706 of the 1996 Act parties theoretically could raise judicial challenges as to the adequacy of the Commission's rules in meeting the objectives of section 706 and a future Commission likewise might elect to modify those rules.) We thus are not persuaded to alter our approach to forbearance based on these arguments.
541. We recognize that in our approach to forbearance for broadband Internet access service above, we are not first exhaustively determining provision-by-provision and regulation-by-regulation whether and how particular provisions and rules apply to this service. The Commission has broad discretion whether to issue a declaratory ruling, which is what would be entailed by such an undertaking. We exercise our discretion not to do so here, except to the limited extent necessary to address arguments in the record regarding specific requirements. For one, the Commission need not resolve whether or how a provision or regulation applies before evaluating the section 10(a) criteria'--rather, it can conduct that evaluation and, if warranted, grant forbearance within the scope of its section 10 authority assuming arguendo that the provisions or regulations apply. In addition, as discussed in greater detail above, the Commission is proceeding incrementally here. As the D.C. Circuit has recognized, within the statutory framework that Congress established, the Commission ''possesses significant, albeit not unfettered, authority and discretion to settle on the best regulatory or deregulatory approach to broadband.'' Thus, to achieve the balance of regulatory and deregulatory policies adopted here for broadband Internet access service, we need not'--and thus do not'--first resolve potentially complex and/or disputed interpretations and applications of the Act and Commission rules that could create precedent with unanticipated consequences for other services beyond the scope of this proceeding, and which would not alter the ultimate regulatory outcome in this Order in any event.
542. The actions we take today are fully consistent with the Constitution. Some commenters contend that the open Internet rules burden broadband providers' First Amendment rights and effect uncompensated takings of private property under the Fifth Amendment. We examine these arguments below and find them unfounded.
A. First Amendment1. Free Speech Rights543. The rules we adopt today do not curtail broadband providers' free speech rights. When engaged in broadband Internet access services, broadband providers are not speakers, but rather serve as conduits for the speech of others. The manner in which broadband providers operate their networks does not rise to the level of speech protected by the First Amendment. As telecommunications services, broadband Internet access services, by definition, involve transmission of network users' speech without change in form or content, so open Internet rules do not implicate providers' free speech rights. And even if broadband providers were considered speakers with respect to these services, the rules we adopt today are tailored to an important government interest'--protecting and promoting the open Internet and the virtuous cycle of broadband deployment'--so as to ensure they would survive intermediate scrutiny.
544. This is not to say that we are indifferent to matters of free speech on the Internet. To the contrary, our rules serve First Amendment interests of the highest order, promoting ''the widest possible dissemination of information from diverse and antagonistic sources'' and ''assuring that the public has access to a multiplicity of information sources'' by preserving an open Internet. We merely acknowledge that the free speech interests we advance today do not inhere in broadband providers with respect to their provision of broadband Internet access services.
545. Some commenters contend that because broadband providers distribute their own and third-party content to customers, rules that govern the transmission of Internet content over broadband networks violate their free speech rights. CenturyLink and others compare the operation of broadband Internet access service to ''requiring a cable operator to carry all broadcast stations,'' and contend that the rules adopted today ''displace access service providers' editorial control over their networks'' which would otherwise constitute protected speech under the First Amendment. Other commenters respond that broadband providers are not engaged in speech when providing broadband Internet access services, so they are not entitled to First Amendment protections in their operation of these services. Consistent with our determination in the 2010 Open Internet Order, we find that when broadband providers offer broadband Internet access services, they act as conduits for the speech of others, not as speakers themselves.
546. Claiming free speech protections under the First Amendment necessarily involves demonstrating status as a speaker'--absent speech, such rights do not attach. In determining the limits of the First Amendment's protections for courses of conduct, the Supreme Court has ''extended First Amendment protections only to conduct that is inherently expressive.'' To determine whether an actor's conduct possesses ''sufficient communicative elements to bring the First Amendment into play,'' the Supreme Court has asked whether ''[a]n intent to convey a particularized message was present and [whether] the likelihood was great that the message would be understood by those who viewed it.''
547. Broadband providers' conduct with respect to broadband Internet access services does not satisfy this test, and analogies to other forms of media are unavailing. CenturyLink and others compare their provision of broadband service to the operation of a cable television system, and point out that the Supreme Court has determined that cable programmers and cable operators engage in editorial discretion protected by the First Amendment. As a factual matter, broadband Internet access services are nothing like the cable service at issue in Turner I. In finding that cable programmers and cable operators are entitled to First Amendment protection, the Turner I court began with the uncontested assertion that ''cable programmers and operators engage in and transmit speech, and they are entitled to the protection of the speech and press provisions of the First Amendment.'' The court went on to explain that ''cable programmers and operators `see[k] to communicate messages on a wide variety of topics and in a wide variety of formats' '' through ''original programming or by exercising editorial discretion over which stations or programs to include in its repertoire.'' (Likewise, while a newspaper publisher chooses which material to publish, broadband providers facilitate access to all or substantially all Internet endpoints. See Miami Herald Publishing Co. v. Tornillo, 418 U.S. 241, 257 (1974). In contrast, broadband Internet access services more closely resemble the ''conduit for news, comment, and advertising'' from which the Court distinguishes newspaper publishing.) Cable operators thus engage in protected speech when they both engage in and transmit speech with the intent to convey a message either through their own programming directly or through contracting with other programmers for placement in a cable package.
548. Broadband providers, however, display no such intent to convey a message in their provision of broadband Internet access services'--they do not engage in speech themselves but serve as a conduit for the speech of others. The record reflects that broadband providers exercise little control over the content which users access on the Internet. Broadband providers represent that their services allow Internet end users to access all or substantially all content on the Internet, without alteration, blocking, or editorial intervention. End users, in turn, expect that they can obtain access to all content available on the Internet, without the editorial intervention of their broadband provider. While these characteristics certainly involve transmission of others' speech, the accessed speech is not edited or controlled by the broadband provider but is directed by the end user. (To be sure, broadband providers engage in some reasonable network management designed to protect their networks from malicious content and to relieve congestion, but these practices bear little resemblance to the editorial discretion exercised by cable operators in choosing programming for their systems.) In providing these services, then, broadband providers serve as mere conduits for the messages of others, not as agents exercising editorial discretion subject to First Amendment protections.
549. Moreover, broadband is not subject to the same limited carriage decisions that characterize cable systems'--the Internet was designed as a decentralized ''network of networks'' which is capable of delivering an unlimited variety of content, as chosen by the end user. In contrast, the Turner I court emphasized that the rules under consideration in that case regulated cable speech by ''reduc[ing] the number of channels over which cable operators exercise unfettered control'' and ''render[ing] it more difficult for cable programmers to compete for carriage on the limited channels remaining.'' Neither of these deprivations of editorial discretion translates to the Internet as a content platform. The arrival of one speaker to the network does not reduce access to competing speakers; nor are broadband providers limited by our rules in the direct exercise of their free speech rights. Lacking the exercise of editorial control and an intent to convey a particularized message, we find that our rules regulate the unexpressive transmission of others' speech over broadband Internet access services, not the speech of broadband providers. As our rules merely affect what broadband providers ''must do. . . not what they may or may not say,'' the provision of broadband Internet access services falls outside the protections of the First Amendment outlined by the court in Turner I. (We further conclude that broadband providers' conduct is not sufficiently expressive to warrant First Amendment protection, as the provision of broadband Internet access services is not ''inherently expressive,'' but would require significant explanatory speech to acquire any characteristics of speech.)
550. Our conclusion that broadband Internet access service providers act as conduits rather than speakers holds true regardless of how they are classified under the Act. But we think this is particularly evident given our classification of broadband Internet access services as telecommunications services subject to Title II. The Act defines ''telecommunications'' as the ''transmission, between or among points specified by the user, of information of the user's choosing, without change in the form or content of the information as sent and received.'' The Act also provides for common carrier treatment of any provider to the extent it is engaged in providing telecommunications services. In the communications context, common carriage requires that end users ''communicate or transmit intelligence of their own design and choosing.'' In section IV, we have found that broadband Internet access services fall within the definitions of ''telecommunications'' and ''telecommunications services'' subject to Title II common carrier regulation. By definition, then, the provision of telecommunications service does not involve the exercise of editorial control or judgment. (We also note that the requirement under Computer II that facilities-based providers of ''enhanced services'' separate out and offer on a common carrier basis the ''basic service'' transmission component underlying their enhanced services, a requirement reflected in the 1996 Act's distinction between ''telecommunications services'' and ''information services'' was never held to raise First Amendment concerns. The Supreme Court has acknowledged the distinction between common carriers and entities with robust First Amendment rights in numerous contexts.)
551. We also take note that, in other contexts, broadband providers have claimed immunity from copyright violations and other liability for material distributed on their networks because they lack control over what end users transmit and receive. Broadband providers are not subject to subpoena in a copyright infringement case because as a provider it ''act[s] as a mere conduit for the transmission of information sent by others.'' Acknowledging the unexpressive nature of their transmission function, Congress has also exempted broadband providers from defamation liability arising from content provided by other information content providers on the Internet. Given the technical characteristics of broadband as a medium and the representations of broadband providers with respect to their services, we find it implausible that broadband providers could be understood to being conveying a particularized message in the provision of broadband Internet access service.
552. Even if open Internet rules were construed to implicate broadband providers' rights as speakers, our rules would not violate the First Amendment because they would be considered content-neutral regulations which easily satisfy intermediate scrutiny. In determining whether a regulation is content-based or content-neutral, the ''principal inquiry . . . is whether the government adopted a regulation of speech because of [agreement or] disagreement with the message it conveys.'' The open Internet rules adopted today apply independent of content or viewpoint. Instead, they are triggered by a broadband provider offering broadband Internet access services. The rules are structured to operate in such a way that no speaker's message is either favored or disfavored, i.e. content neutral.
553. A content-neutral regulation will survive intermediate scrutiny if ''it furthers an important or substantial government interest . . . unrelated to the suppression of free expression,'' and if ''the means chosen'' to achieve that interest ''do not burden substantially more speech than is necessary.'' The government interests underlying this Order are clear and numerous. Congress has expressly tasked the Commission with ''encourag[ing] the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans,'' and has elsewhere explained that it is the policy of the United States to ''promote the continued development of the Internet and other interactive computer services and other interactive media.'' Additionally, the Verizon court accepted the Commission's finding that ''Internet openness fosters the edge-provider innovation that drives [the] `virtuous cycle.' '' As discussed above, this Order pursues these government interests by preserving an open Internet to encourage competition and remove impediments to infrastructure investment, while enabling consumer choice, end-user control, free expression, and the freedom to innovate without permission.
554. Indeed, rather than burdening free speech, the rules we adopt today ensure that the Internet promotes speech by ensuring a level playing field for a wide variety of speakers who might otherwise be disadvantaged. As Turner I affirmed ''assuring that the public has access to a multiplicity of information sources is a governmental purpose of the highest order, for it promotes values central to the First Amendment.'' (The Turner I Court continued: ''Indeed, it has long been a basic tenet of national communications policy that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public.'') Based on clear legislative interest in furthering broadband deployment and the paramount government interest in assuring that the public has access to a multiplicity of information sources, these interests clearly qualify as substantial under intermediate scrutiny.
555. Additionally, the rules here are sufficiently tailored to accomplish these government interests. The effect on speech imposed by these rules is minimal. The rules do not ''burden substantially more speech than necessary'' because they do not burden any identifiable speech'--the rules we adopt today apply only to broadband providers' conduct with regard to their broadband Internet access services. Providers remain free to engage in the full panoply of protected speech afforded to any other speaker. They are free to offer ''edited'' services and engage in expressive conduct through the provision of other data services, as well.
556. Verizon also contends that the open Internet rules are impermissible under Citizens United because they result in differential treatment of providers of broadband service and other connected IP services. Our rules governing the practices of broadband providers differ markedly from the statutory restrictions on political speech at issue in Citizens United. Our rules do not impact core political speech, where the ''First Amendment has its fullest and most urgent application.'' By contrast, the open Internet rules apply only to the provision of broadband services in a commercial context, so reliance on the strict scrutiny standards applied in Citizens United is inapt. As described above, intermediate scrutiny under Turner I would be the controlling standard of review if broadband providers were found to be speakers. If a court were to find differential treatment under our rules, though, they would be justified under Turner I because speaker-based distinctions can be deemed permissible so long as they are '' `justified by some special characteristic of' the particular medium being regulated.' '' The ability and incentive of broadband providers to impose artificial scarcity and pick winners and losers in the provision of their last-mile broadband services is just such a special characteristic justifying differential treatment.
557. In sum, the rules we adopt today do not unconstitutionally burden any of the First Amendment rights held by broadband providers. Broadband providers are conduits, not speakers, with respect to broadband Internet access services. Even if they were engaged in speech with respect to these services, the rules we adopt today are tailored to the important government interest in maintaining an open Internet as a platform for expression, among other things.
2. Compelled Disclosure558. The disclosure requirements adopted as a part of our transparency rule also fall well within the confines of the First Amendment. As explained above, these required disclosures serve important government purposes, ensuring that end users and edge providers have accurate and accessible information about broadband providers' services. This information is central both to preventing consumer deception and to the operation of the virtuous cycle of innovation, consumer demand, and broadband deployment.
559. CenturyLink contends that the disclosure requirements under the transparency rule violate the First Amendment by compelling speech without a reasonable basis. They argue that the Commission has not established a potential problem which these disclosures are necessary to remedy and that this is fatal to the rules under the First Amendment. This argument misapprehends both the factual justification for the transparency rules and the constitutional legal standard against which any disclosure requirements would be evaluated by the courts.
560. The Supreme Court has made plain in Zauderer v. Office of Disciplinary Counsel of Supreme Court of Ohio that the government has broad discretion in requiring the disclosure of information to prevent consumer deception and ensure complete information in the marketplace. Under Zauderer's rational basis test, mandatory factual disclosures will be sustained ''as long as disclosure requirements are reasonably related to the State's interest in preventing deception to consumers.'' As the Court observed, ''the First Amendment interests implicated by disclosure requirements are substantially weaker than those at stake when speech is actually suppressed;'' the speaker's interest is ''minimal.'' The D.C. Circuit recently reaffirmed these principles in American Meat Institute v. United States Department of Agriculture, an en banc decision in which the Court joined the First and Second Circuit Courts of Appeals in recognizing that other government interests beyond preventing consumer deception may be invoked to sustain a disclosure mandate under Zauderer.
561. The transparency rule clearly passes muster under these precedents. Preventing consumer deception in the broadband Internet access services market lies at the heart of the transparency rule we adopt today. The Commission has found that broadband providers have the incentive and ability to engage in harmful practices, as discussed above in section III.B.2. In the 2010 Open Internet Order, we found that ''disclosure ensures that end users can make informed choices regarding the purchase and use of broadband service.'' Since the original transparency rule was promulgated, the Commission has received hundreds of complaints regarding advertised rates, slow or congested services, data caps, and other potentially deceptive practices. Similarly, the enhancements to the transparency rule which we adopt today are designed to prevent confusion to all consumers of the broadband providers' services'--end-users and edge providers alike. Tailored disclosures promise to provide a metric against which these customers can judge whether their broadband connections satisfy the speeds, bandwidth, and other terms advertised by broadband providers.
562. Further buttressing these disclosure requirements are numerous other government interests permitted under American Meat Institute. As acknowledged by the D.C. Circuit in Verizon, broadband providers have both the economic incentive and the technical ability to interfere with third-party edge providers' services by imposing discriminatory restrictions on access and priority. The disclosures we require under today's transparency rule serve to curb those incentives by shedding light on the business practices of broadband providers. Accurate information about broadband provider practices encourages the competition, innovation, and high-quality services that drive consumer demand and broadband investment and deployment. Tailored disclosures further amplify these positive effects by ensuring that edge providers have critical network information necessary to develop innovative new applications and services and that end users have confidence in the broadband providers' network management and business practices. In sum, the other government interests supporting the rules in addition to preventing consumer deception'--preserving an open Internet to encourage competition and remove impediments to infrastructure investment, while enabling consumer choice, end-user control, free expression, and the freedom to innovate without permission'--are substantial and justify our transparency requirements.
B. Fifth Amendment Takings563. The open Internet rules also present no cognizable claims under the Fifth Amendment's Takings Clause. Today's decision simply identifies as common carriage the services that broadband Internet access service providers already offer in a manner that carries with it certain statutory duties. Regulatory enforcement of those duties has never been held to raise takings concerns. Correspondingly, our rules do not rise to the level of a per se taking because they do not grant third parties a right to physical occupation of the broadband providers' property. Finally, they do not constitute a regulatory taking because they actually enhance the value of broadband networks by protecting the virtuous cycle that drives innovation, user adoption, and infrastructure investment.
564. As an initial matter, we note that our reclassification of broadband Internet access service does not result from compelling the common carriage offering of those services, contrary to the claims of some broadband providers. Rather, our decision simply identifies as common carriage the services that broadband Internet access service providers already voluntarily offer in a manner that, under the Communications Act, carries with it certain statutory duties, which have never been held to raise takings concerns. Today's Order recognizes that broadband Internet access service is a telecommunications service under Title II of the Act. While certain common carriage obligations attach to recognition of this fact, those requirements operate by virtue of the statutory structure we interpret, not in service to a discretionary ''policy goal the Commission seeks to advance.'' Such statutory obligations have never before posed takings issues, and we conclude that today's Order, likewise, does not violate the Fifth Amendment.
565. Verizon specifically contends that without either a finding of monopoly power or a restriction on government entry, ''compelled common carriage would constitute a government taking.'' They cite approvingly Judge Wilkey's observation in NARUC I that ''early common carriage regulations were `challenged as deprivations of property without due process.' '' However, Judge Wilkey continues in the next sentence to explain that Congress has regularly imposed common carrier obligations without a showing of monopoly power or entry restrictions. Verizon's suggestion, when extended to its logical conclusion, would necessitate rendering unconstitutional any common carriage obligations outside of true government-sponsored monopolies. The courts have taken a much narrower view of both the characteristics necessary for common carrier status and the effect of that status on takings claims when present in a non-monopoly context. Correspondingly, we conclude that today's classifications, without a showing of monopoly power do not constitute takings under the Fifth Amendment.
1. Per Se Takings566. Some commenters argue that our rules would effect a per se taking by granting third parties a perpetual easement onto broadband providers' facilities, a form of physical occupation. These arguments mischaracterize the nature of the rules we adopt today and misapply Fifth Amendment jurisprudence. To qualify as a per se taking, the challenged government action must authorize a permanent physical occupation of private property. (The government may also commit a per se taking by completely depriving an owner of all economically beneficial use of her property. However, the record does not reflect a concern among commenters that our actions today deprive broadband providers of all economically beneficial use of their property'--nor do we find one merited'--so we limit our discussion to the permanent physical occupation variety of per se takings.) This rule, however, is ''very narrow'' and it does not ''question the equally substantial authority upholding a State's broad power to impose appropriate restrictions upon an owner's use of his property.'' The Supreme Court has advised that a per se taking is ''relatively rare and easily identified'' and ''presents relatively few problems of proof.''
567. Under this formulation, today's Order does not impose a per se taking on broadband providers. Regulation of the transmissions travelling over a broadband providers' property differs substantially from physical occupations which are the hallmark of per se takings, such as the installation of cable equipment at issue in Loretto v. Teleprompter CATV Corp. We do not require the permanent installation of any third-party equipment at broadband providers' network facilities, or deprive broadband providers of existing property interests in their networks'--a broadband provider retains complete control over its property. (The Supreme Court has further cabined this per se takings rule by noting that some permanent incursions onto private property could be acceptable if the property owner owned the installation and retained discretion in how to deploy it. Were our rules found to impose a permanent physical occupation on broadband providers' networks, broadband services seem to fall squarely within this exception. Broadband Internet access services are characterized as distinctly user-directed. Further, providers retain discretion in the deployment of their facilities and are free to manage traffic through reasonable network management.) Our rules merely regulate the use of a broadband Internet access provider's network'--they are neither physical nor permanent occupations of private property. Courts have repeatedly declined to extend per se takings analysis to rules regulating the transmission of communications traffic over a provider's facilities, and we believe that these decisions comport with the Supreme Court's perspective that permanent physical occupation of property is a narrow category of takings jurisprudence and is ''easily identifiable'' when it does occur.
568. Moreover, to the extent that broadband providers voluntarily open their networks to end users and edge providers, reasonable regulation of the use of their property poses no takings issue. When owners voluntarily invite others onto their property'--through contract or otherwise'--the courts will not find that a permanent physical occupation has occurred. So long as property owners remain free to avoid physical incursions on their property by discontinuing the services to which it has been dedicated, reasonable conduct regulations can be imposed on the use of such properties without raising per se takings concerns. In point of fact, broadband providers regularly invite third parties to transmit signals through their physical facilities by contracting with end users to provide broadband Internet access service and promising access to all or substantially all Internet endpoints. Our rules do not compel broadband providers to offer this service'--instead our rules simply regulate broadband providers' conduct with respect to traffic which currently freely flows over their facilities. Thus, to the extent that broadband providers allow any customer to transmit or receive information over its network, the imposition of reasonable conduct rules on the provision of broadband Internet access services does not constitute a per se taking. Furthermore, even if the rules did impose a type of physical occupation on the facilities of broadband providers, such an imposition is not an unconstitutional taking because broadband providers are compensated for the traffic passing over their networks. (With respect to the rules governing the broadband Internet access service, broadband providers are compensated through the imposition of subscription fees on their end users.)
2. Regulatory Takings569. Nor do the rules we adopt today constitute a regulatory taking. Outside of per se takings cases, courts analyze putative government takings through ''essentially ad hoc, factual inquiries'' into a variety of unweighted factors such as the ''economic impact of the regulation,'' the degree of interference with ''investment-backed expectations,'' and ''the character of the government action.'' Directing analysis of these factors is a common touchstone'--whether the regulatory actions taken are ''functionally equivalent to the classic taking in which government directly appropriates private property or ousts the owner from his domain.'' Open Internet rules do not implicate such a deprivation of value or control over the networks of broadband providers, and so pose no regulatory takings issues.
570. The economic impact of the rules we adopt today is limited because, in most circumstances, the Internet operates in an open manner today. Indeed, rather than reducing the value of broadband provider property, today's rules likely serve to enhance the value of broadband networks by promoting innovation on the edge of the network, thereby driving consumer demand for broadband Internet access and increasing the networks' value. Further, today's Order does not so burden broadband providers' discretion in managing and deploying their networks to effectively ''oust'' them from ownership and control of their networks. While we have adopted a set of bright-line rules today for some practices, broadband providers are still afforded a great deal of discretion to enter into individualized arrangements with respect to the provision of broadband Internet access services under the no-unreasonable interference/disadvantage standard. The limited scope of the open Internet rules also injects flexibility into our regulatory framework and provides sufficient property protections to take our rules outside the ambit of the Fifth Amendment.
571. Likewise, any investment backed expectations of broadband providers in prior regulatory regimes are minimal. As a general matter, property owners cannot expect that existing legal requirements regarding their property will remain entirely unchanged. (Additionally, persons operating in a regulated environment develop fewer reliance interests in industries subject to comprehensive regulation.) The Commission has long regulated Internet access services, and there is no doubt that broadband Internet ''falls comfortably within the Commission's jurisdiction.'' Indeed, with respect to broadband Internet access service, claims by broadband providers that our previous regulatory treatment of broadband engendered reliance interests runs counter to the plain language of the 2002 Cable Modem Declaratory Ruling and the 2005 Wireline Broadband Classification Order, both of which contained notices of proposed rulemaking seeking comment on the retention of Title II-like regulation of those services. Also, because we do not propose to regulate ex ante broadband providers' ability to set market rates for the broadband Internet access services they offer, there is no reason to believe that our ruling will deprive broadband providers of the just compensation that is a full answer to any takings claim.
572. In characterizing our proposed rules as a regulatory taking, CenturyLink looks to Kaiser Aetna, a case in which the government sought to establish public access rights to a private marina by classifying it as ''navigable waters of the United States. As described above, we think that analogies to real property incursions are inapplicable to the provision of broadband Internet access services. In any event, the facts of Kaiser bear little resemblance to the rights and interests implicated by broadband networks. Unlike the small, privately held marina which was not open to the public in Kaiser Aetna, broadband Internet access service involves access to substantially all Internet endpoints. While the marina in Kaiser Aetna maintained a small fee-paying membership, broadband Internet access services are offered directly to the public at large, as we recognize in their classification as telecommunications services. In sum, open Internet rules do not so burden broadband provider's control and ownership of their networks as to rise to the level of a regulatory taking in violation of the Fifth Amendment. The economic impact of our rules is minimal and our classifications do not frustrate any significant reliance interests.
573. We consider the actions we take today to be separate and severable such that in the event any particular action or decision is stayed or determined to be invalid, we would find that the resulting regulatory framework continues to fulfill our goal of preserving and protecting the open Internet and that it shall remain in effect to the fullest extent permitted by law. Though complementary, each of the rules, requirements, classifications, definitions, and other provisions that we establish in this Report and Order on Remand, Declaratory Ruling, and Order operate independently to promote the virtuous cycle, encourage the deployment of broadband on a timely basis, and protect the open Internet.
574. Severability of Open Internet Rules from One Another. The open Internet rules we adopt today each operate independently to protect the open Internet, promote the virtuous cycle, and encourage the deployment of broadband on a timely basis. The Verizon court recognized as much by holding our initial transparency rule severable from the non-discrimination and no blocking rules from the 2010 Open Internet Order. We apply that view to today's transparency rule, as well as to the no blocking, no throttling, and no paid prioritization rules and the no-unreasonable interference/disadvantage adopted today. While today's rules put in place a suite of open Internet protections, we find that each of these rules, on its own, serves to protect the open Internet. Each rule protects against different potential harms and thus operates semi-independently from one another. For example, the no-blocking rule protects consumers' right to access lawful content, applications, and services by constraining broadband providers' incentive to block competitors' content. The no throttling rule serves as an independent supplement to this prohibition on blocking by banning the impairment or degradation of lawful content that does not reach the level of blocking. Should the no blocking rule be declared invalid, the no throttling rule would still afford consumers and edge providers significant protection, and thus could independently advance the goals of the open Internet, if not as comprehensively were the no blocking rule still in effect. The same reasoning holds true for the ban on paid prioritization, which protects against particular harms independent of the other bright-line rules. Finally, the no-unreasonable interference/disadvantage standard governs broadband provider conduct generally, providing independent protections against those three harmful practices along with other and new practices that could threaten to harm Internet openness. Were any of these individual rules held invalid, the resulting regulations would remain valuable tools for protecting the open Internet.
575. Severability of Rules Governing Mobile/Fixed Providers. We have also made clear today our rules apply to both fixed and mobile broadband service. These are two different services, and thus the application of our rules to either service functions independently. Accordingly, we find that should application of our open Internet rules to either fixed or mobile broadband Internet access services be held invalid, the application of those rules to the remaining mobile or fixed services would still fulfill our regulatory purposes and remain intact.
A. Regulatory Flexibility Analysis576. As required by the Regulatory Flexibility Act (RFA), an Initial Regulatory Flexibility Analysis (IRFA) was incorporated into the 2014 Open Internet NPRM. The Commission sought written public comment on the possible significant economic impact on small entities regarding the proposals addressed in the Open Internet NPRM, including comments on the IRFA. Pursuant to the RFA, a Final Regulatory Flexibility Analysis is set forth in the Order.
B. Paperwork Reduction Act of 1995 Analysis577. This document contains new information collection requirements subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104-13. It will be submitted to the Office of Management and Budget (OMB) for review under section 3507(d) of the PRA. OMB, the general public, and other federal agencies are invited to comment on the new information collection requirements contained in this proceeding. In addition, we note that pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107-198, see44 U.S.C. 3506(c)(4), we previously sought specific comment on how the Commission might further reduce the information collection burden for small business concerns with fewer than 25 employees.
578. In this present document, we require broadband providers to publicly disclose accurate information regarding the commercial terms, performance, and network management practices of their broadband Internet access services sufficient for end users to make informed choices regarding use of such services and for content, application, service, and device providers to develop, market, and maintain Internet offerings. We have assessed the effects of this rule and find that any burden on small businesses will be minimal because (1) the rule gives broadband providers flexibility in how to implement the disclosure rule, and (2) the rule gives providers adequate time to develop cost-effective methods of compliance.
C. Congressional Review Act579. The Commission will send a copy of this Report and Order to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see5 U.S.C. 801(a)(1)(A).
D. Data Quality Act580. The Commission certifies that it has complied with the Office of Management and Budget Final Information Quality Bulletin for Peer Review, 70 FR 2664 (2005), and the Data Quality Act, Ex. Public Law 106-554 (2001), codified at 44 U.S.C. 3516 note, with regard to its reliance on influential scientific information in the Report and Order on Remand, Declaratory Ruling, and Order in GN Docket No. 14-28.
E. Accessible Formats581. To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202-418-0530 (voice), 202-418-0432 (tty). Contact the FCC to request reasonable accommodations for filing comments (accessible format documents, sign language interpreters, CARTS, etc.) by email: FCC504@fcc.gov; phone: (202) 418-0530 (voice), (202) 418-0432 (TTY).
582. Accordingly, it is ordered that, pursuant to sections 1, 2, 3, 4, 10, 201, 202, 301, 303, 316, 332, 403, 501, and 503, of the Communications Act of 1934, as amended, and section 706 of the Telecommunications Act of 1996, as amended, 47 U.S.C. 151, 152, 153, 154, 160, 201, 202, 301, 303, 316, 332, 403, 501, 503, and 1302, this Report and Order on Remand, Declaratory Ruling, and Order is adopted.
583. It is further ordered that parts 1, 8, and 20 of the Commission's rules are amended as set forth in Appendix A of the Order.
584. It is further ordered that this Report and Order on Remand, Declaratory Ruling, and Order shall be effective June 12, 2015, except that the modified information collection requirements in paragraphs 164, 166, 167, 169, 173, 174, 179, 180, and 181 of this document are not applicable until approved by the Office of Management and Budget (OMB). The Federal Communications Commission will publish a separate document in the Federal Register announcing such approval and the relevant effective date(s). It is our intention in adopting the foregoing Declaratory Ruling and these rule changes that, if any provision of the Declaratory Ruling or the rules, or the application thereof to any person or circumstance, is held to be unlawful, the remaining portions of such Declaratory Ruling and the rules not deemed unlawful, and the application of such Declaratory Ruling and the rules to other person or circumstances, shall remain in effect to the fullest extent permitted by law.
585. It is further ordered that the Commission's Consumer & Governmental Affairs Bureau, Reference Information Center, shall send a copy of Report and Order on Remand, Declaratory Ruling, and Order to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see5 U.S.C. 801(a)(1)(A).
586. It is further ordered, that the Commission's Consumer & Governmental Affairs Bureau, Reference Information Center, shall send a copy of this Report and Order on Remand, Declaratory Ruling, and Order, including the Final Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of the Small Business Administration.
587. It is further ordered that the Mozilla Petition to Recognize Remote Delivery Services in Terminating Access Networks and Classify Such Services as Telecommunications Services Under Title II of the Communications Act is denied.
588. As required by the Regulatory Flexibility Act of 1980 (RFA), as amended, Initial Regulatory Flexibility Analyses (IRFAs) were incorporated in the Notice of Proposed Rule Making (2014 Open Internet NPRM) for this proceeding. The Commission sought written public comment on the proposals in the 2014 Open Internet NPRM, including comment on the IRFA. The Commission received comments on the 2014 Open Internet NPRM IRFA, which are discussed below. This present Final Regulatory Flexibility Analysis (FRFA) conforms to the RFA.
A. Need for, and Objectives of, the Proposed Rules589. In its remand of the Commission's Open Internet Order, the D.C. Circuit affirmed the underlying basis for the Commission's open Internet rules, holding that ''the Commission [had] more than adequately supported and explained its conclusion that edge provider innovation leads to the expansion and improvement of broadband infrastructure.'' The court also found ''reasonable and grounded in substantial evidence'' the Commission's finding that Internet openness fosters the edge provider innovation that drives the virtuous cycle. Open Internet rules benefit investors, innovators, and end users by providing more certainty to each regarding broadband providers' behavior, and helping to ensure the market is conducive to optimal use of the Internet. Further, openness promotes the Internet's ability to act as a platform for speech and civic engagement, and can help close the digital divide by facilitating the development of diverse content, applications, and services. The record on remand convinces us that broadband providers continue to have the incentives and ability to engage in practices that pose a threat to Internet openness, and as such, rules to protect the open nature of the Internet remain necessary.
590. The Commission's historical open Internet policies and rules have blunted broadband providers' incentives to engage in behavior harmful to the open Internet. Commenters who argue that rules are not necessary overlook the role that the Commission's rules and policies have played in fostering that result. Without rules in place to protect the open Internet, the overwhelming incentives broadband providers have to act in ways that are harmful to investment and innovation threaten both broadband networks and edge content. Accordingly, in the Order, we set a clear scope for and subsequently adopt a number of rules to address such harmful conduct.
591. First, we note that despite traffic exchange's inclusion in the definition and classification of broadband Internet access service, we do not apply the Commission's conduct-based rules to traffic exchange today. Instead, we utilize the regulatory backstop of sections 201 and 202, as well as related enforcement provisions, to provide oversight over traffic exchange arrangements between a broadband Internet access service provider and other networks. Our definition of broadband Internet access service includes services ''by wire or radio,'' and thus the open Internet rules we adopt apply to both fixed and mobile broadband Internet access services. The record demonstrates the pressing need to apply open Internet rules to fixed and mobile broadband Internet access services alike, and as such, the Commission's prior justifications for treating mobile and fixed services differently under the rules are no longer relevant.
592. We adopt a bright-line rule prohibiting broadband providers from blocking lawful content, applications, services, or non-harmful devices. The no-blocking rule applies to all traffic transmitted to or from end users of a broadband Internet access service, including traffic that may not fit clearly into any of these categories. Further, the no-blocking rule only applies to transmissions of lawful content and does not prevent or restrict a broadband provider from refusing to transmit unlawful material, such as child pornography or copyright-infringing materials. We believe that this approach will allow broadband providers to honor their service commitments to their subscribers without requiring a specified level of service to those subscribers or edge providers under the no-blocking rule. We further believe that the separate no-throttling rule provides appropriate protections against harmful conduct that degrades traffic but does not constitute outright blocking.
593. We also adopt a separate bright-line rule prohibiting broadband providers from impairing or degrading lawful Internet traffic on the basis of content, application, service, or use of a non-harmful device. While certain broadband provider conduct may result in degradation of an end user's Internet experience that is tantamount to blocking, we believe that this conduct requires delineation in an explicit rule rather than through commentary as part of the no-blocking rule. We interpret throttling to mean any conduct by a broadband Internet access service provider that impairs, degrades, slows down, or renders effectively unusable particular content, services, applications, or devices, which is not reasonable network management. We find this prohibition to be as necessary as a rule prohibiting blocking. Without an equally strong no-throttling rule, parties note that the no-blocking rule will not be as effective because broadband providers might otherwise be able to engage in conduct that harms the open Internet but falls short of the outright blocking standard.
594. Under our bright-line rule banning paid prioritization, the Commission will treat all paid prioritization as illegal under our rules except when, in rare circumstances, a broadband provider can convincingly show that its practice would affirmatively benefit the open Internet. Broadband providers may seek a waiver of this rule against paid prioritization, and we provide guidance to make clear the very limited circumstances in which the Commission would be willing to allow paid prioritization. In order to justify waiver, a party would need to demonstrate that a practice would provide some significant public interest benefit and would not harm the open nature of the Internet.
595. In addition to these three bright-line rules, we also set forth a no-unreasonable interference/disadvantage standard, under which the Commission can prohibit practices that unreasonably interfere with or unreasonably disadvantage consumers or edge providers, thus causing harm to the open Internet. This no-unreasonable interference/disadvantage standard will operate on a case-by-case basis and is designed to evaluate other broadband provider policies or practices'--not covered by the bright-line rules'-- and prohibit those that could harm the open Internet. Under this rule, any person engaged in the provision of broadband Internet access service, insofar as such person is so engaged, shall not unreasonably interfere with or unreasonably disadvantage (i) end users' ability to select, access, and use broadband Internet access service or the lawful Internet content, applications, services, or devices of their choice, or (ii) edge providers' ability to make lawful content, applications, services or devices available to end users. Reasonable network management shall not be considered a violation of this rule. This standard importantly allows us to prohibit practices that harm Internet openness, while still permitting innovative practices and creations that promote the virtuous cycle. (The Verizon court specifically touted the virtuous cycle as a worthy goal and within our authority.)
596. We note that the no-blocking, no-throttling, and no-unreasonable interference/disadvantage standard are all subject to reasonable network management. This network management exception is critical to allow broadband providers to optimize overall network performance and maintain a consistent quality experience for consumers. This exception does not apply to the paid prioritization rule because unlike conduct implicating the no-blocking, no-throttling, or no-unreasonable interference/disadvantage standard, paid prioritization is not a network management practice. We believe that this approach allows broadband providers to optimize overall network performance and maintain a consistent quality experience for consumers while carrying a variety of traffic over their networks.
597. In addition, we adopt our tentative conclusion in the 2014 Open Internet NPRM, that the Commission should not apply its conduct-based rules to services offered by broadband providers that share capacity with broadband Internet access service over providers' last-mile facilities, while closely monitoring the development of these services to ensure that broadband providers are not circumventing the open Internet rules. While the 2010 Open Internet Order and the 2014 Open Internet NPRM used the term ''specialized services'' to refer to these types of services, the term ''non-BIAS data services'' is a more accurate description for this class of services. These services may generally share the following characteristics: First, these services are not used to reach large parts of the Internet. Second, these services are not a generic platform'--but rather a specific ''application level'' service. Finally, these services use some form of network management to isolate network capacity from broadband Internet access services: Physically, logically, statistically, or otherwise.
598. We also adopt enhancements to the existing transparency rule, which covers both content and format of disclosures by providers of broadband Internet access services. As the Commission has previously noted, disclosure requirements are among the least intrusive and most effective regulatory measures at its disposal. The enhanced transparency requirements adopted in the present Order serve the same purposes as those required under the 2010 Order: Providing critical information to serve end-user consumers, edge providers of broadband products and services, and the Internet community. Our enhancements to the existing transparency rule will better enable end-user consumers to make informed choices about broadband services by providing them with timely information tailored more specifically to their needs, and will similarly provide edge providers with the information necessary to develop new content, applications, services, and devices that promote the virtuous cycle of investment and innovation.
599. We anticipate that many disputes that will arise can and should be resolved by the parties without Commission involvement. We encourage parties to resolve disputes through informal discussions and private negotiations, but to the extent these methods are not practical, the Commission will continue to provide backstop mechanisms to address them. We continue to allow parties to file formal and informal complaints, and we will also proactively monitor compliance and take strong enforcement action against parties who violate the open Internet rules. In addition, we institute the use of advisory opinions similar to those issued by DOJ's Antitrust Division to provide clarity, guidance, and predictability concerning the open Internet rules. We also create an ombudsperson position that will serve as a point of contact for open Internet issues at the Commission to help consumers and edge providers direct their inquiries and complaints to the appropriate parties.
600. The legal basis for the Open Internet rules we adopt today relies on multiple sources of legal authority, including section 706, Title II, and Title III of the Communications Act. We conclude that the best approach to achieving our open Internet goals is to rely on several, independent, yet complementary sources of legal authority. Our authority under section 706 is not mutually exclusive with our authority under Titles II and III of the Act. Rather, we read our statute to provide independent sources of authority that work in concert toward common ends. Under section 706, the Commission has the authority to take certain regulatory steps to encourage and accelerate the deployment of broadband to all Americans. Under Title II, the Commission has authority to ensure that common carriers do not engage in unjust and unreasonable practices or preferences. And under Title III, the Commission has authority to protect the public interest through spectrum licensing. Each of these sources of authority provides an alternative ground to independently support our open Internet rules.
B. Summary of Significant Issues Raised by Public Comments in Response to the IRFA601. In response to the 2014 Open Internet NPRM, five entities filed comments, reply comments, and/or ex parte letters that specifically addressed the IRFA to some degree: ADTRAN, the American Cable Association (ACA), The National Cable & Telecommunications Association (NCTA), NTCA'--the Rural Broadband Association (NTCA), and the Wireless Internet Service Providers Association (WISPA). Some of these, as well as other entities filed comments or ex parte letters that more generally considered the small business impact of our proposals. The Office of Advocacy of the Small Business Administration (SBA) also filed a letter encouraging the FCC to use the RFA to reach out to small businesses in the course of the proceeding. The SBA particularly encouraged the Commission to ''exercise appropriate caution in tailoring its final rules to mitigate any anticompetitive pressure on small broadband providers as well.'' We considered the proposals and concerns described by the various commenters, including the SBA, when composing the Order and accompanying rules.
602. Some commenters expressed concern that in the IRFA, we had not adequately considered the varying sizes of broadband providers and the effect of our proposals on smaller entities. Contrary to these concerns, when making the determination reflected in the Order, we carefully considered the impact of our actions on small entities. The record also reflects small entities' concern that the rules proposed in the 2014 Open Internet NPRM did not include sufficient protection for small edge providers and broadband providers. Thus, the rules adopted in the Order reflect a careful consideration of the impact that our rules will have both on small edge providers and on small broadband providers. The record also reflects the concerns of some commenters that enhanced transparency requirements will be particularly burdensome for smaller providers. However, in the 2014 Open Internet NPRM IRFA, we specifically sought comment on whether there are ways the Commission or industry associations could reduce burdens on broadband providers in complying with the proposed enhanced transparency rule through the use of a voluntary industry standardized glossary, or through the creation of a dashboard that permits easy comparison of the policies, procedures, and prices of various broadband providers throughout the country.
603. NCTA and others also state that the IRFA was insufficiently specific considering the obligations and impact of the classification of broadband Internet access service as a Title II service. We disagree with this contention as well. We believe that the IRFA was adequate and that the opportunity for parties, including small entities, to comment in a publicly accessible docket on the proposals contained within the 2014 Open Internet NPRM was sufficient. The opportunity for comments, replies, and ex parte presentations more than adequately shaped the universe of potential obligations that could stem from our final rules. This was reflected in the overwhelming outpouring of comment on the proposals contained in the NPRM: Including many comments by and on behalf of small entities. The IRFA described that the 2014 Open Internet NPRM sought comment on the best source of authority for protecting Internet openness, whether section 706, Title II of the Communications Act of 1934, as amended, and/or other sources of legal authority such as Title III of the Communications Act for wireless services.
C. Description and Estimate of the Number of Small Entities To Which the Rules Would Apply604. The RFA directs agencies to provide a description of, and where feasible, an estimate of the number of small entities that may be affected by the proposed rules, if adopted. The RFA generally defines the term ''small entity'' as having the same meaning as the terms ''small business,'' ''small organization,'' and ''small governmental jurisdiction.'' In addition, the term ''small business'' has the same meaning as the term ''small-business concern'' under the Small Business Act. A small-business concern'' is one which: (1) Is independently owned and operated; (2) is not dominant in its field of operation; and (3) satisfies any additional criteria established by the SBA.
1. Total Small Entities605. Our proposed action, if implemented, may, over time, affect small entities that are not easily categorized at present. We therefore describe here, at the outset, three comprehensive, statutory small entity size standards. First, nationwide, there are a total of approximately 28.2 million small businesses, according to the SBA. In addition, a ''small organization'' is generally ''any not-for-profit enterprise which is independently owned and operated and is not dominant in its field.'' Nationwide, as of 2007, there were approximately 1,621,315 small organizations. Finally, the term ''small governmental jurisdiction'' is defined generally as ''governments of cities, towns, townships, villages, school districts, or special districts, with a population of less than fifty thousand.'' Census Bureau data for 2007 indicate that there were 89,476 local governmental jurisdictions in the United States. We estimate that, of this total, as many as 88,761 entities may qualify as ''small governmental jurisdictions.'' Thus, we estimate that most governmental jurisdictions are small.
2. Broadband Internet Access Service Providers606. The rules adopted in the Order apply to broadband Internet access service providers. The Economic Census places these firms, whose services might include Voice over Internet Protocol (VoIP), in either of two categories, depending on whether the service is provided over the provider's own telecommunications facilities (e.g., cable and DSL ISPs), or over client-supplied telecommunications connections (e.g., dial-up ISPs). The former are within the category of Wired Telecommunications Carriers, which has an SBA small business size standard of 1,500 or fewer employees. These are also labeled ''broadband.'' The latter are within the category of All Other Telecommunications, which has a size standard of annual receipts of $25 million or less. These are labeled non-broadband. According to Census Bureau data for 2007, there were 3,188 firms in the first category, total, that operated for the entire year. Of this total, 3144 firms had employment of 999 or fewer employees, and 44 firms had employment of 1000 employees or more. For the second category, the data show that 1,274 firms operated for the entire year. Of those, 1,252 had annual receipts below $25 million per year. Consequently, we estimate that the majority of broadband Internet access service provider firms are small entities.
607. The broadband Internet access service provider industry has changed since this definition was introduced in 2007. The data cited above may therefore include entities that no longer provide broadband Internet access service, and may exclude entities that now provide such service. To ensure that this FRFA describes the universe of small entities that our action might affect, we discuss in turn several different types of entities that might be providing broadband Internet access service. We note that, although we have no specific information on the number of small entities that provide broadband Internet access service over unlicensed spectrum, we include these entities in our Final Regulatory Flexibility Analysis.
3. Wireline Providers608. Incumbent Local Exchange Carriers (Incumbent LECs). Neither the Commission nor the SBA has developed a small business size standard specifically for incumbent local exchange services. The closest applicable size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 1,307 carriers reported that they were incumbent local exchange service providers. Of these 1,307 carriers, an estimated 1,006 have 1,500 or fewer employees and 301 have more than 1,500 employees. Consequently, the Commission estimates that most providers of incumbent local exchange service are small businesses that may be affected by rules adopted pursuant to the Order.
609. Competitive Local Exchange Carriers (Competitive LECs), Competitive Access Providers (CAPs), Shared-Tenant Service Providers, and Other Local Service Providers. Neither the Commission nor the SBA has developed a small business size standard specifically for these service providers. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 1,442 carriers reported that they were engaged in the provision of either competitive local exchange services or competitive access provider services. Of these 1,442 carriers, an estimated 1,256 have 1,500 or fewer employees and 186 have more than 1,500 employees. In addition, 17 carriers have reported that they are Shared-Tenant Service Providers, and all 17 are estimated to have 1,500 or fewer employees. In addition, 72 carriers have reported that they are Other Local Service Providers. Of the 72, seventy have 1,500 or fewer employees and two have more than 1,500 employees. Consequently, the Commission estimates that most providers of competitive local exchange service, competitive access providers, Shared-Tenant Service Providers, and other local service providers are small entities that may be affected by rules adopted pursuant to the Order.
610. We have included small incumbent LECs in this present RFA analysis. As noted above, a ''small business'' under the RFA is one that, inter alia, meets the pertinent small business size standard (e.g., a telephone communications business having 1,500 or fewer employees), and ''is not dominant in its field of operation.'' The SBA's Office of Advocacy contends that, for RFA purposes, small incumbent LECs are not dominant in their field of operation because any such dominance is not ''national'' in scope. We have therefore included small incumbent LECs in this RFA analysis, although we emphasize that this RFA action has no effect on Commission analyses and determinations in other, non-RFA contexts.
611. Interexchange Carriers. Neither the Commission nor the SBA has developed a small business size standard specifically for providers of interexchange services. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 359 carriers have reported that they are engaged in the provision of interexchange service. Of these, an estimated 317 have 1,500 or fewer employees and 42 have more than 1,500 employees. Consequently, the Commission estimates that the majority of IXCs are small entities that may be affected by rules adopted pursuant to the Order.
612. Operator Service Providers (OSPs). Neither the Commission nor the SBA has developed a small business size standard specifically for operator service providers. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 33 carriers have reported that they are engaged in the provision of operator services. Of these, an estimated 31 have 1,500 or fewer employees and two have more than 1,500 employees. Consequently, the Commission estimates that the majority of OSPs are small entities that may be affected by rules adopted pursuant to the Order.
4. Wireless Providers'--Fixed and Mobile613. The broadband Internet access service provider category covered by this Order may cover multiple wireless firms and categories of regulated wireless services. Thus, to the extent the wireless services listed below are used by wireless firms for broadband Internet access service, the proposed actions may have an impact on those small businesses as set forth above and further below. In addition, for those services subject to auctions, we note that, as a general matter, the number of winning bidders that claim to qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Also, the Commission does not generally track subsequent business size unless, in the context of assignments and transfers or reportable eligibility events, unjust enrichment issues are implicated.
604. Wireless Telecommunications Carriers (except Satellite). Since 2007, the Census Bureau has placed wireless firms within this new, broad, economic census category. Under the present and prior categories, the SBA has deemed a wireless business to be small if it has 1,500 or fewer employees. For the category of Wireless Telecommunications Carriers (except Satellite), census data for 2007 show that there were 1,383 firms that operated for the entire year. Of this total, 1,368 firms had employment of 999 or fewer employees and 15 had employment of 1000 employees or more. Since all firms with fewer than 1,500 employees are considered small, given the total employment in the sector, we estimate that the vast majority of wireless firms are small.
605. Wireless Communications Services. This service can be used for fixed, mobile, radiolocation, and digital audio broadcasting satellite uses. The Commission defined ''small business'' for the wireless communications services (WCS) auction as an entity with average gross revenues of $40 million for each of the three preceding years, and a ''very small business'' as an entity with average gross revenues of $15 million for each of the three preceding years. The SBA has approved these definitions.
606. 1670-1675 MHz Services. This service can be used for fixed and mobile uses, except aeronautical mobile. An auction for one license in the 1670-1675 MHz band was conducted in 2003. One license was awarded. The winning bidder was not a small entity.
607. Wireless Telephony. Wireless telephony includes cellular, personal communications services, and specialized mobile radio telephony carriers. As noted, the SBA has developed a small business size standard for Wireless Telecommunications Carriers (except Satellite). Under the SBA small business size standard, a business is small if it has 1,500 or fewer employees. According to Commission data, 413 carriers reported that they were engaged in wireless telephony. Of these, an estimated 261 have 1,500 or fewer employees and 152 have more than 1,500 employees. Therefore, a little less than one third of these entities can be considered small.
608. Broadband Personal Communications Service. The broadband personal communications services (PCS) spectrum is divided into six frequency blocks designated A through F, and the Commission has held auctions for each block. The Commission initially defined a ''small business'' for C- and F-Block licenses as an entity that has average gross revenues of $40 million or less in the three previous calendar years. For F-Block licenses, an additional small business size standard for ''very small business'' was added and is defined as an entity that, together with its affiliates, has average gross revenues of not more than $15 million for the preceding three calendar years. These small business size standards, in the context of broadband PCS auctions, have been approved by the SBA. No small businesses within the SBA-approved small business size standards bid successfully for licenses in Blocks A and B. There were 90 winning bidders that claimed small business status in the first two C-Block auctions. A total of 93 bidders that claimed small business status won approximately 40 percent of the 1,479 licenses in the first auction for the D, E, and F Blocks. On April 15, 1999, the Commission completed the reauction of 347 C-, D-, E-, and F-Block licenses in Auction No. 22. Of the 57 winning bidders in that auction, 48 claimed small business status and won 277 licenses.
609. On January 26, 2001, the Commission completed the auction of 422 C and F Block Broadband PCS licenses in Auction No. 35. Of the 35 winning bidders in that auction, 29 claimed small business status. Subsequent events concerning Auction 35, including judicial and agency determinations, resulted in a total of 163 C and F Block licenses being available for grant. On February 15, 2005, the Commission completed an auction of 242 C-, D-, E-, and F-Block licenses in Auction No. 58. Of the 24 winning bidders in that auction, 16 claimed small business status and won 156 licenses. On May 21, 2007, the Commission completed an auction of 33 licenses in the A, C, and F Blocks in Auction No. 71. Of the 12 winning bidders in that auction, five claimed small business status and won 18 licenses. On August 20, 2008, the Commission completed the auction of 20 C-, D-, E-, and F-Block Broadband PCS licenses in Auction No. 78. Of the eight winning bidders for Broadband PCS licenses in that auction, six claimed small business status and won 14 licenses.
610. Specialized Mobile Radio Licenses. The Commission awards ''small entity'' bidding credits in auctions for Specialized Mobile Radio (SMR) geographic area licenses in the 800 MHz and 900 MHz bands to firms that had revenues of no more than $15 million in each of the three previous calendar years. The Commission awards ''very small entity'' bidding credits to firms that had revenues of no more than $3 million in each of the three previous calendar years. The SBA has approved these small business size standards for the 900 MHz Service. The Commission has held auctions for geographic area licenses in the 800 MHz and 900 MHz bands. The 900 MHz SMR auction began on December 5, 1995, and closed on April 15, 1996. Sixty bidders claiming that they qualified as small businesses under the $15 million size standard won 263 geographic area licenses in the 900 MHz SMR band. The 800 MHz SMR auction for the upper 200 channels began on October 28, 1997, and was completed on December 8, 1997. Ten bidders claiming that they qualified as small businesses under the $15 million size standard won 38 geographic area licenses for the upper 200 channels in the 800 MHz SMR band. A second auction for the 800 MHz band was held on January 10, 2002 and closed on January 17, 2002 and included 23 BEA licenses. One bidder claiming small business status won five licenses.
611. The auction of the 1,053 800 MHz SMR geographic area licenses for the General Category channels began on August 16, 2000, and was completed on September 1, 2000. Eleven bidders won 108 geographic area licenses for the General Category channels in the 800 MHz SMR band and qualified as small businesses under the $15 million size standard. In an auction completed on December 5, 2000, a total of 2,800 Economic Area licenses in the lower 80 channels of the 800 MHz SMR service were awarded. Of the 22 winning bidders, 19 claimed small business status and won 129 licenses. Thus, combining all four auctions, 41 winning bidders for geographic licenses in the 800 MHz SMR band claimed status as small businesses.
612. In addition, there are numerous incumbent site-by-site SMR licenses and licensees with extended implementation authorizations in the 800 and 900 MHz bands. We do not know how many firms provide 800 MHz or 900 MHz geographic area SMR service pursuant to extended implementation authorizations, nor how many of these providers have annual revenues of no more than $15 million. One firm has over $15 million in revenues. In addition, we do not know how many of these firms have 1,500 or fewer employees, which is the SBA-determined size standard. We assume, for purposes of this analysis, that all of the remaining extended implementation authorizations are held by small entities, as defined by the SBA.
613. Lower 700 MHz Band Licenses. The Commission previously adopted criteria for defining three groups of small businesses for purposes of determining their eligibility for special provisions such as bidding credits. The Commission defined a ''small business'' as an entity that, together with its affiliates and controlling principals, has average gross revenues not exceeding $40 million for the preceding three years. A ''very small business'' is defined as an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $15 million for the preceding three years. Additionally, the lower 700 MHz Service had a third category of small business status for Metropolitan/Rural Service Area (MSA/RSA) licenses'--''entrepreneur'''--which is defined as an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $3 million for the preceding three years. The SBA approved these small size standards. An auction of 740 licenses (one license in each of the 734 MSAs/RSAs and one license in each of the six Economic Area Groupings (EAGs)) commenced on August 27, 2002, and closed on September 18, 2002. Of the 740 licenses available for auction, 484 licenses were won by 102 winning bidders. Seventy-two of the winning bidders claimed small business, very small business or entrepreneur status and won a total of 329 licenses. A second auction commenced on May 28, 2003, closed on June 13, 2003, and included 256 licenses: 5 EAG licenses and 476 Cellular Market Area licenses. Seventeen winning bidders claimed small or very small business status and won 60 licenses, and nine winning bidders claimed entrepreneur status and won 154 licenses. On July 26, 2005, the Commission completed an auction of 5 licenses in the Lower 700 MHz band (Auction No. 60). There were three winning bidders for five licenses. All three winning bidders claimed small business status.
614. In 2007, the Commission reexamined its rules governing the 700 MHz band in the 700 MHz Second Report and Order. An auction of 700 MHz licenses commenced January 24, 2008 and closed on March 18, 2008, which included, 176 Economic Area licenses in the A Block, 734 Cellular Market Area licenses in the B Block, and 176 EA licenses in the E Block. Twenty winning bidders, claiming small business status (those with attributable average annual gross revenues that exceed $15 million and do not exceed $40 million for the preceding three years) won 49 licenses. Thirty three winning bidders claiming very small business status (those with attributable average annual gross revenues that do not exceed $15 million for the preceding three years) won 325 licenses.
615. Upper 700 MHz Band Licenses. In the 700 MHz Second Report and Order, the Commission revised its rules regarding Upper 700 MHz licenses. On January 24, 2008, the Commission commenced Auction 73 in which several licenses in the Upper 700 MHz band were available for licensing: 12 Regional Economic Area Grouping licenses in the C Block, and one nationwide license in the D Block. The auction concluded on March 18, 2008, with 3 winning bidders claiming very small business status (those with attributable average annual gross revenues that do not exceed $15 million for the preceding three years) and winning five licenses.
616. 700 MHz Guard Band Licensees. In 2000, in the 700 MHz Guard Band Order, the Commission adopted size standards for ''small businesses'' and ''very small businesses'' for purposes of determining their eligibility for special provisions such as bidding credits and installment payments. A small business in this service is an entity that, together with its affiliates and controlling principals, has average gross revenues not exceeding $40 million for the preceding three years. Additionally, a very small business is an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $15 million for the preceding three years. SBA approval of these definitions is not required. An auction of 52 Major Economic Area licenses commenced on September 6, 2000, and closed on September 21, 2000. Of the 104 licenses auctioned, 96 licenses were sold to nine bidders. Five of these bidders were small businesses that won a total of 26 licenses. A second auction of 700 MHz Guard Band licenses commenced on February 13, 2001, and closed on February 21, 2001. All eight of the licenses auctioned were sold to three bidders. One of these bidders was a small business that won a total of two licenses.
617. Air-Ground Radiotelephone Service. The Commission has previously used the SBA's small business size standard applicable to Wireless Telecommunications Carriers (except Satellite), i.e., an entity employing no more than 1,500 persons. There are approximately 100 licensees in the Air-Ground Radiotelephone Service, and under that definition, we estimate that almost all of them qualify as small entities under the SBA definition. For purposes of assigning Air-Ground Radiotelephone Service licenses through competitive bidding, the Commission has defined ''small business'' as an entity that, together with controlling interests and affiliates, has average annual gross revenues for the preceding three years not exceeding $40 million. A ''very small business'' is defined as an entity that, together with controlling interests and affiliates, has average annual gross revenues for the preceding three years not exceeding $15 million. These definitions were approved by the SBA. In May 2006, the Commission completed an auction of nationwide commercial Air-Ground Radiotelephone Service licenses in the 800 MHz band (Auction No. 65). On June 2, 2006, the auction closed with two winning bidders winning two Air-Ground Radiotelephone Services licenses. Neither of the winning bidders claimed small business status.
618. AWS Services (1710-1755 MHz and 2110-2155 MHz bands (AWS-1); 1915-1920 MHz, 1995-2000 MHz, 2020-2025 MHz and 2175-2180 MHz bands (AWS-2); 2155-2175 MHz band (AWS-3)). For the AWS-1 bands, the Commission has defined a ''small business'' as an entity with average annual gross revenues for the preceding three years not exceeding $40 million, and a ''very small business'' as an entity with average annual gross revenues for the preceding three years not exceeding $15 million. For AWS-2 and AWS-3, although we do not know for certain which entities are likely to apply for these frequencies, we note that the AWS-1 bands are comparable to those used for cellular service and personal communications service. The Commission has not yet adopted size standards for the AWS-2 or AWS-3 bands but proposes to treat both AWS-2 and AWS-3 similarly to broadband PCS service and AWS-1 service due to the comparable capital requirements and other factors, such as issues involved in relocating incumbents and developing markets, technologies, and services.
619. 3650-3700 MHz band. In March 2005, the Commission released a Report and Order and Memorandum Opinion and Order that provides for nationwide, non-exclusive licensing of terrestrial operations, utilizing contention-based technologies, in the 3650 MHz band (i.e., 3650-3700 MHz). As of April 2010, more than 1270 licenses have been granted and more than 7433 sites have been registered. The Commission has not developed a definition of small entities applicable to 3650-3700 MHz band nationwide, non-exclusive licensees. However, we estimate that the majority of these licensees are Internet Access Service Providers (ISPs) and that most of those licensees are small businesses.
620. Fixed Microwave Services. Microwave services include common carrier, private-operational fixed, and broadcast auxiliary radio services. They also include the Local Multipoint Distribution Service (LMDS), the Digital Electronic Message Service (DEMS), and the 24 GHz Service, where licensees can choose between common carrier and non-common carrier status. At present, there are approximately 36,708 common carrier fixed licensees and 59,291 private operational-fixed licensees and broadcast auxiliary radio licensees in the microwave services. There are approximately 135 LMDS licensees, three DEMS licensees, and three 24 GHz licensees. The Commission has not yet defined a small business with respect to microwave services. For purposes of the FRFA, we will use the SBA's definition applicable to Wireless Telecommunications Carriers (except satellite)'--i.e., an entity with no more than 1,500 persons. Under the present and prior categories, the SBA has deemed a wireless business to be small if it has 1,500 or fewer employees. The Commission does not have data specifying the number of these licensees that have more than 1,500 employees, and thus is unable at this time to estimate with greater precision the number of fixed microwave service licensees that would qualify as small business concerns under the SBA's small business size standard. Consequently, the Commission estimates that there are up to 36,708 common carrier fixed licensees and up to 59,291 private operational-fixed licensees and broadcast auxiliary radio licensees in the microwave services that may be small and may be affected by the rules and policies adopted herein. We note, however, that the common carrier microwave fixed licensee category includes some large entities.
621. Broadband Radio Service and Educational Broadband Service. Broadband Radio Service systems, previously referred to as Multipoint Distribution Service (MDS) and Multichannel Multipoint Distribution Service (MMDS) systems, and ''wireless cable,'' transmit video programming to subscribers and provide two-way high speed data operations using the microwave frequencies of the Broadband Radio Service (BRS) and Educational Broadband Service (EBS) (previously referred to as the Instructional Television Fixed Service (ITFS)). In connection with the 1996 BRS auction, the Commission established a small business size standard as an entity that had annual average gross revenues of no more than $40 million in the previous three calendar years. The BRS auctions resulted in 67 successful bidders obtaining licensing opportunities for 493 Basic Trading Areas (BTAs). Of the 67 auction winners, 61 met the definition of a small business. BRS also includes licensees of stations authorized prior to the auction. At this time, we estimate that of the 61 small business BRS auction winners, 48 remain small business licensees. In addition to the 48 small businesses that hold BTA authorizations, there are approximately 392 incumbent BRS licensees that are considered small entities. After adding the number of small business auction licensees to the number of incumbent licensees not already counted, we find that there are currently approximately 440 BRS licensees that are defined as small businesses under either the SBA or the Commission's rules.
622. In 2009, the Commission conducted Auction 86, the sale of 78 licenses in the BRS areas. The Commission offered three levels of bidding credits: (i) A bidder with attributed average annual gross revenues that exceed $15 million and do not exceed $40 million for the preceding three years (small business) received a 15 percent discount on its winning bid; (ii) a bidder with attributed average annual gross revenues that exceed $3 million and do not exceed $15 million for the preceding three years (very small business) received a 25 percent discount on its winning bid; and (iii) a bidder with attributed average annual gross revenues that do not exceed $3 million for the preceding three years (entrepreneur) received a 35 percent discount on its winning bid. Auction 86 concluded in 2009 with the sale of 61 licenses. Of the ten winning bidders, two bidders that claimed small business status won 4 licenses; one bidder that claimed very small business status won three licenses; and two bidders that claimed entrepreneur status won six licenses.
623. In addition, the SBA's Cable Television Distribution Services small business size standard is applicable to EBS. There are presently 2,436 EBS licensees. All but 100 of these licenses are held by educational institutions. Educational institutions are included in this analysis as small entities. Thus, we estimate that at least 2,336 licensees are small businesses. Since 2007, Cable Television Distribution Services have been defined within the broad economic census category of Wired Telecommunications Carriers; that category is defined as follows: ''This industry comprises establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired telecommunications networks. Transmission facilities may be based on a single technology or a combination of technologies.'' The SBA has developed a small business size standard for this category, which is: All such firms having 1,500 or fewer employees. To gauge small business prevalence for these cable services we must, however, use the most current census data that are based on the previous category of Cable and Other Program Distribution and its associated size standard; that size standard was: All such firms having $13.5 million or less in annual receipts. According to Census Bureau data for 2007, there were a total of 996 firms in this category that operated for the entire year. Of this total, 948 firms had annual receipts of under $10 million, and 48 firms had receipts of $10 million or more but less than $25 million. Thus, the majority of these firms can be considered small.
5. Satellite Service Providers624. Satellite Telecommunications Providers. Two economic census categories address the satellite industry. The first category has a small business size standard of $30 million or less in average annual receipts, under SBA rules. The second has a size standard of $30 million or less in annual receipts.
625. The category of Satellite Telecommunications ''comprises establishments primarily engaged in providing telecommunications services to other establishments in the telecommunications and broadcasting industries by forwarding and receiving communications signals via a system of satellites or reselling satellite telecommunications.'' For this category, Census Bureau data for 2007 show that there were a total of 570 firms that operated for the entire year. Of this total, 530 firms had annual receipts of under $30 million, and 40 firms had receipts of over $30 million. Consequently, we estimate that the majority of Satellite Telecommunications firms are small entities that might be affected by our action.
626. The second category of Other Telecommunications comprises, inter alia,''establishments primarily engaged in providing specialized telecommunications services, such as satellite tracking, communications telemetry, and radar station operation. This industry also includes establishments primarily engaged in providing satellite terminal stations and associated facilities connected with one or more terrestrial systems and capable of transmitting telecommunications to, and receiving telecommunications from, satellite systems.'' For this category, Census Bureau data for 2007 show that there were a total of 1,274 firms that operated for the entire year. Of this total, 1,252 had annual receipts below $25 million per year. Consequently, we estimate that the majority of All Other Telecommunications firms are small entities that might be affected by our action.
6. Cable Service Providers627. Because section 706 requires us to monitor the deployment of broadband using any technology, we anticipate that some broadband service providers may not provide telephone service. Accordingly, we describe below other types of firms that may provide broadband services, including cable companies, MDS providers, and utilities, among others.
628. Cable and Other Program Distributors. Since 2007, these services have been defined within the broad economic census category of Wired Telecommunications Carriers; that category is defined as follows: ''This industry comprises establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired telecommunications networks. Transmission facilities may be based on a single technology or a combination of technologies.'' The SBA has developed a small business size standard for this category, which is: all such firms having 1,500 or fewer employees. To gauge small business prevalence for these cable services we must, however, use current census data that are based on the previous category of Cable and Other Program Distribution and its associated size standard; that size standard was: All such firms having $13.5 million or less in annual receipts. According to Census Bureau data for 2007, there were a total of 2,048 firms in this category that operated for the entire year. Of this total, 1,393 firms had annual receipts of under $10 million, and 655 firms had receipts of $10 million or more. Thus, the majority of these firms can be considered small.
629. Cable Companies and Systems. The Commission has also developed its own small business size standards, for the purpose of cable rate regulation. Under the Commission's rules, a ''small cable company'' is one serving 400,000 or fewer subscribers, nationwide. Industry data shows that there were 1,141 cable companies at the end of June 2012. Of this total, all but ten cable operators nationwide are small under this size standard. In addition, under the Commission's rules, a ''small system'' is a cable system serving 15,000 or fewer subscribers. Current Commission records show 4,945 cable systems nationwide. Of this total, 4,380 cable systems have less than 20,000 subscribers, and 565 systems have 20,000 or more subscribers, based on the same records. Thus, under this standard, we estimate that most cable systems are small entities.
630. Cable System Operators. The Communications Act of 1934, as amended, also contains a size standard for small cable system operators, which is ''a cable operator that, directly or through an affiliate, serves in the aggregate fewer than 1 percent of all subscribers in the United States and is not affiliated with any entity or entities whose gross annual revenues in the aggregate exceed $250,000,000.'' The Commission has determined that an operator serving fewer than 677,000 subscribers shall be deemed a small operator, if its annual revenues, when combined with the total annual revenues of all its affiliates, do not exceed $250 million in the aggregate. Based on available data, we find that all but ten incumbent cable operators are small entities under this size standard. We note that the Commission neither requests nor collects information on whether cable system operators are affiliated with entities whose gross annual revenues exceed $250 million, and therefore we are unable to estimate more accurately the number of cable system operators that would qualify as small under this size standard.
7. Electric Power Generators, Transmitters, and Distributors631. Electric Power Generators, Transmitters, and Distributors. The Census Bureau defines an industry group comprised of ''establishments, primarily engaged in generating, transmitting, and/or distributing electric power. Establishments in this industry group may perform one or more of the following activities: (1) Operate generation facilities that produce electric energy; (2) operate transmission systems that convey the electricity from the generation facility to the distribution system; and (3) operate distribution systems that convey electric power received from the generation facility or the transmission system to the final consumer.'' The SBA has developed a small business size standard for firms in this category: ''A firm is small if, including its affiliates, it is primarily engaged in the generation, transmission, and/or distribution of electric energy for sale and its total electric output for the preceding fiscal year did not exceed 4 million megawatt hours.'' Census Bureau data for 2007 show that there were 1,174 firms that operated for the entire year in this category. Of these firms, 50 had 1,000 employees or more, and 1,124 had fewer than 1,000 employees. Based on this data, a majority of these firms can be considered small.
D. Description of Projected Reporting, Recordkeeping, and Other Compliance Requirements for Small Entities632. The Order clarifies and adopts certain incremental enhancements to the existing transparency rule, which was adopted in 2010, and will continue to require providers of broadband Internet access services to ''publicly disclose accurate information regarding the network management practices, performance, and commercial terms of its broadband Internet access services sufficient for consumers to make informed choices regarding use of such services and for content, application, service, and device providers to develop, market, and maintain Internet offerings.'' We summarize below the record keeping and reporting obligations of the accompanying Order. Additional information on each of these requirements can be found in the Order.
633. First, we clarify that all of the pieces of information described in paragraphs 56 and 98 of the 2010 Open Internet Order have been required as part of the current transparency rule, and we will continue to require the information as part of our enhanced rule. The only exception is the requirement to disclose ''typical frequency of congestion,'' which we no longer require since it is superseded by more precise disclosures already required by the rule, such as actual performance. Also, the requirement that all disclosures made by a broadband provider be accurate includes the need to maintain the accuracy of these disclosures.
634. Second, we enhance and describe in more specific terms than in 2010 the information to be provided in disclosing commercial terms, network performance characteristics, and network practices. For example, in meeting the existing requirement to disclose ''actual performance,'' providers of broadband Internet access services will be required to report packet loss, in addition to the already required metrics of speed and latency.
635. Third, we require that providers directly notify end users if their particular use of a network will trigger a network practice, based on a user's demand during more than the period of congestion, that is likely to have a significant impact on the end user's use of the service. The purpose of such notification is to provide the affected end users with sufficient information and time to consider adjusting their usage to avoid application of the practice.
636. Fourth, we establish a voluntary safe harbor that providers may use in meeting the existing requirement to make transparency disclosures in a format that meets the needs of end users. The safe harbor consists of the use of a standalone disclosure targeted to end users. Based on concerns raised in the record by smaller providers of broadband Internet access service, however, we do not at this time require use of this standalone format, and instead have submitted this issue to the Consumer Advisory Committee for further consideration.
E. Steps Taken To Minimize the Significant Economic Impact on Small Entities, and Significant Alternatives Considered637. The RFA requires an agency to describe any significant alternatives that it has considered in reaching its proposed approach, which may include (among others) the following four alternatives: (1) The establishment of differing compliance or reporting requirements or timetables that take into account the resources available to small entities; (2) the clarification, consolidation, or simplification of compliance or reporting requirements under the rule for small entities; (3) the use of performance, rather than design, standards; and (4) an exemption from coverage of the rule, or any part thereof, for small entities. We have considered all of these factors subsequent to receiving substantive comments from the public and potentially affected entities. The Commission has considered the economic impact on small entities, as identified in comments filed in response to the 2014 Open Internet NPRM and its IRFA, in reaching its final conclusions and taking action in this proceeding.
638. We considered, for example, a variety of approaches to deal with paid prioritization, and we determined that a flat ban on paid prioritization has advantages over alternative approaches identified in the record. We note that this approach relieves small edge providers, innovators, and consumers of the burden of detecting and challenging instances of harmful paid prioritization. Related to this issue, smaller edge providers expressed concern that they do not have the resources to fight against commercially unreasonable practices, which could result in an unfair playing field before the Commission. Still others argued that the standard would permit paid prioritization, which could disadvantage smaller entities and individuals. Given these concerns, we declined to adopt our proposed rule to prohibit practices that are not commercially reasonable. (Based on the record before us, we were persuaded that adopting a legal standard prohibiting commercially unreasonable practices is not the most effective or appropriate approach for protecting and promoting an open Internet.)
639. With regard to our no-unreasonable interference/disadvantage standard, we were mindful that vague or unclear regulatory requirements could stymie rather than encourage innovation, and found that the approach we adopted provides sufficient certainty and guidance to consumers, broadband providers, and edge providers'--particularly smaller entities that might lack experience dealing with broadband providers'--while also allowing parties flexibility in developing new services.
640. We found our existing informal complaint rule offers an accessible and effective mechanism for parties'--including consumers and small businesses with limited resources'--to report possible noncompliance with our open Internet rules without being subject to burdensome evidentiary or pleading requirements. Accordingly we declined to adopt proposals modifying the existing standard.
641. We also decline to adopt arbitration procedures or to mandate arbitration for parties to open Internet complaint proceedings. Under the rules adopted today, parties are still free to engage in mediation and outside arbitration to settle their open Internet disputes, but alternative dispute resolution will not be required. We noted commenters' concerns that mandatory arbitration, in particular, may more frequently benefit the party with more resources and more understanding of dispute procedure, and therefore should not be adopted.
642. In formulating the enhanced disclosure requirements, we crafted rules that strike a balance between compliance burdens to industry and utility for end-user consumers, edge providers, and the Internet community. We considered several additional metrics contemplated in the NPRM, but ultimately declined to require their disclosure in the Order, concluding that the adopted enhancements to transparency were sufficient to protect consumers. (For example, we do not require disclosure of the source of congestion due to the difficulty in determining the source, and the corresponding additional burden in requiring that information to be disclosed.) We also recognized with respect to the nature of disclosures that there are differences between fixed and mobile broadband networks.
643. The record reflects the concerns of some commenters that enhanced transparency requirements will be particularly burdensome for smaller providers. ACA, for example, suggests that smaller providers be exempted from the provision of such disclosures. ACA states that its member companies are complying with the current transparency requirements, which ''strike the right balance between edge provider and consumer needs for pertinent information and the need to provide ISPs with some flexibility in how they disclose pertinent information.'' We believe that the enhanced requirements adopted herein are incremental in nature, but nevertheless necessary to provide end-user consumers, edge providers, and the Internet community with better information about the critical network performance metrics, practices, and commercial terms that have a direct impact on their use of the network. Customers of small broadband providers have an equal need for this information. However, out of an abundance of caution, we grant a temporary exemption for small providers, with the potential for that exemption to become permanent. We note that all providers of broadband Internet access service, including small providers, remain subject to the existing transparency rule adopted in 2010.
644. To ensure we have crafted rules that strike a balance between utility for consumers and compliance burdens for industry including smaller providers, we took certain additional important measures. For example, Commission staff continues to refine the mobile MBA program, which could at the appropriate time be declared a safe harbor for mobile broadband providers. In addition, we have declined to require certain disclosures proposed in the 2014 Open Internet NPRM such as the source of congestion, packet corruption, and jitter in recognition of commenter concerns with the benefits and difficulty of making these particular disclosures. Noting commenter concerns, we also decline to mandate separate tailored disclosures for different audiences (e.g. end users and edge providers) at this time. Lastly, we note that many of the enhanced disclosures specified in the Order may have been required under the current transparency rule. As a result, we believe the enhanced requirements make more explicit many of the existing requirements rather than imposing new regulatory burdens on providers that are in compliance with our current rule.
F. Report to Congress645. The Commission will send a copy of the Order, including this FRFA, in a report to be sent to Congress and the Government Accountability Office pursuant to the Small Business Regulatory Enforcement Fairness Act of 1996. In addition, the Commission will send a copy of the Order, including the FRFA, to the Chief Counsel for Advocacy of the Small Business Administration. A copy of the Order and FRFA (or summaries thereof) will also be published in the Federal Register.
Federal Communications Commission.
Marlene H. Dortch,
Secretary.
For the reasons discussed in the preamble, the Federal Communications Commission amends 47 CFR parts 1, 8 and 20 as follows:
begin regulatory text
1.The authority citation for part 1 continues to read as follows:
Authority:15 U.S.C. 79, et seq.;47 U.S.C. 151, 154(i), 154(j), 155, 157, 160, 201, 225, 227, 303, 309, 332, 1403, 1404, 1451, 1452, and 1455.
2.Section 1.49 is amended by revising paragraph (f)(1)(i) to read as follows:
§ 1.49 Specifications as to pleadings and documents.* * * * *
(f) * * *
(1) * * *
(i) Formal complaint proceedings under Section 208 of the Act and rules in §§ 1.720 through 1.736, pole attachment complaint proceedings under Section 224 of the Act and rules in §§ 1.1401 through 1.1424, and formal complaint proceedings under Open Internet rules §§ 8.12 through 8.17, and;
* * * * *
3.The authority citation for part 8 is revised to read as follows:
Authority:47 U.S.C. 151, 152, 153, 154, 160, 201, 202, 301, 303, 316, 332, 403, 501, 503, and 1302.
4.The heading for part 8 is revised as set forth above.
5.Section 8.1 is revised to read as follows:
§ 8.1 Purpose.The purpose of this part is to protect and promote the Internet as an open platform enabling consumer choice, freedom of expression, end-user control, competition, and the freedom to innovate without permission, and thereby to encourage the deployment of advanced telecommunications capability and remove barriers to infrastructure investment.
§ 8.11 [Redesignated as § 8.2]6.Section 8.11 is redesignated as § 8.2 and is revised to read as follows:
§ 8.2 Definitions.(a) Broadband Internet access service. A mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service. This term also encompasses any service that the Commission finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in this part.
(b) Edge provider. Any individual or entity that provides any content, application, or service over the Internet, and any individual or entity that provides a device used for accessing any content, application, or service over the Internet.
(c) End user. Any individual or entity that uses a broadband Internet access service.
(d) Fixed broadband Internet access service. A broadband Internet access service that serves end users primarily at fixed endpoints using stationary equipment. Fixed broadband Internet access service includes fixed wireless services (including fixed unlicensed wireless services), and fixed satellite services.
(e) Mobile broadband Internet access service. A broadband Internet access service that serves end users primarily using mobile stations.
(f) Reasonable network management. A network management practice is a practice that has a primarily technical network management justification, but does not include other business practices. A network management practice is reasonable if it is primarily used for and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service.
7.Section 8.5 is revised to read as follows:
§ 8.5 No blocking.A person engaged in the provision of broadband Internet access service, insofar as such person is so engaged, shall not block lawful content, applications, services, or non-harmful devices, subject to reasonable network management.
8.Section 8.7 is revised to read as follows:
§ 8.7 No throttling.A person engaged in the provision of broadband Internet access service, insofar as such person is so engaged, shall not impair or degrade lawful Internet traffic on the basis of Internet content, application, or service, or use of a non-harmful device, subject to reasonable network management.
§ 8.9 [Redesignated as § 8.19]9.Section 8.9 is redesignated as § 8.19.
10.Add new § 8.9 to read as follows:
§ 8.9 No paid prioritization.(a) A person engaged in the provision of broadband Internet access service, insofar as such person is so engaged, shall not engage in paid prioritization.
(b) ''Paid prioritization'' refers to the management of a broadband provider's network to directly or indirectly favor some traffic over other traffic, including through use of techniques such as traffic shaping, prioritization, resource reservation, or other forms of preferential traffic management, either;
(1) In exchange for consideration (monetary or otherwise) from a third party, or
(2) To benefit an affiliated entity.
(c) The Commission may waive the ban on paid prioritization only if the petitioner demonstrates that the practice would provide some significant public interest benefit and would not harm the open nature of the Internet.
11.Add new § 8.11 to read as follows:
§ 8.11 No unreasonable interference or unreasonable disadvantage standard for Internet conduct.Any person engaged in the provision of broadband Internet access service, insofar as such person is so engaged, shall not unreasonably interfere with or unreasonably disadvantage end users' ability to select, access, and use broadband Internet access service or the lawful Internet content, applications, services, or devices of their choice, or edge providers' ability to make lawful content, applications, services, or devices available to end users. Reasonable network management shall not be considered a violation of this rule.
12.Section 8.13 is amended by revising paragraphs (a)(4), and (b), and by redesignating paragraphs (c) and (d) as paragraphs (d) and (e), and adding new paragraph (c) to read as follows:
§ 8.13 General pleading requirements.(a) * * *
(4) The original of all pleadings and submissions by any party shall be signed by that party, or by the party's attorney. Complaints must be signed by the complainant. The signing party shall state his or her address, telephone number, email address, and the date on which the document was signed. Copies should be conformed to the original. Each submission must contain a written verification that the signatory has read the submission and, to the best of his or her knowledge, information and belief formed after reasonable inquiry, it is well grounded in fact and is warranted by existing law or a good faith argument for the extension, modification or reversal of existing law; and that it is not interposed for any improper purpose. If any pleading or other submission is signed in violation of this provision, the Commission shall upon motion or upon its own initiative impose appropriate sanctions.
* * * * *
(b) Initial Complaint: Fee remittance; Service; Copies to be filed. The complainant shall remit separately the correct fee either by check, wire transfer, or electronically, in accordance with part 1, subpart G (see § 1.1106 of this chapter) and:
(1) Shall file an original copy of the complaint, using the Commission's Electronic Comment Filing System, and, on the same day:
(2) Serve the complaint by hand delivery on either the named defendant or one of the named defendant's registered agents for service of process, if available, on the same date that the complaint is filed with the Commission;
(c) Subsequent Filings: Service; Copies to be filed. (1) All subsequent submissions shall be filed using the Commission's Electronic Comment Filing System. In addition, all submissions shall be served by the filing party on the attorney of record for each party to the proceeding, or, where a party is not represented by an attorney, each party to the proceeding either by hand delivery, overnight delivery, or by email, together with a proof of such service in accordance with the requirements of § 1.47(g) of this chapter.
(2) Service is deemed effective as follows:
(i) Service by hand delivery that is delivered to the office of the recipient by 5:30 p.m., local time of the recipient, on a business day will be deemed served that day. Service by hand delivery that is delivered to the office of the recipient after 5:30 p.m., local time of the recipient, on a business day will be deemed served on the following business day;
(ii) Service by overnight delivery will be deemed served the business day following the day it is accepted for overnight delivery by a reputable overnight delivery service; or
(iii) Service by email that is fully transmitted to the office of the recipient by 5:30 p.m., local time of the recipient, on a business day will be deemed served that day. Service by email that is fully transmitted to the office of the recipient after 5:30 p.m., local time of the recipient, on a business day will be deemed served on the following business day.
(3) Parties shall provide hard copies of all submissions to staff in the Market Disputes Resolution Division of the Enforcement Bureau upon request.
* * * * *
13.Section 8.14 is amended by redesignating paragraphs (g) and (h) as paragraphs (h) and (i) and adding new paragraph (g) to read as follows:
§ 8.14 General formal complaint procedures.* * * * *
(g) Request for written opinion from outside technical organization. (1) After reviewing the pleadings, and at any stage of the proceeding thereafter, the Enforcement Bureau may, in its discretion, request a written opinion from an outside technical organization regarding one or more issues in dispute.
(2)(i) Wherever possible, the opinion shall be requested from an outside technical organization whose members do not include any of the parties to the proceeding.
(ii) If no such outside technical organization exists, or if the Enforcement Bureau in its discretion chooses to request an opinion from an organization that includes among its members a party to the proceeding, the Bureau shall instruct the organization that any representative of a party to the proceeding within the organization may not participate in either the organization's consideration of the issue(s) referred or its drafting of the opinion.
(iii) No outside technical organization shall be required to respond to the Bureau's request.
(3)(i) If an opinion from an outside technical organization is requested and the request is accepted, the Enforcement Bureau shall notify the parties to the dispute of the request within ten (10) days and shall provide them copies of the opinion once it is received.
(ii) The outside technical organization shall provide its opinion within thirty (30) days of the Enforcement Bureau's request, unless otherwise specified by the Bureau.
(iii) Parties shall be given the opportunity to file briefs in reply to the opinion.
* * * * *
14.Section 8.16 is revised to read as follows:
§ 8.16 Confidentiality of proprietary information.(a) Any materials generated in the course of a proceeding under this part may be designated as proprietary by either party to the proceeding or a third party if the party believes in good faith that the materials fall within an exemption to disclosure contained in the Freedom of Information Act (FOIA), 5 U.S.C. 552(b) (1) through (9). Any party asserting confidentiality for such materials must:
(1) Clearly mark each page, or portion thereof, for which a proprietary designation is claimed. If a proprietary designation is challenged, the party claiming confidentiality shall have the burden of demonstrating, by a preponderance of the evidence, that the materials designated as proprietary fall under the standards for nondisclosure enunciated in the FOIA.
(2) File with the Commission, using the Commission's Electronic Comment Filing System, a public version of the materials that redacts any proprietary information and clearly marks each page of the redacted public version with a header stating ''Public Version.'' The redacted document shall be machine-readable whenever technically possible. Where the document to be filed electronically contains metadata that is confidential or protected from disclosure by a legal privilege (including, for example, the attorney-client privilege), the filer may remove such metadata from the document before filing it electronically.
(3) File with the Secretary's Office an unredacted hard copy version of the materials that contain the proprietary information and clearly marks each page of the unredacted confidential version with a header stating ''Confidential Version.'' The unredacted version must be filed on the same day as the redacted version.
(4) Serve one hard copy of the filed unredacted materials and one hard copy of the filed redacted materials on the attorney of record for each party to the proceeding, or where a party is not represented by an attorney, each party to the proceeding either by hand delivery, overnight delivery, or email, together with a proof of such service in accordance with the requirements of § 1.47(g) of this chapter and § 8.13(c)(1)(a) through (c).
(b) Except as provided in paragraph (c) of this section, materials marked as proprietary may be disclosed solely to the following persons, only for use in the proceeding, and only to the extent necessary to assist in the prosecution or defense of the case:
(1) Counsel of record representing the parties in the complaint action and any support personnel employed by such attorneys;
(2) Officers or employees of the opposing party who are named by the opposing party as being directly involved in the prosecution or defense of the case;
(3) Consultants or expert witnesses retained by the parties;
(4) The Commission and its staff; and
(5) Court reporters and stenographers in accordance with the terms and conditions of this section.
(c) The Commission will entertain, subject to a proper showing under § 0.459 of this chapter, a party's request to further restrict access to proprietary information. Pursuant to § 0.459 of this chapter, the other parties will have an opportunity to respond to such requests. Requests and responses to requests may not be submitted by means of the Commission's Electronic Comment Filing System but instead must be filed under seal with the Office of the Secretary.
(d) The individuals designated in paragraphs (b)(1) through (3) of this section shall not disclose information designated as proprietary to any person who is not authorized under this section to receive such information, and shall not use the information in any activity or function other than the prosecution or defense in the case before the Commission. Each individual who is provided access to the information shall sign a notarized statement affirmatively stating that the individual has personally reviewed the Commission's rules and understands the limitations they impose on the signing party.
(e) No copies of materials marked proprietary may be made except copies to be used by persons designated in paragraphs (b) and (c) of this section. Each party shall maintain a log recording the number of copies made of all proprietary material and the persons to whom the copies have been provided.
(f) Upon termination of a complaint proceeding, including all appeals and petitions, all originals and reproductions of any proprietary materials, along with the log recording persons who received copies of such materials, shall be provided to the producing party. In addition, upon final termination of the proceeding, any notes or other work product derived in whole or in part from the proprietary materials of an opposing or third party shall be destroyed.
16.Section 8.18 is added to read as follows:
§ 8.18 Advisory opinions.(a) Procedures. (1) Any entity that is subject to the Commission's jurisdiction may request an advisory opinion from the Enforcement Bureau regarding its own proposed conduct that may implicate the open Internet rules or any rules or policies related to the open Internet that may be adopted in the future. Requests for advisory opinions may be filed via the Commission's Web site or with the Office of the Secretary and must be copied to the Chief of the Enforcement Bureau and the Chief of the Investigations and Hearings Division of the Enforcement Bureau.
(2) The Enforcement Bureau may, in its discretion, refuse to consider a request for an advisory opinion. If the Bureau declines to respond to a request, it will inform the requesting party in writing.
(3) Requests for advisory opinions must relate to prospective or proposed conduct that the requesting party intends to pursue. The Enforcement Bureau will not respond to requests for opinions that relate to ongoing or prior conduct, and the Bureau may initiate an enforcement investigation to determine whether such conduct violates the open Internet rules. Additionally, the Bureau will not respond to requests if the same or substantially the same conduct is the subject of a current government investigation or proceeding, including any ongoing litigation or open rulemaking at the Commission.
(4) Requests for advisory opinions must be accompanied by all material information sufficient for Enforcement Bureau staff to make a determination on the proposed conduct for which review is requested. Requesters must certify that factual representations made to the Bureau are truthful and accurate, and that they have not intentionally omitted any information from the request. A request for an advisory opinion that is submitted by a business entity or an organization must be executed by an individual who is authorized to act on behalf of that entity or organization.
(5) Enforcement Bureau staff will have discretion to ask parties requesting opinions, as well as other parties that may have information relevant to the request or that may be impacted by the proposed conduct, for additional information that the staff deems necessary to respond to the request. Such additional information, if furnished orally or during an in-person conference with Bureau staff, shall be promptly confirmed in writing. Parties are not obligated to respond to staff inquiries related to advisory opinions. If a requesting party fails to respond to a staff inquiry, then the Bureau may dismiss that party's request for an advisory opinion. If a party voluntarily responds to a staff inquiry for additional information, then it must do so by a deadline to be specified by Bureau staff. Advisory opinions will expressly state that they rely on the representations made by the requesting party, and that they are premised on the specific facts and representations in the request and any supplemental submissions.
(b) After review of a request submitted hereunder, the Enforcement Bureau will:
(1) Issue an advisory opinion that will state the Bureau's present enforcement intention with respect to the proposed open Internet practices;
(2) Issue a written statement declining to respond to the request; or;
(3) Take such other position or action as it considers appropriate. An advisory opinion states only the enforcement intention of the Enforcement Bureau as of the date of the opinion, and it is not binding on any party. Advisory opinions will be issued without prejudice to the Enforcement Bureau or the Commission to reconsider the questions involved, or to rescind or revoke the opinion. Advisory opinions will not be subject to appeal or further review.
(c) The Enforcement Bureau will have discretion to indicate the Bureau's lack of enforcement intent in an advisory opinion based on the facts, representations, and warranties made by the requesting party. The requesting party may rely on the opinion only to the extent that the request fully and accurately contains all the material facts and representations necessary to issuance of the opinion and the situation conforms to the situation described in the request for opinion. The Bureau will not bring an enforcement action against a requesting party with respect to any action taken in good faith reliance upon an advisory opinion if all of the relevant facts were fully, completely, and accurately presented to the Bureau, and where such action was promptly discontinued upon notification of rescission or revocation of the Commission's or Bureau's approval.
(d) Public disclosure. The Enforcement Bureau will make advisory opinions available to the public on the Commission's Web site. The Bureau will also publish the initial request for guidance and any associated materials. Parties soliciting advisory opinions may request confidential treatment of information submitted in connection with a request for an advisory opinion pursuant to § 0.459 of this chapter.
(e) Withdrawal of request. Any requesting party may withdraw a request for review at any time prior to receipt of notice that the Enforcement Bureau intends to issue an adverse opinion, or the issuance of an opinion. The Enforcement Bureau remains free, however, to submit comments to such requesting party as it deems appropriate. Failure to take action after receipt of documents or information, whether submitted pursuant to this procedure or otherwise, does not in any way limit or stop the Bureau from taking such action at such time thereafter as it deems appropriate. The Bureau reserves the right to retain documents submitted to it under this procedure or otherwise and to use them for all governmental purposes.
17.The authority citation for part 20 continues to read as follows:
Authority:47 U.S.C. 151, 152, 154(i), 201(b), 225, 301, 303(b), 303(g), 303(r), 316, 403, 615a, 615a-1, 615b, and 47 U.S.C. 615c.
18.Section 20.3 is amended by revising paragraph (b) in the definition of ''Commercial mobile radio service'', designating in the correct alphabetical order the definition of ''Incumbent Wide Area SMR Licensees,'' revising paragraph (a) in the definition of ''Interconnected Service'' and revising the definition of ''Public Switched Network'' to read as follows:
§ 20.3 Definitions.* * * * *
Commercial mobile radio service.* * *
(b) The functional equivalent of such a mobile service described in paragraph (a) of this section, including a mobile broadband Internet access service as defined in § 8.2 of this chapter.
* * * * *
Interconnected Service. A service:
(a) That is interconnected with the public switched network, or interconnected with the public switched network through an interconnected service provider, that gives subscribers the capability to communicate to or receive communication from other users on the public switched network; or
* * * * *
Public Switched Network. The network that includes any common carrier switched network, whether by wire or radio, including local exchange carriers, interexchange carriers, and mobile service providers, that uses the North American Numbering Plan, or public IP addresses, in connection with the provision of switched services.
* * * * *
end regulatory text
[FR Doc. 2015-07841 Filed 4-10-15; 8:45 am]
BILLING CODE 6712-01-P
Tesla was right: Scientists wirelessly transmit electricity through the air
Fri, 10 Apr 2015 15:59
Scientists in Japan have successfully transmitted electric energy wirelessly through the air, proving that Nikola Tesla was onto something big.For years debates have raged about whether or not power could be transferred through the air, and while there have been many reports of this being achieved on a small scale, there has never been a major mainstream study into the phenomenon, until now.
Scientists with the Japan Aerospace Exploration Agency used microwaves to deliver electricity to a specific target 55 meters away.
"This was the first time anyone has managed to send a high output of nearly two kilowatts of electric power via microwaves to a small target, using a delicate directivity control device," a spokesman for the agency told AFP on Thursday.
"SSPS consists of a space-based power generation/transmission facility that gathers sunlight, converts it into microwaves or laser beams, and transmits those to the ground; and a power receiving facility on the ground," explained researcher Yasuyuki Fukumuro.
"There are many technological challenges to solve before SSPS can be implemented. When transmitting power by microwaves, a significant technological challenge is how to control the direction, and transmit it with pinpoint accuracy from a geostationary orbit to a receiving site on the ground," he added.
The SSPS project will initially be geared towards space applications, to power space stations, shuttles, and equipment, but will eventually be used for practical purposes on Earth as well.
ISS Slow Scan TV Active on Weekend of April 11 | AMSAT-UK
Sun, 12 Apr 2015 14:29
ISS SSTV image 4/12 received by Frank Heritage M0AEU at 19:21 UT on Dec 18, 2014
The Russian Federal Space Agency (Roscosmos) has announced another round of amateur radio Slow Scan Television (SSTV) activity from the International Space Station (ISS). It will commemorate the anniversary of the first human spaceflight by Yuri Gagarin which took place on April 12, 1961.
Continuous operation, using the call sign RS0ISS, is expected to start at 1000 UT on Saturday, April 11 and continue until 2130 UT on Sunday, April 12.
ISS SSTV image 9/12 received by Martin Ehrenfried G8JNJ using the SUWS WebSDR on Dec 18, 2014
Twelve different images will be sent on 145.800 MHz FM using the SSTV mode PD180, with a 3-minute off time between transmissions.
One of the photos shows the commemorative diploma created by PZK, the national Polish Amateur Radio society, on the occasion of the 80th anniversary of the birth of first cosmonaut Yuri Gagarin.
The equipment used will be the Kenwood D710 transceiver located in the Russian Service Module. It is thought the equipment may be producing about 25 watts output which should provide a very strong signal.
Plans are being discussed for transmitting new images from space enthusiasts around the world in the coming months. Additional details will be released.
The images received by amateurs world-wide during previous transmissions can be seen at http://www.spaceflightsoftware.com/ARISS_SSTV/ and you are invited to upload any pictures you receive during the upcoming transmissions.
In the UK newspaper the Daily Mail, Jonathan O'Callaghan wrote about how 22-year-old Radek Karwacki, an AMSAT-UK member, received pictures from the ISS using a £10 ($15) RTL-SDR dongle and a dipole antenna, see http://amsat-uk.org/2015/02/04/iss-sstv-in-uk-press/
International Space Station '' Image Credit NASA
All you need to do to receive SSTV pictures direct from the space station is to connect the audio output of a scanner or amateur radio transceiver via a simple interface to the soundcard on a Windows PC or an Apple iOS device, and tune in to 145.800 MHz FM. You can even receive pictures by holding an iPhone next to the radio loudspeaker.
On Windows PC's the free application MMSSTV can be used to decode the signal, on Apple iOS devices you can use the SSTV app for compatible modes. (Note: see comments below about MMSSTV adjustments which may be needed to reduce picture slant)
The ISS puts out a strong signal on 145.800 MHz FM and a 2m handheld with a 1/4 wave antenna will be enough to receive it. The FM transmission uses 5 kHz deviation which is standard in much of the world apart from the British Isles and Europe where 2.5 kHz deviation is more common.
Many FM rigs can be switched been wide and narrow deviation FM filters. For best results you should select the wider deviation filters. Handhelds all seem to have a single wide filter fitted as standard.
The ISS Fan Club website will show you when the space station is in range.
ISS SSTV image 12/12 received by Martin Ehrenfried G8JNJ using the SUWS WebSDR Dec 18, 2014
Paul Turner G4IJE, co-developer of the SSTV PD modes, says regarding the MMSSTV PD180 mode: ''Don't forget to either enable ''Always show RX viewer'' or use the ''Picture viewer'' (magnifying glass icon) to show the picture at its real resolution of 640 x 496. If you just view as normal you will only see 320 x 248 resolution, which kind of defeats the object of using a high resolution mode.''
In Option > Setup MMSSTV (O) > RX make sure Auto-slant is ticked.
On the AMSAT-BB Rick W2JAZ and Alan WA4SCA comment on the need to set the MMSSTV sound card setting to 48 kHz instead of the default 44.100 kHz' Options' Setup' Misc' Then the Clock section at the bottom of the page
The MMSSTV default setting may need to be set to 24000 (exactly half of the sound card setting). You then should get good clean images.
The sound card adjustments will vary slightly depending on the version of the OS you are running, but usually will be under the advanced properties for the device. You can probably use a higher sampling rate for the sound card so long as it is a power of 2 multiple (2,4,8, etc) of the value in MMSSTV. For instance 192k (8x) has no issues. The same applies to most similar software.
You can receive the SSTV transmissions online using the SUWS WebSDR remote receiver located near London along with the MMSSTV software http://amsat-uk.org/2014/08/15/suws-websdr-moves-to-new-site/
ISS Fan Club '' Tracking / Predictions http://www.issfanclub.com/
Free MMSSTV Slow Scan TV software http://hamsoft.ca/pages/mmsstv.php
iOS SSTV App https://itunes.apple.com/gb/app/sstv/id387910013
For more on Slow Scan Television SSTV, see this article SSTV '' The Basicshttp://www.essexham.co.uk/sstv-the-basics
How to be successful with the ISS Slow Scan Television (SSTV) imaging systemhttp://www.marexmg.org/fileshtml/howtoisssstv.html
IZ8BLY Vox Recoder, enables you to record the signals from the ISS on 145.800 MHz while you're away at work http://antoninoporcino.xoom.it/VoxRecorder/
ARISS Slow Scan TV (SSTV) Blog and Gallery http://ariss-sstv.blogspot.co.uk/
Those capturing images are encouraged to upload them tohttp://www.spaceflightsoftware.com/ARISS_SSTV/submit.php
Information on the MAI-75 SSTV experimenthttp://www.energia.ru/eng/iss/researches/education-26.html
Video showing reception of SSTV using the FUNcube Dongle Pro SDR and SDR-RADIO going into Virtual Audio Cable (VAC) then to MMSSTV software https://www.youtube.com/watch?v=K6MOrX9iZCk
ISS SSTV received online with SUWS WebSDRhttp://amsat-uk.org/2014/09/06/iss-sstv-on-suws-websdr/
ISS SSTV 1/12 received by Martin Ehrenfried G8JNJ using the SUWS WebSDR Dec 18, 2014
brainwagon >> Slow Scan Television from the ISS this weekend'...
Sun, 12 Apr 2015 14:28
Note: This post was adapted by an email that I sent out to our ham radio club.
If anyone is interested in a fun little ham radio related activitytonight, you can try to receive slow scan television from the International Space Station this weekend. I haven't done this in a while,but I think I'll give it a try and see what I can come up with.
You can read about this event here:
AMSAT UK on the upcoming ISS event
They will be on 145.800Mhz (in the 2m band).
The way I usually ''work'' these is to use one of my HTs. A better antenna than the stock one is usually good (a longer whip, or even a yagi) but you might just see what you can here with the stock antenna. The ISS transmits with 25 watts of power, which is usually pretty easy to hear. I have a set of earphones that I hook with a splitter. One half goes to my earbuds, the other to a small digital audio recorder I have. Turn the squelch on your radio off so you can here the signal when it is weak. You may find that moving your antenna round will help a bit, so monitor with your earphones. Don't be shocked if you don't hear the ISS right at the rise time: it has 3 minutes of dead time between transmissions, which take about 3 minutes to send. It sounds a bit like a ticking of a clock, with a whistle in between, if you click this link, you can hear what it sounds like:
I like to record the audio, then play it back into my Windows PC and use the MMSSTV program, but you can actually go completely low tech and try an inexpensive iphone app, held up to the speaker of your HT. I use
Black Cat System's SSTV program for the iPhone/Ipad
which works okay, not amazing. If you are out doors in a windy or noisy location, your image won't be as good this way: the bg noise will cause interference.
To help out, I computed a set of rise/set/max elevation tables centered on San Francisco. If you live close, you can probably use these times. If you live in other parts of the country, you might try looking at the Heaven's Above website. Select ''Passes to include'' to be all, and enter your location in the upper right. The table below was calculated by my own software.
--------------------------------------------------------------------------------Rise time Azi Max Elev Time Elev Set time Azi--------------------------------------------------------------------------------2015/04/11 16:24:33 178.90 2015/04/11 16:28:52 9.27 2015/04/11 16:33:10 74.10 (Local Time)2015/04/11 23:24:34 178.90 2015/04/11 23:28:52 9.27 2015/04/11 23:33:11 74.10 (UTC)2015/04/11 17:59:18 232.14 2015/04/11 18:04:47 76.70 2015/04/11 18:10:17 49.52 (Local Time) [1]2015/04/12 00:59:18 232.14 2015/04/12 01:04:48 76.70 2015/04/12 01:10:17 49.52 (UTC)2015/04/11 19:36:48 276.47 2015/04/11 19:41:38 13.93 2015/04/11 19:46:28 40.34 (Local Time)2015/04/12 02:36:48 276.47 2015/04/12 02:41:38 13.93 2015/04/12 02:46:28 40.34 (UTC)2015/04/11 21:15:06 309.66 2015/04/11 21:19:13 7.29 2015/04/11 21:23:21 47.92 (Local Time)2015/04/12 04:15:06 309.66 2015/04/12 04:19:14 7.29 2015/04/12 04:23:21 47.92 (UTC)2015/04/11 22:52:10 319.85 2015/04/11 22:56:52 12.34 2015/04/11 23:01:34 78.97 (Local Time) [2]2015/04/12 05:52:10 319.85 2015/04/12 05:56:53 12.34 2015/04/12 06:01:35 78.97 (UTC)2015/04/12 00:28:22 312.09 2015/04/12 00:33:48 58.58 2015/04/12 00:39:14 122.75 (Local Time) [3]2015/04/12 07:28:22 312.09 2015/04/12 07:33:49 58.58 2015/04/12 07:39:15 122.75 (UTC)2015/04/12 02:05:15 289.69 2015/04/12 02:09:49 11.95 2015/04/12 02:14:23 174.60 (Local Time)2015/04/12 09:05:16 289.69 2015/04/12 09:09:50 11.95 2015/04/12 09:14:24 174.60 (UTC)[1] Probably the easiest pass, the ISS passes almost straight overhead,should be loud and easy.[2] A low night time pass, but the ISS should be visible to the naked eye.[3] Another night time pass, but too late for the ISS to catch anysun. 58 degrees is a good pass, the second one.If I get any good images, I'll send them out next week.
Agenda 21
For Drinking Water in Drought, California Looks Warily to Sea - NYTimes.com
Sun, 12 Apr 2015 14:03
CARLSBAD, Calif. '-- Every time drought strikes California, the people of this state cannot help noticing the substantial reservoir of untapped water lapping at their shores '-- 187 quintillion gallons of it, more or less, shimmering so invitingly in the sun.
Now, for the first time, a major California metropolis is on the verge of turning the Pacific Ocean into an everyday source of drinking water. A $1 billion desalination plant to supply booming San Diego County is under construction here and due to open as early as November, providing a major test of whether California cities will be able to resort to the ocean to solve their water woes.
Across the Sun Belt, a technology once dismissed as too expensive and harmful to the environment is getting a second look. Texas, facing persistent dry conditions and a population influx, may build several ocean desalination plants. Florida has one operating already and may be forced to build others as a rising sea invades the state's freshwater supplies.
In California, small ocean desalination plants are up and running in a handful of towns. Plans are far along for a large plant in Huntington Beach that would supply water to populous Orange County. A mothballed plant in Santa Barbara may soon be reactivated. And more than a dozen communities along the California coast are studying the issue.
Interactive Feature | The Parched West Articles in this series will explore the impact of the drought that has hit states from the Pacific Coast to the Great Plains.
The facility being built here will be the largest ocean desalination plant in the Western Hemisphere, producing about 50 million gallons of drinking water a day. So it is under scrutiny for whether it can operate without major problems.
''It was not an easy decision to build this plant,'' said Mark Weston, chairman of the agency that supplies water to towns in San Diego County. ''But it is turning out to be a spectacular choice. What we thought was on the expensive side 10 years ago is now affordable.''
Still, the plant illustrates many of the hard choices that states and communities face as they consider whether to tap the ocean for drinking water.
In San Diego County, which depends on imported freshwater supplies from the Colorado River and from Northern California, water bills already average about $75 a month. The new plant will drive them up by $5 or so to secure a new supply equal to about 7 or 8 percent of the county's water consumption.
The plant will use a huge amount of electricity, increasing the carbon dioxide emissions that cause global warming, which further strains water supplies. And local environmental groups, which fought the plant, fear a substantial impact on sea life.
The company developing the plant here, Poseidon Water, has promised to counter the environmental damage. For instance, it will pay into a California program that finances projects to offset emissions of greenhouse gases.
Still, some scientists and environmental groups contend that if rainy conditions return to California, the plant here and others like it could become white elephants. Santa Barbara, northwest of Los Angeles, built its desalination plant a quarter-century ago and promptly shut it down when rains returned.
Australia is a more spectacular case: It built six huge desalination plants during a dry spell and has largely idled four of them though water customers remain saddled with several billion dollars' worth of construction bills.
''Our position is that seawater desalination should be the option of last resort,'' said Sean Bothwell, an attorney with the California Coastkeeper Alliance, an environmental coalition that has battled California's turn toward the technology. ''We need to fully use all the sustainable supplies that we have available to us first.''
The rising interest in desalination is not simply a matter of desperation, though that is certainly a factor in states with growing populations and few obvious sources of new water. Advocates say the technology has improved markedly over the past 20 years. While the water can cost twice as much as conventionally treated water, it is still less than a penny a gallon, and that is starting to look tolerable in parched regions.
Desalination has grown into a huge industry, with more than 15,000 plants operating around the world. Many are small and treat brackish groundwater, requiring much less energy and costing less than seawater treatment. The United States already has scores of these smaller plants.
Huge plants treating seawater have been rare here, but they exist elsewhere, particularly in chronically dry regions like the Middle East. In little more than a decade, Israel has moved from perpetual water crisis to a point where it will soon get half its water from desalination. Israeli engineers have become sought-after partners in many cities, and are involved in the Carlsbad project.
Interactive Graphic | How Water Cuts Could Affect Every Community in California An interactive map shows how much California residents could be forced to cut daily water consumption under a preliminary plan released by state officials.
The technological approach being employed here, and in most recent plants, is called reverse osmosis. It involves forcing seawater through a membrane with holes so tiny that the water molecules can pass through but larger salt molecules cannot.
A huge amount of energy is required to create enough pressure to shove the water through the membranes. But clever engineering has cut energy use of the plants in half in 20 years, as well as improving their reliability.
Future desalination plants also have the potential to blend well with the rising percentage of renewable power on the electric grids in California and Texas. Since treated water can be stored, the plants could be dialed up at times when electricity from wind or solar power is plentiful, and later dialed down.
However, as interest in desalination spreads, California and other states confront major decisions about the environmental rules for the new plants.
Both the intake of seawater and the disposal of excess salt into the ocean can harm sea life. Sucking in huge amounts of seawater, for instance, can kill fish eggs and larvae by the billions. Technical solutions exist, but they can drive up costs, and it is still unclear how strict California regulators will be with the plant developers.
Environmental groups argue that the embrace of desalination represents a failure to manage freshwater effectively. They want much more aggressive programs focused on conservation and on reuse of existing supplies, pointing out that half of municipal water here still goes to grass and other lawn plants. These arguments have sometimes carried the day, as they did when voters in Santa Cruz effectively killed a desalination plant.
Mr. Weston, the chairman of the San Diego County Water Authority, said his agency and others in the area had gone a long way toward embracing conservation. Since 1990, water use in the county has been cut 12 percent, even as the population has jumped 30 percent.
Long worried about water scarcity, the San Diego region helped to pioneer measures that ultimately spread across the country, including low-flow bathroom fixtures, more efficient washing machines and other innovations.
But these steps have not been enough to secure the region's water future, Mr. Weston said. Thus, the water authority decided years ago, long before the current drought began, to move forward on the desalination plant.
It is in the late stages of construction, by an artificial bay opening to the sea in Carlsbad. On a recent day, the faint smell of glue wafted through the air as workers sealed joints on huge pipes. When it goes into operation, the plant will pump water through 16,040 cylinders containing the membranes that trap salt.
Peter MacLaggan, a vice president of Poseidon Water who is overseeing the project, said the plant was in some ways a response to longstanding public interest in desalination.
''Every time California has a drought, we get letters to the editor pointing out that there's a lot of water in the Pacific Ocean,'' he said as waves broke on the shoreline in the distance. ''They say, 'Hey, guys, what are we waiting for?'''
Santa Barbara, a chic tourist destination on the coast, could face severe water shortages within a year if the drought continues. The city is on the verge of spending $40 million to reactivate the long-mothballed desalination plant there.
That step would drive water bills up sharply, acknowledged the mayor, Helene Schneider. But, she added, ''no water is a worse option than very expensive water.''
Obama Kid Asthma
from his smoking perhaps?
Bank$ters
JPMorgan's CEO Jamie Dimon warns shareholders of coming economic crisis -- Puppet Masters -- Sott.net
Sun, 12 Apr 2015 14:37
(C) Jason Alden/Bloomberg via Getty ImagesJames "Jamie" Dimon, chief executive officer of JPMorgan Chase & Co.
This time, it isn't just Peter Schiff, Marc Faber, David Stockman or Jim Rogers ringing the alarm bells warning about another looming financial crisis. One of the most prolific Wall Street CEOs is actually informing everyone that "there will be another crisis."JPMorgan CEO Jamie Dimon wrote in an annual letter to shareholders that another economic collapse is possible. In such an event, markets will become more volatile, while a recession would bring more chaos to the United States economy.
Here is what he wrote in his letter:
"The trigger to the next crisis will not be the same as the trigger to the last one, but there will be another crisis. Triggering events could be geopolitical, a recession where the Fed rapidly increases interest rates, a commodities price collapse, a commercial real estate crisis, bubbles, etc."
Dimon cited a lack of credit extension, enhanced federal regulation and a paucity of securities as just some of the reasons for another financial crisis. "[These] make it more likely that a crisis will cause more volatile market movements with a rapid decline in valuations even in what are very liquid markets."
What's behind these comments exactly? It's hard to say, but perhaps he suffered from a near-death experience so he thinks he can save himself by warning the public at large. Who knows? Despite who says it, another collapse is nigh and you should prepare yourself.
Monsantooo
Bad news for Monsanto: The world's most credible medical journal outlines the dangerous health hazard of Glyphosate
Sun, 12 Apr 2015 14:26
(C) thelibertybeacon.com
Given the restrictions and the level of control placed upon the disclosure of information when it comes to "credible" medical studies, it seems surprising that glyphosate, the most commonly used herbicide on the planet, has been officially deemed a dangerous health hazard to human beings by the mainstream health community."Glyphosate currently has the highest global production volume of all herbicides. The largest use worldwide is in agriculture. The agricultural use of glyphosate has increased sharply since the development of crops that have been genetically modified to make them resistant to glyphosate. Glyphosate is also used in forestry, urban, and home applications. Glyphosate has been detected in the air during spraying, in water, and in food. The general population is exposed primarily through residence near sprayed areas, home use, and diet and the level that has been observed is generally low." (source)
A recently published study in what is considered to be one of the most (if not the most) credible medical journals of today, The Lancet Oncology, determined that glyphosate, the main ingredient in Monsanto's RoundUp pesticide, is "probably carcinogenic to humans." The study was published earlier this month, and was conducted by the World Health Organization's International Agency for Research on Cancer. It analyzed data from studies that have been conducted on the chemical for the past couple of decades. (source)"There is convincing evidence that glyphosate also can cause cancer in laboratory animals. On the basis of tumours in mice, the United States Environmental Protection Agency (US EPA) originally classified glyphosate as possibly carcinogenic to humans. A US EPA report and several more recent positive results conclude that there is sufficient evidence of carcinogenicity in experimental animals. Glyphosate also caused DNA and chromosomal damage in human cells, although it gave negative results in tests using bacteria. One study in community residents reported increases in blood markers of chromosomal damage (micronuclei) after glyphosate formulations were sprayed nearby." (source)
It's the beginning of 2015, and after decades of research and warnings from hundreds of scientists all around the globe, why has it taken so long to officially acknowledge (in North America) that glyphosate is harmful? Billions of pounds of this stuff is sprayed every single year, and as mentioned above, it is commonly detected in air samples, water samples, in our food, and even in our urine. So again, why the delay?Many professionals today have expressed their concern regarding the delay and manipulation of medical research. Despite the fact that these types of facts have been published for a number of years, Monsanto still maintains that they are safe, and a major health organization like the WHO, you would think, would have acknowledged the dangers associated with these herbicides many years ago.As Dr. Marcia Angell (physician, author, former editor in chief of the NEJM) puts it, "It's just not possible to believe much of the clinical research that is published, or to rely on the judgement of trusted physicians or authoritative medical guidelines." Others point to the "revolving door" between Monsanto, the EPA, and the FDA, and the fact that corporations (like Monsanto) have their hand in dictating governmental policy. Regardless, the information is out there and it's quite clear that glyphosate is harmful. (source)
What's worse, the genetically modified crops have become even more resistant to their killers, resulting in increased use of herbicides each year and even providing Monsanto the justification it needs to produce newer and more deadly chemical mixes to combat the problem.
Monsanto's Response
Monsanto is not at all happy about the study and they are requesting a retraction. In a press release, Chief Technology Officer Dr. Robb Fraley said that Monsanto is "outraged" and that "this conclusion is inconsistent with the decades of ongoing safety reviews by the leading regulatory authorities around the world that have concluded that all labeled uses of glyphosate are safe for human health." (source)
More Research
The list of studies outlining the dangers associated with this herbicide is enormous, and explains exactly why multiple countries around the globe forbid its use. For example, Sri Lanka decided to completely ban glyphosate from their country out of concern that the chemical may be linked to a fatal kidney disease that could kill agricultural workers.
A new study that was published in the International Journal of Environmental Research and Public Health suggests that Roundup, or glyphosate, becomes highly toxic to the kidney once mixed with "hard" water or metals like cadmium and arsenic. These metals often exist naturally in the soil or are added via the fertilizer.(source)(source)
"An investigation carried out by medical specialists and scientists has revealed that kidney disease was mainly caused by glyphosate. President Mahinda Rajapaksa has ordered the immediate removal of glyphosate from the local market soon after he was told of the contents of the report." (source)
You can read more about that here.Here is a report by multiple researchers, scientists, and professors regarding glyphosate and birth defects. Here is the conclusion they came to:
"Our examination of the evidence leads us to the conclusion that the current approval of glyphosate and Roundup is deeply flawed and unreliable. In this report, we examine the industry studies and regulatory documents that led to the approval of glyphosate. We show that industry and regulators knew as long ago as the 1980'²s and 1990'²s that glyphosate causes malformation, but that information was not made public. We demonstrate how EU regulators reasoned their way from clear evidence of glyphosate's teratogenicity in industry's own studies to a conclusion that minimized these findings in the EU Commission's final review report."
It's also important to note that much research published in peer-reviewed scientific journals, as well as other important independent research, has linked (using the Bradford Hill Criteria, fairly strong in my opinion) glyphosate to autism, cancer, Alzheimer's disease, Parkinson's disease, and more. (source)(source) (Please do your research, there are many sources for this claim, I've provided a few here and within the articles that are linked within this article)A report coming out of Argentina explains how deaths from cancerous tumors have as much as doubled in areas where genetically modified (GM) crops are grown and agro-chemicals are used. You can read more about that and access the report here.
"There is evidence of high levels of genetic damage in people of Marcos Juarez, which may result from unintentional exposure to pesticides. " - Fernando Manas, PhD National University of Rio Cuarto (source)
A study was published in November 2012 in the Journal of Food and Chemical Toxicology, titled Long Term Toxicity of Roundup Herbicide and a Roundup-Tolerant genetically modified maize, by Gilles-Eric Seralini and his team of researchers at France's Caen University. It was a very significant study that made a lot of noise worldwide, the first of its kind under controlled conditions that examined the possible effects of a GMO maize diet treated with Monsanto's Roundup Herbicide. After going through such a rigorous review process and remaining published for a long time, the study was retracted. Hundreds of scientists around the world condemned the retraction, and the study was then republished, updated, and all criticisms were answered.The chronic toxicity study examined the health impacts on rats of eating commercialized genetically modified (GM) maize, alongside Monsanto's NK603 glyphosate-based herbicide Roundup.
The study found severe liver and kidney damage, as well as hormonal disturbances, in rats fed with GM maize in conjunction with low levels of Roundup - levels that were below those permitted in most drinking water across Europe. Results also indicated high rates of large tumors and mortality in most treatment groups.
You can read more about this story, and access the studies here. And as you can see from the quote taken from the WHO/The Lancet, multiple studies in animal models have shown these dangers, as well as multiple studies using human cells. There is obviously cause for concern here.
To access and read about more studies linking agricultural pesticides (and more) to autism, click here.
"Children today are sicker than they were a generation ago. From childhood cancers to autism, birth defects and asthma, a wide range of childhood diseases and disorders are on the rise. Our assessment of the latest science leaves little room for doubt; pesticides are one key driver of this sobering trend." October 2012 report by Pesticide Action Network North America (PANNA) (source)(source)
There is a lot of information to support these claims, so hopefully this gets you off to a good start if you are interested in doing more research.Sourcenature.com/news/widely-used-herbicide-linked-to-cancer-1.17181
CYBER!
Sam email about John Deere
Hi Adam
After listing to your latest episode I finally feel there is something I have knowledge in that I can help clarify for you.
John Deere are worryed of end users getting tractor computers remapped as the difference between the top of the line in a model group and the bottom is the mapping of the engine. We run about ten John Deeres and have recently purchased a 6150m the (6 refers to the model and the 150 refers to the HP). for nz$3000 we remapped it to 170hp thus saving upwards of $30,000. that same engine can be boosted up to 210hp.
for comparison the price in NZ$ for a john deere is about $1000 per HP as a rule of thumb so you can see by getting a brand new tractor remapped it could do john deere out of a lot of money. I'm pretty sure the same can be done for most engine manufactures ie Cummings
As for the tractors getting used for playing illegally downloaded music why do they put a stereo with a jack to hook my phone into or a Bluetooth function.
As i spend upwards of 1200 hours a year in tractors there are two things I feel I'm knowledgeable about one being tractors and the other is how good a podcast is, and yours is the only one I use my mobile data to listen to as soon as it comes out and the only one I donate to on a monthly basis, so that must tell you something about how good your show is.
Thanks and dont ever stop what your doing as you guys combined are worth a million Joe Rogans and leo leports
Ministry of Truth
Rolling Stone's 'A Rape on Campus.' Notes and comment on Columbia J-school's investigation. >> Pressthink
Mon, 06 Apr 2015 14:59
The key decision Rolling Stone made was made at the beginning: to settle on a narrative '-- indifference to campus rape '-- and go in search of the story that would work just right for that narrative.First, some key links:
Here's the text itself: Rolling Stone and UVA: The Columbia University Graduate School of Journalism Report: An anatomy of a journalistic failure.
The author's apology: Statement From Writer of Rolling Stone Rape Article, Sabrina Erdely.
CJR: Interview with Steve Coll and Sheila Coronel, lead authors of the Columbia report.
New York Times account: Rolling Stone Article on Rape at University of Virginia Failed All Basics, Report Says
Huffington Post's summary. Rolling Stone's UVA Rape Story Was A 'Journalistic Failure' That Could've Been Avoided, Columbia Finds
Poynter.org, The journalism community reacts to the review of 'A Rape On Campus'
Second, a few disclaimers:
The authors, Steve Coll, the dean of the Columbia School of Journalism, Sheila Coronel, dean of academic affairs, and Derek Kravitz, a postgraduate research scholar at Columbia, took this on voluntarily. Rolling Stone did not pay them. They did it as a public service and a gift to the profession of journalism. They did it because they thought it was important. As a journalism professor, I am grateful to them for this work. Thank you!
I teach in a competing program at NYU. Factor that in as you evaluate what I have to say, some of which is critical.
Overall, I think the report is impressively reported and soundly reasoned. It's a hugely valuable record from which journalists and students of journalism will draw lessons for years. I wish we had studies just like it for other big screw-ups, like this one.
My notes and commentary:
1. Asking ''how could this happen?'' is not the same as asking, ''what could have prevented it?'' The authors chose to focus their study on prevention '-- steps not taken that would have avoided disaster '-- rather than tracing those mistakes to their origins, which might include, for example, bad ideas or rotten assumptions. It's a defensible decision, but it does have consequences. These ripple through the report.
2. This is an amazing passage:
Rolling Stone's senior editors are unanimous in the belief that the story's failure does not require them to change their editorial systems. ''It's not like I think we need to overhaul our process, and I don't think we need to necessarily institute a lot of new ways of doing things,'' Dana said. ''We just have to do what we've always done and just make sure we don't make this mistake again.'' Coco McPherson, the fact-checking chief, said, ''I one hundred percent do not think that the policies that we have in place failed. I think decisions were made around those because of the subject matter.''
It's amazing because it leaves Rolling Stone editors with a tautological explanation. How could we have screwed up so badly? Because this time we screwed up really badly. The way to prevent another mistake like this is to make sure we don't make this mistake again. A remarkable conclusion, considering the stakes. To their credit, the authors of the report don't buy this one bit.
3. ''The editors invested Rolling Stone's reputation in a single source,'' says the report. I think they're right. Will Dana, managing editor of Rolling Stone, says they're wrong:
Mr. Dana said he had reached many of the same conclusions as the Columbia report in his own efforts to examine the article, but he disagreed with the report's assertion that the magazine had staked its reputation on the word of one source. ''I think if you take a step back, our reputation rests on a lot more than this one story,'' he said.
The point is not that your reputation accumulated over time rests on one story, but that one story at the wrong time can ruin it. I'd want my managing editor to understand that. Wouldn't you?
4. ''In hindsight,'' the report says, ''the most consequential decision Rolling Stone made was to accept that Erdely had not contacted the three friends who spoke with Jackie on the night she said she was raped. That was the reporting path, if taken, that would have almost certainly led the magazine's editors to change plans.'' What the authors mean is not ''most consequential decision.'' They mean ''easiest route to preventing disaster.'' You were so close! Contact the friends and the story falls apart. That's what they mean.
5. The most consequential decision Rolling Stone made was made at the beginning: to settle on a narrative and go in search of the story that would work just right for that narrative. The key term is emblematic. The report has too little to say about that fateful decision, probably because it's not a breach of procedure but standard procedure in magazine-style journalism. (Should it be?) This is my primary criticism of the Columbia report: it has too little to say about the ''emblem of'...'' problem.
6. Not that it's entirely missing. The basic facts are there:
Erdely said she was searching for a single, emblematic college rape case that would show ''what it's like to be on campus now '... where not only is rape so prevalent but also that there's this pervasive culture of sexual harassment/rape culture,'' according to Erdely's notes of the conversation.
Idea: Maybe ''a single, emblematic college rape case'' does not exist. Maybe the hunt for such was ill-conceived from the start. Maybe that's the wrong way for Rolling Stone to have begun.
7. This is from Paul Farhi's Nov. 28 account in the Washington Post:
So, for six weeks starting in June, Erdely interviewed students from across the country. She talked to people at Harvard, Yale, Princeton and her alma mater, the University of Pennsylvania. None of those schools felt quite right. But one did: the University of Virginia, a public school, Southern and genteel, brimming with what Erdely calls ''super-smart kids'' and steeped in the legacy of its founder, Thomas Jefferson.
None of those schools felt quite right. What kind of ''feel'' is this? It's feeling for a fit between discovered story and a prior '-- given '-- narrative.
8. ''Mr. Dana said the article stemmed from a feeling he and other senior editors had over summer that the issue of unpunished campus rapes would make a compelling and important story,'' read Ravi Somaiya's Dec. 7 report in the New York Times. There's the prior narrative I mentioned. It didn't start with Sabrina Rubin Erdely. She was sent on a search for where to set it.
9. This is from Erik Wemple's Dec. 5 column for the Post:
Observe how Erdely responded to a question about the accused parties in Jackie's alleged gang rape. In that Slate podcast, when asked who these people were, she responded, ''I don't want to say much about them as individuals but I'll just say that this particular fraternity, Phi Kappa Psi '-- it's really emblematic in a lot of ways of sort of like elitist fraternity culture. It's considered to be a kind of top-tier fraternity at University of Virginia.
I don't want to say much about them as individuals. In fact, she didn't know anything about them ''as individuals'' and never located them '-- a major criticism in the report. Asked about contacting these people, she answers with their fitness as an emblem.
10. It is therefore striking that Erdely's public apology did not extend itself to Phi Kappa Psi. I think it should have.
11. The alternative to starting with a narrative and searching for a campus, a frat and a survivor's story that can serve as your emblem was pointed out by Reason magazine's Robby Soave: Start with a proven case: two former Vanderbilt University football players convicted of gang raping a female student during a night of drinking and drug use. Dig in on that. Then find another and dig in on that. It's true that ''you always try to contact the accused'' is very, very basic to good journalism. But let your reporting drive the narrative, rather than the other way around'-- this is also very basic. Yet it doesn't get framed that way (as a basic error) in the report.
12. Sometimes the Rolling Stone journalists quoted in the Columbia report appear to be saying this was ''Jackie's story.'' It was told from Jackie's point of view, they say. Because it was so powerful, because they found her credible. Then at other times they give the impression that it was not about Jackie at all. It's about the culture of indifference that greets women who try to report rape on college campuses. They could have dropped Jackie and told many other stories, Will Dana says in the report. This is Erdely responding to the Post's nagging questions in December:
''I could address many of [the questions] individually'... but by dwelling on this, you're getting sidetracked,'' she wrote in an e-mail response to The Post's inquiry. ''As I've already told you, the gang-rape scene that leads the story is the alarming account that Jackie '-- a person whom I found to be credible '-- told to me, told her friends, and importantly, what she told the UVA administration, which chose not to act on her allegations in any way '-- i.e., the overarching point of the article. THAT is the story: the culture that greeted her and so many other UVA women I interviewed, who came forward with allegations, only to be met with indifference.''
This was Jackie's story. No, it's about the culture of indifference. How can both be true? If she's the perfect emblem then both are true. This is the belief that overtook the Rolling Stone staff. But what made them vulnerable to that belief?
13. ''Ultimately, we were too deferential to our rape victim; we honored too many of her requests in our reporting,'' says deputy managing editor Sean Woods in the report. This is Rolling Stone's Maginot Line. ''We should have been much tougher, and in not doing that, we maybe did her a disservice.''
Erdely added: ''If this story was going to be about Jackie, I can't think of many things that we would have been able to do differently'... Maybe the discussion should not have been so much about how to accommodate her but should have been about whether she would be in this story at all.'' Erdely's reporting led her to other, adjudicated cases of rape at the university that could have illustrated her narrative, although none was as shocking and dramatic as Jackie's.
Indeed. None was.
14. Part of what made Rolling Stone editors vulnerable to the ''emblem of'...'' problem was some seriously dated thinking about credibility, in which it's said to be sort of like charisma. You have charisma or you don't. You ''have'' credibility or you don't. If a source is felt to be credible, the entire story can ride on that. Your colleagues are credible, so it doesn't occur you to ask if they could all be missing something.
A dramatic high point for this kind of thinking comes during Hannah Rosin's incredible podcast interview with Sabrina Erdely. Rosin asks near the end of it: If you were Jackie's lawyer, how would you prove her case? (Go to 6:35 on this clip and listen.) The author's reply: ''I found her story to be very'-- I found her to be very credible.''
15. It's almost like, if you have credibility you don't need proof. That's an absurd statement, of course, but here's how they got there (without realizing it.) Instead of asking: what have we done in telling Jackie's story to earn the skeptical user's belief? you say: I'm a skeptical journalist, I found her story believable, so will the users. Voil ! Credibility. Will Dana is one of the best editors in New York. Who ''has'' more credibility than him? No one! He finds her story believable. Doesn't that ''give'' it credibility too?
16. Bit by bit the readers get eclipsed from this view. Don't take our word for it, see for yourself: that logic gets eclipsed too. (Don't take her word for it, listen to Jackie's friends talk about the attacks. Rolling Stone dispensed with that.) In fact, credibility isn't like charisma, which you have or don't. It's a transaction between journalists and readers. Readers have to trust, yes, but journalists have to realize that they cannot put too great a strain on the reader's trust. 'A Rape on Campus'' did that, repeatedly. But the journalists involved didn't realize what they were doing. Why not?
I wish the Columbia report, as good as it is, told us more than it does about that. ''How could this happen?'' is harder to answer than ''what would have prevented it?'' But this was our best chance to find out.
(I reserve the right to add to these notes on Monday'....)
Sabrina Rubin Erdely, Writer of Rolling Stone Rape Article, Issues Statement - NYTimes.com
Tue, 07 Apr 2015 07:35
Sabrina Rubin Erdely, the author of a now-discredited article in Rolling Stone magazine about a rape at a University of Virginia fraternity, issued this statement:
''The past few months, since my Rolling Stone article ''A Rape on Campus'' was first called into question, have been among the most painful of my life. Reading the Columbia account of the mistakes and misjudgments in my reporting was a brutal and humbling experience. I want to offer my deepest apologies: to Rolling Stone's readers, to my Rolling Stone editors and colleagues, to the U.V.A. community, and to any victims of sexual assault who may feel fearful as a result of my article.
''Over my 20 years of working as an investigative journalist '-- including at Rolling Stone, a magazine I grew up loving and am honored to work for '-- I have often dealt with sensitive topics and sources. In writing each of these stories I must weigh my compassion against my journalistic duty to find the truth. However, in the case of Jackie and her account of her traumatic rape, I did not go far enough to verify her story. I allowed my concern for Jackie's well-being, my fear of re-traumatizing her, and my confidence in her credibility to take the place of more questioning and more facts. These are mistakes I will not make again.
''Reporting on rape has unique challenges, but the journalist still has the responsibility to get it right. I hope that my mistakes in reporting this story do not silence the voices of victims that need to be heard.''
Statement From University of Virginia PresidentTeresa A. Sullivan, the president of the University of Virginia, in Charlottesville, issued a statement late Sunday.
''Rolling Stone's story, 'A Rape on Campus,' did nothing to combat sexual violence, and it damaged serious efforts to address the issue. Irresponsible journalism unjustly damaged the reputations of many innocent individuals and the University of Virginia. Rolling Stone falsely accused some University of Virginia students of heinous, criminal acts, and falsely depicted others as indifferent to the suffering of their classmate. The story portrayed university staff members as manipulative and callous toward victims of sexual assault. Such false depictions reinforce the reluctance sexual assault victims already feel about reporting their experience, lest they be doubted or ignored.
''The Charlottesville Police Department investigation confirms that far from being callous, our staff members are diligent and devoted in supporting and caring for students. I offer our community's genuine gratitude for their devotion and perseverance in their service.
''Sexual violence is a serious issue for our society, and it requires the focus and attention of all in our communities. Long before Rolling Stone published its article, the University of Virginia was working to confront sexual violence. And we will continue to implement substantive reforms to improve culture, prevent violence and respond to acts of violence when they occur. Our highest priority is to ensure the safety of our students so they can learn and achieve their personal potential in an environment of trust and security. We will continue to work tirelessly in pursuit of that goal.''
Inside the Brian Williams Scandal at NBC News | Vanity Fair
Thu, 09 Apr 2015 01:14
Pat Fili-Krushel, Brian Williams, Tom Brokaw, Andy Lack, Deborah Turness, and Steve Burke.
Photo Illustration by Sean McCabe; Photographs by Gabriel Bouys/AFP/Getty Images (Logo), Natan Dvir/Polaris (Background), Jennifer Graylock/SIPA USA (Fili-Krushel), Gary He/Insider Images/Polaris (Burke), Matt Rourke/A.P. Images (Brokaw), David Sandison/The Independent/Rex USA (Turness), Brendan Smialowski/AFP/Getty Images (Lack), Jeffrey Ufberg/WireImage (Williams).
Brian Williams's fabrication was just the latest, and worst, of the debacles that have plagued NBC News since NBCUniversal was bought by Comcast in 2011. Who is to blame?
On the afternoon of Wednesday, February 4, the beleaguered head of NBC News, 47-year-old Deborah Turness, dropped into a chair in her boss's office on the third floor of the network's 30 Rockefeller Plaza headquarters. Her boss, Patricia ''Pat'' Fili-Krushel, oversaw NBC News as well as its cable cousins, CNBC and MSNBC. The two women, both sharp and stylish, were close; Fili, 61, had hired the British-born Turness from a London network 20 months earlier.
It had been a tumultuous period for NBC's news division, as had the entire four years since the Philadelphia cable/phone/Internet giant, Comcast, took over NBCUniversal, as the company is officially known. There was Ann Curry's tearful flameout on Today; David Gregory's long slide to his exit from Meet the Press; the strange firing after less than three months on the job of Jamie Horowitz, an ESPN executive brought in to fix Today; not to mention ratings declines at several of the division's centerpiece shows, including Today and Meet the Press.
But that afternoon, after a long presentation to 200 NBC advertising salespeople, Turness was feeling better than she had in months. When she had been hired she knew she was stepping onto a troubled ship; finally, she felt, the organizational changes she had made were showing results. Meet the Press's ratings were edging up; Nightly News seemed to be stabilizing. ''Things,'' she told Fili, ''feel like they're in a really good place.''
Read More: Subscribe now and get immediate access to the digital edition.
Her sense of relief, however, lasted mere minutes. As she left Fili's office around 3:30, Turness learned the startling news: the most important person at the network, the face of NBC News, its anchorman Brian Williams, had apparently been exaggerating an anecdote about coming under fire in a U.S. Army helicopter during the Iraq war in 2003. A reporter from the military newspaper Stars and Stripes had called about it that morning. Williams was supposed to talk to him off the record in an effort to determine what the reporter planned to write. Instead, to the dismay of NBC's P.R. staff, Williams had gone on the record and admitted he hadn't been telling the truth, not only on a Nightly News broadcast the previous week but also over the years at public appearances and on talk shows.
Stunned, Turness was still trying to grasp the gravity of the situation when the Stars and Stripes story went online. At that point her biggest concern was the apology Williams was preparing to read to viewers on his broadcast that evening. He was already taping segments as he and Turness began swapping e-mails on its all-important wording. Turness and the other executives who had gotten involved quickly became frustrated, as they would remain for days, with Williams's inability to explain himself. ''He couldn't say the words 'I lied,' '' recalls one NBC insider. ''We could not force his mouth to form the words 'I lied.' He couldn't explain what had happened. [He said,] 'Did something happen to [my] head? Maybe I had a brain tumor, or something in my head?' He just didn't know. We just didn't know. We had no clear sense what had happened. We got the best [apology] we could get.''
And that was a problem. Because the apology Williams read on the air that evening not only failed to limit the damage to his reputation, and to NBC News, its elliptical wording'--''I made a mistake in recalling the events of 12 years ago'''--made a bad situation worse, inflaming a crisis that led a week later to Williams's suspension for six months. In early March, Pat Fili became the scandal's second victim, pushed aside to make room for a former NBC News chief, Andrew Lack, whose return, network executives fervently hope, will restore morale and bring some much-needed stability to a news division that desperately needs it. Williams's stunning fall was only the worst of a string of embarrassing episodes that have brought NBC News, long one of the gold standards of television news, to its knees.
Since Comcast took control of NBC, the network's news division'--famously termed Comcast's ''crown jewel'' by C.E.O. Brian Roberts'--has endured one debacle after another. ''When Comcast took over, they had the No. 1 morning show, the No. 1 Sunday show, and the No. 1 evening broadcast,'' says a former top NBC executive. ''That's all completely fallen apart. I don't know how you blame anyone but Comcast and the people it brought in. It's been a nightmare.''
Behind the scenes much of the blame has been laid at the feet of three executives: Turness, a British-trained newcomer to U.S. television; Fili, who had virtually no experience in journalism; and Fili's boss, the steely, driven C.E.O. Comcast installed to run NBCUniversal, Steve Burke. Under Burke the network has done well overall'--its ratings have rebounded from last to first in the coveted 18''49 demographic, and NBCUniversal's profits were up 18 percent last year'--but he and his deputies, their critics charge, time and again proved unable to rein in the news division's high-priced talent. ''News is a very particular thing, NBC is a very particular beast, and Deborah, well, she really doesn't have a fucking clue,'' says a senior NBC executive involved in recent events. ''She's letting the inmates run the asylum. You have kids? Well, if you let them, they'll have ice cream every night. Same thing in TV. If you let the people on air do what they want, whenever they want, this is what happens.''
''Look. Deborah Turness: I have seen no evidence she knows what she's doing, but in fairness, she walked into a complete shitstorm there,'' says a former top NBC executive. ''Today is a horror show. Brian Williams? He didn't give a rat's ass what Deborah Turness says. But this is fundamentally not a Deborah Turness problem. She's just a symptom of the problem'.... This is a Comcast problem.''
Even some of Burke's defenders admit he has only himself to blame for the decline of NBC News. ''Steve has a great track record, and phenomenal DNA, but nobody bats a thousand,'' insists one Burke fan. ''He's done a phenomenal job in so many areas. What he did easing out Leno? Unbelievable. But what you're looking at here is his mistake. Just a huge mistake. I mean, bringing in Pat? Then Deborah? That's like bad food and small portions.''
Officially, in a damage-control mode where almost no one will be interviewed freely and on the record, NBC News declined comment for this article. Unofficially, its loyalists cooperated extensively. While admitting the occasional misstep, they reject the harsh critiques that have trailed in the wake of the Williams scandal, blaming them on a coterie of departed executives, including former NBCUniversal C.E.O. Jeff Zucker and former NBC News chief Steve Capus, who resigned under pressure in 2013. ''We know the people saying these things about us, and we know why,'' one NBC partisan told me. ''Because five years later we are still cleaning up the mess they left behind.''
The Place to BeThe long and storied history of NBC News can be traced from the first nightly television newscast in America, in 1940, through pioneering programs on civil rights to the 1960s-era rise of anchors Chet Huntley and David Brinkley. But Huntley's retirement, in 1970, ushered in a period of lower ratings, and even lower budgets, as the news division suffered a 20-year decline. Ironically, it was perhaps the worst scandal in NBC's history that laid the groundwork for its incredible turnaround.
David Gregory, Steve Capus, and Jeff Zucker.
Photo Illustration by Sean McCabe; Photographs by Richard Drew/A.P. Images (Background), William B. Plowman/NBC NewsWire/Getty Images (Gregory), Charles Sykes/NBCU Photo Bank/Getty Images (Capus), Susan Walsh/A.P. Images (Zucker).
In November 1992, NBC's newsmagazine show Dateline aired an hour-long segment purporting to show that the gas tanks on certain kinds of General Motors pickup trucks tended to explode on even low-speed impacts. G.M. responded with an investigation of its own that showed that Dateline had rigged the dramatic explosion that was the program's climax by affixing model-rocket engines to a truck's underbody. In the ensuing scandal three Dateline producers were fired and the president of NBC News at the time, Michael Gartner, was forced to resign. Morale hit rock bottom; one NBC executive told The New York Times, ''Some of us feel this place is like Mogadishu before the Marines landed.''
What followed was a housecleaning that allowed a host of young executives and newspeople to come to the fore and, in doing so, set the stage for what would become a kind of golden age for NBC News. All this was overseen by Gartner's replacement, a longtime CBS producer named Andy Lack, who had a sharp eye for talent and the confidence to let the young egos of his producers run free. (Note: Lack's wife, Betsy Kenny Lack, is a contributing editor at Vanity Fair. She recused herself from editorial input for this article.) Shortly before Lack came in, a new producer, Neal Shapiro, had taken over Dateline, and under Lack he made it a consistent winner in its time slot. A year earlier, Tim Russert, who'd once served as chief of staff to Senator Pat Moynihan, was given control of the lackluster Meet the Press and turned it into a topical ratings engine and news powerhouse. Most important was the turnaround a twentysomething impresario named Jeff Zucker was able to engineer at the news division's profit center, Today, which in a good year could generate more than $100 million in profit for NBC's then corporate parent, General Electric. After the controversial replacement of Jane Pauley in 1989, Today had fallen into second place, behind Good Morning America. Under Zucker, Bryant Gumbel and Katie Couric took it back to No. 1 in 1995, a position it would maintain for the next 17 years, despite the eventual need to transition to new anchors such as Meredith Vieira and Matt Lauer.
''Andy Lack's genius was he gave Jeff and Tim and Neal Shapiro the freedom to run,'' says a former NBC News executive who worked closely with everyone involved. ''Over the next 15 years NBC News really became the envy of the broadcast world. Today, Nightly, Meet the Press: they were all No. 1 [in their categories]. And they really did help set the agenda for the national discussion.''
After Lack's departure, to Sony Music Entertainment in 2003, Zucker eventually ascended to take control of NBCUniversal, a position he still held in 2009, when the financial crisis prompted General Electric to streamline its far-flung businesses, a strategy that included selling NBCUniversal to Comcast. NBC News executives had been close to G.E. executives, including C.E.O. Jack Welch, but they soon developed a strong sense that Comcast's top executives, Brian Roberts and Steve Burke, didn't value the art of talent management quite so highly.
''I always thought they lacked an appreciation for dealing with talent,'' says a former NBC executive who worked with Comcast executives during the transition. ''Remember: They come from a cable utility company, where all you do is keep your customers happy and collect the bills at the end of the month. To be honest, you got the sense they couldn't fathom why NBC worried so much about the talent; you know, 'Why are these people worrying so much about what Matt Lauer thinks?' ''
''They didn't believe in talent management,'' says another former executive who worked with Comcast executives. ''I'm telling you '... they just didn't believe that mattered.''
Murmurs that Comcast executives wouldn't genuflect before the NBC News stars were widespread as Steve Burke took control of NBCUniversal in the first weeks of 2011. Burke, the son of the legendary Capital Cities C.E.O. Daniel Burke, was viewed as a highly capable, no-nonsense type who wouldn't be easily swayed by the glamour of television news. ''Just look at Steve Burke's eyes,'' says one NBC executive who worked closely with him. ''He is a cold, calculating guy.''
''Burke actually started out O.K.,'' this executive goes on. ''Matt [Lauer], within a matter of weeks [of Burke's coming], said he did not want to renew his contract. And to Burke's great credit, he built enough of a relationship then with Lauer that Lauer began to feel he could be trusted. And when Burke agreed to his enormous demands, north of $20 million a year, he kept Matt.''
According to one view, the Burke administration's troubles at NBC News can be traced to the Ann Curry episode at Today, a messy situation it inherited from the Zucker regime. Line executives were sharply split over Curry's desire to ascend from newsreader to Lauer's on-air partner. The head of news, Steve Capus, was in favor; Today's executive producer, Jim Bell, and Matt Lauer were wary. Capus prevailed, only to watch Curry's ratings slide. By June 2012, when she memorably and tearfully announced her departure from Today, Capus and Bell were not speaking. ''That's where this whole thing begins to fall apart,'' says the onetime executive. ''Burke was the principal player [who made the decision to demote her], though he hid desperately behind this. Finally he makes a deal for her to go away and then gets cold feet about pushing her to announce it. Despite pleas from everyone, Burke would not push the situation. He just felt uncomfortable doing it, and he wouldn't explain why. Which leads directly to this thing being a national 'Oh, poor Ann Curry' story, which was the furthest thing from the truth.''
The Curry saga convinced Burke that the news division under Steve Capus's direction was broadly dysfunctional. ''The prevailing line from the Comcast people when Steve Capus was in charge was all News needs is a real grown-up in there,'' says a top NBC executive at the time. ''You know, 'These people don't know how to run a business. What they need is organization. Change the structure, business development, better H.R., get some women in there.' I mean, that's verbatim. That was the script.'' Bell was removed from the equation when Burke gave him the Olympics to supervise, but Burke wanted deeper changes. Insiders believe he found the Curry episode so distasteful that he resolved to distance himself from the details of talent management altogether. ''This thing exploded into a soap opera, and let me tell you, it scared the hell out of Steve Burke,'' recalls an executive who met with Burke regularly. ''And that's not a phrase you use about a tough guy like Burke. But I saw it.''
It was then that Burke initiated a corporate reorganization that laid the groundwork for the many problems that followed. In July 2012, Comcast announced NBC News, MSNBC, and CNBC were to be combined into an enlarged news division that, to the surprise of many staffers, would be run by Burke's trusted deputy, Patricia Fili-Krushel. ''Burke didn't want to deal with the details of handling talent,'' says another former top NBC executive. ''And he didn't want to deal with MSNBC and CNBC either. So he takes care of everything in one fell swoop. He creates this new news group, throws in MSNBC and CNBC, and gives it all to Pat to run. Problem solved. One group, you know, actually not a bad idea. Putting Pat in charge? Terrible idea.''
Today, in the wake of the Williams fiasco, Pat Fili has emerged as a popular punching bag inside NBC. Fili started her career at ABC as a secretary ''back when they still called them secretaries,'' as one of her friends puts it, during the 1970s; one of her first bosses was Bob Iger, now the heralded chairman of Disney. It was Iger, then a production supervisor, who insisted to his superiors that Fili take his job when he was promoted. (He remains a mentor to her.) ''The thing that most impressed me about Pat is that, in addition to being smart, tough, and knowledgeable, she is an adult,'' says Dick Parsons, former chairman and C.E.O. of Time Warner. ''She always parked her ego at the door and gave her full focus and attention to solving the problem at hand.'' In the ensuing years she climbed the ladder at the network, becoming head of ABC Daytime during the 1990s. It was there that she met Burke, who 15 years later, when he got to NBC, hired her away from Time Warner, where she was supervising human resources, among other areas. That is essentially what Burke initially assigned her to do at NBC. When he named her to oversee news, the one glaring omission on her impressive r(C)sum(C) was anything to do with journalism.
''Pat's a very nice person, smart, very empathetic, but she's in way over her head,'' an admirer told me in February. ''She knows nothing about any of the things she is managing [at NBC].''
''You have to understand something about Comcast,'' says another recently departed NBC executive. ''There's practically no attention paid to actual domain expertise'--like, zero. The fact of the matter is, in certain businesses, certain things matter. If you're going to be made the head of a shoe business, you need to actually know that shoes need to be sourced and designed. In the big corporate vision of NBCU, there's almost no regard for that line of thinking. If you fit into a mold, if you fulfill a loyalty obligation or a don't-make-waves obligation, or if you can just be pegged into the Comcast pegboard, you get to be in charge of stuff. That's Pat.''
By all accounts Steve Capus was less than thrilled to find himself reporting to Fili. When he resigned, six months later, news reports made it sound as if he had been fed up. In fact, NBC partisans say, Capus was pressured to leave, in part because Fili felt he was feuding with just about everyone else who reported to her. But there was another reason for Capus's exit, these insiders say. Though Capus had worked closely with Brian Williams for 15 years, it turns out the anchorman also had a role in his leaving.
War StoriesOne might expect that, in the wake of Williams's suspension, his colleagues would be brimming with stories of other fanciful tales he told. That's not the case. There are a few tales, it's true, but when asked for the unvarnished truth about Williams, the two topics people at NBC News return to again and again are these: his prowess as a bureaucratic infighter and his limited interest in the kind of ''heavy'' news topics and investigative pieces that had long been championed by such NBC stalwarts as Tom Brokaw and Tim Russert.
''What always bothered Tim was Brian's lack of interest in things that mattered most, that were front and center, like politics and world events,'' says a person who knew both men well. ''Brian has very little interest in politics. It's not in his blood. What Brian cares about is logistics, the weather, and planes and trains and helicopters.''
''You know what interested Brian about politics?'' marvels one longtime NBC correspondent, recently departed. ''Brian was obsessed with whether Mitt Romney wore the Mormon underwear.'' (A supporter says that this characterization is unfair and that Williams reads deeply and broadly, especially about history and politics.)
Williams took the anchor chair in December 2004, after a career handling the news at local stations and MSNBC; though he had worked as NBC's chief White House correspondent for two years, he was never a foreign or war correspondent. He was deeply insecure about this, some of his friends believe. These people suggest that his storied broadcasts from New Orleans in the aftermath of Hurricane Katrina, which proved a boon to his ratings, were in part an effort to overcome the perception that he was a journalistic lightweight. In his first years on Nightly News, several colleagues say, Williams's weaknesses were kept in check by other strong figures at the network, from Brokaw and Russert to Capus and a Nightly News executive producer named John Reiss. With the departures of each of these men, especially Russert, who died in 2008, Williams slowly consolidated his power.
'There is NBC News before Tim died and after Tim died,'' says the recently departed correspondent. ''Tim was our soul, our conscience'.... When Tim died, and Brian pushed out John Reiss, there was no one who could influence Brian in a significant way, who could say, 'Goddammit, Brian, you have to do this.' ''
In the years that followed, NBC's two best-known investigative correspondents, Michael Isikoff and Lisa Myers, both left the network, in large part, insiders say, because Williams had little interest in their work. ''By 2007, 2008, Brian was starting to feel his oats a bit,'' says a onetime NBC executive who knows him well. ''It was a bit of a challenge, not huge. Manageable. He was more reluctant to go on difficult assignments. He didn't want to leave New York. Getting him to war zones was real tough '... but when he did go, he came back with these great stories that kind of put himself at the center of things. Then the Comcast crew arrived and everything began to change.''
The venue where several top NBC executives witnessed Williams's efforts at corporate politics firsthand was the 51st-floor executive dining room, which Burke had spruced up and encouraged them to use.
''If Brian could've eaten there eight days a week he would've,'' says another onetime NBC executive. ''He would hold court at some table, with some poor mid-level schmo who didn't know what was going on, and he always seemed to be there when Steve Burke would come in. And [with Burke in earshot], he would make a point of taking someone down a notch. It could be Pat or Steve [Capus] or [P.R. chief] Adam [Miller] or someone else, but over time it got to be Steve Capus a lot. Brian took Steve down. I heard those lunches. I know what he said. He got Burke and Pat Fili very riled up about Steve.''
Capus had a number of issues, including a combative streak and a temper. But those who watched Williams in action think he ''very quickly came to believe that he was the person running the news division, not Capus,'' says one of the former NBC executives quoted above. ''As Capus was kind of dissed more and more to and by Burke and, ultimately, Pat Fili, Brian just saw that as an opportunity to run a truck through the news division and get whatever he wanted. Suddenly he's appearing on all these shows, Jimmy Fallon and 30 Rock and everything else. This spread the idea in Brian's mind that he was this kind of newsman-entertainer. That he was a national raconteur.''
Entertainment NewsFor a while, he was. In fact, as an excellent article by Gabriel Sherman in New York magazine recounted, Williams had long displayed an ambivalence with continuing in the anchor chair. With his abundant charisma and disarming wit, what he truly wanted, it appears, was his own talk show. According to New York, he talked to Steve Burke about succeeding Jay Leno. When Burke refused, Williams reportedly pitched Les Moonves, at CBS, to replace David Letterman, who was soon to retire. Moonves also allegedly declined. Though his appearances on shows such as 30 Rock and Jimmy Fallon successfully repositioned Williams as a good-humored Everyman'--and thus expanded not only his own brand but that of Nightly News'--they were not popular among many of his colleagues.
''He goes on Tina Fey and Jimmy Fallon and all that, that's where his heart was, and [at NBC] that's seen as running away from the news division,'' says a former NBC executive.
A Williams partisan disagrees. ''The irony is that the very things people are criticizing Brian for now were the things they loved most about him at the time, the fact that by going on all these shows, with their young audiences, he was building bridges to the younger people who weren't watching network news anymore,'' this person says. ''It was something the previous generation of anchormen, like Brokaw, hadn't been able to do. Brian was doing it.''
After refusing Williams the Leno spot, Steve Burke offered him a consolation prize: his own magazine show, Rock Center, a bid to anchor what he hoped would be the second coming of 60 Minutes. It wasn't. Rock Center debuted in 2011 to tepid reviews and worse ratings. Its journalistic efforts received less notice than its stunt hiring of Chelsea Clinton, whose signature contribution was the interview she did with the Geico Gecko that appeared on the show's Web site.
Rock Center's death came three months after Steve Capus finally resigned under pressure from Pat Fili, in February 2013. (Capus is now executive editor of CBS News.) With Capus gone, however, it was not Williams but Fili who snapped up an opportunity to place her own stamp on NBC News. She launched an ambitious international search for a replacement for Capus. ''I hadn't heard of Deb Turness, but what I heard I liked,'' says a former NBC executive. ''What I heard over and over again was: this is a classic Pat Fili hire, a very expensive, not very protracted global search, with a stellar candidate who nobody has really worked with here, and good for Pat'--she found a great woman, a highly qualified non-white male. Good for Pat. It was bulletproof.''
Or, as it happened, not.
Deborah Turness is a feisty, hard-charging, tabloid-loving British media figure. When Fili came calling, she was the top editor at ITV News in London, where the news programs she supervised consistently humbled rivals at the BBC. A hip, sinewy blonde, she had once been married to a roadie for the Clash and had competed in a Beijing-to-Paris road race. The**New York Times quoted a former colleague, who said she brought ''a bit of rock-chick swagger to a newsroom full of middle-aged men.'' The early reviews, at least publicly, were glowing. Williams called her a ''dynamo.'' NBC correspondent Andrea Mitchell says, ''Deborah is very creative, very competitive, and very ambitious in the best sense of the word. I think it's been an impressive retooling.''
Behind the scenes, things weren't going as smoothly. Even NBC loyalists acknowledge that Turness's introduction to the realities of U.S. broadcast news was rocky. ''One thing she didn't really know about was talent management,'' admits an executive who admires Turness. ''I remember early on I asked her how many journalists she had supervised [in London] who made a million dollars a year. She said one. And she didn't understand that you communicate [with the talent] through their agents. Like if [WME co-C.E.O.] Ari Emanuel calls, you have to phone back the same day. So I remember we had to kind of calm Ari down. Once all that was worked out, she caught on fairly quickly.''
Ann Curry, Matt Lauer, and Jamie Horowitz.
Photo Illustration by Sean McCabe; Photographs by Frederick M. Brown/Getty Images (Horowitz), Peter Kramer/NBC/NewsWire/Getty Images (Background), Robert Pitts/Landov (Lauer), Anna Webber/WireImage (Curry).
''It was almost unfair to give Deborah this job,'' says one NBC observer. ''She was basically overmatched. From day one, it was difficult, even just managing the daily job. Because it's a big job, it's got a lot of intricate parts to it, and you know she had a rough time with it. She was not terribly accessible. People came out of meetings and said she's overwhelmed.'' One NBC insider terms Turness's early performance ''a hot mess.'' Another adds, ''She was trying to do so much; she was all over the place, like she had A.D.D., and that caused a lot of stress for everyone.''
Turness's presentations were a model of 21st-century media and corporate jargon and synergies. Like Fili an ardent believer in market research, she tasked all her shows with drafting mission statements, ''content plans,'' and ''brand filters,'' which, along with an emphasis on finding ways to ''monetize'' news programming, prompted much eye-rolling among NBC's old-timers. In an effort to drag NBC into the Digital Age'--it has been a notable laggard'--Turness pushed for more digital content and far more cooperation among programs. This all sounds smart enough, but many in the news division didn't appreciate the perception they were behind the times, especially when Turness, in an interview with The New York Times, was quoted saying, ''People in the organization from top to bottom recognized that NBC News hadn't kept up with the times in all sorts of ways, for maybe 15 years. I think the organization had gone to sleep.'' Even Fili and others who backed Turness cringed at the quote, which angered many staffers. ''That didn't help,'' acknowledges one admirer. ''I do think that set her back.''
For all the digital chatter, though, Turness's top priority was stabilizing Today, whose ratings had gone into free fall as many viewers blamed Matt Lauer for the Ann Curry debacle. Turness spent her first six months focused on the show, and in time the ratings drop subsided, and Today settled in at No. 2, behind Good Morning America. At that point, last winter, she turned her attention to Meet the Press, whose ratings under David Gregory had fallen to a 20-year low. The show rarely broke news, and Gregory seemed uncomfortable in the host's chair. Turness led marathon strategy sessions in Washington, spitballing myriad ways to spice up the aging franchise, several of which were later lampooned in a long article in Washingtonian magazine. Among her ideas was bringing in a live audience or celebrity guests or even a band. ''If you could bring in Angelina Jolie to talk about an issue, or George Clooney on the Sudan, that could work,'' an NBC partisan says today. ''She wanted to play a South African song about Nelson Mandela over the credits when Mandela died. That's not crazy.''
As word of Turness's efforts to turn around Meet the Press spread, others at NBC, most notably the political savant Chuck Todd and MSNBC's Joe Scarborough, began jockeying to replace Gregory. By last spring blind items to this effect were appearing in so many gossip columns that Fili telephoned Todd's agent and told him to cut it out; the agent denied being involved. Once this all became public, it led to a perception among Turness's critics that she was letting Gregory twist in the wind. When she finally fired him, last summer, it was widely viewed as a mercy killing. ''What she did to David, that's just unforgivable,'' says one Gregory supporter. This criticism, however, misses a central point. By installing Chuck Todd in Gregory's place, Turness may have saved the show. In February, Meet the Press returned, briefly, to No. 1.
Morning SicknessBy then Turness had turned her focus back to Today. She and Fili, wanting some fresh eyes, decided to bring in an outsider to devise a turnaround strategy, a brash 38-year-old ESPN producer named Jamie Horowitz. Last May, in an internal memo announcing his hiring, Turness termed Horowitz ''a visionary leader,'' a bit of a stretch for a young executive known mostly for shepherding two ESPN shows: Keith Olbermann's ESPN2 program and a football show hosted by Colin Cowherd. Some felt Horowitz's hiring was a tacit admission that Turness wasn't up to the task of fixing Today herself. ''Come on!'' barks one critic. ''Anybody with a triple-digit I.Q. who interviews somebody to come in as president of NBC News you ask, 'What are you going to do with the 800-pound gorilla? With Today?' And Deborah's answer was 'You hire Jamie Horowitz!' It was almost like it was Deborah's cry for help. Like if you're overwhelmed and you don't have a lot of confidence or vision, you bring in other people: 'Help me, I'm drowning.' ''
After a protracted negotiation to break his contract at ESPN'--Pat Fili got Bob Iger (Disney owns ESPN) to intervene on NBC's behalf'--Horowitz wasn't allowed to formally start at NBC until December, though he could begin working off the premises in September.
There are two sharply different versions of Horowitz's brief tenure as an executive vice president of NBC News: One offering considerable detail is put forth by NBC partisans; this version paints Horowitz as a cocky, trash-talking loose cannon who avidly leaked to the press. An alternative version suggests that Horowitz was torpedoed by Matt Lauer and his allies at Today, who feared the changes he sought. The truth appears to contain elements of both versions.
As Fili told other executives, her initial inkling of trouble came during Horowitz's first week on the job, in a chat with Williams. As one insider describes it, ''Brian had dinner with Jamie '... [and] Brian says Jamie threw Deborah Turness under the bus on something. I think they were disagreeing on a promo, and Jamie said something like 'If you need help with Deborah, I can handle this for you.' So Pat calls Jamie, like right away, and says, 'So you threw Deborah under the bus with Brian?' And he doesn't even flinch. He denies it. The more Pat thought about it, the madder she got. She called him the next day and said, 'I don't know how it was at ESPN, but it doesn't work that way here. Here, we're a team.' And Jamie's words were 'Message received.' ''
In the following days, loyalists say, both Fili and Turness heard disquieting reports that Horowitz was openly speculating about changes on Today with outside agents and attorneys, generating corrosive rumors. Gossip items began to appear. Turness mentioned her concerns to Fili, who relayed her own to Steve Burke, but, for the moment, Horowitz was allowed to arrange focus groups to study how viewers felt about Today's on-air personalities. Nonetheless every week, the loyalists say, seemed to bring some new issue: Turness grew irked when Horowitz repeatedly refused to attend her daily planning meetings. He told her Matt Lauer was buying into many of his ideas, but when asked Lauer denied it, saying, ''The jury's still out.'' In October, roughly six weeks into Horowitz's tenure, Fili told Burke, according to one insider, ''We need to have a come-to-Jesus meeting with Jamie.''
For Turness, NBC partisans say, the final straw came after she and Lauer quietly secured a major interview for Today: the wife of N.F.L. running back Ray Rice, Janay Palmer, whom Rice had infamously punched in the face in an episode that ignited a national debate over spousal abuse. The ''get'' remained secret for several days, sources say, until Horowitz asked a Today producer about it. Hours later, news of the interview appeared on the TMZ sports Web site. In an e-mail, Turness told Horowitz she was ''very unhappy'' about the leak. According to an insider, Horowitz responded, ''I hope you don't think I leaked that.'' Turness replied: ''I don't know what to think.'' (A spokesman for Horowitz says he never leaked any NBC items to other media sources.)
The Rice incident convinced Turness she could no longer trust Horowitz. She told other executives she feared speaking openly in front of him, according to several insiders. This was the situation on Tuesday, November 11, NBC loyalists say, when Horowitz made his long-awaited six-hour presentation to Turness on the changes he envisioned at Today. Working with a white magnetic board, Horowitz urged a half-dozen personnel changes, including the dismissal of Willie Geist and Natalie Morales, grooming his old ESPN pal Josh Elliott to replace Lauer, and beefing up the role of Hoda Kotb, perhaps even having her replace Savannah Guthrie. Turness coolly agreed to take his views under advisement. The very next day the New York Post carried a blind item suggesting Turness was about to be fired. Among the candidates to replace her, it said, was Jamie Horowitz.
Turness had had enough. That Friday morning she summoned Horowitz to her office. ''I don't trust you,'' she told him. ''Nothing that you've proposed is ever going to happen if I don't trust you.'' When Horowitz asked what he could do, Turness replied, ''That's up to you.'' When Turness relayed news of the meeting to Fili, Fili scheduled her own meeting with Horowitz for Monday. But that meeting never happened. It was then, Horowitz's defenders argue, that Matt Lauer intervened to get Horowitz fired. ''That weekend is when Matt went to Pat and Steve Burke and made clear he was not going to let [any of the proposed changes] happen,'' says one. ''He said he wanted to protect the people that were there. He said, in essence, 'This guy has to be stopped.' And Burke and Pat buckled. They gave in to Matt and agreed to fire Jamie.''
NBC loyalists fiercely deny this. ''Completely untrue, 100 percent untrue,'' responds one. ''I understand the theory, but frankly I reject it. Matt did not go to Steve. Ever. Jamie was fired because it was an intolerable situation.'' In fact, another NBC loyalist confirms that Lauer had spoken to Burke, weeks earlier, during one of their regular lunches. Horowitz had run many of his proposed changes by Lauer, and Lauer told Burke he had ''deep concerns.'' ''Jamie ran into Matt Lauer'--it's as simple as that,'' says one longtime NBC observer. ''Don't believe anything else.''
Whatever happened that weekend, the final blow landed on Monday morning, when a reporter for Us Weekly called for comment on a report that Horowitz wanted to fire Savannah Guthrie. Turness was apoplectic. ''We have to fire him'--today,'' Turness told Fili, who agreed. Turness called him in, fired him, then was obliged to issue an embarrassing press release denying all the rumors of imminent change at Today. The upshot of the whole episode was that whatever changes she wanted to make she now couldn't.
The Horowitz incident was a very public embarrassment, but because no one involved seemed eager to discuss it, it soon disappeared from the headlines. Not so the extraordinary situation that beset Brian Williams.
Coming Under FireA hint of the trouble to come, and of the tensions among the marquee players, was on display at a charity gala in Greenwich, Connecticut, the week before Horowitz's firing. The evening honored Tom Brokaw's work for the Multiple Myeloma Research Foundation, which helps fight a cancer from which Brokaw suffers. ''The lowest of lows had to be that dinner,'' says one former NBC executive. ''It was a huge deal for Tom. The world turned out. Tom was devastated to find out that Pat Fili, who is just so blind to the relationships and what really went on, told the people putting on the dinner that it would be great to have Brian introduce Tom. That was the last thing Tom wanted. And then Brian started off telling stories. He told the Berlin Wall story. Well, this sent Tom into spasms of anger.''
The ''Berlin Wall story'' was one Williams has long told'--and apparently embellished'--about the time he and Brokaw visited the Berlin Wall, in 1989. ''This is the perfect example of what Brian does,'' says a former NBC executive who worked closely with Williams for years. ''He will say, and I've heard this a hundred times, 'When Tom and I were at the Berlin Wall '... ' O.K., so when he tells that story, he kind of implies that when the wall fell he was there with Tom. But he wasn't. He was there the next day. It wasn't malicious'--it's just Brian being Brian. It's the part of Brian's personality that bothers Tom the most.''
This executive long believed that Williams's penchant for embellishment was a function of his insecurity when it came to Brokaw, but that it was all essentially harmless. ''I always felt he needed to jack up his stories because he was trying so hard to overcome his insecurities,'' this executive says. ''And he had to follow Tom, which brought its own set of insecurities. He likes to sort of tell these grandiose tales. But, can I tell you, in all the years we worked together, it never rose to the point where we said, 'Oh, there he goes again.' I just saw it as one of the quirks of his personality.'' It was a quirk, however, that incensed Brokaw, who is still thought highly of inside the news division. ''Tom treated that anchor chair as a public trust,'' says one former correspondent. ''He really was our Walter Cronkite.''
''Tom and Brian,'' one longtime friend of both men says with a sigh, ''that was never a good relationship. Tom pushed for him to get that job. But Brian never embraced Tom. And I don't know why'.... He knows the rank and file will never love him like they did Tom, so he never tries. That's the reason there's not a lot of support for Brian over there.'' An industry insider adds, ''There is also a lot of envy of Williams's movie-star good looks, his long happy marriage to a wonderful woman, great kids, and he's paid millions to read a thousand words five times a week from a teleprompter.''
None of this'--not the ill will between Brokaw and Williams, certainly not Williams's penchant for embellishment'--registered on Turness's or Fili's radar as they belatedly turned their attention to Nightly News last fall. For much of Turness's tenure she hadn't needed to tread on Williams's turf; his show was No. 1 in the ratings, and other shows demanded her attention. The two had a relationship that friends describe as cordial but not close. At Matt Lauer's suggestion, Turness gave Williams one of Edward R. Murrow's old desks as a present on his 10th anniversary in the anchor chair, in December. Williams accepted it graciously, though one suspects the multi-million-dollar contract (reportedly up to $10 million a year) NBC offered was even more welcome. The new contract was a vote of confidence in Williams at a time he was facing his first serious ratings challenge in years, from a 41-year-old newcomer named David Muir, who had taken over ABC News's nightly broadcast.
A month later, on an unremarkable Friday evening in late January, Williams ended his broadcast by thanking a soldier whom he had taken to a hockey game at Madison Square Garden and who, he said, had been among those who had come to his rescue when a helicopter he was on came under rocket attack in Iraq in 2003. Turness saw the story and liked it, terming it ''very sweet.'' What she liked even more, she told one listener, was its performance once it was posted to Facebook, which she called ''extremely good.''
As the world now knows, the story was not accurate; Williams had been on a helicopter that came upon the damaged chopper about an hour later. As it happened, a pilot involved in the incident saw the broadcast and that evening wrote a Facebook post insisting Williams's version couldn't be true. When Williams learned of the claim, which was subsequently seconded by several other soldiers, he did not tell Turness or Pat Fili, even though he and Fili had lunch the following Tuesday.
By then, a Stars and Stripes reporter named Travis Tritten had been tipped off to the exchange. On Tuesday he spent the day talking to five former soldiers, all of whom said Williams's helicopter had not in fact come under fire. Wednesday morning Tritten called NBC.
''They found out about this from a reporter! Amazing!'' seethes a onetime NBC executive. A former NBC correspondent marvels that Williams did not tell Turness or Fili: ''The very fact they only learned about it that day tells you they had no relationship with [their stars].''
Even after Turness learned of the situation, that afternoon, she remained only peripherally involved in drafting the apology. ''Believe me, if Zucker had been there, someone like Allison Gollust [a longtime NBC News P.R. chief, now at CNN] would've been sitting with him for days working out the wording of this apology. The lack of a relationship with Turness played a huge role in how this played out. Because it was the apology that caused the problem, not the crime itself.''
Steve Burke learned of things only after the apology broadcast. Even then the enormity of Williams's gaffes had yet to sink in. According to insiders, it wasn't until someone found a video clip of Williams telling a version of the same story on David Letterman's show in 2013 that Turness and Fili realized how much trouble Williams was in. ''When we watched the Letterman clip, [the reaction was] horror, absolute horror,'' says one insider. ''You could tell this was going to be very bad. It put us into a whole new universe.''
Thursday morning Burke convened a crisis group, including Turness and Fili, that he said would meet twice a day at his Upper West Side apartment. Its first priority was unearthing the truth about what had happened in 2003. Williams himself, they soon realized, would be of little help. He appeared shell-shocked. ''He was having a tough enough time coming to grips with the idea that he had gotten it wrong in the first place, slash misrepresented it, slash lied,'' recalls one insider. ''He wasn't anywhere in the ballpark of being helpful about what happened 12 years ago.''
''You talked to Brian, and he said, 'I slept two nights under the wing of that helicopter, looking up through the hole in the wing [from the rocket fire],' '' one insider recalls. ''There was a sandstorm, and somehow, in the process, he said, he must have come to believe he had been on the helicopter. Later, his wife [Jane] tried to explain. She said he put things in boxes [in his mind]. He would only talk about what was in those boxes on-camera.'' This insider stops and sighs. ''You're not going to get clarity, because the people who might understand what happened don't understand.''
Turness asked Richard Esposito, who had been hired away from ABC in 2013 to be NBC's senior executive producer of the investigative unit, to convene a group to examine the facts of the helicopter incident, as well as those of other possible Williams embellishments popping up online, from his sight of a dead body floating through the French Quarter during Hurricane Katrina to stories he told of hobnobbing with members of the navy's SEAL Team Six.
That Friday, with the story still dominating national headlines, Williams quietly told Burke he was willing to leave his broadcast until the matter could be cleared up. Williams's agent and lawyer, the respected Bob Barnett, suggested they table the discussion until the weekend. ''Everybody was sort of heartbroken for Brian,'' says one loyalist. ''It was terrible for the company, yes, but it was just awful for him. It was one of the fastest falls I can remember seeing. There was a little bit of shell shock. What we decided to do was we needed the weekend to come. We needed some distance.''
Saturday morning all the NBC brass but Burke met with Williams and Barnett at the anchorman's 58th Street apartment. The sense of the group was that Williams had no choice but to step aside, and Williams, to his credit, made no efforts to fight back. The next day, Sunday, Burke convened an all-day meeting of the crisis group back at his apartment. They began with a 45-minute presentation from Esposito on his preliminary findings.
''At that moment Brian assumed he was coming back in a week, four days'--something,'' says a person who was at the meeting. ''Esposito took a perfunctory look at all this stuff [coming in] over the transom, and his clear sense was all this other stuff couldn't be easily dismissed. Our judgment was there was no way we could bring Brian back quickly and be able to categorically deny and prove wrong all of these [other] things in the near term.''
By nightfall the group agreed that a suspension was in order, probably for six months, a period that would, if nothing else, give them time to study the extent of Williams's transgressions. Afterward, Burke took the time to confer with Brokaw, who had canceled a Caribbean vacation to be available. ''Tom will never say this for the record, but I've talked to him about this, and I can tell you for a fact Tom is livid about this,'' says a friend. ''Tom didn't push Brian out, but he didn't try to save him, either.''
Burke reconvened the crisis group for one final meeting in his conference room the next day, found everyone still in agreement on the six-month suspension, and e-mailed Williams to come to his apartment the next morning, Tuesday. The two men met there alone. ''It was sad but amicable, no harsh words,'' says the NBC partisan. ''Steve told him it would be six months, and Brian accepted that. Was there pushback? It wasn't available, to be honest. Steve basically said to Brian, 'This is what we're going to do, and we're not going to discuss it. If you want to come back, this is what it will take.' ''
Publicly, at least, that was the end of it. Behind the scenes, a number of Williams's closest friends have lobbied hard that he be allowed to return to Nightly News after his suspension. The Esposito investigation, however, is ongoing, and people who have spoken to Esposito say his group has compiled a number of other incidents that, taken as a whole, paint a portrait of Williams as a man who has consistently burnished his stories. While he has accepted responsibility for his actions, friends say, Williams is bitter, especially at those who he believes might have saved him.
''I talked to Brian about this,'' says one friend, ''and I'll never forget what he said at the end. He said, 'Chalk one up for Brokaw.' ''
Williams's future, NBC insiders insist, remains up in the air. He and Andy Lack are close friends, leading to widespread speculation that Lack will reinstate him once his suspension is complete. But people close to Lack say nothing has yet been decided. Many NBC observers simply can't imagine a network anchorman ever returning to his former position after being exposed as Williams has. The most Machiavellian scenario, floated by an NBC partisan, is that Jeff Zucker, whose distaste for Comcast executives is well known, has fanned the flames of controversy so that he can eventually snare Williams for CNN'--not as a newsman but as the long-sought replacement for Larry King. ''That's the perfect solution,'' a source says. ''Zucker gets a star, and Brian gets the talk show he always wanted.''
Another NBC partisan points out that Comcast is simply suffering much the same pain General Electric did in the late 1980s in purchasing a news division it knew little about managing, suffering a scandal as a result (the Dateline truck incident for G.E.), and then cleaning house and bringing in Lack to fix it. ''Don't you see?'' this person says. ''It's all happening again, just 20 years later.''
For more high-profile interviews, stunning photography, and thought-provoking features, subscribe now toVanity Fairmagazine.
Out There
Really now! NASA promises 'definitive evidence' of alien life by 2025
Fri, 10 Apr 2015 16:28
(C) NASA/JPL-CaltechSimulated View from Europa's Surface (Artist's Concept)
We are on the cusp of discovering alien civilizations, NASA's top scientists have said. They predict we're one generation away from finding something in our Milky Way neighborhood, which is bustling with environments conducive to life.Making their comments at a panel discussion Tuesday, the space scientists predict that the first discoveries will come within a decade. Chief scientist Ellen Stofan believes we'll have "definitive evidence within 20 to 30 years," as "in most cases we have the technology, and we're on a path to implementing it. And so I think we're definitely on the road."
"I think we're one generation away in our solar system, where it's on an icy moon or on Mars, and one generation [away] on a planet around a nearby star," former astronaut John Grunsfeld said at the session.
NASA has made huge strides in both spotting distant worlds and analyzing their chemical composition. Stofan said: "We know where to look." Indeed, the Kepler mission has found no shortage of rocks that could support life, while icy moons in our own galaxy have long been suspected to hold incredible secrets beneath their own crust - among them Jupiter's enigmatic moons - especially Europa, where a gargantuan body of water rages beneath the thin surface and water vapors are literally sprayed 200 km upward, giving clues to life-supporting minerals beneath. This while Ganymede is thought to have more water than all of Earth's oceans combined.
The same can be said of Saturn's satellite Enceladus.
Scientists found evidence to suggest that, like our more distant galactic neighbors, Mars also harbored entire oceans, the cracks and scars on its surface appearing to be made by raging water currents full of salt. All of this makes the Milky Way quite "a soggy place,"according to the director of NASA's Astrophysics Division, Paul Hertz.
"We can see water in the interstellar clouds from which planetary systems and stellar systems form," he says. "We can see water in the disks of debris that are going to become planetary systems around other stars, and we can even see comets being dissipated in other solar systems as [their] star evaporates them."
The Mars rover Curiosity, stationed on the Red Planet, continues to dazzle scientists with intriguing new finds. Just two weeks ago, it discovered organic molecules containing carbon and "fixed" nitrogen - elements central to all known life.
The Kepler mission's overwhelming success has also been a godsend - its lens measuring the tiniest changes in the light intensity of a star, as a planet passes by it. With its robotic eye, it showed us that life and rocky worlds should be far more common in our galaxy than the likes of gassy Saturn and Jupiter.
Numerous advances in both technology and our ability to implement it mean we are also accelerating the pace. One US company has just been given a grant for its plasma rocket to reach Mars in just 39 days, while NASA itself is already hard at work on developing a new Mars lander that resembles a saucer and promises to make it possible to "safely land heavier spacecraft" on alien planets.
Humanity is facing two separate challenges in space: one is finding signs of intelligent life, the other is identifying potentially habitable environments. While one may rush to tie the two together, the latter is a considerably easier proposition to make.
Stofan is all but certain the manned mission to Mars will emerge with spectacular discoveries: "I'm a field geologist; I go out and break open rocks and look for fossils," she said. "Those are hard to find. So I have a bias that it's eventually going to take humans on the surface of Mars '-- field geologists, astrobiologists, chemists '-- actually out there looking for that good evidence of life that we can bring back to Earth for all the scientists to argue about."
Europa will see us much sooner than that. As soon as 2022, our $2.1 billion will get to work on probing the mysteries of its oceans. And then there are the water vapors, spotted in the region next to the southern pole.
These discoveries are accompanied by huge strides in lens technologies NASA says will be central to finding alien life within two decades. Already there are several contenders for the next King of telescopes, their tech specs threatening to leave the famed Hubble far behind; among them the James Webb Space Telescope (JWST), which cost the space agency a fat $8.8 billion. The technology onboard is strong enough to peer at distant 'super-Earths' and analyze the possible chemical composition of those worlds, the gasses they spew out being strong indicators of life.
For direct signs, however, we still need to take good old photos of the rocks, according to Hertz. That is why NASA is hard at work on the next generation of telescopes - one that will feature a coronograph. The device is invaluable for blocking out the glare of the host stars of the exoplanets, giving us a clear view of the celestial bodies. It's set to launch sometime in the mid-2020s.
Raw
Trapped in Yemen, Americans File Lawsuit Against U.S. Government
Sun, 12 Apr 2015 04:49
Khalid Awnallah, a Yemeni-American, is safe today in Michigan, but his wife and four children are among the thousands of American citizens believed stranded in the midst of an escalating civil war in Yemen.
''They are in a bad situation there, they are hearing bombs all the time and are scared to go out,'' said Awnallah, whose family is in the Rada'a district of southern Yemen, a site of frequent battles between Houthi rebels and members of Al Qaeda in the Arabian Peninsula.
Despite the ongoing danger to their lives, Awnallah says that his family has received no assistance from the U.S. government. ''[My family] has tried to get in touch, but no one is helping them,'' he said. ''They are asking me all the time if they are going to die here.''
On April 9, the Council on American-Islamic Relations filed a lawsuit against the U.S. government on behalf of Awnallah's family and dozens of other Yemeni-Americans trapped in the country. Citing Executive Order 12656, which obligates ''protection or evacuation of U.S. Citizens and nationals abroad'' in times of danger, the lawsuit further alleges that the U.S. government's refusal so far to conduct evacuation operations in Yemen represents the continuation of longstanding policies that effectively deny full citizenship rights to Yemeni-Americans.
''The U.S. has conducted dozens of evacuations of its citizens over the past decades from situations even more precarious than this,'' said Gadeir Abbas, one of the attorneys representing the plaintiffs in the suit. ''Many countries with far less capabilities have evacuated their citizens. The fact that Yemeni-Americans are being left without help leaves the impression that they're viewed as expendable, second-class citizens.''
While countries such as China, Russia, India, Pakistan and even Somalia have all conducted operations to rescue their citizens still in Yemen, the United States has so far declined to launch similar efforts on behalf of Americans in the country. On April 3, State Department spokesperson Marie Harf announced that despite the deteriorating security situation in the country, there was ''no plan'' to develop efforts to evacuate American citizens there.
Given the lack of government action, the 55,000 Americans believed to be in Yemen have been left to make their own plans to flee the country. One 26-year-old Yemeni-American man from San Francisco had to engineer his own escape by driving across the country, passing through dangerous checkpoints, and even experiencing temporary kidnapping, before escaping on a small rented fishing boat out to the Red Sea.
Less fortunate was Jamal al-Labani, a 45-year-old father of one from California, who last week became the first American citizen known die in the conflict when he was killed by a mortar strike in the southern city of Aden.
Lena Masri, another lawyer representing American citizens and their families trapped in the conflict, told The Intercept that threats to Americans have increased, with U.S. citizens specifically being threatened with violence by extremist groups. ''The father of one my clients last week went into hiding after receiving a death threat from a member of ISIS,'' he said. ''They told him that they knew he was an American, and that they were going to kill him.''
For many Yemeni-Americans, their predicament is compounded by what they allege to be systematic denial of their citizenship and consular rights by the U.S. government. ''A lot of Yemeni-Americans have been stranded like this since before the conflict even started; the U.S. embassy often declines to renew their passports or simply confiscates them when brought for renewal,'' Masri said. ''Many Yemeni-Americans have been subjected to extrajudicial exile. They're not treated as full citizens.''
A 2010 State Department Office of the Inspector General report stated that ''a large number of Yemeni-Americans reflect local standards of illiteracy and lack of education,'' while characterizing Yemeni-Americans as having a tenuous or incomplete connection with the United States, despite their citizenship there. It has long been alleged that Americans living in Yemen are at risk of having their citizenship documents confiscated by American officials while seeking consular services, so much so that in 2013, the American Civil Liberties Union released a pamphlet advising Yemeni-Americans to be cautious when attempting to obtain such services while abroad.
Contacted by The Intercept for comment about the lawsuit, the State Department stated that it was not their policy to comment on pending litigation. Advisory messages posted on the website of the U.S. Embassy in Sana'a have suggested American citizens could seek help from the Indian government, while also stating that they ''have no contact information for [Indian] vessels'' and ''cannot guarantee all citizens [can] be accommodated.''
The conflict in Yemen recently escalated when a regional coalition of countries, including several U.S. allies, began conducting military operations against Houthi rebels in the country. The U.S. military is reported to be offering intelligence and logistical support to these forces. Three U.S. Navy ships are also believed to be stationed near the southern port of Aden as part of these operations, but they have not been offered for evacuation assistance.
In response to questions in an April 6 press briefing about the ongoing decision to deny evacuation services to Yemeni-Americans trapped in the conflict, Harf said: ''It's not that we can't. There's always a decision '-- different factors are weighed. '... If we have any changes to whether or not we'll evacuate people, we will certainly let folks know.''
That same day, the State Department posted a notice that the International Organization for Migration (IOM) was planning a flight to evacuate U.S. citizens from Yemen, though it's unclear if any flight actually departed. ''The Department of State cannot guarantee that all U.S. citizens seeking to depart via an IOM flight can be accommodated,'' the notice read.
Photo: Hani Mohammed/AP
Amsterdam's Prostitutes Protest Closure Of Their Windows
Sun, 12 Apr 2015 01:13
AMSTERDAM (AP) '-- Scores of prostitutes took to the streets of Amsterdam on Thursday to protest moves to rejuvenate the city's famed Red Light District by shuttering windows where scantily-clad sex workers pose to attract clients.
About 200 people '-- prostitutes and their supporters who wore masks to protect their identities '-- marched through the Red Light District carrying red umbrellas and banners including one that read: "Don't save us, save our windows!"
The prostitutes took their noisy but peaceful protest all the way into city hall, where they presented a petition to Mayor Eberhard van der Laan and told him that the closures are depriving them of safe places to work.
Ruth Morgan-Thomas, representing an organization called the Global Network of Sex Work Projects, said the city was going in the wrong direction by closing the windows.
"Amsterdam had it right," she said. "They enabled women and men and transgenders to work safely. Now they are closing windows. That makes people more vulnerable."
Amsterdam municipality is involved in a long-term initiative to reinvigorate the historic network of canal-side streets and narrow alleys in part by reducing the number of brothel windows. Some 115 of the 500 windows have been closed in recent years.
Dozens more had been slated for closure, but that now appears unlikely to happen.
Van der Laan said the women were fighting a battle they had already won, telling them that the municipal council now wants to spend less money buying back windows and will likely reduce the number considerably.
That didn't satisfy the protesters, who said they wanted their windows back.
Protesters in Spain stage first ever 'hologram march' against gag law (VIDEO) '-- RT News
Sun, 12 Apr 2015 01:00
Published time: April 11, 2015 08:55Edited time: April 11, 2015 10:01Still from RT video
People across the world took part in a unique protest against the Spanish law that limits the rights of the public to rally. No one attended the virtual march, but holograms of protesters were projected outside parliament in Madrid instead.
Activists have recently launched a petition against the Citizen Safety Law, which has been called the ''gag law'' by opposition groups and the media, saying it "restricts citizens' liberties, and criminalizes their right to protest."
"To respond to this injustice" activists behind the ''Hologramas para la Libertad'' movement said they "saw the need to carry out a different kind of protest that would allow our demands to become unstoppable: the first hologram protest in history."
The draconian law, which was passed in the lower house of parliament in December, gives sweeping powers to the authorities. It makes it illegal to protest outside government buildings, insult police officers or refuse to show identification documents. On top of that, there's also a '‚¬600 fine for showing a lack of respect to anyone in uniform, while the photographing or filming of police officers, where they could be put in danger, will incur a '‚¬30,000 fine.
From now on the government can basically prohibit any protest if it fears order would be disrupted. People have to seek permission from the authorities to protest publicly. Any unauthorized protests outside buildings that provide basic services to the community will incur a fine of up to '‚¬600,000 ($746,000). This covers a huge number of buildings, from universities to hospitals. The measure has been slammed by the international community in recent months since it breaks international and EU laws.
READ MORE: Spain passes strict anti-protest law
''If you are a person you can not express yourself freely, you can only do that here if you become a hologram,'' a woman in the video released by the ''Hologramas para la Libertad'' said.
In February protesters got together in Madrid, as those demonstrating against a government decision to stiffen penalties for unauthorized demos blew whistles and banged drums before marching towards a square in the center of the capital. The organizers of the protests called for demonstrators to take to the streets in 20 other cities around Spain, AFP reported.
In December, marches took place in 30 cities around the country, with opponents of the law saying the draconian measure will take Spain back to the days of General Franco's dictatorship.
Origins Of Mysterious Radio Wave Bursts Discovered | IFLScience
Sun, 12 Apr 2015 00:08
The source of puzzling radio wave bursts detected by two of the world's largest telescopes has been found, and the answer turns out to come from the research facilities' tea rooms, not extragalactic space.
Earlier this year, Swinburne University's Emily Petroff was the lead author of a report on the first observation of a fast radio burst (FRB) in real time. Previously, the enormously powerful but poorly understood events known as FRBs had only been detected in the records of large radio telescopes years after they happened.
However, among those records was something else, which astronomers named perytons. The first peryton detected was in 1998, although it was not recognized as such until 2011. Perytons look sufficiently like FRBs that astronomers even speculated that the first FRB, known as 010724, might actually have been a peryton.
Perytons last about half a second and are ''frequency-swept,'' meaning different frequencies arrive at different times, which in perytons's case means the high frequencies appear first. Petroff says, frequency-sweeping is commonly associated with signals that have passed through an interstellar medium that has delayed certain frequencies more than others.
However, while FRBs are believed to come from outside our own galaxy, perytons were thought to be terrestrial in origin, since they registered on multiple beams of the radio telescopes, something that should only be possible for events that are very nearby or spread across a huge area of the sky.
However, according to Petroff, ''A lot of theories thought it might be atmospheric; radio pulses from lighting or ball lightning, etc.'' So Petroff set out to solve the problem. As one of her co-authors, Dr. Evan Keane, said on twitter, ''As a scientist you are basically a detective solving mysteries'--it's fun.''
One clue Petroff had was that all recorded perytons were observed during daylight, and indeed during business hours. When the observatory at Parkes installed a radio frequency interference (RFI) monitor, it picked up signals coinciding with some perytons detected by the famous dish. This confirmed the local nature of the events and indicated the signal was also occurring at frequencies beyond what the radio telescope can detect.
Using this information, Petroff narrowed down the possibilities until she eventually identified the source'--microwave ovens in the observatory tea room opened while in operation. A test conducted on March 17 confirmed two ovens could reproduce perytons whenever the telescope was pointed appropriately. Although modern ovens have automatic mechanisms to switch-off when opened prematurely, it seems they don't do this without complaint. ''We're still not sure how they are causing this signal,'' Petroff says, ''It might have something to do with discharge of energy in the oven's magnetron when shutting down.''
The demonstration that ovens are the cause of petryons, and that FRB 010724 is almost certainly a real FRB, has been accepted for the Monthly Notices of the Royal Astronomical Society. It is also available on arXiv.org, with Petroff once again the first author, despite having yet to complete her PhD.
Petroff told IFLS that ''It takes a 64m dish to pick up the radiation,'' so she doubts perytons are dangerous to those too impatient to stop the oven before opening. Nevertheless, she has advised on Twitter that it ''Still might be good to advise staff to wait. It's a small lesson in patience.''
Petroff says the culprit has not been identified and denies plans to ''point fingers.''
Credit: Katie Mack.@AstroKatie's handy guide to distinguishing perytons from fast radio bursts.
Read this next: Tyrannosaurs Ate One Another
THE GAY BOMB.
Sat, 11 Apr 2015 23:31
THE GAY BOMB.This is unbelievable:
A Berkeley watchdog organization that tracks military spending said it uncovered a strange U.S. military proposal to create a hormone bomb that could purportedly turn enemy soldiers into homosexuals and make them more interested in sex than fighting.
Pentagon officials on Friday confirmed to CBS 5 that military leaders had considered, and then subsequently rejected, building the so-called "Gay Bomb." [...]
"The Ohio Air Force lab proposed that a bomb be developed that contained a chemical that would cause enemy soldiers to become gay, and to have their units break down because all their soldiers became irresistibly attractive to one another," Hammond said after reviewing the documents.
Because what could be better than turning the enemy into a bunch of homos? Our ultra-hetero-masculine soldiers would easily triumph over a nancy-boy army!
At least the Pentagon was smart enough to reject the idea.
--Ann Friedman
BBC NEWS | Americas | US military pondered love not war
Sat, 11 Apr 2015 23:30
The unconventional proposals were made by the US Air Force
The US military investigated building a "gay bomb", which would make enemy soldiers "sexually irresistible" to each other, government papers say.Other weapons that never saw the light of day include one to make soldiers obvious by their bad breath.
The US defence department considered various non-lethal chemicals meant to disrupt enemy discipline and morale.
The 1994 plans were for a six-year project costing $7.5m, but they were never pursued.
The US Air Force Wright Laboratory in Dayton, Ohio, sought Pentagon funding for research into what it called "harassing, annoying and 'bad guy'-identifying chemicals".
The plans were obtained under the US Freedom of Information by the Sunshine Project, a group which monitors research into chemical and biological weapons.
'Who? Me?'
The plan for a so-called "love bomb" envisaged an aphrodisiac chemical that would provoke widespread homosexual behaviour among troops, causing what the military called a "distasteful but completely non-lethal" blow to morale.
Scientists also reportedly considered a "sting me/attack me" chemical weapon to attract swarms of enraged wasps or angry rats towards enemy troops.
A substance to make the skin unbearably sensitive to sunlight was also pondered.
Another idea was to develop a chemical causing "severe and lasting halitosis", so that enemy forces would be obvious even when they tried to blend in with civilians.
In a variation on that idea, researchers pondered a "Who? Me?" bomb, which would simulate flatulence in enemy ranks.
Indeed, a "Who? Me?" device had been under consideration since 1945, the government papers say.
However, researchers concluded that the premise for such a device was fatally flawed because "people in many areas of the world do not find faecal odour offensive, since they smell it on a regular basis".
Captain Dan McSweeney of the Joint Non-Lethal Weapons Directorate at the Pentagon said the defence department receives "literally hundreds" of project ideas, but that "none of the systems described in that [1994] proposal have been developed".
He told the BBC: "It's important to point out that only those proposals which are deemed appropriate, based on stringent human effects, legal, and international treaty reviews are considered for development or acquisition."
Keep Out: NASA Asks Future Moon Visitors to Respect Its Stuff | WIRED
Sat, 11 Apr 2015 23:08
The moon is about to become crowded.
In the next few years a slew of countries, including China, India, and Japan, are looking to put unmanned probes on the lunar surface. But more unprecedented are the 26 teams currently racing to win the Google Lunar X Prize '' a contest that will award $20 million to the first private company to land a robot on the lunar surface, travel a third of a mile, and send back a high-definition image before 2015.
With all this activity, NASA is somewhat nervous about its own lunar history. The agency recently released a set of guidelines that aim to preserve important heritage locations such as the Apollo landing and Ranger impact sites. The report, available since 2011 to members of the private spaceflight community, was publicly posted at NASA's website and officially accepted by the X Prize foundation on May 24.
''NASA has recognized that these sites are important to mankind and have to be protected to make sure there's no undue damage done to them,'' said John Thornton, president of Astrobotic Technology Inc., a company competing for the prize.
Though NASA has no way of enforcing the requirements, they are designed to protect materials and scientific equipment at historical lunar sites as well as future landing sites. The guidelines have been made available internationally, and the agency welcomes other nations to participate in and improve upon them, said NASA spokesperson Joshua Buck in an e-mail.
NASA is asking anyone that makes it to the lunar surface to keep their landing at least 1.2 miles away from any Apollo site and about 1,600 feet from the five Ranger impact sites. The distance should keep the old equipment safe from a terrible accident or collision. It will also would put the new equipment ''over the lunar horizon'' relative to the relics, and prevent any moon dust '' known to be a highly abrasive material '' from sandblasting NASA's old machines.
The Apollo 11 and 17 sites '-- the first and last places visited by man '-- are singled out in particular for extra care and respect. Robots are prohibited from visiting both sites and are requested to remain outside a large radius (250 feet for Apollo 11 and 740 feet for Apollo 17) to prevent a stray rover from accidentally harming hardware or erasing any footprints.
''Only one misstep could forever damage this priceless human treasure,'' reads the report.
Looking toward a possible high-traffic lunar future, the report also warns that frequent and repeated visits would have a cumulative and irreversible degrading effect on the historical sites. Other guidelines ask that rovers avoid kicking dust onto existing scientific experiments, like the laser-ranging lunar reflectors that are used to measure the distance between the Earth and moon.
Once a team has successfully landed, both the guidelines and the Google Lunar X Prize actually encourage them to go near some of the historic landing sites. The X Prize will award an extra $4 million to any company that can snap photos of a man-made object on the moon, including the Soviet Lunokhod rovers. And NASA has placed less restrictive protective radii around their other Apollo-era sites and artifacts, asking that robots merely remain three to nine feet from flags, tools, storage bags, and other pieces.
There is currently little data on what sitting for 40 plus years on the lunar surface does to man-made objects. The moon is an extreme environment, with wild temperature swings and full-on exposure to solar radiation, dust, and micrometeorites, all of which could severely weather materials.
Scientists and engineers are eager to obtain some before and after shots of artifacts that have been exposed to the elements for so long. It could give them insight into building future long-term structures on the moon, such as manned bases or mining operations.
Though the guidelines come from NASA, the agency worked with members of the private spaceflight community before releasing them, said Robert Richards, founder of two companies competing for the Lunar X Prize, Moon Express, Inc. and Odyssey Moon Limited.
''It's not a decree, we were able to participate and comment,'' he said. Richards added that the instructions simply reflect common sense, decency, and respect for other people's property on the moon.
Images: 1) NASA's proposed radius around the Apollo 17 landing site, which would prevent damage to any historical artifacts from future missions. 2) Scientists and engineers would like to obtain updated photos of the Apollo 15 rover to see how it has weathered after nearly 40 years on the lunar surface. NASA
Justice denied: Tsarnaev's own lawyer ignores evidence he is innocent of Boston bombing | Truth and Shadows
Sat, 11 Apr 2015 22:38
By Craig McKee
Dzhokhar Tsarnaev never had a chance.
While there is significant evidence supporting the accused Boston bomber's innocence, none of it made it into his trial, which just concluded with guilty verdicts on all 30 counts against him. It seems that law enforcement, the media, and especially Tsarnaev's own lawyer, Judy Clarke, were focused on suppressing any evidence that could have undermined the official story of the bombing. The truth has been covered up just as effectively as it was the day Lee Harvey Oswald was shot by Jack Ruby.
Clarke insured Tsarnaev's conviction when she opened the trial by admitting that he had carried out the bombing on April 15, 2013 with his brother, 26-year-old Tamerlan, who was killed in the aftermath. Clarke painted Tamerlan as the instigator in an apparent effort to spare Dzhokhar from execution, but that may happen anyway as the trial now enters the sentencing phase.
Clarke is known for her ability to keep her clients off death row (including Unabomber Ted Kaczyinski; alleged 9/11 conspirator Zacarias Moussaoui; and Jared Loughner, who was convicted of shooting Rep. Gabrielle Giffords), but given the weakness of the evidence against Tsarnaev, Clarke's strategy amounted to throwing in the towel before the trial even started.
But what about making the prosecution prove guilt? To say that Clarke could have created reasonable doubt if she had wanted to is an understatement. In this article, we'll look at the evidence that should have been introduced at Tsarnaev's trial but wasn't (Keep in mind that Dzhokhar had claimed his innocence, which conflicted with the supposed confession he wrote on the inside of the boat where he was captured on April 19, four days after the bombing).
Most have taken for granted from the beginning that Tamerlan and Dzhokhar did what they are accused of doing. But how many would be surprised to learn that the evidence against them depends on the statements of just two people '' and these just happen to be the two most suspicious characters in this incredible story. While there is little direct evidence of guilt, there is plenty that points to the brothers being set up as patsies.
Investigative reporter Russ Baker, who has written extensively about the case, explains in one of his articles just how thin the evidence is against the brothers is (Note that the ''Danny'' referred to below is the alleged carjacking victim, whose identity remained hidden until the trial. He has since been identified as Chinese immigrant Dun Meng.):
''Without the murder of the MIT policeman, followed by the carjacking confession reported by Danny, we would have no solved crime, no evidence linking anyone to the horrific Boston Marathon bombing except some grainy video of two guys wearing backpacks in a sea of other backpack-wearers near the source of the explosion. The assumption many of us make that the Tsarnaevs planted those bombs is just that: an assumption that, in the absence of the reported confession, has no evidence behind it.''
No evidence behind it.
THE OFFICIAL BOMBING STORY
The official story of the Boston Marathon bombing is a very strange one indeed, particularly for what happened in the days that followed the main event. This version includes a murder, a carjacking, a shootout, an escape, a police manhunt, martial law, and even a hideout confession amid a hail of gunfire.
As the story goes, two radicalized Muslim brothers of Chechen descent decided they wanted to strike out at a visible American target in retribution for the killing of Muslims around the world by the U.S. government. The brothers allegedly placed and detonated two pressure cooker bombs filled with shrapnel in separate locations '' the blasts coming just a few seconds apart '' near the finish line of the Marathon just before 3 p.m. on April 15, 2013.
Dzhokhar (white hat) and Tamerlan (black hat) at the Marathon.
The brothers had seemingly gotten away with the crime until they took a series of inexplicable actions (this is on top of the fact that they chose to remain in the Boston area after the alleged bombing rather than simply getting out of town). These events started three days after the bombing when police released photos of the brothers and asked the public for help in identifying them. They were labelled as ''suspects.'' This, we're left to conclude, spooked Tamerlan and Dzhokhar into making some very reckless decisions that brought about their downfall.
On the night of the 18th, they are alleged to have killed MIT police officer Sean Collier in order to get his gun, although they didn't take the gun. Then the brothers are alleged to have committed a carjacking and to have told the victim that they were responsible for both the Boston bombing and the Collier murder. We're told that they took the victim for a drive that involved stops at a bank and a gas station. They took the carjack victim's Mercedes SUV and then supposedly allowed him to escape so that he could tell authorities that his captors had admitted to being responsible for the bombings and the murder. Not very smart'...
The two followed this, we're told, by leaving the scene of the carjacking with both the Honda Civic they arrived in and the stolen SUV, although they abandoned the Honda at some point.
The allegedly stolen Mercedes was later spotted by police, we're told, leading to a shootout in Watertown, Mass. It was there where Tamerlan was allegedly shot. Dzhokhar is supposed to have jumped into the SUV and driven over his brother's body in escaping (possibly causing his death). Soon after, he allegedly abandoned the vehicle and ran off on foot, hiding in a boat parked behind a home.
The owner noticed blood on the outside of the boat and that the cover had been disturbed, and he looked in to see Dzhokhar lying inside. Police were called, and this led to what we were told was an exchange of gunfire between Dzhokhar and police, although it came out later that the suspect was unarmed and that police had done all the shooting.
These are what we're told are the facts, although there are multiple versions of each element of the story. In fact, none of the versions makes any sense, but the inconsistency is definitely telling. Let's take a look at the major elements of the story and how the official story is not borne out by the evidence in each one.
THE EXERCISE
An early clue that Boston was a false flag operation was the bomb ''exercise'' that was going on at the exact same location and time as the actual bombing. This has become a tell-tale sign of false flags, particularly since 9/11 when numerous exercises were taking place that simulated the very thing that actually happened at the very time it was happening.
Loudspeakers announced to the crowd near the finish line of the Marathon that they needn't worry about the bomb squad and their bomb-sniffing dogs patrolling the area during the race because it was just an exercise.
Incredibly, two hours before the blasts the Boston Globe tweeted (at 12:53 p.m.) that there would be a ''controlled explosion opposite from the library within one minute as part of bomb squad activities.'' Boston Public Library is right across the street from where the first blast went off just before 3 p.m. Quite a coincidence.
Another tweet came later specifying the JFK Library (which is some distance away). It said: ''Third incident: Explosion earlier today at the JFK Library.'' Later still, the story changed again: ''Fire earlier today likely unrelated to Marathon bombings.''
No more talk of bomb squad activities.
The most absurd example of an exercise being synchronized with an actual false flag event is the 7/7 London bombings of July 2005 when a simulation of the bombing of three underground stations was going on as those same stations were actually being bombed (not to mention a real bus bomb that was also reflected in the exercise). The pattern was repeated with the mass shooting in Norway in 2011, the Aurora movie theater shooting in July 2012, and the Sandy Hook school ''shooting'' in December 2012.
Then there were the ''contractors'' wearing black jackets and caps, beige pants, and black backpacks with white squares on them. It has been alleged that they were from the private CIA-linked security firm Craft International, which uses the identical outfits and skull logo seen on the caps these men were photographed wearing that day. The presence of these operatives in Boston has been denied, but the photographic evidence confirms that they were there.
And photographic evidence shows that these unidentified ''contractors'' clearly had some official function because we can see at least one of them getting into an FBI bomb squad truck, which had arrived after the bombing. Photographic evidence also shows two of the black-and-beige men standing where the bomb would soon be detonated. But before it happened, the two left that spot and walked to the other side of the street.
Truly shocking is that plans had been made for a ''terror'' exercise, funded by the Department of Homeland Security, to take place in Boston in June, about a month-and-a-half after the Marathon bombing occurred. The Boston Globereported that the exercise, called Operation Urban Shield, would focus on a terrorist group using a skull logo whose members would drop off bombs in backpacks at various locations in Boston to cause panic and fear.
THE 'IDENTIFICATION'
Nothing about the identification and pursuit of the Tsarnaev brothers passes the smell test. We learned early on that these two had been identified as prime suspects, in part because legless victim Jeff Bauman identified one of the brothers as having set a backpack on the ground just before the blast (more about Bauman and the scene of the bombing later).
Bloomberg.com reports that Bauman's brother Chris said in an interview that a heavily sedated Bauman had awakened in hospital and told Chris that he had seen the man who placed a bag on the sidewalk right near him two-and-a-half minutes before the first blast.
Chris said: ''He woke up under so much drugs, asked for a paper and pen and wrote, 'bag, saw the guy, looked right at me.'''
As this story goes, Bauman's description of the first suspect (later claimed to be Tamerlan) was what allowed the FBI to narrow their search.
In an interview in May of 2013 with the Concord Monitor, Bauman had a much more colorful story to tell about his alleged encounter with the suspect. ''I thought (to) myself, 'This guy's kind of weird,' '' he said. ''He kind of stared at me, and I stared at him, and then I was just like, he sketched me out, I was like, 'He just doesn't look like he's in place.''
I'm not sure how one looks ''out of place'' in a large crowd, but despite all these impressive gut feelings about how weird the suspect looked as he dropped a backpack on the ground and then walked away, Bauman did nothing else. He didn't report the abandoned bag.
Dzhokhar proclaimed 'the bomber.'
Despite that, this account still helped crack the case when the FBI was able to isolate Tamerlan and his brother from among thousands of faces on the scene that day. Three days after the bombing, the FBI released surveillance video of Tamerlan and Dzhokhar with a plea for help in identifying them '' all allegedly based on the description from Bauman. (I wonder how they identified Dzhokhar as a suspect given that he was shown in the surveillance video walking several feet behind his brother.)
Later we found that Tamerlan was well known to the FBI. So they appeared to be lying about not knowing who he was. It is also interesting that authorities told the public not to consider any images that didn't come from police.
''These images should be the only ones, and I emphasize the only ones, that the public should view to assist us,'' said FBI special agent Richard DesLauriers.
Fortunately, independent researchers have looked at other images, and this is how we know that so much of what was reported is simply false.
One image that doesn't fit in with the official story is the one that shows the allegedly exploded backpack at the scene of the second bomb. It was clearly a dark color, while the backpack Dzhokhar was photographed carrying was much lighter. And, the exploded pack had the same white square on the back that was visible on the backpacks carried by the men who appeared to be from Craft International.
The release of the surveillance photos of ''the suspects'' supposedly panicked the brothers because they then are alleged to have kicked off a crime spree that would ultimately bring them down. And the supposed violence that followed is what has left a strong impression with the public concerning the alleged guilt of the brothers. (''If they are innocent, why did they shoot it out with the cops?'' is how it goes.) But how much of that story stands up '' or makes sense?
THE 'PURSUIT'
It started with the brothers' alleged murder of MIT cop Sean Collier on the 18th, three days after the bombing. Collier was parked between two buildings on the MIT campus, and we're told that the brothers had one gun but wanted a second one. So they allegedly fired multiple times into the car. They then took off without taking the gun.
Does this make any sense?
If the brothers' escape plan included going to the campus of MIT and shooting a cop, then they must really have wanted to get caught. So far, we haven't been given any hard evidence at all to support the accusation that the officer was killed by one of the brothers. Video presented at Dzhokhar's trial does not contain anything that identifies either brother.
This part of the story is reminiscent of the murder of Officer J.D. Tippit in Dallas on Nov. 22, 1963. That was pinned on Lee Harvey Oswald even though eyewitnesses said two men, neither resembling Oswald, went up to Tippit, and at least one fired before the two ran away in opposite directions (p. 24, Mark Lane's recent book, The Last Word). In the public mind, the extra murder solidifies the belief in the guilt of the suspect or suspects.
Then we come to the most significant aspect of the case against the brothers '' the alleged carjacking that Tamerlan and Dzhokhar are supposed to have committed in the Brighton section of Boston shortly after shooting Collier. This was critical to the official story for two reasons: the carjack victim allegedly heard one brother confess to the bombing, and the ''escape'' of the alleged victim is what led authorities to impose martial law as they launched a manhunt for the two suspects. As Baker points out in a pair of articles detailing the inconsistencies in the carjacking story, the public's understanding of what took place is based entirely on this claim concerning an alleged confession.
Baker writes: ''The alleged carjacking led to a law enforcement shutdown of the greater Boston area, a huge manhunt, and subsequent confrontations in which Tamerlan Tsarnaev was shot and killed. His younger brother, Dzhokhar, was seriously wounded by multiple gunshots while hidden in a boat, before being apprehended by police.''
The alleged carjacking victim's identity was not publicly known initially. He was described in reports as ''Danny'' and has had his face and voice disguised in interviews. He claimed that he feared recriminations from ''terrorists.''
Prior to the trial, Danny claimed he told police that the brothers only let him live because he wasn't American. And while he didn't understand what they were saying, he heard them say ''Manhattan'' several times (oooh, that's ominous). Danny is supposed to have told police that the brothers confessed to both the bombing and the murder. But many elements of his story have been inconsistent from one media interview to another.
As Baker points out, it was reported by the Boston Globe, NBC and CBS that Danny was held captive for 90 minutes. Then officials, including the Cambridge, Mass. police chief, announced that it had been 30 minutes. Meanwhile, an Associated Press report had him being let go after just a few minutes.
Did the brothers confess to him about the bombing and the Collier murder or just the bombing? Numerous media reports mentioned both, but the criminal complaint only mentioned the bombing. And an ABC interview with Danny only mentioned a confession about the bombing and not about Collier.
And how did Danny escape? Again, this depends on whose report or which interview you read. Was he simply let go after a few minutes? Did they leave him alone in the car when the brothers went to pay for gas? Or is the story about Tamerlan being distracted by his GPS while Dzhokhar paid for gas the real reason? That one's more exciting because it involves an actual escape. But it, like the rest of this story, makes no sense.
Why would the brothers kill an MIT cop to get his gun and then not take it? Why would they carjack someone when they already had a vehicle? Why would each drive a vehicle for a while before abandoning the one they had originally? Why continue to drive Danny's SUV when its theft would have been reported to police? Why let Danny go, or let him escape, so that he can run to police and pass on the confession? Why confess to something in the first place?
And why remain in the Boston area three days after the bombing if they were actually guilty? None of this makes the slightest bit of sense, and yet we're supposed to believe it on the word of a ''victim'' whose identity wasn't even known for two years. (It's important to remember that the carjacking directly led to authorities to lock down the city, imposing martial law in a supposed effort to apprehend the suspects.)
At some point, allegedly anyway, police tracked the supposedly stolen SUV and cornered the suspects, leading to the big shootout between them and police in Watertown. Boston police commissioner Ed Davis says police ''pinged'' the carjacking victim's cell phone after he was let go by the brothers (or escaped). This allegedly let the police know that the suspects were in Watertown.
''A local officer spotted the brothers driving in two cars, a Honda sedan and the stolen SUV, said
Martial law was imposed to find one 19-year-old suspect.
Watertown police chief Ed Deveau. (This conflicts with the report that the Honda had already been abandoned.) Deveau says the brothers stopped, jumped out, and started firing on the officer, while more police rushed to the scene.
''Quickly we had six Watertown police officers and two bad guys in a gunfight,'' Deveau he said, adding that at least 200 shots were fired; maybe as many as 300.
''We have reason to believe, based upon the evidence that was found at that scene '-- the explosions, the explosive ordnance that was unexploded, and the firepower that they had '-- that they were going to attack other individuals,'' Davis told CBS News's Face the Nation.
Incredibly, Deveau claims that one of the brothers threw a pressure cooker bomb at police during the gunfight with officers. ''We believe it was an exact duplicate of the Boston Marathon bombs,'' he said (they claim to have found a lid to a pressure cooker).
For some bizarre reason, the brothers stood in the light of the headlights of their car as they exchanged fire with police. We were told they had a veritable arsenal of weapons, but then later that turned into one gun between the two of them. Tamerlan was allegedly shot, and as he lay on the ground, we're told that Dzhokhar got behind the wheel and drove over his body while escaping.
Alleging that Dzhokhar drove over his brother makes him seem less human, but is it at all believable? We later heard from an eyewitness that it was police who drove over Tamerlan's body. And, according to Infowars.com, the brothers may have been trying to surrender to police.
So, the brothers are cornered by several police officers during a shootout that supposedly featured between 200 and 300 shots fired, and one, Dzhokhar, is allowed to escape in a car? A short distance away, he ditches the vehicle and then runs away? You can really see how that whole martial law thing came in handy. Regular cop tactics just weren't going to get the job done this time.
So, did Tamerlan really die either in the shootout or after being run over? A video surfaced later from that night that showed a man looking awfully like Tamerlan, handcuffed and naked, being placed in a police car. Police say this wasn't Tamerlan, but Dan Dicks of Press for Truth reports that he spoke to the brothers' aunt, Maret Tsarnaeva, who said that the man in the video was absolutely 100% her nephew.
If true, this means that Tamerlan was murdered while in police custody.
Some things the brothers were accused of were later proven to be untrue. We were told they had shot Transit Police Officer Richard Donohue during their shootout with police, but it was later admitted that Donohue had been killed by police ''friendly fire.'' We were also told the brothers had robbed a convenience store. Then we were told they didn't do that either.
The story of the shootout involving police and Dzhokhar when he was hiding in the boat turns out to have been a lie also. We were told by Davis that there was an exchange of gunfire between Dzhokhar and police that led to his capture. Later, authorities admitted Dzhokhar had been unarmed and that police riddled the boat with bullets unilaterally. At the end of the shootout, the story goes, Dzhokhar may have shot himself in the throat on purpose (huh?). Later, a police spokesman said the throat wound looked more like a knife wound than a bullet wound.
Oh yes, and the owner of the boat, David Henneberry, is quoted as saying he saw that the cover on the boat appearing to be disturbed, so he looked into the boat and saw a pool of blood. We also hear that he looked in and saw Dzhokhar lying in the boat. But photographs taken the next day show only a small amount of blood where Dzhokhar would have climbed out (and it's highly unlikely that the police would have cleaned up the blood inside the boat by the next day '' especially when we can plainly see a small amount blood on the outside of the boat).
THE 'CONFESSION'
One essential element that had to be established to make this false flag believable was the image of angry Muslim extremists intent on attacking America. What seals this part of the script is the oh-so-convenient written ''confession'' by Dzhokhar that supposedly explains his motives for the bombing. Apparently, Dzhokhar wrote a kind of claim of responsibility on the inside of the boat where he was hiding, using a marker he ''found'' (no paper was handy, so he wrote it on the cabin wall as he bled from multiple gunshot wounds).
The note, which was released by prosecutors in May 2014 (both a photo of the original and a transcript of the contents), has all the usual Muslims-are-to-blame talking points, including:
When you attack one Muslim, you attack all MuslimsWe're getting you back for killing Muslims in Iraq and AfghanistanThe innocent victims in Boston are collateral damage just as Muslims are in U.S. warsI don't mourn my brother because he is a martyr in paradise, where I expect to be soon. (How did he know for sure his brother was dead?)We first learned of the note in a CBS News report on May 16, 2013 during which Charlie Rose and his grinning sidekick Norah O'Donnell spoke with ''senior correspondent'' John Miller, a former FBI assistant director. This CBS ''scoop'' came a full month after the bombing because, Miller suggests, the note was '''...the thing that investigators never found anywhere else.'' (This is the same Miller who was one of the very few who got access to Danny for an interview.)
They didn't examine the boat where Dzhokhar spent his last several hours of freedom for possible evidence at the time? Really? And when they did, they magically came up with the familiar ''death to America'' justification that so often accompanies these false flag events?
Also intriguing is that the note contained a reference to Dzhokhar's brother being dead, which doesn't fit with an account that the first thing he asked after his capture was whether or not his brother was still alive.
THE 'CONNECTIONS'
It turns out that the brothers were well known to U.S. intelligence, including the FBI, which interviewed Tamerlan and placed the brothers on a terror watch list in March 2011 after receiving a warning about them from the Russian Federal Security Bureau.
Zubeidat Tsarnaeva says her sons are innocent.
The boys' mother, Zubeidat Tsarnaeva (who maintained after Dzhokhar's guilty verdict that he is innocent), says the FBI had been watching their family for years and had even been in their home, telling her that her eldest son, Tamerlan, was a dangerous extremist. She was quoted in minds.com as saying:
''He was controlled by the FBI, like for three, five years,'' she said. ''They knew what my son was doing, they knew what actions and what sites on the Internet he was going [to], they used to come'...and talk to me'...they were telling me that he was really a serious leader and they were afraid of him.''
Peter Dale Scott goes further, suggesting that Tamerlan may have been an FBI informant.
''If Tsarnaev was a double agent, he would be just one of thousands of young people coerced by the FBI as the price for settling a minor legal problem, into a dangerous career as an informant,'' Dale Scott writes.
Both of the brothers' parents claim their sons are being set up. In an article in Global Research, Bill Van Auken makes this telling statement:
''While much remains murky about these and other issues, one thing is clear: the Boston bombing, like virtually every other major terrorist incident, real or invented, since the September 11, 2001 attacks on New York City and Washington, was carried out by someone who was known to and under surveillance by U.S. intelligence agencies.''
And perhaps most significant are the connections between the brothers, their uncle Ruslan Tsarni (who called them ''losers'' on TV even though he claimed hadn't seen either of them in several years), and the CIA. Tsarni, it turns out, was married to the daughter of senior CIA official Graham Fuller. He even lived at Fuller's home for a time, as reported by researcher William Engdahl.
''This uncle was married to the daughter of Graham Fuller, one of the most important CIA architects of using Islamic Jihadists/terrorists against the USSR during the Cold War and after, throughout Central Asia, including Chechnya and Kazakhstan,'' writes Engdahl.
In fact, Fuller was the CIA station chief in Kabul at one time and author of The Future of Political Islam. Tsarni and Fuller also worked together to set up a support group for Chechen nationalist guerrillas, as Nick Barrickman reports in Global Research.
But there are more links than that between Tamerlan and the CIA. Investigative journalist Wayne Madsen wrote in a May 2013 article that according to documents obtained from the Georgian Interior Ministry, Tamerlan attended training sessions in Tblisi, Georgia sponsored by the CIA-linked Jamestown Foundation, which was founded in the 1980s by former CIA director William Casey to serve an anti-Soviet agenda.
''Jamestown has two major missions on behalf of the CIA: 1) to ensure the flow of energy, including oil and natural gas, from the Caspian through pipelines in Azerbaijan, Georgia, and Turkey,'' Madsen writes, ''and 2) [to] prop up or topple governments in the region to ensure U.S. predominance. The latter is accomplished through organizing the political opposition, setting up conferences, and gaining influence in universities through non-governmental organizations established to veil the CIA's financing of the operations.''
And on the connection to the Boston bombing, he concludes: ''The interests who are linked to the Boston Marathon and terrorism in Russia run the gamut from NGOs, to CIA front companies and non-official cover (NOC) agents, foreign intelligence services, and Western energy companies.''
Engdahl asks: ''Is it mere ''coincidence'' that the uncle of the two young men accused of the Boston bombings was related in marriage to the CIA figure who advocated using the networks which were later named ''Al Qaeda'' across Central Asia, including Chechnya where the Tsarnaev brothers had roots?''
A key element of the Boston bombing official story is the establishing of a motive for the brothers. To that end, Tamerlan made a trip to Dagestan in 2012 that has received a lot of attention. The trip was apparently made for the purpose of renewing his Russian passport.
Peter Dale Scott says Tamerlan's ''conspicuous, provocative, almost theatrical'' behavior was very uncharacteristic of Muslim extremism. (Does this remind anyone of alleged 9/11 hijackers, also supposed to be devout Muslims, who were seen gambling, drinking alcohol, using cocaine, and soliciting prostitutes?)
''While walking around in flashy western clothes in the Russian Republic of Dagestan, he visited his cousin, Magomed Kartashov, a prominent Islamist leader, already on the Russians' radar,'' Dale Scott writes. ''The two reportedly spent hours discussing Tsarnaev's wish to join a terrorist cell there in the Caucasus.'' After returning to the U.S., Tamerlan posted pro-jihadist videos on You Tube.
With this six-month trip to Russia, Tamerlan established a possible motive for the bombings while doing all he could to draw attention to himself. So it seems that the planning for the bombing goes back at least this far '' even if Tamerlan had no idea of what he was being set up to take the fall for.
The plot thickened the month after the bombing when an acquaintance of Tamerlan's was killed in Orlando, Florida while being questioned by the FBI and the Massachusetts state police about his connection to Tamerlan. Ibrahim Todashev was shot to death in his apartment after police alleged that he had lunged at them with a knife. This turned out to be false, and it was later acknowledged that Todashev had been unarmed. The FBI has declined to discipline the agent who fired the shots.
Todashev's father wrote an open letter to President Barack Obama calling for justice in his son's murder, accusing the FBI of ''torturing'' him and shooting him 13 times. He wrote: ''They did it deliberately so that he can never speak and never take part in court hearings. They put pressure on my son's friends to prevent them from coming to the court and speaking the truth.''
One of the friends who appears to have been pressured was Todashev's girlfriend, Tatiana Gruzdeva, who was arrested and deported after giving an interview to Boston Magazine about the days leading up to Todashev's murder.
THE 'CARNAGE'
Beyond looking at whether the Tsarnaev brothers were patsies, set up to take the fall for a false flag event, it is also worth briefly considering clear evidence that the bombing itself was not what we were told it was.
For example, based on the video and photographic record, the claim of 264 injured is, to put it very mildly, a wild exaggeration. We've been told that about a dozen had lower limbs blown off even though we only see one in the photographs and video. And, as researcher Dave McGowan points out in his 16-part series, we don't see any arms, hands, or even fingers blown off '' only lower legs. Apparently, the shrapnel stayed low and localized (based on the complete absence of injuries to race participants).
Arredondo shows off his bloody flag.
In fact, we don't see the kind of wounds we'd expect to see if shrapnel-filled bombs had actually gone off. None of the banners that lined the race route where the first of the two explosions took place showed any perforations at all from the high-speed projectiles that would have resulted from the bomb. In numerous cases we see torn or neatly sliced clothing but no apparent wounds where the clothing has been penetrated.
Incidentally, it is extremely curious that there are very few photographs of the immediate aftermath of the second blast '' especially in relation to the first one, which is heavily documented. Where were all the cameras at that spot? One detail that is ignored by the media is that there is photographic and video evidence showing a woman setting down her purse on top of a white plastic bag right beside the mailbox where the second ''bomb'' is supposed to have gone off. The woman leaves the scene without the purse, and a blast follows. Why is this woman not a suspect? Why haven't we heard anything about this?
Police told us there is surveillance video showing Dzhokhar leaving a backpack at the scene of the second blast, but that had not been released to the public until it was presented at the trial. But while there is video that appears to show both brothers without the backpacks they had at one point, the video do not appear to show conclusively that the packs were planted at the scene of either blast.
Then there is the star of our show, then 27-year-old Jeff Bauman, who allegedly had both of his legs blown off below the knee by the blast. Bauman, we are told, was waiting near the finish line for his girlfriend, who was running in the race. And tied to what is supposed to have happened to him is a story of ''heroism'' and ''courage'' as cowboy-hat-wearing Carlos Arredondo threw Bauman into a wheelchair and pushed him past photographers on the way to getting medical help. The iconic image put a human face on the horror and offered us a hero who would overcome all odds to save his new friend.
Too bad these tales of heroism are all fiction.
First of all, it's simply unbelievable that a man who had his legs blown off would be left lying on the ground for several minutes while others with seemingly minor injuries were tucked into gurneys and whisked off to hospital in ambulances. But we find out soon enough why things were done this way.
Arredondo claims to have bounded across the street from the bleachers in a rush to render aid to anyone who needed it. But the video evidence shows that he was more preoccupied with standing still and watching events unfold, or stomping on the security fence, than with helping anyone.
So much of Arredondo's story is proven false by the photos and video. He says Bauman's shirt was on fire, but there's no evidence of this. He also says all the flags were blown over by the blast: but they weren't. And the bloody American flag he unfurled for cameras? Yes, we get the symbolism. America Strong, Boston Edition.
And then there is the blood. At no time do we see any blood coming from Bauman's legs even when they were draped over the shoulders of a woman who was wearing a white top. This woman was later transported in an ambulance while Bauman was left behind. When she was wheeled away, there was plenty of blood on her. But where did it come from? It hadn't been there before. And the blood on the sidewalk (as shown in some of the photos, anyway) is a bright red color that looks a lot more like paint than blood.
We have the mysterious hooded man (who has been identified as Christian Williams) who appeared to be working on Bauman's lower body in some way in the seconds after the blast. Was he coming to his medical aid or was he affixing some kind of prosthetic? This same man was later attended to by medical personnel as he lay on the ground. Shortly before that, he'd been propped up on his elbow, looking quite casual and not very badly hurt.
According to the New York Times, however, Williams has had four operations on his legs since the event. He and his friend, Caroline Reinsch, have a fundraising web page and have received more than $112,000 in donations. Jeff Baumans' page has raised more than $809,000.
''Bim'' Costello and his sliced clothing.
There is also the comical photo of victim James ''Bim'' Costello, who has no visible wounds but multiple slices in his clothing, mainly his pants. Keep in mind that this is supposed to have been a pressure cooker bomb filled with nails and other shrapnel. Supposedly he was ''pebbled with shrapnel,'' but all we see is sliced clothing. In fact, there are a number of supposed victims whose clothing, and particularly their pants, were sliced up as if with scissors but revealing no significant injuries to their legs.
And this is just the tip of the iceberg. Sheila Casey's detailed analysis on Truth and Shadows of the photographic and video evidence from the Boston event shows how the story we've been told does not match up with what we can see for ourselves in the images.
MARTIAL LAW ANYONE?
There are a number of clues that make clear that this was a story contrived to play on our emotions. The Boston Strong bit of branding is reminiscent of the film Wag the Dog and the ''Good Old Shoe'' song that was written, recorded, and placed in the Library of Congress as if it had been there for decades. The Boston slogan and the song were clearly intended to create some of that artificial warmth.
One of the most incredible things about the way the media ''covered'' the Boston bombings is that no red flags went up when some things that were reported turned out to be completely false. The basic premise of the official story was never called into question even as it changed from one hour, one day, to the next. The pattern from the Sandy Hook ''shooting'' was repeated: media reporting an array of misinformation that seem too blatant to be honest mistakes.
Media reports about the killing of Sean Collier turned out to be wrong, but that didn't shake the story. The idea that Dzhokhar drove over his brother's body and then escaped a gun battle with police made no sense. But the media bought it. The fact that he was supposed to have been shooting back at police as they riddled the boat with gunfire '' and then it turned out he was unarmed '' did not register. The story of the alleged carjacking changed numerous times, but again, the overall story of the bombing brothers was never doubted.
Meanwhile, the news media poured flames on the emotional fire while keeping us distracted from clear facts that showed us to be cheering for a script rather than for a triumph over real adversity. The result is that people came together to celebrate their strength and resilience based upon a lie. The tragedy creates a kind of ''feel-good'' bonding situation that people don't want interfered with.
Anyone who questions the facts is seen as an intruder in the ''overcoming-tragedy'' presentation. We are told that we are disrespecting the victims, that we should leave the ''conspiracy crap'' for a later time (or cut it out altogether). What an effective way to marginalize anyone who dares to question the story or use their brain in any way.
In the Aurora cinema shooting, ABC anchor Rob Nelson, talking over live pictures from the Century 16 theater, said: ''This does fulfill a fear that we've all had as Americans, that we've reported on extensively at ABC News, and that is the proliferation of the lone wolf terrorist, and this could be an example of that.''
The report gets worse as Nelson then goes on to talk about the movie-goers as ''soft targets'':
''If you think about airports, we know what the security is like there; we take off our shoes, we take off our belt and walk through those scanners, but we don't do that on buses, we don't do that on trains, in shopping malls, movie theaters, and you have to wonder, once the dust settles, once we get past the initial shock of this, do we now begin a talk about security?'' His co-anchor chirps in: ''We're so vulnerable.''
So, violent events like Aurora and Boston lead us to think about how vulnerable we are. What's the solution? Well, in Boston we got a real taste of what authorities have in store for us, to keep us ''safe.'' We saw martial law imposed where people were forced to stay in their homes, businesses were forced to close, and an army of police (who now look just like soldiers) went door to door searching houses and forcing inhabitants out at gunpoint with their hands up. Only a well-planned psy-op could turn this into a patriotic event instead of the ominous precedent that it was.
And now that we've been introduced to the reality of martial law '' and we seemed to like it '' we're likely to be seeing much more of it in the future.
McGowan, in his series, writes: ''You can go back to sleep now. I'm sure everything is going to work out just fine. Don't be surprised though if you wake up one day soon to find the streets lined with armored personnel carriers and the skies filled with military helicopters. Because if you accept the implementation of martial law in Boston as a legitimate response to a patently fake 'terrorist' attack, then you have given your seal of approval for far more wide-reaching and far more permanent states of martial law in the not-so-distant future. And it will happen. The only question is when.''
When you add up the bomb ''exercise,'' the tweet from the Boston Globe, the presence of what appeared to be Craft International contractors (whose presence there was denied), the abundant evidence of faked injuries, the inconsistent and improbable carjacking story, as well as the murder of the MIT cop, you get a picture of a deception, a staged bombing, a false flag operation. This does not mean that no one was injured or killed, but we do know that many injuries were reported by the media that simply did not happen, according to the visual evidence.
But we heard none of this at the trial as the deck was stacked against Dzhokhar Tsarnaev from the start, with part of the credit going to his own lawyer. And while he sits in prison, waiting to find out if he will live or die, the real perpetrators of this false flag event are free to plan the next one.
Like this:LikeLoading...
Related
.
Middle school student charged with cybercrime in Holiday | Tampa Bay Times
Sat, 11 Apr 2015 21:54
HOLIDAY '-- A middle school student who said he was just trying to play a prank on a teacher he didn't like was charged with a cybercrime Wednesday after authorities said he hacked into his school's secure computer network.
The Pasco County Sheriff's Office has charged Domanik Green, an eighth-grader at Paul R. Smith Middle School, with an offense against a computer system and unauthorized access, a felony. Sheriff Chris Nocco said Thursday that Green logged onto the school's network on March 31 using an administrative-level password without permission. He then changed the background image on a teacher's computer to one showing two men kissing.
One of the computers Green, 14, accessed also had encrypted 2014 FCAT questions stored on it, though the sheriff and Pasco County School District officials said Green did not view or tamper with those files.
"Even though some might say this is just a teenage prank, who knows what this teenager might have done," Nocco said.
But Green, interviewed at home, said students would often log into the administrative account to screen-share with their friends. They'd use the school computers' cameras to see each other, he said.
Green had previously received a three-day suspension for accessing the system inappropriately. Other students also got in trouble at the time, he said. It was a well-known trick, Green said, because the password was easy to remember: a teacher's last name. He said he discovered it by watching the teacher type it in.
Green said that on the morning in question, he accessed the computer that stored the FCAT files and, realizing that computer didn't have a camera, found another.
"So I logged out of that computer and logged into a different one and I logged into a teacher's computer who I didn't like and tried putting inappropriate pictures onto his computer to annoy him," Green said.
The teacher he was targeting was out that day. Instead, the substitute teacher saw the picture and reported it to the school's administration.
The teen's mother, Eileen Foster, said she understands her son did something wrong, but doesn't think he needed to be arrested. Also, she said, it shouldn't have been so easy for students to access the system.
The school district is in the process of changing the network password, district spokeswoman Linda Cobbe said.
The sheriff said Green's case should be a warning to other students: "If information comes back to us and we get evidence (that other kids have done it), they're going to face the same consequences," Nocco said.
Green was released on Wednesday from Land O'Lakes Detention Center into the custody of his mother. He'll likely be granted pretrial intervention by a judge, sheriff's detective Anthony Bossone said.
Green also received a 10-day school suspension. It's unclear if he'll return to Paul R. Smith to complete the school year after the suspension.
Fans to Netflix: Make Daredevil accessible to the blind
Sat, 11 Apr 2015 21:53
Robert Kingett, 25, is a self-proclaimed geek who enjoys video games and comic books. So it is no surprise he was looking forward to the Netflix original series on Marvel Comics' Daredevil, which debuted on Friday.
There was just one problem: Like Daredevil, Kingett is legally blind, and Netflix does not provide audio descriptions, a feature that narrates non-verbal action on screen to help the visually impaired better enjoy filmed entertainment.
Kingett is just one of a number of comic book fans'--both blind and sighted'--who are lobbying Netflix to make "Daredevil" accessible to the visually impaired. And while the fact that a show based on a blind protagonist will not have audio description has stirred consternation, the issue extends far beyond Daredevil's fictional world.
The cost of audio description is "a tuppence" compared to the price of producing movies and television, said Joel Snyder, president of Audio Description Associates. The company charges about $5,000 to write, voice, and record description for a roughly 21/2-hour movie, and about $1,000 for a 22-minute sitcom.
Since October 2012, Kingett has been writing to Netflix executives under the banner of the Accessible Netflix Project, a grassroots campaign now comprised of 11 blind volunteers who want the world's largest streaming video service to provide audio descriptions. The group has since asked Netflix to audio describe "Daredevil" in particular.
Read MoreMarvel's Netflix shows: Sure thing or blind faith?
"It's entertainment, but accessibility is important regardless of if it's entertainment or education," said Kingett, who also lives with cerebral palsy and contributes stories to gaming publications about accessible video games for the blind.
To be sure, Netflix is not the only over-the-top service that fails to offer the feature. Neither Hulu nor Amazon Instant Video describe their originals.
Nor is the description common on broadcast television. FCC rules require local affiliates of CBS, NBC, ABC and Fox located in the top 25 markets'--as well as the top five non-broadcast networks'--to provide at least 50 hours of audio described programming per quarter. The regulation will expand to the largest 60 markets in July.
PBS and Turner Movie Classics offer audio description on select programming, though they are not required to do so.
Maine police departments pay hackers to unlock computer system - The Portland Press Herald / Maine Sunday Telegram
Sat, 11 Apr 2015 21:19
The Lincoln County Sheriff's Office and four towns that share a system say they paid $300 after the hackers claimed the 'ransomware' program would wipe the system clean.
Police departments in midcoast and northern Maine said they have paid ransom to hackers to keep their computer files from being destroyed, WCSH-TV reported Friday night.
The Portland station said the Lincoln County Sheriff's Office and four towns paid $300 to the hackers after a virus, called a ''megacode,'' was downloaded on a computer system they share. Lincoln County Sheriff Todd Bracket said that the computer system was unusable until the fee was paid, and that the hackers claimed the program, called ''ransomware,'' would wipe the entire computer system clean if the fee wasn't paid.
The creator of the virus gave the sheriff's office a code to unlock the computer system after the money was received. The county paid in bitcoins, an online currency.
''We needed our programs to get back online,'' said Damariscotta Police Chief Ron Young. ''That was a choice we all discussed and took to get back online to get our information.''
Brackett told WCSH that the FBI tracked the payment to a Swiss bank account, but no further.
The Houlton Police Department told the station that it was hit with a similar virus early this week and its computer system was locked up until ransom was paid.
Last summer, the FBI, foreign governments and private security firms dismantled an operation, based in Russia, that commandeered as many as a million computers and drew money out of bank accounts, The Washington Post reported. The operation also included a ransomware scheme and officials said they had identified the 30-year-old Russian behind the operation but had not apprehended him.
Report: Capitol Police Chief Who's Stonewalling Release of Harry Reid Injury Information Has Resigned - Breitbart
Sat, 11 Apr 2015 20:36
Roll Call is reporting that ''U.S. Capitol Police Chief Kim C. Dine has submitted a letter of resignation to the Capitol Police Board, multiple sources with direct knowledge of the situation have confirmed.''
As Breitbart News reported earlier this week, Dine's tenure as Capitol Police Chief has been troubled.
Dine's failure to release the Capitol Police event report of the New Year's Day incident in which then Senate Majority Leader Harry Reid (D-NV) sustained gruesome injuries is just the most recent controversy in which Dine has been involved.
As Roll Call reports:
Dine's stated intent to leave the agency comes at a moment when frustrations have come to a head, not just from rank-and-file officers but from the Capitol Police Board. The board made the decision to hire the former police chief from Frederick, Md., in December 2012, confident he could restore trust and accountability in the ranks after long-simmering discontent with Dine's immediate predecessors in the top brass.
The chief's letter of resignation comes amid reports of conflict within the department, which employs 1,775 sworn officers and 370 civilians. A recent CQ Roll Call report detailed growing frustration among rank-and-file officers regarding alleged policies passed down from department brass that officers should not participate in ''low value'' stops around the Capitol campus. The officers said the top priority was combating terrorist threats against the Capitol and lawmakers, with day-to-day policing taking a backseat.
Lawmakers questioned Dine about officer morale at a recent House Legislative Branch Appropriations Subcommittee hearing, following the reports. Dine has also been under scrutiny for the handling of a car chase the night of the State of the Union, which ended without an arrest despite the fact that the suspect was driving without a license. Members of Congress also grilled Dine after the October 2013 fatal shooting of Miriam Carey, as well as the decision to call back officers from the September 2013 Navy Yard shooting.
For his part, Reid has been very supportive of Chief Dine's leadership.
''I'm for a strong Capitol Police. We need to give them more resources, rather than less,'' Reid said on March 3.
''I do everything I can to be a stalwart protector and defender of the Capitol Police,'' Reid added later at a March 13 press conference.
''They have a job that is very very difficult. We see the uniformed people trying to help us, and they do help us,'' Reid added. ''I'm not going to be picking apart something that somebody that doesn't like the Chief or the Sergeant at Arms.''
''I think they do a masterful job. I support the Chief of Police, I support the new Sergeant at Arms, I support the old Sergeant at Arms,'' Reid concluded.
On Wednesday, Reid named former Senate Sergeant at Arms Drew Willison as his new Chief of Staff, a move that raised concerns about conflict of interest.
As Breitbart News reported, in his role as Senate Sergeant of Arms Willison was a member of the three person Capitol Board, which supervises Capitol Police Chief Dine.
Willison held that position on January 1, 2015, the day on which Reid sustained severe injuries in his Henderson, Nevada home and was transported to St. Rose Dominican Hospital in Henderson by his Capitol Police security detail.
The Capitol Police under Dine's leadership have refused to release the event report of that incident, which should have been filed by Reid's security detail.
Breitbart News asked for Willison to release all communications he had with the Capitol Police during the days between December 31, 2014 to January 6, 2015, but, to date, Willison has stonewalled that request.
Breitbart News has asked Capitol Police spokesperson Kim Schneider to confirm or deny the Roll Call report of Dine's resignation but has not received a response.
Breitbart News has also asked Senate Sergeant at Arms spokesperson Becky Daugherty to confirm or deny the Roll Call report, but has not received a response.
Upcoming Guidance on the "The Gospel Tradition: In Performance at the White House" | The White House
Sat, 11 Apr 2015 20:22
The White House
Office of the First Lady
For Immediate Release
April 10, 2015
Event includes Evening Performance and Daytime Student WorkshopHonoring Gospel Music
Tuesday, April 14, 2015 * The White House '' The President and First Lady will invite music legends and top contemporary artists to the White House as part of its ''In Performance at the White House'' series. The event will pay tribute to the fundamental role gospel music has played in the American musical tradition and the important artists and repertoire that have marked its vibrant history. The program will include performances by Bishop Rance Allen, Pastor Shirley Caesar, Aretha Franklin, Rodney Crowell, Rhiannon Giddens, Emmylou Harris, Darlene Love, Lyle Lovett, Tamela Mann, the Morgan State University Choir, and Michelle Williams '-- with T Bone Burnett as executive music director and Billy Maxwell as music director. The President's remarks will be pooled press and the entire event will be streamed live at WhiteHouse.gov/live at 7:00 PM (ET). ''The Gospel Tradition: In Performance at the White House'' will be broadcast Friday, June 26, 2015 at 9:00 PM ET on PBS stations nationwide (check local listings). The program will also be simulcast on TV One.
As with previous White House music events, the First Lady will host a special daytime workshop for students. The First Lady will welcome more than 130 middle school, high school and college students from across the country to take part in an interactive student workshop: ''The History of Gospel Music.'' Beginning at 11:00 AM in the State Dining Room, Robert Santelli, Executive Director of The GRAMMY Museum® in Los Angeles, will give participating students an overview of the origins of gospel music, discuss important artists and explore the unique elements of gospel that have inspired the sound of other American musical genres. Featured performers from the evening event will share their experiences and answer student questions about the music and entertainment world. Students will participate from 24 schools across the country: Los Angeles and Oakland, CA; Kahuku and Waipahu, HI; Sandy Spring, MD; Cleveland, MS; Asbury Park and West Long Branch, NJ; Somers, NY; Memphis, TN; Falls Church, VA.
''The Gospel Tradition: In Performance at the White House'' will be the fourteenth such program during President Barack Obama's administration. From February 2009 to the most recent broadcast in November 2014, these ''In Performance at the White House'' events have honored the musical genius of Stevie Wonder, Sir Paul McCartney, Burt Bacharach, Hal David and Carole King; celebrated Hispanic musical heritage during Hispanic Heritage Month; marked Black History Month with events featuring the music of Motown, Memphis Soul, the Blues, and from the Civil Rights Movement; explored the rich roots of Country music; and spotlighted Broadway and the unique spirit of the American musical.
GE prepared to exit the bulk of GE Capital - MarketWatch
Sat, 11 Apr 2015 20:15
General Electric Co. has decided it no longer needs to be a bank.
In the conglomerate's most significant strategic move in years, GE GE, +10.80% has resolved to part ways with the bulk of GE Capital, the giant finance business that long accounted for around half the company's profits but whose risks have rattled investors and weighed on its stock.
GE said it will hang on to its aircraft leasing operations, as well as financing for the energy and health-care industries--smaller lending lines that support its core industrial operations. But the bulk of the $500 billion behemoth will be sold or spun off over the next two years, as the company concludes the benefits aren't worth bearing the regulatory burdens and investor discontent.
To punctuate its intentions, the company has agreed to sell $26.5 billion worth of office buildings and commercial real estate debt to Blackstone Group LP, Wells Fargo & Co. and other buyers. That follows plans to spin off its private label credit cards and retail finance businesses as a separate company called Synchrony Financial.
The timing of exits from other large lending businesses wasn't clear and could be drawn out.
The shift is Chief Executive Jeff Immelt's boldest attempt yet to address a major investor complaint that has kept GE's stock trapped below $30 and has blemished his 13-year tenure at the helm.
An expanded version of this report appears at WSJ.com.
AIIB, BRICS Development Bank and an Emerging World | New Eastern Outlook
Sat, 11 Apr 2015 20:00
Germany is a founding member as France. So is Luxemburg, even Great Britain. Putin's Russia and India are also among the founders. To the surprise of many, so is the International Monetary Fund (IMF), an institution that until now has been a pillar of the dollar system. We are talking about China's Asian Infrastructure Investment Bank or AIIB. The question is whether the AIIB is on its way to become the seed crystal of a new monetary order that could replace the destructive influence of the dollar? Or will it be infected by Trojans like the UK and the IMF? The answer could well shape the architecture of a new world in which the dollar and its bloated debt structures no longer dictate to the entire world what their economic policies shall be.
In October 2014, China announced it was creating a new international bank to finance major infrastructure projects across Asia. The prime driver for China was to finance their New Silk Road high-speed Eurasian rail and also sea infrastructure projects and the refusal of the United States to agree to major IMF voting reform that would give China and other emerging economic nations more say. Beijing announced they will give $50 billion to start the new bank. At the time, Washington and most of the rest of the world ignored the bank, while the Obama Administration attacked the AIIB for possibly lacking transparency or sufficient concern for environmental risks, patent diversions from the reality, namely, that the AIIB represents a strategic threat to continued American global dollar hegemony.
Washington's well-aimed shot in the foot
The Obama Administration, by fiercely opposing it when the UK, Australia, Japan and other core US allies indicated interest in joining the AIIB, now have royally shot themselves in both feet. Today, as of the March 31 deadline, more than 40 nations have joined with China's new banks as Founding Members. The bank now threatens to rival the IMF, World Bank and the related Asian Development Bank as a long-term creditor able to attract capital to major infrastructure investment across Eurasia and perhaps beyond. Those three public banks are all derived from the US' postwar Bretton Woods Treaty and all three are controlled tightly by Washington to the advantage of the dollar and of US interests.
Now it's not as if China is sneaking behind the back of their dear friends in Washington. In 2010 China, Brazil and other fast-developing countries won an agreement on reform of the IMF that would have doubled the funds available to the IMF in return for a greater voting weight for countries such as China, Russia, India and Brazil and other economies which were not even on the map in 1944 in terms of relative economic size. The proposal won 77% of the share votes of all IMF member countries.
The 2010 IMF voting rights reform stipulated that China will become the 3rd largest member country in the IMF, and there will be four emerging economies'--Brazil, China, India, and Russia'--among the 10 largest shareholders in the Fund. Under present rules, Washington, conveniently holds 16.75%, a veto minority. Close US geopolitical allies'--Japan with 6.23%, UK and France each with 4.29% and Germany with 5.81% would typically insure that IMF policies in any area were ''friendly'' to American defined national interests.
China, Russia, India, Brazil and other fast-emerging economies find it is manifestly absurd that today IMF voting rights on the Executive Board give France, with a $3 trillion GDP, far more votes than China with a 2014 GDP of more than three times that, at $10 trillion, or gives Belgium (1.86%) with a $500 billion GDP a larger voting share than Brazil (1.72%) with a GDP more than four times as large at $2.2 trillion. According to the IMF bylaws, a member country's voting shares ought to be roughly proportional to its relative size among the 147 IMF member countries in terms of GDP. When Washington drew up the IMF bylaws in 1944 it stipulated, conveniently, that no major decision of the IMF could come into force unless it had 85% of all member voting shares supporting it.
Washington is holding on like a pit bull to the old bylaws in which the US retains a blocking veto share of votes. The US Congress refuses to pass the IMF reforms and to break the impasse. This is a major way forced China and the other fast-growing BRICS states to look outside the IMF and World Bank and build an entirely new architecture. The AIIB today is emerging rapidly as a centerpiece in this emerging new global architecture.
Rather than trying to influence the new AIIB from within, Washington has chosen a tactic that has delivered it a huge and humiliating geopolitical defeat, and which will likely exclude US corporations from lucrative construction bids.
US foreign policy under Obama, as it was under George W. Bush, is being run by a gaggle of neo-conservative ideologues who seem incapable of flexible response. For them anything China does is ''bad'' and must be opposed with all US might.
China for those Washington people is the emerging global challenger to US military power, so Obama imposes an ''Asia Pivot'' military strategy to encircle and anger Beijing. China's economic and financial influence threatens the dollar system so that too must be opposed. The BRICS threatens to become independent of Washington control as vassal states, so BRICS states must be ''taught a lesson'' as Washington recently attempted with its usual Color Revolution organized opposition protests against pro-BRICS president Dilma Rousseff in hopes of installing a US-friendly free market alternative.
The problem for Washington is that none of this is working as it used to. And Washington sees the desertion of her closest ''allies'' to join China's AIIB. One is reminded of the statement by England's Prime Minister Lord Palmerston, ''England has no friends, merely her interests.''
The new architecture emerging
Not only are Russia, Brazil, India, in the AIIB founders list'--four of the five BRICS'--as well Australia, New Zealand, Indonesia, Pakistan, Philippines, Vietnam'--countries the Obama Administration is relying on to join the military Asia Pivot against China, have all decided to join with China in her new bank. Even Taiwan has applied to join under the name Chinese Taipei.
And in a further devastating for the image of Washington and perhaps for the future of its domination of the IMF and World Bank, was the fact that five of the Group of Seven large western industrial countries'--Italy, France, Germany, UK and even Japan looks likely to join. In all more than forty nations have applied to become founding members.
''Money talks and nobody walks,'' as the crazy radio jingle during the 1960's aired by Rock 'n Roll DJ Charlie Greer on the popular WABC Top 40 New York radio station, on behalf of Dennison's Clothing Store put it. China has the money, and nobody, except the USA, is walking away from that it seems.
The rush to get in on the China-backed Asian Infrastructure Investment Bank by all these countries including the largest EU members is the realization that Asia and Eurasia is where the economic future of the planet will be made or broken. The USA and Canadian economies are choking in unpayable debts, rotting infrastructure and rustbelt industrial ghost towns like Detroit or Pittsburgh. America is no longer the magnet that all others are drawn to for trade. The country is bust, its government economic figures a bodyguard of lies, its true unemployment at Great Depression levels of 23.2% according to John Williams' Shadow Government Statistics.
China is in a pivotal position to found such a new bank to finance transnational large infrastructure such as the New Silk Road trans-Eurasian high-speed railway that Russia is in the process of connecting with. There will emerge large demand for construction of infrastructure in terms of electric power facilities, highways across Eurasia and Asia. Economic infrastructure is on the drawing boards ultimately linking South Korea to the vast Chinese economy via North Korea.
The infrastructure gap across Asia and Eurasia is enough to spur global industrial growth for decades. The Asian Development Bank (ADB) estimates Asia will need $8 trillion over the next decade for energy, transportation, telecommunication and water/sanitation. Now private investment in infrastructure runs a mere $13 billion a year, most in low-risk projects. Official development assistance adds another $11 billion a year. That means a shortfall exceeding $700 billion a year.
By refusing to join and trying to stop the AIIB Washington in effect stands opposed to Asian regional investments that will expand trade, support financial market development and macroeconomic stability, and improve environmental, health and social conditions. Instead all Washington has to offer is the silly Trans-Pacific Partnership for US-friendly free trade deals that would allow Monsanto and other US corporations to override Asian national laws in pursuit of profit.
The very fact that the AIIB has gathered such worldwide support is demonstration of the impotence of the US-dominated Bretton Woods institutions of the World Bank, IMF and Asian Development Bank.
And a new BRICS Bank
The Asian Infrastructure Investment Bank is but one new initiative by the world's emerging economies.
At the 2014 BRICS summit in Fortaleza, Brazil, they five heads of state declared bluntly, ''We remain disappointed and seriously concerned with the current non-implementation of the 2010 International Monetary Fund reforms, which negatively impacts on the IMF's legitimacy, credibility and effectiveness.'' Collectively, BRICS account for nearly $16 trillion in GDP and 40% of the world's population, nothing to be lightly disregarded as a group of banana republics as some policymakers in Washington evidently still see them. They haven't had their eyes checked since 1944 apparently.
The New Development Bank as it is formally called, or informally the BRICS Development Bank will be headquartered in Shanghai, China's fast-emerging world financial hub. It will open for business with a $100 billion dollar liquidity reserve to defend against possible currency wars as Washington and Wall Street launched in 1997 to destroy the then-booming Asian Tiger economies led by South Korea, Malaysia and Indonesia. The New Bank will also have an initial $50 billion in capital, each BRICS country contributing $10 billion, with the agreed option to rise to $100 billion for financing BRICS infrastructure projects.
The NDB charter specified its membership will be open to all United Nations member states. However, and this is crucial, the five founding BRICS capital share must never fall below 55 percent, and a non-founding member may never increase above 7 percent. In short The BRICS bank will be managed by governments who share deep dissatisfaction with the Washington-controlled Bretton-Woods institutions.
The combination of the two new infrastructure banks poses the greatest threat to the US dollar system and its control of world financial flows since 1944.iv It is this threat that is driving the rudderless foreign policy agenda of Washington. Peace and cooperation is a far more useful way to resolve affairs among civilized nations.
F. William Engdahl is strategic risk consultant and lecturer, he holds a degree in politics from Princeton University and is a best-selling author on oil and geopolitics, exclusively for the online magazine ''New Eastern Outlook''.
36(b)(1) Arms Sales Notification
Fri, 10 Apr 2015 02:34
Ms. B. English, DSCA/DBO/CFM, (703) 601-3740.
The following is a copy of a letter to the Speaker of the House of Representatives, Transmittals 15-12 with attached transmittal, policy justification, and Sensitivity of Technology.
Dated: April 6, 2015.
Aaron Siegel,
Alternate OSD Federal Register Liaison Officer, Department of Defense.
BILLING CODE 5001-06-P
BILLING CODE 5001-06-C
Transmittal No. 15-12Notice of Proposed Issuance of Letter of Offer Pursuant to Section 36(b)(1) of the Arms Export Control Act, as amended(i) Prospective Purchaser: Republic of Korea.
(ii) Total Estimated Value:
Major Defense Equipment$81 millionOther$ 0 millionTOTAL$81 million(iii) Description and Quantity or Quantities of Articles or Services under Consideration for Purchase: 400 AGM-114R1 Hellfire II Semi-Active Laser Missiles with containers, 100 ATM-114Q Air Training Missiles, and 12 M36E8 Hellfire II Captive Air Training Missiles.
(iv) Military Department: Army (ZCF, Amendment #3)
(v) Prior Related Cases, if any: FMS case ZCF-$1.6B-2May13
(vi) Sales Commission, Fee, etc., Paid, Offered, or Agreed to be Paid: None
(vii) Sensitivity of Technology Contained in the Defense Article or Defense Services Proposed to be Sold: See Attached Annex
(viii) Date Report Delivered to Congress: 30 March 2015
* as defined in Section 47(6) of the Arms Export Control Act
Policy JustificationKorea'--AGM-114R1 Hellfire MissilesThe Republic of Korea (ROK) has requested a possible sale of 400 AGM-114R1 Hellfire II Semi-Active Laser Missiles with containers, 100 ATM-114Q Air Training Missiles, and 12 M36E8 Hellfire II Captive Air Training Missiles. The estimated cost is $81 million.
This proposed sale will contribute to the foreign policy and national security objectives of the United States by meeting the legitimate security and defense needs of an ally and partner nation. The ROK is one of the major political and economic powers in East Asia and the Western Pacific and a key partner of the United States in ensuring peace and stability in that region. It is vital to the U.S. national interest to assist our Korean ally in developing and maintaining a strong and ready self-defense capability.
The ROK intends to use these Hellfire missiles to supplement its existing missile capability and current weapon inventory. This sale will contribute to the ROK's force modernization goals and enhance interoperability with U.S. forces. The ROK will use this enhanced capability to strengthen its homeland defense and deter regional threats. The ROK is capable of absorbing and maintaining these missiles in its inventory.
The proposed sale of this equipment and support will not alter the basic military balance in the region.
The principal contractor will be Lockheed Martin Corporation in Orlando, Florida. There are no known offset agreements in connection with this potential sale.
Implementation of this proposed sale will not require any additional U.S. Government or U.S. contractor personnel in Korea.
There will be no adverse impact on U.S. defense readiness as a result of this proposed sale.
Transmittal No. 15-12Notice of Proposed Issuance of Letter of Offer Pursuant to Section 36(b)(1) of the Arms Export Control Act, as amendedAnnexItem No. vii(vii) Sensitivity of Technology:
1. The AGM-114R Hellfire II Air-to-Ground Missile with container is used against heavy and light armored targets, thin skinned vehicles, urban structures, bunkers, caves and personnel. The missile is Inertial Measurement Unit (IMU) based, with a variable delay fuse, improved safety and reliability. The highest level of classified information that could be disclosed by a proposed sale or by testing of the end item is Secret; the highest level that must be disclosed for production, maintenance, or training is Confidential.
2. The ATM-114Q Air Training Missile with mass stimulant warhead replicates the shape, aerodynamic properties, weight, center-of-gravity, and moment-of-inertia properties of a Hellfire II missile. The practice missile can be launched in a training environment simulating a tactical engagement without destroying the target. The highest level of classified information that could be disclosed by a proposed sale or by testing of the end item is Secret; the highest level that must be disclosed for maintenance, or training is Confidential.
3. The M36E8 Captive Air Training Missile (CATM) consists of a functional guidance section coupled to an inert missile bus and is used for flight training but cannot be launched. The missile has an operational semi-active laser seeker that can search for and lock-on to laser-designated targets. The CATM functions as a tactical missile (without launch capability) during captive carry on the aircraft, making it suitable for training the aircrew in simulated Hellfire missile target acquisition and lock. The highest level of classified information that could be disclosed by a proposed sale or by testing of the end item is Secret; the highest level that must be disclosed for production, maintenance, or training is Confidential.
4. If a technologically advanced adversary were to obtain knowledge of the specific hardware and software elements, the information could be used to develop countermeasures or equivalent systems which might reduce weapon system effectiveness or be used in the development of a system with similar or advanced capabilities.
5. A determination has been made that the recipient country can provide the same degree of protection for the sensitive technology being released as the U.S. Government. This sale is necessary in furtherance of the U.S. foreign policy and national security objectives outlined in the Policy Justification.
6. All defense articles and services listed in this transmittal have been authorized for release and export to the Republic of Korea.
[FR Doc. 2015-08166 Filed 4-8-15; 8:45 am]
BILLING CODE 5001-06-P
US approves sale of missiles to Egypt
Sat, 11 Apr 2015 19:44
A US Air Force MQ-9 Reaper armed with laser-guided munitions and Hellfire missiles [AP]
A reported blog by the Washington DC staff of Al Jazeera English.
The US State Department has approved the first new sale of weapons to Egypt since the White House lifted a freeze on military sales to the country.
Egypt requested 356 AGM-114K/R3 Hellfire II Missiles, worth an estimated $57 million.
On March 31 the Obama administration ended the ban on military sales put in place following the 2013 overthrow of the democratically elected government of Mohamed Morsi.
In practice that ban only stopped the delivery of big-ticket items like tanks and jets, as most equipment and spare parts continued to flow to Egypt under the new government of President Abdel Fattah el-Sisi.
The approval for the Hellfire missiles also comes as Egypt begins participating in airstrikes against the Houthis in Yemen.
The US is providing logistics and equipment in the fight, and on Tuesday in Riyadh, Deputy Secretary of State Antony Blinken said the US would expedite delivery of weapons to the Saudi-led coalition.
The approval announcement, posted on the Defense Security Cooperation Agency website, says the ''proposed sale will contribute to the foreign policy and national security of the United States by helping to improve the security of a friendly country that has been and continues to be an important force for political stability and economic progress in the Middle East''.
Gay orgies and murder: Vatican embroiled in double scandal -- Society's Child -- Sott.net
Sat, 11 Apr 2015 19:43
The Vatican has been embroiled in two separate, highly embarrassing, scandals.In one, a north Italian priest has been removed from office after allegations emerged that he had been surfing the internet to find gay lovers and had been involved in gay orgies.
The other, which has generated - if possible - even more lurid press coverage in Italy, alleges a priest in the south of the country is under investigation on suspicion of murdering one of his parishioners.
Father Gratien Alabi, from the Democratic Republic of Congo, is under investigation for murder following the discovery of female bones under the flagstones of an ancient mountain chapel.
The bones are anticipated to belong to Guerrina Piscaglia, 50, who disappeared from nearby Arezzo in Tuscany last year, The Times reported.
The case has generated intense media interest, with some papers claiming that Father Alabi had engaged in an affair with the woman, a parishioner of his and another priest's church, and fathered a child with her.
Father Alabi has denied all claims, protesting his innocence.
Meanwhile, to the north of the country, the local Curia is scrambling to address the allegations made by a 32-year-old man from Rovigo, midway between Bologna and Venice.
The unidentified man apparently approached the media after church authorities failed to take action following his official complaint to the Ecclesiastical Court of the Puglia region against the unidentified 50-year-old priest.
The younger man claimed he met the priest through Facebook, forming a close friendship with the clerical figure who then confessed his homosexuality to his online correspondent.
In his complaint, according to Italian newspaper Corriere del Mezzogiorno, the man included a record of his conversations with the priest.
In these online interactions, the priest admitted to sexual relationships with other religious figures - as well as members of the Vatican's elite Swiss Guard - using the internet to find new partners and engage in sexual encounters online.
Following the involvement of Archbishop of Taranto Filippo Santoro, the individual involved was immediately removed from office, once the "reliability of the facts" had been established.
He added that the allegations included behaviour that was "absolutely incompatible with the priestly ministry".
"Needless to say, the feelings of the archbishop and the Curia are those of the regret and dismay," a Vatican spokesperson told the Italian newspaper.
A New Method to Deal With Would-Be Terrorists | RealClearDefense
Sat, 11 Apr 2015 16:09
Since the shock of 9/11, the FBI and other policing agencies have shifted how they deal with terrorism. Instead of seeking to bring terrorists to justice after they have committed, or tried to commit, violence, the police now seek to catch them before they can do so.
This has led to the development of a technique where, instead of simply surveilling a potential terrorist plot, they infiltrate police operatives into the plot itself, essentially creating or facilitating the plots in a major way.
Since 9/11, a few dozen plots have come to light in which Islamist extremist terrorists have sought, or appear to have sought, to do damage in the United States. More than half of these have been disrupted by this technique, and the use of the technique is on the rise. Since 2010, some 19 plots have been disrupted, and 14 of these have used undercover operatives'--as seen most recently with the arrest last week of two female would-be terrorists who were seeking to fabricate bombs in Queens, New York. In most of these plots, police operatives have outnumbered actual would-be terrorists.
The question is whether the (mostly knuckle-headed) would-be terrorists in these cases would have been able to get their act together enough to do much of anything. Indeed, at times it seems to be an exercise in dueling delusions: A Muslim hothead has delusions about changing the world by blowing something up, and the authorities have delusions that he might actually be able to overcome his patent inadequacies to do so.
This is a question that was vividly raised by the judge in a case in Newburgh, New York, that has inspired an excellent documentary film, The Newburg Sting (which will be the subject of an event at the Cato Institute on Monday, April 13). While acknowledging that the men were ''prepared to do real violence,'' she also noted that they were ''utterly inept'' and on a ''fantasy terror operation'' and that ''only the government could have made a 'terrorist''' out of the plot's leader, ''whose buffoonery is positively Shakespearean in its scope.'' The judge also said, ''I believe beyond a shadow of a doubt that there would have been no crime here except the government instigated it, planned it and brought it to fruition.''
The experience with another case can be taken to suggest that there could be an alternative, and far less costly, approach to dealing with would-be terrorists, one that might generally (but not always) be effective at stopping them without actually having to jail them.
It involves a hothead in Virginia who ranted about jihad on Facebook, bragging about how ''we dropped the twin towers.'' He then told a correspondent in New Orleans that he was going to bomb the Washington, D.C. Metro the next day. Not wanting to take any chances and not having the time to insinuate an informant, the FBI arrested him. Not surprisingly, they found no bomb materials in his possession. Since irresponsible bloviating is not illegal (if it were, Washington would quickly become severely underpopulated), the police could only charge him with a minor crime '' making an interstate threat. He received only a good scare, a penalty of time served and two years of supervised release.
That approach seems to have worked: the guy seems never to have been heard from again. It resembles the Secret Service's response when they get a tip that someone has ranted about killing the president. They do not insinuate an encouraging informant into the ranter's company to eventually offer crucial, if bogus, facilitating assistance to the assassination plot. Instead, they pay the person a Meaningful Visit and find that this works rather well as a dissuasion device. Also, in the event of a presidential trip to the ranter's vicinity, the ranter is visited again. It seems entirely possible that this approach could productively be applied more widely in terrorism cases. Ranting about killing the president may be about as predictive of violent action as ranting about the virtues of terrorism to deal with a political grievance. The terrorism cases are populated by many such ranters'--indeed, tips about their railing have frequently led to FBI involvement. It seems likely, as apparently happened in the Metro case, that the ranter could often be productively deflected by an open visit from the police indicating that they are on to him. By contrast, sending in a paid operative to worm his way into the ranter's confidence may have the opposite result, encouraging, even gulling, him toward violence.
Terrorism specialist John Horgan has studied people once disposed to committing terrorism who later walked away from it. Hepoints outthat this happens all the time, and that it does not require them necessarily to change their fundamental views. They may well remain deeply religious and/or deeply outraged at what they see as an attack on their religion or on their co-religionists in the Middle East. But neither emotion, Horgan observes, is ''an operationally useful predictor of terrorist behavior." A sobering visit by the police may not change beliefs, but in many instances it might productively deflate enthusiasm for using terrorism to express them.
Ernest Moniz - Wikipedia, the free encyclopedia
Sat, 11 Apr 2015 03:07
Early life and educationEditMoniz joined the faculty of the Massachusetts Institute of Technology (MIT) in 1973, serving as Head of the Department of Physics from 1991 to 1995 and as Director of the Bates Linear Accelerator Center.[8] He also co-chairs the MIT research council. He served in the Clinton administration as Associate Director for Science in the Office of Science and Technology Policy in the Executive Office of the President from 1995 to 1997.[9] Moniz also worked in the United States Department of Energy, serving as Under Secretary of Energy from 1997 to 2001.[10] Moniz is also one of the founding members of The Cyprus Institute, wherein he and other scholars undertook the coordination, research and planning of the project. In 2013, he received the title of Doctor Honoris Causa from the Universidad Pontificia Comillas de Madrid as a recognition of his research on Energy policies and technologies. [11]
U.S. Secretary of Energy (2013''present)EditMoniz was nominated by President Obama to be the next United States Secretary of Energy. On May 16, 2013, his appointment was confirmed on a 97''0 vote by the Senate.[3] He succeeded Steven Chu as Secretary of Energy. Moniz was sworn in as Energy Secretary on May 21, 2013 by Deputy Energy Secretary Daniel Poneman.
For President Obama's 2014 State of the Union Address, Moniz served as the designated survivor.[12]
Secretary Moniz has played a crucial role in negotiations toward a comprehensive agreement on the Iranian nuclear program, directly negotiating technical details with the Iranian atomic energy minister Ali Akbar Salehi, an MIT graduate, and reassuring President Obama that concessions important to the Iranians would not pose a major threat.[13]
ReferencesEdit^Massachusetts Institute of Technology. "Faculty & Teaching Staff". MIT Engineering Systems Division. Retrieved February 24, 2013. ^President Obama Nominates Candidates for Energy and Environmental Team March 4, 2013 PBS NewsHour^ abWeiner, Rachel (16 May 2013). "Ernest Moniz confirmed as Energy secretary". The Washington Post. Retrieved 16 May 2013. ^"Obama to name Fall River Native to head Energy Department". ojornal.com. 2013. Retrieved March 5, 2013. ^Carol Lee Costa-Crowell, Lurdes da Silva (August 6, 1997). "Durfee grad nominated to energy post". southcoasttoday.com. Retrieved February 24, 2013. ^Energy (2013). "Department of Energy "About Us"". energy.gov. Retrieved December 12, 2013. ^"Events GCEP Research Symposium 2005 Keynote Speakers Prof. Freeman Dyson Prof. Ernest Moniz Prof. David Victor". stanford.edu. 2005. Retrieved February 24, 2013. ^"ernest moniz Professor of Physics and Cecil and Ida Green Distinguished Professor Co-Director of the Laboratory for Energy and the Environment". mit.edu. Retrieved February 24, 2013. ^David J. Unger (February 11, 2013). "Will Ernest Moniz be the next Energy secretary?". Christian Science Monitor. Retrieved February 24, 2013. ^Niraj Chokshi (February 21, 2013). "Who Is Ernest Moniz, Obama's Likely Pick for Energy Secretary?". nationaljournal.com. Retrieved February 24, 2013. ^"Ernest Moniz, Ministro de Energ­a de EE.UU., nuevo doctor honoris causa por Comillas". comillas.edu. 2013. Retrieved April 5, 2015. ^Miller, Zeke J. (January 28, 2014). "This Man Will Be Your President If The Worst Happens: Energy Secretary Ernest Moniz is tonight's 'designated survivor'". Time. Retrieved January 30, 2014. ^"An Iran Nuclear Deal Built on Coffee, All-Nighters and Compromise". New York Times. External linksEditPersondataNameMoniz, ErnestAlternative namesShort descriptionAmerican nuclear physicistDate of birthDecember 22, 1944Place of birthFall River, Massachusetts, U.S.Date of deathPlace of death
VIDEO-CLIPS-DOCS
VIDEO-A-10 Warthog in Action - YouTube
Sun, 12 Apr 2015 05:08
VIDEO-Post's comments send chill through Air Force ranks, A-10 panics ISIS | Arizona Daily Independent
Sun, 12 Apr 2015 05:01
This week, as the A-10 created panic in the Middle East, Major General James Post, Vice Commander of Air Combat Command, sent fear through the ranks of the United States Air Force.
At the same time IraqiNews.com reported on a local source in Nineveh province who said that ''the 'Wild Boar' aircraft which belongs to the U.S. Air Force has carried out four air strikes that killed and wounded dozens of ISIS elements, adding that the aircraft sparked panic in the ranks of ISIS, USAF officers were being told by Post, ''if anyone accuses me of saying this, I will deny it . . . anyone who is passing information to Congress about A-10 capabilities is committing treason.''
Latest news'....Post's Comments Generate Calls for Congressional Hearing
According to multiple sources, Post claimed that the Air Force doesn't want to scrap the A-10, but has little choice in the matter. According to popular Air Force blog, John Q. Public, Post attempted to marginalize A-10 supporters by accusing them of ''reacting emotionally'' and ''undercutting the CSAF's message'' of committing treason.
Post's reference to ''passing information to Congress'' appears to be in violation of 10 U.S. Code § 1034 '' Protected communications; prohibition of retaliatory personnel. The Code provides that ''No person may restrict a member of the armed forces in communicating with a Member of Congress or an Inspector General.''
In response to questions about the General's statement, an Air Combat Command spokesperson told the ADI today:
''The general's use of hyperbole in his comments during a recent discussion with attendees at a Tactics Review Board at Nellis were intended to communicate a serious point: the Air Force decision on recommended actions/strategic choices for the constrained fiscal environment has been made and the service's position communicated.''
While subsequent government debate will continue at the highest levels as those recommendations and other options are evaluated, our job as Airmen is to continue to execute our mission and duties''certainly our role as individual military members is not to engage in public debate or advocacy for policy.''
At their core, the general's comments recognize Air Combat Command's responsibility to organize, train, and equip the best Combat Air Force in the world while preparing for tomorrow's challenges. He called on Airmen to support decisions made to that end''first by the Air Force and ultimately, if approved, by our civilian government leadership.''
Sources say that Post's statements did not appear to be hyperbolic at all. The general stated clearly, and the spokesperson's statement confirms the conference attendees' impression; if they speak to members of Congress they are viewed and will be treated as traitors in contravention to 10 U.S. Code § 1034.
As the Air Force continues to maneuvers to scrap the A-10 while its pilots continue to maneuver over ISIS, the effects of Post's comments are particularly disturbing to many involved in both the fight oversees and the fight here at home.
''This is a continuation of the party line that anyone who disagrees with CSAF's choices is reacting emotionally. It's a tactic to trivialize opponents, now complete with a traitor label heaped on top,'' notes the John Q. Public report. ''This is a big deal if it's true. Generals hold the power to destroy lives and ruin careers. If speaking against your chain of command is considered treasonous by senior leadership, we should be concerned about the abuse of power to hound the perceived traitors.''
Airmen and other A-10 supporters have been reaching out the Congress and their efforts have paid off through the actions of former Congressman Ron Barber of Arizona, and senators Kelly Ayotte (New Hampshire) and John McCain (Arizona). The three fought for and won funding for the low and slow flying plane that is currently terrorizing the ISIS terrorists.
That fight continues though, and Post's comments appear to be the desperate act of leadership that has used every under handed trick in the book and must resort to tactics prohibited by federal law.
According to Defense News, at the semi-annual ''State of the Air Force'' event, ''Secretary Deborah Lee James and Air Force Chief of Staff Gen. Mark Welsh confirmed they will move forward with plans to retire fleets despite strong pushback from Congress over the A-10 Warthog and, to a lesser extent, the U-2 spy plane and KC-10 tanker.
Defense News reports, ''When the budget was first being developed, the threat from the Islamic State had not emerged. Since then, the Air Force has been locked into a long, constant air campaign, one in which James said the service has flown 60 percent of the 16,000-plus sorties over Iraq and Syria.'' Yet, James said the development has not changed leadership's mind about the need to retire the older system as a cost-saving measure, according to Defense News.
According to the Defense News article, when asked if she had any regrets about trying to retire the plane, James was direct: ''No, I do not.'' The article notes that the ''fight over the A-10 has been particularly brutal for the service, opening up a trust gap between the Hill and the Air Force.''
The trust gap now exists between the troops and leadership as well.
The author of the John Q. Public article wrote, ''I don't expect a straight answer from ACC/PA on this.'' However, the spokesperson did provide a clear answer; ''our role as individual military members is not to engage in public debate or advocacy for policy.'' The message was clear: step out of line '' speak to your elected representatives and you are a traitor.
Many supporters of the A-10 hope that John Q. Public's message that to lawmakers is heard one way or another: ''I do encourage members of the House and Senate Armed Services Committees to take an interest in this reported comment, and encourage them to investigate,'' he wrote.
What the A-10 supporters want the members of the House and Senate Armed Services Committees to hear is what they are seeing firsthand overseas. They mean no disrespect, but they know that the USAF generals are wrong. The people on the ground see and feel the difference the Wild Boar makes on foreign ground. They do not want to contradict the generals '' they want nothing more than to support the generals '' they simply want the generals to fight the right fight '' the one for the lives of our men and women on the ground, who are taking on the most horrific evil we could ever imagine.
Here is what they want Congress to know:
Related articles:
JTAC on A 10: ''the sound of don't mess with me''
A-10 in play as Senate Appropriations Committee drafts FY 2015 NDAA
Ayotte: If the Air Force cut their acquisition failures they could save the A-10
Wooten & A-10 legend to host town halls
Air Force brass taken to task for A-10 mothball plans
Army Vice Chief of Staff says A-10 is a ''game changer''
Flake drops A-10 bomb on constituents
VIDEO-Weekly Address: Tuition-Free Community College | The White House
Sun, 12 Apr 2015 03:05
April 10, 2015 | 5:21 | Public Domain
In this week's address, the Vice President laid out his and the President's plan to make two years of community college free for responsible students.
Download mp4 (198MB) | mp3 (12MB)
VIDEO-Ex-CIA operative: Zero chance Tsarnaevs acted alone - CNN Video
Sun, 12 Apr 2015 00:05
');jQuery(owl._items[0]).find('.media__icon').remove();}}function currentVideoCollectionContainsId (currentVideoId) {var nextVideoIndex = 0,vidObj,i;if (jQuery.isArray(currentVideoCollection) && currentVideoCollection.length > 0) {for (i = 0; i 0) {for (i = 0; i 0) {nextPlay = currentVideoCollection[getNextVideoIndex(currentVideoId)].videoUrl;if (nextPlay === undefined || nextPlay === null) {nextPlay = currentVideoCollection[0].videoUrl;}moveToNextTimeout = setTimeout(function () {location.href = nextPlay;}, nextVideoPlayTimeout);}}callbackObj = {onAdPlay: function (containerId, cvpId, token, mode, id, duration, blockId, adType) {clearTimeout(moveToNextTimeout);},onCVPReady: function (containerId, cvpId, event) {setCarouselDisplayIndex();},onContentPlay: function (containerId, cvpId, contentId) {clearTimeout(moveToNextTimeout);setNowPlaying(contentId);var idx,cvp = containerId && window.cnnVideoManager.getPlayerByContainer(containerId).videoInstance.cvp || null,prevVideoId = (window.jsmd && window.jsmd.v && (window.jsmd.v.eVar18 || window.jsmd.v.eVar4)) || '';if (cvp && typeof cvp.reportAnalytics === 'function') {if (prevVideoId.length === 0 && document.referrer && document.referrer.search(/\/videos\//) >= 0) {prevVideoId = document.referrer.replace(/^(?:http|https)\:\/\/[^\/]\/videos\/(.+\.\w+)(?:\/video\/playlists\/.*)?$/, '/video/$1');if (prevVideoId === document.referrer) {prevVideoId = '';}}if (jQuery.isArray(currentVideoCollection) && currentVideoCollection.length > 0) {idx = getNextVideoIndex(contentId);nextVideoId = currentVideoCollection[idx].videoId;nextVideoUrl = currentVideoCollection[idx].videoUrl;currentVideoCollectionId = (window.jsmd && window.jsmd.v && window.jsmd.v.eVar60) || nextVideoUrl.replace(/^.+\/video\/playlists\/(.+)\//, '$1');}cvp.reportAnalytics('videoPageData', {videoCollection: currentVideoCollectionId,videoBranding: CNN.omniture.branding_content_page,templateType: CNN.omniture.template_type,nextVideo: nextVideoId,previousVideo: prevVideoId,referrerType: '',referrerUrl: document.referrer});}},onContentMetadata: function (containerId, playerId, metadata, contentId, duration, width, height) {if (typeof metadata !== 'undefined') {embedLinkHandler.show(JSON.parse(metadata));}},onContentBegin: function (containerId, cvpId, contentId) {clearTimeout(moveToNextTimeout);try {embedLinkHandler.hide();}catch (error) {}},onContentComplete: function (containerId, cvpId, contentId) {navigateToNextVideo(contentId);},onContentEnd: function (containerId, cvpId, contentId) {navigateToNextVideo(contentId);}};if (typeof configObj.context === 'undefined' || configObj.context === null) {configObj.context = 'videos'.replace(/[\(\)-]/g, '');}if (CNN.VideoPlayer.apiInitialized) {window.cnnVideoManager.renderMultipleContainers({videoConfig:configObj, eventsCallback:callbackObj});} else {CNN.VideoPlayer.addVideo(configObj, callbackObj);}});Could the Tsarnaev brothers have built the bombs used in the Boston terror attack alone? CNN intelligence and security analyst Bob Baer says likely no.
AUDIO-Did The Pentagon Gay-Bomb America? | Right Wing Watch
Sat, 11 Apr 2015 23:28
Submitted by Brian Tashman on Friday, 4/10/2015 11:30 am
Yesterday on ''Washington Watch,'' the Family Research Council's Craig James fielded a call from a listener who wondered if the Pentagon had secretly used a ''gay bomb'' on America, leading to a rise in the number of openly gay people in the country today.
The caller noted that his theory '-- loosely based on an actual 1994 proposal floated by Air Force scientists for a ''hormone bomb'' that could ''turn enemy soldiers into homosexuals and make them more interested in sex than fighting'' '-- sounded ''off in left field.'' But he just had to ask if ''some of those same techniques got used on the American people.''
James said he never heard of the ''gay bomb'' and agreed that it's ''out there for sure,'' hastening to add that he believes the real reason America is even debating topics like homosexuality is because ''we've moved away from God's word in the Bible.''
AUDIO-Tips And 5 Recipes For Cooking With Kids | Here & Now
Sat, 11 Apr 2015 23:03
Teaching kids how to cook with vegetables is a great way to help them learn how to eat a healthy diet. (Jessica Lucia/Flickr)
Here & Now resident chef Kathy Gunst joins host Jeremy Hobson with five tips for cooking with young children. She also shares these five kid-friendly recipes:
Italian Vinaigrette (also called vinaigrette)Green Goddess DressingRanch DressingRoasted Cherry TomatoesRoasted ChickpeasSee more recipes and cooking segments with Kathy Gunst
Tips For Cooking With Kids(View/print a PDF of all the tips and recipes)
By Kathy Gunst
1. You can do this:
It's so much fun to watch kids light up being given a task they consider to be very ''grown up.'' Cooking helps empower kids to understand where food comes from, how it's made, and what goes into the cooking process. You are educating them in SO many ways. Cooking involves math, science, cooperation, community, common sense and art.
2. Choose a recipe:
Pick a recipe filled with vegetables to encourage healthy eating habits. (Kathy Gunst)
This is the fun part. What do kids like to eat? How can you stretch them a bit? How to choose something really simple, but still interesting. (Honestly, kids love to slice bananas.)
I would like to urge you to focus on fruit and vegetable-focused recipes. When I first started this program in 2010 it was motivated by Michelle Obama's Let's Move Initiative. The goal was to turn kids on to healthy cooking. Find out what's growing in your community. Is it kale season? Make chips. Apple season? Mash them up to make applesauce. Make a crumble with a granola topping. Get creative. Think local.
3. Tips for recipes ideas:
When I'm cooking with the really young children I always choose smoothies because they can't be screwed up and they are such a good lesson. You put fruit in blender. You press a button. You add liquid if it's too thick and more fruit if it's too thin. It's a lesson in balance. And I always use it to teach the principle of local food (apples and blueberries) versus exotic fruit that's flown in from far away (pineapple, bananas, mangoes). But you don't need to make smoothies. You need to think through a recipe and think about what it involves: is there a lot of chopping (a challenge sometimes with the really little kids)? Does it involves standing in front of a hot burner or oven? Choose a recipe that focuses on fruits and vegetables'--think dips, smoothies, salads, or even soups (all the prep happens at a safe table and can go into a pot and then simmered at the stove by an adult).
4. Get organized:
Once you have picked a recipe, go through it very carefully. You want to pick it apart: what equipment will you need? What will you stir with? Do you need a bowl? Do you need a knife? Do you need a burner? What will they chop on? Do you have a chopping board? Go through the recipe and ask yourself: How will that part of the recipe be accomplished? Spoon? Pot? Pan? Oven preheated?
5. Be realistic about what the kids can do:
Having children copy recipes while somethings cooks is a great way to keep them busy and helps them remember the recipe. (Kathy Gunst)
When I am working with third graders (and often second graders), I am assuming they have reading and writing skills. I am assuming that with the help of an adult they can read through a recipe and follow the instructions. I let them measure out quantities rather than pre-measuring ingredients for them (as I do with the younger kids who do not yet know how to read or write for the most part). Choose a recipe that will push the kids to learn new skills and use their skills. But be realistic.
You would be surprised how fast the kids work when they are focused and absorbed in the task. There is often down time between cooking tasks '' waiting for something to rise or bake or set. Think about activities you can do to entertain them while they are waiting for something to bake. They can and should clean up after themselves, but also I will have them write poems or draw pictures of the cooking process and write out the recipe in their own hand. Think about having paper and crayons on hand for this waiting time.
Italian Dressing (also called vinaigrette)Mix 2 tablespoons mustard with salt and pepper.
Add 1/4 cup chopped chives.
Add 2/3 cup red or white wine vinegar.
Whisk in 1 1/2 cups olive oil and whisk together.
Taste and add more salt, pepper or oil if needed.
Place in a jar, cover and keep in the refrigerator.
Green Goddess DressingDressings are easy recipes for kids, and they pair nicely with healthy greens. (Kathy Gunst)
In a blender, add 3 tablespoons chopped basil, 1/2 cup chopped chives, 1/4 cup chopped fresh dill, 6 chopped scallions and 1/2 cup parsley. Blend.
Add 1 cup yogurt to the blender, 4 tablespoons lemon juice, 4 tablespoons wine vinegar and 1 cup olive oil. Blend.
Add salt, pepper and more lemon and oil if needed.
Place in a glass container or jar and refrigerate.
Ranch DressingWhisk 1 1/2 cups mayonnaise, 1 cup buttermilk in a bowl.
Add 4 tablespoons finely chopped parsley, 4 tablespoons chopped celery (leaves and celery stalk), 3 tablespoons lemon juice, 3 tablespoons mustard and 1 1/2 teaspoons onion powder. Add 2 tablespoons chopped fresh dill.
Taste for seasoning and add salt and pepper. Cover and refrigerate.
Roasted Cherry TomatoesWe always have tons of sweet cherry tomatoes at the beginning of the school year. We like to roast them at a low temperature for about an hour until they become soft and tender and sweet as candy. Can be served on salads or as a snack or the basis of a pasta sauce.
Ingredients:4 cups yellow and red cherry tomatoes1/4 cup olive oilSalt and freshly ground black pepper1/2 cup fresh basil, cut into thin ribbon like slices1/4 chopped fresh parsley
Instructions:Preheat the oven to 275 degrees.
Place the tomatoes on a large baking sheet and toss the tomatoes, oil, salt, pepper, basil and parsley.
Bake on the middle shelf for about an hour or until soft and tender and almost bursting.
Roasted ChickpeasChickpeas are a great source of protein and an easy side dish for kids to make. (Kathy Gunst)
Line a large baking sheet with a sheet of parchment paper or foil.
Add 3 cups of chickpeas.
Sprinkle on about 1/4 cup olive oil or enough to really coat all the chickpeas.
Add salt, pepper, about 3 tablespoons chopped fresh thyme, and 3 tablespoons Za'tar spice mixture. Toss all the chicken peas so they are all thoroughly coated in spices and oil.
Bake in a preheated 350 degree oven for about 10 minutes, or until they pop and look crisp.
*Za'tar is a Middle Eastern spice blend that (generally) combines sumac, sesame seeds, thyme, salt and often oregano and marjoram and savory. There are as many spellings of the Middle Eastern spice blend as there are varieties: za'atar, zaatar, za'tar, zatar, zatr, zattr, zahatar, zaktar or satar.
Guest
VIDEO-Surgeon General: 'Climate Change Could Expose More People to Triggers That Cause Asthma' | CNS News
Sat, 11 Apr 2015 22:42
(CNSNews.com) '' ''Climate change could expose more people to triggers that cause asthma,'' Surgeon General Vivek Murthy video-tweeted Thursday while answering questions from Americans @Surgeon_General.''Climate change, as it turns out, has a number of impacts on health,'' Murthy tweeted when asked about ''the less obvious or more subtle impacts on our health due to climate change.''
''Human health is affected, for example, through extreme weather events, through wildfire and decreased air quality, and through diseases transmitted by insects, food and water. Many times people think about the direct health impact that extreme weather and issues like asthma and heat stress, but there are also other impacts that warmer temperatures can have on human health. For example, warmer temperatures can increase the likelihood that insect-borne diseases, like dengue and chikungunya, might make their way further north into the continental United States as temperatures become warmer and the climate becomes more favorable for tropical organisms to survive.''
But the nation's top public health official stopped short of President Obama's assertion earlier this week that blamed climate change for his daughter Malia's asthma.
And he did not cite climate change or asthma among his top two priorities as surgeon general even though the White House is planning a May 12 summit on the health impact of climate change.
''Obesity & tobacco are two of the biggest health risks I want to focus on. #AskTheSurgeonGeneral '' VM'', Murthy tweeted.
The nation's youngest ever surgeon general expounded on mental health (''In a given year, less than half of the people diagnosed with a mental illness receive treatment.''); vaccinations (''We need to ensure that as many people are vaccinated as possible in order to protect our children and the country.''); and provided college students with ''tips for staying healthy in college on the cheap.''
Pointing to the ''social determinants of health'' included in the Healthy People 2020 initiative, Murthy tweeted that ''making the U.S. the healthiest nation in one generation starts with ensuring equity across our communities.''
''Today we understand better than ever before that our health is not just determined by what happens in the doctor's office or the hospital. It's also determined by important factors in our community. It's affected by where we live, where we work, where we play, where we eat, and how we get around,'' the surgeon general tweeted.
''We've made a special commitment to address these social and economic factors that put people at greater risk for both chronic and infectious disease through the Affordable Care Act, which has already extended critical preventive services to millions of the most vulnerable Americans.''
However, Murthy avoided questions on a wide range of other topics ranging from Lyme disease, pelvic surgical mesh, and medical marijuana to gun safety, pit bull attacks and e-cigarettes, leading one exasperated Twitter participant to remark: ''Way to read the teleprompter'...could you be any more scripted? #smh.''
Other Twitter users were equally unimpressed. ''OMG, 44 seconds of embarrassing left-wing CO2 insanity from Surgeon General Vivek H. Murthy'' another tweeted in response to the surgeon general's remarks on climate change.
''When can we do to stop the epidemic of unconstitutional nannying in our #Republic?'' another participant wanted to know.
Related: Obama: 'Climate Change Is a Primary National Security Threat'
Related: Harvard-Smithsonian Physicist: Computer Models Used by UN Overstate Global Warming
Related: Weather Channel Founder: Man-Made Global Warming is 'Baloney'
VIDEO-Life | A Polish aristocrat has challenged UKIP's Nigel Farage to a sword-fight - entertainment.ie
Sat, 11 Apr 2015 22:31
UKIP leader Nigel Farage is no stranger to controversial comments. In fact, his party seems to revel in making them.
Recently, the election candidate blamed traffic on one of England's largest motorways on... you guessed it. Immigrants.
Coming over here, driving on roads, etc. You really couldn't make it up.
Now, however, it's gone one step weirder. A businessman and, as it turns out, member of the Polish royal family has had enough of Nigel Farage's bullshit.
Prince Jan Zylinski, who we guarantee is actually a legit royal, has challenged UKIP leader Farage to a sword-fight in London's Hyde Park.
Yes, a duel with swords.
The swashbuckling businessman released a video yesterday, attacking Farage's comments against Poles in the UK and said that he's prepared to meet his enemy on the field of battle.
If, however, Farage is too chicken to face Zylinski with a sword, he'll debate him instead.
Which, let's face it, is the more boring option.
Via YouTube
VIDEO-U.S. Attorney, FBI announce 2 arrests in alleged ISIS plot to kill US soldiers, bomb Ft. Riley - + KSHB.com
Sat, 11 Apr 2015 22:11
Two Topeka men were charged in connection to an alleged terror plot to kill U.S. soldiers at Ft. Riley. Prosecutors say a second man, Alexander Blair, helped John Booker Jr. in his alleged plan.
KSHB
The Kansas man, 20-year-old John T. Booker of Topeka, is the latest in a series of ''national security'' arrests on American soil in the fight against ISIS.Read more: http://m.kshb.com/1ycFoJ5
KSHB
A Kansas 20-year-old, John Booker Jr., of Topeka is accused of planning to join the military with the intent to kill soldiers. The FBI arrested Booker near Manhattan Friday.
KSHB
What we know about Kansas bomb plot suspect
KSHB
In a Friday news conference, the FBI confirmed the arrest of an ISIS sympathizer in Kansas.Read more at http://m.kshb.com/1ycFoJ5
KSHB
John T. Booker Jr., left, and Alexander Blair, right, were charged in connection with a plot to bomb Ft. Riley on Friday, April 10, 2015.
Copyright 2015 Scripps Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
LinkedIn
In this photo by The Capital-Journal (Topeka, Kan.) Booker is shown at an ROTC event in 2011.
Copyright 2015 Scripps Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
The Topeka mosque where John T. Booker worshipped. (Photo by Dale Messing)
Copyright 2015 Scripps Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Fort Riley, Kan. (File)
Copyright 2015 Scripps Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
VIDEO-Stockton Smart Meters Explode After Truck Causes Power Surge CBS Sacramento
Sat, 11 Apr 2015 21:46
STOCKTON (CBS13) '-- A power surge left thousands without power in Stockton on Monday after smart meters on their homes exploded.
The explosions started at around 8:30 a.m. after a truck crashed into a utility pole, causing a surge.
When the customers in more than 5,000 homes get their power back on will depend on how badly damaged their meters are.
Neighbors in the South Stockton area described it as a large pop, a bomb going off, and strong enough to shake a house.
''The neighbor across the street, his meter doesn't look as bad but his receptacles are all blackened.'' said Brad Abernathy.
PG&E says a dump truck crashed near its Alpine substation on Arch Road. When the truck hit the utility pole, the top wire fell onto the bottom wire, creating a power surge.
''The top lines are considered our freeways. The bottom lines are our distribution lines taking power directly to homes,'' said PG&E spokeswoman Brandi Ehlers. ''So when the two collide, they're at different voltages and the higher voltage wins out, causing an overload.''
Power is expected to be restored to most customers by Monday evening, but the damage varies by home.
VIDEO-Can You Fart Your Way To The Moon? PBS's 'Space Time' Investigates.
Sat, 11 Apr 2015 21:17
By Aaron Pruner • 04.09.15Share This Video
Is it possible to propel through outer space with just the power of one's own farts? That is the ridiculously important question PBS tried to answer in their latest episode of Space Time.
In the above clip, the show takes into consideration the velocity one may acquire from their self produced rectal rumbles. Then they compare the ''science'' of flatulence to that of current rocket technology.
Thanks, PBS. Now I can explain to my wife that every air biscuit I produce is in the name of science. NASA will be pleased.
(Source: PBS Space Time)
VIDEO-No Agenda is the best podcast in the Universe - YouTube
Fri, 10 Apr 2015 22:04
VIDEO-VOCAL FRY- Apple Watch review: it's finally here - YouTube
Fri, 10 Apr 2015 18:46
VIDEO-Kansas man accused of plotting to detonate bomb at Fort Riley military base | Fox News
Fri, 10 Apr 2015 18:29
A 20-year-old Kansas man plotted to kill American soldiers with a vehicle bomb at the Fort Riley military base, an attack he planned to carry out on behalf of the ISIS terror group, prosecutors announced Friday.
John T. Booker, also known as Mohammed Abdullah Hassan, was arrested as part of a lengthy FBI investigation. Federal authorities said he was arrested near the army base in Manhattan, Kansas, as he completed final preparations to detonate the bomb, which had, in fact, been rendered inert while he was under FBI surveillance.
''"As alleged in the complaint, John Booker attempted to attack U.S. military personnel on U.S. soil purportedly in the name of (ISIS)," said Assistant Attorney General Carlin. "Thanks to the efforts of the law enforcement community, we were able to safely disrupt this threat to the brave men and women who serve our country. Protecting American lives by identifying and bringing to justice those who wish to harm U.S. citizens remains the National Security Division's number one priority."
Prosecutors said Booker repeatedly stated he wanted to engage in violent jihad on behalf of ISIS. He became an Army recruit and said he intended to commit an insider attack against American soldiers, like Major Nidal Hassan at Fort Hood in Texas.
Booker is the latest among a number of ISIS sympathizers who have been arrested by the FBI in recent weeks.
A criminal complaint unsealed Friday charged Booker with one count of attempting to use a weapon of mass destruction (explosives), one count of attempting to damage property by means of an explosive and one count of attempting to provide material support to a designated foreign terrorist organization.
He was due to appear Friday afternoon in federal court in Topeka.
The criminal complaint Friday alleged that he has spent months developing and attempting to execute a plan that would result in his own death. It also is alleged that he planned to pull the trigger of the explosives himself so that he would die in the explosion,'' Kansas U.S. Attorney Barry Grissom said at a news conference.
"I want to assure the public there was never any breach of Fort Riley Military Base, nor was the safety or the security of the base or its personnel ever at risk," said FBI Special Agent in Charge Jackson. "Recently the Command Staff at Fort Riley has been working hand in hand with law enforcement to ensure the utmost security and protection for the men and women who serve our country, and the surrounding community that supports the base."
Booker allegedly plotted to construct an explosive device for attack on American soil for months.
He is accused of advancing the plot by acquiring components for a vehicle bomb, producing a propaganda video and renting a storage locker to store components for the explosive device.
Prosecutors said he identified Fort Riley as the target and talked about his commitment to trigger the device himself and become a jihadi martyr.
Last year FoxNews.com reported exclusively that Booker was under investigation for threatening online to commit a "Fort Hood-inspired" act of terror just weeks away from reporting for basic training.
The military learned of his radicalism - which had apparently been on display for months in online posts where he praised Usama bin Laden and pledged to die for radical Islam.
FoxNews.com reported then that Booker was the subject of an FBI alert.
''Getting ready to be killed in jihad is a HUGE adrenaline rush! I am so nervous," read a March 19. 2014 post on the Facebook page authorities believe belonged to Booker. "NOT because I'm scared to die but I am EAGER to meet my lord.''
FoxNews.com reported Booker enlisted in the Army in February 2014 and was due to report for basic training on April 7. But the FBI interviewed him in March and alerted the Army, which formally discharged him.
VIDEO-The President's Advisory Council on Doing Business in Africa Part II | The White House
Fri, 10 Apr 2015 16:07
April 08, 2015 | 54:00 | Public Domain
President Obama's Advisory Council on Doing Business in Africa held a meeting to discuss how the U.S. can strengthen its commercial relationship with the continent of Africa.
Download mp4 (2048MB) | mp3 (130MB)
VIDEO-Alan Dershowitz Says That He Is Denying Categorically the Truth - YouTube
Fri, 10 Apr 2015 14:58
VIDEO-U.S., Iran Openly Fighting Over Details of the Supposed Nuclear 'Agreement' | TheBlaze.com
Fri, 10 Apr 2015 14:34
The tentative Iran nuclear agreement that the Obama administration celebrated as a major step forward just one week ago was thrown into serious doubt Thursday, as the U.S. and Iran fell into a public dispute over exactly what was agreed.
The fight called into question whether any understanding exists at all, and whether there's any way to bridge their vast public differences by June 30, the target date for a final agreement.
Iranian Supreme Leader Ayatollah Ali Khamenei said Iran won't accept a final nuclear agreement unless it allows all sanctions to be dropped immediately. That prompted the State Department to say that's not what's in the deal. Image: AP
The public dispute started when Iranian Supreme Leader Ayatollah Ali Khamenei insisted that all sanctions against Iran would have to be lifted as soon as any final agreement is signed.
''All sanctions should be removed when the deal is signed. If the sanctions removal depends on other processes, then why did we start the negotiations?'' Khamenei said, according to Reuters.
Khamenei also said the ''fact sheet'' on the agreement that the U.S. side put out last week was ''wrong'' about almost everything it described.
''Americans put out a statement just a few hours after our negotiators finished their talks'...this statement, which they called a 'fact sheet', was wrong on most of the issues,'' he said.
Additionally, he said Iran would not allow any of its military sites to be subject to inspections under the agreement.
All of those points are the complete opposite of how the Obama administration has described the status of the talks so far. The U.S. says Iran has agreed that sanctions will only be removed as Iran phases in the agreement, and that international inspectors will be able to request access to any site in Iran to ensure it lives up to its commitment to scale back its enrichment activities.
When asked Thursday if Khamenei was wrong about the deal, State Department spokesman Jeff Rathke said he wouldn't comment on ''every public statement made by Iranian officials,'' an apparent signal that he also wouldn't comment on Khamenei's specific statement either.
''Sanctions will be suspended in a phased manner upon verification that Iran has met specific commitments under a finalized joint comprehensive plan of action,'' he said.
Rathke said that while the fact sheet on the deal that the U.S. released last week was not itself a negotiated document, it reflects the U.S. understanding of the status of the talks. ''That fact sheet reflects the understanding we achieved in Lausanne,'' he said.
It's possible that Iran is making public statements about the agreement that aren't true in a show of strength for a domestic audience. But still, the lack of a single agreed text at this point in the talks has made it impossible to say for sure which side is right and which is wrong.
The U.S. fact sheet only contributed to that confusion, since Iran has indicated it doesn't agree with the wording of that information. And in a sign of possible trouble down the road, Rathke refused to tell reporters that a final agreement would be released in the form of a text that all parties to the talks can support.
''I'm not going to speak to the final shape and form of the agreement,'' Rathke said.
Iranian President Hassan Rouhani has also raised suspicions about the deal, by claiming that Iran got the upper hand in the talks.
''Our goal in the talks is to preserve our nation's nuclear rights,'' he said, according to Reuters. ''We want an outcome that will be in everyone's benefit. The Iranian nation has been and will be the victor in the negotiations.''

Clips & Documents

Art
Image
Image
Agenda 21
Obama- ‘Climate Change Is a Primary National Security Threat’.mp3
Surgeon General Vivek Murthy -Climate Change triggers asthma.mp3
BAustin
Bob Baer on CNN-no way tsarnev brothers acted alone.mp3
Haiti
Haiti-1-Hillary's Brother mines.m4a
Haiti-10-Zanmann.m4a
Haiti-2-160k in tents.m4a
Haiti-3-Oil-gold-SULPHUR.m4a
Haiti-4-Earthquake Machine.m4a
Haiti-5-Sean Penn and the Bush family.mp3
Haiti-6-THE problem with Haiti.m4a
Haiti-7-The Future of Haiti.m4a
Haiti-8-Pras & Young H Entrep.m4a
Haiti-9-Docs with evidence.m4a
Hillary 2016
Joe podcast-filling in.mp3
Rand Paul pussies out on Neo-Cons KAGANS!.mp3
JCD Clips
hillary medly of clips.mp3
Hillarys temper.mp3
meg kelly says irregardless.mp3
meg kelly subclip.mp3
modi in france buying jets.mp3
MSNBC 30 second broefing.mp3
NBC rundown of threats homegrown.mp3
TECH NEWS --Cam app.mp3
TECH NEWS Austin.mp3
under-reported stort of the year harf.mp3
Veterans administration scandal continues unreported.mp3
Kale
Here & Now resident chef Kathy Gunst-growing kale in schools.mp3
LGBBTQQIAAP
Family Research Council's Craig James-radio call-in Gay Bomb.mp3
NA Tech News
KRON pathetic awatch commercial.mp3
personalaudiodecision.pdf
SCIENCE!
PBS Space Time on farting to the moon.mp3
Six Week Cycle
blair_complaint.pdf
Criminal complaint against John T. Booker.pdf
kansas city 6 week cycle-2nd moron.mp3
Vocal Fry
Nilay Verge Vocal Fry women on AWatch.mp3
Warthog
A-10 Warthog JTAC -Joint Terminal Attack Controller- SSGT-A-10 is BEST for the mission.mp3
A-10 Warthog Pilots-on the guy on the ground.mp3
A-10 Warthog whine.mp3
0:00 0:00