Month: September 2011
BREAKING NEWS – CIA drone kills U.S.-born al Qaeda cleric in Yemen
1 of 2. Anwar al-Awlaki, a U.S.-born cleric linked to al Qaeda’s Yemen-based wing, gives a religious lecture in an unknown location in this still image taken from video released by Intelwire.com on September 30, 2011. Anwar al-Awlaki has been killed, Yemen’s Defence Ministry said on Friday. A Yemeni security official said Awlaki, who is of Yemeni descent, was hit in a Friday morning air raid in the northern al-Jawf province that borders oil giant Saudi Arabia.
Anwar al-Awlaki, a U.S.-born cleric linked to al Qaeda, was killed in a CIA drone strike in Yemen on Friday, U.S. officials said, removing a “global terrorist” high on a U.S. wanted list.
Awlaki’s killing deprives the Yemen-based al Qaeda in the Arabian Peninsula (AQAP) of an eloquent propagandist in English and Arabic who was implicated in attacks on the United States.
“He planned and directed attacks against the United States,” one U.S. official said. “In addition, Awlaki publicly urged attacks against U.S. persons and interests worldwide and called for violence against Arab governments he judged to be working against al Qaeda.”
Earlier in his career, Awlaki preached at mosques in the United States attended by some of the hijackers in the September 11, 2001 attacks by al Qaeda, whose leader, Osama bin Laden, was killed in a U.S. raid on his hideout in Pakistan in May.
Awlaki’s death could be a boon for U.S. President Barack Obama and for his Yemeni counterpart, Ali Abdullah Saleh, who is clinging to power despite months of popular protests, factional violence and international pressure.
A Yemeni government statement said Samir Khan, an American of Pakistani origin, and two others were killed with Awlaki. Khan, from North Carolina, was an editor of AQAP’s English-language online magazine Inspire, which often published Awlaki’s writings.
A Yemeni official said Awlaki had been located based on information obtained from a detained AQAP militant.
U.S. drone aircraft targeted but missed Awlaki in May. The United States has stepped up drone strikes in Yemen to try and keep al Qaeda off balance and prevent it from capitalizing on the strife and chaos gripping the nation that borders oil giant Saudi Arabia and lies near vital shipping routes.
“CHIEF OF EXTERNAL OPERATIONS”
A senior U.S. official said Awlaki had orchestrated attacks on U.S. interests as “chief of external operations” for AQAP.
“Awlaki played a significant operational role in the attempted attack on a U.S. airliner in December 2009 (and) helped oversee the October 2010 plot to detonate explosive devices aboard U.S. cargo aircraft,” the official said.
Washington also learned that Awlaki sought to use poisons including cyanide and ricin to attack Westerners and exchanged e-mails with a U.S. military psychiatrist later accused of killing 13 people at Fort Hood army base in Texas in 2009.
AQAP, which established itself in Yemen after Saudi Arabia defeated a violent al Qaeda campaign from 2003-6, has emerged as one of the network’s most ambitious wings, attempting daring, if unsuccessful, attacks on U.S. and Saudi targets.
Bin Laden’s al Qaeda made its first mark in Yemen with an attack that killed 17 U.S. sailors on the warship Cole in Aden harbor in 2000.
The Yemen embassy in Washington said Awlaki had been killed 8 km (five miles) from the town of Khashef in the northern province of Jawf, adjacent to Saudi Arabia, about 140 km east of Sanaa, at about 9:55 a.m. (0655 GMT).
AQAP has not acknowledged Awlaki’s death. It usually takes a few days to post an Internet response to such killings.
A tribal sheikh in Jawf said Awlaki and three other people had been killed. “We have retrieved their bodies. There was another car that had al Qaeda members inside it, but they were able to escape,” he said, asking not to be named.
A Yemeni official said more details would be announced once the surviving al Qaeda group had been tracked down.
HARD TO REPLACE
“If he is dead, Awlaki will be difficult to replace,” said Jeremy Binnie, a terrorism and insurgency analyst at IHS Jane’s in London. “It’s a blow for AQAP’s international operations. Awlaki has helped the group build its international profile.”
U.S. authorities have branded Awlaki a “global terrorist” and last year authorized his capture or killing, but Sanaa had previously appeared reluctant to act against him.
Awlaki was not a senior Islamic cleric, nor a commander of AQAP, which is led by a Yemeni named Nasser al-Wuhayshi, but he played a key role in the group’s global outreach.
“Awlaki’s death won’t hurt al Qaeda’s operations because he didn’t have a leadership role. But the organization has lost an important figure for recruiting people from afar,” said Said Obeid, a Yemeni analyst on al Qaeda.
Henry Wilkinson, head analyst at risk consultancy Janusian in London, said Awlaki’s demise would have little impact on AQAP’s local operations, but added: “He was a rare talent who could reach out and recruit and mobilize. If the U.S. have killed Awlaki, then they have achieved a major target.”
Yemen has been mired in turmoil after eight months of mass protests demanding that Saleh step down, something he has reiterated he will do only if his main rivals do not take over.
“Because if we transfer power and they are there, this will mean that we have given into a coup,” Saleh told The Washington Post and Time magazine in an interview published on Friday, a week after he made a surprise return from Saudi Arabia.
He had been recuperating in Riyadh from a June bomb attack on his Sanaa compound that badly burned and wounded him.
STALLED TALKS
His return halted talks over a Gulf-brokered transition plan that had been revived despite violence that has killed more than 100 people in Sanaa in the past two weeks.
Saleh’s troops have been fighting the forces of rebel General Ali Mohsen and those of tribal leader Sadeq al-Ahmar.
Saleh who has repeatedly shied away from signing a Gulf-brokered transition plan at the last minute, urged outside powers to have more patience in concluding the deal, saying:
“We are pressed by America and the international community to speed up the process of handing over power. And we know where power is going to go. It is going to al Qaeda, which is directly and completely linked to the Muslim Brotherhood.”
Opposition groups accuse Saleh of giving militants more leeway in a ploy to frighten Western powers and convince them that he is the best defense against al Qaeda.
“Awlaki serves the government as a way to scare the West,” said protest organizer Manea al-Mattari. “They want to improve their image in the West after all the killing they have done.”
Thousands of pro- and anti-Saleh demonstrators took to the streets of Sanaa again on Friday, the Muslim day of prayer.
Protesters carried 13 bodies, wrapped in Yemeni flags, of people killed in fighting in the capital this week. Asked about Awlaki’s death, one demonstrator said it was irrelevant.
“Nobody cared about his death today and we wonder why the government announced it now. We have much bigger problems than Anwar al-Awlaki,” said Fayza al-Suleimani, 29.
Gefälschter Lebenslauf von Klaus Maurischat-Pseudoym Siegfried Siewert – Partner von “Bennewirtz und Ehlers” – “CEO” DER STASI-“GoMoPa”
DIE WAHRHEIT – DAS SIND DIE ERPRESSER : “GoMoPa”-ERPRESST MERIDIAN CAPITAL “GoMoPa”-CEO MAURISCHAT WIRD VOM BKA VERHAFTET
DER BEWEIS: “GoMoPa”-ERPRESST MERIDIAN CAPITAL “GoMoPa”-CEO MAURISCHAT WIRD VOM BKA VERHAFTET
Millionen Finanzierungen mit Widersprüchen / Die Werbemethoden der Meridian Capital Enterprises
ZUM DOWNLOAD OBEN CLICKEN
Berlin (ots) – Die Meridian Capital Enterprises Ltd. bietet auf ihren Webseiten weltweite Finanzierungen an. GoMoPa hat die dort gemachten Angaben analysiert und starke Widersprüche entdeckt.
Die Unternehmensstruktur
Die Meridian Capital Enterprises Ltd. behauptet “ein Finanzinstitut” zu sein, “das zu einer internationalen Finanzgruppe gehört.” Diese Gruppe setze sich aus 11 verschiedenen Mitgliedern zusammen. GoMoPa fragte alle zuständigen Handelsregister ab. Ergebnis: 5 der 11 angegebenen Finanzinstitute sind nicht eingetragen.
Mitarbeiter der KLP Group Emirates, GoMoPa-Partner und Management-Gruppe in Dubai, machten sich die Mühe, drei weitere Geschäftsadressen der Meridian Capital Enterprises Ltd. zu überprüfen. Martin Kraeter, Prinzipal der KLP Group: “Alle 3 genannten Firmen existieren hier nicht, auch nicht in abgewandelter Form.”
Das Unternehmen will weltweit über zahlreiche Standorte verfügen. Bei denen handelt es sich allerdings lediglich um “Virtual Offices” eines Büroservice-Anbieters.
Laut Firmenhomepage hat das Unternehmen seinen “rechtlichen Geschäftssitz” in Dubai. In einem GoMoPa vorliegenden Schreiben der Meridian Capital Enterprises Ltd. heißt es jedoch, der Firmensitz sei in London. Auf der Homepage selbst tauchen zwei Londoner Adressen auf, die das Unternehmen als “Kundenabteilung für deutschsprachige Kunden” und “Abteilung der Zusammenarbeit mit Investoren” bezeichnet.
Die Meridian Capital Enterprises ist tatsächlich als “Limited” (Ltd.) mit Sitz in England und Wales eingetragen. Eine Abfrage beim Gewerbeamt Dubais (DED) zur Firmierung jedoch bleibt ergebnislos. Bemerkenswert ist auch der vermeintliche Sitz in Israel. Auf der Webseite von Meridian Capital Enterprises heißt es: “Die Firma Meridian Capital Enterprises Ltd. ist im Register des israelischen Justizministeriums unter der Nummer 514108471 (…) angemeldet.” Martin Kraeter hierzu: ” Ein ‘britisch-arabisch-israelisches bankfremdes Finanzinstitut sein zu wollen, wie die Meridian Capital Enterprises Ltd. es darstellt, ist mehr als zweifelhaft. Es würde keinem einzigen Emirati, geschweige denn einem ‘Scheich’, auch nur im Traum einfallen Geschäfte mit Personen oder Firmen aus Israel zu machen. “
Eigenartig ist auch: Zwei angebliche Großinvestitionen der Meridian Capital Enterprises in Dubai sind Investmentruinen bzw. erst gar nicht realisierte Projekte.
Der Aktivitätsstatus der Meridian Capital Enterprises Ltd. ist laut englischem Handelsregister als “dormant” gemeldet. Auf der Grundlage des britischen Gesellschaftsrechts können sich eingetragene Unternehmen selbst “dormant” (schlafend) melden, wenn sie keine oder nur unwesentliche buchhalterisch zu erfassende Transaktionen vorgenommen haben. Angesichts der angeblichen globalen Investitionstätigkeit der Meridian Capital Ltd. ist dieses jedoch sehr erstaunlich.
Auf ihrer Webseite gibt die Meridian Capital Enterprises Ltd. einen Überblick über ihre größten Investitionen in Deutschland: “Dithmarschen Wind Powerplant, Waldpolenz Solar Park, AIDAdiva, Berlin Hauptbahnhof, Sony Center”. Die Eigentümer des Sony Centers am Potsdamer Platz teilten GoMoPA mit, dass ihnen sei ein solcher Investor unbekannt sei. Meridian Capital Enterprises Ltd. will übrigens angeblich auch in die Erweiterung des Panama-Kanals sowie in das Olympiastadion in Peking investiert haben.
Der Webauftritt
Die Internetseite der MCE ist aufwendig gestaltet. Bei näherer Betrachtung fällt jedoch auf, dass es sich bei zahlreichen Fotos der Veranstaltungen der Meridian Capital Enterprises in den meisten Fällen um Bildmaterial von Online-Zeitungen oder frei zugänglichen Medienfotos einzelner Institutionen handelt.
Auf der Homepage befinden sich Videofilme, die eine verblüffende Ähnlichkeit mit dem Werbematerial von NAKHEEL aufweisen, dem größten Bauträger der Vereinigten Arabischen Emirate. Den schillernden Videos über die berühmten drei Dubai Palmen wurden offensichtlich selbstproduzierte Trailersequenzen der Meridian Capital Enterprises vorangestellt.
Ab einem Volumen von 10 Millionen Euro oder höher präsentiert sich so die Meridian Capital Enterprises Ltd. als der passende Investitionspartner. Auf der Internetseite sind diverse Fotos mit Scheichs an Konferenztischen zu sehen. Doch diese großen Tagungen und großen Kongresse der Meridian Capital Enterprises werden in den Pressearchiven der lokalen Presse Dubais mit keinem Wort erwähnt.
Vertiefende Information unter:
http://www.presseportal.de/go2/mehr_zu_MCE_ltd
Originaltext: GoMoPa GmbH Digitale Pressemappe: http://www.presseportal.de/pm/72697 Pressemappe via RSS : http://www.presseportal.de/rss/pm_72697.rss2
Pressekontakt: Herr Friedrich Wasserburg Telefon: +49 (30) 51060992 Fax: +49 (30) 51060994 Zuständigkeitsbereich: Presse
Firmeninfo Goldman Morgenstern & Partners LLC 575 Madison Avenue USA-10022 – 2511 New York http://www.gomopa.net
Über Goldman Morgenstern & Partners LLC: Ein Zusammenschluss aus Unternehmens-, Steuer-, Anlageberatern und Rechtsanwälten.
© 2008 news aktuell
DANN GING DIe ERPRESSUNG LOS UND MERIDIAN CAPITAL REAGIERTE – STATT DIES ABER ZUZUGEBEN SETZEN DIE STASI-VERBRECHER EINE GEFÄLSCHTE PRESSE-MITTEILUNG IN NETZ, DIE MICH BELASTEN SOLL
BITTE KONTAKTIEREN SIE AUCH MERIDIAN CAPITAL
sales@meridiancapital.com
1 Battery Park Plaza
New York, NY 10004
TEL: 212-972-3600
FAX: 212-612-0100
Hierzu weitere Infos unter
Original Stellungnahme Meridian Capital gegen “GoMoPa” auf http://meridiancapital.wordpress.com/
Original Stellungnahme Meridian Capital gegen “GoMoPa” auf http://meridiancapital.wordpress.com
Meridian Capital about GoMoPa
STASI-FÄLSCHUNGEN DER “GoMoPa”
- June 12, 2011 – 10:44 am
- Posted in Uncategorized
- Comments Off
Sehr geehrte Damen und Herren,
die Betrüger und durch uns inhaftierten Erpresser der GoMoPa versuchen mit einer gefälschten Presse-Mitteilung von usich abzulenken und einen investigativen Journalisten, Bernd Pulch, zu belasten.
Die Presse-Mitteilung auf pressreleaser.org ist eine Fälschung und die gesamte webseite ist der GoMoPa zu zuordnen.
Hier noch einmal die tatäschlichen Geschehnisse:
Hier der Artikel von “GoMoPa” über Meridian Capital.
![]() Weltweite Finanzierungen mit WidersprüchenDie Meridian Capital Enterprises Ltd. gibt an, weltweite Finanzierungen anbieten zu können und präsentiert sich hierbei auf aufwendig kreierten Webseiten. GOMOPA hat die dort gemachten Angaben analysiert und Widersprüche entdeckt.Der FirmensitzDer Firmensitz befindet sich laut eigener Aussage in Dubai, Vereinigte Arabische Emirate. In einem GOMOPA vorliegenden Schreiben der Meridian Capital Enterprises Ltd. heißt es jedoch, der Firmensitz sei in London. Auf der Homepage des Unternehmens taucht die Geschäftsadresse in der Londoner Old Broad Street nur als „Kundenabteilung für deutschsprachige Kunden“ auf. Eine weitere Adresse in der englischen Hauptstadt, diesmal in der Windsor Avenue, sei die „Abteilung der Zusammenarbeit mit Investoren“.Die Meridian Capital Enterprises ist tatsächlich als „Limited“ (Ltd.) mit Sitz in England und Wales eingetragen. Aber laut Firmenhomepage hat das Unternehmen seinen „rechtlichen Geschäftssitz“ in Dubai. Eine Abfrage beim Gewerbeamt Dubais (DED) zu dieser Firmierung bleibt ergebnislos. Bemerkenswert ist auch der vermeintliche Sitz in Israel. Auf der Webseite von Meridian Capital Enterprises heißt es: „Die Firma Meridian Capital Enterprises Ltd. ist im Register des israelischen Justizministeriums unter der Nummer 514108471, gemäß dem Gesellschaftsrecht von 1999, angemeldet.“ Hierzu Martin Kraeter, Gomopa-Partner und Prinzipal der KLP Group Emirates in Dubai: „Es würde keinem einzigen Emirati – geschweige denn einem Scheich auch nur im Traum einfallen, direkte Geschäfte mit Personen oder Firmen aus Israel zu tätigen. Und schon gar nicht würde er zustimmen, dass sein Konterfei auch noch mit vollem Namen auf der Webseite eines Israelischen Unternehmens prangt.“ Auf der Internetseite sind diverse Fotos mit Scheichs an Konferenztischen zu sehen. Doch diese großen Tagungen und großen Kongresse der Meridian Capital Enterprises werden in den Pressearchiven der lokalen Presse Dubais mit keinem Wort erwähnt. Zwei angebliche Großinvestitionen der Meridian Capital Enterprises in Dubai sind Investmentruinen bzw. erst gar nicht realisierte Projekte. Das Unternehmen wirbt mit ihrer finanziellen Beteiligung an dem Dubai Hydropolis Hotel und dem Dubai Snowdome. Der Aktivitätsstatus der Meridian Capital Enterprises Ltd. ist laut englischen Handelsregister (UK Companies House) „dormant“ gemeldet. Auf der Grundlage des englischen Gesellschaftsrechts können sich eingetragene Unternehmen selbst „dormant“ (schlafend) melden, wenn sie keine oder nur unwesentliche buchhalterisch zu erfassende Transaktionen vorgenommen haben. Dies ist angesichts der angeblichen globalen Investitionstätigkeit der Meridian Capital Ltd. sehr erstaunlich. Der Webauftritt Die Internetseite der MCE ist sehr aufwendig gestaltet, die Investitionen angeblich in Millionen- und Milliardenhöhe. Bei näherer Betrachtung der Präsentationselemente fällt jedoch auf, dass es sich bei zahlreichen veröffentlichen Fotos, die Veranstaltungen der Meridian Capital Enterprises dokumentieren sollen, meist um Fotos von Online-Zeitungen oder frei zugänglichen Medienfotos einzelner Institutionen handelt wie z.B. der Börse Dubai. Auf der Internetpräsenz befinden sich Videofilmchen, die eine frappierende Ähnlichkeit mit dem Werbematerial von NAKHEEL aufweisen, dem größten Bauträger der Vereinigten Arabischen Emirate. Doch den schillernden Videos über die berühmten drei Dubai Palmen „Jumeirah, Jebel Ali und Deira“ oder das Archipel „The World“ wurden offensichtlich selbstproduzierte Trailersequenzen der Meridian Capital Enterprises vorangestellt. Doch könnte es sich bei den Werbevideos um Fremdmaterial handeln. Auch die auf der Webseite wahllos platzierten Fotos von bekannten Sehenswürdigkeiten Dubais fungieren als Augenfang für den interessierten Surfer mit eigenem Finanzierungswunsch. Bei einem Volumen von 10 Millionen Euro oder höher präsentiert sich die Meridian Capital Enterprises Ltd. als der passende Investitionspartner. Das Unternehmen verfügt weltweit über zahlreiche Standorte: Berlin, London, Barcelona, Warschau, Moskau, Dubai, Riad, Tel Aviv, Hong Kong und New York. Aber nahezu alle Standorte sind lediglich Virtual Offices eines global arbeitenden Büroservice-Anbieters. „Virtual Office“ heißt im Deutschen schlicht „Briefkastenfirma“. Unter solchen Büroadressen sollen laut Meridian Capital Enterprises ganze Kommissionen ansässig sein, alles zum Wohle des Kunden.“ Zitatende |
Hier die Hintergründe der Erpressung:
Hier unsere Original-Stellungnahme:
Anfang Oktober 2008 erhielt einer der Arbeiter der Meridian Capital Enterprises Ltd. eine Meldung von einem anonymen Sender, dass in naher Zukunft – zuerst im Internet, dann im Fernsehen, im Radio und in der deutschen Presse – Informationen erscheinen, die die Funktionsweise und Tätigkeiten der Meridian Capital Enterprises Ltd. in einem äußerst negativen Licht darstellen. Der Mitarbeiter der Meridian Capital Enterprises Ltd. wurde also informiert, dass diese Meldungen/Nachrichten zweifelsohne deutlich das Aussehen und den guten Ruf der Firma Meridian Capital Enterprises Ltd. beeinträchtigen.
Der an dieser Stelle erwähnte „Gesprächspartner” hat den Arbeiter der Meridian Capital Enterprises Ltd. informiert, dass die Möglichkeit besteht die peinliche Situation zu vermeiden, indem die Meridian Capital Enterprises Ltd. auf das von der Person gezeigte Konto die Summe von 100.000,00 EUR überweist. Wie sich aber später zeigte, war der Herr Klaus Maurischat – dieser anonyme Gesprächspartner – „Gehirn“ und „Lider des GOMOPA“. Die Ermittlungen wurden angestellt durch die Bundeskriminalpolizei (Verfolgungs- und Ermittlungsorgan auf der Bundesebene) während des Ermittlungsverfahrens wegen einer finanziellen Erpressung, Betrügereien auch wegen der Bedrohungen, welche von Herrn Maurischat und seine Mitarbeiter praktiziert wurden sowie wegen Teilnahme anderer (Leiter der Internetservices und Moderatoren der Blogs) an diesem Prozedere. Diese Straftaten wurden begangen zu Schaden vieler Berufs- und Justizpersonen, darunter auch der Meridian Capital Enterprises Ltd. Die Opfer dieses Verbrechens sind in Deutschland, Österreich, der Schweiz, Spanien, Portugal, Großbritannien, den USA und Kanada sichtbar.
In diesem Moment taucht folgende Frage auf: Wie war die Reaktion der Meridian Capital Enterprises Ltd. auf die Forderungen seitens GOMOPA? Entsprach die Reaktion den Erwartungen von GOMOPA? Hat die Meridian Capital Enterprises Ltd. die geforderte Summe 100.000,00 EUR überwiesen?
Seites der Meridian Capital Enterprises Ltd. gab es überhaupt keine Reaktion auf den Erpressungsversuch von GOMOPA. Ende August 2008 auf dem Service http://www.gompa.net sind zahlreiche Artikel/Meldungen erscheinen, welche die Tätigkeit der Meridian Capital Enterprises Ltd. in einem sehr negativen Licht dargestellt haben. Nachdem die auf http://www.gomopa.net enthaltenen Informationen ausführlich und vollständig analysiert worden waren, ergab es sich, dass sie der Wahrheit nicht einmal in einem Punkt entsprechen und potenzielle und bereits bestehende Kunden der Meridian Capital Enterprises Ltd. in Bezug auf die von diesem Finanzinstitut geführten Geschäftstätigkeit irreführen. Infolge der kriminellen Handlugen von GOMOPA und der mit ihm kooperierenden Services und Blogs im Netz hat die Meridian Capital Enterprises Ltd. beachtliche und messbare geschäftliche Verluste erlitten. Die Meridian Capital Enterprises Ltd. hat nämlich in erster Linie eine wichtige Gruppe von potenziellen Kund verloren. Was sich aber als wichtiger ergab, haben sich die bisherigen Kunden von der Meridian Capital Enterprises Ltd. kaum abgewandt. Diejenigen Kunden haben unsere Dienstleitungen weiterhin genutzt und nutzen die immer noch. In Hinblick auf die bisherige Zusammenarbeit mit der Meridian Capital Enterprises Ltd., werden ihrerseits dem entsprechend keine Einwände erhoben .
GOMOPA hat so einen Verlauf der Ereignisse genau prognostiziert, dessen Ziel beachtliche und messbare geschäftliche durch die Meridian Capital Enterprises Ltd. erlittene Verluste waren. Der Verlauf der Ereignisse hat das Service GOMOPA mit Sicherheit gefreut. GOMOPA hat nämlich darauf gerechnet, dass die Stellung der Meridian Capital Enterprises Ltd. nachlässt und das Finanzinstitut die geforderte Summe (100.000,00 EUR) bereitstellt. Im Laufe der Zeit, als das ganze Prozedere im Netz immer populärer war, versuchte GOMOPA noch vier mal zu der Meridian Capital Enterprises Ltd. Kontakte aufzunehmen, indem es jedes mal das Einstellen dieser kriminellen „Kompanie” versprochen hat, wobei es jedes mal seine finanziellen Forderungen heraufsetzte. Die letzte für das Einstellen der „Kompanie“ gegen die Meridian Capital Enterprises Ltd. vorgesehene Quote betrug sogar 5.000.000,00 EUR (in Worten: fünfmilionen EURO). Die Meridian Capital Enterprises Ltd. konnte sich aber vor den ständig erhöhenden Forderungen seitens des Services GOMOPA behaupten.
Im Oktober 2008 traf die Leitung der Meridian Capital Enterprises Ltd. Entscheidung über die Benachrichtigung der Internationalen Polizei INTERPOL sowie entsprechender Strafverfolgungsorgane der BRD (die Polizei und die Staatsanwaltschaft) über den bestehenden Sachverhalt. In der Zwischenzeit meldeten sich bei der Meridian Capital Enterprises Ltd. zahlreiche Firmen und Korporationen, sogar Berufsperson wie Ärzte, Richter, Priester, Schauspieler und anderen Personen aus unterschiedlichen Ländern der Welt, die der Erpressung von GOMOPA nachgegeben und die geforderten Geldsummen überwiesen haben. Diese Personen gaben bereits Erklärungen ab, dass sie dies getan haben, damit man sie bloß endlich „in Ruhe lässt” und um unnötige Probleme, Schwierigkeiten und einen kaum begründbaren Ausklang vermeiden zu können. Die Opfer dieses kriminellen Vorgehens haben die Meridian Capital Enterprises Ltd. über unterschiedliche Geldsummen, welche verlangt wurden, informiert.
In einem Fall gab es verhältnismäßig kleine (um ein paar tausend EURO), in einem anderen Fall handelte es schon um beachtliche Summen (rund um paar Millionen EURO).
Zusätzlich wendeten sich an die Meridian Capital Enterprises Ltd. Firmen, welche dem GOMOPA noch keine „Gebühr” überweisen haben und bereits überlegen, ob sie dies tun sollen, oder nicht. Diese Firmen erwarteten von der Meridian Capital Enterprises Ltd. eine klare Stellungnahme sowie eine professionelle praktische Beratung, wie man sich in solch einer Lage verhalten soll und wie man diese Geldforderungen umgehen kann. Die Meridian Capital Enterprises Ltd. hat ausnahmslos allen Verbrechensopfern, welche sich bei unserer Firma gemeldet haben, eine Zusammenarbeit vorgeschlagen. Als oberste Aufgabe stellt sich diese Kooperation, gemeinsam entschlossene und wirksame Maßnahmen gegen GOMOPA, gegen andere Services im Netz sowie gegen alle Bloggers zu treffen, die an dem hier beschriebenen internationalen kriminellen Vorgehen mit GOMOPA-Führung teilnehmen.Auf unsere Bitte benachrichtigten alle mitbeteiligten Firmen die Internationale Polizei INTERPOL sowie ihre heimischen Verfolgungsorgane, u. a. die zuständige Staatsanwaltschaft und die Polizeibehörden über den bestehenden Sachverhalt.
In Hinblick auf die Tatsache, dass das verbrecherische Handeln von GOMOPA sich über viele Staaten erstreckte und dass die Anzahl der in der Bundesrepublik Deutschland erstatteten Anzeigen wegen der durch GOMOPA, Internetservices und Bloggers begangenen Straftaten, rasant wuchs – was zweifelsohne von einer weit gehenden kriminellen Wirkungskraft des GOMOPA zeugt – schlug die Internationale Wirtschaftspolizei INTERPOL der Meridian Capital Enterprises Ltd. vor, dass sich ihr Vertreter in Berlin mit dem Vertreter von GOMOPA trifft, um die „Zahlungsmodalitäten“ und Überweisung der Summe von 5.000.000,00 EUR zu besprechen. Dieser Schritt meinte, eine gut durchdachte und durch die Bundeskriminalpolizei organisierte Falle durchzuführen, deren Ziel die Festnahme der unter GOMOPA wirkenden internationalen Straftäter war.
Die koordinierten Schritte und Maßnahmen der Meridian Capital Enterprises Ltd. und anderer Beschädigter, geleitet von der Internationalen Wirtschaftspolizei INTERPOL, dem Bundeskriminalamt und der Staatsanwaltschaft der Bundesrepublik Deutschland haben zur Aus-, Einarbeitung und Durchführung der oben beschriebenen Falle beigetragen. Im November 2008 führte die in Berlin vorbereitete Falle zur Festnahme und Verhaftung des Vertreters des GOMOPA, der nach der Festnahme auf Herrn Klaus Maurichat – als den Hauptverantwortlichen und Anführer der internationalen kriminellen Gruppe GOMOPA verwies. Der Festgenommene benannte und zeigte der Bundeskriminalpolizei zugleich den aktuellen Aufenthaltsort des Herrn Klaus Maurischat. „Gehirn“ und Gründer dieser internationalen kriminellen Gruppe GOMOPA, Herr Klaus Maurischat wurde am selben Tag auch festgenommen und auf Frist verhaftet, wird bald in Anklagezustand gestellt, wird die Verantwortung für eigene Straftaten und die des Forums GOMOPA vor einem zuständigen Bundesgericht tragen. Die Meridian Capital Enterprises Ltd. unternahm bereits alle möglichen Schritte, damit Herr Klaus Maurischat auch auf der Anklagebank des zuständigen Gerichts des Vereinigten Königsreiches Großbritannien erscheint. Unter den beschädigten Berufs- und Justizpersonen aus Großbritannien, neben der Meridian Capital Enterprises Ltd. gibt es noch viele Opfer von GOMOPA…
Die dreisten Verbrecher wagen es unter http://www.pressreleaser.org, einer eigenen “GoMoPa”-Seite unsere Pressemitteilung oben zu verfälschen und unschuldige Personen zu belasten.
“GoMoPa” Boss is Jochen Resch
- May 15, 2011 – 1:15 pm
- Posted in Uncategorized
- Comments Off
Dear Readers,
after a thorough research we are sure that the real “GoMoPa” boss is Jochen Resch, lawyer in Berlin, Germany. He is the brain behind “GoMoPa” and responsable for blackmailing, extortion, racketeering, cybermurder and murder – in the tradition of the East German “Inteeligence” STASI that is why he called “GoMoPa” – Financial “Intelligence” Service .
Webmaster
Meridian Capital about GoMoPa
“GoMoPa” in detention
- May 13, 2011 – 1:02 pm
- Posted in Uncategorized
- Comments Off
Meridian Capital Enterprises Ltd.. unveils new criminal phenomena in network. In recently appeared on the net more often at the same time a new a very worrying phenomenon of criminal nature. Professional criminals groups in the network are taking part, to extortion, fraud, Erschwindeln relating to certain specifically selected companies and businesses are capable of. These criminals developed new methods and means, simply and in a short time to bereichern.Strategien and manifestations, which underlie this process are fairly simple. A criminal is looking to “carefully” on the Internet specific companies and corporations (victims of crime) and informed them in the next step, that of the business activities of such companies and corporations in the near future – first on the Internet then in other available mass media – numerous and very unfavorable information appears. At the same time, the criminals beat their future victims an effective means of reducing unnecessary difficulties and problems to escape the loss of good name and image of the company and corporate sector. These offenders are aware of that reputation, name and appearance of each company is a value in itself. It was therefore a value of what each company is prepared to pay any price. But the reason for difficulties and problems arising from the loss of good name and reputation result. The criminals and their victims are already aware that this loss is devastating consequences might have been the closing down of a particular business can enforce. It takes both to No as well as at large companies regard. The company is concerned that in virtually every industry in each country and cross-border activities sind.Das criminal procedure in the form of a blackmail on money, a fraud is becoming rapidly and globally, ie led cross-border and internationally. Among the victims of extortion, fraud is now looking both at home (domestic) and international corporations, the major emphasis on conservation, keeping and maintaining their reputation in the business according to their credibility lay. The criminals in the network have understood that maintaining an unassailable reputation and name of a company the unique ability to provide fast and easy enrichment forms. The above-mentioned criminal procedure is difficult to track because it is international in nature, and by overlapping or even nonexistent (fictional) professional and judicial persons in various countries and operated company wird.Diese offenders in the network publish it and disseminate false information about your victims on remote servers, which are not uncommon in many exotic countries. There are those countries in which serious gaps in the legal system, investigative and prosecution procedures are visible. As an example, at this point mention India werden. Mit criminals working in the network grid portals known leader of blogs with your seat-consciously or unconsciously, even in highly developed countries. For example, at this point, countries such as Germany, Austria, Switzerland, the United States, Britain, Spain or Portugal are mentioned. The below listed criminals were able to act unpunished today. As a symptom of such action appears here the activity and “effectiveness” of the company GOMOPA, which is on countries such as Germany, Switzerland, Austria, the United States, Britain, Spain and India. A good example of such an action is Mr. Klaus Mauri Chat – the leader and “brain” of the company GOMOPA with many already in force and criminal judgments “on his account”, which in this way for years and funded its maintenance in the industry almost unlimited activity. This status will change dramatically, however, including far and wide thanks to discontinued operations of the firm Meridian Capital Enterprises Ltd.. who would oppose such offenses addressed in the network. Other companies and corporations, in which the crime network and outside of this medium have fallen victim to contribute to combating such crimes bei.Die situation is changing, thanks to effective steps and the successful cooperation of the firm Meridian Capital Enterprises Ltd.. with the international police Interpol, with the federal agency (FBI) in the U.S., the Federal Criminal Police in Germany, with Scotland Yard in Britain, as well as with the Russian secret service FSB.Die Meridian Capital Enterprises Ltd.. – Together with other companies and cooperations, the victim of criminal activities of the network of crime have fallen – has undeniably already started to yield results. The fact that in recent weeks (November 2008) on the territory of the Federal Republic of Germany of the above-mentioned leaders and “brain” of the company GOMOPA, Mr Klaus Maurishat was arrested should not be ignored. The Meridian Capital Enterprises Ltd.. information available results clearly show that the next arrests of persons participating in this process in such countries as: Austria, Switzerland, Russia, Ukraine, Poland, Spain, Mexico, Portugal, Brazil, the USA, Canada, UK, Ireland , Australia, New Zealand and made in a.. The ultimate goal of Meridian Capital Enterprises Ltd.. and the other victims of crime in the network is to provide all participants in this criminal procedure before the competent court to lead. All professional and judicial persons, regardless of the seat and out of the business, which the above-described criminal action (fraud, extortion) to have fallen victim can of Meridian Capital Enterprises Ltd.. led company to join the goal set at all at this point the procedure described those associated in the public and the economic life out. II blacklist blackmail and with international fraudsters and their methods (opus operandi) in the following countries: 1 The Federal Republic Deutschland2. Dubai 3rd Russia 1st The Federal Republic of Germany GmbH GOMOPA, Goldman Morgenstern & Partners LLC., Goldman Morgenstern & Partners Consulting LLC, Wottle collection. In these firms are quite active following persons: – Klaus Mauri Chat ( “Father” and “brain” of the criminal organization responsible for countless final judgments have been achieved (arrested in Germany in November 2008) – Josef Rudolf Heckel ( “right hand “when Mr Klaus Mauri chat, denounced former banker who is excessive in many Bankschmuggeleien was involved.
The study of 900 pages named Toxdat by Ehrenfried Stelzer is the “Stasi Killer Bible”. It lists all kind of murder methods and concentrates on the most effective and untraceable.
“The toxdat study was ordered by Stasi Vice-President Gerhard Neiber, the second man in rank after boss Erich Mielke. The toxdat study was also the theoretical “story book” for the murder of the famous German watchdog and journalist Heinz Gerlach by former Stasi member under the guidance of “GoMoPa”,” an informer stated. “Ehrenfried stelzer” was nicknamed “Professor Murder” by his victims. Even close co-worker now compare him with the German SS”doctor” Mengele, “Dr. Death” from Auschwitz.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.
For more Information the victims have launched a new site: http://www.victims-opfer.com
The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.
German authorities are under growing pressure to reopen investigations into at least a dozen suspicious deaths after the arrest of an alleged East German assassin cast new light on the communist regime. Stasi victims quoted a source saying “isolated units” had conducted operations that were “extremely well organised” and had “100 per cent logistical support” from the East German state.
A statement from prosecutors read: “The accused [Jurgen G] is suspected, as a member of a commando of the former DDR, of killing a number of people between 1976 and 1987 who from the point of view of the DDR regime had committed treason or were threatening to do so.”
Details of his Jurgen G’s arrest have been described in suitably florid terms, with the mass circulation tabloid Bild saying he was working at the Wolfsbruch marina near Rheinsberg in north-eastern Germany when a woman approached him. “Excuse me, is that your yellow Trabant in the car park? I just ran into it with my car,” she is said to have asked.
When he followed her to the car park, masked officers jumped out of vans and bushes and overpowered him in an operation worthy of the Stasi itself.
An eyewitness told Bild: “They blindfolded him and raced off in an unmarked car.”
Police across Germany are reported to be sifting through files to see who the victims may have been, and some intelligence officers are greeting the arrest of Jurgen G as a breakthrough.
Thomas Auerbach, who works for the Stasi file authority in Berlin and has written a book based on the death squad files, said: “These people were trained to make such murders look like accidents or suicides, even as ‘ordinary’ crimes such as robberies. They were real terror experts.”
The cases said to be linked to Jurgen G or his unit include many people involved with the commercial arm of the East German ruling socialist party, the SED (Socialist Unity Party).
Uwe Harms, the head of a Hamburg-based haulage firm which was part of a network of companies secretly owned by the SED, disappeared in March 1987 after conversations with various DDR functionaries. Six weeks later, his body was found in a plastic bag.
Weeks before his death he told friends that he felt he was being followed. After reunification, one of the other SED company heads said Mr Harms had been liquidated for refusing to allow his firm to be used to transport arms into East Germany.
Dieter Vogel, a businessman who had been jailed for life for spying for the CIA, was found suffocated in his cell in the East German prison Bautzen on March 9, 1982. The fact that he was due to be taken to the West in a spy swap arrangement just a few weeks later cast doubt on the suicide theory.
He had passed the names of several Stasi moles to the BND, West Germany’s heavily penetrated counter-intelligence service.
The Christian Democrat Union politician Uwe Barschel, 43, was found dead by magazine reporters in his bathtub in a hotel room in Geneva in October, 1987. He died of poisoning, but rumours that he was involved somehow in arms deals and the Stasi have clung to the case.
One of the more high-profile and enduring mysteries is that of Lutz Eigendorf, an East German footballer from the Stasi-backed Dynamo Berlin.
He fled to the West in 1979 amid great publicity. Four years later, he died after crashing his car into a tree on a straight stretch of road with blood alcohol levels way over the limit. Witnesses who had seen him earlier in the evening said he had not been drinking.
Most controversial though is the suggestion that the assassination squad was linked to the murder of a Swedish television reporter and her friend in 1984.
Cats Falk and her friend Lena Graens went missing on Nov 19, 1984. Their bodies were fished out of a Stockholm canal six months later.
Reports suggested a three-man assassination squad killed them, spiking their drinks with drugs, putting them into their car and pushing it into the Hammarby canal.
Shortly before her death, Cats Falk had reportedly uncovered a deal between an arms dealer and an East German firm.
Germany has recently undergone a wave of nostalgia for all things East German, dubbed Ostalgie, with colourful television shows featuring former DDR stars such as the ice skater Katerina Witt talking wistfully about socialist pop music.
A reassessment may be coming in the wake of the revelations.
Victims: The DDR-STASI MURDER GANG “GoMOPa” in murderoplot against Joerg Berger
The Stasi Murder Gang of „GoMoPa“ was involved in many trials to kill the popular East German soccer trainer Joerg Berger, Stasi victims tell in postings on their hompage http://www.sjb-fonds-opfer.com. Berger stated before his early death in his biography that they tried to pollute him with arsenic.
Arsenic and many of its compounds are especially potent poisons. Many water supplies close to mines are contaminated by these poisons. Arsenic disrupts ATP production through several mechanisms. At the level of the citric acid cycle, arsenic inhibits lipoic acid which is a cofactor for pyruvate dehydrogenase; and by competing with phosphate it uncouples oxidative phosphorylation, thus inhibiting energy-linked reduction of NAD+, mitochondrial respiration and ATP synthesis. Hydrogen peroxide production is also increased, which might form reactive oxygen species and oxidative stress. These metabolic interferences lead to death from multi-system organ failure, probably from necrotic cell death, not apoptosis. A post mortem reveals brick red coloured mucosa, owing to severe haemorrhage. Although arsenic causes toxicity, it can also play a protective role.[
Elemental arsenic and arsenic compounds are classified as “toxic” and “dangerous for the environment” in the European Union under directive 67/548/EEC. The International Agency for Research on Cancer (IARC) recognizes arsenic and arsenic compounds as group 1 carcinogens, and the EU lists arsenic trioxide, arsenic pentoxide and arsenate salts as category 1 carcinogens.
Arsenic is known to cause arsenicosis owing to its manifestation in drinking water, “the most common species being arsenate [HAsO42- ; As(V)] and arsenite [H3AsO3 ; As(III)]”. The ability of arsenic to undergo redox conversion between As(III) and As(V) makes its availability in the environment more abundant. According to Croal, Gralnick, Malasarn and Newman, “[the] understanding [of] what stimulates As(III) oxidation and/or limits As(V) reduction is relevant for bioremediation of contaminated sites (Croal). The study of chemolithoautotrophic As(III) oxidizers and the heterotrophic As(V) reducers can help the understanding of the oxidation and/or reduction of arsenic.
Treatment of chronic arsenic poisoning is easily accomplished. British anti-lewisite (dimercaprol) is prescribed in dosages of 5 mg/kg up to 300 mg each 4 hours for the first day. Then administer the same dosage each 6 hours for the second day. Then prescribe this dosage each 8 hours for eight additional days. However the Agency for Toxic Substances and Disease Registry (ATSDR) states that the long term effects of arsenic exposure cannot be predicted. Blood, urine, hair and nails may be tested for arsenic, however these tests cannot foresee possible health outcomes due to the exposure. Excretion occurs in the urine and long term exposure to arsenic has been linked to bladder and kidney cancer in addition to cancer of the liver, prostate, skin, lungs and nasal cavity.[
Occupational exposure and arsenic poisoning may occur in persons working in industries involving the use of inorganic arsenic and its compounds, such as wood preservation, glass production, nonferrous metal alloys and electronic semiconductor manufacturing. Inorganic arsenic is also found in coke oven emissions associated with the smelter industry.
THE DDR GESTAPO-STASI MURDER GANG responsable for the murder of Lutz Eigendorf
The talented Eigendorf played for East German side Dynamo Berlin.
He made his debut for the GDR in an August 1978 match against Bulgaria, immediately scoring his first two goals in a 2–2 draw. He went on to collect six caps, scoring three goals.[1] His final international was a February 1979 friendly match against Iraq.
On 20 March 1979, after a friendship match between Dynamo and West German club 1. FC Kaiserslautern in Gießen he fled to the west hoping to play for that team. But because of his defection he was banned from play for one year by UEFA and instead spent that time as a youth coach with the club.
This was not the first time an East German athlete had fled to the west, but it was a particularly embarrassing defection. Eigendorf’s club Dynamo was under the patronage of the Stasi, East Germany’s secretive state police, and subject to the personal attentions of the organisation’s head, Erich Mielke. He ensured that the club’s roster was made up of the country’s best players, as well as arranging for the manipulation of matches in Dynamo’s favour. After his defection Eigendorf openly criticised the DDR in the western media.
His wife Gabriele remained behind in Berlin with their daughter and was placed under constant police surveillance. Lawyers working for the Stasi quickly arranged a divorce and the former Frau Eigendorf re-married. Her new husband was eventually revealed as a Lothario – an agent of the state police whose role it was to spy on a suspect while romancing them.
In 1983 Eigendorf moved from Kaiserslautern to join Eintracht Braunschweig, all the while under the scrutiny of the Stasi who employed a number of West Germans as informants. On 5 March that year he was badly injured in a suspicious traffic accident and died within two days. An autopsy indicated a high blood alcohol level despite the testimony of people he had met with that evening indicating that Eigendorf had only a small amount of beer to drink.
After German re-unification and the subsequent opening of the files of the former East Germany’s state security service it was revealed that the traffic accident had been an assassination attempt orchestrated by the Stasi, confirming the longtime suspicions held by many. A summary report of the events surrounding Eigendorf’s death was made on German television on 22 March 2000 which detailed an investigation by Heribert Schwan in the documentary “Tod dem Verräter” (“Death to the Traitor”).
On 10 February 2010, a former East German spy revealed the Stasi ordered him to kill Eigendorf, which he claimed not to have done
MfS has been accused of a number of assassinations against political dissidents and other people both inside and outside the country. Examples include the East German football player Lutz Eigendorf and the Swedish journalist Cats Falck.
The terrorists who killed Alfred Herrhausen were professionals. They dressed as construction workers to lay a wire under the pavement of the road along Mr. Herrhausen’s usual route to work. They planted a sack of armor-piercing explosives on a parked bicycle by the roadside. An infrared beam shining across the road triggered the explosion just when the limousine, one of three cars in a convoy, sped by.
The operation, from the terrorists’ point of view, was flawless: Mr. Herrhausen, the chairman of one of Europe’s most powerful companies, Deutsche Bank, was killed in the explosion along that suburban Frankfurt road on Nov. 30, 1989.
But was everything what it seemed?
Within days, the Red Army Faction — a leftist terrorist group that had traumatized West Germany since 1970 with a series of high-profile crimes and brazen killings of bankers and industrialists — claimed responsibility for the assassination. An intense manhunt followed. In June 1990, police arrested 10 Red Army Faction members who had fled to East Germany to avoid arrest for other crimes. To the police’s surprise, they were willing to talk. Equally confounding to authorities: All had solid alibis. None was charged in the Herrhausen attack.
Now, almost two decades later, German police, prosecutors and other security officials have focused on a new suspect: the East German secret police, known as the Stasi. Long fodder for spy novelists like John le Carré, the shadowy Stasi controlled every aspect of East German life through imprisonment, intimidation and the use of informants — even placing a spy at one point in the office of West German Chancellor Willy Brandt.
According to documents reviewed by The Wall Street Journal, the murders of Mr. Herrhausen and others attributed to the Red Army Faction bear striking resemblance to methods and tactics pioneered by a special unit of the Stasi. The unit reported to Stasi boss Erich Mielke and actively sought in the waning years of the communist regime to imitate the Red Army Faction to mask their own attacks against prominent people in Western Germany and destabilize the country.
“The investigation has intensified in recent months,” said Frank Wallenta, a spokesman for the Federal Prosecutor. “And we are investigating everything, including leads to the Stasi.”
If those leads turn out to be true, it would mean not only rewriting some of the most dramatic episodes of the Cold War, but would likely accelerate a broader soul-searching now under way in Germany about the communist past.
In building a reunified country, many Germans have ignored discussion of the brutal realities of its former communist half. When the former East Germany is discussed, it’s often with nostalgia or empathy for brothers hostage to Soviet influence.
Stasi boss Erich Mielke, middle, with unnamed associates
That taboo is slowly being broken. Last year’s Oscar-winning movie, “The Lives of Others,” chronicled in dark detail a Stasi agent’s efforts to subvert the lives of ordinary people. Material in the Stasi archives shows that senior leaders had a shoot-to-kill order against those fleeing from East to West — a controversial order that contradicts East German leaders’ claims that they never ordered any shootings.
This story is based on more than a dozen interviews with police, prosecutors and other security officials. Several policemen and prosecutors confirmed that the allegation of extensive Stasi involvement with the Red Army Faction is a key part of the current investigation.
Court cases in West Germany in the 1990s established that members of the Red Army Faction were granted free passage to other countries in the 1970s and refuge in East Germany in the 1980s. But the current investigation and documents from Stasi archives suggest far deeper involvement — that members of the Red Army Faction were not only harbored by the Stasi but methodically trained in sophisticated techniques of bombing and murder.
Traudl Herrhausen, Mr. Herrhausen’s widow, is one of those pushing for further investigation. She says she long suspected involvement by the Stasi or other intelligence service such as the KGB, but never spoke publicly because she didn’t have evidence and didn’t want to interfere in the investigation. She says she is now breaking an 18-year silence in her desire to see justice done. “Now I want to look my husband’s killers in the eye,” she said in an interview.
The Red Army Faction was founded about 1970 by a band of leftists who justified their terrorism based on opposition to West Germany’s ruling elite. Killing members of this elite would provoke the West German state to take repressive measures that would show its true fascist face, Red Army Faction leaders believed.
In its early years, the group, also known as the Baader-Meinhof band, made headlines with prison breaks, bank robberies, bomb attacks and deadly shootouts. Four gang members led by Ulrike Meinhof freed Red Army Faction leader Andreas Baader from a Berlin jail a month after his arrest.
Red Army Faction violence in West Germany intensified in 1977 when Jürgen Ponto, then head of Dresdner Bank, was shot and killed at his home. Five weeks later, the group killed four people and abducted the chairman of the German employer association, Hans-Martin Schleyer, one of West Germany’s most prominent businessmen. It was the start of a six-week ordeal in which neither government nor terrorists would compromise. To support the Red Army Faction cause, Palestinian terrorists hijacked a Lufthansa jet in Spain, forcing it to land in Mogadishu, Somalia. After the plane was rushed by West German commandos, top Red Army Faction leaders in West Germany committed suicide and Mr. Schleyer was executed by his captors.
Red Army Faction violence began to abate in the late 1970s after the Lufthansa incident. Many in Germany thought the group — whose attacks were often crude — lost its will to kill after the arrest of its senior leaders in 1982. So when the group appeared to renew its terror campaign with a series of high-profile attacks in 1985, police were stunned by the level of their sophistication and determination.
This time, the group dazzled police with its ability to hit targets and leave little substantial evidence behind. They used high-tech devices no one thought they possessed. Their marksmen killed with military precision.
Weapons used by terrorists during the 1977 kidnapping of German industrialist Hanns-Martin Schleyer.
Surprisingly, members of the Red Army Faction so-called third generation had a policeman’s understanding of forensic science. From 1985 onward, the Red Army Faction rarely left a fingerprint or other useful piece of evidence at a crime scene, according to court records. The murder cases from this era are still open. Some suspected Stasi involvement, but no one could ever prove it, according to a senior police official.
The 1989 car-bomb murder of Mr. Herrhausen particularly stunned police with its audacity and sophistication. Mr. Herrhausen was the head of Deutsche Bank, Germany’s largest bank. He was part of the political-business elite that helped turn West Germany from a war-ravaged rump state into an economic powerhouse — all while East Germany languished in frustration. Mr. Herrhausen was a vocal proponent of a united Germany.
In November 1989, Mr. Herrhausen was following the fall of the Berlin wall and events in the Soviet Union closely, conferring frequently with Mikhail Gorbachev, according to his wife and friends. Then on Nov. 27, Mr. Herrhausen announced a plan to acquire the investment banking firm Morgan Grenfell — at the time a record-breaking bank acquisition.
Also during November, a spot along Mr. Herrhausen’s usual route to work was closed because of construction. Terrorists, dressed as construction workers, laid an electric wire under the road’s pavement. On Nov. 29, the stretch reopened.
On the morning of Nov. 30, like every workday morning, Mr. Herrhausen stepped into his limousine at about 8:30. Mr. Herrhausen’s driver waited about one minute to allow the first of the three-car entourage to drive ahead and survey the road.
“It was the route they hadn’t used in weeks,” Mrs. Herrhausen said.
As Mr. Herrhausen sped down the road, a team of terrorists waited. Beside the road, a parked bicycle held a sack of armor-piercing explosives. The detonator was connected by the electric wire under the road to a trigger activated by an interruption in an infrared beam shining across the road.
A terrorist activated the detonator after the first car of bodyguards drove past the bomb. Mr. Herrhausen died at the scene.
As they had during previous attacks, police set up dragnets to round up Red Army Faction cadre. But the June 1990 arrests of 10 members of the group who had earlier been granted political asylum in East Germany produced no leads. All the seized Red Army Faction members had solid alibis.
In July 1991, prosecutors believed they had a breakthrough when an informant claimed he had allowed two members of the Red Army Faction to stay at his home near the Herrhausen residence. Prosecutors followed that trail 13 years before dropping charges in 2004.
Frustrated with the inability of prosecutors to solve the Herrhausen case and believing that prosecutors were ignoring other leads including possible Stasi involvement, German officials replaced the prosecutor overseeing the case.
Police acknowledge that part of the reason for their focus on possible Stasi involvement was that all other leads had dried up. But they say they also knew that over the years the Stasi had worked with and given explosives to other terrorists, including “Carlos the Jackal” and the Basque group ETA in Spain. And in 2001 to 2003, an undercover police officer met with a man who claimed he had been a killer for the Stasi operating in Western Germany, although police were never able to tie him to specific murders.
German investigators turned their attention to Wartin, a small eastern German village nestled in yellow-brown fields of grain near the Polish border. Today, sheep graze in a field spotted with wooden posts.
In the 1980s, however, Wartin was home to the Stasi’s AGM/S — “Minister Working Group/Special Operations.” It got its name because it reported to Mr. Mielke, the minister who headed the Stasi for almost all of East Germany’s 40-year history.
The Wartin unit’s peacetime duties included the kidnapping and murder of influential people in the West, according to Stasi records reviewed by The Wall Street Journal in the Stasi archives in Berlin.
The documents say the unit’s activities included “intimidating anti-communist opinion leaders” by “liquidation,” and “kidnapping or hostage taking, connected with the demand that political messages be read,” according to a description of the unit’s activities written by a senior Wartin official in 1982.
Based on these documents, German investigators increasingly believe that the Stasi played a more active role than previously believed in Red Army Faction terrorism. After years of not being able to draw parallels between the Stasi unit in Wartin and the Red Army Faction killings, police are now focusing closely on such a link. Joachim Lampe, who assisted the successful prosecution of the first wave of Red Army Faction terrorists up until 1982 and was then assigned to prosecute Stasi-related crimes in West Germany, says it’s time to compare the activities of Wartin with the activities of the Red Army Faction to see where they overlap. “It is an important line of investigation,” he said.
A year after the Red Army Faction’s first generation collapsed in 1972, an internal Wartin report said cooperation with terrorists is possible if the individuals could be trusted to maintain secrecy and obey orders. Initial contacts, however, may not have taken place until later in the decade. Disillusionment gripped many of the terrorists living on the lam, according to court records citing witness statements by accused terrorists. Beginning about 1980, the Stasi granted refuge to 10 members of the Red Army Faction in East Germany and gave them assumed identities.
The Stasi sympathized with the anti-capitalist ideals of the Red Army Faction, but Stasi leaders were concerned about placing their trust in a group of uncontrollable leftist militants, a review of Stasi records shows. Stasi officials did not want to tarnish East Germany’s international reputation, so they toyed with different concepts for cooperation with terrorist groups, according to a prosecutor who has investigated Stasi involvement with terrorism.
One suggestion, contained in a document prepared for new officers assigned to the unit, was to emulate Romanian intelligence, which successfully worked with the terrorist “Carlos” to bomb the Radio Free Europe office in Munich, Germany, in 1981. To assist in such operations, the Wartin unit developed highly specialized explosives, poisons and miniature firearms.
About 1980 the Stasi also proposed a second strategy: instead of using a terrorist group directly — such cooperation always contained risk of discovery — they could simply execute attacks so similar to those of known terrorists that police would never look for a second set of suspects, according to Wartin records. The Wartin leadership called this strategy the “perpetrator principle,” according to Stasi records. The unit’s progress in implementing the steps to imitate terrorist attacks is described in a series of progress reports by Wartin officials between 1980 and 1987.
In September 1981, Red Army Faction terrorists attempted to kill U.S. Gen. James Kroesen in Heidelberg, Germany, shooting a bazooka at his car. About the same time, members of the same Red Army Faction team visited East Germany, where they were asked by the Stasi to shoot a bazooka at a car containing a dog. The dog died, according to court records.
In Wartin, officials wrote up a detailed description of the Red Army Faction members’ re-enactment of the Kroesen attack. “It is important to collect all accessible information about the terrorist scene in imperialist countries, to study and analyze their equipment, methods and tactics, so we can do it ourselves,” a senior Wartin official wrote in February 1982, according to the report.
In 1982, West German police discovered two troves of Red Army Faction weapons and documents buried in German forests. Three terrorists, including Red Army Faction leader Christian Klar, were arrested when they approached the sites. The troves were buried in locations easy to find at night, a tactic used by Wartin’s own agents to store operational equipment in West Germany, according to an investigator who viewed the troves and Stasi records.
That same year, a Wartin official described the staged bombing of a moving vehicle. According to the report, several Stasi officers shed “tears of joy” when electronic sensors detected the approaching car and ignited the detonator.
A spokesman at Germany’s federal police investigative agency, the equivalent of the U.S. Federal Bureau of Investigation, declined to comment on the close similarity between the detonator used in the demonstration and the device that killed Mr. Herrhausen, saying this is part of their investigation.
Wartin officers continued their preparations for imitating terrorist attacks in West Germany, according to a 1985 internal Wartin report. They created a special archive profiling the characteristics of known terrorists and terrorist groups, and taught staff members to execute nearly identical attacks, according to Stasi records. Each year, the unit’s officers detailed the unit’s success in teaching these techniques in their annual reports, according to the reports.
Then, in 1987, the AGM/S stopped offensive operations. The unit was disbanded.
Werner Grossmann, a former three-star Stasi General and former head of foreign intelligence operations, says the AGM/S was responsible for planning attacks in West Germany, but was dissolved “because it didn’t produce results.” Mr. Grossmann assumed control of part of the AGM/S after most of the unit was dissolved.
Mr. Grossmann says he took control of part of the AGM/S because he wanted to run intelligence operations against West Germany’s civil defense infrastructure.
“I refused to have anything to do with terrorism and terrorists,” Mr. Grossmann said in an interview. He said he didn’t have any influence over the AGM/S activities before 1987 and wasn’t informed about the unit’s activities before it came under his control.
Olaf Barnickel, a career Stasi officer who served at Wartin, says his unit planned murders in West Germany, but never committed one. “It was all theory and no practice,” Mr. Barnickel said in an interview.
But some German police are unpersuaded. They believe the seeds may have been planted for future violent attacks.
In November 1989, as East Germany disintegrated, groups of citizens forced their way into Stasi installations, seizing control. In Wartin, a local church minister led a group of demonstrators to the main entrance of the Stasi base. The base closed.
Within the Stasi as a whole, the chain of command began to disintegrate. Links to organizations in West Germany, including the Red Army Faction, were broken.
Sixteen months after Mr. Herrhausen’s murder, the Red Army Faction claimed its last victim, killing Detlev Karsten Rohwedder, the head of the Treuhandanstalt, the powerful trust that controlled most state-owned assets in the former East Germany and was overseeing their privatization. Mr. Rohwedder was killed while he was standing by the window of his house in Düsseldorf.
The murder was performed by a trained sharpshooter, according to a police official familiar with the investigation. The Stasi trained members of the Red Army Faction in sharpshooting skills and had its own teams of sharpshooters, according to witness statements by Stasi officials to a Berlin prosecutor and Stasi records.
In 1998, the Red Army Faction issued the last of its communiques, announcing it was disbanding. German police attribute the group’s disappearance to changing times, which made the group seem a relic of the past. Indeed, the Red Army Faction today is largely seen by the German public as part of the social upheaval that plagued West Germany in the 1970s and 1980s. More than one in four Germans consider former Red Army Faction members to have been misguided idealists. More than half now think the investigations should be closed for good in the coming decade when the current group of Red Army Faction prisoners finish serving their prison sentences.
German prosecutors say their investigation of the Stasi’s role is continuing.
Since last month, Mrs. Herrhausen has been in contact with the next of kin of victims in the other unsolved Red Army Faction murder cases, looking for support to push the investigation. The bomb that killed her husband nearly 18 years ago exploded soon after he left for work, within earshot of their home in suburban Frankfurt.
“I still hear that bomb every day,” she says.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.
The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.
The name of Benno Ohnesorg became a rallying cry for the West German left after he was shot dead by police in 1967. Newly discovered documents indicate that the cop who shot him may have been a spy for the East German secret police.
It was one of the most important events leading up to the wave of radical left-wing violence which washed over West Germany in the 1970s. On the evening of June 2, 1967, the literature student Benno Ohnesorg took part in a demonstration at West Berlin’s opera house. Mohammad Reza Pahlavi, the shah of Iran, was to attend and the gathered students wanted to call attention to his brutal regime.
The protests, though, got out of hand. Pro-shah demonstrators, some of them flown in from Iran for the occasion, battled with the student protestors. West Berlin police also did their part, brutally beating back the crowd. At 8:30 p.m., a shot was fired, and a short time later the 26-year-old Ohnesorg, having been hit in the back of the head, became the left wing’s first martyr.
Now, though, the history of the event may have to be re-written. New documents discovered in the Stasi archive — the vast collection of files left behind by the East German secret police — reveal that the policeman who shot Ohnesorg, Karl-Heinz Kurras, could in fact have been a spy for East Germany’s communist regime.
In an article that will appear in late May in Deutschlandarchiv, a periodical dedicated to the ongoing project of German reunification, Helmut Müller-Enbergs and Cornelia Jabs reveal that documents they found in the Stasi papers show that Kurras began working together with the Stasi in 1955. He had wanted to move to East Berlin to work for the East German police. Instead, he signed an agreement with the Stasi to remain with the West Berlin police force and spy for the communist state.
As a result of the new information, criminal charges have once again been filed against Kurras, who was acquitted twice, once in 1967 and again in 1970, of negligent homicide charges related to Ohnesorg’s death. Kurras told the Berlin paper Tagesspiegel on Friday that he had never worked together with the Stasi.
But in addition to finding the agreement between Kurras and the Stasi, the two researchers also discovered numerous documents indicating that the East Germans were pleased with the information Kurras passed along — particularly given that he was posted to a division responsible for rooting out moles within the West German police force.
Immediately after Ohnesorg’s death, Kurras received a Stasi communication ordering him to destroy his records and to “cease activities for the moment.” Kurras responded with his acquiescence and wrote “I need money for an attorney.”
The exact circumstances surrounding the death of Ohnesorg have never been completely clarified. Kurras himself, now 81, gave conflicting versions of the story during the investigation but the official version has long been that Kurras fired in self defense. Many others point to witness accounts whereby the police were beating Ohnesorg when the shot was fired.
It is still unclear how the new evidence might play into history’s understanding of the tragic event. The day was one full of violence, with demonstrators and police battling each other with pipes, wooden clubs and stones. Police were further incited by rumors that an officer had been stabbed earlier in the evening. Ohnesorg himself, however, was not directly involved in the violence.
West Berlin in the 1960s and 70s became a focal point of German left wing radicalism. The city had long been left-leaning, and the fact that Berliners were exempt from military service meant that it became a magnate for pacifists and anti-state activists.
Ohnesorg’s death gave them an immediate rallying cry. As the left-wing movement became more radical, many justified their violent activities by pointing to the police brutality that led to the student’s death. A letter written by Ulrike Meinhof announcing the founding of the Red Army Faction, which appeared in SPIEGEL in the fall of 1967, explicitly mentioned the Ohnesorg incident. The RAF went on to terrorize Germany for decades, ultimately killing over 30 people across the country. The radical “June 2 Movement” used the date of the incident in its name.
Kurras, for his part, seems to have been a highly valued Stasi agent. In his files, it is noted that “he is prepared to complete any task assigned to him.” It also mentions that he is notable for having the “courage and temerity necessary to accomplish difficult missions.”
Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.
The serial betrayer and cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.
On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica
The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention ofGoogle Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011
In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelznr, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror
The Stasi murder:
„GoMoPa“ & Backers: Blackmailing, Extortion, Racketeering, Internet Murder and Murder. These are the weapons of the East-German “NACHRICHTENDIENST” “GoMoPa”, a renegate confesses.
Deep Throat, Berlin; confesses: „Since months the „GoMoPa“ keyfigures like Klaus-Dieter Maurischat< are in hide-aways because the German police is hunting them for the wirecard fraud and a lot of other criminal actions. I left the group when I noticed that. The found and former Stasi-Colonel Ehrenfried Stelzer died under strange circumstances in Berlin. This has been told to us. But it is also possible that his death was staged. In any case the criminal organization of “GoMoPa” is responsible for the murder of Heinz Gerlach by dioxin. Now my life is also in danger that is why I hide myself.”
According to Deep Throat, Hans J. the murder was done with the help of the old Stasi-connections of the “NACHRICHTENDIENST” “GoMoPa”.
The renegate says that computer hacker Thomas Promny and Sven Schmidt are responsible for the computer crimes and he states that the crime organization of “GoMoPa” has also helpers inside internet companies like Go-Daddy, Media-on and even in Google, Hamburg..
THE “NACHRICHTENDIENST”:New criminal police action against “GoMoPa”:
German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground.
On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the
Encyclopedia – Britannica
The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is
ST/0148943/2011
Stasi-Dioxin: The “NACHRICHTENDIENST” searching for the perfect murder:
Viktor Yushchenko was running against Prime Minister Viktor Yanukovych. Yanukovych was a political ally of outgoing president Leonid Kuchma. Kuchma’s administration depended upon corruption and dishonesty for its power. Government officials ruled with a sense of terror rather than justice. For the powerful and wealthy few, having Yanukovych elected president was important. Should Yushchenko win, Ukraine’s government was sure to topple. Yushchenko’s campaign promises included a better quality of life for Ukrainians through democracy. His wife, Katherine, told CBS in a 2005 interview, “He was a great threat to the old system, where there was a great deal of corruption, where people were making millions, if not billions.”
On September 6, 2004, Yushchenko became ill after dining with leaders of the Ukrainian secret police. Unlike other social or political engagements, this dinner did not include anyone else on Yushchenko’s team. No precautions were taken regarding the food. Within hours after the dinner, Yushchenko began vomiting violently. His face became paralyzed; he could not speak or read. He developed a severe stomachache and backache as well as gastrointestinal pain. Outwardly, Yushchenko developed what is known as chloracne, a serious skin condition that leaves the face scarred and disfigured.
By December 2004, doctors had determined that Yushchenko had been the victim of dioxin poisoning. Dioxin is a name given to a group of related toxins that can cause cancer and even death. Dioxin was used in the biochemical weapon called Agent Orange during the Vietnam War controversial war in which the United States aidedSouth Vietnam in its fight against a takeover by Communist North Vietnam). Yushchenko had a dioxin level six thousand times greater than that normally found in the bloodstream. His is the second-highest level ever recorded.
Yushchenko immediately suspected he had been poisoned, though Kuchma’s camp passionately denied such allegations. Instead, when Yushchenko showed up at a parliamentary meeting shortly after the poisoning incident, Kuchma’s men teased him, saying he must have had too much to drink or was out too late the night before.
Dioxin can stay in the body for up to thirty-five years. Experts predict that his swelling and scars will fade but never completely disappear. John Henry, a toxicologist at London’s Imperial Hospital, told RedNova.com, “It’ll be a couple of years, and he will always be a bit pockmarked. After damage as heavy as that, I think he will not return to his film star looks.” And Yushchenko will live with the constant threat of cancer.
At first it was believed the poison must have come from a Russian laboratory. Russia was a strong supporter of Kuchma and lobbied against Yushchenko in the 2004 election. But by July 2005, Yushchenko’s security forces were able to trace the poison to a lab in Ukraine. Though not entirely ruling out Russia’s involvement, Yushchenko is quoted on his Web site as saying “I’m sure that even though some people are running from the investigation, we will get them. I am not afraid of anything or anybody.”
Evidence shows that such a perfect murder plotted by former Stasi agents is the cause of the death of German watchdog and journalist Heinz Gerlach.
The Ministry for State Security (German: Ministerium für Staatssicherheit (MfS), commonly known as the Stasi (IPA: [‘?tazi?]) (abbreviation German: Staatssicherheit, literally State Security), was the official state security service of East Germany. The MfS was headquartered in East Berlin, with an extensive complex in Berlin-Lichtenberg and several smaller facilities throughout the city. It was widely regarded as one of the most effective and repressive intelligence and secret police agencies in the world. The MfS motto was “Schild und Schwert der Partei” (Shield and Sword of the Party), that is the ruling Socialist Unity Party of Germany (SED).
According to the confessions of an informer, Berlin lawyer Jochen Resch writes most of the “articles” of the communist “STASI” agency “GoMoPa” himself or it is done by lawyers of his firm. The whistleblower states that lawyer Resch is the mastermind behind the “CYBER-STASI” called “NACHRICHTENDIENST” “GoMoPa”. Bizarre enough they use Jewish names of non-existing Jewish lawyers by the name of “Goldman, Morgenstern and Partner” to stage their bogus “firm”. Further involved in their complots are a “detective” Medard Fuchsgruber and “STASI”-Colonel Ehrenfried Stelzer, “the first crime expert” in the former communist East-Germany.
According to London based Meridian Capital hundreds and thousands of wealthy people and companies have paid to the “NACHRICHTENDIENST” to avoid their cyberstalking (see article below).
Finally the German criminal police started their investigations (case number ST/0148943/2011).
The “NACHRICHTENDIENST” is also involved in the death of the well-known German watchdog and journalist Heinz Gerlach who died under strange circumstances in July 2010.
Only hours after his death the “NACHRICHTENDIENST” was spreading the news that Mr Gerlach died of blood pollution and set the stage for a fairy tale. Months before his death the “NACHRICHTENDIENST” started a campaign to ruin his reputation and presumably was also responsable for cyberattacks to bring his website down. In fact they presumably used the same tactics also against our servers. Therefore we investigated all internet details of them and handed the facts to the FBI and international authorities.
Story background:
Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.
The serial betrayer and cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.
On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica
The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011
In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment section.
-”Worse than the Gestapo.” —Simon Wiesenthal, Nazi hunter said about the notorious “Stasi”.
Less than a month after German demonstrators began to tear down the Berlin Wall on November 9, 1989, irate East German citizens stormed the Leipzig district office of the Ministry for State Security (MfS)—the Stasi, as it was more commonly called. Not a shot was fired, and there was no evidence of “street justice” as Stasi officers surrendered meekly and were peacefully led away. The following month, on January 15, hundreds of citizens sacked Stasi headquarters in Berlin. Again there was no bloodshed. The last bit of unfinished business was accomplished on May 31 when the Stasi radioed its agents in West Germany to fold their tents and come home.
The intelligence department of the Nationale Volksarmee (NVA), the People’s Army, had done the same almost a week earlier, but with what its members thought was better style. Instead of sending the five-digit code groups that it had used for decades to message its spies in West Germany, the army group broadcast a male choir singing a children’s ditty about a duck swimming on a lake. There was no doubt that the singing spymasters had been drowning their sorrow over losing the Cold War in schnapps. The giggling, word-slurring songsters repeated the refrain three times: “Dunk your little head in the water and lift your little tail.” This was the signal to agents under deep cover that it was time to come home.
With extraordinary speed and political resolve, the divided nation was reunified a year later. The collapse of the despotic regime was total. It was a euphoric time for Germans, but reunification also produced a new national dilemma. Nazi war crimes were still being tried in West Germany, forty-six years after World War II. Suddenly the German government was faced with demands that the communist officials who had ordered, executed, and abetted crimes against their own people—crimes that were as brutal as those perpetrated by their Nazi predecessors—also be prosecuted.
The people of the former Deutsche Demokratische Republik (DDR), the German Democratic Republic, as the state had called itself for forty years, were clamoring for instant revenge. Their wrath was directed primarily against the country’s communist rulers—the upper echelon of the Sozialistische Einheitspartei (SED), the Socialist Unity Party. The tens of thousands of second-echelon party functionaries who had enriched themselves at the expense of their cocitizens were also prime targets for retribution.
Particularly singled out were the former members of the Stasi, the East German secret police, who previously had considered themselves the “shield and sword” of the party. When the regime collapsed, the Stasi had 102,000 full-time officers and noncommissioned personnel on its rolls, including 11,000 members of the ministry’s own special guards regiment. Between 1950 and 1989, a total of 274,000 persons served in the Stasi.
The people’s ire was running equally strong against the regular Stasi informers, the inoffizielle Mitarbeiter (IMs). By 1995, 174,000 had been identified as IMs, or 2.5 percent of the total population between the ages of 18 and 60. Researchers were aghast when they found that about 10,000 IMs, or roughly 6 percent of the total, had not yet reached the age of 18. Since many records were destroyed, the exact number of IMs probably will never be determined; but 500,000 was cited as a realistic figure. Former Colonel Rainer Wiegand, who served in the Stasi counterintelligence directorate, estimated that the figure could go as high as 2 million, if occasional stool pigeons were included.
“The Stasi was much, much worse than the Gestapo, if you consider only the oppression of its own people,” according to Simon Wiesenthal of Vienna, Austria, who has been hunting Nazi criminals for half a century. “The Gestapo had 40,000 officials watching a country of 80 million, while the Stasi employed 102,000 to control only 17 million.” One might add that the Nazi terror lasted only twelve years, whereas the Stasi had four decades in which to perfect its machinery of oppression, espionage, and international terrorism and subversion.
To ensure that the people would become and remain submissive, East German communist leaders saturated their realm with more spies than had any other totalitarian government in recent history. The Soviet Union’s KGB employed about 480,000 full-time agents to oversee a nation of 280 million, which means there was one agent per 5,830 citizens. Using Wiesenthal’s figures for the Nazi Gestapo, there was one officer for 2,000 people. The ratio for the Stasi was one secret policeman per 166 East Germans. When the regular informers are added, these ratios become much higher: In the Stasi’s case, there would have been at least one spy watching every 66 citizens! When one adds in the estimated numbers of part-time snoops, the result is nothing short of monstrous: one informer per 6.5 citizens. It would not have been unreasonable to assume that at least one Stasi informer was present in any party of ten or twelve dinner guests.
THE STASI OCTOPUS
Like a giant octopus, the Stasi’s tentacles probed every aspect of life. Full-time officers were posted to all major industrial plants. Without exception, one tenant in every apartment building was designated as a watchdog reporting to an area representative of the Volkspolizei (Vopo), the People’s Police. In turn, the police officer was the Stasi’s man. If a relative or friend came to stay overnight, it was reported. Schools, universities, and hospitals were infiltrated from top to bottom. German academe was shocked to learn that Heinrich Fink, professor of theology and vice chancellor at East Berlin’s Humboldt University, had been a Stasi informer since 1968. After Fink’s Stasi connections came to light, he was summarily fired. Doctors, lawyers, journalists, writers, actors, and sports figures were co-opted by Stasi officers, as were waiters and hotel personnel. Tapping about 100,000 telephone lines in West Germany and West Berlin around the clock was the job of 2,000 officers.
Stasi officers knew no limits and had no shame when it came to “protecting the party and the state.” Churchmen, including high officials of both Protestant and Catholic denominations, were recruited en masse as secret informers. Their offices and confessionals were infested with eavesdropping devices. Even the director of Leipzig’s famous Thomas Church choir, Hans-Joachim Rotch, was forced to resign when he was unmasked as a Spitzel, the people’s pejorative for a Stasi informant.
Absolutely nothing was sacred to the secret police. Tiny holes were bored in apartment and hotel room walls through which Stasi agents filmed their “suspects” with special video cameras. Even bathrooms were penetrated by the communist voyeurs.8 Like the Nazi Gestapo, the Stasi was the sinister side of deutsche Gründlichkeit (German thoroughness).
After the Berlin wall came down, the victims of the DDR regime demanded immediate retribution. Ironically, their demands were countered by their fellow Germans in the West who, living in freedom, had diligently built einen demokratischen Rechtsstaat, a democratic state governed by the rule of law. The challenge of protecting the rights of both the victims and the accused was immense, given the emotions surrounding the issue. Government leaders and democratic politicians recognized that there could be no “quick fix” of communist injustices without jeopardizing the entire system of democratic jurisprudence. Moving too rapidly merely to satisfy the popular thirst for revenge might well have resulted in acquittals or mistrials. Intricate jurisdictional questions needed to be resolved with both alacrity and meticulousness. No German government could afford to allow a perpetrator to go free because of a judicial error. The political fallout from any such occurrence, especially in the East, could prove fatal to whatever political party occupied the chancellor’s office in Bonn at the time.
Politicians and legal scholars of the “old federal states,” or West Germany, counseled patience, pointing out that even the prosecution of Nazi criminals had not yet been completed. Before unification, Germans would speak of Vergangenheitsbewältigung (“coming to grips with the past”) when they discussed dealing with Nazi crimes. In the reunited Germany, this word came to imply the communist past as well. The two were considered comparable especially in the area of human rights violations. Dealing with major Nazi crimes, however, was far less complicated for the Germans: Adolf Hitler and his Gestapo and Schutzstaffel (SS) chief, Heinrich Himmler, killed themselves, as did Luftwaffe chief and Vice Chancellor Hermann Göring, who also had been the first chief of the Gestapo. The victorious Allies prosecuted the rest of the top leadership at the International War Crimes Tribunal in Nürnberg. Twelve were hanged, three received life terms, four were sentenced to lesser terms of imprisonment (up to twenty years), and three were acquitted.
The cases of communist judges and prosecutors accused of Rechtsbeugung (perversion of justice) are more problematic. According to Franco Werkenthin, a Berlin legal expert charged with analyzing communist crimes for the German parliament, those sitting in judgment of many of the accused face a difficult task because of the general failure of German justice after World War II. Not a single judge or prosecutor who served the Nazi regime was brought to account for having perverted justice—even those who had handed down death sentences for infringements that in a democracy would have been considered relatively minor offenses. Werkenthin called this phenomenon die Jauche der Justiz, the cesspool of justice.
Of course, the crimes committed by the communists were not nearly as heinous as the Nazis’ extermination of the Jews, or the mass murders in Nazi-occupied territories. However, the communists’ brutal oppression of the nation by means including murder alongside legal execution put the SED leadership on a par with Hitler’s gang. In that sense, Walter Ulbricht or Erich Honecker (Ulbricht’s successor as the party’s secretary-general and head of state) and secret police chief Erich Mielke can justifiably be compared to Hitler and Himmler, respectively.
Arrest warrants were issued for Honecker and Mielke. The Soviet government engineered Honecker’s escape to Moscow, where he became the ward of Soviet President Mikhail S. Gorbachev. When the Soviet Union crumbled, the new Russian President Boris Yeltsin expelled Honecker. He was arrested on his return to Germany, but a court decided against a trial when he was diagnosed with liver cancer. Honecker flew to Chile with his wife Margot to live with their daughter, a Chilean citizen by marriage. His exile was short, and he died in 1994. Mielke was not so fortunate: His KGB friends turned their backs on him. He was tried in Germany for the 1931 murder of two police officers, found guilty, and sentenced to six years in prison. Other charges, including manslaughter, were dismissed because of his advanced age and poor health.
Three other members of the twenty-one-member ruling Politburo also have been tried. Former Defense Minister Heinz Kessler was convicted of manslaughter in connection with the order to kill people who were trying to escape to the West. He received a seven-and-a-half-year term. Two others, members of the Central Committee and the National Defense Council, were tried with Kessler and sentenced to seven and a half years and five years, respectively. Politburo member Harry Tisch, who was also head of the communist trade union, was found guilty of embezzlement and served eighteen months. Six others, including Egon Krenz (Honecker’s successor as party chief), were charged with manslaughter. Krenz was found guilty, and on August 25, 1997, was sentenced to six and a half years in prison.
However, eight years after reunification, many of the 165 members of the Central Committee have not yet been put under investigation. In 1945, Nazis holding comparable or lesser positions were subject to automatic arrest by the Allies. They spent months or even years in camps while their cases were adjudicated. Moreover, the Nürnberg Tribunal branded the Reich and its Corps of Political Leaders, SS, Security Service (SD), Secret State Police (Gestapo), SA (Storm Troopers), and Armed Forces High Command criminal organizations. Similarly sweeping actions against communist leaders and functionaries such as Stasi officers were never contemplated, even though tens of thousands of political trials and human rights abuses have been documented. After the East German regime fell, German judicial authorities scrupulously avoided the appearance of waging witch-hunts or using the law as a weapon of vengeance. Prosecutors and judges made great efforts to be fair, often suspending legal action while requesting rulings from the supreme court on possible constitutional conflicts.
The victims of oppression clamored for revenge and demanded speedy prosecution of the erstwhile tyrants. They had little patience for a judicial system that was handicapped by a lack of unblemished and experienced criminal investigators, prosecutors, and judges. Despite these handicaps, the Berlin Central Police Investigations Group for Government Criminality, mindful that the statute of limitations for most communist crimes would expire at the end of 1999, made significant progress under its director Manfred Kittlaus, the able former director of the West Berlin state police. Kittlaus’s major task in 1998 was to investigate wrongful deaths, including 73 murders, 30 attempted murders, 583 cases of manslaughter, 2,938 instances of attempted manslaughter, and 425 other suspicious deaths. Of the 73 murders, 22 were classified as contract murders.
One of those tried and convicted for attempted contract murder was former Stasi collaborator Peter Haak, who was sentenced to six and a half years in prison. The fifty-two-year-old Haak took part in the Stasi’s 1981 Operation Scorpion, which was designed to pursue people who helped East Germans escape to the West. Proceedings against former General Gerhard Neiber, whose Stasi directorate was responsible for preventing escapes and for wreaking vengeance, were still pending in 1998.
Peter Haak’s murder plot was hatched after he befriended Wolfgang Welsch and his family. Welsch was a thorn in the side of the Stasi because of his success in smuggling people out of the DDR. Haak joined Welsch and the latter’s wife and seven-year-old daughter on a vacation in Israel, where he mixed a gram of thallium, a highly poisonous metallic chemical element used in rat poison, into the hamburgers he was preparing for a meal. Welsch’s wife and daughter vomited immediately after ingesting the poison and recovered quickly. Welsch suffered severe aftereffects, but eventually recovered: He had consumed a large amount of beer with the meal, and an expert testified that the alcohol had probably flushed the poison from his system.
Berlin Prosecutor General Christoph Schäfgen revealed that after the DDR’s demise 15,200 investigations had been launched, of which more than 9,000 were still active at the beginning of 1995. Indictments were handed down in 153 cases, and 73 perpetrators were convicted. Among those convicted were the aforementioned Politburo members as well as a number of border guards who had killed people who were trying to escape to the West.
Despite widespread misgivings about the judicial failures in connection with some Nazi crimes, a number of judges and prosecutors were convicted and jailed for up to three years for perversion of justice. In collusion with the Stasi, they had requested or handed down more severe sentences in political cases so that the state could collect greater amounts when the “convicts” were ransomed by the West German government. {The amount of ransom paid was governed by the time a prisoner had been sentenced to serve.)
The enormity of the task facing judicial authorities in reunified Germany becomes starkly evident when one examines the actions they have taken in all five former East German provinces and in East Berlin. From the end of 1990 to July 1996, 52,050 probes were launched into charges of murder, attempted murder, manslaughter, kidnapping, election fraud, and perversion of justice. A total of 29,557 investigations were halted for various reasons including death, severe illness, old age, or insufficient evidence. In those five and a half years, there were only 139 convictions.
The problem is even more staggering when cases of espionage are included. Between 1990 and 1996, the office of the federal prosecutor general launched 6,641 probes, of which 2,431 were terminated before trial—most due to the statute of limitations. Of 175 indictments on charges of espionage, 95 resulted in convictions. In addition to the cases handled at the federal level, the prosecutor general referred 3,926 investigations to state authorities, who terminated 3,344 without trial. State courts conducted 356 trials, resulting in 248 convictions. Because the statute of limitations for espionage is five years, the prosecutor general’s office told me in 1997 it was unlikely that more espionage trials would be conducted.
It is important to emphasize the difference between the statute’s application to so-called government crimes committed in East Germany before the collapse and to crimes, such as espionage, committed in West Germany. The Unification Treaty specifically permits the belated prosecution of individuals who committed acts that were punishable under the East German criminal code and who due to official connivance were not prosecuted earlier. There is no statute of limitations for murder. For most other crimes the limit is five years; however, due to the obstacles created by previous government connivance, the German parliament in 1993 doubled this time limit for prosecution of the more serious crimes. At the same time, the parliament decreed that all cases must be adjudicated by the end of 2002. For less serious offenses, the statute would have run out on December 31, 1997, but the parliament extended it to 2000.
A number of politicians, jurists, and liberal journalists pleaded for a general amnesty for crimes committed by former DDR leaders and Communist Party functionaries. A former West German supreme court judge, Ernst Mahrenholz, said the “sharp sword of justice prevents reconciliation.” Schäfgen, the Berlin prosecutor general, had this answer for the former high court judge and other amnesty advocates:
I cannot agree. We are raising no special, sharp sword against East Germans. We must pursue state-sponsored injustice in exactly the same manner as we do when a thief steals or when one human being kills another. If one wants to change that, then we would have to do away with the entire criminal justice system, because punishment always hurts. We are not criminalizing an entire people but only an ever shrinking, small portion.
German Foreign Minister Klaus Kinkel, who was West Germany’s minister of justice when the nation was unified, said this at a session of parliament in September 1991: “We must punish the perpetrators. This is not a matter of a victor’s justice. We owe it to the ideal of justice and to the victims. All of those who ordered injustices and those who executed the orders must be punished; the top men of the SED as well as the ones who shot [people] at the wall.” Aware that the feelings against communists were running high among their victims, Kinkel pointed to past revolutions after which the representatives of the old system were collectively liquidated. In the same speech before parliament, he said:
Such methods are alien to a state ruled by law. Violence and vengeance are incompatible with the law in any case. At the same time, we cannot tolerate that the problems are swept under the rug as a way of dealing with a horrible past, because the results will later be disastrous for society. We Germans know from our own experience where this leads. Jewish philosophy formulates it in this way: “The secret of redemption is called remembering.”
Defense attorneys for communist officials have maintained that the difficulty lies in the fact that hundreds of thousands of political opponents were tried under laws of the DDR. Although these laws were designed to smother political dissent and grossly violated basic human rights and democratic norms, they were nonetheless laws promulgated by a sovereign state. How could one justly try individual Stasi officers, prosecutors, and judges who had simply been fulfilling their legal responsibility to pursue and punish violators of the law?
Opinions varied widely on whether and how the Stasi and other perpetrators of state-sponsored crimes should be tried. Did the laws of the DDR, as they existed before reunification, still apply in the east? Or was the criminal code of the western part of the country the proper instrument of justice in reunified Germany? However, these questions were moot: As Rupert Scholz, professor of law at the University of Munich and a Christian Democratic member of parliament, pointed out, the Unification Treaty specifies that the penal code of the DDR and not that of the Federal Republic of Germany (FRG) shall be applied to offenses committed in East Germany. Scholz’s view was upheld by the Bundesverfassungsgericht, the supreme court. Most offenses committed by party functionaries and Stasi officers—murder, kidnapping, torture, illegal wiretapping, mail robbery, and fraud—were subject to prosecution in reunified Germany under the DDR’s penal code. But this would not satisfy the tens of thousands of citizens who had been sent to prison under East German laws covering purely political offenses for which there was no West German equivalent.
Nevertheless, said Scholz, judicial authorities were by no means hamstrung, because West Germany had never recognized the East German state according to international law. “We have always said that we are one nation; that the division of Germany led neither to full recognition under international law nor, concomitantly, to a recognition of the legal system of the DDR,” Scholz said. Accordingly, West German courts have consistently maintained that West German law protects all Germans equally, including those living in the East. Therefore, no matter where the crimes were committed, whether in the East or the West, all Germans have always been subject to West German laws. Applying this logic, East German border guards who had either killed or wounded persons trying to escape to the West could be tried under the jurisdiction of West Germany.
The “one nation” principle was not upheld by the German supreme court. Prior to the court’s decision, however, Colonel General Markus Wolf, chief of the Stasi’s foreign espionage directorate, and some of his officers who personally controlled agents from East Berlin had been tried for treason and convicted. Wolf had been sentenced to six years in prison. The supreme court ruling overturned that verdict and those imposed on Wolf’s cohorts, even though they had obtained the most closely held West German secrets and handed them over to the KGB. The maximum penalty for Landesverrat, or treason, is life imprisonment. In vacating Wolf’s sentence, the court said he could not be convicted because he operated only from East German territory and under East German law.
However, Wolf was reindicted on charges of kidnapping and causing bodily harm, crimes also punishable under East German law. The former Stasi three-star general, on March 24, 1955, had approved in writing a plan to kidnap a woman who worked for the U.S. mission in West Berlin. The woman and her mother were tricked by a Stasi agent whom the woman had been teaching English, and voluntarily got into his car. He drove them into the Soviet sector of the divided city, where they were seized by Stasi officers. The woman was subjected to psychological torture and threatened with imprisonment unless she signed an agreement to spy for the Stasi. She agreed. On her return to the American sector, however, the woman reported the incident to security officials. Wolf had committed a felony punishable by up to fifteen years’ imprisonment in West Germany. He was found guilty in March 1977 and sentenced to two years’ probation.
Those who have challenged the application of the statute of limitations to communist crimes, especially to the executions of citizens fleeing to the West, have drawn parallels to the notorious executive orders of Adolf Hitler. Hitler issued orders mandating the summary execution of Soviet Army political commissars upon their capture and initiating the extermination of Jews. An early postwar judicial decision held that these orders were equivalent to law. When that law was declared illegal and retroactively repealed by the West German Bundestag, the statute of limitations was suspended—that is, it never took effect. Many of those convicted in subsequent trials of carrying out the Führer’s orders were executed by the Allies. The German supreme court has ruled the same way as the Bundestag on the order to shoot people trying to escape to West Germany, making the statute of limitations inapplicable to such cases. The ruling made possible the trial of members of the National Defense Council who took part in formulating or promulgating the order. A number of border guards who had shot would-be escapees also have been tried and convicted.
Chief Prosecutor Heiner Sauer, former head of the West German Central Registration Office for Political Crimes, was particularly concerned with the border shootings. His office, located in Salzgitter, West Germany, was established in 1961 as a direct consequence of the Berlin Wall, which was erected on August 13 of that year. Willy Brandt, at the time the city’s mayor (later federal chancellor) had decided that crimes committed by East German border guards should be recorded. At his behest, a central registry of all shootings and other serious border incidents was instituted. Between August 13, 1961 and the opening of the borders on November 9, 1989, 186 border killings were registered. But when the Stasi archives were opened, investigators found that at least 825 people had paid with their lives for trying to escape to the West. This figure was reported to the court that was trying former members of the National Defense Council. In addition to these border incidents, the registry also had recorded a number of similar political offenses committed in the interior of the DDR: By fall 1991, Sauer’s office had registered 4,444 cases of actual or attempted killings and about 40,000 sentences handed down by DDR courts for “political offenses.”
During the early years of Sauer’s operation, the details of political prosecutions became known only when victims were ransomed by West Germany or were expelled. Between 1963 and 1989, West Germany paid DM5 billion (nearly US$3 billion) to the communist regime for the release of 34,000 political prisoners. The price per head varied according to the importance of the person or the length of the sentence. In some cases the ransom amounted to more than US$56,000. The highest sum ever paid to the East Germans appears to have been DM450,000 (US$264,705 using an exchange rate of US$1.70 to the mark). The ransom “object” in this case was Count Benedikt von Hoensbroech. A student in his early twenties, von Hoensbroech was attending a West Berlin university when the wall went up. He was caught by the Stasi while trying to help people escape and was sentenced to ten years at hard labor. The case attracted international attention because his family was related to Queen Fabiola of Belgium, who interceded with the East Germans. Smelling money, the East German government first demanded the equivalent of more than US$1 million from the young man’s father as ransom. In the end, the parties settled on the figure of DM450,000, of which the West German government paid DM40,000 (about $23,529). Such ransom operations were fully controlled by the Stasi.
Political prisoners released in the DDR could not be registered by the West Germans because their cases remained secret. The victims were admonished to keep quiet or face another prison term. Nonetheless, in the first year after reunification, Sauer’s office added another 20,000 documented cases, for a total of 60,000. Sauer said he believed the final figure of all political prosecutions would be somewhere around 300,000. In every case, the Stasi was involved either in the initial arrest or in pretrial interrogations during which “confessions” were usually extracted by physical or psychological torture, particularly between the mid-1940s and the mid-1960s.
Until 1987, the DDR imposed the death penalty for a number of capital crimes, including murder, espionage, and economic offenses. But after the mid-1950s, nearly all death sentences were kept quiet and executions were carried out in the strictest secrecy, initially by guillotine and in later years by a single pistol shot to the neck. In most instances, the relatives of those killed were not informed either of the sentence or of the execution. The corpses were cremated and the ashes buried secretly, sometimes at construction sites. In reporting about one executioner who shot more than twenty persons to death, the Berlin newspaper Bildzeitung said that a total of 170 civilians had been executed in East Germany. However, Franco Werkenthin, the Berlin official investigating DDR crimes, said he had documented at least three hundred executions. He declined to say how many were for political offenses, because he had not yet submitted his report to parliament. “But it was substantial,” he told me. The true number of executions may never be known because no complete record of death sentences meted out by civil courts could be found. Other death sentences were handed down by military courts, and many records of those are also missing. In addition, German historian Günther Buch believes that about two hundred members of the Stasi itself were executed for various crimes, including attempts to escape to the West.
SAFEGUARDING HUMAN DIGNITY?
The preamble to the East German criminal code stated that the purpose of the code was to “safeguard the dignity of humankind, its freedom and rights under the aegis of the criminal code of the socialist state,” and that “a person can be prosecuted under the criminal code only in strictest concurrence with the law.” However, many of the codified offenses for which East German citizens were prosecuted and imprisoned were unique to totalitarian regimes, both fascist and communist.
Moreover, certain sections of the code, such as those on “Treasonable Relaying of Information” and “Treasonable Agent Activity,” were perversely applied, landing countless East Germans in maximum security penitentiaries. The victims of this perversion of justice usually were persons who had requested legal exit permits from the DDR authorities and had been turned down. In many cases, their “crime” was having contacted a Western consulate to inquire about immigration procedures. Sentences of up to two and a half years’ hard labor were not unusual as punishment for such inquiries.
Engaging in “propaganda hostile to the state” was another punishable offense. In one such case, a young man was arrested and prosecuted for saying that it was not necessary to station tanks at the border and for referring to border fortifications as “nonsense.” During his trial, he “admitted” to owning a television set on which he watched West German programs and later told friends what he saw. One of those “friends” had denounced him to the Stasi. The judge considered the accused’s actions especially egregious and sentenced him to a year and a half at hard labor.
Ironically, another part of this section of the criminal code decreed that “glorifying militarism” also was a punishable offense, although the DDR itself “glorified” its People’s Army beyond any Western norm. That army was clad in uniforms and insignia identical to those of the Nazi Wehrmacht, albeit without eagles and swastikas. The helmets, too, were differently shaped, but the Prussian goose step was regulation during parades.
A nineteen-year-old who had placed a sign in an apartment window reading “When justice is turned into injustice, resistance becomes an obligation!” was rewarded with twenty-two months in the penitentiary. Earlier, the youth had applied for an exit visa and had been turned down. A thirty-four-year-old father of two who also had been denied permission to leave the “workers’ and peasants’ state” with his family similarly advertised that fact with a poster reading “We want to leave, but they won’t let us.” The man went to prison for sixteen months. The “crimes” of both men were covered by a law on “Interference in Activities of the State or Society.”
Two letters—one to a friend in West Germany, seeking assistance to legally emigrate to the West, and another containing a similar appeal to Chief of State Honecker—brought a four-year sentence to their writer, who was convicted under two laws: those on “establishing illegal contacts” (writing to his friend) and on “public denigration” (writing to Honecker). The Stasi had illegally intercepted both letters.
The East German party chiefs were not content to rely only on the Stasi’s millions of informers to ferret out antistate sentiments. Leaving nothing to chance, they created a law that made the failure to denounce fellow citizens a crime punishable by up to five years’ imprisonment. One man was sentenced to twenty-three months for failing to report that a friend of his was preparing to escape to the West. The mandatory denunciation law had its roots in the statutes of the Socialist Unity Party, which were published in the form of a little red booklet. I picked up a copy of this booklet that had been discarded by its previous owner, a Stasi chauffeur, who had written “Ha, Ha” next to the mandate to “report any misdeeds, regardless of the person responsible, to leading party organs, all the way up to the Central Committee.”
Rupert Scholz, member of parliament and professor of law at the University of Munich, said many East Germans feel there is little determination among their Western brethren to bring the Stasi criminals to trial. “In fact, we already have heard many of them say that the peaceful revolution should have been a bloody one instead so they could have done away with their tormentors by hanging them posthaste,” Scholz told me.
The Reverend Joachim Gauck, minister to a Lutheran parish in East Germany, shared the people’s pessimism that justice would be done. Following reunification, Gauck was appointed by the Bonn government as its special representative for safeguarding and maintaining the Stasi archives. “We must at least establish a legal basis for finding the culprits in our files,” Gauck told me. “But it will not be easy. If you stood the millions of files upright in one line, they would stretch for 202 kilometers [about 121 miles]. In those files you can find an unbelievable number of Stasi victims and their tormentors.”
Gauck was given the mandate he needed in November 1991, when the German parliament passed a law authorizing file searches to uncover Stasi perpetrators and their informants. He viewed this legislation as first step in the right direction. With the evidence from Stasi files, the perpetrators could be removed from their public service jobs without any formal legal proceedings. Said Gauck: “We needed this law badly. It is not reasonable that persons who served this apparatus of oppression remain in positions of trust.
DAS BETRUGSURTEIL GEGEN “BENNEWIRTZ” UND “PETER EHLERS” “GoMoPa”-PARTNER “MAURISCHAT” UND “VORNKAHL” WG BETRUGES AM EIGEN ANLEGER
TOP-SECRET – FBI UNVEILS THE FACTS ABOUT THE PENTAGON ATTACK
Massachusetts Man Charged with Plotting Attack on Pentagon and U.S. Capitol and Attempting to Provide Material Support to a Foreign Terrorist Organization
BOSTON—A 26-year-old Ashland man was arrested and charged today in connection with his plot to damage or destroy the Pentagon and U.S. Capitol, using large remote controlled aircraft filled with C-4 plastic explosives. Rezwan Ferdaus, a U.S. citizen, was also charged with attempting to provide material support and resources to a foreign terrorist organization, specifically to al Qaeda, in order to carry out attacks on U.S. soldiers stationed overseas.
“Our top priority is to protect our nation from terrorism and national security threats. The conduct alleged today shows that Mr. Ferdaus had long planned to commit violent acts against our country, including attacks on the Pentagon and our nation’s Capitol. Thanks to the diligence of the FBI and our many other law enforcement partners, that plan was thwarted,” said U.S. Attorney Carmen M. Ortiz. “I want the public to understand that Mr. Ferdaus’ conduct, as alleged in the complaint, is not reflective of a particular culture, community, or religion,” she added. “In addition to protecting our citizens from the threats and violence alleged today, we also have an obligation to protect members of every community, race, and religion against violence and other unlawful conduct.”
The public was never in danger from the explosive devices, which were controlled by undercover FBI employees (UCs). The defendant was closely monitored as his alleged plot developed and the UCs were in frequent contact with him.
Richard DesLauriers, Special Agent in Charge of the FBI’s Boston Division said, “Today’s arrest was the culmination of an investigation forged through strong relationships among various Massachusetts law enforcement agencies to detect, deter, and prevent terrorism. Each of the more than 30 federal, state, and local agencies on the FBI’s Joint Terrorism Task Force (JTTF) worked together to protect the community from this threat. In this particular investigation, the Worcester, Ashland, and Framingham Police Departments and the Bureau of Alcohol, Tobacco, Firearms, and Explosives, played particularly critical roles. The communities of Worcester, Ashland, and Framingham should be proud of the unwavering commitment and professionalism the agencies demonstrated in ensuring that their towns and region were safe from harm. The Massachusetts State Police and the Commonwealth Fusion Center also contributed significantly to this investigation.”
“The FBI used an undercover operation to conduct this investigation. Undercover operations are used to combat all types of crimes and criminals, including in the counterterrorism arena.”
“The JTTF initiated this investigation because we have an obligation to take action to protect the public whenever an individual expresses a desire to commit violence. A committed individual, even one with no direct connections to, or formal training from, an international terrorist organization, can pose a serious danger to the community,” added DesLauriers. “It is important to remember that our system of justice is based on the notion of individual responsibility. Therefore, no one should cite Mr. Ferdaus’ actions as an excuse or reason to engage in any unlawful behavior against others in the community. We will work diligently to protect the civil rights of all Americans.”
The affidavit alleges the following: Ferdaus, a Northeastern University graduate with a degree in physics, began planning to commit a violent “jihad” against the U.S. in early 2010. He obtained mobile phones, each of which he modified to act as an electrical switch for an IED. He then supplied the phones to FBI UCs, who he believed to be members of, or recruiters for, al Qaeda. According to the affidavit, Ferdaus believed that the devices would be used to kill American soldiers overseas. During a June 2011 meeting, he appeared gratified when he was told that his first phone detonation device had killed three U.S. soldiers and injured four or five others in Iraq. Ferdaus responded, “That was exactly what I wanted.”
According to the affidavit, after each subsequent delivery, Ferdaus was anxious to know how well each of his detonation devices had worked and how many Americans they had killed. During recorded conversations, Ferdaus stated that he devised the idea of attacking the Pentagon long before he met with the government’s cooperating witness (CW) and UC, and that his jihad had, “started last year.”
In recorded conversations with the CW that began in January 2011, Ferdaus stated that he planned to attack the Pentagon using aircraft similar to “small drone airplanes” filled with explosives and guided by GPS equipment. According to the affidavit, in April 2011, Ferdaus expanded his plan to include an attack on the U.S. Capitol. In May and June 2011, Ferdaus delivered two thumb drives to the UCs, which contained detailed attack plans with step-by-step instructions as to how he planned to attack the Pentagon and Capitol. The plans included using three remote controlled aircraft and six people, including himself, whom he described as an “amir,” i.e., an Arabic term meaning leader.
During various recorded meetings, Ferdaus envisioned causing a large “psychological” impact by killing Americans, including women and children, who he referred to as “enemies of Allah.” According to the affidavit, Ferdaus’ desire to attack the United States is so strong that he confided, “I just can’t stop; there is no other choice for me.”
In May 2011, Ferdaus traveled from Boston to Washington, D.C., conducted surveillance and took photographs of his targets (Pentagon and Capitol), and identified and photographed sites at the East Potomac Park from which he planned to launch his aircraft filled with explosives. Upon his return, Ferdaus told the UC that “more stuff ha[d] to be done,” that his plan needed to be expanded, and that he had decided to couple his “aerial assault” plan with a “ground directive.” Ferdaus indicated that his ground assault plan would involve the use of six people, armed with automatic firearms and divided into two teams. Ferdaus described his expanded attack as follows:
…with this aerial assault, we can effectively eliminate key locations of the P-building then we can add to it in order to take out everything else and leave one area only as a squeeze where the individuals will be isolated, they’ll be vulnerable and we can dominate.
Once isolated, Ferdaus planned to “open up on them” and “keep firing” to create “chaos” and “take out” everyone. He also provided the expanded plan to the UC on a thumb drive.
Between May and September 2011, Ferdaus researched, ordered and acquired the necessary components for his attack plans, including one remote controlled aircraft (F-86 Sabre). This morning prior to his arrest, Ferdaus received from the UCs 25 pounds of (what he believed to be) C-4 explosives, six fully-automatic AK-47 assault rifles (machine guns) and grenades. In June 2011, Ferdaus rented a storage facility in Framingham, Mass., under a false name, to use to build his attack planes and maintain all his equipment.
According to the affidavit, in August 2011, the F-86 remote controlled aircraft was delivered to the Framingham storage facility. Ferdaus delivered a total of eight detonation devices to the UCs over the course of the investigation, which he built with the intention that they be used by al Qaeda operatives overseas to kill U.S. soldiers. On September 20, 2011 Ferdaus made a training video, which he provided to the UCs, demonstrating how to make “cell phone detonators.”
According to the affidavit, at today’s meeting the UCs allowed Ferdaus to inspect the explosives and firearms (a quantity of C-4 explosives, three grenades, and six fully-automatic AK-47 assault rifles) that the UCs delivered, and that Ferdaus had requested for his attack plan. After inspecting the components, Ferdaus brought them to his storage unit, took possession of the explosives and firearms, and locked them in his storage unit. Ferdaus was then immediately arrested.
Although Ferdaus was presented with multiple opportunities to back out of his plan, including, being told that his attack would likely kill women and children, the affidavit alleges that Ferdaus never wavered in his desire to carry out the attacks.
If convicted, Ferdaus faces up to 15 years in prison on the material support and resources to a foreign terrorist organization charge; up to 20 years in prison on the charge of attempting to destroy national defense premises; and a five-year minimum mandatory in prison and up to 20 years on the charge of attempting to damage and destroy buildings that are owned by the United States, by using an explosive. On each charge Ferdaus also faces up to three years of supervised release and a $250,000 fine.
The case was investigated by the FBI, with assistance from the Worcester, Ashland and Framingham Police Departments and the Bureau of Alcohol, Tobacco, Firearms ,and Explosives.
The case is being prosecuted by Assistant U.S. Attorneys B. Stephanie Siegmann and Donald L. Cabell of Ortiz’s Anti-Terrorism and National Security Unit.
The details contained in the complaint are allegations. The defendant is presumed to be innocent unless and until proven guilty beyond a reasonable doubt in a court of law.
Neo Stalin Show Case – Tymoshenko denounces court case ‘lynching’
Yulia Tymoshenko, the former Ukrainian prime minister, has denounced as a “lynching” and a “show” the trial that could see her jailed as early as Friday.
Making her closing statement on Thursday with hundreds of her supporters outside the Kiev courtroom, she accused Viktor Yanukovich, Ukraine’s president, of orchestrating the case to crush someone he saw as a “dangerous political rival”.
“This has been a classic lynching trial,” said the 50-year-old political firebrand, seemingly energised despite already spending 57 days in detention on contempt of court charges.
“You should have already brought in an acquittal and ended this humiliation of Ukraine. But the show goes on,” she told the judge.
In an unexpected twist, the verdict could now come during a summit of European Union leaders and former Soviet republics in Warsaw on Friday meant to celebrate Kiev’s progress towards a crucial political and trade deal with the EU.
EU leaders have warned that a guilty verdict and jail term for Ukraine’s leading opposition politician could be a major setback for hopes professed by Mr Yanukovich’s administration for closer integration with Europe.
Ms Tymoshenko faces up to 10 years in prison if found guilty of exceeding her authority when brokering a 2009 natural gas agreement with Russia while prime minister.
Prosecutors say the deal damaged Ukraine’s economy and have called for a seven-year sentence.
“Today I understand well what it felt like to be crushed during the Soviet regime, thrown into Soviet jails without proper courts and due process,” she told the courtroom as she read from a 60-page statement.
Mr Yanukovich, who narrowly beat his arch-rival in elections last year, has come under intensifying pressure from EU states and the US in recent weeks to drop the case, widely seen in Ukraine and beyond as politically motivated.
He has denied being behind the case, saying it was instigated by his predecessor and Ms Tymoshenko’s one-time Orange Revolution ally, Viktor Yushchenko.
Stefan Füle, EU enlargement commissioner, told a conference in Warsaw on Thursday that talks would continue aimed at concluding a political “association” and wide-ranging free trade deal with Kiev by the end of the year.
But he said a guilty court verdict could jeopardise chances of winning the necessary ratification by the EU’s 27 states and the European parliament.
“There is no doubt that if the former prime minister was put in prison, the relationship between Ukraine and the EU should not be the same,” he warned.
As well as bringing rival camps of pro- and anti-Tymoshenko demonstrators to Khreshchatyk, Kiev’s main street, the case is being closely watched in neighbouring countries. It featured prominently on Thursday in newspapers in Poland, which is keen to see its eastern neighbour more closely integrated with the EU and wrested out of Moscow’s orbit.
Civic groups in Ukraine warn the Tymoshenko case is symbolic of a broader rollback of democratic gains achieved after the Orange Revolution.
But they urged the EU to continue talks with Kiev as the best way of securing future reforms and avoiding the country again falling under Russian influence.
Russian prime minister Vladimir Putin – now almost certain to return as president next year – has repeatedly tried to pull Ukraine into a customs union he has formed with other ex-Soviet republics.
Mr Yanukovich had hinted in recent weeks that Kiev might seek a face-saving exit from the Tymoshenko trial by “decriminalising” the article under which she was charged.
But motions to do so now seem unlikely to pass through parliament in time, although the judge could still adjourn the case.
Ms Tymoshenko warned she would “under no circumstances” seek amnesty from Mr Yanukovich if the law changed after her trial ended. Doing so would be “recognition of a dictatorship”, she said.
Jose Manuel Pinto Teixeira, head of the EU delegation to Ukraine talks, warned this week: “It seems our messages were not heard well by the Ukrainian side.”
TOP-SECRET – Costly Database of Terrorism Racket Porn Video
IntelCenter Database (ICD)Comprehensive Online Database Covering
Terrorist/Rebel Incidents, Threats & Videos
A sends:
—–Original Message—–
From: BenV <benv[at]intelcenter.com>
Date: Wed, 28 Sep 2011 18:57:27
To: <DailyBrief[at]yahoogroups.com>
Subject: [DailyBrief] IntelCenter Dubbed Netflix of Terrorism – Feedback on Searching Terrorist Video
We just rolled out a new terrorist/rebel online database that allows full searching and streaming of up to HD quality video and full screen viewing. It’s part of our existing IntelCenter Database (ICD) and is called the Video Component. The database is accessible from anywhere with a Net connection and will support optimized versions for phone and tablet devices. The library goes back 20 years and once fully migrated will be in excess of 15,000 videos. You can see more details at
http://www.intelcenter.com/icd/
Fast Company just released an article on the database dubbing us the NetFlix of terrorism. You can see the piece here: http://www.fastcompany.com/1783435/netflix-for-terrorists and I put the full text below.
Here’s my question. How would you like to search for terrorist/rebel video that you need to review?
As it stands now the database allows search by group, video production group, speaker, release date, runtime, video type (i.e. hostage, statement, documentary style), language, primary country, main themes, contains (i.e. vehicular bombing, IED construction, shooting, statement), addressed to, transcript and many more technical metadata areas to support exploitation that cannot be posted here. All the group and individual names are on standardized lists so you don’t have to go guessing as to how we spelled it. You just review the list and pick the match.
Is there something else that you’ve wanted or found incredibly helpful in the past?
If anyone here wants the dog and pony show over WebEx or otherwise, just shoot me a note directly at
benv[at]intelcenter.com.
Thanks in advance for any feedback. We can have the greatest resource in the world but if we don’t understand how each different community needs to find and work with the video then it does nothing to forward the mission and at the end of the day that’s what our singular goal is, impact.
– Ben
Fast Company – 28 Sep. 2011
The Netflix Of Terrorism
http://www.fastcompany.com/1783435/netflix-for-terrorists
BY Neal Ungerleider
Terrorist organizations are nothing if not telegenic. Web video tends to be the preferred way they get messages across and recruit sympathizers. Now private company IntelCenter, has assembled one of the world’s largest collections of streaming terrorist videos for viewing on demand.
Terrorist organizations love making videos and uploading them to the internet. It’s a quick and effective way of getting their message across–and not just for potential recruits and sympathizers. A private company, IntelCenter, has assembled one of the world’s largest collections of streaming terrorist videos for viewing by the military, intelligence and academic communities.
The video archive, called IntelCenter Database: Video Component, contains approximately 15,000 terrorist and rebel-produced propaganda videos. According to IntelCenter’s Ben Venzke, the archive mainly contains video from “non-nation state actors, be they small or large, that are actively involved in bombings, kidnappings, shootings, insurgencies, and the like.” In other words: More FARC and al-Qaeda and fewer creepy, angry teenagers in their bedrooms. Users who subscribe to the service can instantly watch the videos and search by keywords and (terrorist) content creators, just as they could on Netflix or YouTube.
Homeland Security–the sprawling conglomeration of counter-terrorism, intelligence gathering, surveillance, and fearmongering that arose after the September 11 attacks–is big business. According to the left-leaning National Priorities Project, a staggering $69 billion dollars was allocated by the federal government for homeland security during fiscal year 2011. This is a massive source of revenue for the many private firms creating services and products used by federal and local governments. Access to IntelCenter’s video archive doesn’t come cheap; individual accounts for government users go for $9,995/year a piece or $65,000 for group licenses of 6-10 users. Substantially more affordable packages are available for private security and academic subscribers that begin at $2,320 annually. The cheaper levels give the user access to the same content but limit the number of search fields that can be used.
Subscribers to IntelCenter’s services are not limited to the United States; according to the company, their products are also designed to servvice intelligence analysts and military in Canada, Australia, Europe and other regions worldwide.
IntelCenter’s Venzke tells Fast Company that his company offers intelligence service-level video archives to researchers, private security professionals, corporate securities, universities, and the media. The archive grew out of the previously existing IntelCenter Database, which offers text-based background information and reference materials on militant groups.
Users can search terrorist videos on the site by release date, the militant organization that created it, video producer (ironically enough, jihadists have formed their own media organizations such as as-Sahab Media), speaker, language, main themes, and regional focus. Although thousands of terrorist and militant-produced videos are currently available on the internet–ironically mainly through mainstream content archivers such as YouTube–the considerable time spent searching video archives in both English and foreign languages for a particular video does present a difficulty. One of IntelCenter’s strongest selling points is that they reduce the manpower hours needed to retrieve older propaganda videos.
Videos viewed through the site stream up to HD quality and can be watched either in a window or full-screen. Users can also view videos on their smartphones or tablets; the service is compatible with Android devices as well as the iPhone or iPad and offers both HTML5 and Flash video. According to Venzke, the archive “grows at a rate of about 3-20 new videos a day.”
Thankfully for intelligence agencies and counter-terrorism investigators, militant organizations love producing video clips and internet propaganda. Hezbollah has their own satellite television network with a huge internet presence and terrorist groups worldwide use YouTube to reach sympathizers before their videos are (sometimes) pulled down. Just this week, al-Qaeda in Yemen released the latest issue of their English-language propaganda magazine online–the PDF-format magazine encouraged readers to target “the populations of countries that are at war with the Muslims.”
The growth market in Homeland Security means that a streaming video site aimed at intelligence and corporate security is smart business. Police departments and regional law enforcement around the country generally have generous funds to spend on Homeland Security; the New York Police Department’s counter-terrorism unit is currently dealing with fallout from an Associated Press expose. Those big budgets translate into money to spend on all sorts of tools developed by private firms. More importantly, there are relatively few public-access databases archiving videos from militant organizations that can be easily searched without bouncing between English, Arabic, Spanish, Urdu and other foreign-language queries. Promoting that capability, for IntelCenter and the many other small companies serving the Homeland Security industry, can be very profitable.
[Story images: IntelCenter]
For more stories like this, follow [at]fastcompany on Twitter. Email Neal Ungerleider, the author of this article, here or find him on Twitter and Google+.
SPIEGEL -“GELIEBTER GENOSSE”-WIE STASI-OBERST STELZER BND-CHEF HELLENBROICH FÜR “GoMoPa” ANWARBT
TOP-SECRET – Megadeath Weapons Tritium Production to Increase
[Federal Register Volume 76, Number 188 (Wednesday, September 28, 2011)] [Notices] [Pages 60017-60020] From the Federal Register Online via the Government Printing Office [www.gpo.gov] [FR Doc No: 2011-24947] ----------------------------------------------------------------------- DEPARTMENT OF ENERGY National Nuclear Security Administration Notice of Intent To Prepare a Supplemental Environmental Impact Statement (SEIS) for the Production of Tritium in a Commercial Light Water Reactor AGENCY: National Nuclear Security Administration (NNSA), U.S. Department of Energy (DOE). ACTION: Notice of intent to prepare a supplemental environmental impact statement and conduct public scoping meetings. ----------------------------------------------------------------------- SUMMARY: The Council on Environmental Quality's implementing regulations for the National Environmental Policy Act (NEPA) and DOE's NEPA implementing regulations require the preparation of a supplement to an environmental impact statement (EIS) when there are substantial changes to a proposal or when there are significant new circumstances or information relevant to environmental concerns. DOE may also prepare a SEIS at any time to further the purposes of NEPA. Pursuant to these provisions, the NNSA, a semi-autonomous agency within DOE, intends to prepare a SEIS to update the environmental analyses in DOE's 1999 EIS for the Production of Tritium in a Commercial Light Water Reactor (CLWR EIS; DOE/EIS-0288). The CLWR EIS addressed the production of tritium in Tennessee Valley Authority (TVA) reactors using tritium-producing burnable absorber rods (TPBARs). In the Record of Decision (ROD) for the CLWR EIS, NNSA selected TVA's Watts Bar Unit 1 and Sequoyah Units 1 and 2, located in Spring City and Soddy-Daisy, Tennessee, respectively, for tritium production. TVA has been producing tritium for NNSA at Watts Bar Unit 1 since 2004. After several years of tritium production experience at TVA's Watts Bar Unit 1, NNSA has determined that tritium permeation through TPBAR cladding into the reactor cooling water occurs at a higher rate than previously projected. The proposed SEIS will analyze the potential environmental impacts associated with increased tritium permeation levels observed since 2004; DOE's revised estimate of the maximum number of TPBARs required to support the current Nuclear Posture Review tritium supply requirements; and proposed changes to TVA facilities that may be used for future tritium production. TVA will be participating as a cooperating agency in the preparation of the SEIS. Any other agency that would like to be a cooperating agency in the preparation of the SEIS is requested to contact the SEIS Document Manager as noted in this Notice under ADDRESSES. DATES: NNSA invites comments on the scope of the SEIS. The public scoping period starts with the publication of this Notice in the Federal Register and will continue until November 14, 2011. NNSA will consider all comments received or postmarked by that date in defining the scope of the SEIS. Comments received or postmarked after that date will be considered to the extent practicable. A public scoping meeting is scheduled to be held on October 20, 2011, from 6:30 p.m. to 10 p.m. [[Page 60018]] ADDRESSES: The public scoping meeting will be held at the Southeast Tennessee Trade and Conference Center, Athens, TN. NNSA will publish additional notices on the date, time, and location of the scoping meeting in local newspapers in advance of the scheduled meeting. Any necessary changes will be announced in the local media. The scoping meeting will provide the public with an opportunity to present comments, ask questions, and discuss issues with NNSA officials regarding the SEIS. Written comments or suggestions concerning the scope of the SEIS or requests for more information on the SEIS and public scoping process should be directed to: Mr. Curtis Chambellan, Document Manager for the SEIS, U.S. Department of Energy, National Nuclear Security Administration, Box 5400, Albuquerque, New Mexico 87185-5400; facsimile at 505-845-5754; or e-mail at: tritium.readiness.seis@doeal.gov. Mr. Chambellan may also be reached by telephone at 505-845-5073. FOR FURTHER INFORMATION CONTACT: For general information on the NNSA NEPA process, please contact: Ms. Mary Martin, NNSA NEPA Compliance Officer, U.S. Department of Energy, 1000 Independence Avenue, SW, Washington, DC 20585, or telephone 202-586-9438. For general information about the DOE NEPA process, please contact: Ms. Carol Borgstrom, Director, Office of NEPA Policy and Compliance (GC-54), U.S. Department of Energy, 1000 Independence Avenue, SW, Washington, DC 20585, or telephone 202-586-4600, or leave a message at 1-800-472-2756. Additional information about the DOE NEPA process, an electronic archive of DOE NEPA documents, and other NEPA resources are provided at http://energy.gov/nepa. SUPPLEMENTARY INFORMATION: NNSA is responsible for supplying nuclear materials for national security needs and ensuring that the nuclear weapons stockpile remains safe and reliable. Tritium, a radioactive isotope of hydrogen, is an essential component of every weapon in the U.S. nuclear weapons stockpile. Unlike other nuclear materials used in nuclear weapons, tritium decays at a rate of 5.5 percent per year. Accordingly, as long as the Nation relies on a nuclear deterrent, the tritium in each nuclear weapon must be replenished periodically. The last reactor used for tritium production during the Cold War was shut down in 1988. Since then, tritium requirements for the stockpile have largely been met from the existing original inventory through the harvest and recycle of tritium gas during the dismantlement of weapon systems, and the replacement of tritium-containing weapons components as part of Limited Life Component Exchange programs. In December 1999, a new tritium production capability was established through an Interagency Agreement with TVA in which TPBARs are irradiated in the Watts Bar Unit 1 commercial nuclear power reactor and undergo extraction at the Tritium Extraction Facility (TEF) located at DOE's Savannah River Site (SRS) in South Carolina. In order to continue to provide the required supply, irradiation will increase from today's 544 TPBARs per fuel cycle to a projected steady state rate of approximately 1,700 TPBARs per fuel cycle, i.e., approximately every 18 months. To provide sufficient capacity to ensure the ability to meet projected future stockpile requirements, NNSA and TVA anticipate requesting authorization for TPBAR irradiation to be increased in fiscal year 2016 to a level that is beyond currently licensed rates for one reactor. Meeting the increased demand will require a license amendment from the Nuclear Regulatory Commission (NRC) to permit the irradiation of a greater number of TPBARs per reactor than can currently be irradiated at either the Watts Bar or Sequoyah site. License amendments are reactor specific. NNSA and TVA will supplement the 1999 CLWR EIS with analyses supporting the anticipated license amendment requests that also evaluate a higher level of tritium permeation through TPBAR cladding into the reactor cooling water than was previously analyzed. The tritium releases associated with the proposed increase in the number of TPBARs that could be irradiated at Watts Bar, Sequoyah, or both sites (compared to the number currently authorized by the NRC) would remain below Environmental Protection Agency (EPA) and NRC regulatory limits. Subsequently, TVA plans to adopt the SEIS for use in obtaining the necessary NRC license amendment(s). The production of tritium in a CLWR is technically straightforward. All of the Nation's supply of tritium has been produced in reactors. Most commercial pressurized water reactors were designed to utilize 12- foot-long rods containing an isotope of boron (boron-10) in ceramic form. These rods are sometimes called burnable absorber rods. The rods are inserted in the reactor fuel assemblies to absorb excess neutrons produced by the uranium fuel in the fission process for the purpose of controlling power in the core at the beginning of an operating cycle. DOE's tritium program developed TPBARs in which neutrons are absorbed by a lithium aluminate ceramic rather than boron ceramic. While the two types of rods function in a very similar manner to absorb excess neutrons in the reactor core, there is one notable difference: When neutrons strike the lithium aluminate ceramic material in a TPBAR, tritium is produced inside the TPBAR. These TPBARs are placed in the same locations in the reactor core as the standard boron burnable absorber rods. There is no fissile material (uranium or plutonium) in the TPBARs. Tritium produced in TPBARs is captured almost instantaneously in a solid zirconium material in the rod, called a ``getter.'' The getter material that captures the tritium is very effective. During each reactor refueling cycle, the TPBARs are removed from the reactor and transported to SRS. At SRS, the TPBARs are heated in a vacuum at the TEF to extract the tritium from the getter material. DOE's May 1999 Consolidated Record of Decision for Tritium Supply and Recycling (64 FR 26369) announced the selection of TVA's Watts Bar Unit 1, Sequoyah Unit 1 and Sequoyah Unit 2 for use in irradiating TPBARs and stated that a maximum of approximately 3,400 TPBARs would be irradiated per reactor during each 18-month fuel cycle. Since then, the projected need for tritium has decreased significantly. NNSA has determined that tritium demand to supply the Nuclear Weapons Stockpile could be satisfied using a maximum of approximately 2,500 TPBARs per fuel cycle, with a projected steady state number of approximately 1,700 TPBARs per fuel cycle. Purpose and Need Although NNSA's projected need for tritium to support the nuclear weapons stockpile today is less than originally planned, a higher than expected rate of permeation of tritium from TPBARs into reactor coolant water and subsequent release to the environment has restricted the number of TPBARs irradiated at TVA's Watts Bar Unit 1. Before TVA increases tritium production rates to meet expected national security requirements, the environmental analyses in the CLWR EIS are being updated to analyze and evaluate the effects of the higher tritium permeation, as well as any potential effects related to other changes in the regulatory and operating environment since publication of the original CLWR EIS. As a cooperating agency in the preparation of the SEIS, TVA plans to use the SEIS in pursuing NRC licensing amendments to increase TPBAR [[Page 60019]] irradiation at TVA's Watts Bar Nuclear Plant (WBN) at Spring City, Tennessee, and/or the Sequoyah Nuclear Plant at Soddy-Daisy, Tennessee, beyond levels set in 2002. Four alternatives are expected to be analyzed in the SEIS: The No Action Alternative and three action alternatives, one using only the Watts Bar site, one using only the Sequoyah site, and one using both the Watts Bar and Sequoyah sites. As a matter of note, in a separate proceeding, DOE and TVA are also analyzing the potential use of mixed oxide fuel during some fuel cycles at the Sequoyah Nuclear Plant as part of the U.S. program for surplus plutonium disposition (75 FR 41850. July 19, 2010). Proposed Action and Alternatives The CLWR EIS assessed the potential impacts of irradiating up to 3,400 TPBARs per reactor unit operating on 18 month fuel cycles. It included TPBAR irradiation scenarios using multiple reactor units to achieve a maximum level of 6,000 TPBARs every 18 months. Subsequently, tritium production requirements have been reduced such that irradiation of approximately 1,700 TPBARs every reactor fuel cycle is expected to be sufficient to fulfill current requirements, consistent with the 2010 Nuclear Posture Review. To provide flexibility in future tritium supply decisions, the revised environmental analysis is expected to consider irradiation of up to a total of 2,500 TPBARs every 18 months. This approach would provide sufficient reserve capacity to accommodate potential future changes in requirements and to allow for production above currently expected annual requirement levels for short durations (i.e., several years) to recover from potential future shortfalls should that become necessary. In the CLWR EIS, the permeation of tritium through the TPBAR cladding into the reactor coolant systems of potential tritium production reactors was estimated to be less than or equal to one tritium curie/TPBAR/year. After several years of tritium production experience at Watts Bar Unit 1, NNSA has determined that tritium permeation through TPBAR cladding is approximately three to four times higher than this estimate; nevertheless, tritium releases have been below regulatory limits. To conservatively bound the potential environmental impacts, the SEIS will assess the impacts associated with tritium production in CLWRs based on a permeation rate of approximately five tritium curies/TPBAR/year. An assessment of tritium mitigation and management measures will be included as part of the environmental analyses in the SEIS. Mitigation and management measures include an assessment of technologies commercially available to treat tritiated effluents, transportation of tritiated effluents and/or low level radioactive waste streams, and other applicable effluent management actions. The SEIS, which will supplement the 1999 CLWR EIS, will support agency deliberations regarding potential changes in the tritium production at NRC licensed TVA facilities in order to meet the requirements of TVA's agreement with NNSA. These changes also require TVA to pursue an NRC license amendment request for these facilities. Accordingly, the SEIS is expected to substantially meet NRC requirements for an environmental report necessary to support TVA's license amendment request(s) for tritium production at the Watts Bar and/or Sequoyah Nuclear Plants. No Action Alternative: Produce tritium at currently approved TVA facilities (Watts Bar Unit 1 and Sequoyah Units 1 and 2) at appropriate levels to keep permeation levels within currently approved NRC license and regulatory limits. Alternative 1: Utilize TVA's Watts Bar site only to a maximum level of 2,500 TPBARs every reactor fuel cycle (18 months). Alternative 2: Utilize TVA's Sequoyah site only to a maximum level of 2,500 TPBARs every 18 months. Alternative 3: Utilize both the Watts Bar and Sequoyah sites to a maximum total level of 2,500 TPBARS every 18 months. The level of production per site would be determined by TVA. This alternative would provide the ability to supply stockpile requirements at either site independently, or using both sites with each supplying a portion of the supply. Preliminary Identification of Environmental Issues NNSA has tentatively identified the issues for analysis in the SEIS. Additional issues may be identified as a result of the scoping comment process. The SEIS will analyze the potential impacts on: 1. Air, water, soil, and visual resources. 2. Plants and animals, and their habitats, including state and Federally-listed threatened or endangered species and their critical habitats. 3. Irretrievable and irreversible consumption of natural resources and energy, including transportation issues. 4. Cultural resources, including historical and pre-historical resources and traditional cultural properties. 5. Infrastructure and utilities. 6. Socioeconomic conditions. 7. Human health under routine operations and accident conditions, including potential impacts from seismic events. 8. Minority and low-income populations (Environmental Justice). 9. Intentional Destructive Acts, including terrorist acts. 10. Other past, present, and reasonably foreseeable actions (cumulative impacts). SEIS Process and Invitation to Comment. The SEIS scoping process provides an opportunity for the public to assist the NNSA in determining issues and alternatives to be addressed in the SEIS. One public scoping meeting will be held as noted under DATES in this Notice. The purpose of the scoping meeting is to provide attendees with an opportunity to present comments, ask questions, and discuss issues regarding the SEIS with NNSA officials. Comments can also be mailed to Mr. Chambellan as noted in this Notice under ADDRESSES. The SEIS scoping meeting will include an informal open house from 6:30-7 p.m. to facilitate dialogue between NNSA and the public. Once the formal scoping meeting begins at 7:00 pm, NNSA will present a brief overview of the SEIS process and provide individuals the opportunity to give written or oral statements. NNSA welcomes specific scoping comments or suggestions on the SEIS. Copies of written comments and transcripts of oral comments provided to NNSA during the scoping period will be available on the Internet at http://nnsa.energy.gov/nepa/clwrseis. After the close of the public scoping period, NNSA will begin preparing the Draft SEIS. NNSA expects to issue the Draft SEIS for public review in 2012. A Federal Register Notice of Availability, along with notices placed in local newspapers, will provide dates and locations for public hearings on the Draft SEIS and the deadline for comments on the draft document. Persons who submit comments with a mailing address during the scoping process will receive a copy of or link to the Draft SEIS. Other persons who would like to receive a copy of or link to the Draft SEIS for review should notify Mr. Chambellan at the address noted under ADDRESSES. NNSA will include all comments received on the Draft SEIS, and responses to those comments in the Final SEIS. Issuance of the Final SEIS is currently anticipated to take place in 2013. NNSA [[Page 60020]] will issue a ROD no sooner than 30 days after publication of EPA's Notice of Availability of the Final SEIS. Issued in Washington, DC, this 23rd day of September 2011. Thomas P. D'Agostino, Administrator, National Nuclear Security Administration. [FR Doc. 2011-24947 Filed 9-27-11; 8:45 am] BILLING CODE 6450-01-P
“DUBIOSE DOPPELROLLE” – SPIEGEL ÜBER “GoMoPa”-Gründer STASI-Oberst Stelzer und mutmasslichen “GoMoPa”-Boss Resch
http://www.spiegel.de/spiegel/print/d-65717414.html
DUBIOS ! DUBIOS ! DUBIOS !
Anscheinend inspiriert das Wort “Dubios” die fingierte “GoMoPa”…
DIE WELT ÜBER DIE ZUSAMMENARBEIT ZWISCHEN STASI UND RAF BEI DEN RAF-MORDEN
STASIOPFER FRAGEN – VON Ruf-MÖRDERN u. Serienbetrügern erfundene “GoMoPa-SJB”: “Wer stoppt Google-Rufmorde ?”
State Department’s search for a WikiLeaks scapegoat
-
-
- Peter Van Buren for TomDispatch, part of the Guardian Comment Network
- guardian.co.uk, Tuesday 27 September 2011 18.11 BST

On the same day that more than 250,000 unredacted State Department cables hemorrhaged out onto the internet, I was interrogated for the first time in my 23-year State Department career by State’s Bureau of Diplomatic Security (DS) and told I was under investigation for allegedly disclosing classified information. The evidence of my crime? A posting on my blog from the previous month that included a link to a WikiLeaks document already available elsewhere on the web.
As we sat in a small, gray, windowless room, resplendent with a two-way mirror, multiple ceiling-mounted cameras, and iron rungs on the table to which handcuffs could be attached, the two DS agents stated that the inclusion of that link amounted to disclosing classified material. In other words, a link to a document posted by who-knows-who on a public website available at this moment to anyone in the world was the legal equivalent of me stealing a top secret report, hiding it under my coat and passing it to a Chinese spy in a dark alley.
The agents demanded to know who might be helping me with my blog (“Name names!”), if I had donated any money from my upcoming book on my wacky, year-long State Department assignment to a forward military base in Iraq, and if so, to which charities, the details of my contract with my publisher, how much money (if any) I had been paid, and – by the way – whether I had otherwise “transferred” classified information.
Had I, they asked, looked at the WikiLeaks site at home on my own time on my own computer? Every blog post, every Facebook post and every tweet by every State Department employee, they told me, must be pre-cleared by the department prior to “publication”. Then they called me back for a second 90-minute interview, stating that my refusal to answer questions would lead to my being fired, never mind the fifth (or the first) amendments.
Why me? It’s not like the Bureau of Diplomatic Security has the staff or the interest to monitor the hundreds of blogs, thousands of posts and millions of tweets by Foreign Service personnel. The answer, undoubtedly, is my new book, We Meant Well: How I Helped Lose the Battle for the Hearts and Minds of the Iraqi People. Its unvarnished portrait of State’s efforts and the US at work in Iraq has clearly angered someone, even though one part of State signed off on the book under internal clearance procedures some 13 months ago. I spent a year in Iraq leading a State Department Provincial Reconstruction Team (PRT) and, sadly, know exactly what I am talking about. DS monitoring my blog is like a small-town cop pulling over every African American driver: vindictive, selective prosecution. “Ya’ll be careful in these parts, ‘hear, ’cause we’re gonna set an example for your kind of people.”
Silly as it seems, such accusations carry a lot of weight if you work for the government. DS can unilaterally, and without any right of appeal or oversight, suspend your security clearance and for all intents and purposes end your career. The agents questioning me reminded me of just that, as well as of the potential for criminal prosecution – and all because of a link to a website, nothing more.
It was implied as well that even writing about the interrogation I underwent, as I am doing now, might morph into charges of “interfering with a government investigation”. They labelled routine documents in use in my interrogation as “law enforcement sensitive” to penalise me should I post them online. Who knew such small things actually threatened the security of the United States? Are these words so dangerous, or is our nation so fragile that legitimate criticism becomes a firing offense?
Let’s think through this disclosure of classified info thing, even if State won’t. Every website on the internet includes links to other websites. It’s how the web works. If you include a link to say, a CNN article about Libya, you are not “disclosing” that information – it’s already there. You’re just saying: “Have a look at this.” It’s like pointing out a newspaper article of interest to a guy next to you on the bus. (Careful, though, if it’s an article from the New York Times or the Washington Post: it might quote stuff from WikiLeaks and then you could be endangering national security.)
Security at State: hamburgers and mud
Security and the State Department go together like hamburgers and mud. Over the years, State has leaked like an old boot. One of its most hilarious security breaches took place when an unknown person walked into the secretary of State’s outer office and grabbed a pile of classified documents. From the vast trove of missing classified laptops to bugging devices found in its secure conference rooms, from high-ranking officials trading secrets in Vienna to top diplomats dallying with spies in Taiwan, even the publicly available list is long and ugly.
Of course, nothing compares to what history will, no doubt, record as the most significant outpouring of classified material ever: the dump of hundreds of thousands of cables that are now on display on WikiLeaks and its mushroom-like mirror sites. The Bureau of Diplomatic Security (an oxymoron if ever there was one) is supposed to protect our American diplomats by securing State’s secrets, and over time, they just haven’t done very well at that.
US soldier Bradley Manning, left, who is accused of stealing the huge database of classified files released by the WikiLeaks website of Julian Assange, right. Photograph: Associated Press/AFP/Getty ImagesThe State Department and its Bureau of Diplomatic Security never took responsibility for their part in the loss of all those cables, never acknowledged their own mistakes or porous security measures. No one will ever be fired at State because of WikiLeaks – except, at some point, possibly me. Instead, State joined in the federal mugging of army Private Bradley Manning, the person alleged to have copied the cables onto a Lady Gaga CD while sitting in the Iraqi desert.
That all those cables were available electronically to everyone from the secretary of State to a lowly army private was the result of a clumsy post-9/11 decision at the highest levels of the State Department to quickly make up for information-sharing shortcomings. Trying to please an angry Bush White House, State went from sharing almost nothing to sharing almost everything overnight. They flung their whole library onto the government’s classified intranet, SIPRnet, making it available to hundreds of thousands of federal employees worldwide. It is usually not a good idea to make classified information that broadly available when you cannot control who gets access to it outside your own organisation. The intelligence agencies and the military certainly did no such thing on SIPRnet, before or after 9/11.
State did not restrict access. If you were in, you could see it all. There was no safeguard to ask why someone in the army in Iraq in 2010 needed to see reporting from 1980s Iceland. Even inside their own organisation, State requires its employees to “subscribe” to classified cables by topic, creating a record of what you see and limiting access by justifiable need. A guy who works on trade issues for Morocco might need to explain why he asked for political-military reports from Chile.
Most for-pay porn sites limit the amount of data that can be downloaded. Not State. Once those cables were available on SIPRnet, no alarms or restrictions were implemented so that low-level users couldn’t just download terabytes of classified data. If any activity logs were kept, it does not look like anyone checked them.
A few classified State Department cables will include sourcing, details on from whom or how information was collected. This source data allows an informed reader to judge the veracity of the information – was the source on a country’s nuclear plans a street vendor or a high military officer? Despite the sometimes life-or-death nature of protecting sources (though some argue this is overstated), State simply dumped its hundreds of thousands of cables online unredacted, leaving source names there, all pink and naked in the sun.
Then again, history shows that technical security is just not State’s game, which means the WikiLeaks uproar is less of a surprise in context. For example, in 2006, news reports indicated that State’s computer systems were massively hacked by Chinese computer geeks. In 2008, State data disclosures led to an identity theft scheme only uncovered through a fluke arrest by the Washington, DC cops. Before it was closed down in 2009, snooping on private passport records was a popular intramural activity at the State Department, widely known and casually accepted. In 2011, contractors using fake identities appear to have downloaded 250,000 internal medical of State Department employees, including mine.
Wishing isn’t a strategy, hope isn’t a plan
Despite their own shortcomings, State and its Bureau of Diplomatic Security take this position: if we shut our eyes tightly enough, there is no WikiLeaks. (The morning news summary at State includes this message: “Due to the security classification of many documents, the daily addendum will not include news clips that are generated by leaked cables by the website WikiLeaks.”) The corollary to such a position evidently goes something like this: since we won’t punish our own technical security people or the big shots who approved the whole flawed scheme in the first place, and the damned first amendment doesn’t allow us to punish the New York Times, let’s just punish one of our own employees for looking at, creating links to and discussing stuff on the web – and while he was at it, writing an accurate, first-hand and critical account of the disastrous, if often farcical, American project in Iraq.
That’s what frustrated bullies do – they pick on the ones they think they can get away with beating up. The advantage of all this? It gets rid of a “troublemaker”, and the Bureau of Diplomatic Security people can claim that they are “doing something” about the WikiLeaks drip that continues even while they fiddle. Of course, it also chills free speech, sending a message to other employees about the price of speaking plainly.
Now does that make sense? Only inside the world of Diplomatic Security, where historically, it always has.
For example, Diplomatic Security famously took into custody the color slides reproduced in the Foreign Service Journal showing an open copy of one of the government’s most sensitive intelligence documents, albeit only after the photos were published and distributed in the thousands. Similarly, DS made it a crime to take photos of the giant US Embassy compound in Baghdad, but only after the architecture firm building it posted sketches of the embassy online; a Google search will still reveal many of those images; others who served in Iraq have posted them on their unsecured Facebook pages.
Imagine this: State’s employees are still blocked by a firewall from looking at websites that carry, or simply write about and refer to, WikiLeaks documents, including TomDispatch.com, which is publishing this piece. (That, in turn, means my colleagues at State won’t be able to read this – except on the sly.)
In the belly of the beast
Back in that windowless room for a second time, I faced the two DS agents clumsily trying to play semi-bad cop and altogether-bad cop. They once again reminded me of my obligation to protect classified information, and studiously ignored my response – that I indeed do take that obligation seriously; enough, in fact, to distinguish between actual disclosure and a witch-hunt.
As they raised their voices and made uncomfortable eye contact just like it says to do in any Interrogation 101 manual, you could almost imagine the hundreds of thousands of unredacted cables physically spinning through the air around us, heading – splat, splot, splat – for the web. Despite the Hollywood-style theatrics and the grim surroundings, the interrogation was less police state or 1984-style nightmare than a Brazil-like dark comedy.
In the end, though, it’s no joke. I’ve been a blogger since April, but my meeting with the DS agents somehow took place only a week before the publication date of my book. Days after my second interrogation, the principal deputy secretary of State wrote my publisher demanding small redactions in my book – already shipped to the bookstores – to avoid “harm to US security”. One demand: to cut a vignette based on a scene from the movie version of Black Hawk Down.
The link to WikiLeaks is still on my blog. The Bureau of Diplomatic Security declined my written offer to remove it, certainly an indication that however much my punishment mattered to them, the actual link mattered little. I may lose my job in State’s attempt to turn us all into mini-Bradley Mannings and so make America safe.
These are not people steeped in, or particularly appreciative of, the finer points of irony. Still, would anyone claim that there isn’t irony in the way the State Department regularly crusades for the rights of bloggers abroad in the face of all kinds of government oppression, crediting their voices for the Arab Spring, while going after one of its own bloggers at home for saying nothing that wasn’t truthful?
Here’s the best advice my friends in Diplomatic Security have to offer, as far as I can tell: slam the door after the cow has left the barn, then beat your wife as punishment. She didn’t do anything wrong, but she deserved it, and don’t you feel better now?
Süddeutsche Zeitung über die kriminellen Machenschaften der “GoMoPa”
SPIEGEL über die Giftstudie des “GoMoPa”-Masterminds und Resch-Protege´s STASI-Oberst Ehrenfried Stelzer
DIE GIFTSTUDIE “TOXDAT” DES RESCH-PROTEGE´S STASI-OBERST EHRENFRIED STELZER
SPIEGEL über die STASI-Connection des mutmasslichen “GoMoPa”-Chefs Jochen Resch
Julian Assange: The Unauthorised Autobiography – review

Marsupials are pouched animals, mostly from Australia, that give birth to their young in an unfinished state. What we have here is a weird marsupial hybrid. It’s part Australian WikiLeaks founder Julian Assange, and part Scottish novelist and ghostwriter Andrew O’Hagan. This mixed-up creature has given birth to an unfinished draft, dragged out of its pouch and published before its maturity under the wacky title The Unauthorised Autobiography. Assange hasn’t really been well-served by his publisher’s behaviour. It’s the result of what seems to be a characteristic Assange imbroglio in which he will neither give back his £412,000 publisher’s advance, nor deliver a finally approved manuscript. But the decision by Canongate’s Jamie Byng to publish regardless, although understandable, has produced an unsatisfactory book.
The ghostwriter and his subject hadn’t yet really gelled by the time of this draft. It’s easy to see the fictionalising hand of O’Hagan in an early chapter about Assange’s hippy boyhood in northern Queensland. It begins, soulfully: “For most people, childhood is a climate. In my case, it is perfectly hot and humid with nothing above us but blue sky …” But a later section on the Aussie hacker’s souring partnership with the journalists who were to print his leaked US secrets is much more raw. The opening reads like Assange sounding off verbatim on a bad day, in a sentence full of bile and misogyny: “Vanity in a newspaper man is like perfume on a whore: they use it to fend off a dark whiff of themselves.” For by the time we reach this second half of the book, O’Hagan’s mediating intelligence seems to have retreated, and the digital recorder is doing much of the work. Perhaps the ghost got weary, locked up in a chilly East Anglian winter with his monologuing subject, who is currently confined there on bail, fighting extradition on Swedish sex allegations.
The lack of a final edit does other disservices to Assange’s story. The narrative stops too abruptly, before publication in the Guardian and the New York Times of the third and most important set of leaks he had acquired (the state department cables), and the subsequent legal pursuit of Assange on the sex complaints. It’s padded out instead with unnecessary chunks of the cables themselves, which can be read elsewhere. The unresolved criminal allegations, inevitably, make him censor a defensive account of sex with two Swedish fans. It’s all very well calling a woman “neurotic”, but did he deliberately tear a condom as she alleged?
Furthermore, a nervous Canongate libel lawyer, no longer able presumably to rely on Assange as a future witness, appears to have simply chopped out chunks of detail when Assange abuses those he doesn’t like. This censorship muddies what could have been a lively, if defamatory, narrative, and pointlessly withholds many of the names. I myself, for example, who clashed with Assange during the Guardian saga, and co-authored a book he didn’t care for, am anonymised throughout, transparently enough, as “the news reporter”. Yet Bill Keller, then editor of the New York Times and considered presumably to be libel-proof under US free-speech laws, remains relentlessly vituperated against under his own name.
A final fact-check would have removed a crop of stupid errors. It must have been a transcription mistake that turned Heather Brooke into “the ‘Independent’ journalist” rather than the independent journalist she is. And Oscar Wilde with his rent-boys was not “sleeping with panthers”, he was feasting with panthers.
For all its drawbacks, the memoir does add some good detail to the increasingly well-trodden field of Assange studies (it’s the fifth book so far). The passage in which he meets his biological father, a bohemian Sydney actor, for the first time in his 20s, is genuinely poignant: “I found myself getting sort of angry … There on shelf after shelf were the exact same books as those I had bought and read myself … If I had only known him, I might just have picked his books down from the shelf … I was forced to make myself up as I went along.”
And there’s a telling section in which Assange, perhaps unwittingly, reveals why he seeks out unquestioning disciples, and quarrels with so many others: “Opponents past and present have the same essential weakness about them – first they want to use you, then they want to be you, then they want to snuff you out. It’s a pattern that stretches in my life from toytown feds to hacks at the Guardian … Usually it ends with these people enumerating one’s personal faults, a shocking, ungrateful, unmanly effort, to be filed under despicable in my book … I’ve been meeting [these people] all my life.”
This seems to be a cry coming from a truly threatened personality, in fear of being overwhelmed and extinguished. People have criticised Assange for being preposterously grandiose and lashing out at imagined “enemies”. Perhaps they should have been kinder, for there is clearly something else at work here.
It’s a shame Assange couldn’t get on with the Guardian. As he has the grace occasionally to recognise in this book, people there share some of his beliefs – free speech, investigative journalism, standing up to big corporations and murderous governments, the potentially liberating quality of the internet. And his idea for WikiLeaks provided an exhilarating addition to the world’s journalistic possibilities. It was a neat tool – as an uncensorable global publisher of last resort, and as an electronic outlet for leaking the new kinds of huge database the computer age is bringing into existence. But unmediated leaking on a random basis, even of gigabits of purloined documents, cannot ever revolutionise all the world’s power relationships. There Assange shows, regrettably, that he is living in a fantasy world.
Behind his high-sounding talk of quantum mechanics and global conspiracies, there lies a more familiar and heartfelt cry: “If only people knew what was really going on, they’d do something about it!” One sympathises. But these very memoirs demonstrate the opposite. Nothing much happened after Assange threw back the curtain to reveal his sensationally leaked Baghdad helicopter gunship video, with US pilots mowing down Reuters employees and young children in a burst of incompetent cannon-fire. As Assange (or O’Hagan) concedes: “It vexes me when the world won’t listen.”
That was what forced him to accept an offer from some of the world’s major newspapers to make sense of the rest of his material, publish it under the authority of their own names and grant him a share of the credibility slowly built up over 190 years of reputable reporting. Thanks to that imaginative transaction, he rocketed briefly to worldwide fame. These marsupial memoirs of his seem unlikely to increase his prospects of becoming the messiah of the information age. Maybe, sadly, even the reverse.
David Leigh is the co-author of WikiLeaks: Inside Julian Assange’s War on Secrecy (Guardian Books).
Meridian Capital zu “GoMoPa”
TOP-SECRET – CIA Alec Station Memo of 9/11 Commission 02
TOP-SECRET – CIA Alec Station Memo of 9/11 Commission 01
TOP-SECRET – Localizar y detener al Dr. Goiburú
Documentos del Archivo del Terror de Paraguay implican a Fuerzas de Seguridad paraguayas y argentinas en el secuestro
National Security Archive Electronic Briefing Book No. 239 – Part III Editado por Carlos Osorio y Marianna Enamoneta Publicado – Diciembre 21, 2007 Para más información contactar a: Peter Kornbluh: (202) 994-7116
|
|
Lazos Relacionados En el 15 Aniversario del Archive del Terror Operación Cóndor en el Archivo del Terror Centro de Documentación y Archivo para la Defensa de los Derechos Humanos (CDyA) CDyA [Sitio espejo] 60,000 registros del Archivo del Terror CDyA [Sitio UNESCO] Memoria Abierta Archivo del Terror en YouTube |
|
Meridian Capital über die STASI-FÄLSCHUNGEN DER “GoMoPa”
TOP-SECRET – EN EL 15 ANIVERSARIO DEL ARCHIVO DEL TERROR
COOPERACIÓN En apoyo al Archivo del Terror
2000 Primer convenio de cooperación El 17 de Febrero 2000 el National Security Archive y la Corte Suprema de Justicia lanzaron una iniciativa de cooperación a fin de recaudar fondos y recursos para digitalizar el acervo del CDyA, adquirir el hardware y software necesarios para hacer accesible el acervo a través del internet y capacitar al personal del CDyA. En esa ocasión se adquirió un nuevo equipo de computación y se estableció el acceso a internet del CDyA 2001 – 2002 Memoria Histórica, Democracia y Derechos Humanos (MHDDH) En 2001, La Corte Suprema de Justicia y la Universidad Católica de Asunción, con el apoyo del National Security Archive en Washington DC, lanzaron un proyecto de dos años diseñado para atender a los desafíos de responder al incremento de peticiones de habeas data y del público en general y el acelerado desarrollo la tecnología digital y el internet. El proyecto “Memoria Histórica, Democracia y Derechos Humanos (MHDDH)”. El proyecto fue financiado por el Fondo para la Democracia y los Derechos Humanos del Departamento de Estado de los Estados Unidos y fue administrado por la US AID. Un equipo asesor de la Corte Suprema de Justicia coordino el proyecto y sus miembros fueron Rosa Palau, Co-Directora del CDyA, el Embajador Jorge Lara Castro, catedrático de la UCA, y Carlos Osorio, Director del Proyecto de Documentación del Cono Sur del National Security Archive. Entre Septiembre 2001 y Diciembre 2002, el proyecto logro: 1) Microfilmar 200,000 páginas del Acervo del CDyA. El apoyo inicial proveído por US AID y la Corte Suprema de Justicia en 1993 permitió microfilmar el 60% del acervo del Archivo. El proyecto MHDDH proveyó los recursos financieros que permitieron al personal cualificado de la Corte Suprema de Justicia llevar a cabo el resto de la microfilmación. El proyecto ayudo a pagar salarios de operadores y técnicos, adquirir rollos y materiales para reencuadernar los libros microfilmados. 2) Catalogación de Sesenta Mil Documentos para responder a Habeas Data
Un equipo supervisado por la Universidad Católica y dirigido por un archivista profesional, catálogo 60,000 documentos considerados los más pertinentes para responder a los centenares de peticiones de Habeas Data que recibe el CDyA anualmente. El catálogo montado en una base de datos WinIsis, permite realizar búsquedas en los campos básicos siguientes: Fecha, Nombres, Organizaciones, Términos Geográficos, Tipo de Documento, Fondo, Ubicación Física y Rollo y Número de Fotograma. 3) Acceso público al catálogo de 60,000 documentos El proyecto diseñó el sistema para publicar este catálogo en el internet como una manera de facilitar el acceso del público al acervo del CDyA. 4) Digitalización de 300,000 documentos El proyecto MHDDH financio la producción de más de 500,000 imágenes digitales de los documentos del acervo del CDyA, estableciendo así las bases para una futura instalación de un sistema de administración y búsqueda de un archivo digital. 5) Re equipamiento del CDyA Se instalaron estanterías metálicas deslizantes y se adquirió material de computación 6) Gira por Washington DC En diciembre 2002, el National Security Archive organizó una gira de capacitación para el personal del CDyA que incluyo visitas y talleres en la Universidad George Washington, el Instituto por una Sociedad Abierta, el Archivo Nacional, la Biblioteca del Congreso y la Biblioteca de la Corte Suprema de Justicia de los Estados Unidos.
2003 – 2007 Convenio de Archivo Digital Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive que busca construir el Archivo del Terror Digital (ATD) a fin de disminuir o eliminar la manipulación y así preservar los textos del acervo del CDyA: procesar las imágenes de los 300,000 documentos del acervo del CDyA por OCR, montar un sistema de administración y búsqueda sobre las imágenes, e instalar equipo de computación e impresoras. El convenio establece las pautas para la publicación de análisis de documentación del CDyA en gacetillas electrónicas en la página web del National Security Archive. Se instaló el sistema ATD y se obtuvo impresora laser. 2007 Catálogo en Línea y Sitio Espejo
Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive a fin de poner en línea el catálogo de 60,000 documentos con el apoyo de la Gelman Library de la George Washington University. El convenio incluye la puesta en línea de una imagen espejo del sitio web del CDyA |
Die gesamte deutsche Presse verabscheut “GoMoPa”, deren “Kinderportal” und deren Tarnblogs wie “Schei**hausblog” sowie Extremnews und Die Bewertung
Published – Abbas, Netanyahu & Obama at the U.N. : responses from a Palestinian and a Jew
From: Tikkun <magazine[at]tikkun.org>
Subject: Abbas, Netanyahu & Obama at the U.N. : responses from a Palestinian and a Jew
Editor’s Note: As we often do in the magazine, the website, and these emails, here are responses you are unlikely to read or hear or see in the mass media to the President of Palestine Abbas and the Prime Minister of Israel Netanyahu in relationship to what they have been doing at the U.N. Our first respondent is a Palestinian activist in Ramallah, the second a Jewish columnist in NYC.
Kudos Mr. Abbas
Reply
Mazin Qumsiyeh mazin[at]qumsiyeh.org to rabbilerner, Human show details 11:18 AM (1 hour ago)
http://popular-resistance.blogspot.com/2011/09/kudos-mr-abbas.html
Mahmoud Abbas gave a brilliant speech at the United Nations, getting rounds of applause from most of the representatives. I think it demonstrated clearly and unambiguously that the Palestinian leadership has been “unreasonably reasonable” and has instead seen the hopes of peace and of millions of Palestinians suffering for 63 years dashed on the rock of Israeli expansionist, colonial, and apartheid policies. He explained that Israel has been taking one unilateral action after another each resulting in more pain and suffering for our people. Going to the UN, he explained is putting things back where the problems started (he did not use the last two words but I do). He said a word that I think he should defend strongly that no person or country with an iota of logic or conscience should reject the Palestinian state membership in the UN or its formation in the 22% of historic Palestine that is the West Bank and Gaza. I think he took a courageous step and gave a good performance. Now we here on the ground in Palestine hope and will push for additional follow-up steps. From our own perspective, three things are critical:
1) That he and his administration now implement quickly the reconciliation agreement signed by all Palestinian factions most notably the one about creating a representative Palestinian National Council. In his speech he said he hopes this will be done in a few weeks. We hope this will be done quickly and not any longer than four weeks.
2) That he and his administration act quickly and decisively to really promote popular unarmed resistance throughout Palestine and among Palestinians in exile. In forming a new government, the ministry that is now in charge of walls and settlements should be either a) dismantled or b) reconfigured. A new strategy to encourage real nonviolent resistance must be adopted. We must end the practice of holding a few demonstrative actions that do not disturb the occupation and that are used to enrich a few people. We must instead allow the kind of popular resistance that have been effective from our history (see my book that details challenges and opportunities learned from this history and available in Arabic and English). He also said he will pursue this.
3) The Palestinian people are waiting to see clear evidence of change; a new Palestinian Spring as Mr. Abbas called it. This requires seeing visibly what Mr. Abbas talked about: transparency, accountability, democracy, and freedom.
There were those who worried that going to the UN will raise the expectations of the Palestinian people who then may turn to despair and more if they do not see a change on the ground. I say a) it is great to raise the expectations, and b) we, the Palestinian people will never turn to despair but we will revolt if we do not see real changes and stronger steps. I share Abu Mazen’s hope that the international community steps up to the plate. But I also hope that we all go back to our people and take those steps that will ensure our freedom.
I also listened to Netanyahu’s speech and was just amazed at how many lies can be packed in one speech. It is not even worth detailing except to refer you to this link: http://www.qumsiyeh.org/liesandtruths/
In this occasion, it might be worth comparing Israel and the Palestinians.
Israel Palestinians Population----------------5.5 million Jewish---------11 million (7 million refugees or displaced) Land controlled ----------91.7%----------------------8.3% of historic Palestine Nature--------------------Occupier/colonizer---------Occupied people Military Personnel--------Regular 175,000------------None --------------------------Reserves, 500,000 Irregulars----------------10-50,000------------------3-5,000 --------------------------Armed settlers-------------Armed underground forces Police/other security-----30,000---------------------50,000 Tanks----------------------3,800---------------------0 Artillery------------------1500 large----------------0 Submarines-----------------6 ------------------------0 Warships-------------------20-30---------------------0 Combat airplanes-----------2000----------------------0 Nuclear Weapons----------->300-----------------------0 GDP-----------------------$195 billion--------------$4 billion Military expenditure------$10 billion----------------Negligible (security services) Casuaties (63 years)-------6,000 killed--------------75,000 killed ---------------------------20,000 injured------------300,000 injured Abducted/jailed------------30------------------------400,000 Homes demolished-----------0-------------------------50,000 Refugees created-----------0------------------------>6 million people
Mr. President, we don’t want a shortcut, we want our freedom by Abir Kopty
http://mondoweiss.net/2011/09/mr-president-we-dont-want-a-shortcut-we-want-our-freedom.html
Palestinians on statehood: ‘We want action, not votes at the UN’ Villagers who have often been at the sharp end of Palestinian-Israeli relations are skeptical about the UN route
http://www.guardian.co.uk/world/2011/sep/14/palestinian-statehood-action-un
*************************************************************************
On Israel And Palestine, Obama Is Rick Perry
President Barack Obama’s speech to the U.N. General Assembly succeeded in making clear why the Palestinians had no other choice but to take their statehood bid to the U.N. and why the United States can no longer pretend to be an “honest broker” in the conflict.
For the first time since the U.N. conferred statehood on Israel 63 years ago, the sitting U.S president told the world body that the United States will back Israel, right or wrong. The president’s speech was so one-sided, in fact, that he sounded a lot like Texas Gov. Rick Perry, who gave a similar speech to a group of “pro-Israel” right-wingers one day earlier. Perry is not the president, so his speech was different, except for the motivation, which was same.
Both speeches were standard “pro-Israel” bloviating, but Perry gave his on the campaign trail and not in front of the entire world. (I hesitate to call a speech opposing Palestinian statehood “pro-Israel” when the latest comprehensive poll on the subject says that 70 percent of Israelis say Israel should support the U.N.’s decision if statehood is granted.)
The very best explanation of what Obama did at the United Nations came from Daniel Levy, a Brit who moved to Israel right out of college 18 years ago. Levy’s quote appeared on page one of the Washington Post.
“There is virtually no thread of reason running between the way he [Obama] related to the rest of the world and its developments, particularly in the Middle East, and the positions he espoused on Israel-Palestine a conflict apparently occurring on another planet,” said Daniel Levy, co-director of the Middle East Task Force at the New America Foundation. “Palestinian freedoms, rights and self-determination are somehow supposed to be attained without the recourse to leverage, international law or meaningful international support, considered to be necessary and legitimate virtually everywhere else.”
Of course, there is one “thread,” although it is not of “reason.” Every word in Obama’s speech was designed not to advance a resolution of the Israeli-Palestinian conflict but to keep single-issue donors and, to a lesser extent, single-issue voters in his camp for the 2012 election. Not a week goes by without the Obama team sending emails out to people it deems Israel voters to remind them of all the wonderful things this president has done for Israel. One recently was dedicated to citing quotes from Prime Minister Netanyahu praising Obama, the first time I can remember that a president sought to validate himself by citing the praise of a foreign leader.
Obama isn’t lying about his “pro-Israel” record, however. This administration has been the most one-sided supporter of everything Israel asks for since 1948. There is no competition. Not even George W. Bush comes close.
When the Israelis, following Obama’s election, asked Bush to give Israel permission to bomb Iran, he said no, despite his vice president and neoconservative aides pushing the Israeli position hard. Bush also did more than Obama to advance the peace process that the Israeli right hates so much, convening an international summit at Aqaba and being the first president to say, in unambiguous terms, that the United States supports “two states, living side by side in peace and security.”
On Israel, Obama is to the right of Bush, to the right of Reagan, and certainly to the right of Clinton. On Israel and Palestine, Barack Obama is Rick Perry.
Of course, Obama’s outrageous surrender to Netanyahu still won’t impress the Israel-Firsters. They have despised him from day one, for all kinds of reasons, and predictably condemned the speech. Meanwhile, Israel’s thuggish far-right foreign minister, Avigdor Lieberman, told reporters that “I am ready to sign on this speech with both hands.”
Lieberman is telling the truth he could have written Obama’s speech and the neocons are lying. But neocons are adherents of the Sen. Mitch McConnell (R-KY) school: They have only one goal, which is to defeat this president. And although privately they celebrate their amazing success at intimidating Obama into submission, publicly they denounce him and send scary emails to senior citizens in Florida and New Jersey warning them that Obama wants to destroy Israel.
But these speeches and love-ins with Netanyahu accomplish nothing for Obama. The single-issue Israel voters and donors (3 percent of the Jewish community) will take their money and votes elsewhere.
And Netanyahu will, working from Jerusalem, do everything he can to help the Republicans win the next election. It’s almost funny how these people would exchange the person who is the most “pro-Israel” president ever (looking at it from their “maintain-the-occupation-at-all-costs” vantage point) for an unknown quantity like Perry or Romney. After all, a Republican whose main constituency is Wall Street would likely turn out to approach Israel with more skepticism than Obama does.
But it’s a game. Netanyahu and the lobby want to defeat Obama to demonstrate, yet again, who calls the shots on U.S. Middle East policy.
But forget the campaign for a moment which is what Obama should have done when addressing the U.N. The president’s speech was an embarrassing disaster. Since 2009, 1,600 Palestinians (overwhelmingly civilians and over 400 children) have been killed by the Israeli army. Thirteen Israelis have been killed over the same period. Despite that, Obama devoted 120 words of his speech to Israeli suffering (even going so far as to cite the Holocaust) and not one word to Palestinian suffering.
Example: An Australian newspaper reports on a new film about the tragedy of Palestinian women in Gaza (under full Israeli blockade) who are suffering with breast cancer but are not permitted by Israel to leave Gaza for treatment. (They used to go to Israeli hospitals or hospitals in the Arab states and Europe.) Nor does Israel permit the import of the radioactive isotopes used to treat breast cancers. So they die.
One could go on and on about the horrors of the occupation but it won’t matter to the politicians who determine U.S. foreign policy. They know which side their bread is buttered on, as Obama demonstrated at the U.N. this week.
But, I’m surprised to say, Obama did Palestinians and the 70 percent of Israelis who support statehood a big favor. By demonstrating that the United States refuses to play the role of “honest broker” and by telling the U.N. that we are Israel and Israel is us, the United States is yielding the role of Middle East peacemaker to others. The French, Turks, Indians, Brazilians, Chinese, South Africans, and Russians don’t agree on much. But they do agree on the urgency of the creation of a Palestinian state in the areas occupied in 1967. And they agree that the United States, no longer the superpower it once was, should move over and let countries not fully invested in one side play a more constructive role.
Those who wonder how these “other countries” could exert the leadership the U.S. has abdicated might consider the issue of economics, trade, etc. Israel does not live on an island with the United States. It is part of the world and not even the United States and the $3.5 billion it hands over to Israel each year (no strings attached) can save Israel if the rest of the world says “enough.”
Obama has chosen to abdicate. The rest of the world is eager to step up.
And that is why I have no doubt that the state of Palestine was created this week at the United Nations. By opting out, Obama did a tremendous favor to Palestinians and Israelis both. Palestinians will have their fully sovereign, contiguous state. And the Jewish state of Israel will finally be secure. As Israelis like to say, “yhiyeh tov.” Or as Arabs say, “insha’Allah khair.” Everything will be fine.
———————————————–
If these emails are helpful to you, perhaps you could subscribe to Tikkun at http://www.tikkun.org so that we could afford to continue provide this service? or join our Network of Spiritual Progressives at http://www.spiritualprogressives.org.
unsubscribe: Click here
if you are having trouble unsubscribing Click here
Copyright 2010 Tikkun Magazine. Tikkun is a registered trademark.
2342 Shattuck Avenue, #1200
Berkeley, CA 94704
510-644-1200
Fax 510-644-1255
HANDELSBLATT ÜBER DIE KRIMINELLEN BETRÜGER DER “GoMoPa”
Zu den fingierten Betrügern der “GoMoPa” gehören auch der “Schei**hausblog” (Nomen est Omen), “Extremnews” und “Die Bewertung aus Leipzig
TOP-SECRET – EN EL 15 ANIVERSARIO DEL ARCHIVO DEL TERROR
COOPERACIÓN En apoyo al Archivo del Terror
2000 Primer convenio de cooperación El 17 de Febrero 2000 el National Security Archive y la Corte Suprema de Justicia lanzaron una iniciativa de cooperación a fin de recaudar fondos y recursos para digitalizar el acervo del CDyA, adquirir el hardware y software necesarios para hacer accesible el acervo a través del internet y capacitar al personal del CDyA. En esa ocasión se adquirió un nuevo equipo de computación y se estableció el acceso a internet del CDyA 2001 – 2002 Memoria Histórica, Democracia y Derechos Humanos (MHDDH) En 2001, La Corte Suprema de Justicia y la Universidad Católica de Asunción, con el apoyo del National Security Archive en Washington DC, lanzaron un proyecto de dos años diseñado para atender a los desafíos de responder al incremento de peticiones de habeas data y del público en general y el acelerado desarrollo la tecnología digital y el internet. El proyecto “Memoria Histórica, Democracia y Derechos Humanos (MHDDH)”. El proyecto fue financiado por el Fondo para la Democracia y los Derechos Humanos del Departamento de Estado de los Estados Unidos y fue administrado por la US AID. Un equipo asesor de la Corte Suprema de Justicia coordino el proyecto y sus miembros fueron Rosa Palau, Co-Directora del CDyA, el Embajador Jorge Lara Castro, catedrático de la UCA, y Carlos Osorio, Director del Proyecto de Documentación del Cono Sur del National Security Archive. Entre Septiembre 2001 y Diciembre 2002, el proyecto logro: 1) Microfilmar 200,000 páginas del Acervo del CDyA. El apoyo inicial proveído por US AID y la Corte Suprema de Justicia en 1993 permitió microfilmar el 60% del acervo del Archivo. El proyecto MHDDH proveyó los recursos financieros que permitieron al personal cualificado de la Corte Suprema de Justicia llevar a cabo el resto de la microfilmación. El proyecto ayudo a pagar salarios de operadores y técnicos, adquirir rollos y materiales para reencuadernar los libros microfilmados. 2) Catalogación de Sesenta Mil Documentos para responder a Habeas Data
Un equipo supervisado por la Universidad Católica y dirigido por un archivista profesional, catálogo 60,000 documentos considerados los más pertinentes para responder a los centenares de peticiones de Habeas Data que recibe el CDyA anualmente. El catálogo montado en una base de datos WinIsis, permite realizar búsquedas en los campos básicos siguientes: Fecha, Nombres, Organizaciones, Términos Geográficos, Tipo de Documento, Fondo, Ubicación Física y Rollo y Número de Fotograma. 3) Acceso público al catálogo de 60,000 documentos El proyecto diseñó el sistema para publicar este catálogo en el internet como una manera de facilitar el acceso del público al acervo del CDyA. 4) Digitalización de 300,000 documentos El proyecto MHDDH financio la producción de más de 500,000 imágenes digitales de los documentos del acervo del CDyA, estableciendo así las bases para una futura instalación de un sistema de administración y búsqueda de un archivo digital. 5) Re equipamiento del CDyA Se instalaron estanterías metálicas deslizantes y se adquirió material de computación 6) Gira por Washington DC En diciembre 2002, el National Security Archive organizó una gira de capacitación para el personal del CDyA que incluyo visitas y talleres en la Universidad George Washington, el Instituto por una Sociedad Abierta, el Archivo Nacional, la Biblioteca del Congreso y la Biblioteca de la Corte Suprema de Justicia de los Estados Unidos.
2003 – 2007 Convenio de Archivo Digital Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive que busca construir el Archivo del Terror Digital (ATD) a fin de disminuir o eliminar la manipulación y así preservar los textos del acervo del CDyA: procesar las imágenes de los 300,000 documentos del acervo del CDyA por OCR, montar un sistema de administración y búsqueda sobre las imágenes, e instalar equipo de computación e impresoras. El convenio establece las pautas para la publicación de análisis de documentación del CDyA en gacetillas electrónicas en la página web del National Security Archive. Se instaló el sistema ATD y se obtuvo impresora laser. 2007 Catálogo en Línea y Sitio Espejo
Se firma convenio de Cooperación entre la Corte Suprema de Justicia y el National Security Archive a fin de poner en línea el catálogo de 60,000 documentos con el apoyo de la Gelman Library de la George Washington University. El convenio incluye la puesta en línea de una imagen espejo del sitio web del CDyA
|
TOP-SECRET – FCC Preserving Open Internet
[Federal Register Volume 76, Number 185 (Friday, September 23, 2011)] [Rules and Regulations] [Pages 59192-59235] From the Federal Register Online via the Government Printing Office [www.gpo.gov] [FR Doc No: 2011-24259] [[Page 59191]] Vol. 76 Friday, No. 185 September 23, 2011 Part II Federal Communications Commission ----------------------------------------------------------------------- 47 CFR Parts 0 and 8 Preserving the Open Internet; Final Rule Federal Register / Vol. 76 , No. 185 / Friday, September 23, 2011 / Rules and Regulations [[Page 59192]] ----------------------------------------------------------------------- FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 0 and 8 [GN Docket No. 09-191; WC Docket No. 07-52; FCC 10-201] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final rule. ----------------------------------------------------------------------- SUMMARY: This Report and Order establishes protections for broadband service to preserve and reinforce Internet freedom and openness. The Commission adopts three basic protections that are grounded in broadly accepted Internet norms, as well as our own prior decisions. First, transparency: fixed and mobile broadband providers must disclose the network management practices, performance characteristics, and commercial terms of their broadband services. Second, no blocking: fixed broadband providers may not block lawful content, applications, services, or non-harmful devices; mobile broadband providers may not block lawful Web sites, or block applications that compete with their voice or video telephony services. Third, no unreasonable discrimination: fixed broadband providers may not unreasonably discriminate in transmitting lawful network traffic. These rules, applied with the complementary principle of reasonable network management, ensure that the freedom and openness that have enabled the Internet to flourish as an engine for creativity and commerce will continue. This framework thus provides greater certainty and predictability to consumers, innovators, investors, and broadband providers, as well as the flexibility providers need to effectively manage their networks. The framework promotes a virtuous circle of innovation and investment in which new uses of the network--including new content, applications, services, and devices--lead to increased end-user demand for broadband, which drives network improvements that in turn lead to further innovative network uses. DATES: Effective Date: These rules are effective November 20, 2011. FOR FURTHER INFORMATION CONTACT: Matt Warner, (202) 418-2419 or e-mail, matthew.warner@fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Report and Order (Order) in GN Docket No. 09-191, WC Docket No. 07-52, FCC 10- 201, adopted December 21, 2010 and released December 23, 2010. The complete text of this document is available on the Commission's Web site at http://www.fcc.gov. It is also available for inspection and copying during normal business hours in the FCC Reference Information Center, Portals II, 445 12th Street, SW., Room CY-A257, Washington, DC 20554. This document may also be purchased from the Commission's duplicating contractor, Best Copy and Printing, Inc., 445 12th Street, SW., Room CY-B402, Washington, DC 20554, telephone (800) 378-3160 or (202) 863-2893, facsimile (202) 863-2898, or via e-mail at http://www.bcpiweb.com. Synopsis of the Order I. Preserving the Free and Open Internet In this Order the Commission takes an important step to preserve the Internet as an open platform for innovation, investment, job creation, economic growth, competition, and free expression. To provide greater clarity and certainty regarding the continued freedom and openness of the Internet, we adopt three basic rules that are grounded in broadly accepted Internet norms, as well as our own prior decisions: i. Transparency. Fixed and mobile broadband providers must disclose the network management practices, performance characteristics, and terms and conditions of their broadband services; ii. No blocking. Fixed broadband providers may not block lawful content, applications, services, or non-harmful devices; mobile broadband providers may not block lawful Web sites, or block applications that compete with their voice or video telephony services; and iii. No unreasonable discrimination. Fixed broadband providers may not unreasonably discriminate in transmitting lawful network traffic. We believe these rules, applied with the complementary principle of reasonable network management, will empower and protect consumers and innovators while helping ensure that the Internet continues to flourish, with robust private investment and rapid innovation at both the core and the edge of the network. This is consistent with the National Broadband Plan goal of broadband access that is ubiquitous and fast, promoting the global competitiveness of the United States. In late 2009, we launched a public process to determine whether and what actions might be necessary to preserve the characteristics that have allowed the Internet to grow into an indispensable platform supporting our nation's economy and civic life, and to foster continued investment in the physical networks that enable the Internet. Since then, more than 100,000 commenters have provided written input. Commission staff held several public workshops and convened a Technological Advisory Process with experts from industry, academia, and consumer advocacy groups to collect their views regarding key technical issues related to Internet openness. This process has made clear that the Internet has thrived because of its freedom and openness--the absence of any gatekeeper blocking lawful uses of the network or picking winners and losers online. Consumers and innovators do not have to seek permission before they use the Internet to launch new technologies, start businesses, connect with friends, or share their views. The Internet is a level playing field. Consumers can make their own choices about what applications and services to use and are free to decide what content they want to access, create, or share with others. This openness promotes competition. It also enables a self-reinforcing cycle of investment and innovation in which new uses of the network lead to increased adoption of broadband, which drives investment and improvements in the network itself, which in turn lead to further innovative uses of the network and further investment in content, applications, services, and devices. A core goal of this Order is to foster and accelerate this cycle of investment and innovation. The record and our economic analysis demonstrate, however, that the openness of the Internet cannot be taken for granted, and that it faces real threats. Indeed, we have seen broadband providers endanger the Internet's openness by blocking or degrading content and applications without disclosing their practices to end users and edge providers, notwithstanding the Commission's adoption of open Internet principles in 2005.\1\ In light of these considerations, as well as the limited choices most consumers have for broadband service, broadband [[Page 59193]] providers' financial interests in telephony and pay television services that may compete with online content and services, and the economic and civic benefits of maintaining an open and competitive platform for innovation and communication, the Commission has long recognized that certain basic standards for broadband provider conduct are necessary to ensure the Internet's continued openness. The record also establishes the widespread benefits of providing greater clarity in this area-- clarity that the Internet's openness will continue, that there is a forum and procedure for resolving alleged open Internet violations, and that broadband providers may reasonably manage their networks and innovate with respect to network technologies and business models. We expect the costs of compliance with our prophylactic rules to be small, as they incorporate longstanding openness principles that are generally in line with current practices and with norms endorsed by many broadband providers. Conversely, the harms of open Internet violations may be substantial, costly, and in some cases potentially irreversible. --------------------------------------------------------------------------- \1\ In this Order we use ``broadband'' and ``broadband Internet access service'' interchangeably, and ``broadband provider'' and ``broadband Internet access provider'' interchangeably. ``End user'' refers to any individual or entity that uses a broadband Internet access service; we sometimes use ``subscriber'' or ``consumer'' to refer to those end users that subscribe to a particular broadband Internet access service. We use ``edge provider'' to refer to content, application, service, and device providers, because they generally operate at the edge rather than the core of the network. These terms are not mutually exclusive. --------------------------------------------------------------------------- The rules we proposed in the Open Internet NPRM and those we adopt in this Order follow directly from the Commission's bipartisan Internet Policy Statement, adopted unanimously in 2005 and made temporarily enforceable for certain broadband providers in 2005 and 2007; openness protections the Commission established in 2007 for users of certain wireless spectrum; and a notice of inquiry in 2007 that asked, among other things, whether the Commission should add a principle of nondiscrimination to the Internet Policy Statement. Our rules build upon these actions, first and foremost by requiring broadband providers to be transparent in their network management practices, so that end users can make informed choices and innovators can develop, market, and maintain Internet-based offerings. The rules also prevent certain forms of blocking and discrimination with respect to content, applications, services, and devices that depend on or connect to the Internet. An open, robust, and well-functioning Internet requires that broadband providers have the flexibility to reasonably manage their networks. Network management practices are reasonable if they are appropriate and tailored to achieving a legitimate network management purpose. Transparency and end-user control are touchstones of reasonableness. We recognize that broadband providers may offer other services over the same last-mile connections used to provide broadband service. These ``specialized services'' can benefit end users and spur investment, but they may also present risks to the open Internet. We will closely monitor specialized services and their effects on broadband service to ensure, through all available mechanisms, that they supplement but do not supplant the open Internet. Mobile broadband is at an earlier stage in its development than fixed broadband and is evolving rapidly. For that and other reasons discussed below, we conclude that it is appropriate at this time to take measured steps in this area. Accordingly, we require mobile broadband providers to comply with the transparency rule, which includes enforceable disclosure obligations regarding device and application certification and approval processes; we prohibit providers from blocking lawful Web sites; and we prohibit providers from blocking applications that compete with providers' voice and video telephony services. We will closely monitor the development of the mobile broadband market and will adjust the framework we adopt in this Order as appropriate. These rules are within our jurisdiction over interstate and foreign communications by wire and radio. Further, they implement specific statutory mandates in the Communications Act (``Act'') and the Telecommunications Act of 1996 (``1996 Act''), including provisions that direct the Commission to promote Internet investment and to protect and promote voice, video, and audio communications services. The framework we adopt aims to ensure the Internet remains an open platform--one characterized by free markets and free speech--that enables consumer choice, end-user control, competition through low barriers to entry, and the freedom to innovate without permission. The framework does so by protecting openness through high-level rules, while maintaining broadband providers' and the Commission's flexibility to adapt to changes in the market and in technology as the Internet continues to evolve. II. The Need for Open Internet Protections In the Open Internet NPRM (FCC 09-93 published at 74 FR 62638, November 30, 2009), we sought comment on the best means for preserving and promoting a free and open Internet. We noted the near-unanimous view that the Internet's openness and the transparency of its protocols have been critical to its unparalleled success. Citing evidence of broadband providers covertly blocking or degrading Internet traffic, and concern that broadband providers have the incentive and ability to expand those practices in the near future, we sought comment on prophylactic rules designed to preserve the Internet's prevailing norms of openness. Specifically, we sought comment on whether the Commission should codify the four principles stated in the Internet Policy Statement, plus proposed nondiscrimination and transparency rules, all subject to reasonable network management.\2\ --------------------------------------------------------------------------- \2\ The Open Internet NPRM recast the Internet Policy Statement principles as rules rather than consumer entitlements, but did not change the fact that protecting and empowering end users is a central purpose of open Internet protections. --------------------------------------------------------------------------- Commenters agree that the open Internet is an important platform for innovation, investment, competition, and free expression, but disagree about whether there is a need for the Commission to take action to preserve its openness. Commenters who favor Commission action emphasize the risk of harmful conduct by broadband providers, and stress that failing to act could result in irreversible damage to the Internet. Those who favor inaction contend that the Internet generally is open today and is likely to remain so, and express concern that rules aimed at preventing harms may themselves impose significant costs. In this part, we assess these conflicting views. We conclude that the benefits of ensuring Internet openness through enforceable, high-level, prophylactic rules outweigh the costs. The harms that could result from threats to openness are significant and likely irreversible, while the costs of compliance with our rules should be small, in large part because the rules appear to be consistent with current industry practices. The rules are carefully calibrated to preserve the benefits of the open Internet and increase certainty for all Internet stakeholders, with minimal burden on broadband providers. A. The Internet's Openness Promotes Innovation, Investment, Competition, Free Expression, and Other National Broadband Goals Like electricity and the computer, the Internet is a ``general purpose technology'' that enables new methods of production that have a major impact on the entire economy. The Internet's founders intentionally built a network that is open, in the sense that it has no gatekeepers limiting innovation and [[Page 59194]] communication through the network.\3\ Accordingly, the Internet enables an end user to access the content and applications of her choice, without requiring permission from broadband providers. This architecture enables innovators to create and offer new applications and services without needing approval from any controlling entity, be it a network provider, equipment manufacturer, industry body, or government agency. End users benefit because the Internet's openness allows new technologies to be developed and distributed by a broad range of sources, not just by the companies that operate the network. For example, Sir Tim Berners-Lee was able to invent the World Wide Web nearly two decades after engineers developed the Internet's original protocols, without needing changes to those protocols or any approval from network operators. Startups and small businesses benefit because the Internet's openness enables anyone connected to the network to reach and do business with anyone else, allowing even the smallest and most remotely located businesses to access national and global markets, and contribute to the economy through e-commerce \4\ and online advertising.\5\ Because Internet openness enables widespread innovation and allows all end users and edge providers (rather than just the significantly smaller number of broadband providers) to create and determine the success or failure of content, applications, services, and devices, it maximizes commercial and non-commercial innovations that address key national challenges--including improvements in health care, education, and energy efficiency that benefit our economy and civic life. --------------------------------------------------------------------------- \3\ The Internet's openness is supported by an ``end-to-end'' network architecture that was formulated and debated in standard- setting organizations and foundational documents. See, e.g., WCB Letter 12/10/10, Attach. at 17-29, Vinton G. Cerf & Robert E. Kahn, A Protocol for Packet Network Interconnection, COM-22 IEEE Transactions of Commc'ns Tech. 637-48 (1974); WCB Letter 12/10/10, Attach. at 30-39, J.H. Saltzer et al., End to End Arguments in System Design, Second Int'l Conf. on Distributed Computing Systems, 509-12 (1981); WCB Letter 12/10/10, Attach. at 49-55, B. Carpenter, Internet Engineering Task Force (``IETF''), Architectural Principles of the Internet, RFC 1958, 1-8 (June 1996), http://www.ietf.org/rfc/rfc1958.txt; Lawrence Roberts, Multiple Computer Networks and Intercomputer Communication, ACM Symposium on Operation System Principles (1967). Under the end-to-end principle, devices in the middle of the network are not optimized for the handling of any particular application, while devices at network endpoints perform the functions necessary to support networked applications and services. See generally WCB Letter 12/10/10, Attach. at 40-48, J. Kempf & R. Austein, IETF, The Rise of the Middle and the Future of End-to-End: Reflections on the Evolution of the Internet Architecture, RFC 3724, 1-14 (March 2004), ftp://ftp.rfc-editor.org/in-notes/rfc3724.txt. \4\ Business-to-consumer e-commerce was estimated to total $135 billion in 2009. See WCB Letter 12/10/10, Attach. at 81-180, Robert D. Atkinson et al., The Internet Economy 25 Years After.com, Info. Tech. & Innovation Found., at 24 (March 2010), available at http://www.itif.org/files/2010-25-years.pdf. \5\ The advertising-supported Internet sustains about $300 billion of U.S. GDP. See Google Comments at 7. --------------------------------------------------------------------------- The Internet's openness is critical to these outcomes, because it enables a virtuous circle of innovation in which new uses of the network--including new content, applications, services, and devices-- lead to increased end-user demand for broadband, which drives network improvements, which in turn lead to further innovative network uses. Novel, improved, or lower-cost offerings introduced by content, application, service, and device providers spur end-user demand and encourage broadband providers to expand their networks and invest in new broadband technologies.\6\ Streaming video and e-commerce applications, for instance, have led to major network improvements such as fiber to the premises, VDSL, and DOCSIS 3.0. These network improvements generate new opportunities for edge providers, spurring them to innovate further.\7\ Each round of innovation increases the value of the Internet for broadband providers, edge providers, online businesses, and consumers. Continued operation of this virtuous circle, however, depends upon low barriers to innovation and entry by edge providers, which drive end-user demand. Restricting edge providers' ability to reach end users, and limiting end users' ability to choose which edge providers to patronize, would reduce the rate of innovation at the edge and, in turn, the likely rate of improvements to network infrastructure. Similarly, restricting the ability of broadband providers to put the network to innovative uses may reduce the rate of improvements to network infrastructure. --------------------------------------------------------------------------- \6\ We note that broadband providers can also be edge providers. \7\ For example, the increasing availability of multimedia applications on the World Wide Web during the 1990s was one factor that helped create demand for residential broadband services. Internet service providers responded by adopting new network infrastructure, modem technologies, and network protocols, and marketed broadband to residential customers. See, e.g., WCB Letter 12/13/10, Attach. at 250-72, Chetan Sharma, Managing Growth and Profits in the Yottabyte Era (2009), http://www.chetansharma.com/yottabyteera.htm (Yottabyte). By the late 1990s, a residential end user could download content at speeds not achievable even on the Internet backbone during the 1980s. See, e.g., WCB Letter 12/13/10, Attach. at 226-32, Susan Harris & Elise Gerich, The NSFNET Backbone Service: Chronicling the End of an Era, 10 ConneXions (April 1996), available at http://www.merit.edu/networkresearch/projecthistory/nsfnet/nsfnet_article.php. Higher speeds and broadband's ``always on'' capability, in turn, stimulated more innovation in applications, from gaming to video streaming, which in turn encouraged broadband providers to increase network speeds. WCB Letter 12/13/10, Attach. at 233-34, Link Hoewing, Twitter, Broadband and Innovation, PolicyBlog, Dec. 4, 2010, policyblog.verizon.com/BlogPost/626/TwitterBroadbandandInnovation.aspx. --------------------------------------------------------------------------- Openness also is essential to the Internet's role as a platform for speech and civic engagement. An informed electorate is critical to the health of a functioning democracy, and Congress has recognized that the Internet ``offer[s] a forum for a true diversity of political discourse, unique opportunities for cultural development, and myriad avenues for intellectual activity.'' Due to the lack of gatekeeper control, the Internet has become a major source of news and information, which forms the basis for informed civic discourse. Many Americans now turn to the Internet to obtain news,\8\ and its openness makes it an unrivaled forum for free expression. Furthermore, local, State, and Federal government agencies are increasingly using the Internet to communicate with the public, including to provide information about and deliver essential services. --------------------------------------------------------------------------- \8\ See WCB Letter 12/10/10, Attach. at 133-41, Pew Research Ctr. for People and the Press, Americans Spend More Time Following the News; Ideological News Sources: Who Watches and Why 17, 22 (Sept. 12, 2010), people-press.org/report/652/ (stating that ``44% of Americans say they got news through one or more Internet or mobile digital source yesterday''); WCB Letter 12/10/10, Attach. at 131-32, TVB Local Media Marketing Solutions, Local News: Local TV Stations are the Top Daily News Source, http://www.tvb.org/planning_buying/120562 (estimating that 61% of Americans get news from the Internet) (``TVB''). However, according to the Pew Project for Excellence in Journalism, the majority of news that people access online originates from legacy media. See Pew Project for Excellence in Journalism, The State of the News Media: An Annual Report on American Journalism (2010), http://www.stateofthemedia.org/2010/overview_key_findings.php (``Of news sites with half a million visitors a month (or the top 199 news sites once consulting, government and information data bases are removed), 67% are from legacy media, most of them (48%) newspapers.''). --------------------------------------------------------------------------- Television and radio broadcasters now provide news and other information online via their own Web sites, online aggregation Web sites such as Hulu, and social networking platforms. Local broadcasters are experimenting with new approaches to delivering original content, for example by creating neighborhood-focused Web sites; delivering news clips via online video programming aggregators, including AOL and Google's YouTube; and offering news from citizen journalists. In addition, broadcast networks license their full-length entertainment programs for downloading or streaming to edge providers such as Netflix and Apple. [[Page 59195]] Because these sites are becoming increasingly popular with the public, online distribution has a strategic value for broadcasters, and is likely to provide an increasingly important source of funding for broadcast news and entertainment programming. Unimpeded access to Internet distribution likewise has allowed new video content creators to create and disseminate programs without first securing distribution from broadcasters and multichannel video programming distributors (MVPDs) such as cable and satellite television companies. Online viewing of video programming content is growing rapidly.\9\ --------------------------------------------------------------------------- \9\ See Google Comments at 28; Motorola Comments at 5; MPAA Comments at 5-6; DISH Reply at 4-5; WCB Letter 12/10/10, Attach. at 22-23, Online Video Goes Mainstream, eMarketer, Apr. 28, 2010, http://www.emarketer.com/Article.aspx?R=1007664 (estimating that 29% of Internet users younger than 25 say they watch all or most of their TV online, that as of April 2010 67% of U.S. Internet users watch online video each month, and that this figure will increase to 77% by 2014); WCB Letter 12/10/10, Attach. at 20-21, Chris Nuttall, Web TVs bigger for manufacturers than 3D, Financial Times, Aug. 29, 2010, http://www.ft.com/cms/s/2/0b34043a-9fe3-11df-8cc5-00144feabdc0.html (stating that 28 million Internet-enabled TV sets are expected to be sold in 2010, an increase of 125% from 2009); WCB Letter 12/13/10, Attach. at 291-92, Sandvine, News and Events: Press Releases, http://www.sandvine.com/news/pr_detail.asp?ID=288 (estimating that Netflix represents more than 20% of peak downstream Internet traffic). Cisco expects online viewing to exert significant influence on future demand for broadband capacity, ranking as the top source of Internet traffic by the end of 2010 and accounting for 91% of global Internet traffic by 2014. WCB Letter 12/10/10, Attach. at 40-42, Press Release, Cisco, Annual Cisco Visual Networking Index Forecast Projects Global IP Traffic To Increase More than Fourfold by 2014 (June 10, 2010), http://www.cisco.com/web/MT/news/10/news_100610.html. --------------------------------------------------------------------------- In the Open Internet NPRM, the Commission sought comment on possible implications that the proposed rules might have ``on efforts to close the digital divide and encourage robust broadband adoption and participation in the Internet community by minorities and other socially and economically disadvantaged groups.'' As we noted in the Open Internet NPRM, according to a 2009 study, broadband adoption varies significantly across demographic groups.\10\ We expect that open Internet protections will help close the digital divide by maintaining relatively low barriers to entry for underrepresented groups and allowing for the development of diverse content, applications, and services.\11\ --------------------------------------------------------------------------- \10\ See Pew Internet & Am. Life Project, Home Broadband Adoption (June 2009). Approximately 14 to 24 million Americans remain without broadband access capable of meeting the requirements set forth in Section 706 of the Telecommunications Act of 1996, as amended. Inquiry Concerning the Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion, and Possible Steps to Accelerate Such Deployment Pursuant to Section 706 of the Telecommunications Act of 1996, as Amended by the Broadband Data Improvement Act et al., Sixth Broadband Deployment Report, 25 FCC Rcd 9556, 9557, para. 1 (2010) (Sixth Broadband Deployment Report). \11\ For example, Jonathan Moore founded Rowdy Orbit IPTV, an online platform featuring original programming for minority audiences, because he was frustrated by the lack of representation of people of color in traditional media. Dec. 15, 2009 Workshop Tr. at 39-40, video available at http://www.openinternet.gov/workshops/speech-democratic-engagement-and-the-open-internet.html. The Internet's openness--and the low costs of online entry--enables businesses like Rowdy Orbit to launch without having to gain approval from traditional media gatekeepers. Id. We will closely monitor the effects of the open Internet rules we adopt in this Order on the digital divide and on minority and disadvantaged consumers. See generally ColorOfChange Comments; Dec. 15, 2009 Workshop Tr. at 52-60 (remarks of Ruth Livier, YLSE); 100 Black Men of America et al. Comments at 1-2; Free Press Comments at 134-36; Center for Media Justice et al. Comments at 7-9. --------------------------------------------------------------------------- For all of these reasons, there is little dispute in this proceeding that the Internet should continue as an open platform. Accordingly, we consider below whether we can be confident that the openness of the Internet will be self-perpetuating, or whether there are threats to openness that the Commission can effectively mitigate. B. Broadband Providers Have the Incentive and Ability to Limit Internet Openness For purposes of our analysis, we consider three types of Internet activities: providing broadband Internet access service; providing content, applications, services, and devices accessed over or connected to broadband Internet access service (``edge'' products and services); and subscribing to a broadband Internet access service that allows access to edge products and services. These activities are not mutually exclusive. For example, individuals who generate and share content such as personal blogs or Facebook pages are both end users and edge providers, and a single firm could both provide broadband Internet access service and be an edge provider, as with a broadband provider that offers online video content. Nevertheless, this basic taxonomy provides a useful model for evaluating the risk and magnitude of harms from loss of openness. The record in this proceeding reveals that broadband providers potentially face at least three types of incentives to reduce the current openness of the Internet. First, broadband providers may have economic incentives to block or otherwise disadvantage specific edge providers or classes of edge providers, for example by controlling the transmission of network traffic over a broadband connection, including the price and quality of access to end users. A broadband provider might use this power to benefit its own or affiliated offerings at the expense of unaffiliated offerings. Today, broadband providers have incentives to interfere with the operation of third-party Internet-based services that compete with the providers' revenue-generating telephony and/or pay-television services. This situation contrasts with the first decade of the public Internet, when dial-up was the primary form of consumer Internet access. Independent companies such as America Online, CompuServe, and Prodigy provided access to the Internet over telephone companies' phone lines. As broadband has replaced dial-up, however, telephone and cable companies have become the major providers of Internet access service. Online content, applications, and services available from edge providers over broadband increasingly offer actual or potential competitive alternatives to broadband providers' own voice and video services, which generate substantial profits. Interconnected Voice- over-Internet-Protocol (VoIP) services, which include some over-the-top VoIP services,\12\ ``are increasingly being used as a substitute for traditional telephone service,'' \13\ and over-the-top [[Page 59196]] VoIP services represent a significant share of voice-calling minutes, especially for international calls. Online video is rapidly growing in popularity, and MVPDs have responded to this trend by enabling their video subscribers to use the Internet to view their programming on personal computers and other Internet-enabled devices. Online video aggregators such as Netflix, Hulu, YouTube, and iTunes that are unaffiliated with traditional MVPDs continue to proliferate and innovate, offering movies and television programs (including broadcast programming) on demand, and earning revenues from advertising and/or subscriptions. Several MVPDs have stated publicly that they view these services as a potential competitive threat to their core video subscription service. Thus, online edge services appear likely to continue gaining subscribers and market significance,\14\ which will put additional competitive pressure on broadband providers' own services. By interfering with the transmission of third parties' Internet-based services or raising the cost of online delivery for particular edge providers, telephone and cable companies can make those services less attractive to subscribers in comparison to their own offerings. --------------------------------------------------------------------------- \12\ The Commission's rules define interconnected VoIP as ``a service that: (1) Enables real-time, two-way voice communications; (2) requires a broadband connection from the user's location; (3) requires Internet protocol-compatible customer premises equipment (CPE); and (4) permits users generally to receive calls that originate on the public switched telephone network and to terminate calls to the public switched telephone network.'' 47 CFR 9.3. Over- the-top VoIP services require the end user to obtain broadband transmission from a third-party provider, and providers of over-the- top VoIP can vary in terms of the extent to which they rely on their own facilities. See SBC Commc'ns Inc. and AT&T Corp. Applications for Approval of Transfer of Control, WC Docket No, 05-65, Memorandum Opinion and Order, 20 FCC Rcd 18290, 18337-38, para. 86 (2005). \13\ Tel. Number Requirements for IP-Enabled Servs. Providers, Report and Order, Declaratory Ruling, Order on Remand, and NPRM, 22 FCC Rcd 19531, 19547, para. 28 (2007); see also Vonage Comments at 3-4. In merger reviews and forbearance petitions, the Commission has found the record ``inconclusive regarding the extent to which various over-the-top VoIP services should be included in the relevant product market for [mass market] local services.'' See, e.g., Verizon Commc'ns Inc. and MCI, Inc. Application for Approval of Transfer of Control, Memorandum Opinion and Order, 20 FCC Rcd 18433, 18480, para. 89 (2005); see also Petition of Qwest Corp. for Forbearance Pursuant to 47 U.S.C. sec. 160(c) in the Phoenix, Arizona Metropolitan Statistical Area, Memorandum Opinion and Order, 25 FCC Rcd 8622, 8650, para. 54 (2010) (Qwest Phoenix Order). In contrast to those proceedings, we are not performing a market power analysis in this proceeding, so we need not and do not here determine with specificity whether, and to what extent, particular over-the-top VoIP services constrain particular practices and/or rates of services governed by Section 201. Cf. Qwest Phoenix Order, 25 FCC Rcd at 8647-48, paras. 46-47 (discussing the general approach to product market definition); id. at 8651-52, paras. 55-56 (discussing the need for evidence that one service constrains the price of another service to include them in the same product market for purposes of a market power analysis). \14\ See, e.g., WCB Letter 12/10/10, Attach. at 5763, Ryan Fleming, New Report Shows More People Dropping Cable TV for Web Broadcasts, Digital Trends, Apr. 16, 2010, available at http://www.digitaltrends.com/computing/new-report-shows-that-more-and-more-people-are-dropping-cable-tv-in-favor-of-web-broadcasts. Congress recently recognized these developments by expanding disabilities access requirements to include advanced communications services. See Twenty-First Century Communications and Video Accessibility Act, Public Law 111-260; see also 156 CONG. REC. 6005 (daily ed. July 26, 2010) (remarks of Rep. Waxman) (this legislation before us * * * ensur[es] that Americans with disabilities can access the latest communications technology.); id. at 6004 (remarks of Rep. Markey) (``[T]he bill we are considering today significantly increases accessibility for Americans with disabilities to the indispensable telecommunications * * * tools of the 21st century.''); Letter from Rick Chessen, NCTA, to Marlene H. Dortch, Secretary, FCC, GN Docket No. 09-191 at 2 n.6 (filed Dec. 10, 2010). --------------------------------------------------------------------------- In addition, a broadband provider may act to benefit edge providers that have paid it to exclude rivals (for example, if one online video site were to contract with a broadband provider to deny a rival video site access to the broadband provider's subscribers). End users would be harmed by the inability to access desired content, and this conduct could lead to reduced innovation and fewer new services.\15\ Consistent with these concerns, delivery networks that are vertically integrated with content providers, including some MVPDs, have incentives to favor their own affiliated content.\16\ If broadband providers had historically favored their own affiliated businesses or those incumbent firms that paid for advantageous access to end users, some innovative edge providers that have today become major Internet businesses might not have been able to survive. --------------------------------------------------------------------------- \15\ See generally WCB Letter 12/10/10, Attach. at 23-27, Steven C. Salop & David Scheffman, Raising Rivals' Cost, 73 Am. Econ. Rev. 267-71 (1983); WCB Letter 12/10/10, Attach. at 1-23, Steven C. Salop & Thomas Krattenmaker, Anticompetitive Exclusion: Raising Rivals' Costs to Achieve Power over Price, 96 Yale L.J. 214 (1986). See also Andrew I. Gavil et al., Antitrust Law in Perspective: Cases, Concepts and Problems in Competition Policy 1153-92 (2d ed. 2008) (describing how policies fostering competition spur innovation). To similar effect, a broadband provider may raise access fees to disfavored edge providers, reducing their ability to profit by raising their costs and limiting their ability to compete with favored edge providers. \16\ See Google Comments at 30-31; Netflix Comments at 7 n.10; Vonage Reply at 4; WCB Letter 12/10/10, Attach. at 28-78, Austan Goolsbee, Vertical Integration and the Market for Broadcast and Cable Television Programming, Paper for the Federal Communications Commission 31-32 (Sept. 5, 2007) (Goolsbee Study) (finding that MVPDs excluded networks that were rivals of affiliated channels for anticompetitive reasons). Cf. WCB Letter 12/10/10, Attach. at 85-87, David Waterman & Andrew Weiss, Vertical Integration in Cable Television 142-143 (1997) (MVPD exclusion of unaffiliated content during an earlier time period); see also H.R. Rep. 102-628 (2d Sess.) at 41 (1992) (``The Committee received testimony that vertically integrated companies reduce diversity in programming by threatening the viability of rival cable programming services.''). In addition to the examples of actual misconduct that we provide, the Goolsbee Study provides empirical evidence that cable providers have acted in the past on anticompetitive incentives to foreclose rivals, supporting our concern that these and other broadband providers would act on analogous incentives in the future. We thus disagree that we rely on ``speculative harms alone'' or have failed to adduce ``empirical evidence.'' Baker Statement at * 1, * 4 (citing AT&T Reply Exh. 2 at 45 (J. Gregory Sidak & David J. Teece, Innovation Spillovers and the ``Dirt Road'' Fallacy: The Intellectual Bankruptcy of Banning Optional Transactions for Enhanced Delivery over the Internet, 6 J. Competition L. & Econ. 521, 571-72 (2010)). To the contrary, the empirical evidence and the misconduct that we describe below validate the economic theories that inform our decision in this Order. Moreover, as we explain below, by comparison to the benefits of the prophylactic measures we adopt, the costs associated with these open Internet rules are likely small. --------------------------------------------------------------------------- Second, broadband providers may have incentives to increase revenues by charging edge providers, who already pay for their own connections to the Internet, for access or prioritized access to end users. Although broadband providers have not historically imposed such fees, they have argued they should be permitted to do so. A broadband provider could force edge providers to pay inefficiently high fees because that broadband provider is typically an edge provider's only option for reaching a particular end user.\17\ Thus broadband providers have the ability to act as gatekeepers.\18\ --------------------------------------------------------------------------- \17\ Some end users can be reached through more than one broadband connection, sometimes via the same device (e.g., a smartphone that has Wi-Fi and cellular connectivity). Even so, the end user, not the edge provider, chooses which broadband provider the edge provider must rely on to reach the end user. \18\ Also known as a ``terminating monopolist.'' See, e.g., CCIA Comments at 7; Skype Comments at 10-11; Vonage Comments at 9-10; Google Reply at 8-14. A broadband provider can act as a gatekeeper even if some edge providers would have bargaining power in negotiations with broadband providers over access or prioritization fees. --------------------------------------------------------------------------- Broadband providers would be expected to set inefficiently high fees to edge providers because they receive the benefits of those fees but are unlikely to fully account for the detrimental impact on edge providers' ability and incentive to innovate and invest, including the possibility that some edge providers might exit or decline to enter the market. The unaccounted-for harms to innovation are negative externalities,\19\ and are likely to be particularly large because of the rapid pace of Internet innovation, and wide-ranging because of the role of the Internet as a general purpose technology. Moreover, fees for access or prioritized access could trigger an ``arms race'' within a given edge market segment. If one edge provider pays for access or prioritized access to end users, subscribers may tend to favor that provider's services, and competing edge providers may feel that they must respond by paying, too. --------------------------------------------------------------------------- \19\ A broadband provider may hesitate to impose costs on its own subscribers, but it will typically not take into account the effect that reduced edge provider investment and innovation has on the attractiveness of the Internet to end users that rely on other broadband providers--and will therefore ignore a significant fraction of the cost of foregone innovation. See, e.g., OIC Comments at 20-24. If the total number of broadband subscribers shrinks, moreover, the social costs unaccounted for by the broadband provider could also include the lost ability of the remaining end users to connect with the subscribers that departed (foregone direct network effects) and a smaller potential audience for edge providers. See, e.g., id. at 23. Broadband providers are also unlikely to fully account for the open Internet's power to enhance civic discourse through news and information, or for its ability to enable innovations that help address key national challenges such as education, public safety, energy efficiency, and health care. See ARL et al. Comments at 3; Google Reply at 39; American Recovery and Reinvestment Act of 2009, Public Law 111-5, 123 Stat. 115 (2009). --------------------------------------------------------------------------- Fees for access or prioritization to end users could reduce the potential profit [[Page 59197]] that an edge provider would expect to earn from developing new offerings, and thereby reduce edge providers' incentives to invest and innovate.\20\ In the rapidly innovating edge sector, moreover, many new entrants are new or small ``garage entrepreneurs,'' not large and established firms. These emerging providers are particularly sensitive to barriers to innovation and entry, and may have difficulty obtaining financing if their offerings are subject to being blocked or disadvantaged by one or more of the major broadband providers. In addition, if edge providers need to negotiate access or prioritized access fees with broadband providers,\21\ the resulting transaction costs could further raise the costs of introducing new products and might chill entry and expansion.\22\ --------------------------------------------------------------------------- \20\ See, e.g., ALA Comments at 3-4; ColorOfChange Comments at 3; Free Press Comments at 69; Google Comments at 34; Netflix Comments at 4; OIC Comments at 29-30; DISH Reply at 10. Such fees could also reduce an edge provider's incentive to invest in existing offerings, assuming the fees would be expected to increase to the extent improvements increased usage of the edge provider's offerings. \21\ Negotiations impose direct expenses and delay. See Google Comments at 34. There may also be significant costs associated with the possibility that the negotiating parties would reach an impasse. See ALA Comments at 2 (``The cable TV industry offers a telling example of the `pay to play' environment where some cable companies do not offer their customers access to certain content because the company has not successfully negotiated financial compensation with the content provider.''). Edge providers may also bear costs arising from their need to monitor the extent to which they actually receive prioritized delivery. \22\ See, e.g., Google Comments at 34-35; Shane Greenstein Notice of Ex Parte, GN Docket No. 09-191, Transaction Cost, Transparency, and Innovation for the Internet at 19, available at http://www.openinternet.gov/workshops/innovation-investment-and-the-open-internet.html; van Schewick Jan. 19, 2010 Ex Parte Letter, Opening Statement at 7 (arguing that the low costs of innovation not only make many more applications worth pursuing, but also allow a large and diverse group of people to become innovators, which in turn increases the overall amount and quality of innovation). There are approximately 1,500 broadband providers in the United States. See Wireline Competition Bureau, FCC, Internet Access Services: Status as of December 31, 2009 at 7, tbl. 13 (Dec. 2010) (FCC Internet Status Report), available at http://www.fcc.gov/Daily_Releases/Daily_Business/2010/db1208/DOC-303405A1.pdf. The innovative process frequently generates a large number of attempts, only a few of which turn out to be highly successful. Given the likelihood of failure, and that financing is not always readily available to support research and development, the innovation process in many sectors of the Internet's edge is likely to be highly sensitive to the upfront costs of developing and introducing new products. PIC Comments at 50 (``[I]t is unlikely that new entrants will have the ability (both financially and with regard to information) to negotiate with every ISP that serves the markets that they are interested in.''). --------------------------------------------------------------------------- Some commenters argue that an end user's ability to switch broadband providers eliminates these problems. But many end users may have limited choice among broadband providers, as discussed below. Moreover, those that can switch broadband providers may not benefit from switching if rival broadband providers charge edge providers similarly for access and priority transmission and prioritize each edge provider's service similarly. Further, end users may not know whether charges or service levels their broadband provider is imposing on edge providers vary from those of alternative broadband providers, and even if they do have this information may find it costly to switch. For these reasons, a dissatisfied end user, observing that some edge provider services are subject to low transmission quality, might not switch broadband providers (though they may switch to a rival edge provider in the hope of improving quality). Some commenters contend that, in the absence of open Internet rules, broadband providers that earn substantial additional revenue by assessing access or prioritization charges on edge providers could avoid increasing or could reduce the rates they charge broadband subscribers, which might increase the number of subscribers to the broadband network. Although this scenario is possible,\23\ no broadband provider has stated in this proceeding that it actually would use any revenue from edge provider charges to offset subscriber charges. In addition, these commenters fail to account for the likely detrimental effects of access and prioritization charges on the virtuous circle of innovation described above. Less content and fewer innovative offerings make the Internet less attractive for end users than would otherwise be the case. Consequently, we are unable to conclude that the possibility of reduced subscriber charges outweighs the risks of harm described herein.\24\ --------------------------------------------------------------------------- \23\ Economics literature recognizes that access charges could be harmful under some circumstances and beneficial under others. See, e.g., WCB Letter 12/10/10, Attach. at 1-62, E. Glen Weyl, A Price Theory of Multi-Sided Platforms, 100 Am. Econ. Rev. 1642, 1642-72 (2010) (the effects of allowing broadband providers to charge terminating rates to content providers are ambiguous); see also WCB Letter 12/10/10, Attach. at 180-215, John Musacchio et al., A Two-Sided Market Analysis of Provider Investment Incentives with an Application to the Net-Neutrality Issue, 8 Rev. of Network Econ. 22, 22-39 (2009) (noting that there are conditions under which ``a zero termination price is socially beneficial''). Moreover, the economic literature on two-sided markets is at an early stage of development. AT&T Comments, Exh. 3, Schwartz Decl. at 16; Jeffrey A. Eisenach (Eisenach) Reply at 11-12; cf., e.g., WCB Letter 12/10/10, Attach. at 156-79, Mark Armstrong, Competition in Two-Sided Markets, 37 Rand J. of Econ. 668 (2006); WCB Letter 12/10/10, Attach. at 216- 302, Jean-Charles Rochet & Jean Tirole, Platform Competition in Two- Sided Markets, 1 J. Eur. Econ. Ass'n 990 (2003). \24\ Indeed, demand for broadband Internet access service might decline even if subscriber fees fell, if the conduct of broadband providers discouraged demand by blocking end user access to preferred edge providers, slowing non-prioritized transmission, and breaking the virtuous circle of innovation. --------------------------------------------------------------------------- Third, if broadband providers can profitably charge edge providers for prioritized access to end users, they will have an incentive to degrade or decline to increase the quality of the service they provide to non-prioritized traffic. This would increase the gap in quality (such as latency in transmission) between prioritized access and non- prioritized access, induce more edge providers to pay for prioritized access, and allow broadband providers to charge higher prices for prioritized access. Even more damaging, broadband providers might withhold or decline to expand capacity in order to ``squeeze'' non- prioritized traffic, a strategy that would increase the likelihood of network congestion and confront edge providers with a choice between accepting low-quality transmission or paying fees for prioritized access to end users. Moreover, if broadband providers could block specific content, applications, services, or devices, end users and edge providers would lose the control they currently have over whether other end users and edge providers can communicate with them through the Internet. Content, application, service, and device providers (and their investors) could no longer assume that the market for their offerings included all U.S. end users. And broadband providers might choose to implement undocumented practices for traffic differentiation that undermine the ability of developers to create generally usable applications without having to design to particular broadband providers' unique practices or business arrangements.\25\ --------------------------------------------------------------------------- \25\ See OIC Comments at 24; Free Press Comments at 45. The transparency and reasonable network management guidelines we adopt in this Order, in particular, should reduce the likelihood of such fragmentation of the Internet. --------------------------------------------------------------------------- All of the above concerns are exacerbated by broadband providers' ability to make fine-grained distinctions in their handling of network traffic as a result of increasingly sophisticated network management tools. Such tools may be used for beneficial purposes, but they also increase broadband providers' ability to act on incentives to engage in [[Page 59198]] network practices that would erode Internet openness.\26\ --------------------------------------------------------------------------- \26\ See CCIA/CEA Comments at 4; Free Press Comments at 29-30, 143-46; Google Comments at 32-34; Netflix Comments at 3; OIC Comments at 14, 79-82; DISH Reply at 8-9; IPI Reply at 9; Vonage Reply at 5. For examples of network management tools, see, for example, WCB Letter 12/10/10, Attach. at 1-8, Allot Service Gateway, Pushing the DPI Envelope: An Introduction, at 2 (June 2007), available at http://www.sysob.com/download/AllotServiceGateway.pdf (``Reduce the performance of applications with negative influence on revenues (e.g. competitive VoIP services).''); WCB Letter 12/13/10, Attach. at 289-90, Procera Networks, PLR, http://www.proceranetworks.com/customproperties/tag/Products-PLR.html; WCB Letter 12/13/10, Attach. at 283-88, Cisco, http//:www.cisco.com/en/US/prod/collateral/ps7045/ps6129/ps6133/ps6150/prod_brochure0900aecd8025258e.pdf (marketing the ability of equipment to identify VoIP, video, and other traffic types). Vendors market their offerings as enabling broadband providers to ``make only modest incremental infrastructure investments and to control operating costs.'' WCB Letter 12/13/10, Attach. at 283, Cisco. --------------------------------------------------------------------------- Although these threats to Internet-enabled innovation, growth, and competition do not depend upon broadband providers having market power with respect to end users,\27\ most would be exacerbated by such market power. A broadband provider's incentive to favor affiliated content or the content of unaffiliated firms that pay for it to do so, its incentive to block or degrade traffic or charge edge providers for access to end users, and its incentive to squeeze non-prioritized transmission will all be greater if end users are less able to respond by switching to rival broadband providers. The risk of market power is highest in markets with few competitors, and most residential end users today have only one or two choices for wireline broadband Internet access service. As of December 2009, nearly 70 percent of households lived in census tracts where only one or two wireline or fixed wireless firms provided advertised download speeds of at least 3 Mbps and upload speeds of at least 768 Kbps \28\--the closest observable benchmark to the minimum download speed of 4 Mbps and upload speed of 1 Mbps that the Commission has used to assess broadband deployment. About 20 percent of households are in census tracts with only one provider advertising at least 3 Mbps down and 768 Kbps up. For Internet service with advertised download speeds of at least 10 Mbps down and upload speeds of at least 1.5 Mbps up, nearly 60 percent of households lived in census tracts served by only one wireline or fixed wireless broadband provider, while nearly 80 percent lived in census tracts served by no more than two wireline or fixed wireless broadband providers. --------------------------------------------------------------------------- \27\ Because broadband providers have the ability to act as gatekeepers even in the absence of market power with respect to end users, we need not conduct a market power analysis. \28\ See FCC Internet Status Report at 7, fig. 3(a). A broadband provider's presence in a census tract does not mean it offers service to all potential customers within that tract. And the data reflect subscriptions, not network capability. --------------------------------------------------------------------------- Including mobile broadband providers does not appreciably change these numbers.\29\ The roll-out of next generation mobile services is at an early stage, and the future of competition in residential broadband is unclear.\30\ The record does not enable us to make a predictive judgment that the future will be more competitive than the past. Although wireless providers are increasingly offering faster broadband services, we do not know, for example, how end users will value the trade-offs between the benefits of wireless service (e.g., mobility) and the benefits of fixed wireline service (e.g., higher download and upload speeds).\31\ We note that the two largest mobile broadband providers also offer wireline or fixed service; \32\ this could dampen their incentive to compete aggressively with wireline (or fixed) services.\33\ --------------------------------------------------------------------------- \29\ In December 2009, nearly 60% of households lived in census tracts where no more than two broadband providers offered service with 3 Mbps down and 768 Kbps up, while no mobile broadband providers offered service with 10 Mbps down and 1.5 Mbps up. Id. at 8, fig. 3(b). Mobile broadband providers generally have offered bandwidths lower than those available from fixed providers. See Yottabyte at 13-14. \30\ See National Broadband Plan at 40-42. A number of commenters discuss impediments to increased competition. See, e.g., Ad Hoc Comments at 9; Google Comments, at 18-22; IFTA Comments at 10-11; see also WCB Letter 12/10/10, Attach. at 9-16, Thomas Monath et al., Economics of Fixed Broadband Network Strategies, 41 IEEE Comm. Mag. 132, 132-39 (Sept. 2003). \31\ See Ad Hoc Comments at 9; Google Comments at 21; Vonage Comments at 8; IPI Reply at 14; WCB Letter 12/10/10, Attach. at 56- 65, Vikram Chandrasekhar & Jeffrey G. Andrews, Femtocell Networks: A Survey, 46 IEEE Comm. Mag., Sept. 2008, 59, at 59-60 (explaining mobile spectrum alone cannot compete with wireless connections to fixed networks). We also do not know how offers by a single wireless broadband provider for both fixed and mobile broadband services will perform in the marketplace. \32\ See OIC Comments at 71-72. Large cable companies that provide fixed broadband also have substantial ownership interests in Clear, the 4G wireless venture in which Sprint has a majority ownership interest. \33\ OIC Comments at 71-72; Skype Comments at 10. In cellular telephony, multimarket conduct has been found to dampen competition. See WCB Letter 12/10/10, Attach. at 1-24, P.M. Parker and L.H. R[ouml]ller, Collusive conduct in duopolies: Multimarket contact and cross ownership in the mobile telephone industry, 28 Rand J. Of Econ. 304, 304-322 (Summer 1997); WCB Letter 12/10/10, Attach. at 25-58, Meghan R. Busse, Multimarket contact and price coordination in the cellular telephone industry, 9 J. of Econ. & Mgmt. Strategy 287, 287-320 (Fall 2000). Moreover, some fixed broadband providers also provide necessary inputs to some mobile providers' offerings, such as backhaul transport to wireline facilities. --------------------------------------------------------------------------- In addition, customers may incur significant costs in switching broadband providers \34\ because of early termination fees; \35\ the inconvenience of ordering, installation, and set-up, and associated deposits or fees; possible difficulty returning the earlier broadband provider's equipment and the cost of replacing incompatible customer- owned equipment; the risk of temporarily losing service; the risk of problems learning how to use the new service; and the possible loss of a provider-specific e-mail address or Web site. --------------------------------------------------------------------------- \34\ ARL et al. Comments at 5; Google Comments at 21-22; Netflix Comments at 5; New Jersey Rate Counsel (NJRC) Comments at 17; OIC Comments at 40, 73; PIC Comments at 23; Skype Comments at 12; OIC Reply at 20-21; Paul Misener (Amazon.com) Comments at 2; see also WCB Letter 12/10/10, Attach. at 59-76, Patrick Xavier & Dimitri Ypsilanti, Switching Costs and Consumer Behavior: Implications for Telecommunications Regulation, 10(4) Info 2008, 13, 13-29 (2008). Churn is a function of many factors. See, e.g., WCB Letter 12/10/10, Attach. at 1-53, 97-153, AT&T Comments, WT Docket No. 10-133, at 51 (Aug. 2, 2010). The evidence in the record, e.g., AT&T Comments at 83, is not probative as to the extent of competition among broadband providers because it does not appropriately isolate a connection between churn levels and the extent of competition. \35\ Google Comments at 21-22. Of broadband end users with a choice of broadband providers, 32% said paying termination fees to their current provider was a major reason why they have not switched service. FCC, Broadband Decision: What Drives Consumers to Switch-- Or Stick With--Their Broadband Internet Provider 8 (Dec. 2010) (FCC Internet Survey), available at hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-303264A1.pdf. --------------------------------------------------------------------------- C. Broadband Providers Have Acted To Limit Openness These dangers to Internet openness are not speculative or merely theoretical. Conduct of this type has already come before the Commission in enforcement proceedings. As early as 2005, a broadband provider that was a subsidiary of a telephone company paid $15,000 to settle a Commission investigation into whether it had blocked Internet ports used for competitive VoIP applications. In 2008, the Commission found that Comcast disrupted certain peer-to-peer (P2P) uploads of its subscribers, without a reasonable network management justification and without disclosing its actions. Comparable practices have been observed in the provision of mobile broadband services. After entering into a contract with a company to handle online payment services, a mobile wireless provider allegedly blocked customers' attempts to use competing services to make purchases using their mobile phones. A nationwide mobile provider restricted the types of lawful applications that could be accessed over its 3G mobile wireless network. [[Page 59199]] There have been additional allegations of blocking, slowing, or degrading P2P traffic. We do not determine in this Order whether any of these practices violated open Internet principles, but we note that they have raised concerns among edge providers and end users, particularly regarding lack of transparency. For example, in May 2008 a major cable broadband provider acknowledged that it had managed the traffic of P2P services. In July 2009, another cable broadband provider entered into a class action settlement agreement stating that it had ``ceased P2P Network Management Practices,'' but allowing the provider to resume throttling P2P traffic.\36\ There is evidence that other broadband providers have engaged in similar degradation.\37\ In addition, broadband providers' terms of service commonly reserve to the provider sweeping rights to block, degrade, or favor traffic. For example, one major cable provider reserves the right to engage, ``without limitation,'' in ``port blocking, * * * traffic prioritization and protocol filtering.'' Further, a major mobile broadband provider prohibits use of its wireless service for ``downloading movies using peer-to-peer file sharing services'' and VoIP applications. And a cable modem manufacturer recently filed a formal complaint with the Commission alleging that a major broadband Internet access service provider has violated open Internet principles through overly restrictive device approval procedures. --------------------------------------------------------------------------- \36\ See RCN Settlement Agreement sec. 3.2. RCN denied any wrongdoing, but it acknowledges that in order to ease network congestion, it targeted specific P2P applications. See Letter from Jean L. Kiddo, RCN, to Marlene Dortch, Secretary, FCC, GN Docket No. 09-191, WC Docket No. 07-52, at 2-5 (filed May 7, 2010). \37\ A 2008 study by the Max Planck Institute revealed significant blocking of BitTorrent applications in the United States. Comcast and Cox were both cited as examples of providers blocking traffic. See generally WCB Letter 12/10/10, Attach. at 75- 80, Marcel Dischinger et al., Max Planck Institute, Detecting BitTorrent Blocking (2008), available at broadband.mpi-sws.org/transparency/results/08_imc_blocking.pdf; see also WCB Letter 12/ 13/10, Attach. at 235-39, Max Planck Institute for Software Systems, Glasnost: Results from Tests for BitTorrent Traffic Blocking, broadband.mpi-sws.org/transparency/results; WCB Letter 12/13/10, Attach. at 298-315, Christian Kreibich et al., Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance 15 (2010), available at http://www.icsi.berkeley.edu/pubs/techreports/TR-10-006.pdf. --------------------------------------------------------------------------- These practices have occurred notwithstanding the Commission's adoption of open Internet principles in the Internet Policy Statement; enforcement proceedings against Madison River Communications and Comcast for their interference with VoIP and P2P traffic, respectively; Commission orders that required certain broadband providers to adhere to open Internet obligations; longstanding norms of Internet openness; and statements by major broadband providers that they support and are abiding by open Internet principles. D. The Benefits of Protecting the Internet's Openness Exceed the Costs Widespread interference with the Internet's openness would likely slow or even break the virtuous cycle of innovation that the Internet enables, and would likely cause harms that may be irreversible or very costly to undo. For example, edge providers could make investments in reliance upon exclusive preferential arrangements with broadband providers, and network management technologies may not be easy to change.\38\ If the next revolutionary technology or business is not developed because broadband provider practices chill entry and innovation by edge providers, the missed opportunity may be significant, and lost innovation, investment, and competition may be impossible to restore after the fact. Moreover, because of the Internet's role as a general purpose technology, erosion of Internet openness threatens to harm innovation, investment in the core and at the edge of the network, and competition in many sectors, with a disproportionate effect on small, entering, and non-commercial edge providers that drive much of the innovation on the Internet.\39\ Although harmful practices are not certain to become widespread, there are powerful reasons for immediate concern, as broadband providers have interfered with the open Internet in the past and have incentives and an increasing ability to do so in the future. Effective open Internet rules can prevent or reduce the risk of these harms, while helping to assure Americans unfettered access to diverse sources of news, information, and entertainment, as well as an array of technologies and devices that enhance health, education, and the environment. --------------------------------------------------------------------------- \38\ As one example, Comcast's transition to a protocol-agnostic network management practice took almost nine months to complete. See Letter from Kathryn A. Zachem, V.P., Regulatory Affairs, Comcast Corp., to Marlene Dortch, Secretary, FCC, WC Docket No. 07-52 at 2 (filed July 10, 2008); Letter from Kathryn A. Zachem, V.P., Regulatory Affairs, Comcast Corp., to Marlene Dortch, Secretary, FCC, WC Docket No. 07-52 at Attach. B at 3, 9 (filed Sept. 19, 2008) (noting that the transition required ``lab tests, technical trials, customer feedback, vendor evaluations, and a third-party consulting analysis,'' as well as trials in five markets). \39\ See, e.g., ALA Comments at 2; IFTA Comments at 14. Even some who generally oppose open Internet rules agree that extracting access fees from entities that produce content or services without the anticipation of financial reward would have significant adverse effects. See WCB Letter 12/10/10, Attach. at 35-80, C. Scott Hemphill, Network Neutrality and the False Promise of Zero-Price Regulation, 25 Yale J. on Reg. 135, 161-62 (2008) (``[S]ocial production has distinctive features that make it unusually valuable, but also unusually vulnerable, to a particular form of exclusion. That mechanism of exclusion is not subject to the prohibitions of antitrust law, moreover, presenting a relatively stronger argument for regulation.''), cited in Prof. Tim Wu Comments at 9 n.22. --------------------------------------------------------------------------- By comparison to the benefits of these prophylactic measures, the costs associated with the open Internet rules adopted here are likely small. Broadband providers generally endorse openness norms--including the transparency and no blocking principles--as beneficial and in line with current and planned business practices (though they do not uniformly support rules making them enforceable).\40\ Even to the extent rules require some additional disclosure of broadband providers' practices, the costs of compliance should be modest. In addition, the high-level rules we adopt carefully balance preserving the open Internet against avoiding unduly burdensome regulation. Our rules against blocking and unreasonable discrimination are subject to reasonable network management, and our rules do not prevent broadband providers from offering specialized services such as facilities-based VoIP. In short, rules that reinforce the openness that has supported the growth of the Internet, and do not substantially change this highly successful status quo, should not entail significant compliance costs. --------------------------------------------------------------------------- \40\ We note that many broadband providers are, or soon will be, subject to open Internet requirements in connection with grants under the Broadband Technology Opportunities Program (BTOP). The American Recovery and Reinvestment Act of 2009 required that nondiscrimination and network interconnection obligations be ``contractual conditions'' of all BTOP grants. Public Law 111-5, sec. 6001(j), 123 Stat. 115 (codified at 47 U.S.C. sec. 1305). These nondiscrimination and interconnection conditions require BTOP grantees, among other things, to adhere to the principles in the Internet Policy Statement; to display any network management policies in a prominent location on the service provider's Web site; and to offer interconnection where technically feasible. --------------------------------------------------------------------------- Some commenters contend that open Internet rules are likely to reduce investment in broadband deployment. We disagree. There is no evidence that prior open Internet obligations have discouraged investment; \41\ and [[Page 59200]] numerous commenters explain that, by preserving the virtuous circle of innovation, open Internet rules will increase incentives to invest in broadband infrastructure. Moreover, if permitted to deny access, or charge edge providers for prioritized access to end users, broadband providers may have incentives to allow congestion rather than invest in expanding network capacity. And as described in Part III, below, our rules allow broadband providers sufficient flexibility to address legitimate congestion concerns and other network management considerations. Nor is there any persuasive reason to believe that in the absence of open Internet rules broadband providers would lower charges to broadband end users, or otherwise change their practices in ways that benefit innovation, investment, competition, or end users. --------------------------------------------------------------------------- \41\ See, e.g., Free Press Comments at 4, 23-25; Google Comments at 38-39; XO Comments at 12. In making prior investment decisions, broadband providers could not have reasonably assumed that the Commission would abstain from regulating in this area, as the Commission's decisions classifying cable modem service and wireline broadband Internet access service as information services included notices of proposed rulemaking seeking comment on whether the Commission should adopt rules to protect consumers. See Appropriate Framework for Broadband Access to the Internet Over Wireline Facilities et al., Report and Order and NPRM, 20 FCC Rcd 14853, 14929-35, paras. 146-59 (2005); Inquiry Concerning High-Speed Access to the Internet Over Cable & Other Facilities et al., Declaratory Ruling and NPRM, 17 FCC-- Rcd 4798, 4839-48, paras. 72-95 (2002) (seeking comment on whether the Commission should require cable operators to give unaffiliated ISPs access to broadband cable networks); see also AT&T Comments at 8 (``[T]he existing principles already address any blocking or degradation of traffic and thus eliminate any theoretical leverage providers may have to impose [unilateral `tolls'].''). --------------------------------------------------------------------------- The magnitude and character of the risks we identify make it appropriate to adopt prophylactic rules now to preserve the openness of the Internet, rather than waiting for substantial, pervasive, and potentially irreversible harms to occur before taking any action. The Supreme Court has recognized that even if the Commission cannot ``predict with certainty'' the future course of a regulated market, it may ``plan in advance of foreseeable events, instead of waiting to react to them.'' Moreover, as the Commission found in another context, ``[e]xclusive reliance on a series of individual complaints,'' without underlying rules, ``would prevent the Commission from obtaining a clear picture of the evolving structure of the entire market, and addressing competitive concerns as they arise. * * * Therefore, if the Commission exclusively relied on individual complaints, it would only become aware of specific * * * problems if and when the individual complainant's interests coincided with those of the interest of the overall `public.' '' Finally, we note that there is currently significant uncertainty regarding the future enforcement of open Internet principles and what constitutes appropriate network management, particularly in the wake of the court of appeals' vacatur of the Comcast Network Management Practices Order. A number of commenters, including leading broadband providers, recognize the benefits of greater predictability regarding open Internet protections.\42\ Broadband providers benefit from increased certainty that they can reasonably manage their networks and innovate with respect to network technologies and business models. For those who communicate and innovate on the Internet, and for investors in edge technologies, there is great value in having confidence that the Internet will remain open, and that there will be a forum available to bring complaints about violations of open Internet standards.\43\ End users also stand to benefit from assurances that services on which they depend ``won't suddenly be pulled out from under them, held ransom to extra payments either from the sites or from them.'' Providing clear yet flexible rules of the road that enable the Internet to continue to flourish is the central goal of the action we take in this Order.\44\ --------------------------------------------------------------------------- \42\ For example, AT&T has recognized that open Internet rules ``would reduce regulatory uncertainty, and should encourage investment and innovation in next generation broadband services and technologies.'' See WCB Letter 12/10/10, Attach. at 94, AT&T Statement on Proposed FCC Rules to Preserve an Open Internet, AT&T Public Policy Blog, Dec. 1, 2010, attpublicpolicy.com/government-policy/att-statement-on-proposed-fcc-rules-to-preserve-an-open-internet. Similarly, Comcast acknowledged that our proposed rules would strike ``a workable balance between the needs of the marketplace and the certainty that carefully-crafted and limited rules can provide to ensure that Internet freedom and openness are preserved.'' See David L. Cohen, FCC Proposes Rules to Preserve an Open Internet, comcastvoices, Dec. 1, 2010, blog.comcast.com/2010/12/fcc-proposes-rules-to-preserve-an-open-internet.html; see also, e.g., Final Brief for Intervenors NCTA and NBC Universal, Inc. at 11-13; 19-22, Comcast Corp. v. FCC, 600 F.3d 642 (DC Cir. 2010) (No. 08-1291). In addition to broadband providers, an array of industry leaders, venture capitalists, and public interest groups have concluded that our rules will promote investment in the Internet ecosystem by removing regulatory uncertainty. See Free Press Comments at 10; Google Comments at 40; PIC Comments at 28; WCB Letter 12/10/10, Attach. at 91 (statement of CALinnovates.org), 96 (statement of Larry Cohen, president of the Communications Workers of America), 98 (statement of Ron Conway, founder of SV Angel), 99 (statement of Craig Newmark, founder of craigslist), 105 (statement of Dean Garfield, president and CEO of the Information Technology Industry Council), 111 (Dec. 8, 2010 letter from Jeremy Liew, Managing Director, Lightspeed Venture Partners to Julius Genachowski, FCC Chairman), 112 (Dec. 1, 2010 letter from Jed Katz, Managing Director, Javelin Venture Partners to Julius Genachowski, FCC Chairman), 127 (statement of Gary Shapiro, president and CEO of the Consumer Electronics Association), 128 (statement of Ram Shriram, founder of Sherpalo Ventures), 132 (statements of Rey Ramsey, President and CEO of TechNet, and John Chambers, Chairman and CEO of Cisco), 133 (statement of John Doerr, Kleiner Perkins Caufield & Byers); XO Reply at 6. \43\ For this reason, we are not persuaded that alternative approaches, such as rules that lack a formal enforcement mechanism, a transparency rule alone, or reliance entirely on technical advisory groups to resolve disputes, would adequately address the potential harms and be less burdensome than the rules we adopt here. See, e.g., Verizon Comments at 130-34. In particular, we reject the notion that Commission action is unnecessary because the Department of Justice and the Federal Trade Commission (FTC) ``are well equipped to cure any market ills.'' Id. at 9. Our statutory responsibilities are broader than preventing antitrust violations or unfair competition. See, e.g., News Corp. and DIRECTV Group, Inc., 23 FCC Rcd 3265, 3277-78, paras. 23-25 (2008). We must, for example, promote deployment of advanced telecommunications capability, ensure that charges in connection with telecommunications services are just and reasonable, ensure the orderly development of local television broadcasting, and promote the public interest through spectrum licensing. See CDT Comments at 8-9; Comm'r Jon Liebowitz, FTC, Concurring Statement of Commissioner Jon Leibowitz Regarding the Staff Report: ``Broadband Connectivity Competition Policy'' (2007), available at http://www.ftc.gov/speeches/leibowitz/V070000statement.pdf (``[T]here is little agreement over whether antitrust, with its requirements for ex post case by case analysis, is capable of fully and in a timely fashion resolving many of the concerns that have animated the net neutrality debate.''). \44\ Contrary to the suggestion of some, neither the Department of Justice nor the FTC has concluded that the broadband market is competitive or that open Internet rules are unnecessary. See McDowell Statement at *4; Baker Statement at *3. In the submission in question, the Department observed that: (1) The wireline broadband market is highly concentrated, with most consumers served by at most two providers; (2) the prospects for additional wireline competition are dim due to the high fixed and sunk costs required to provide wireline broadband service; and (3) the extent to which mobile wireless offerings will compete with wireline offerings is unknown. See DOJ Ex Parte Jan. 4, 2010, GN Dkt. No. 09-51, at 8, 10, 13-14. The Department specifically endorsed requiring greater transparency by broadband providers, id. at 25-27, and recognized that in concentrated markets, like the broadband market, it is appropriate for policymakers to limit ``business practices that thwart innovation.'' Id. at 11. Finally, although the Department cautioned that care must be taken to avoid stifling infrastructure investment, it expressed particular concern about price regulation, which we are not adopting. Id. at 28. In 2007, the FTC issued a staff report on broadband competition policy. See FTC, Broadband Connectivity Competition Policy (June 2007). Like the Department, the FTC staff did not conclude that the broadband market is competitive. To the contrary, the FTC staff made clear that it had not studied the state of competition in any specific markets. Id. at 8, 105, 156. With regard to the merits of open Internet rules, the FTC staff report recited arguments pro and con, see, e.g., id. at 82, 105, 147-54, and called for additional study, id. at 7, 9-10, 157. --------------------------------------------------------------------------- III. Open Internet Rules To preserve the Internet's openness and broadband providers' ability to manage and expand their networks, we adopt high-level rules embodying four core principles: transparency, no blocking, no unreasonable discrimination, and reasonable network management. These rules are generally consistent with, and should not require [[Page 59201]] significant changes to, broadband providers' current practices, and are also consistent with the common understanding of broadband Internet access service as a service that enables one to go where one wants on the Internet and communicate with anyone else online.\45\ --------------------------------------------------------------------------- \45\ The definition of ``broadband Internet access service'' proposed in the Open Internet NPRM encompassed any ``Internet Protocol data transmission between an end user and the Internet.'' Open Internet NPRM, 24 FCC Rcd at 13128, App. A. Some commenters argued that this definition would cover a variety of services that do not constitute broadband Internet access service as end users and broadband providers generally understand that term, but that merely offer data transmission between a discrete set of Internet endpoints (for example, virtual private networks, or videoconferencing services). See, e.g., AT&T Comments at 96-100; Communications Workers of America (CWA) Comments at 10-12; Sprint Reply at 16-17; see also CDT Comments at 49-50 (distinguishing managed (or specialized) services from broadband Internet access service by defining the former, in part, as data transmission ``between an end user and a limited group of parties or endpoints'') (emphasis added). --------------------------------------------------------------------------- A. Scope of the Rules We find that open Internet rules should apply to ``broadband Internet access service,'' which we define as: A mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service. This term also encompasses any service that the Commission finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in this Part. The term ``broadband Internet access service'' includes services provided over any technology platform, including but not limited to wire, terrestrial wireless (including fixed and mobile wireless services using licensed or unlicensed spectrum), and satellite.\46\ --------------------------------------------------------------------------- \46\ In the Open Internet NPRM, we proposed separate definitions of the terms ``broadband Internet access,'' and ``broadband Internet access service.'' Open Internet NPRM, 24 FCC Rcd at 13128, App. A sec. 8.3. For purposes of these rules, we find it simpler to define just the service. --------------------------------------------------------------------------- ``Mass market'' means a service marketed and sold on a standardized basis to residential customers, small businesses, and other end-user customers such as schools and libraries. For purposes of this definition, ``mass market'' also includes broadband Internet access services purchased with the support of the E-rate program that may be customized or individually negotiated. The term does not include enterprise service offerings, which are typically offered to larger organizations through customized or individually negotiated arrangements. ``Broadband Internet access service'' encompasses services that ``provide the capability to transmit data to and receive data from all or substantially all Internet endpoints.'' To ensure the efficacy of our rules in this dynamic market, we also treat as a ``broadband Internet access service'' any service the Commission finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in these rules. A key factor in determining whether a service is used to evade the scope of the rules is whether the service is used as a substitute for broadband Internet access service. For example, an Internet access service that provides access to a substantial subset of Internet endpoints based on end users preference to avoid certain content, applications, or services; Internet access services that allow some uses of the Internet (such as access to the World Wide Web) but not others (such as e-mail); or a ``Best of the Web'' Internet access service that provides access to 100 top Web sites could not be used to evade the open Internet rules applicable to ``broadband Internet access service.'' Moreover, a broadband provider may not evade these rules simply by blocking end users' access to some Internet endpoints. Broadband Internet access service likely does not include services offering connectivity to one or a small number of Internet endpoints for a particular device, e.g., connectivity bundled with e-readers, heart monitors, or energy consumption sensors, to the extent the service relates to the functionality of the device.\47\ Nor does broadband Internet access service include virtual private network services, content delivery network services, multichannel video programming services, hosting or data storage services, or Internet backbone services (if those services are separate from broadband Internet access service). These services typically are not mass market services and/or do not provide the capability to transmit data to and receive data from all or substantially all Internet endpoints.\48\ --------------------------------------------------------------------------- \47\ To the extent these services are provided by broadband providers over last-mile capacity shared with broadband Internet access service, they would be specialized services. \48\ We also note that our rules apply only as far as the limits of a broadband provider's control over the transmission of data to or from its broadband customers. --------------------------------------------------------------------------- Although one purpose of our open Internet rules is to prevent blocking or unreasonable discrimination in transmitting online traffic for applications and services that compete with traditional voice and video services, we determine that open Internet rules applicable to fixed broadband providers should protect all types of Internet traffic, not just voice or video Internet traffic. This reflects, among other things, our view that it is generally preferable to neither require nor encourage broadband providers to examine Internet traffic in order to discern which traffic is subject to the rules. Even if we were to limit our rules to voice or video traffic, moreover, it is unlikely that broadband providers could reliably identify such traffic in all circumstances, particularly if the voice or video traffic originated from new services using uncommon protocols.\49\ Indeed, limiting our rules to voice and video traffic alone could spark a costly and wasteful cat-and-mouse game in which edge providers and end users seeking to obtain the protection of our rules could disguise their traffic as protected communications.\50\ --------------------------------------------------------------------------- \49\ This is true notwithstanding the increasing sophistication of network management tools, described above in Part II.B. See Arthur Callado et al., A Survey on Internet Traffic Identification, 11 IEEE Commnc'ns Surveys & Tutorials 37, 49 (2009). \50\ See IETF, Reflections on Internet Transparency, RFC 4924 at 5 (Jul. 2007) (RFC 4924) (``In practice, filtering intended to block or restrict application usage is difficult to successfully implement without customer consent, since over time developers will tend to re-engineer filtered protocols so as to avoid the filters. Thus over time, filtering is likely to result in interoperability issues or unnecessary complexity. These costs come without the benefit of effective filtering. * * *''); IETF, Considerations on the Use of a Service Identifier in Packet Headers, RFC 3639 at 3 (Oct. 2003) (RFC 3639) (``Attempts by intermediate systems to impose service-based controls on communications against the perceived interests of the end parties to the communication are often circumvented. Services may be tunneled within other services, proxied by a collaborating external host (e.g., an anonymous redirector), or simply run over an alternate port (e.g., port 8080 vs port 80 for HTTP).''). Cf. RFC 3639 at 4 (``From this perspective of network and application utility, it is preferable that no action or activity be undertaken by any agency, carrier, service provider, or organization which would cause end-users and protocol designers to generally obscure service identification information from the IP packet header.''). Our rules are nationwide and do not vary by geographic area, notwithstanding potential variations across local markets for broadband Internet access service. Uniform national rules create a more predictable policy environment for broadband providers, many of which offer services in multiple geographic areas. See, e.g., Level 3 Comments at 13; Charter Comments at iv. Edge providers will benefit from uniform treatment of their traffic in different localities and by different broadband providers. Broadband end users will also benefit from uniform rules, which protect them regardless of where they are located or which broadband provider they obtain service from. --------------------------------------------------------------------------- We recognize that there is one Internet (although it is comprised of a multitude of different networks), and that it should remain open and [[Page 59202]] interconnected regardless of the technologies and services end users rely on to access it. However, for reasons discussed in Part III.E below related to mobile broadband--including the fact that it is at an earlier stage and more rapidly evolving--we apply open Internet rules somewhat differently to mobile broadband than to fixed broadband at this time. We define ``fixed broadband Internet access service'' as a broadband Internet access service that serves end users primarily at fixed endpoints using stationary equipment, such as the modem that connects an end user's home router, computer, or other Internet access device to the network. This term encompasses fixed wireless broadband services (including services using unlicensed spectrum) and fixed satellite broadband services. We define ``mobile broadband Internet access service'' as a broadband Internet access service that serves end users primarily using mobile stations. Mobile broadband Internet access includes services that use smartphones as the primary endpoints for connection to the Internet.\51\ The discussion in this Part applies to both fixed and mobile broadband, unless specifically noted. Part III.E further discusses application of open Internet rules to mobile broadband. --------------------------------------------------------------------------- \51\ We note that Section 337(f)(1) of the Act excludes public safety services from the definition of mobile broadband Internet access service. --------------------------------------------------------------------------- For a number of reasons, these rules apply only to the provision of broadband Internet access service and not to edge provider activities, such as the provision of content or applications over the Internet. First, the Communications Act particularly directs us to prevent harms related to the utilization of networks and spectrum to provide communication by wire and radio. Second, these rules are an outgrowth of the Commission's Internet Policy Statement.\52\ The Statement was issued in 2005 when the Commission removed key regulatory protections from DSL service, and was intended to protect against the harms to the open Internet that might result from broadband providers' subsequent conduct. The Commission has always understood those principles to apply to broadband Internet access service only, as have most private-sector stakeholders.\53\ Thus, insofar as these rules translate existing Commission principles into codified rules, it is appropriate to limit the application of the rules to broadband Internet access service. Third, broadband providers control access to the Internet for their subscribers and for anyone wishing to reach those subscribers.\54\ They are therefore capable of blocking, degrading, or favoring any Internet traffic that flows to or from a particular subscriber. --------------------------------------------------------------------------- \52\ When the Commission adopted the Internet Policy Statement, it promised to incorporate the principles into ``ongoing policymaking activities.'' Internet Policy Statement, 20 FCC Rcd at 14988, para. 5. \53\ See, e.g., Appropriate Framework for Broadband Access to the Internet over Wireline Facilities, Report and Order and Notice of Proposed Rulemaking, 20 FCC Rcd 14853, 14976 (2005) (Wireline Broadband Order) (separate statement of Chairman Martin); id. at 14980 (Statement of Commissioner Copps, concurring); id. at 14983 (Statement of Commissioner Adelstein, concurring); Verizon June 8, 2009 Comments, GN Docket No. 09-51, at 86 (``These principles have helped to guide wireline providers' practices and to ensure that consumers' expectations for their public Internet access services are met.''). The Commission has conditioned wireline broadband provider merger approvals on the merged entity's compliance with these obligations. See, e.g., SBC Commc'ns Inc. and AT&T Corp. Applications for Approval of Transfer of Control, Memorandum Opinion and Order, 20 FCC Rcd 18290, 18392, para. 211 (2005). \54\ We thus find broadband providers distinguishable from other participants in the Internet marketplace. See, e.g., Verizon Comments at 36-39 (discussing a variety of other participants in the Internet ecosystem); Verizon Reply at 36-37 (same); NCTA Comments at 47-49 (same); NCTA Reply at 22 (same). --------------------------------------------------------------------------- We also do not apply these rules to dial-up Internet access service because telephone service has historically provided the easy ability to switch among competing dial-up Internet access services. Moreover, the underlying dial-up Internet access service is subject to protections under Title II of the Communications Act. The Commission's interpretation of those protections has resulted in a market for dial- up Internet access that does not present the same concerns as the market for broadband Internet access. No commenters suggested extending open Internet rules to dial-up Internet access service. Finally, we decline to apply our rules directly to coffee shops, bookstores, airlines, and other entities when they acquire Internet service from a broadband provider to enable their patrons to access the Internet from their establishments (we refer to these entities as ``premise operators'').\55\ These services are typically offered by the premise operator as an ancillary benefit to patrons. However, to protect end users, we include within our rules broadband Internet access services provided to premise operators for purposes of making service available to their patrons.\56\ Although broadband providers that offer such services are subject to open Internet rules, we note that addressing traffic unwanted by a premise operator is a legitimate network management purpose.\57\ --------------------------------------------------------------------------- \55\ See Communications Assistance for Law Enforcement Act and Broadband Access and Services, First Report and Order and Further Notice of Proposed Rulemaking, 20 FCC Rcd 14989, 15006-07, para. 36, n.99 (2005) (CALEA Order). Consistent with the Commission's approach in the CALEA Order, ``[w]e note * * * that the provider of underlying [broadband service] facilities to such an establishment would be subject to [the rules].'' Id. at 15007, para. 36. \56\ We note that the premise operator that purchases the Internet service remains the end user for purposes of our rules, however. Moreover, although not bound by our rules, we encourage premise operators to disclose relevant restrictions on broadband service they make available to their patrons. \57\ We also do not include within the rules free access to individuals' wireless networks, even if those networks are intentionally made available to others. See Electronic Frontier Foundation (EFF) Comments at 25-28. No commenter argued that open Internet rules should apply to individual operators of wireless networks in these circumstances. --------------------------------------------------------------------------- B. Transparency Promoting competition throughout the Internet ecosystem is a central purpose of these rules. Effective disclosure of broadband providers' network management practices and the performance and commercial terms of their services promotes competition--as well as innovation, investment, end-user choice, and broadband adoption--in at least five ways. First, disclosure ensures that end users can make informed choices regarding the purchase and use of broadband service, which promotes a more competitive market for broadband services and can thereby reduce broadband providers' incentives and ability to violate open Internet principles.\58\ Second, and relatedly, as end users' confidence in broadband providers' practices increases, so too should end users' adoption of broadband services--leading in turn to additional investment in Internet infrastructure as contemplated by Section 706 of the 1996 Act and other provisions of the communications laws.\59\ Third, [[Page 59203]] disclosure supports innovation, investment, and competition by ensuring that startups and other edge providers have the technical information necessary to create and maintain online content, applications, services, and devices, and to assess the risks and benefits of embarking on new projects. Fourth, disclosure increases the likelihood that broadband providers will abide by open Internet principles, and that the Internet community will identify problematic conduct and suggest fixes.\60\ Transparency thereby increases the chances that harmful practices will not occur in the first place and that, if they do, they will be quickly remedied, whether privately or through Commission oversight. Fifth, disclosure will enable the Commission to collect information necessary to assess, report on, and enforce the other open Internet rules. For all of these reasons, most commenters agree that informing end users, edge providers, and the Commission about the network management practices, performance, and commercial terms of broadband Internet access service is a necessary and appropriate step to help preserve an open Internet. --------------------------------------------------------------------------- \58\ Broadband providers may have an incentive not to provide such information to end users, as doing so can lessen switching costs for end users. Third-party information sources such as Consumer Reports and the trade press do not routinely provide such information. See CDT Comments at 31; CWA Comments at 21; DISH Comments at 2; Google Comments at ii, 64-66; Level 3 Comments at 13; Sandoval Reply at 60. Economic literature in this area also confirms that policies requiring firms to disclose information generally benefit competition and consumers. See, e.g., Mark Armstrong, Interactions Between Competition and Consumer Policy, 4 Competition Policy Int'l 97 113-16 (Spring 2008), eprints.ucl.ac.uk/7634/1/7634.pdf. \59\ See PIC Reply at 16-18; Free Press Comments at 43-45; Ad Hoc Comments at ii; CDT Comments at 5-7; ALA Comments at 3; National Hispanic Media Coalition (NHMC) Comments at 8; National Broadband Plan at 168, 174 (lack of trust in Internet is significant factor preventing non-adopters from subscribing to broadband services); 47 U.S.C. secs. 151, 230, 254, 1302. A recent FCC survey found that among non-broadband end users, 46% believed that the Internet is dangerous for kids, and 57% believed that it was too easy for personal information to be stolen online. John B. Horrigan, FCC Survey: Broadband Adoption & Use in America 17 (Mar. 2010), available at http://www.fcc.gov/DiversityFAC/032410/consumer-survey-horrigan.pdf. \60\ On a number of occasions, broadband providers have blocked lawful traffic without informing end users or edge providers. In addition to the Madison River and Comcast-BitTorrent incidents described above, broadband providers appear to have covertly blocked thousands of BitTorrent uploads in the United States throughout early 2008. See Marcel Dischinger et al.; Catherine Sandoval, Disclosure, Deception, and Deep-Packet Inspection, 78 Fordham L. Rev. 641, 666-84 (2009). --------------------------------------------------------------------------- The Open Internet NPRM sought comment on what end users and edge providers need to know about broadband service, how this information should be disclosed, when disclosure should occur, and where information should be available. The resulting record supports adoption of the following rule: A person engaged in the provision of broadband Internet access service shall publicly disclose accurate information regarding the network management practices, performance, and commercial terms of its broadband Internet access services sufficient for consumers to make informed choices regarding use of such services and for content, application, service, and device providers to develop, market, and maintain Internet offerings.\61\ --------------------------------------------------------------------------- \61\ For purposes of these rules, ``consumer'' includes any subscriber to the broadband provider's broadband Internet access service, and ``person'' includes any ``individual, group of individuals, corporation, partnership, association, unit of government or legal entity, however organized,'' cf. 47 CFR 54.8(a)(6). We also expect broadband providers to disclose information about the impact of ``specialized services,'' if any, on last-mile capacity available for, and the performance of, broadband Internet access service. The rule does not require public disclosure of competitively sensitive information or information that would compromise network security or undermine the efficacy of reasonable network management practices.\62\ For example, a broadband provider need not publicly disclose information regarding measures it employs to prevent spam practices at a level of detail that would enable a spammer to defeat those measures. --------------------------------------------------------------------------- \62\ Commenters disagree on the risks of requiring disclosure of information regarding technical, proprietary, and security-related management practices. Compare, e.g., American Cable Association (ACA) Comments at 17; AFTRA et al. Comments at ii, 16; Cox Comments at 11; Fiber-to-the-Home Council (FTTH) Comments at 3, 27; Libove Comments at 4; Sprint Comments at 16; T-Mobile Comments at 39, with, e.g., Free Press Comments at 117-18; Free Press Reply at 17-19; Digital Education Coalition (DEC) Comments at 14; NJRC Comments at 20-21. We may subsequently require disclosure of such information to the Commission; to the extent we do, we will ensure that such information is protected consistent with existing Commission procedures for treatment of confidential information. --------------------------------------------------------------------------- Despite broad agreement that broadband providers should disclose information sufficient to enable end users and edge providers to understand the capabilities of broadband services, commenters disagree about the appropriate level of detail required to achieve this goal. We believe that at this time the best approach is to allow flexibility in implementation of the transparency rule, while providing guidance regarding effective disclosure models. We expect that effective disclosures will likely include some or all of the following types of information, timely and prominently disclosed in plain language accessible to current and prospective end users and edge providers, the Commission, and third parties who wish to monitor network management practices for potential violations of open Internet principles: \63\ --------------------------------------------------------------------------- \63\ In setting forth the following categories of information subject to the transparency principle, we assume that the broadband provider has chosen to offer its services on standardized terms, although providers of ``information services'' are not obligated to do so. If the provider tailors its terms of service to meet the requirements of an individual end user, those terms must at a minimum be disclosed to the end user in accordance with the transparency principle. --------------------------------------------------------------------------- Network Practices Congestion Management: If applicable, descriptions of congestion management practices; types of traffic subject to practices; purposes served by practices; practices' effects on end users' experience; criteria used in practices, such as indicators of congestion that trigger a practice, and the typical frequency of congestion; usage limits and the consequences of exceeding them; and references to engineering standards, where appropriate.\64\ --------------------------------------------------------------------------- \64\ We note that the description of congestion management practices provided by Comcast in the wake of the Comcast-BitTorrent incident likely satisfies the transparency rule with respect to congestion management practices. See Comcast, Network Management Update, http://www.comcast.net/terms/network/update; Comcast, Comcast Corporation Description of Planned Network Management Practices to be Deployed Following the Termination of Current Practices, downloads.comcast.net/docs/Attachment_B_Future_Practices.pdf. --------------------------------------------------------------------------- Application-Specific Behavior: If applicable, whether and why the provider blocks or rate-controls specific protocols or protocol ports, modifies protocol fields in ways not prescribed by the protocol standard, or otherwise inhibits or favors certain applications or classes of applications. Device Attachment Rules: If applicable, any restrictions on the types of devices and any approval procedures for devices to connect to the network. (For further discussion of required disclosures regarding device and application approval procedures for mobile broadband providers, see infra.) Security: If applicable, practices used to ensure end-user security or security of the network, including types of triggering conditions that cause a mechanism to be invoked (but excluding information that could reasonably be used to circumvent network security). Performance Characteristics Service Description: A general description of the service, including the service technology, expected and actual access speed and latency, and the suitability of the service for real-time applications. Impact of Specialized Services: If applicable, what specialized services, if any, are offered to end users, and whether and how any specialized services may affect the last-mile capacity available for, and the performance of, broadband Internet access service. Commercial Terms Pricing: For example, monthly prices, usage-based fees, and fees for early termination or additional network services. Privacy Policies: For example, whether network management practices entail inspection of network traffic, and [[Page 59204]] whether traffic information is stored, provided to third parties, or used by the carrier for non-network management purposes. Redress Options: Practices for resolving end-user and edge provider complaints and questions. We emphasize that this list is not necessarily exhaustive, nor is it a safe harbor--there may be additional information, not included above, that should be disclosed for a particular broadband service to comply with the rule in light of relevant circumstances. Broadband providers should examine their network management practices and current disclosures to determine what additional information, if any, should be disclosed to comply with the rule. In the Open Internet NPRM, we proposed that broadband providers publicly disclose their practices on their Web sites and in promotional materials. Most commenters agree that a provider's Web site is a natural place for end users and edge providers to find disclosures, and several contend that a broadband provider's only obligation should be to post its practices on its Web site. Others assert that disclosures should also be displayed prominently at the point-of-sale, in bill inserts, and in the service contract. We agree that broadband providers must, at a minimum, prominently display or provide links to disclosures on a publicly available, easily accessible Web site that is available to current and prospective end users and edge providers as well as to the Commission, and must disclose relevant information at the point of sale. Current end users must be able to easily identify which disclosures apply to their service offering. Broadband providers' online disclosures shall be considered disclosed to the Commission for purposes of monitoring and enforcement. We may require additional disclosures directly to the Commission. We anticipate that broadband providers may be able to satisfy the transparency rule through a single disclosure, and therefore do not at this time require multiple disclosures targeted at different audiences.\65\ We also decline to adopt a specific format for disclosures, and instead require that disclosure be sufficiently clear and accessible to meet the requirements of the rule.\66\ We will, however, continue to monitor compliance with this rule, and may require adherence to a particular set of best practices in the future.\67\ --------------------------------------------------------------------------- \65\ But we expect that broadband providers will make disclosures in a manner accessible by people with disabilities. \66\ Some commenters advocate for a standard disclosure format. See, e.g., Adam Candeub et al. Reply at 7; Level 3 Comments at 13; Sprint Comments at 17. Others support a plain language requirement. See, e.g., NATOA Comments at 7; NJRC Comments at 19; IFTA Comments at 16. Other commenters, however, argue against the imposition of a standard format as inflexible and difficult to implement. See, e.g., Cox Comments at 10; National Telecommunications Cooperative Association (NTCA) Comments at 9; Qwest Comments at 11. The approach we adopt is similar to the approach adopted in the Commission's Truth-in-Billing Proceeding, where we set out basic guidelines. Truth-in-Billing and Billing Format, First Report and Order and Further NPRM, 14 FCC Rcd 7492, 7495-96, paras. 3-5 (1999). \67\ We may address this issue as part of a separate, ongoing proceeding regarding transparency for communications services more generally. Consumer Information and Disclosure, Notice of Inquiry, FCC 09-68 (rel. Aug. 28, 2010). Relatedly, the Commission has begun an effort, in partnership with broadband providers, to measure the actual speed and performance of broadband service, and we expect that the data generated by this effort will inform Commission efforts regarding disclosure. See Comment Sought on Residential Fixed Broadband Services Testing and Measurement Solution, Pleading Cycle Established, Public Notice, 25 FCC Rcd 3836 (2010) (SamKnows project); Comment Sought on Measurement of Mobile Broadband Network Performance and Coverage, Public Notice, 25 FCC Rcd 7069 (2010) (same). --------------------------------------------------------------------------- Although some commenters assert that a disclosure rule will impose significant burdens on broadband providers, no commenter cites any particular source of increased costs, or attempts to estimate costs of compliance. For a number of reasons, we believe that the costs of the disclosure rule we adopt in this Order are outweighed by the benefits of empowering end users and edge providers to make informed choices and of facilitating the enforcement of the other open Internet rules. First, we require only that providers post disclosures on their Web sites and provide disclosure at the point of sale, not that they bear the cost of printing and distributing bill inserts or other paper documents to all existing customers.\68\ Second, although we may subsequently determine that it is appropriate to require that specific information be disclosed in particular ways, the transparency rule we adopt in this Order gives broadband providers some flexibility to determine what information to disclose and how to disclose it. We also expressly exclude from the rule competitively sensitive information, information that would compromise network security, and information that would undermine the efficacy of reasonable network management practices. Third, as discussed below, by setting the effective date of these rules as November 20, 2011, we give broadband providers adequate time to develop cost effective methods of compliance. --------------------------------------------------------------------------- \68\ In a separate proceeding, the Commission has determined that the costs of making disclosure materials available on a service provider's Web site are outweighed by the public benefits where the disclosure requirement applies only to entities already using the Internet for other purposes. See Standardized and Enhanced Disclosure Requirements for Television Broadcast Licensee Public Interest Obligations, Report and Order, 23 FCC Rcd 1274, 1277-78, paras. 7-10 (2008). --------------------------------------------------------------------------- A key purpose of the transparency rule is to enable third-party experts such as independent engineers and consumer watchdogs to monitor and evaluate network management practices, in order to surface concerns regarding potential open Internet violations. We also note the existence of free software tools that enable Internet end users and edge providers to monitor and detect blocking and discrimination by broadband providers.\69\ Although current tools cannot detect all instances of blocking or discrimination and cannot substitute for disclosure of network management policies, such tools may help supplement the transparency rule we adopt in this Order.\70\ --------------------------------------------------------------------------- \69\ See Sandoval Comments at 4-5. For example, the Max Planck Institute analyzed data collected by the Glasnost tool from thousands of end user, and found that broadband providers were discriminating against application-specific traffic. See WCB Letter 12/13/10, Attach. at 235-39, Max Planck Institute for Software Systems, Glasnost: Results from Tests for BitTorrent Traffic Blocking, broadband.mpi-sws.org/transparency/results. Netalyzr is a National Science Foundation-funded project that tests a wide range of network characteristics. See International Computer Science Institute, Netalyzer, netalyzr.icsi.berkeley.edu. Similar tools are being developed for mobile broadband services. See, e.g., WindRider, Mobile Network Neutrality Monitoring System, http:// www.cs.northwestern.edu/~ict992/mobile.htm. \70\ For an example of a public-private partnership that could encourage the development of new tools to assess network management practices, see FCC Open Internet Apps Challenge, http://www.openinternet.gov/challenge. --------------------------------------------------------------------------- Although transparency is essential for preserving Internet openness, we disagree with commenters that suggest it is alone sufficient to prevent open Internet violations. The record does not convince us that a transparency requirement by itself will adequately constrain problematic conduct, and we therefore adopt two additional rules, as discussed below. C. No Blocking and No Unreasonable Discrimination 1. No Blocking The freedom to send and receive lawful content and to use and provide applications and services without fear of blocking is essential to the Internet's openness and to competition in adjacent markets such as voice communications and video and audio programming. Similarly, the ability to connect and use [[Page 59205]] any lawful devices that do not harm the network helps ensure that end users can enjoy the competition and innovation that result when device manufacturers can depend on networks' openness.\71\ Moreover, the no- blocking principle has been broadly accepted since its inclusion in the Commission's Internet Policy Statement. Major broadband providers represent that they currently operate consistent with this principle and are committed to continuing to do so.\72\ --------------------------------------------------------------------------- \71\ The Commission has long protected end users' rights to attach lawful devices that do not harm communications networks. See, e.g., Use of the Carterfone Device in Message Toll Telephone Service, 13 FCC 2d 420, 424 (1968); Amendment of Section 64.702 of the Commission's Rules and Regulations (Second Computer Inquiry), Final Decision, 77 FCC 2d 384, 388 (1980); see also Michael T. Hoeker, From Carterfone to the iPhone: Consumer Choice in the Wireless Telecommunications Marketplace, 17 CommLaw Conspectus 187, 192 (2008); Kevin Werbach, The Federal Computer Commission, 84 N.C. L. Rev. 1, 21 (2005). \72\ As Qwest states, ``Qwest and virtually all major broadband providers have supported the FCC Internet Policy Principles and voluntarily abide by those principles as good policy.'' Qwest PN Comments at 2-3, 5; see also, e.g., Comcast Comments at 27; Clearwire Comments at 1; Margaret Boles, AT&T on Comcast v. FCC Decision, AT&T Pub. Pol'y Blog (Apr. 6, 2010), attpublicpolicy.com/broadband-policy/att-statement-on-comcast-v-fcc-decision. --------------------------------------------------------------------------- In the Open Internet NPRM, the Commission proposed codifying the original three Internet Policy Statement principles that addressed blocking of content, applications and services, and devices. After consideration of the record, we consolidate the proposed rules into a single rule for fixed broadband providers: \73\ --------------------------------------------------------------------------- \73\ As described below, we adopt a tailored version of this rule for mobile broadband providers. A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not block lawful content, applications, services, or non-harmful --------------------------------------------------------------------------- devices, subject to reasonable network management. The phrase ``content, applications, services'' refers to all traffic transmitted to or from end users of a broadband Internet access service, including traffic that may not fit cleanly into any of these categories.\74\ The rule protects only transmissions of lawful content, and does not prevent or restrict a broadband provider from refusing to transmit unlawful material such as child pornography.\75\ --------------------------------------------------------------------------- \74\ See William Lehr et al. Comments at 27 (``While the proposed rules of the FCC appear to make a clear distinction between applications and services on the one hand (rule 3) and content (rule 1), we believe that there will be some activities that do not fit cleanly into these two categories''); PIC Comments at 39; RFC 4924 at 5. For this reason the rule may prohibit the blocking of a port or particular protocol used by an application, without blocking the application completely, unless such practice is reasonable network management. See Distributed Computing Industry Ass'n (DCIA) Comments at 7 (discussing work-arounds by P2P companies facing port blocking or other practices); Sandvine Reply at 3; RFC 4924. The rule also is neutral with respect to where in the protocol stack or in the network blocking could occur. \75\ The ``no blocking'' rule does not impose any independent legal obligation on broadband Internet access service providers to be the arbiter of what is lawful. See, e.g., WISPA Comments at 12- 13. --------------------------------------------------------------------------- We also note that the rule entitles end users to both connect and use any lawful device of their choice, provided such device does not harm the network.\76\ A broadband provider may require that devices conform to widely accepted and publicly-available standards applicable to its services.\77\ --------------------------------------------------------------------------- \76\ We note that MVPDs, pursuant to Section 629 and the Commission's implementing regulations, are already subject to similar requirements that give end users the right to attach devices to an MVPD system provided that the attached equipment does not cause electronic or physical harm or assist in the unauthorized receipt of service. See Implementation of Section 304 of the Telecommunications Act of 1996, Commercial Availability of Navigation Devices, Report and Order, 13 FCC Rcd 14775 (1998); 47 U.S.C.. 549; 47 CFR 76.1201-03. Nothing in this Order is intended to alter those existing rules. \77\ For example, a DOCSIS-based broadband provider is not required to support a DSL modem. See ACA Comments at 13-14; see also Satellite Broadband Commenters Comments at 8-9 (noting that an antenna and associated modem must comply with equipment and protocol standards set by satellite companies, but that ``consumers can [then] attach * * * any personal computer or wireless router they wish''). --------------------------------------------------------------------------- We make clear that the no-blocking rule bars broadband providers from impairing or degrading particular content, applications, services, or non-harmful devices so as to render them effectively unusable (subject to reasonable network management).\78\ Such a prohibition is consistent with the observation of a number of commenters that degrading traffic can have the same effects as outright blocking, and that such an approach is consistent with the traditional interpretation of the Internet Policy Statement. The Commission has recognized that in some circumstances the distinction between blocking and degrading (such as by delaying) traffic is merely ``semantic.'' --------------------------------------------------------------------------- \78\ We do not find it appropriate to interpret our rule to impose a blanket prohibition on degradation of traffic more generally. Congestion ordinarily results in degradation of traffic, and such an interpretation could effectively prohibit broadband providers from permitting congestion to occur on their networks. Although we expect broadband providers to continue to expand the capacity of their networks--and we believe our rules help ensure that they continue to have incentives to do so--we recognize that some network congestion may be unavoidable. See, e.g., AT&T Comments at 65; TWC Comments at 16-18; Internet Freedom Coalition Reply at 5. --------------------------------------------------------------------------- Some concerns have been expressed that broadband providers may seek to charge edge providers simply for delivering traffic to or carrying traffic from the broadband provider's end-user customers. To the extent that a content, application, or service provider could avoid being blocked only by paying a fee, charging such a fee would not be permissible under these rules.\79\ --------------------------------------------------------------------------- \79\ We do not intend our rules to affect existing arrangements for network interconnection, including existing paid peering arrangements. --------------------------------------------------------------------------- 2. No Unreasonable Discrimination Based on our findings that fixed broadband providers have incentives and the ability to discriminate in their handling of network traffic in ways that can harm innovation, investment, competition, end users, and free expression, we adopt the following rule: A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not unreasonably discriminate in transmitting lawful network traffic over a consumer's broadband Internet access service. Reasonable network management shall not constitute unreasonable discrimination. The rule strikes an appropriate balance between restricting harmful conduct and permitting beneficial forms of differential treatment. As the rule specifically provides, and as discussed below, discrimination by a broadband provider that constitutes ``reasonable network management'' is ``reasonable'' discrimination.\80\ We provide further guidance regarding distinguishing reasonable from unreasonable discrimination: --------------------------------------------------------------------------- \80\ We also make clear that open Internet protections coexist with other legal and regulatory frameworks. Except as otherwise described in this Order, we do not address the possible application of the no unreasonable discrimination rule to particular circumstances, despite the requests of certain commenters. See, e.g., AT&T Comments at 64-77, 108-12; PAETEC Comments at 13; see also AT&T Comments at 56 (arguing that some existing agreements could be at odds with limitations on pay for priority arrangements). Rather, we find it more appropriate to address the application of our rule in the context of an appropriate Commission proceeding with the benefit of a more comprehensive record. --------------------------------------------------------------------------- Transparency. Differential treatment of traffic is more likely to be reasonable the more transparent to the end user that treatment is. The Commission has previously found broadband provider practices to violate open Internet principles in part because they were not disclosed to end users. Transparency is particularly important with respect to the discriminatory treatment of traffic as it is often difficult for end users to determine the causes of slow or poor performance of content, applications, services, or devices. End-User Control. Maximizing end-user control is a policy goal Congress [[Page 59206]] recognized in Section 230(b) of the Communications Act, and end-user choice and control are touchstones in evaluating the reasonableness of discrimination.\81\ As one commenter observes, ``letting users choose how they want to use the network enables them to use the Internet in a way that creates more value for them (and for society) than if network providers made this choice,'' and ``is an important part of the mechanism that produces innovation under uncertainty.'' Thus, enabling end users to choose among different broadband offerings based on such factors as assured data rates and reliability, or to select quality-of- service enhancements on their own connections for traffic of their choosing, would be unlikely to violate the no unreasonable discrimination rule, provided the broadband provider's offerings were fully disclosed and were not harmful to competition or end users.\82\ We recognize that there is not a binary distinction between end-user controlled and broadband-provider controlled practices, but rather a spectrum of practices ranging from more end-user controlled to more broadband provider-controlled.\83\ And we do not suggest that practices controlled entirely by broadband providers are by definition unreasonable. --------------------------------------------------------------------------- \81\ ``The rapidly developing array of Internet and other interactive computer services * * * offer[ ] users a great degree of control over the information that they receive, as well as the potential for even greater control in the future as technology develops.'' 47 U.S.C. 230(a)(1)-(2) (emphasis added). \82\ In these types of arrangements ``[t]he broadband provider does not get any particular leverage, because the ability to select which traffic gets priority lies with individual subscribers. Meanwhile, an entity providing content, applications, or services does not need to worry about striking up relationships with various broadband providers to obtain top treatment. All it needs to worry about is building relationships with users and explaining to those users whether and how they may want to select the particular content, application, or service for priority treatment.'' CDT Comments at 27; see also Amazon Comments at 2-3; SureWest Comments at 32-33. \83\ We note that default settings set by broadband providers would likely be considered more broadband provider-controlled than end-user controlled. See generally Jason Scott Johnston, Strategic Bargaining and the Economic Theory of Contract Default Rules, 100 Yale L.J. 615 (1990); Daniel Kahneman et al., Anomalies: The Endowment Effect, Loss Aversion, and Status Quo Bias, 5 J. Econ. Persp. 193, 197-99 (1991). --------------------------------------------------------------------------- Some commenters suggest that open Internet protections would prohibit broadband providers from offering their subscribers different tiers of service or from charging their subscribers based on bandwidth consumed. We are, of course, always concerned about anti-consumer or anticompetitive practices, and we remain so here. However, prohibiting tiered or usage-based pricing and requiring all subscribers to pay the same amount for broadband service, regardless of the performance or usage of the service, would force lighter end users of the network to subsidize heavier end users. It would also foreclose practices that may appropriately align incentives to encourage efficient use of networks. The framework we adopt in this Order does not prevent broadband providers from asking subscribers who use the network less to pay less, and subscribers who use the network more to pay more. Use-Agnostic Discrimination. Differential treatment of traffic that does not discriminate among specific uses of the network or classes of uses is likely reasonable. For example, during periods of congestion a broadband provider could provide more bandwidth to subscribers that have used the network less over some preceding period of time than to heavier users. Use-agnostic discrimination (sometimes referred to as application-agnostic discrimination) is consistent with Internet openness because it does not interfere with end users' choices about which content, applications, services, or devices to use. Nor does it distort competition among edge providers. Standard Practices. The conformity or lack of conformity of a practice with best practices and technical standards adopted by open, broadly representative, and independent Internet engineering, governance initiatives, or standards-setting organizations is another factor to be considered in evaluating reasonableness. Recognizing the important role of such groups is consistent with Congress's intent that our rules in the Internet area should not ``fetter[ ]'' the free market with unnecessary regulation,\84\ and is consistent with broadband providers' historic reliance on such groups.\85\ We make clear, however, that we are not delegating authority to interpret or implement our rules to outside bodies. --------------------------------------------------------------------------- \84\ 47 U.S.C. 230(b)(2). \85\ Broadband providers' practices historically have relied on the efforts of such groups, which follow open processes conducive to broad participation. See, e.g., William Lehr et al. Comments at 24; Comcast Comments at 53-59; FTTH Comments at 12; Internet Society (ISOC) Comments at 1-2; OIC Comments at 50-52; Comcast Reply at 5-7. Moreover, Internet community governance groups develop and encourage widespread implementation of best practices, supporting an environment that facilitates innovation. --------------------------------------------------------------------------- In evaluating unreasonable discrimination, the types of practices we would be concerned about include, but are not limited to, discrimination that harms an actual or potential competitor to the broadband provider (such as by degrading VoIP applications or services when the broadband provider offers telephone service), that harms end users (such as by inhibiting end users from accessing the content, applications, services, or devices of their choice), or that impairs free expression (such as by slowing traffic from a particular blog because the broadband provider disagrees with the blogger's message). For a number of reasons, including those discussed above in Part II.B, a commercial arrangement between a broadband provider and a third party to directly or indirectly favor some traffic over other traffic in the broadband Internet access service connection to a subscriber of the broadband provider (i.e., ``pay for priority'') would raise significant cause for concern.\86\ First, pay for priority would represent a significant departure from historical and current practice. Since the beginning of the Internet, Internet access providers have typically not charged particular content or application providers fees to reach the providers' retail service end users or struck pay-for- priority deals, and the record does not contain evidence that U.S. broadband providers currently engage in such arrangements. Second this departure from longstanding norms could cause great harm to innovation and investment in and on the Internet. As discussed above, pay-for- priority arrangements could raise barriers to entry on the Internet by requiring fees from edge providers, as well as transaction costs arising from the need to reach agreements with one or more broadband providers to access a critical mass of potential end users. Fees imposed on edge providers may be excessive because few edge providers have the ability to bargain for lesser fees, and because no broadband provider internalizes the full costs of reduced innovation and the exit of edge providers from the market. Third, pay-for-priority arrangements may particularly harm non-commercial end users, including individual bloggers, libraries, schools, advocacy organizations, and other speakers, especially those who communicate through video or other content sensitive [[Page 59207]] to network congestion. Even open Internet skeptics acknowledge that pay for priority may disadvantage non-commercial uses of the network, which are typically less able to pay for priority, and for which the Internet is a uniquely important platform. Fourth, broadband providers that sought to offer pay-for-priority services would have an incentive to limit the quality of service provided to non-prioritized traffic. In light of each of these concerns, as a general matter, it is unlikely that pay for priority would satisfy the ``no unreasonable discrimination'' standard. The practice of a broadband Internet access service provider prioritizing its own content, applications, or services, or those of its affiliates, would raise the same significant concerns and would be subject to the same standards and considerations in evaluating reasonableness as third-party pay-for-priority arrangements.\87\ --------------------------------------------------------------------------- \86\ The Open Internet NPRM proposed a flat ban on discrimination and interpreted that requirement to prohibit broadband providers from ``charg[ing] a content, application, or service provider for enhanced or prioritized access to the subscribers of the broadband Internet access service provider.'' Open Internet NPRM, 24 FCC Rcd at 13104-05, paras. 104, 106. In the context of a ``no unreasonable discrimination'' rule that leaves interpretation to a case-by-case process, we instead adopt the approach to pay for priority described in this paragraph. \87\ We reject arguments that our approach to pay-for-priority arrangements is inconsistent with allowing content-delivery networks (CDNs). See, e.g., Cisco Comments at 11-12; TWC Comments at 21-22, 65, 89-90; AT&T Reply at 49-53; Bright House Reply at 9. CDN services are designed to reduce the capacity requirements and costs of the CDN's edge provider clients by hosting the content for those clients closer to end users. Unlike broadband providers, third-party CDN providers do not control the last-mile connection to the end user. And CDNs that do not deploy within an edge provider's network may still reach an end user via the user's broadband connection. See CDT Comments at 25 n.84; George Ou Comments (Preserving the Open and Competitive Bandwidth Market) at 3; see also Cisco Comments at 11; FTTH Comments at 23-24. Moreover, CDNs typically provide a benefit to the sender and recipient of traffic without causing harm to third-party traffic. Though we note disagreement regarding the impact of CDNs on other traffic, the record does not demonstrate that the use of CDNs has any material adverse effect on broadband end users' experience of traffic that is not delivered via a CDN. Compare Letter from S. Derek Turner, Free Press, to Chairman Genachowski et al., FCC, GN Docket No. 09-191, WC Docket No. 07-52, at 1-2 (filed July 29, 2010) with Letter from Richard Bennett, ITIF, to Chairman Genachowski et al., FCC, GN Docket No. 09-191, WC Docket No. 07-52, Attach. at 12 (filed Aug. 9, 2010). Indeed, the same benefits derived from using CDNs can be achieved if an edge provider's own servers happen to be located in close proximity to end users. Everything on the Internet that is accessible to an end user is not, and cannot be, in equal proximity from that end user. See John Staurulakis Inc. Comments at 5; Bret T. Swanson Reply at 4. Finally, CDN providers unaffiliated with broadband providers generally do not compete with edge providers and thus generally lack economic incentives (or the ability) to discriminate against edge providers. See Akamai Comments at 12; NASUCA Reply at 7; NCTA Reply at 25. We likewise reject proposals to limit our rules to actions taken at or below the ``network layer.'' See, e.g., Google Comments at 24-26; Vonage Reply at 2; CDT Reply at 18; Prof. Scott Jordan (Jordan) Comments at 3; see also Scott Jordan, A Layered Network Approach to Net Neutrality, Int'l J. of Commc'n 427, 432-33 (2007) (describing the OSI layers model and the actions of routers at and below the network layer) attached to Letter from Scott Jordan, Professor, University of California-Irvine, to Office of the Secretary, FCC, GN Docket No. 09-191, WC Docket No. 07-52 (filed Mar. 22, 2010). We are not persuaded that the proposed limitation is necessary or appropriate in this context. --------------------------------------------------------------------------- Because we agree with the diverse group of commenters who argue that any nondiscrimination rule should prohibit only unreasonable discrimination, we decline to adopt the more rigid nondiscrimination rule proposed in the Open Internet NPRM. A strict nondiscrimination rule would be in tension with our recognition that some forms of discrimination, including end-user controlled discrimination, can be beneficial. The rule we adopt provides broadband providers' sufficient flexibility to develop service offerings and pricing plans, and to effectively and reasonably manage their networks. We disagree with commenters who argue that a standard based on ``reasonableness'' or ``unreasonableness'' is too vague to give broadband providers fair notice of what is expected of them. This is not so. ``Reasonableness'' is a well-established standard for regulatee conduct.\88\ As other commenters have pointed out, the term ``reasonable'' is ``both administrable and indispensable to the sound administration of the nation's telecommunications laws.''\89\ --------------------------------------------------------------------------- \88\ As recently as 1995, Congress adopted the venerable ``reasonableness'' standard when it recodified provisions of the Interstate Commerce Act. ICC Termination Act of 1995, Public Law 104-88, sec. 106(a) (now codified at 49 U.S.C. 15501). \89\ AT&T Reply at 33-34 (``And no one has seriously suggested that Section 202 should itself be amended to remove the `unreasonable' qualifier on the ground that the qualifier is too `murky' or `complex.' Seventy-five years of experience have shown that qualifier to be both administrable and indispensable to the sound administration of the nation's telecommunications laws.''); see also Comcast Reply at 26 (``[T]he Commission should embrace the strong guidance against an overbroad rule and, instead, develop a standard based on `unreasonable and anticompetitive discrimination.' ''); Sprint Reply at 23 (``The unreasonable discrimination standard contained in Section 202(a) of the Act contains the very flexibility the Commission needs to distinguish desirable from improper discrimination.''); Thomas v. Chicago Park District, 534 U.S. 316, 324 (2002) (holding that denial of a permit ``when the intended use would present an unreasonable danger to the health and safety of park users or Park District employees'' is a standard that is ``reasonably specific and objective, and do[es] not leave the decision `to the whim of the administrator' '') (citation omitted); Cameron v. Johnson, 390 U.S. 611, 615-16 (1968) (stating that ``unreasonably'' ``is a widely used and well understood word, and clearly so when juxtaposed with `obstruct' and `interfere' ''). --------------------------------------------------------------------------- We also reject the argument that only ``anticompetitive'' discrimination yielding ``substantial consumer harm'' should be prohibited by our rules. We are persuaded those proposed limiting terms are unduly narrow and could allow discriminatory conduct that is contrary to the public interest. The broad purposes of this rule--to encourage competition and remove impediments to infrastructure investment while protecting consumer choice, free expression, end-user control, and the ability to innovate without permission--cannot be achieved by preventing only those practices that are demonstrably anticompetitive or harmful to consumers. Rather, the rule rests on the general proposition that broadband providers should not pick winners and losers on the Internet--even for reasons that may be independent of providers' competitive interests or that may not immediately or demonstrably cause substantial consumer harm.\90\ --------------------------------------------------------------------------- \90\ For example, slowing BitTorrent packets might only affect a few end users, but it would harm BitTorrent. More significantly, it would raise concerns among other end users and edge providers that their traffic could be slowed for any reason--or no reason at all-- which could in turn reduce incentives to innovate and invest, and change the fundamental nature of the Internet as an open platform. --------------------------------------------------------------------------- We disagree with commenters who argue that a rule against unreasonable discrimination violates Section 3(51) of the Communications Act for those broadband providers that are telecommunications carriers but do not provide their broadband Internet access service as a telecommunications service.\91\ Section 3(51) provides that a ``telecommunications carrier shall be treated as a common carrier under this Act only to the extent that it is engaged in providing telecommunications services.'' \92\ This limitation is not relevant to the Commission's actions here.\93\ The hallmark of common [[Page 59208]] carriage is an ``undertak[ing] to carry for all people indifferently.'' \94\ An entity ``will not be a common carrier where its practice is to make individualized decisions, in particular cases, whether and on what terms to deal'' with potential customers.\95\ The customers at issue here are the end users who subscribe to broadband Internet access services.\96\ With respect to those customers, a broadband provider may make individualized decisions. A broadband provider that chooses not to offer its broadband Internet access service on a common carriage basis can, for instance, decide on a case-by-case basis whether to serve a particular end user, what connection speed(s) to offer, and at what price. The open Internet rules become effective only after such a provider has voluntarily entered into a mutually satisfactory arrangement with the end user, which may be tailored to that user. Even then, as discussed above, the allowance for reasonable disparities permits customized service features such as those that enhance end user control over what Internet content is received. This flexibility to customize service arrangements for a particular customer is the hallmark of private carriage, which is the antithesis of common carriage.\97\ --------------------------------------------------------------------------- \91\ See, e.g., AT&T Comments at 209-11; Verizon Comments at 93- 95; CTIA PN Reply at 20-21. We do not read the Supreme Court's decision in FCC v. Midwest Video Corp. as addressing rules like the rules we adopt in this Order. 440 U.S. 689 (1979). There, the Court held that obligations on cable providers to ``hold out dedicated channels on a first-come, nondiscriminatory basis * * * relegated cable systems, pro tanto, to common-carrier status.'' Id. at 700-01. None of the rules adopted in this Order requires a broadband provider to ``hold out'' any capacity for the exclusive use of third parties or make a public offering of its service. \92\ 47 U.S.C. 153(51). Section 332(c)(2) contains a restriction similar to that of sec. 3(51): ``A person engaged in the provision of a service that is a private mobile service shall not, insofar as such person is so engaged, be treated as a common carrier for any purpose under this Act.'' Id. sec. 332(c)(2). Because we are not imposing any common carrier obligations on any broadband provider, including providers of ``private mobile service'' as defined in Section 332(d)(3), our requirements do not violate the limitation in Section 332(c)(2). \93\ Courts have acknowledged that the Commission is entitled to deference in interpreting the definition of ``common carrier.'' See AT&T v. FCC, 572 F.2d 17, 24 (2d Cir. 1978) (citing Red Lion Broad. Co. v. FCC, 395 U.S. 367, 381 (1969)). In adopting the rule against unreasonable discrimination, we rely, in part, on our authority under section 706, which is not part of the Communications Act. Congress enacted section 706 as part of the Telecommunications Act of 1996 and more recently codified the provision in Chapter 12 of Title 47, at 47 U.S.C. 1302. The seven titles that comprise the Communications Act appear in Chapter 5 of Title 47. Consequently, even if the rule against unreasonable discrimination were interpreted to require common carriage in a particular case, that result would not run afoul of Section 3(51) because a network operator would be treated as a common carrier pursuant to Section 706, not ``under'' the Communications Act. \94\ Nat'l Ass'n of Reg. Util. Comm'rs v. FCC, 525 F.2d 630, 641 (DC Cir. 1976) (NARUC I) (quoting Semon v. Royal Indemnity Co., 279 F.2d 737, 739 (5th Cir. 1960) and other cases); see also Verizon Comments at 93 (`` `[T]he primary sine qua non of common carrier status is a quasi-public character, which arises out of the undertaking `to carry for all people indifferently * * *.' '' (quoting Nat'l Ass'n of Reg. Util. Comm'rs v. FCC, 533 F.2d 601, 608 (DC Cir. 1976) (NARUC II)). But see CTIA Reply at 57 (suggesting that nondiscrimination is the sine qua non of common carrier regulation referred to in NARUC II). \95\ NARUC I, 525 F.2d at 641 (citing Semon, 279 F.2d at 739- 40). Commenters assert that any obligation that is similar to an obligation that appears in Title II of the Act is a ``common carrier'' obligation. See, e.g., AT&T Comments at 210-11. We disagree. Just because an obligation appears within Title II does not mean that the imposition of that obligation or a similar one results in ``treating'' an entity as a common carrier. For the meaning of common carriage treatment, which is not defined in the Act, we look to caselaw as discussed in the text. \96\ Even if edge providers were considered ``customers'' of the broadband provider, the broadband provider would not be a common carrier with regard to the role it plays in transmitting edge providers' traffic. Our rules permit broadband providers to engage in reasonable network management and, under certain circumstances, block traffic and devices, engage in reasonable discrimination, and prioritize traffic at subscribers' request. Blocking or deprioritizing certain traffic is far from ``undertak[ing] to carry for all [edge providers] indifferently.'' See NARUC I, 525 F.2d at 641. \97\ See Sw. Bell Tel. Co. v. FCC, 19 F.3d 1475, 1481 (DC Cir. 1994) (``If the carrier chooses its clients on an individual basis and determines in each particular case whether and on what terms to serve and there is no specific regulatory compulsion to serve all indifferently, the entity is a private carrier for that particular service and the Commission is not at liberty to subject the entity to regulation as a common carrier.'') (internal quotation marks omitted). Although promoting competition throughout the Internet ecosystem is a central purpose of these rules, we decline to adopt as a rule the Internet Policy Statement principle regarding consumers' entitlement to competition. We agree with those commenters that argue that the principle is too vague to be reduced to a rule and that the proposed rule as stated failed to provide any meaningful guidance regarding what conduct is and is not permissible. See, e.g., Verizon Comments at 4, 53; TPPF Comments at 7. A rule barring broadband providers from depriving end users of their entitlement to competition does not appear to be a viable method of promoting competition. We also do not wish to duplicate competitive analyses carried out by the Department of Justice, the FTC, or the Commission's merger review process. --------------------------------------------------------------------------- D. Reasonable Network Management Since at least 2005, when the Commission adopted the Internet Policy Statement, we have recognized that a flourishing and open Internet requires robust, well-functioning broadband networks, and accordingly that open Internet protections require broadband providers to be able to reasonably manage their networks. The open Internet rules we adopt in this Order expressly provide for and define ``reasonable network management'' in order to provide greater clarity to broadband providers, network equipment providers, and Internet end users and edge providers regarding the types of network management practices that are consistent with open Internet protections. In the Open Internet NPRM, the Commission proposed that open Internet rules be subject to reasonable network management, consisting of ``reasonable practices employed by a provider of broadband Internet access service to: (1) Reduce or mitigate the effects of congestion on its network or to address quality-of-service concerns; (2) address traffic that is unwanted by users or harmful; (3) prevent the transfer of unlawful content; or (4) prevent the unlawful transfer of content.'' The proposed definition also stated that reasonable network management consists of ``other reasonable network management practices.'' Upon reviewing the record, we conclude that the definition of reasonable network management should provide greater clarity regarding the standard used to gauge reasonableness, expressly account for technological differences among networks that may affect reasonable network management, and omit elements that do not relate directly to network management functions and are therefore better handled elsewhere in the rules--for example, measures to prevent the transfer of unlawful content. We therefore adopt the following definition of reasonable network management: A network management practice is reasonable if it is appropriate and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service. Legitimate network management purposes include: ensuring network security and integrity, including by addressing traffic that is harmful to the network; addressing traffic that is unwanted by end users (including by premise operators), such as by providing services or capabilities consistent with an end user's choices regarding parental controls or security capabilities; and reducing or mitigating the effects of congestion on the network. The term ``particular network architecture and technology'' refers to the differences across access platforms such as cable, DSL, satellite, and fixed wireless. As proposed in the Open Internet NPRM, we will further develop the scope of reasonable network management on a case-by-case basis, as complaints about broadband providers' actual practices arise. The novelty of Internet access and traffic management questions, the complex nature of the Internet, and a general policy of restraint in setting policy for Internet access service providers weigh in favor of a case-by-case approach. In taking this approach, we recognize the need to balance clarity with flexibility.\98\ We discuss below certain [[Page 59209]] principles and considerations that will inform the Commission's case- by-case analysis. Further, although broadband providers are not required to seek permission from the Commission before deploying a network management practice, they or others are free to do so, for example by seeking a declaratory ruling.\99\ --------------------------------------------------------------------------- \98\ Some parties contend that there will be uncertainty associated with open Internet rules, subject to reasonable network management, which will limit provider flexibility, stifle innovation, and slow providers' response time in managing their networks. See, e.g., ADTRAN Comments at 11-13; Barbara Esbin (Esbin) Comments at 7. For example, some parties express concern that that the definition proposed in the Open Internet NPRM provided insufficient guidance regarding what standard will be used to determine whether a given practice is ``reasonable.'' See, e.g., ADTRAN Comments at 13; AT&T Comments at 13; CDT Comments at 38; PIC Comments at 35-36, 39; Texas PUC Comments at 6-7; Verizon Reply at 8, 75, 78. Others contend that although clarity is needed, the Commission should not list categories of activities considered reasonable. See, e.g., Free Press Comments at 82, 85-86. We seek to balance these interests through general rules designed to give providers sufficient flexibility to implement necessary network management practices, coupled with guidance regarding certain principles and considerations that will inform the Commission's case-by-case analysis. \99\ See 47 CFR 1.2 (providing for ``a declaratory ruling terminating a controversy or removing uncertainty''). --------------------------------------------------------------------------- We reject proposals to define reasonable network management practices more expansively or more narrowly than stated above. We agree with commenters that the Commission should not adopt the ``narrowly or carefully tailored'' standard discussed in the Comcast Network Management Practices Order.\100\ We find that this standard is unnecessarily restrictive and may overly constrain network engineering decisions. Moreover, the ``narrowly tailored'' language could be read to import strict scrutiny doctrine from constitutional law, which we are not persuaded would be helpful here. Broadband providers may employ network management practices that are appropriate and tailored to the network management purpose they seek to achieve, but they need not necessarily employ the most narrowly tailored practice theoretically available to them. --------------------------------------------------------------------------- \100\ See Comcast Network Management Practices Order, 23 FCC Rcd at 13055-56, para. 47 (stating that, to be considered ``reasonable'' a network management practice ``should further a critically important interest and be narrowly or carefully tailored to serve that interest''); see also AT&T Comments at 186-87 (arguing that the Comcast standard is too narrow); Level 3 Comments at 14; PAETEC Comments at 17-18. But see Free Press Comments at 91-92 (stating that the Commission should not retreat from the fundamental framework of the Comcast standard). A ``reasonableness'' standard also has the advantage of being administrable and familiar. --------------------------------------------------------------------------- We also acknowledge that reasonable network management practices may differ across platforms. For example, practices needed to manage congestion on a fixed satellite network may be inappropriate for a fiber-to-the-home network. We also recognize the unique network management challenges facing broadband providers that use unlicensed spectrum to deliver service to end users. Unlicensed spectrum is shared among multiple users and technologies and no single user can control or assure access to the spectrum. We believe the concept of reasonable network management is sufficiently flexible to afford such providers the latitude they need to effectively manage their networks.\101\ --------------------------------------------------------------------------- \101\ See Appendix A, sec. 8.11. We recognize that the standards for fourth-generation (4G) wireless networks include the capability to prioritize particular types of traffic, and that other broadband Internet access services may incorporate similar features. Whether particular uses of these technologies constitute reasonable network management will depend on whether they are appropriate and tailored to achieving a legitimate network management purpose. --------------------------------------------------------------------------- The principles guiding case-by-case evaluations of network management practices are much the same as those that guide assessments of ``no unreasonable discrimination,'' and include transparency, end- user control, and use- (or application-) agnostic treatment. We also offer guidance in the specific context of the legitimate network management purposes listed above. Network Security or Integrity and Traffic Unwanted by End Users. Broadband providers may implement reasonable practices to ensure network security and integrity, including by addressing traffic that is harmful to the network.\102\ Many commenters strongly support allowing broadband providers to implement such network management practices. Some commenters, however, express concern that providers might implement anticompetitive or otherwise problematic practices in the name of protecting network security. We make clear that, for the singling out of any specific application for blocking or degradation based on harm to the network to be a reasonable network management practice, a broadband provider should be prepared to provide a substantive explanation for concluding that the particular traffic is harmful to the network, such as traffic that constitutes a denial-of- service attack on specific network infrastructure elements or exploits a particular security vulnerability. --------------------------------------------------------------------------- \102\ In the context of broadband Internet access service, techniques to ensure network security and integrity are designed to protect the access network and the Internet against actions by malicious or compromised end systems. Examples include spam, botnets, and distributed denial of service attacks. Unwanted traffic includes worms, malware, and viruses that exploit end-user system vulnerabilities; denial of service attacks; and spam. See IETF, Report from the IAB workshop on Unwanted Traffic March 9-10, 2006, RFC 4948, at 31 (Aug. 2007), available at http://www.rfc-editor.org/rfc/rfc4948.txt. --------------------------------------------------------------------------- Broadband providers also may implement reasonable practices to address traffic that a particular end user chooses not to receive. Thus, for example, a broadband provider could provide services or capabilities consistent with an end user's choices regarding parental controls, or allow end users to choose a service that provides access to the Internet but not to pornographic Web sites. Likewise, a broadband provider serving a premise operator could restrict traffic unwanted by that entity, though such restrictions should be disclosed. Our rule will not impose liability on a broadband provider where such liability is prohibited by Section 230(c)(2) of the Act.\103\ --------------------------------------------------------------------------- \103\ See 47 U.S.C. 230(c)(2) (no provider of an interactive computer service shall be held liable on account of ``(A) any action voluntarily taken in good faith to restrict access to or availability of material that the provider or user considers to be obscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable, whether or not such material is constitutionally protected; or (B) any action taken to enable or make available to information content providers or others the technical means to restrict access to material described in [subparagraph (A)]''). --------------------------------------------------------------------------- We note that, in some cases, mechanisms that reduce or eliminate some forms of harmful or unwanted traffic may also interfere with legitimate network traffic. Such mechanisms must be appropriate and tailored to the threat; should be evaluated periodically as to their continued necessity; and should allow end users to opt-in or opt-out if possible.\104\ Disclosures of network management practices used to address network security or traffic a particular end user does not want to receive should clearly state the objective of the mechanism and, if applicable, how an end user can opt in or out of the practice. --------------------------------------------------------------------------- \104\ For example, a network provider might be able to assess a network endpoint's posture--see IETF, Network Endpoint Assessment (NEA): Overview and Requirements, RFC 5209 (Jun. 2008); Internet Engineering Task Force, PA-TNC: A Posture Attribute (PA) Protocol Compatible with Trusted Network Connect (TNC), RFC 5792 (Mar. 2010)--and tailor port blocking accordingly. With the posture assessment, an end user might then opt out of the network management mechanism by upgrading the operating system or installing a suitable firewall. --------------------------------------------------------------------------- Network Congestion. Numerous commenters support permitting the use of reasonable network management practices to address the effects of congestion, and we agree that congestion management may be a legitimate network management purpose. For example, broadband providers may need to take reasonable steps to ensure that heavy users do not crowd out others. What constitutes congestion and what measures are reasonable to address it may vary depending on the technology platform for a particular broadband Internet access service. For example, if cable modem subscribers in a particular neighborhood are experiencing congestion, it may be reasonable for a broadband provider to temporarily limit [[Page 59210]] the bandwidth available to individual end users in that neighborhood who are using a substantially disproportionate amount of bandwidth. We emphasize that reasonable network management practices are not limited to the categories described here, and that broadband providers may take other reasonable steps to maintain the proper functioning of their networks, consistent with the definition of reasonable network management we adopt. As we stated in the Open Internet NPRM, ``we do not presume to know now everything that providers may need to do to provide robust, safe, and secure Internet access to their subscribers, much less everything they may need to do as technologies and usage patterns change in the future.'' Broadband providers should have flexibility to experiment, innovate, and reasonably manage their networks. E. Mobile Broadband There is one Internet, which should remain open for consumers and innovators alike, although it may be accessed through different technologies and services. The record demonstrates the importance of freedom and openness for mobile broadband networks, and the rationales for adopting high-level open Internet rules, discussed above, are for the most part as applicable to mobile broadband as they are to fixed broadband. Consumer choice, freedom of expression, end-user control, competition, and the freedom to innovate without permission are as important when end users are accessing the Internet via mobile broadband as via fixed. And there have been instances of mobile providers blocking certain third-party applications, particularly applications that compete with the provider's own offerings; relatedly, concerns have been raised about inadequate transparency regarding network management practices. We also note that some mobile broadband providers affirmatively state they do not oppose the application of openness rules to mobile broadband. However, as explained in the Open Internet NPRM and subsequent Public Notice, mobile broadband presents special considerations that suggest differences in how and when open Internet protections should apply. Mobile broadband is an earlier-stage platform than fixed broadband, and it is rapidly evolving. For most of the history of the Internet, access has been predominantly through fixed platforms--first dial-up, then cable modem and DSL services. As of a few years ago, most consumers used their mobile phones primarily to make phone calls and send text messages, and most mobile providers offered Internet access only via ``walled gardens'' or stripped down Web sites. Today, however, mobile broadband is an important Internet access platform that is helping drive broadband adoption, and data usage is growing rapidly. The mobile ecosystem is experiencing very rapid innovation and change, including an expanding array of smartphones, aircard modems, and other devices that enable Internet access; the emergence and rapid growth of dedicated-purpose mobile devices like e-readers; the development of mobile application (``app'') stores and hundreds of thousands of mobile apps; and the evolution of new business models for mobile broadband providers, including usage-based pricing. Moreover, most consumers have more choices for mobile broadband than for fixed (particularly fixed wireline) broadband.\105\ Mobile broadband speeds, capacity, and penetration are typically much lower than for fixed broadband, though some providers have begun offering 4G service that will enable offerings with higher speeds and capacity and lower latency than previous generations of mobile service.\106\ In addition, existing mobile networks present operational constraints that fixed broadband networks do not typically encounter. This puts greater pressure on the concept of ``reasonable network management'' for mobile providers, and creates additional challenges in applying a broader set of rules to mobile at this time. Further, we recognize that there have been meaningful recent moves toward openness in and on mobile broadband networks, including the introduction of third-party devices and applications on a number of mobile broadband networks, and more open mobile devices. In addition, we anticipate soon seeing the effects on the market of the openness conditions we imposed on mobile providers that operate on upper 700 MHz C Block (``C Block'') spectrum,\107\ which includes Verizon Wireless, one of the largest mobile wireless carriers in the U.S. --------------------------------------------------------------------------- \105\ Compare National Broadband Plan at 37 (Exh. 4-A) with 39- 40 (Exh. 4-E). However, in many areas of the country, particularly in rural areas, there are fewer options for mobile broadband. See Fourteenth Wireless Competition Report at para. 355, tbl. 39 & chart 48. This may result in some consumers having fewer options for mobile broadband than for fixed. \106\ Some fixed broadband providers contend that current mobile broadband offerings directly compete with their offerings. See Letter from Michael D. Saperstein, Jr., Director of Regulatory Affairs, Frontier Communications, to Marlene Dortch, Secretary, FCC, GN Docket No. 09-191 (filed Dec. 15, 2010) (discussing entry of wireless service into the broadband market and its effect on wireline broadband subscribership) and Attach. at 1 (citing reports that LTE is ``a very practical and encouraging substitution for DSL, particularly when you look at rural markets''); Letter from Malena F. Barzilai, Federal Government Affairs, Windstream Communications, Inc., to Marlene Dortch, Secretary, FCC, GN Docket No. 09-191 (filed Dec. 15, 2010). As part of our ongoing monitoring, we will track such competition and any impact these rules may have on it. \107\ The first network using spectrum subject to these rules has recently started offering service. See Press Release, Verizon Wireless, Blazingly Fast: Verizon Wireless Launches The World's Largest 4G LTE Wireless Network On Sunday, Dec. 5 (Dec. 5, 2010), available at news.vzw.com/news/2010/12/pr2010-12-03.html. Specifically, licensees subject to the rule must provide an open platform for third-party applications and devices. See 700 MHz Second Report and Order, 22 FCC Rcd 15289; 47 CFR 27.16. The rules we adopt in this Order are independent of those open platform requirements. We expect our observations of how the 700 MHz open platform rules affect the mobile broadband sector to inform our ongoing analysis of the application of openness rules to mobile broadband generally. 700 MHz Second Report and Order, 22 FCC Rcd at 15364-65, 15374, paras. 205, 229. A number of commenters support the Commission's waiting to determine whether to apply openness rules to mobile wireless until the effects of the C Block openness requirement can be observed. See, e.g., AT&T PN Reply, at 32-37; Cricket PN Reply at 11. We also note that some providers tout openness as a competitive advantage. See, e.g., Clearwire Comments at 7; Verizon Reply at 47-52. --------------------------------------------------------------------------- In light of these considerations, we conclude it is appropriate to take measured steps at this time to protect the openness of the Internet when accessed through mobile broadband. We apply certain of the open Internet rules, requiring compliance with the transparency rule and a basic no-blocking rule.\108\ --------------------------------------------------------------------------- \108\ We note that section 332(a) requires us, ``[i]n taking actions to manage the spectrum to be made available for use by the private mobile service,'' to consider various factors, including whether our actions will ``improve the efficiency of spectrum use and reduce the regulatory burden,'' and ``encourage competition.'' 47 U.S.C. 332(a)(2), (3). To the extent section 332(a) applies to our actions in this Order, we note that we have considered these factors. --------------------------------------------------------------------------- 1. Application of Openness Principles to Mobile Broadband a. Transparency The wide array of commenters who support a disclosure requirement generally agree that all broadband providers, including mobile broadband providers, should be required to disclose their network management practices. Although some mobile broadband providers argue that the dynamic nature of mobile network management makes meaningful disclosure difficult, we conclude that end users need a clear understanding of network management practices, performance, and commercial terms, regardless of the broadband platform they use to access the Internet. Although a number of mobile broadband [[Page 59211]] providers have adopted voluntary codes of conduct regarding disclosure, we believe that a uniform rule applicable to all mobile broadband providers will best preserve Internet openness by ensuring that end users have sufficient information to make informed choices regarding use of the network; and that content, application, service, and device providers have the information needed to develop, market, and maintain Internet offerings. The transparency rule will also aid the Commission in monitoring the evolution of mobile broadband and adjusting, as appropriate, the framework adopted in this Order. Therefore, as stated above, we require mobile broadband providers to follow the same transparency rule applicable to fixed broadband providers. Further, although we do not require mobile broadband providers to allow third-party devices or all third-party applications on their networks, we nonetheless require mobile broadband providers to disclose their third-party device and application certification procedures, if any; to clearly explain their criteria for any restrictions on use of their network; and to expeditiously inform device and application providers of any decisions to deny access to the network or of a failure to approve their particular devices or applications. With respect to the types of disclosures required to satisfy the rule, we direct mobile broadband providers to the discussion in Part III.B, above. Additionally, mobile broadband providers should follow the guidance the Commission provided to licensees of the upper 700 MHz C Block spectrum regarding compliance with their disclosure obligations, particularly regarding disclosure to third-party application developers and device manufacturers of criteria and approval procedures (to the extent applicable).\109\ For example, these disclosures include, to the extent applicable, establishing a transparent and efficient approval process for third parties, as set forth in Section 27.16(d).\110\ --------------------------------------------------------------------------- \109\ 700 MHz Second Report and Order, 22 FCC Rcd at 15371-72, para. 224 (``[A] C Block licensee must publish [for example, by posting on the provider's Web site] standards no later than the time at which it makes such standards available to any preferred vendors (i.e., vendors with whom the provider has a relationship to design products for the provider's network). We also require the C Block licensee to provide to potential customers notice of the customers' rights to request the attachment of a device or application to the licensee's network, and notice of the licensee's process for customers to make such requests, including the relevant network criteria.''). \110\ See 47 CFR 27.16(d) (``Access requests. (1) Licensees shall establish and publish clear and reasonable procedures for parties to seek approval to use devices or applications on the licensees' networks. A licensee must also provide to potential customers notice of the customers' rights to request the attachment of a device or application to the licensee's network, and notice of the licensee's process for customers to make such requests, including the relevant network criteria. (2) If a licensee determines that a request for access would violate its technical standards or regulatory requirements, the licensee shall expeditiously provide a written response to the requester specifying the basis for denying access and providing an opportunity for the requester to modify its request to satisfy the licensee's concerns.''). --------------------------------------------------------------------------- b. No Blocking We adopt a no blocking rule that guarantees end users' access to the Web and protects against mobile broadband providers' blocking applications that compete with their other primary service offering-- voice and video telephony--while ensuring that mobile broadband providers can engage in reasonable network management: A person engaged in the provision of mobile broadband Internet access service, insofar as such person is so engaged, shall not block consumers from accessing lawful Web sites, subject to reasonable network management; nor shall such person block applications that compete with the provider's voice or video telephony services, subject to reasonable network management. We understand a ``provider's voice or video telephony services'' to include a voice or video telephony service provided by any entity in which the provider has an attributable interest.\111\ We emphasize that the rule protects any and all applications that compete with a mobile broadband provider's voice or video telephony services. Further, degrading a particular Web site or an application that competes with the provider's voice or video telephony services so as to render the Web site or application effectively unusable would be considered tantamount to blocking (subject to reasonable network management). --------------------------------------------------------------------------- \111\ For the purposes of these rules, an attributable interest includes equity ownership interest in or de facto control of, or by, the entity that provides the voice or video telephony service. An attributable interest also includes any exclusive arrangement for such voice or video telephony service, including de facto exclusive arrangements. --------------------------------------------------------------------------- End users expect to be able to access any lawful Web site through their broadband service, whether fixed or mobile. Web browsing continues to generate the largest amount of mobile data traffic, and applications and services are increasingly being provisioned and used entirely through the Web, without requiring a standalone application to be downloaded to a device. Given that the mobile Web is well-developed relative to other mobile applications and services, and enjoys similar expectations of openness that characterize Web use through fixed broadband, we find it appropriate to act here. We also recognize that accessing a Web site typically does not present the same network management issues that downloading and running an app on a device may present. At this time, a prohibition on blocking access to lawful Web sites (including any related traffic transmitted or received by any plug-in, scripting language, or other browser extension) appropriately balances protection for the ability of end users to access content, applications, and services through the Web and assurance that mobile broadband providers can effectively manage their mobile broadband networks. Situations have arisen in which mobile wireless providers have blocked third-party applications that arguably compete with their telephony offerings.\112\ This type of blocking confirms that mobile broadband providers may have strong incentives to limit Internet openness when confronted with third-party applications that compete with their telephony services. Some commenters express concern that wireless providers could favor their own applications over the applications of unaffiliated developers, under the guise of reasonable network management. A number of commenters assert that blocking or hindering the delivery of services that compete with those offered by the mobile broadband provider, such as over-the-top VoIP, should be prohibited. According to Skype, for example, there is ``a consensus that at a minimum, a `no blocking' rule should apply to voice and video applications that compete with broadband network operators' own service offerings.'' Clearwire argues that the Commission should restrict only practices that appear to have an element of anticompetitive intent. Although some commenters support a broader no-blocking rule, we believe that a targeted prophylactic rule is appropriate at this [[Page 59212]] time,\113\ and necessary to deter this type of behavior in the future. --------------------------------------------------------------------------- \112\ See, e.g., Letter from James W. Cicconi, AT&T Services, Inc., to Ruth Milkman, Chief, Wireless Telecommunications Bureau, FCC, RM-11361, RM-11497 at 6-8 (filed Aug. 21, 2009); DISH PN Reply at 7 (``VoIP operators such as Skype have faced significant difficulty in gaining access across wireless Internet connections.''). Mobile providers blocking VoIP services is an issue not only in the United States, but worldwide. In Europe, the Body of European Regulators for Electronic Communications reported, among other issues, a number of cases of blocking or charging extra for VoIP services by certain European mobile operators. See European Commission, Information Society and Media Directorate-General Report on the Public Consultation on ``The Open Internet and Net Neutrality in Europe'' 2, (Nov. 9, 2010), ec.europa.eu/information--society/ policy/ecomm/library/public--consult/net--neutrality/index--en.htm. \113\ See Letter from Jonathan Spalter, Chairman, Mobile Future, to Marlene H. Dortch, Secretary, FCC, GN Docket Nos. 09-191 & 10- 127, at 3 n.16 (filed Dec. 13, 2010) (supporting tailored prohibition on blocking applications), citing AT&T Comments at 65; T-Mobile Comments, Declaration of Grant Castle at 4. The no blocking rule that we adopt for mobile broadband involves distinct treatment of applications that compete with the provider's voice and video telephony services, whereas we have adopted a broader traffic-based approach for fixed broadband. We acknowledge that this rule for mobile broadband may lead in some limited measure to the traffic- identification difficulties discussed with respect to fixed broadband. We find, however, that the reasons for taking our cautious approach to mobile broadband outweigh this concern, particularly in light of our intent to monitor developments involving mobile broadband, including this and other aspects of the practical implementation of our rules. --------------------------------------------------------------------------- The prohibition on blocking applications that compete with a broadband provider's voice or video telephony services does not apply to a broadband provider's operation of application stores or their functional equivalent. In operating app stores, broadband providers compete directly with other types of entities, including device manufacturers and operating system developers,\114\ and we do not intend to limit mobile broadband providers' flexibility to curate their app stores similar to app store operators that are not subject to these rules. --------------------------------------------------------------------------- \114\ For example, app stores are operated by manufacturers and operating system developers such as Nokia, Apple, RIM, Google, Microsoft, and third parties such as GetJar. See also AT&T PN Comments at 63-66 (emphasizing the competitiveness of the market for mobile apps, including the variety of sources from which consumers may obtain applications); T-Mobile PN Comments at 21 (``The competitive wireless marketplace will continue to discipline app store owners * * * that exclude third-party apps from their app stores entirely, eliminating the need for Commission action.''). We note, however, that for a few devices, such as Apple's iPhone, there may be fewer options for accessing and distributing apps. --------------------------------------------------------------------------- As indicated in Part III.D above, the reasonable network management definition takes into account the particular network architecture and technology of the broadband Internet access service. Thus, in determining whether a network management practice is reasonable, the Commission will consider technical, operational, and other differences between wireless and other broadband Internet access platforms, including differences relating to efficient use of spectrum. We anticipate that conditions in mobile broadband networks may necessitate network management practices that would not be necessary in most fixed networks, but conclude that our definition of reasonable network management is flexible enough to accommodate such differences. 2. Ongoing Monitoring Although some commenters support applying the no unreasonable discrimination rule to mobile broadband,\115\ for the reasons discussed above, we decline to do so, preferring at this time to put in place basic openness protections and monitor the development of the mobile broadband marketplace. We emphasize that our decision to proceed incrementally with respect to mobile broadband at this time should not suggest that we implicitly approve of any provider behavior that runs counter to general open Internet principles. Beyond those practices expressly prohibited by our rules, other conduct by mobile broadband providers, particularly conduct that would violate our rules for fixed broadband, may not necessarily be consistent with Internet openness and the public interest. --------------------------------------------------------------------------- \115\ See, e.g, Free Press Comments at 125-26; OIC Comments at 36-39. See also, e.g., Leap Comments at 17-22; Sprint Reply at 24- 26. A number of commenters suggest that openness rules should be applied identically to all broadband platforms. See, e.g., CenturyLink Comments at 22-23; Comcast Comments at 32; DISH Network PN Comments at 17; NCTA PN Comments at 11; Qwest PN Comments at 12- 19; SureWest PN Comments at 18-20; TWC PN Comments at 33-35; Vonage PN Comments at 10-18; Windstream PN Comments at 6-19. --------------------------------------------------------------------------- We are taking measured steps to protect openness for mobile broadband at this time in part because we want to better understand how the mobile broadband market is developing before determining whether adjustments to this framework are necessary. To that end, we will closely monitor developments in the mobile broadband market, with a particular focus on the following issues: (1) The effects of these rules, the C Block conditions, and market developments related to the openness of the Internet as accessed through mobile broadband; (2) any conduct by mobile broadband providers that harms innovation, investment, competition, end users, free expression or the achievement of national broadband goals; (3) the extent to which differences between fixed and mobile rules affect fixed and mobile broadband markets, including competition among fixed and mobile broadband providers; and (4) the extent to which differences between fixed and mobile rules affect end users for whom mobile broadband is their only or primary Internet access platform.\116\ We will investigate and evaluate concerns as they arise. We also will adjust our rules as appropriate. To aid the Commission in these tasks, we will create an Open Internet Advisory Committee, as discussed below, with a mandate that includes monitoring and regularly reporting on the state of Internet openness for mobile broadband. --------------------------------------------------------------------------- \116\ We note that mobile broadband is the only or primary broadband Internet access platform used by many Americans. --------------------------------------------------------------------------- Further, we reaffirm our commitment to enforcing the open platform requirements applicable to upper 700 MHz C Block licensees. The first networks using this spectrum are now becoming operational. F. Other Laws and Considerations Open Internet rules are not intended to expand or contract broadband providers' rights or obligations with respect to other laws or safety and security considerations, including the needs of emergency communications and law enforcement, public safety, and national security authorities. Similarly, open Internet rules protect only lawful content, and are not intended to inhibit efforts by broadband providers to address unlawful transfers of content. For example, there should be no doubt that broadband providers can prioritize communications from emergency responders, or block transfers of child pornography. To make clear that open Internet protections can and must coexist with these other legal frameworks, we adopt the following clarifying provisions: Nothing in this part supersedes any obligation or authorization a provider of broadband Internet access service may have to address the needs of emergency communications or law enforcement, public safety, or national security authorities, consistent with or as permitted by applicable law, or limits the provider's ability to do so. Nothing in this part prohibits reasonable efforts by a provider of broadband Internet access service to address copyright infringement or other unlawful activity. 1. Emergency Communications and Safety and Security Authorities Commenters are broadly supportive of our proposal to state that open Internet rules do not supersede any obligation a broadband provider may have--or limit its ability--to address the needs of emergency communications or law enforcement, public safety, or homeland or national security authorities (together, ``safety and security authorities''). Broadband providers have obligations under statutes such as the Communications Assistance for Law Enforcement Act, the Foreign Intelligence Surveillance Act, and the Electronic Communications Privacy Act that could in some circumstances intersect with open Internet protections, and most commenters recognize the benefits of clarifying that these obligations are not inconsistent with open Internet rules. Likewise, in connection with an emergency, there [[Page 59213]] may be Federal, state, Tribal, and local public safety entities; homeland security personnel; and other authorities that need guaranteed or prioritized access to the Internet in order to coordinate disaster relief and other emergency response efforts, or for other emergency communications. In the Open Internet NPRM we proposed to address the needs of law enforcement in one rule and the needs of emergency communications and public safety, national, and homeland security authorities in a separate rule. We are persuaded by the record that these rules should be combined, as the interests at issue are substantially similar.\117\ We also agree that the rule should focus on the needs of ``law enforcement * * * authorities'' rather than the needs of ``law enforcement.'' The purpose of the safety and security provision is first to ensure that open Internet rules do not restrict broadband providers in addressing the needs of law enforcement authorities, and second to ensure that broadband providers do not use the safety and security provision without the imprimatur of a law enforcement authority, as a loophole to the rules. As such, application of the safety and security rule should be tied to invocation by relevant authorities rather than to a broadband provider's independent notion of law enforcement. --------------------------------------------------------------------------- \117\ See PIC Comments at 42-44. We intend the term ``national security authorities'' to include homeland security authorities. --------------------------------------------------------------------------- Some commenters urge us to limit the scope of the safety and security rule, or argue that it is unnecessary because other statutes give broadband providers the ability and responsibility to assist law enforcement. Several commenters urge the Commission to revise its proposal to clarify that broadband providers may not take any voluntary steps that would be inconsistent with open Internet principles, beyond those steps required by law. They argue, for example, that a broad exception for voluntary efforts could swallow open Internet rules by allowing broadband providers to cloak discriminatory practices under the guise of protecting safety and security.\118\ --------------------------------------------------------------------------- \118\ See EFF Comments at 20-22. EFF would require a pre- deployment waiver from the Commission if the needs of law enforcement would require broadband providers to act inconsistently with open Internet rules. Id. at 22. --------------------------------------------------------------------------- We agree with commenters that the safety and security rule should be tailored to avoid the possibility of broadband providers using their discretion to mask improper practices. But it would be a mistake to limit the rule to situations in which broadband providers have an obligation to assist safety and security personnel. For example, such a limitation would prevent broadband providers from implementing the Cellular Priority Access Service (also known as the Wireless Priority Service (WPS)), which allows for but does not legally require the prioritization of public safety communications on wireless networks. We do not think it necessary or advisable to provide for pre-deployment review by the Commission, particularly because time may be of the essence in meeting safety and security needs.\119\ --------------------------------------------------------------------------- \119\ The National Emergency Number Association (NENA) would encourage or require network managers to provide public safety users with advance notice of changes in network management that could affect emergency services. See NENA Comments at 5-6. Although we do not adopt such a requirement, we encourage broadband providers to be mindful of the potential impact on emergency services when implementing network management policies, and to coordinate major changes with providers of emergency services when appropriate. --------------------------------------------------------------------------- 2. Transfers of Unlawful Content and Unlawful Transfers of Content In the NPRM, we proposed to treat as reasonable network management ``reasonable practices to * * * prevent the transfer of unlawful content; or * * * prevent the unlawful transfer of content.'' For reasons explained above we decline to include these practices within the scope of ``reasonable network management.'' However, we conclude that a clear statement that open Internet rules do not prohibit broadband providers from making reasonable efforts to address the transfer of unlawful content or unlawful transfers of content is helpful to ensure that open Internet rules are not used as a shield to enable unlawful activity or to deter prompt action against such activity. For example, open Internet rules should not be invoked to protect copyright infringement, which has adverse consequences for the economy, nor should they protect child pornography. We emphasize that open Internet rules do not alter copyright laws and are not intended to prohibit or discourage voluntary practices undertaken to address or mitigate the occurrence of copyright infringement.\120\ --------------------------------------------------------------------------- \120\ See, e.g., Stanford University--DMCA Complaint Resolution Center; User Generated Content Principles, http://www.ugcprinciples.com (cited in Letter from Linda Kinney, MPAA, to Marlene H. Dortch, Secretary, FCC, GN Docket Nos. 09-191, 10-137, WC Docket No. 07-52 at 1 (filed Nov. 29, 2010)). Open Internet rules are not intended to affect the legal status of cooperative efforts by broadband Internet access service providers and other service providers that are designed to curtail infringement in response to information provided by rights holders in a manner that is timely, effective, and accommodates the legitimate interests of providers, rights holders, and end users. --------------------------------------------------------------------------- G. Specialized Services In the Open Internet NPRM, the Commission recognized that broadband providers offer services that share capacity with broadband Internet access service over providers' last-mile facilities, and may develop and offer other such services in the future. These ``specialized services,'' such as some broadband providers' existing facilities-based VoIP and Internet Protocol-video offerings, differ from broadband Internet access service and may drive additional private investment in broadband networks and provide end users valued services, supplementing the benefits of the open Internet. At the same time, specialized services may raise concerns regarding bypassing open Internet protections, supplanting the open Internet, and enabling anticompetitive conduct. For example, open Internet protections may be weakened if broadband providers offer specialized services that are substantially similar to, but do not meet the definition of, broadband Internet access service, and if consumer protections do not apply to such services. In addition, broadband providers may constrict or fail to continue expanding network capacity allocated to broadband Internet access service to provide more capacity for specialized services. If this occurs, and particularly to the extent specialized services grow as substitutes for the delivery of content, applications, and services over broadband Internet access service, the Internet may wither as an open platform for competition, innovation, and free expression. These concerns may be exacerbated by consumers' limited choices for broadband providers, which may leave some end users unable to effectively exercise their preferences for broadband Internet access service (or content, applications, or services available through broadband Internet access service) over specialized services. We agree with the many commenters who advocate that the Commission exercise its authority to closely monitor and proceed incrementally with respect to specialized services, rather than adopting policies specific to such services at this time. We will carefully observe market developments to verify that specialized services promote investment, innovation, competition, and end-user benefits without undermining or threatening the open Internet.\121\ We note also that our rules [[Page 59214]] define broadband Internet access service to encompass ``any service that the Commission finds to be providing a functional equivalent of [broadband Internet access service], or that is used to evade the protections set forth in these rules.'' \122\ --------------------------------------------------------------------------- \121\ Our decision not to adopt rules regarding specialized services at this time involves an issue distinct from the regulatory classification of services such as VoIP and IPTV under the Communications Act, a subject we do not address in this Order. Likewise, the Commission's actions here do not affect any existing obligation to provide interconnection, unbundled network elements, or special access or other wholesale access under Sections 201, 251, 256, and 271 of the Act. 47 U.S.C. 201, 251, 256, 271. \122\ Some commenters, including Internet engineering experts and analysts, emphasize the importance of distinguishing between the open Internet and specialized services and state that ``this distinction must continue as a most appropriate and constructive basis for pursuing your policy goals.'' Various Advocates for the Open Internet PN Reply at 3; see also id. at 2. --------------------------------------------------------------------------- We will closely monitor the robustness and affordability of broadband Internet access services, with a particular focus on any signs that specialized services are in any way retarding the growth of or constricting capacity available for broadband Internet access service. We fully expect that broadband providers will increase capacity offered for broadband Internet access service if they expand network capacity to accommodate specialized services. We would be concerned if capacity for broadband Internet access service did not keep pace. We also expect broadband providers to disclose information about specialized services' impact, if any, on last-mile capacity available for, and the performance of, broadband Internet access service. We may consider additional disclosure requirements in this area in our related proceeding regarding consumer transparency and disclosure. We would also be concerned by any marketing, advertising, or other messaging by broadband providers suggesting that one or more specialized services, taken alone or together, and not provided in accordance with our open Internet rules, is ``Internet'' service or a substitute for broadband Internet access service. Finally, we will monitor the potential for anticompetitive or otherwise harmful effects from specialized services, including from any arrangements a broadband provider may seek to enter into with third parties to offer such services. The Open Internet Advisory Committee will aid us in monitoring these issues. IV. The Commission's Authority To Adopt Open Internet Rules Congress created the Commission ``[f]or the purpose of regulating interstate and foreign commerce in communication by wire and radio so as to make available, so far as possible, to all people of the United States * * * a rapid, efficient, Nation-wide, and world-wide wire and radio communication service with adequate facilities at reasonable charges, for the purpose of the national defense, [and] for the purpose of promoting safety of life and property through the use of wire and radio communication.'' Section 2 of the Communications Act grants the Commission jurisdiction over ``all interstate and foreign communication by wire or radio.'' As the Supreme Court explained in the radio context, Congress charged the Commission with ``regulating a field of enterprise the dominant characteristic of which was the rapid pace of its unfolding'' and therefore intended to give the Commission sufficiently ``broad'' authority to address new issues that arise with respect to ``fluid and dynamic'' communications technologies.\123\ Broadband Internet access services are clearly within the Commission's subject matter jurisdiction and historically have been supervised by the Commission. Furthermore, as explained below, our adoption of basic rules of the road for broadband providers implements specific statutory mandates in the Communications Act and the Telecommunications Act of 1996. --------------------------------------------------------------------------- \123\ Nat'l Broad. Co., Inc. v. United States, 319 U.S. 190, 219-20 (1943) (Congress did not ``attempt[] an itemized catalogue of the specific manifestations of the general problems'' that it entrusted to the Commission); see also FCC v. Pottsville Broad. Co., 309 U.S. 134, 137, 138 (1940) (the Commission's statutory responsibilities and authority amount to ``a unified and comprehensive regulatory system'' for the communications industry that allows a single agency to ``maintain, through appropriate administrative control, a grip on the dynamic aspects'' of that ever-changing industry). --------------------------------------------------------------------------- Congress has demonstrated its awareness of the importance of the Internet and advanced services to modern interstate communications. In Section 230 of the Act, for example, Congress announced ``the policy of the United States'' concerning the Internet, which includes ``promot[ing] the continued development of the Internet'' and ``encourag[ing] the development of technologies which maximize user control over what information is received by individuals, families, and schools who use the Internet,'' while also ``preserv[ing] the vibrant and competitive free market that presently exists for the Internet and other interactive computer services'' and avoiding unnecessary regulation. Other statements of congressional policy further confirm the Commission's statutory authority. In Section 254 of the Act, for example, Congress charged the Commission with designing a Federal universal program that has as one of several objectives making ``[a]ccess to advanced telecommunications and information services'' available ``in all regions of the Nation,'' and particularly to schools, libraries, and health care providers. To the same end, in Section 706 of the 1996 Act, Congress instructed the Commission to ``encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans (including, in particular, elementary and secondary schools and classrooms)'' and, if it finds that advanced telecommunications capability is not being deployed to all Americans ``on a reasonable and timely basis,'' to ``take immediate action to accelerate deployment of such capability.'' This mandate provides the Commission both ``authority'' and ``discretion'' ``to settle on the best regulatory or deregulatory approach to broadband.'' As the legislative history of the 1996 Act confirms, Congress believed that the laws it drafted would compel the Commission to protect and promote the Internet, while allowing the agency sufficient flexibility to decide how to do so.\124\ As explained in detail below, Congress did not limit its instructions to the Commission to one Section of the communications laws. Rather, it expressed its instructions in multiple Sections which, viewed as a whole, provide broad authority to promote competition, investment, transparency, and an open Internet through the rules we adopt in this Order. --------------------------------------------------------------------------- \124\ S. Rep. No. 104-23, at 51 (1995) (``The goal is to accelerate deployment of an advanced capability that will enable subscribers in all parts of the United States to send and receive information in all its forms--voice, data, graphics, and video--over a high-speed switched, interactive, broadband, transmission capability.''). --------------------------------------------------------------------------- A. Section 706 of the 1996 Act Provides Authority for the Open Internet Rules As noted, Section 706 of the 1996 Act directs the Commission (along with state commissions) to take actions that encourage the deployment of ``advanced telecommunications capability.'' ``[A]dvanced telecommunications capability,'' as defined in the statute, includes broadband Internet access.\125\ [[Page 59215]] Under Section 706(a), the Commission must encourage the deployment of such capability by ``utilizing, in a manner consistent with the public interest, convenience, and necessity,'' various tools including ``measures that promote competition in the local telecommunications market, or other regulating methods that remove barriers to infrastructure investment.'' For the reasons stated in Parts II.A, II.D and III.B, above, our open Internet rules will have precisely that effect. --------------------------------------------------------------------------- \125\ 47 U.S.C. 1302(d)(1) (defining ``advanced telecommunications capability'' as ``high-speed, switched, broadband telecommunications capability that enables users to originate and receive high-quality voice, data, graphics, and video telecommunications using any technology''). See National Broadband Plan for our Future, Notice of Inquiry, 24 FCC Rcd 4342, 4309, App. para. 13 (2009) (``advanced telecommunications capability'' includes broadband Internet access); Inquiry Concerning the Deployment of Advanced Telecomms. Capability to All Americans in a Reasonable and Timely Fashion, 14 FCC Rcd 2398, 2400, para. 1 (Section 706 addresses ``the deployment of broadband capability''), 2406 para. 20 (same). Even when broadband Internet access is provided as an ``information service'' rather than a ``telecommunications service,'' see Nat'l Cable & Telecomm. Ass'n v. Brand X Internet Servs., 545 U.S. 967, 977-78 (2005), it involves ``telecommunications.'' 47 U.S.C. 153(24). Given Section 706's explicit focus on deployment of broadband access to voice, data, and video communications, it is not important that the statute does not use the exact phrase ``Internet network management.'' --------------------------------------------------------------------------- In Comcast, the DC Circuit identified Section 706(a) as a provision that ``at least arguably * * * delegate[s] regulatory authority to the Commission,'' and in fact ``contain[s] a direct mandate--the Commission `shall encourage.' '' \126\ The court, however, regarded the Commission as ``bound by'' a prior order that, in the court of appeals' understanding, had held that Section 706(a) is not a grant of authority. In the Advanced Services Order, to which the court referred, the Commission held that Section 706(a) did not permit it to encourage advanced services deployment through the mechanism of forbearance without complying with the specific requirements for forbearance set forth in Section 10 of the Communications Act. The issue presented in the 1998 proceeding was whether the Commission could rely on the broad terms of Section 706(a) to trump those specific requirements. In the Advanced Services Order, the Commission ruled that it could not do so, noting that it would be ``unreasonable'' to conclude that Congress intended Section 706(a) to ``allow the Commission to eviscerate [specified] forbearance exclusions after having expressly singled out [those exclusions] for different treatment in Section 10.'' The Commission accordingly concluded that Section 706(a) did not give it independent authority--in other words, authority over and above what it otherwise possessed \127\--to forbear from applying other provisions of the Act. The Commission's holding thus honored the interpretive canon that ``[a] specific provision * * * controls one[ ] of more general application.'' --------------------------------------------------------------------------- \126\ See Comcast, 600 F.3d at 658; see also 47 U.S.C. 1302(a) (``The Commission * * * shall encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans * * * by utilizing * * * price cap regulation, regulatory forbearance, measures that promote competition in the local telecommunications market, or other regulating methods that remove barriers to infrastructure investment.''). Because Section 706 contains a ``direct mandate,'' we reject the argument pressed by some commenters (see, e.g., AT&T Comments at 217-18; Verizon Comments at 100-01; Qwest Comments at 58-59; Letter from Rick Chessen, Senior Vice President, Law and Regulatory Policy, NCTA, to Marlene H. Dortch, Secretary, FCC, GN Docket Nos. 09-191 & 10-127, WC Docket No. 07-52, at 7 (filed Dec. 10, 2010) (NCTA Dec. 10, 2010 Ex Parte Letter)) that Section 706 confers no substantive authority. \127\ Consistent with longstanding Supreme Court precedent, we have understood this authority to include our ancillary jurisdiction to further congressional policy. See, e.g., Amendment of Section 64.702 of the Commission's Rules and Regulations (Second Computer Inquiry), Final Decision, 77 FCC 2d 384, 474 (1980), aff'd, Computer & Commc'ns Indus. Ass'n. v. FCC, 693 F.2d 198, 211-14 (DC Cir. 1982) (CCIA). --------------------------------------------------------------------------- While disavowing a reading of Section 706(a) that would allow the agency to trump specific mandates of the Communications Act, the Commission nonetheless affirmed in the Advanced Services Order that Section 706(a) ``gives this Commission an affirmative obligation to encourage the deployment of advanced services'' using its existing rulemaking, forbearance and adjudicatory powers, and stressed that ``this obligation has substance.'' The Advanced Services Order is, therefore, consistent with our present understanding that Section 706(a) authorizes the Commission (along with state commissions) to take actions, within their subject matter jurisdiction and not inconsistent with other provisions of law, that encourage the deployment of advanced telecommunications capability by any of the means listed in the provision.\128\ --------------------------------------------------------------------------- \128\ To the extent the Advanced Services Order can be construed as having read Section 706(a) differently, we reject that reading of the statute for the reasons discussed in the text. --------------------------------------------------------------------------- In directing the Commission to ``encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans * * * by utilizing * * * price cap regulation, regulatory forbearance, measures that promote competition in the local telecommunications market, or other regulating methods that remove barriers to infrastructure investment,'' Congress necessarily invested the Commission with the statutory authority to carry out those acts. Indeed, the relevant Senate Report explained that the provisions of Section 706 are ``intended to ensure that one of the primary objectives of the [1996 Act]--to accelerate deployment of advanced telecommunications capability--is achieved,'' and stressed that these provisions are ``a necessary fail-safe'' to guarantee that Congress's objective is reached. It would be odd indeed to characterize Section 706(a) as a ``fail-safe'' that ``ensures'' the Commission's ability to promote advanced services if it conferred no actual authority. Here, under our reading, Section 706(a) authorizes the Commission to address practices, such as blocking VoIP communications, degrading or raising the cost of online video, or denying end users material information about their broadband service, that have the potential to stifle overall investment in Internet infrastructure and limit competition in telecommunications markets. This reading of Section 706(a) obviates the concern of some commenters that our jurisdiction under the provision could be ``limitless'' or ``unbounded.'' To the contrary, our Section 706(a) authority is limited in three critical respects. First, our mandate under Section 706(a) must be read consistently with Sections 1 and 2 of the Act, which define the Commission's subject matter jurisdiction over ``interstate and foreign commerce in communication by wire and radio.'' \129\ As a result, our authority under Section 706(a) does not, in our view, extend beyond our subject matter jurisdiction under the Communications Act. Second, the Commission's actions [[Page 59216]] under Section 706(a) must ``encourage the deployment on a reasonable and timely basis of advanced telecommunications capability to all Americans.'' Third, the activity undertaken to encourage such deployment must ``utilize[e], in a manner consistent with the public interest, convenience, and necessity,'' one (or more) of various specified methods. These include: ``price cap regulation, regulatory forbearance, measures that promote competition in the local telecommunications market, or other regulating methods that remove barriers to infrastructure investment.'' Actions that do not fall within those categories are not authorized by Section 706(a). Thus, as the DC Circuit has noted, while the statutory authority granted by Section 706(a) is broad, it is ``not unfettered.'' \130\ --------------------------------------------------------------------------- \129\ 47 U.S.C. 151, 152. The Commission historically has recognized that services carrying Internet traffic are jurisdictionally mixed, but generally subject to Federal regulation. See, e.g., Nat'l Ass'n of Regulatory Util. Comm'rs Petition for Clarification or Declaratory Ruling that No FCC Order or Rule Limits State Authority to Collect Broadband Data, Memorandum Opinion and Order, 25 FCC Rcd 5051, 5054, paras. 8-9 & n. 24 (2010). Where, as here, ``it is not possible to separate the interstate and intrastate aspects of the service,'' the Commission may preempt state regulation where ``Federal regulation is necessary to further a valid Federal regulatory objective, i.e., state regulation would conflict with Federal regulatory policies.'' Minn. Pub. Utils. Comm'n v. FCC, 483 F.3d 570, 578 (8th Cir. 2007); see also La. Pub. Serv. Comm'n v. FCC, 476 U.S. 355, 375 n. 4 (1986). Except to the extent a state requirement conflicts on its face with a Commission decision herein, the Commission will evaluate preemption in light of the fact-specific nature of the relevant inquiry, on a case-by-case basis. We recognize, for example, that states play a vital role in protecting end users from fraud, enforcing fair business practices, and responding to consumer inquiries and complaints. See, e.g., Vonage Order, 19 FCC Rcd at 22404-05, para. 1. We have no intention of impairing states' or local governments' ability to carry out these duties unless we find that specific measures conflict with Federal law or policy. In determining whether state or local regulations frustrate Federal policies, we will, among other things, be guided by the overarching congressional policies described in Section 230 of the Act and Section 706 of the 1996 Act. 47 U.S.C. 230, 1302. \130\ Ad Hoc Telecomms. Users Comm., 572 F.3d at 906-07 (``The general and generous phrasing of sec. 706 means that the FCC possesses significant albeit not unfettered, authority and discretion to settle on the best regulatory or deregulatory approach to broadband.''). --------------------------------------------------------------------------- Section 706(a) accordingly provides the Commission a specific delegation of legislative authority to promote the deployment of advanced services, including by means of the open Internet rules adopted in this Order. Our understanding of Section 706(a) is, moreover, harmonious with other statutory provisions that confer a broad mandate on the Commission. Section 706(a)'s directive to ``encourage the deployment [of advanced telecommunications capability] on a reasonable and timely basis'' using the methods specified in the statute is, for example, no broader than other provisions of the Commission's authorizing statutes that command the agency to ensure ``just'' and ``reasonable'' rates and practices, or to regulate services in the ``public interest.'' Indeed, our authority under Section 706(a) is generally consistent with--albeit narrower than--the understanding of ancillary jurisdiction under which this Commission operated for decades before the Comcast decision.\131\ The similarities between the two in fact explain why the Commission has not heretofore had occasion to describe Section 706(a) in this way: In the particular proceedings prior to Comcast, setting out the understanding of Section 706(a) that we articulate in this Order would not meaningfully have increased the authority that we understood the Commission already to possess.\132\ --------------------------------------------------------------------------- \131\ In Comcast, the court stated that `` `[t]he Commission * * * may exercise ancillary jurisdiction only when two conditions are satisfied: (1) The Commission's general jurisdictional grant under Title I [of the Communications Act] covers the regulated subject and (2) the regulations are reasonably ancillary to the Commission's effective performance of its statutorily mandated responsibilities.' '' 600 F.3d at 646 (quoting Am. Library Ass'n v. FCC, 406 F.3d 689, 691-92 (DC Cir. 2005)) (alterations in original). The court further ruled that the second prong of this test requires the Commission to rely on specific delegations of statutory authority. 600 F.3d at 644, 654. \132\ Ignoring that Section 706(a) expressly contemplates the use of ``regulating methods'' such as price regulation, some commenters read prior Commission orders as suggesting that Section 706 authorizes only deregulatory actions. See AT&T Comments at 216 (citing Petition for Declaratory Ruling that pulver.com's Free World Dialup is Neither Telecomm. Nor A Telecomms. Serv., Memorandum Opinion and Order, 19 FCC Rcd 3307, 3319, para. 19 n. 69 (2004) (Pulver Order)); Esbin Comments at 52 (citing Inquiry Concerning High-Speed Access to the Internet Over Cable and Other Facilities et al., Declaratory Ruling and Notice of Proposed Rulemaking, 17 FCC Rcd 4798, 4801, 4826, 4840, paras. 4, 47, 73, (2002) (Cable Modem Declaratory Ruling) and Appropriate Framework for Broadband Access to the Internet Over Wireline Facilities et al., Report and Order and Notice of Proposed Rulemaking, 20 FCC Rcd 14853, 14894 para. 77 (2005) (Wireline Broadband Report and Order)). They are mistaken. The Pulver Order stated only that Section 706 did not contemplate the application of ``economic and entry/exit regulation inherent in Title II'' to information service Internet applications. Pulver Order, 19 FCC Rcd at 3379, para. 19 n. 69 (emphasis added). The open Internet rules that we adopt in this Order do not regulate Internet applications, much less impose Title II (i.e., common carrier) regulation on such applications. Moreover, at the same time the Commission determined in the Cable Modem Declaratory Ruling and the Wireline Broadband Report and Order that cable modem service and wireline broadband services (such as DSL) could be provided as information services not subject to Title II, it proposed new regulations under other sources of authority including Section 706. See Cable Modem Declaratory Ruling, 17 FCC Rcd at 4840, para. 73; Wireline Broadband Report and Order, 20 FCC Rcd at 14929-30, 14987, para. 146. On the same day the Commission adopted the Wireline Broadband Report and Order, it also adopted the Internet Policy Statement, which rested in part on Section 706. 20 FCC Rcd 14986, para. 2 (2005). Our prior orders therefore do not construe Section 706 as exclusively deregulatory. And to the extent that any prior order does suggest such a construction, we now reject it. See Ad Hoc Telecomms. Users Comm., 572 F.3d at 908 (Section 706 ``direct[s] the FCC to make the major policy decisions and to select the mix of regulatory and deregulatory tools the Commission deems most appropriate in the public interest to facilitate broadband deployment and competition'') (emphasis added). --------------------------------------------------------------------------- Section 706(b) of the 1996 Act provides additional authority to take actions such as enforcing open Internet principles. It directs the Commission to undertake annual inquiries concerning the availability of advanced telecommunications capability to all Americans and requires that, if the Commission finds that such capability is not being deployed in a reasonable and timely fashion, it ``shall take immediate action to accelerate deployment of such capability by removing barriers to infrastructure investment and by promoting competition in the telecommunications market.'' In July 2010, the Commission ``conclude[d] that broadband deployment to all Americans is not reasonable and timely'' and noted that ``[a]s a consequence of that conclusion,'' Section 706(b) was triggered. Section 706(b) therefore provides express authority for the pro-investment, pro-competition rules we adopt in this Order. B. Authority To Promote Competition and Investment in, and Protect End Users of, Voice, Video, and Audio Services The Commission also has authority under the Communications Act to adopt the open Internet rules in order to promote competition and investment in voice, video, and audio services. Furthermore, for the reasons stated in Part II, above, even if statutory provisions related to voice, video, and audio communications were the only sources of authority for the open Internet rules (which is not the case), it would not be sound policy to attempt to implement rules concerning only voice, video, or audio transmissions over the Internet.\133\ --------------------------------------------------------------------------- \133\ Many broadband providers offer their service on a common carriage basis under Title II of the Act. See Framework for Broadband Internet Serv., Notice of Inquiry, 25 FCC Rcd 7866, 7875, para. 21 (2010). With respect to these providers, the rules we adopt in this Order are additionally supported on that basis. With the possible exception of transparency requirements, however, the open Internet rules are unlikely to create substantial new duties for these providers in practice. --------------------------------------------------------------------------- 1. The Commission Has Authority To Adopt Open Internet Rules To Further Its Responsibilities Under Title II of the Act Section 201 of the Act delegates to the Commission ``express and expansive authority'' to ensure that the ``charges [and] practices * * * in connection with'' telecommunications services are ``just and reasonable.'' As described in Part II.B, interconnected VoIP services, which include some over-the-top VoIP services, ``are increasingly being used as a substitute for traditional telephone service.''\134\ Over- the-top services therefore do, or will, contribute to the marketplace discipline of voice telecommunications services regulated under Section 201.\135\ Furthermore, [[Page 59217]] companies that provide both voice communications and broadband Internet access services (for example, telephone companies that are broadband providers) have the incentive and ability to block, degrade, or otherwise disadvantage the services of their online voice competitors. Because the Commission may enlist market forces to fulfill its Section 201 responsibilities, we possess authority to prevent these anticompetitive practices through open Internet rules.\136\ --------------------------------------------------------------------------- \134\ Tel. No. Requirements for IP-Enabled Servs. Providers, Report and Order, Declaratory Ruling, Order on Remand, and NPRM, 22 FCC Rcd 19531, 19547, para. 28 (2007). By definition, interconnected VoIP services allow calls to and from traditional phone networks. \135\ See NCTA Dec. 10, 2010 Ex Parte Letter (arguing that the Commission could exercise authority ancillary to several provisions of Title II of the Act, including Sections 201 and 202, ``to ensure that common carrier services continue to be offered on just and reasonable terms and conditions'' and to ``facilitate consumer access to broadband-based alternatives to common carrier services such as Voice over Internet Protocol''); Vonage Comments at 11-12 (``The Commission's proposed regulations would help preserve the competitive balance between providers electing to operate under Title II and those operating under Title I.''); Google Comments at 45-46 (``The widespread use of VoIP and related services as cheaper and more feature-rich alternatives to Title II services has significant effects on traditional telephone providers' practices and pricing, as well [as] on network interconnection between Title II and IP networks that consumers use to reach each other, going to the heart of the Commission's Title II responsibilities.'') (footnotes and citations omitted); Letter from Devendra T. Kumar, Counsel to Skype Communications S.A.R.L., to Marlene H. Dortch, Secretary, FCC, GN Docket No. 09-191, WC Docket No. 07-52 (filed Nov. 30, 2010) (arguing that the Commission has authority ancillary to Section 201 to protect international VoIP calling); XO Comments at 20 (noting the impact of, inter alia, VoIP on the Commission's ``traditional framework'' for regulating voice services under Title II); Letter from Alan Inouye et al., on behalf of ALA, ARL and EDUCAUSE, to Chairman Julius Genachowski et al., GN Docket No. 09- 191, WC Docket No. 07-52 at 4-5 (filed Dec. 13, 2010) (citing examples of how libraries and higher education institutions are using broadband services, including VoIP, to replace traditional common carrier services). In previous orders, the Commission has embraced the use of VoIP to avoid or constrain high international calling rates. See Universal Serv. Contribution Methodology et al., Report and Order and Notice of Proposed Rulemaking, 21 FCC Rcd 7518, 7546, para. 55 & n.187 (2006) (``[I]nterconnected VoIP service is often marketed as an economical way to make interstate and international calls, as a lower-cost substitute for wireline toll service.''), rev'd in part sub nom. Vonage Holdings Corp. v. FCC, 489 F.3d 1232 (DC Cir. 2007); Reporting Requirements for U.S. Providers of Int'l Telecomms. Servs., Notice of Proposed Rulemaking, 19 FCC Rcd 6460, 6470, para. 22 (2004) (``Improvements in the packet-switched transmission technology underlying the Internet now allow providers of VoIP to offer international voice transmission of reasonable quality at a price lower than current IMTS rates.'') (footnote omitted); Int'l Settlements Policy Reform, Notice of Proposed Rulemaking, 17 FCC Rcd 19954, 19964, para. 13 (2002) (``This ability to engage in least-cost routing, as well as alternative, non-traditional services such as IP Telephony or Voice- Over-IP, in conjunction with the benchmarks policy have created a market dynamic that is pressuring international settlement rates downward.''). In addition, NCTA has explained that, ``[b]y enabling consumers to make informed choices regarding broadband Internet access service,'' the Commission could conclude that transparency requirements ``would help promote the competitiveness of VoIP and other broadband-based communications services'' and ``thereby facilitate the operation of market forces to discipline the charges and other practices of common carriers, in fulfillment of the Commission's obligations under Sections 201 and 202'' of the Act. NCTA Dec. 10, 2010 Ex Parte Letter at 2-3. \136\ We reject the argument asserted by some commenters (see, e.g., AT&T Comments at 218-19; Verizon Comments at 98-99) that the various grants of rulemaking authority in the Act, including the express grant of rulemaking authority in Section 201(b) itself, do not authorize the promulgation of rules pursuant to Section 201(b). See AT&T Corp. v. Iowa Utils. Bd., 525 U.S. 366, 378 (1999) (``We think that the grant in sec. 201(b) means what it says: The FCC has rulemaking authority to carry out the `provisions of this Act.' ''). --------------------------------------------------------------------------- Section 251(a)(1) of the Act imposes a duty on all telecommunications carriers ``to interconnect directly or indirectly with the facilities of other telecommunications carriers.'' Many over- the-top VoIP services allow end users to receive calls from and/or place calls to traditional phone networks operated by telecommunications carriers. The Commission has not determined whether any such VoIP providers are telecommunications carriers. To the extent that VoIP services are information services (rather than telecommunications services), any blocking or degrading of a call from a traditional telephone customer to a customer of a VoIP provider, or vice-versa, would deny the traditional telephone customer the intended benefits of telecommunications interconnection under Section 251(a)(1). Over-the-top VoIP customers account for a growing share of telephone usage. If calls to and from these VoIP customers were not delivered efficiently and reliably by broadband providers, all users of the public switched telephone network would be limited in their ability to communicate, and Congress's goal of ``efficient, Nation-wide, and world-wide'' communications across interconnected networks would be frustrated. To the extent that VoIP services are telecommunications services, a broadband provider's interference with traffic exchanged between a provider of VoIP telecommunications services and another telecommunications carrier would interfere with interconnection between two telecommunications carriers under Section 251(a)(1).\137\ --------------------------------------------------------------------------- \137\ See also 47 U.S.C. 256(b)(1) (directing the Commission to ``establish procedures for * * * oversight of coordinated network planning by telecommunications carriers and other providers of telecommunications service for the effective and efficient interconnection of public telecommunications networks used to provide telecommunications service''); Comcast, 600 F.3d at 659 (acknowledging Section 256's objective, while adding that Section 256 does not `` `expand[ ] * * * any authority that the Commission' otherwise has under law'') (quoting 47 U.S.C. 256(c)). --------------------------------------------------------------------------- 2. The Commission Has Authority To Adopt Open Internet Rules To Further Its Responsibilities Under Titles III and VI of the Act ``The Commission has been charged with broad responsibilities for the orderly development of an appropriate system of local television broadcasting,'' \138\ which arise from the Commission's more general public interest obligation to ``ensure the larger and more effective use of radio.'' \139\ Similarly, the Commission has broad jurisdiction to oversee MVPD services, including direct-broadcast satellite (DBS).\140\ Consistent with these mandates, our jurisdiction over video and audio services under Titles III and VI of the Communications Act provides additional authority for open Internet rules. --------------------------------------------------------------------------- \138\ See United States v. Sw. Cable Co., 392 U.S. 157, 177 (1968); see also id. at 174 (``[T]hese obligations require for their satisfaction the creation of a system of local broadcasting stations, such that `all communities of appreciable size (will) have at least one television station as an outlet for local self- expression.' ''); 47 U.S.C. 307(b) (Commission shall ``make such distribution of licenses, * * * among the several States and communities as to provide a fair, efficient, and equitable distribution of radio service to each of the same''), 303(f) & (h) (authorizing the Commission to allocate broadcasting zones or areas and to promulgate regulations ``as it may deem necessary'' to prevent interference among stations) (cited in Sw. Cable, 392 U.S. at 173-74). \139\ Nat'l Broad. Co., 319 U.S. at 216 (public interest to be served is the ``larger and more effective use of radio'') (citation and internal quotation marks omitted). \140\ See 47 U.S.C. 303(v); see also N.Y. State Comm'n on Cable Television v. FCC, 749 F.2d 804, 807-12 (DC Cir. 1984) (upholding the Commission's exercise of ancillary authority over satellite master antenna television service); 47 U.S.C. 548 (discussed below). --------------------------------------------------------------------------- First, such rules are necessary to the effective performance of our Title III responsibilities to ensure the ``orderly development * * * of local television broadcasting'' \141\ and the ``more effective use of radio.'' \142\ As discussed in Parts II.A and II.B, Internet video distribution is increasingly important to all video programming services, including local television broadcast service. Radio stations also are providing audio and video content on the Internet. At the same time, [[Page 59218]] broadband providers--many of which are also MVPDs--have the incentive and ability to engage in self-interested practices that may include blocking or degrading the quality of online programming content, including broadcast content, or charging unreasonable additional fees for faster delivery of such content. Absent the rules we adopt in this Order, such practices jeopardize broadcasters' ability to offer news (including local news) and other programming over the Internet, and, in turn, threaten to impair their ability to offer high-quality broadcast content.\143\ --------------------------------------------------------------------------- \141\ Sw. Cable, 392 U.S. at 177; see 47 U.S.C. 303(f) & (h) (establishing Commission's authority to allocate broadcasting zones or areas and to promulgate regulations ``as it may deem necessary'' to prevent interference among stations) (cited in Sw. Cable, 392 U.S. at 173-74). \142\ Nat'l Broad. Co., 319 U.S. at 216; see also 47 U.S.C. 303(g) (establishing Commission's duty to ``generally encourage the larger and more effective use of radio in the public interest''), 307(b) (``[T]he Commission shall make such distribution of licenses * * * among the several States and communities as to provide a fair, efficient, and equitable distribution of radio service to each of the same.''). \143\ NCTA has noted that ``[t]he Commission could decide that, based on the growing importance of broadcast programming distributed over broadband networks to both television viewers and the business of broadcasting itself, ensuring that broadcast video content made available over broadband networks is not subject to unreasonable discrimination or anticompetitive treatment is necessary to preserve and strengthen the system of local broadcasting.'' NCTA Dec. 10, 2010 Ex Parte Letter at 3; see also id. (``Facilitating the availability of broadcast content on the Internet may also help to foster more efficient and intensive use of spectrum, thereby supporting the Commission's duty in Section 303(g) to `generally encourage the larger and more effective use of radio in the public interest.' '') (quoting 47 U.S.C. 303(g)). --------------------------------------------------------------------------- The Commission likewise has authority under Title VI of the Act to adopt open Internet rules that protect competition in the provision of MVPD services. A cable or telephone company's interference with the online transmission of programming by DBS operators or stand-alone online video programming aggregators that may function as competitive alternatives to traditional MVPDs \144\ would frustrate Congress's stated goals in enacting Section 628 of the Act, which include promoting ``competition and diversity in the multichannel video programming market''; ``increase[ing] the availability of satellite cable programming and satellite broadcast programming to persons in rural and other areas not currently able to receive such programming''; and ``spur[ring] the development of communications technologies.'' \145\ --------------------------------------------------------------------------- \144\ The issue whether online-only video programming aggregators are themselves MVPDs under the Communications Act and our regulations has been raised in pending program access complaint proceedings. See, e.g., VDC Corp. v. Turner Network Sales, Inc., Program Access Complaint (Jan. 18, 2007); Sky Angel U.S., LLC v. Discovery Commc'ns LLC, Program Access Complaint (Mar. 24, 2010). Nothing in this Order should be read to state or imply any determination on this issue. \145\ 47 U.S.C. sec. 548(a). The Act defines ``video programming'' as ``programming provided by, or generally considered comparable to programming provided by, a television broadcast station.'' 47 U.S.C. sec. 522(20). Although the Commission stated nearly a decade ago that video `` `streamed' over the Internet'' had ``not yet achieved television quality'' and therefore did not constitute ``video programming'' at that time, see Cable Modem Declaratory Ruling, 17 FCC Rcd at 4834, para. 63 n.236, intervening improvements in streaming technology and broadband availability enable such programming to be ``comparable to programming provided by * * * a television broadcast station,'' 47 U.S.C. sec. 522(20). This finding is consistent with our prediction more than five years ago that ``[a]s video compression technology improves, data transfer rates increase, and media adapters that link TV to a broadband connection become more widely used, * * * video over the Internet will proliferate and improve in quality.'' Ann. Assessment of the Status of Competition in the Mkt. for the Delivery of Video Programming, Notice of Inquiry, 19 FCC Rcd 10909, 10932, para. 74 (2004) (citation omitted). --------------------------------------------------------------------------- When Congress enacted Section 628 in 1992, it was specifically concerned about the incentive and ability of cable operators to use their control of video programming to impede competition from the then- nascent DBS industry.\146\ Since that time, the Internet has opened a new competitive arena in which MVPDs that offer broadband service have the opportunity and incentive to impede DBS providers and other competing MVPDs--and the statute reaches this analogous arena as well. Section 628(b) prohibits cable operators from engaging in ``unfair or deceptive acts or practices the purpose or effect of which is to prevent or hinder significantly the ability of an MVPD to deliver satellite cable programming or satellite broadcast programming to consumers.'' An ``unfair method of competition or unfair act or practice'' under Section 628(b) includes acts that can be anticompetitive.\147\ Thus, Section 628(b) proscribes practices by cable operators that (i) can impede competition, and (ii) have the purpose or effect of preventing or significantly hindering other MVPDs from providing consumers their satellite-delivered programming (i.e., programming transmitted to MVPDs via satellite for retransmission to subscribers).\148\ Section 628(c)(1), in turn, directs the Commission to adopt rules proscribing unfair practices by cable operators and their affiliated satellite cable programming vendors. Section 628(j) provides that telephone companies offering video programming services are subject to the same rules as cable operators. --------------------------------------------------------------------------- \146\ See Cable Act of 1992, Public Law 102-385, sec. 2(a)(5), 106 Stat. 1460, 1461 (``Vertically integrated program suppliers * * * have the incentive and ability to favor their affiliated cable operators over nonaffiliated cable operators and programming distributors using other technologies.''); H.R. Rep. No. 102-862, at 93 (1992) (Conf. Rep.), reprinted in 1992 U.S.C.C.A.N. 1231, 1275 (``In adopting rules under this section, the conferees expect the Commission to address and resolve the problems of unreasonable cable industry practices, including restricting the availability of programming and charging discriminatory prices to non-cable technologies.''); S. Rep. No. 102-92, at 26 (1991), reprinted in 1992 U.S.C.C.A.N. 1133, 1159 (``[C]able programmers may simply refuse to sell to potential competitors. Small cable operators, satellite dish owners, and wireless cable operators complain that they are denied access to, or charged more for, programming than large, vertically integrated cable operators.''). \147\ Review of the Commission's Program Access Rules and Examination of Programming Tying Arrangements, First Report and Order, 25 FCC Rcd 746, 779, para. 48 & n. 190 (2010) (citing Exclusive Contracts for Provision of Video Serv. in Multiple Dwelling Units and Other Real Estate Devs., Report and Order and Further Notice of Proposed Rulemaking, 22 FCC Rcd 20235, 20255, para. 43, aff'd, NCTA, 567 F.3d 659); see also NTCA, 567 F.3d at 664-65 (referring to ``unfair dealing'' and ``anticompetitive practices''). \148\ See 47 U.S.C. 548(b); NCTA, 567 F.3d at 664. In NCTA, the court held that the Commission reasonably concluded that the ``broad and sweeping terms'' of Section 628(b) authorized it to ban exclusive agreements between cable operators and building owners that prevented other MVPDs from providing their programming to residents of those buildings. The court observed that ``the words Congress chose [in Section 628(b)] focus not on practices that prevent MVPDs from obtaining satellite cable or satellite broadcast programming, but on practices that prevent them from `providing' that programming `to subscribers or consumers.' '' NCTA, 567 F.3d at 664 (emphasis in original). --------------------------------------------------------------------------- The open Internet rules directly further our mandate under Section 628. Cable operators, telephone companies, and DBS operators alike are seeking to keep and win customers by expanding their MVPD offerings to include online access to their programming.\149\ For example, in providing its MVPD service, DISH (one of the nation's two DBS providers) relies significantly on online dissemination of programming, including video-on-demand and other programming, that competes with similar offerings by cable operators.\150\ [[Page 59219]] As DISH explains, ``[a]s more and more video consumption moves online, the competitive viability of stand-alone MVPDs depends on their ability to offer an online video experience of the same quality as the online video offerings of integrated broadband providers.'' The open Internet rules will prevent practices by cable operators and telephone companies, in their role as broadband providers, that have the purpose or effect of significantly hindering (or altogether preventing) delivery of video programming protected under Section 628(b).\151\ The Commission therefore is authorized to adopt open Internet rules under Section 628(b), (c)(1), and (j).\152\ --------------------------------------------------------------------------- \149\ DISH Reply at 4-5 (``Pay-TV services continue to evolve at a rapid pace and providers increasingly are integrating their vast offerings of linear channels with online content,'' while ``consumers are adopting online video services as a complement to traditional, linear pay-TV services'' and ``specifically desire Internet video as a complement to * * * [MVPDs'] traditional TV offerings.'') (footnotes and citations omitted). We find unpersuasive the contention that this Order fails to ``grapple with the implications of the market forces that are driving MVPDs * * * to add Internet connectivity to their multichannel video offerings.'' McDowell Statement at *24 (footnote omitted). Our analysis takes account of these developments, which are discussed at length in Part II.A, above. \150\ Id. at 5-8 & n. 20 (discussing ``DishOnline service,'' which ``allows DISH to offer over 3,000 movies and TV shows through its `DishOnline' Internet video service,'' and noting that ``the success of DishOnline is critically dependent on broadband access provided and controlled by DISH's competitors in the MVPD market''); DISH PN Comments at 2-3; DISH Network, Watch Live TV Online OR Recorded Programs with DishOnline, http://www.dish-systems.com/products/dish_online.php (`` `DISHOnline.com integrates DISH Network's expansive TV programming lineup with the vast amount of online video content, adding another dimension to our `pay once, take your TV everywhere' product platform.' ''). Much of the regular subscription programming that DISH offers online is satellite- delivered programming. See DISH Network, Watch Live TV Online OR Recorded Programs with DishOnline, http://www.dish-systems.com/products/dish_online.php (noting that customers can watch content from cable programmers such as the Discovery Channel and MTV). Thus, we reject NCTA's argument that ``[t]here is no basis for asserting that any cable operator or common carrier's practices with respect to Internet-delivered video could * * * `prevent or significantly hinder' an MVPD from providing satellite cable programming.'' NCTA Dec. 10, 2010 Ex Parte Letter at 5. \151\ Notwithstanding suggestions to the contrary, the Commission is not required to wait until anticompetitive harms are realized before acting. Rather, the Commission may exercise its ancillary jurisdiction to ``plan in advance of foreseeable events, instead of waiting to react to them.'' Sw. Cable, 392 U.S. at 176-77 (citation and internal quotation marks omitted); see also Star Wireless, LLC v. FCC, 522 F.3d at 475. \152\ See Open Internet NRPM, 24 FCC Rcd at 13099, para. 85 (discussing role of the Internet in fostering video programming competition and the Commission's authority to regulate video services). --------------------------------------------------------------------------- Similarly, open Internet rules enable us to carry out our responsibilities under Section 616(a) of the Act, which confers additional express statutory authority to combat discriminatory network management practices by broadband providers. Section 616(a) directs the Commission to adopt regulations governing program carriage agreements ``and related practices'' between cable operators or other MVPDs and video programming vendors.\153\ The program carriage regulations must include provisions that prevent MVPDs from ``unreasonably restrain[ing] the ability of an unaffiliated video programming vendor to compete fairly by discriminating in video programming distribution,'' on the basis of a vendor's affiliation or lack of affiliation with the MVPD, in the selection, terms, or conditions of carriage of the vendor's programming.\154\ MVPD practices that discriminatorily impede competing video programming vendors' online delivery of programming to consumers affect the vendors' ability to ``compete fairly'' for viewers, just as surely as MVPDs' discriminatory selection of video programming for carriage on cable systems has this effect. We find that discriminatory practices by MVPDs in their capacity as broadband providers, such as blocking or charging fees for termination of online video programming to end users, are ``related'' to program carriage agreements and within our mandate to adopt regulations under Section 616(a).\155\ --------------------------------------------------------------------------- \153\ An MVPD is ``a person such as, but not limited to, a cable operator, a multichannel multipoint distribution service, a direct broadcast satellite service, or a television receive-only satellite program distributor, who makes available for purchase, by subscribers or customers, multiple channels of video programming.'' 47 U.S.C. 522(13). A ``video programming vendor'' is any ``person engaged in the production, creation, or wholesale distribution of video programming for sale.'' 47 U.S.C. 536(b). A number of video programming vendors make their programming available online. See, e.g., Hulu.com, http://www.hulu.com/about; Biography Channel, http://www.biography.com; Hallmark Channel, http://www.hallmarkchannel.com. \154\ 47 U.S.C. 536(a)(1)-(3); see also 47 CFR 76.1301 (implementing regulations to address practices specified in Section 616(a)(1)-(3)). \155\ The Act does not define ``related practices'' as that phrase is used in Section 616(a). Because the term is neither explicitly defined in the statute nor susceptible of only one meaning, we construe it, consistent with dictionary definitions, to cover practices that are ``akin'' or ``connected'' to those specifically identified in Section 616(a)(1)-(3). See Black's Law Dictionary 1158 (5th ed. 1979); Webster's Third New Int'l Dictionary 1916 (1993). The argument that Section 616(a) has no application to Internet access service overlooks that the statute expressly covers these ``related practices.'' --------------------------------------------------------------------------- C. Authority To Protect the Public Interest Through Spectrum Licensing Open Internet rules for wireless services are further supported by our authority, under Title III of the Communications Act, to protect the public interest through spectrum licensing. Congress has entrusted the Commission with ``maintain[ing] the control of the United States over all the channels of radio transmission.'' Licensees hold Commission-granted authorizations to use that spectrum subject to conditions the Commission imposes on that use.\156\ In considering whether to grant a license to use spectrum, therefore, the Commission must ``determine * * * whether the public interest, convenience, and necessity will be served by the granting of such application.'' \157\ Likewise, when identifying classes of licenses to be awarded by auction and the characteristics of those licenses, the Commission ``shall include safeguards to protect the public interest'' and must seek to promote a number of goals, including ``the development and rapid deployment of new technologies, products, and services.'' Even after licenses are awarded, the Commission may change the license terms ``if in the judgment of the Commission such action will promote the public interest, convenience, and necessity.'' The Commission may exercise this authority on a license-by-license basis or through a rulemaking, even if the affected licenses were awarded at auction. --------------------------------------------------------------------------- \156\ 47 U.S.C. 304, 316(a)(1). We thus disagree with commenters who suggest in general that there is nothing in Title III to support the imposition of open Internet rules. See, e.g., EFF Comments at 6 n. 13. \157\ 47 U.S.C. 309(a); see also 47 U.S.C. 307(a) (``The Commission, if public convenience, interest, or necessity will be served thereby, subject to the limitations of this [Act], shall grant to any applicant therefor a station license provided for by this [Act].''). --------------------------------------------------------------------------- The Commission previously has required wireless licensees to comply with open Internet principles, as appropriate in the particular situation before it. In 2007, when it modified the service rules for the 700 MHz band, the Commission took ``a measured step to encourage additional innovation and consumer choice at this critical stage in the evolution of wireless broadband services.'' Specifically, the Commission required C block licensees ``to allow customers, device manufacturers, third-party application developers, and others to use or develop the devices and applications of their choosing in C Block networks, so long as they meet all applicable regulatory requirements and comply with reasonable conditions related to management of the wireless network (i.e., do not cause harm to the network).'' The open Internet conditions we adopt in this Order likewise are necessary to advance the public interest in innovation and investment.\158\ --------------------------------------------------------------------------- \158\ In addition, the use of mobile VoIP applications is likely to constrain prices for CMRS voice services, similar to what we described earlier with regard to VoIP and traditional phone services. --------------------------------------------------------------------------- AT&T contends that the Commission cannot apply ``neutrality'' regulations to wireless broadband services outside the upper 700 MHz C Block spectrum because any such regulations ``would unlawfully rescind critical rulings in the Commission's 700 MHz Second Report and Order on which providers relied in making multi-billion dollar investments,'' \159\ and that adopting these regulations more broadly to all mobile providers would violate the Administrative Procedure Act. We disagree. As explained above, the Commission retains the statutory authority to impose new requirements on existing licenses beyond those that were in place at the time of grant, whether the licenses were assigned by [[Page 59220]] auction or by other means.\160\ In this case, parties were made well aware that the agency might extend openness requirements beyond the C Block, diminishing any reliance interest they might assert.\161\ To the extent that AT&T argues that application of openness principles reduced auction bids on the C Block spectrum, we find that the reasons for the price differences between the C Block and other 700 MHz spectrum blocks are far more complex. A number of factors, including unique auction dynamics and significant differences between the C Block spectrum and other blocks of 700 MHz spectrum contributed to these price differences. In balancing the public interest factors we are required to consider, we have determined that adopting a targeted set of rules that apply to all mobile broadband providers is necessary at this time. --------------------------------------------------------------------------- \159\ AT&T PN Reply at 32. AT&T asserts that winners of non-C- Block licenses paid a premium for licenses not subject to the open platform requirements that applied to the upper 700 MHz C Block licenses. Id. at 33-34. \160\ The Commission may act by rulemaking to modify or impose rules applicable to all licensees or licensees in a particular class; in order to modify specific licenses held by particular licensees, however, the Commission generally is required to follow the modification procedure set forth in 47 U.S.C. 316. See Comm. for Effective Cellular Rules v. FCC, 53 F.3d 1309, 1319-20 (DC Cir. 1995). \161\ See generally 700 MHz Second Report and Order, 22 FCC Rcd at 15358-65. In the 700 MHz Second Report and Order, the Commission stated that its decision to limit open-platform requirements to the C Block was based on the record before it ``at this time,'' id. at 15361, and noted that openness issues in the wireless industry were being considered more broadly in other proceedings. Id. at 15363. The public notice setting procedures for the 2008 auction advised bidders that the rules governing auctioned licenses would be subject to ``pending and future proceedings'' before the Commission. See Auction of 700 MHz Band Licenses Scheduled for January 24, 2008, Public Notice, 22 FCC Rcd 18141, 18156, para. 42 (2007). --------------------------------------------------------------------------- D. Authority To Collect Information To Enable the Commission To Perform Its Reporting Obligations to Congress Additional sections of the Communications Act provide authority for our transparency requirement in particular. Section 4(k) provides for an annual report to Congress that ``shall contain * * * such information and data collected by the Commission as may be considered of value in the determination of questions connected with the regulation of interstate * * * wire and radio communication'' and provide ``recommendations to Congress as to additional legislation which the Commission deems necessary or desirable.'' \162\ The Commission has previously relied on Section 4(k), among other provisions, as a basis for its authority to gather information.\163\ The Comcast court, moreover, ``readily accept[ed]'' that ``certain assertions of Commission authority could be `reasonably ancillary' to the Commission's statutory responsibility to issue a report to Congress. For example, the Commission might impose disclosure requirements on regulated entities in order to gather data needed for such a report.'' \164\ We adopt such disclosure requirements here. --------------------------------------------------------------------------- \162\ 47 U.S.C. 154(k). In a similar vein, Section 257 of the Act directs the Commission to report to Congress every three years on ``market entry barriers'' that the Commission recommends be eliminated, including ``barriers for entrepreneurs and other small businesses in the provision and ownership of telecommunications services and information services.'' 47 U.S.C. 257(a) & (c); see also Comcast, 600 F.3d at 659; NCTA Dec. 10, 2010 Ex Parte Letter at 3 (``[S]ection 257's reporting mandate provides a basis for the Commission to require providers of broadband Internet access service to disclose the terms and conditions of service in order to assess whether such terms hamper small business entry and, if so, whether any legislation may be required to address the problem.'') (footnote omitted). \163\ See, e.g., New Part 4 of the Commission's Rules Concerning Disruptions to Commc'ns, Report and Order and Further Notice of Proposed Rulemaking, 19 FCC Rcd 16830, 16837, paras. 1, 12 (2004) (extending Commission's reporting requirements for communications disruptions to certain providers of non-wireline communications, in part based on Section 4(k)); DTV Consumer Educ. Initiative, Report & Order, 23 FCC Rcd 4134, 4147, paras. 1, 2, 28 (2008) (requiring various entities, including broadcasters, to submit quarterly reports to the Commission detailing their consumer education efforts related to the DTV transition, in part based on section 4(k)); Review of the Commission's Broad. Cable and Equal Emp't Opportunity Rules and Policies, Second Report and Order and Third Notice of Proposed Rulemaking, 17 FCC Rcd 24018, 24077, paras. 5, 195 (2002) (promulgating recordkeeping and reporting requirements for broadcast licensees and other regulated entities to show compliance with equal opportunities hiring rules, in part based on section 4(k)). \164\ 600 F.3d at 659. All, or nearly all, providers of broadband Internet access service are regulated by the Commission insofar as they operate under certificates to provide common carriage service, or under licenses to use radio spectrum. --------------------------------------------------------------------------- Finally, the Commission has broad authority under Section 218 of the Act to obtain ``full and complete information'' from common carriers and their affiliates. To the extent broadband providers are affiliated with communications common carriers, Section 218 allows the Commission to require the provision of information such as that covered by the transparency rule we adopt in this Order.\165\ We believe that these disclosure requirements will assist us in carrying out our reporting obligations to Congress. --------------------------------------------------------------------------- \165\ Cf. US West, Inc. v. FCC, 778 F.2d 23, 26-27 (DC Cir. 1985) (acknowledging Commission's authority under Section 218 to impose reporting requirements on holding companies that owned local telephone companies). --------------------------------------------------------------------------- E. Constitutional Issues Some commenters contend that open Internet rules violate the First Amendment and amount to an unconstitutional taking under the Fifth Amendment. We examine these constitutional arguments below, and find them unfounded. 1. First Amendment Several broadband providers argue that open Internet rules are inconsistent with the free speech guarantee of the First Amendment. These commenters generally contend that because broadband providers distribute their own and third-party content to customers, they are speakers entitled to First Amendment protections. Therefore, they argue, rules that prevent broadband providers from favoring the transmission of some content over other content violate their free speech rights. Other commenters contend that none of the proposed rules implicate the First Amendment, because providing broadband service is conduct that is not correctly understood as speech. In arguing that broadband service is protected by the First Amendment, AT&T compares its provision of broadband service to the operation of a cable television system, and points out that the Supreme Court has determined that cable programmers and cable operators engage in speech protected by the First Amendment. The analogy is inapt. When the Supreme Court held in Turner I that cable operators were protected by the First Amendment, the critical factor that made cable operators ``speakers'' was their production of programming and their exercise of ``editorial discretion over which programs and stations to include'' (and thus which to exclude). Unlike cable television operators, broadband providers typically are best described not as ``speakers,'' but rather as conduits for speech. The broadband Internet access service at issue here does not involve an exercise of editorial discretion that is comparable to cable companies' choice of which stations or programs to include in their service. In this proceeding broadband providers have not, for instance, shown that they market their services as benefiting from an editorial presence.\166\ To the contrary, Internet end users expect that they can obtain access to all or substantially all content that is available on the Internet, without the editorial [[Page 59221]] intervention of their broadband provider.\167\ --------------------------------------------------------------------------- \166\ See, e.g., AT&T, AT&T U-verse, http://www.att-services.net/att-u-verse.html (AT&T U-verse: ``Customers can get the information they want, when they want it''); Verizon, FiOS Internet, http://www22.verizon.com/Residential/FiOSInternet/Overview.htm and Verizon, High Speed Internet, http://www22.verizon.com/Residential/HighSpeedInternet (Verizon FiOS and High Speed Internet: ``Internet, plus all the free extras''). \167\ See Verizon Comments at 117 (``[B]roadband providers today provide traditional Internet access services that offer subscribers access to all lawful content and have strong economic incentives to continue to do so.'') (emphasis added). --------------------------------------------------------------------------- Consistent with that understanding, broadband providers maintain that they qualify for statutory immunity from liability for copyright violations or the distribution of offensive material precisely because they lack control over what end users transmit and receive.\168\ In addition, when defending themselves against subpoenas in litigation involving alleged copyright violations, broadband providers typically take the position that they are simply conduits of information provided by others.\169\ --------------------------------------------------------------------------- \168\ See 17 U.S.C. 512(a) (a ``service provider shall not be liable * * * for infringement of copyright by reason of the provider's transmitting, routing, or providing connections for'' material distributed by others on its network); 47 U.S.C. 230(c)(1) (``[N]o provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider''); see also Recording Indus. Ass'n of Am., Inc. v. Verizon Internet Servs., Inc., 351 F.3d 1229, 1234 (DC Cir. 2003) (discussing in context of subpoena issued to Verizon under the Digital Millennium Copyright Act Section 512(a)'s ``four safe harbors, each of which immunizes ISPs from liability from copyright infringement''), cert. denied, 543 U.S. 924 (2004). For example ``Verizon.net, the home page for Verizon Internet customers, contains a notice explicitly claiming copyright over the contents of the page. In contrast, the terms of service of Verizon Internet access explicitly disclaim any affiliation with content transmitted over the network.'' PK Reply at 22. \169\ See, e.g., Charter Commc'ns, Inc., Subpoena Enforcement Matter, 393 F.3d 771, 777 (8th Cir. 2005) (subpoenas served on Charter were not authorized because ``Charter's function'' as a broadband provider ``was limited to acting as a conduit for the allegedly copyright protected material'' at issue); Verizon Internet Servs., 351 F.3d at 1237 (accepting Verizon's argument that Federal copyright law ``does not authorize the issuance of a subpoena to an ISP acting as a mere conduit for the transmission of information sent by others''). --------------------------------------------------------------------------- To be sure, broadband providers engage in network management practices designed to protect their Internet services against spam and malicious content, but that practice bears little resemblance to an editor's choosing which programs, among a range of programs, to carry.\170\ Furthermore, this Order does not limit broadband providers' ability to modify their own Web pages, or transmit any lawful message that they wish, just like any other speaker. Broadband providers are also free under this Order to offer a wide range of ``edited'' services. If, for example, a broadband provider wanted to offer a service limited to ``family friendly'' materials to end users who desire only such content, it could do so under the rules we promulgate in this Order. --------------------------------------------------------------------------- \170\ We recognize that in two cases, Federal district courts have concluded that the provision of broadband service is ``speech'' protected by the First Amendment. In Itasca, the district court reasoned that broadband providers were analogous to cable and satellite television companies, which are protected by the First Amendment. Ill. Bell Tel. Co. v. Vill. of Itasca, 503 F. Supp. 2d 928, 947-49 (N.D. Ill. 2007). And in Broward County, the district court determined that the transmission function provided by broadband service could not be separated from the content of the speech being transmitted. Comcast Cablevision of Broward Cnty., Inc. v. Broward Cnty., 124 F. Supp. 2d 685, 691-92 (S.D. Fla. 2000). For the reasons stated, we disagree with the reasoning of those decisions. --------------------------------------------------------------------------- AT&T and NCTA argue that open Internet rules interfere with the speech rights of content and application providers to the extent they are prevented from paying broadband providers for higher quality service. Purchasing a higher quality of termination service for one's own Internet traffic, though, is not speech--just as providing the underlying transmission service is not. Telephone common carriers, for instance, transmit users' speech for hire, but no court has ever suggested that regulation of common carriage arrangements triggers First Amendment scrutiny. Even if open Internet rules did implicate expressive activity, they would not violate the First Amendment. Because the rules are based on the characteristics of broadband Internet access service, independent of content or viewpoint, they would be subject to intermediate First Amendment scrutiny.\171\ The regulations in this Order are triggered by a broadband provider offering broadband Internet access, not by the message of any provider. Indeed, the point of open Internet rules is to protect traffic regardless of its content. Verizon's argument that such regulation is presumptively suspect because it makes speaker-based distinctions likewise lacks merit: Our action is based on the transmission service provided by broadband providers rather than on what providers have to say. In any event, speaker-based distinctions are permissible so long as they are ```justified by some special characteristic of' the particular medium being regulated''--here the ability of broadband providers to favor or disfavor Internet traffic to the detriment of innovation, investment, competition, public discourse, and end users. --------------------------------------------------------------------------- \171\ See Turner I, 512 U.S. at 642. Regulations generally are content neutral if justified without reference to content or viewpoint. Id. at 643; BellSouth Corp. v. FCC, 144 F.3d 58, 69 (DC Cir. 1998); Time Warner Entm't Co., L.P. v. FCC, 93 F.3d 957, 966-67 (DC Cir. 1996). --------------------------------------------------------------------------- Under intermediate scrutiny, a content-neutral regulation will be sustained if ``it furthers an important or substantial government interest * * * unrelated to the suppression of free expression,'' and if ``the means chosen'' to achieve that interest ``do not burden substantially more speech than is necessary.'' The government interests underlying this Order--preserving an open Internet to encourage competition and remove impediments to infrastructure investment while enabling consumer choice, end-user control, free expression, and the freedom to innovate without permission--ensure the public's access to a multiplicity of information sources and maximize the Internet's potential to further the public interest. As a result, these interests satisfy the intermediate-scrutiny standard.\172\ Indeed, the interest in keeping the Internet open to a wide range of information sources is an important free speech interest in its own right. As Turner I affirmed, ``assuring that the public has access to a multiplicity of information sources is a governmental purpose of the highest order, for it promotes values central to the First Amendment.'' \173\ This Order protects the speech interests of all Internet speakers. --------------------------------------------------------------------------- \172\ These interests are consistent with the Communications Act's charge to the Commission to make available a ``rapid and efficient'' national communications infrastructure, 47 U.S.C. 151; to promote, consistent with a ``vibrant and competitive free market,'' ``the continued development of the Internet and other interactive computer services''; and to ``encourage the development of technologies which maximize user control over what information is received,'' 47 U.S.C. 230(b)(1)-(3). Indeed, AT&T concedes that ``[t]here is little doubt that preservation of an open and free Internet is an `important or substantial government interest.' '' AT&T Comments at 237 (quoting Turner I, 512 U.S. at 662). \173\ 512 U.S. at 663. The Turner I Court continued: ``Indeed, it has long been a basic tenet of national communications policy that the widest possible dissemination of information from diverse and antagonistic sources is essential to the welfare of the public.'' Id. (internal quotation marks omitted). See also FCC v. Nat'l Citizens Comm. for Broad., 436 U.S. 775, 795 (1978) (NCCB) (quoting Associated Press v. United States, 326 U.S. 1, 20 (1945)). --------------------------------------------------------------------------- Time Warner and Verizon contend that the government lacks important or substantial interests because the harms from prohibited practices supposedly are speculative. This ignores actual instances of harmful practices by broadband providers, as discussed in Part II.B. In any event, the Commission is not required to stay its hand until substantial harms already have occurred. On the contrary, the Commission's predictive judgments as to the development of a problem and likely injury to the public interest are entitled to great deference. In sum, the rules we adopt are narrowly tailored to advance the important government interests at stake. [[Page 59222]] The rules apply only to that portion of the end user's link to the Internet over which the end user's broadband provider has control. They forbid only those actions that could unfairly impede the public's use of this important resource. Broadband providers are left with ample opportunities to transmit their own content, to maintain their own Web sites, and to engage in reasonable network management. In addition, they can offer edited services to their end users. The rules are narrowly tailored because they address the problem at hand, and go no farther.\174\ --------------------------------------------------------------------------- \174\ AT&T contends (AT&T Comments at 219-20) that our rules would conflict with prohibitions contained in Section 326 of the Act against ``censorship'' of ``radio communications'' or interference with ``the right of free speech by means of radio communication.'' 47 U.S.C. 326. For the same reasons that our rules do not violate the First Amendment, they do not violate Section 326's statutory prohibition. --------------------------------------------------------------------------- 2. Fifth Amendment Takings Contrary to the claims of some broadband providers, open Internet rules pose no issue under the Fifth Amendment's Takings Clause. Our rules do not compel new services or limit broadband providers' flexibility in setting prices for their broadband Internet access services, but simply require transparency and prevent broadband providers--when they voluntarily carry Internet traffic--from blocking or unreasonably discriminating in their treatment of that traffic. Moreover, this Order involves setting policies for communications networks, an activity that has been one of this Commission's central duties since it was established in 1934. Absent compelled permanent physical occupations of property,\175\ takings analysis involves ``essentially ad hoc, factual inquiries'' regarding such factors as the degree of interference with ``investment- backed expectations,'' the ``economic impact of the regulation'' and ``the character of the government action.'' In this regard, takings law makes clear that property owners cannot, as a general matter, expect that existing legal requirements regarding their property will remain entirely unchanged. As discussed in Part II, the history of broadband Internet access services offers no basis for reasonable reliance on a policy regime in which providers are free to conceal or discriminate without limit, and the rules we adopt in this Order should not impose substantial new costs on broadband providers.\176\ Accordingly, our Order does not raise constitutional concerns under regulatory takings analysis. --------------------------------------------------------------------------- \175\ Verizon contends that ``[t]o the extent the proposed rules would prohibit the owner of a broadband network from setting the terms on which other providers can occupy its property, the rule would give those providers the equivalent of a permanent easement on the network--a form of physical occupation.'' Verizon Comments at 119 (citing Loretto v. Teleprompter Manhattan CATV Corp., 458 U.S. 419, 430 (1982)). Not so. Such transmissions are neither ``occupations'' nor ``permanent.'' See Loretto, 458 U.S. at 435 n.12; see also Cablevision Sys. Corp. v. FCC, 570 F.3d 83, 98 (2d Cir. 2009) (upholding Commission's finding that a must-carry obligation did not constitute a physical occupation because ``the transmission of WRNN's signal does not involve a physical occupation of Cablevision's equipment or property''). In addition, to the extent broadband providers voluntarily allow any customer to transmit or receive information, the imposition of reasonable non- discrimination requirements would not be a taking under Loretto. See Hilton Washington Corp. v. District of Columbia, 777 F.2d 47 (DC Cir. 1985); Yee v. City of Escondido, 503 U.S. 519, 531 (1992). \176\ This history likewise refutes the assertion that prior Commission decisions ``engendered serious reliance interests'' that would be unsettled by our adoption of open Internet rules. Baker Statement at *11 n.41 (citation and internal quotation marks omitted). --------------------------------------------------------------------------- V. Enforcement Prompt and effective enforcement of the rules adopted in this Order is crucial to preserving an open Internet and providing clear guidance to stakeholders. We anticipate that many of the disputes that will arise regarding alleged open Internet violations--particularly those centered on engineering-focused questions--will be resolvable by the parties without Commission involvement. We thus encourage parties to endeavor to resolve disputes through direct negotiation focused on relevant technical issues, and to consult with independent technical bodies. Many commenters endorse this approach.\177\ --------------------------------------------------------------------------- \177\ See, e.g., Bright House Networks Comments at 10; CCIA Comments at 2, 34; Google-Verizon Joint Comments at 4 (``A robust role for technical and industry groups should be encouraged to address any challenges or problems that may arise and to help guide the practices of all players. * * *''); WISPA Comments at 14-16; DISH Network Reply at 24-26; Qwest Reply at 32. --------------------------------------------------------------------------- Should issues develop that are not resolved through private processes, the Commission will provide backstop mechanisms to address such disputes.\178\ In the Open Internet NPRM, the Commission proposed to enforce open Internet rules through case-by-case adjudication, a proposal that met with almost universal support among commenters. The Commission also sought comment on whether it should adopt complaint procedures specifically governing alleged violations of open Internet rules, and whether any of the Commission's existing rules provide a suitable model. --------------------------------------------------------------------------- \178\ Providers and other parties may also seek guidance from the Commission on questions about the application of the open Internet rules in particular contexts, for instance by requesting a declaratory ruling. See 47 CFR 1.2. --------------------------------------------------------------------------- A. Informal Complaints Many commenters urge the Commission to adopt informal complaint procedures that equip end users and edge providers with a simple and cost-effective option for calling attention to open Internet rule violations. We agree that end users, edge providers, and others should have an efficient vehicle to bring potential open Internet violations to the Commission, and indeed, such a vehicle is already available. Parties may submit complaints to the Commission pursuant to Section 1.41 of the Commission's rules. Unlike formal complaints, no filing fee is required. We recommend that end users and edge providers submit any complaints through the Commission's Web site, at http://esupport.fcc.gov/complaints.htm. The Consumer and Governmental Affairs Bureau will also make available resources explaining these rules and facilitating the filing of informal complaints. Although individual informal complaints will not typically result in written Commission orders, the Enforcement Bureau will examine trends or patterns in complaints to identify potential targets for investigation and enforcement action.\179\ --------------------------------------------------------------------------- \179\ As with our other complaint rules, the availability of complaint procedures does not bar the Commission from initiating separate and independent enforcement proceedings for potential violations. See 47 CFR 0.111(a)(16). --------------------------------------------------------------------------- B. Formal Complaints Many commenters propose that the Commission adopt formal complaint procedures to address open Internet disputes. We agree that such procedures should be available in the event an open Internet dispute cannot be resolved through other means. Formal complaint processes permit anyone--including individual end users and edge providers--to file a claim alleging that another party has violated a statute or rule, and asking the Commission to rule on the dispute. A number of commenters suggest that existing Commission procedural rules could readily be utilized to govern open Internet complaints. We conclude that adopting a set of procedures based on our Part 76 cable access complaint rules will best suit the needs of open Internet disputes that may arise.\180\ Although similar to the [[Page 59223]] complaint rules under Section 208, we find that the part 76 rules are more streamlined and thus preferable.\181\ --------------------------------------------------------------------------- \180\ The Commission is authorized to resolve formal complaints--and adopt procedural rules governing the process-- pursuant to Sections 4(i) and 4(j) of the Act. 47 U.S.C.. 154(i), 154(j). In addition, Section 403 of the Act enables the Commission to initiate inquiries and enforce orders on its own motion. 47 U.S.C. 403. Inherent in such authority is the ability to resolve disputes concerning violations of the open Internet rules. \181\ The Part 76 rules were promulgated to address complaints against cable systems. See 1998 Biennial Regulatory Review--Part 76--Cable Television Service Pleading and Complaint Rules, Report and Order, 14 FCC Rcd 418, 420, para. 6 (1999) (``1998 Biennial Review''). For example, a local television station may bring a complaint, pursuant to the Part 76 rules, claiming that it was wrongfully denied carriage on a cable system. See 47 CFR 76.61. Some complaints alleging open Internet violations may be analogous, such as those brought by a content or application provider claiming that broadband providers--many of which are cable companies--are unlawfully blocking or degrading access to end users. --------------------------------------------------------------------------- Under the rules we adopt in this Order, any person may file a formal complaint. Before filing a complaint, a complainant must first notify the defendant in writing that it intends to file a complaint with the Commission for violation of rules adopted in this Order.\182\ After the complaint has been filed, the defendant must submit an answer, and the complainant may submit a reply. In some cases, the facts might be uncontested, and the proceeding can be completed based on the pleadings. In other cases, a thorough analysis of the challenged conduct might require further factual development and briefing.\183\ Based on the record developed, Commission staff (or the Commission itself) will issue an order determining the lawfulness of the challenged practice. --------------------------------------------------------------------------- \182\ As with other formal complaint procedures, a filing fee will be required. See 47 CFR 1.1106. \183\ The rules give the Commission discretion to order other procedures as appropriate, including briefing, status conferences, oral argument, evidentiary hearings, discovery, or referral to an administrative law judge. See 47 CFR 8.14(e) through (g). --------------------------------------------------------------------------- As in other contexts, complainants in open Internet proceedings will ultimately bear the burden of proof to demonstrate by a preponderance of the evidence that an alleged violation of the rules has occurred. A number of commenters propose, however, that once a complainant makes a prima facie showing that an open Internet rule has been violated, the burden should shift to the broadband provider to demonstrate that the challenged practice is reasonable. This approach is appropriate in the context of certain open Internet complaints, when the evidence necessary to apply the open Internet rules is predominantly in the possession of the broadband provider. Accordingly, we require a complainant alleging a violation of the open Internet rules to plead fully and with specificity the basis of its claims and to provide facts, supported when possible by documentation or affidavit, sufficient to establish a prima facie case of an open Internet violation. In turn, the broadband provider must answer each claim with particularity and furnish facts, supported by documentation or affidavit, demonstrating the reasonableness of the challenged practice. At that point, the complainant will have the opportunity to demonstrate that the practice is not reasonable. Should experience reveal the need to adjust the burden of proof in open Internet disputes, we will do so as appropriate. Several commenters urge the Commission to adopt timelines for the complaint process. We recognize the need to resolve alleged violations swiftly, and accordingly will allow requests for expedited treatment of open Internet complaints under the Enforcement Bureau's Accelerated Docket procedures.\184\ --------------------------------------------------------------------------- \184\ See 47 CFR 1.730. Furthermore, for good cause, pursuant to 47 CFR 1.3, the Commission may shorten the deadlines or otherwise revise the procedures herein to expedite the adjudication of complaints. --------------------------------------------------------------------------- In resolving formal complaints, the Commission will draw on resources from across the agency--including engineering, economic, and legal experts--to resolve open Internet complaints in a timely manner. In addition, we will take into account standards and best practices adopted by relevant standard-setting organizations, and such organizations and outside advisory groups also may provide valuable technical assistance in resolving disputes. Further, in order to facilitate prompt decision-making, when possible we will resolve open Internet formal complaints at the bureau level, rather than the Commission level.\185\ --------------------------------------------------------------------------- \185\ The rules adopted in this Order explicitly authorize the Enforcement Bureau to resolve complaints alleging open Internet violations. --------------------------------------------------------------------------- C. FCC Initiated Actions As noted above, in addition to ruling on complaints, the Commission has the authority to initiate enforcement actions on its own motion. For instance, Section 403 of the Act permits the Commission to initiate an inquiry concerning any question arising under the Act, and Section 503(b) authorizes us to issue citations and impose forfeiture penalties for violations of our rules. Should the Commission find that a broadband Internet provider is engaging in activity that violates the open Internet rules, we will take appropriate enforcement action, including the issuance of forfeitures. VI. Effective Date, Open Internet Advisory Committee, and Commission Review Some of the rules adopted in this Order contain new information collection requirements subject to the Paperwork Reduction Act (PRA). Our rules addressing transparency are among those requiring PRA approval. The disclosure rule is essential to the proper functioning of our open Internet framework, and we therefore make all the rules we adopt in this Order effective November 20, 2011. To assist the Commission in monitoring the state of Internet openness and the effects of our rules, we intend to create an Open Internet Advisory Committee. The Committee, to be created in consultation with the General Services Administration pursuant to the Federal Advisory Committee Act, will be an inclusive and transparent body that will hold public meetings. It will be comprised of a balanced group including consumer advocates; Internet engineering experts; content, application, and service providers; network equipment and end- user-device manufacturers and suppliers; investors; broadband service providers; and other parties the Commission may deem appropriate. The Committee will aid the Commission in tracking developments with respect to the freedom and openness of the Internet, in particular with respect to issues discussed in this Order, including technical standards and issues relating to mobile broadband and specialized services. The Committee will report to the Commission and make recommendations it deems appropriate concerning our open Internet framework. In light of the pace of change of technologies and the market for broadband Internet access service, and to evaluate the efficacy of the framework adopted in this Order for preserving Internet openness, the Commission will review all of the rules in this Order no later than two years from their effective date, and will adjust its open Internet framework as appropriate. VII. Procedural Matters A. Final Regulatory Flexibility Analysis As required by the Regulatory Flexibility Act of 1980, as amended (RFA), an Initial Regulatory Flexibility Analysis (IRFA) was included in the Open Internet NPRM in GN Docket No. 09-191 and WC Docket No. 07- 52. The Commission sought written public [[Page 59224]] comment on the proposals in these dockets, including comment on the IRFA. This Final Regulatory Flexibility Analysis (FRFA) conforms to the RFA. Need for, and Objectives of, the Rules In this Order the Commission takes an important step to preserve the Internet as an open platform for innovation, investment, job creation, economic growth, competition, and free expression. To provide greater clarity and certainty regarding the continued freedom and openness of the Internet, we adopt three basic rules that are grounded in broadly accepted Internet norms, as well as our own prior decisions: i. Transparency. Fixed and mobile broadband providers must disclose the network management practices, performance characteristics, and terms and conditions of their broadband services; ii. No blocking. Fixed broadband providers may not block lawful content, applications, services, or non-harmful devices; mobile broadband providers may not block lawful Web sites, or block applications that compete with their voice or video telephony services; and iii. No unreasonable discrimination. Fixed broadband providers may not unreasonably discriminate in transmitting lawful network traffic. We believe these rules, applied with the complementary principle of reasonable network management, will empower and protect consumers and innovators while helping ensure that the Internet continues to flourish, with robust private investment and rapid innovation at both the core and the edge of the network. This is consistent with the National Broadband Plan goal of broadband access that is ubiquitous and fast, promoting the global competitiveness of the United States. In late 2009, we launched a public process to determine whether and what actions might be necessary to preserve the characteristics that have allowed the Internet to grow into an indispensable platform supporting our nation's economy and civic life, and to foster continued investment in the physical networks that enable the Internet. Since then, more than 100,000 commenters have provided written input. Commission staff held several public workshops and convened a Technological Advisory Process with experts from industry, academia, and consumer advocacy groups to collect their views regarding key technical issues related to Internet openness. This process has made clear that the Internet has thrived because of its freedom and openness--the absence of any gatekeeper blocking lawful uses of the network or picking winners and losers online. Consumers and innovators do not have to seek permission before they use the Internet to launch new technologies, start businesses, connect with friends, or share their views. The Internet is a level playing field. Consumers can make their own choices about what applications and services to use and are free to decide what content they want to access, create, or share with others. This openness promotes competition. It also enables a self-reinforcing cycle of investment and innovation in which new uses of the network lead to increased adoption of broadband, which drives investment and improvements in the network itself, which in turn lead to further innovative uses of the network and further investment in content, applications, services, and devices. A core goal of this Order is to foster and accelerate this cycle of investment and innovation. The record and our economic analysis demonstrate, however, that the openness of the Internet cannot be taken for granted, and that it faces real threats. Indeed, we have seen broadband providers endanger the Internet's openness by blocking or degrading content and applications without disclosing their practices to end users and edge providers, notwithstanding the Commission's adoption of open Internet principles in 2005. In light of these considerations, as well as the limited choices most consumers have for broadband service, broadband providers' financial interests in telephony and pay television services that may compete with online content and services, and the economic and civic benefits of maintaining an open and competitive platform for innovation and communication, the Commission has long recognized that certain basic standards for broadband provider conduct are necessary to ensure the Internet's continued openness. The record also establishes the widespread benefits of providing greater clarity in this area--clarity that the Internet's openness will continue; that there is a forum and procedure for resolving alleged open Internet violations; and that broadband providers may reasonably manage their networks and innovate with respect to network technologies and business models. We expect the costs of compliance with our prophylactic rules to be small, as they incorporate longstanding openness principles that are generally in line with current practices and with norms endorsed by many broadband providers. Conversely, the harms of open Internet violations may be substantial, costly, and in some cases potentially irreversible. The rules we proposed in the Open Internet NPRM and those we adopt in this Order follow directly from the Commission's bipartisan Internet Policy Statement, adopted unanimously in 2005 and made temporarily enforceable for certain providers in 2005 and 2006; openness protections the Commission established in 2007 for users of certain wireless spectrum; and a notice of inquiry in 2007 that asked, among other things, whether the Commission should add a principle of nondiscrimination to the Internet Policy Statement. Our rules build upon these actions, first and foremost by requiring broadband providers to be transparent in their network management practices, so that end users can make informed choices and innovators can develop, market, and maintain Internet-based offerings. The rules also prevent certain forms of blocking and discrimination with respect to content, applications, services, and devices that depend on or connect to the Internet. An open, robust, and well-functioning Internet requires that broadband providers have the flexibility to reasonably manage their networks. Network management practices are reasonable if they are appropriate and tailored to achieving a legitimate network management purpose. Transparency and end-user control are touchstones of reasonableness. We recognize that broadband providers may offer other services over the same last-mile connections used to provide broadband service. These ``specialized services'' can benefit end users and spur investment, but they may also present risks to the open Internet. We will closely monitor specialized services and their effects on broadband service to ensure, through all available mechanisms, that they supplement but do not supplant the open Internet. Mobile broadband is at an earlier stage in its development than fixed broadband and is evolving rapidly. For that and other reasons discussed below, we conclude that it is appropriate at this time to take measured steps in this area. Accordingly, we require mobile providers to comply with the transparency rule, which includes enforceable disclosure obligations regarding device and application certification and approval processes; we prohibit providers from blocking lawful Web sites; and we prohibit providers from blocking applications that compete with providers' voice and video telephony services. We will closely [[Page 59225]] monitor the development of the mobile broadband market and will adjust the framework we adopt in this Order as appropriate. These rules are within our jurisdiction over interstate and foreign communications by wire and radio. Further, they implement specific statutory mandates in the Communications Act (``Act'') and the Telecommunications Act of 1996 (``1996 Act''), including provisions that direct the Commission to promote Internet investment and to protect and promote voice, video, and audio communications services. The framework we adopt in this Order aims to ensure the Internet remains an open platform--one characterized by free markets and free speech--that enables consumer choice, end-user control, competition through low barriers to entry, and the freedom to innovate without permission. The framework does so by protecting openness through high- level rules, while maintaining broadband providers' and the Commission's flexibility to adapt to changes in the market and in technology as the Internet continues to evolve. Summary of the Significant Issues Raised by the Public Comments in Response to the IRFA and Summary of the Assessment of the Agency of Such Issues A few commenters discussed the IRFA from the Open Internet NPRM. The Center for Regulatory Effectiveness (CRE) argued that the Open Internet NPRM's IRFA was defective because it ineffectively followed 5 U.S.C. secs. 603(a) (``Such analysis shall describe the impact of the proposed rule on small entities.'') and 603(c) (``Each initial regulatory flexibility analysis shall also contain a description of any significant alternatives to the proposed rule which accomplish the stated objectives of applicable statutes and which minimize any significant economic impact of the proposed rule on small entities.''). CRE does not provide any case law to support its interpretation that the Commission is in violation of these aspects of the statute, nor does CRE attempt to argue that SBEs have actually or theoretically been harmed. Rather, CRE is concerned that by not following its reading of these parts of the law, the Commission is being hypocritical by not being transparent enough. CRE recommends that the Commission publish a revised IRFA for public comment. We disagree: we believe that the IRFA was adequate and that the opportunity for SBEs to comment in a publicly accessible docket should remove any potential harm to openness that CRE is concerned with, as well as any harms to SBEs that could occur by not following CRE's interpretation of the law. The Smithville Telephone Company (Smithville) notes that many ILECs have vastly fewer employees than the 1500 or less that is required to be recognized as a small business under the SBA. For instance, Smithville states that it has seven employees. Smithville also observes that some other small ILECs in Mississippi have staffs of 8, 4, 2, 3, and 21. Smithville argues that companies of this size do not have the resources to fully analyze issues and participate in Commission proceedings. Smithville would like the Commission to use the data that it regularly receives from carriers to set a carrier size where exemptions from proposed rules and less complex reporting requirements can be set. In the present case, however, we determine that this is not necessary. We expect the costs of compliance with these rules to be small, as the high-level rules incorporate longstanding openness principles that appear to be generally in line with most broadband providers' current practices. We note that Smithville does not cite any particular source of increased costs, or attempt to estimate costs of compliance. Nonetheless, the Commission attempts to ease any burden that the transparency rule may cause by only requiring disclosure on a Web site and at the point of sale, making the transparency rule flexible. In addition, by setting the effective date of these rules as November 20, 2011, the Order gives broadband providers adequate time to develop cost-effective methods of compliance. Finally, to the extent that the transparency rule imposes a new obligation on small businesses, we find that the flexibility built into the rule addresses any compliance concerns. The American Cable Association (ACA) notes that the Commission has an obligation to ``include in the FRFA a comprehensive discussion of the economic impact its actions will have on small cable operators.'' The ACA cites its other comments, which ask the Commission to clarify that the codified principles would not obligate broadband service providers to (1) ``employ specific network management practices,'' (2) ``impose affirmative obligations dealing with unlawful content or the unlawful transfer of content,'' (3) ``accommodate lawful devices that are not supported by a broadband provider's network,'' and (4) ``provide information regarding a company's network management practices through any reporting, recordkeeping, or means other than through a company's Web site or Web page.'' Addressing ACA's arguments with regard to cable operators, and fixed broadband providers in particular, (1), the Commission is not requiring specific network management practices. The Commission only requires that any network management be reasonable; the Commission does not require that any specific practice be employed. Regarding (2), the rules do not impose affirmative obligations dealing with unlawful content or the unlawful transfer of content. We state that the ``no blocking'' rule does not prevent or restrict a broadband provider from refusing to transmit material such as child pornography. In response to (3), the Order clarifies that the ``no blocking'' rule protects only devices that do not harm the network and only requires fixed broadband service providers to allow devices that conform to publicly available industry standards applicable to the providers' services. Directly addressing ACA's concern, the Order notes that a DOCSIS-based provider is not required to support a DSL modem. In response to (4), the disclosure requirement in this Order does not require additional forms of disclosure, other than, at a minimum, requiring broadband providers to prominently display or provide links to disclosures on a publicly available, easily accessible Web site that is available to current and prospective end users and edge providers as well as to the Commission, and disclosing relevant information at the point of sale. Description and Estimate of the Number of Small Entities to Which the Rules Apply The RFA directs agencies to provide a description of, and, where feasible, an estimate of, the number of small entities that may be affected by the rules adopted herein. The RFA generally defines the term ``small entity'' as having the same meaning as the terms ``small business,'' ``small organization,'' and ``small governmental jurisdiction.'' In addition, the term ``small business'' has the same meaning as the term ``small business concern'' under the Small Business Act. A ``small business concern'' is one which: (1) Is independently owned and operated; (2) is not dominant in its field of operation; and (3) satisfies any additional criteria established by the Small Business Administration (SBA). 1. Total Small Entities Our action may, over time, affect small entities that are not easily categorized at present. We therefore [[Page 59226]] describe here, at the outset, three comprehensive, statutory small entity size standards. First, nationwide, there are a total of approximately 27.2 million small businesses, according to the SBA. In addition, a ``small organization'' is generally ``any not-for-profit enterprise which is independently owned and operated and is not dominant in its field.'' Nationwide, as of 2002, there were approximately 1.6 million small organizations. Finally, the term ``small governmental jurisdiction'' is defined generally as ``governments of cities, towns, townships, villages, school districts, or special districts, with a population of less than fifty thousand.'' Census Bureau data for 2002 indicate that there were 87,525 local governmental jurisdictions in the United States. We estimate that, of this total, 84,377 entities were ``small governmental jurisdictions.'' Thus, we estimate that most governmental jurisdictions are small. 2. Internet Access Service Providers Internet Service Providers. The 2007 Economic Census places these firms, whose services might include voice over Internet Protocol (VoIP), in either of two categories, depending on whether the service is provided over the provider's own telecommunications facilities (e.g., cable and DSL ISPs), or over client-supplied telecommunications connections (e.g., dial-up ISPs). The former are within the category of Wired Telecommunications Carriers, which has an SBA small business size standard of 1,500 or fewer employees. These are also labeled ``broadband.'' The latter are within the category of All Other Telecommunications, which has a size standard of annual receipts of $25 million or less. These are labeled non-broadband. The most current Economic Census data for all such firms are 2007 data, which are detailed specifically for ISPs within the categories above. For the first category, the data show that 396 firms operated for the entire year, of which 159 had nine or fewer employees. For the second category, the data show that 1,682 firms operated for the entire year. Of those, 1,675 had annual receipts below $25 million per year, and an additional two had receipts of between $25 million and $ 49,999,999. Consequently, we estimate that the majority of ISP firms are small entities. The ISP industry has changed since 2007. The 2007 data cited above may therefore include entities that no longer provide Internet access service and may exclude entities that now provide such service. To ensure that this FRFA describes the universe of small entities that our action might affect, we discuss in turn several different types of entities that might be providing Internet access service. 3. Wireline Providers Incumbent Local Exchange Carriers (Incumbent LECs). Neither the Commission nor the SBA has developed a small business size standard specifically for incumbent local exchange services. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 1,311 carriers have reported that they are engaged in the provision of incumbent local exchange services. Of these 1,311 carriers, an estimated 1,024 have 1,500 or fewer employees and 287 have more than 1,500 employees. Consequently, the Commission estimates that most providers of incumbent local exchange service are small businesses that may be affected by our proposed action. Competitive Local Exchange Carriers (Competitive LECs), Competitive Access Providers (CAPs), Shared-Tenant Service Providers, and Other Local Service Providers. Neither the Commission nor the SBA has developed a small business size standard specifically for these service providers. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 1005 carriers have reported that they are engaged in the provision of either competitive access provider services or competitive local exchange carrier services. Of these 1005 carriers, an estimated 918 have 1,500 or fewer employees and 87 have more than 1,500 employees. In addition, 16 carriers have reported that they are ``Shared-Tenant Service Providers,'' and all 16 are estimated to have 1,500 or fewer employees. In addition, 89 carriers have reported that they are ``Other Local Service Providers.'' Of the 89, all have 1,500 or fewer employees. Consequently, the Commission estimates that most providers of competitive local exchange service, competitive access providers, Shared-Tenant Service Providers, and other local service providers are small entities that may be affected by our action. We have included small incumbent LECs in this present RFA analysis. As noted above, a ``small business'' under the RFA is one that, inter alia, meets the pertinent small business size standard (e.g., a telephone communications business having 1,500 or fewer employees), and ``is not dominant in its field of operation.'' The SBA's Office of Advocacy contends that, for RFA purposes, small incumbent LECs are not dominant in their field of operation because any such dominance is not ``national'' in scope. We have therefore included small incumbent LECs in this RFA analysis, although we emphasize that this RFA action has no effect on Commission analyses and determinations in other, non-RFA contexts. Interexchange Carriers. Neither the Commission nor the SBA has developed a small business size standard specifically for providers of interexchange services. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 300 carriers have reported that they are engaged in the provision of interexchange service. Of these, an estimated 268 have 1,500 or fewer employees and 32 have more than 1,500 employees. Consequently, the Commission estimates that the majority of IXCs are small entities that may be affected by our action. Operator Service Providers (OSPs). Neither the Commission nor the SBA has developed a small business size standard specifically for operator service providers. The appropriate size standard under SBA rules is for the category Wired Telecommunications Carriers. Under that size standard, such a business is small if it has 1,500 or fewer employees. According to Commission data, 33 carriers have reported that they are engaged in the provision of operator services. Of these, an estimated 31 have 1,500 or fewer employees and 2 has more than 1,500 employees. Consequently, the Commission estimates that the majority of OSPs are small entities that may be affected by our proposed action. 4. Wireless Providers--Fixed and Mobile For reasons discussed above in the text of the Order, the Commission has distinguished wireless fixed broadband Internet access service from wireless mobile broadband Internet access service. Specifically, the Commission decided that fixed broadband Internet access service providers, whether wireline or wireless, must disclose their network management practices and the performance characteristics and commercial terms of their broadband services; may not block lawful content, applications, services or non-harmful [[Page 59227]] devices; and may not unreasonably discriminate in transmitting lawful network traffic. Also for the reasons discussed above, the Commission decided that wireless mobile broadband Internet access service providers must disclose their network management practices and performance characteristics and commercial terms of their broadband service and may not block lawful Web sites or block applications that compete with their voice or video telephony service. Thus, to the extent the wireless services listed below are used by wireless firms for fixed and mobile broadband Internet access services, the actions in this Order may have an impact on those small businesses as set forth above and further below. In addition, for those services subject to auctions, we note that, as a general matter, the number of winning bidders that claim to qualify as small businesses at the close of an auction does not necessarily represent the number of small businesses currently in service. Also, the Commission does not generally track subsequent business size unless, in the context of assignments and transfers or reportable eligibility events, unjust enrichment issues are implicated. Wireless Telecommunications Carriers (except Satellite). Since 2007, the Census Bureau has placed wireless firms within this new, broad, economic census category. Prior to that time, such firms were within the now-superseded categories of ``Paging'' and ``Cellular and Other Wireless Telecommunications.'' Under the present and prior categories, the SBA has deemed a wireless business to be small if it has 1,500 or fewer employees. For the category of Wireless Telecommunications Carriers (except Satellite), preliminary data for 2007 show that there were 11,927 firms operating that year. While the Census Bureau has not released data on the establishments broken down by number of employees, we note that the Census Bureau lists total employment for all firms in that sector at 281,262. Since all firms with fewer than 1,500 employees are considered small, given the total employment in the sector, we estimate that the vast majority of wireless firms are small. Wireless Communications Services. This service can be used for fixed, mobile, radiolocation, and digital audio broadcasting satellite uses. The Commission defined ``small business'' for the wireless communications services (WCS) auction as an entity with average gross revenues of $40 million for each of the three preceding years, and a ``very small business'' as an entity with average gross revenues of $15 million for each of the three preceding years. The SBA has approved these definitions. The Commission auctioned geographic area licenses in the WCS service. In the auction, which commenced on April 15, 1997 and closed on April 25, 1997, seven bidders won 31 licenses that qualified as very small business entities, and one bidder won one license that qualified as a small business entity. 1670-1675 MHz Services. This service can be used for fixed and mobile uses, except aeronautical mobile. An auction for one license in the 1670-1675 MHz band commenced on April 30, 2003 and closed the same day. One license was awarded. The winning bidder was not a small entity. Wireless Telephony. Wireless telephony includes cellular, personal communications services, and specialized mobile radio telephony carriers. As noted, the SBA has developed a small business size standard for Wireless Telecommunications Carriers (except Satellite). Under the SBA small business size standard, a business is small if it has 1,500 or fewer employees. According to Trends in Telephone Service data, 413 carriers reported that they were engaged in wireless telephony. Of these, an estimated 261 have 1,500 or fewer employees and 152 have more than 1,500 employees. Therefore, more than half of these entities can be considered small. Broadband Personal Communications Service. The broadband personal communications services (PCS) spectrum is divided into six frequency blocks designated A through F, and the Commission has held auctions for each block. The Commission initially defined a ``small business'' for C- and F-Block licenses as an entity that has average gross revenues of $40 million or less in the three previous calendar years. For F-Block licenses, an additional small business size standard for ``very small business'' was added and is defined as an entity that, together with its affiliates, has average gross revenues of not more than $15 million for the preceding three calendar years. These small business size standards, in the context of broadband PCS auctions, have been approved by the SBA. No small businesses within the SBA-approved small business size standards bid successfully for licenses in Blocks A and B. There were 90 winning bidders that claimed small business status in the first two C-Block auctions. A total of 93 bidders that claimed small business status won approximately 40 percent of the 1,479 licenses in the first auction for the D, E, and F Blocks. On April 15, 1999, the Commission completed the reauction of 347 C-, D-, E-, and F-Block licenses in Auction No. 22. Of the 57 winning bidders in that auction, 48 claimed small business status and won 277 licenses. On January 26, 2001, the Commission completed the auction of 422 C and F Block Broadband PCS licenses in Auction No. 35. Of the 35 winning bidders in that auction, 29 claimed small business status. Subsequent events concerning Auction 35, including judicial and agency determinations, resulted in a total of 163 C and F Block licenses being available for grant. On February 15, 2005, the Commission completed an auction of 242 C-, D-, E-, and F-Block licenses in Auction No. 58. Of the 24 winning bidders in that auction, 16 claimed small business status and won 156 licenses. On May 21, 2007, the Commission completed an auction of 33 licenses in the A, C, and F Blocks in Auction No. 71. Of the 12 winning bidders in that auction, five claimed small business status and won 18 licenses. On August 20, 2008, the Commission completed the auction of 20 C-, D-, E-, and F-Block Broadband PCS licenses in Auction No. 78. Of the eight winning bidders for Broadband PCS licenses in that auction, six claimed small business status and won 14 licenses. Specialized Mobile Radio Licenses. The Commission awards ``small entity'' bidding credits in auctions for Specialized Mobile Radio (SMR) geographic area licenses in the 800 MHz and 900 MHz bands to firms that had revenues of no more than $15 million in each of the three previous calendar years. The Commission awards ``very small entity'' bidding credits to firms that had revenues of no more than $3 million in each of the three previous calendar years. The SBA has approved these small business size standards for the 900 MHz Service. The Commission has held auctions for geographic area licenses in the 800 MHz and 900 MHz bands. The 900 MHz SMR auction began on December 5, 1995, and closed on April 15, 1996. Sixty bidders claiming that they qualified as small businesses under the $15 million size standard won 263 geographic area licenses in the 900 MHz SMR band. The 800 MHz SMR auction for the upper 200 channels began on October 28, 1997, and was completed on December 8, 1997. Ten bidders claiming that they qualified as small businesses under the $15 million size standard won 38 geographic area licenses for the upper 200 channels in the 800 MHz SMR band. A second auction for the 800 MHz band was held [[Page 59228]] on January 10, 2002 and closed on January 17, 2002 and included 23 BEA licenses. One bidder claiming small business status won five licenses. The auction of the 1,053 800 MHz SMR geographic area licenses for the General Category channels began on August 16, 2000, and was completed on September 1, 2000. Eleven bidders won 108 geographic area licenses for the General Category channels in the 800 MHz SMR band and qualified as small businesses under the $15 million size standard. In an auction completed on December 5, 2000, a total of 2,800 Economic Area licenses in the lower 80 channels of the 800 MHz SMR service were awarded. Of the 22 winning bidders, 19 claimed small business status and won 129 licenses. Thus, combining all four auctions, 41 winning bidders for geographic licenses in the 800 MHz SMR band claimed status as small businesses. In addition, there are numerous incumbent site-by-site SMR licenses and licensees with extended implementation authorizations in the 800 and 900 MHz bands. We do not know how many firms provide 800 MHz or 900 MHz geographic area SMR service pursuant to extended implementation authorizations, nor how many of these providers have annual revenues of no more than $15 million. In addition, we do not know how many of these firms have 1,500 or fewer employees, which is the SBA-determined size standard. We assume, for purposes of this analysis, that all of the remaining extended implementation authorizations are held by small entities, as defined by the SBA. Lower 700 MHz Band Licenses. The Commission previously adopted criteria for defining three groups of small businesses for purposes of determining their eligibility for special provisions such as bidding credits. The Commission defined a ``small business'' as an entity that, together with its affiliates and controlling principals, has average gross revenues not exceeding $40 million for the preceding three years. A ``very small business'' is defined as an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $15 million for the preceding three years. Additionally, the lower 700 MHz Service had a third category of small business status for Metropolitan/Rural Service Area (MSA/RSA) licenses--``entrepreneur''--which is defined as an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $3 million for the preceding three years. The SBA approved these small size standards. An auction of 740 licenses (one license in each of the 734 MSAs/RSAs and one license in each of the six Economic Area Groupings (EAGs)) commenced on August 27, 2002, and closed on September 18, 2002. Of the 740 licenses available for auction, 484 licenses were won by 102 winning bidders. Seventy-two of the winning bidders claimed small business, very small business or entrepreneur status and won a total of 329 licenses. A second auction commenced on May 28, 2003, closed on June 13, 2003, and included 256 licenses: 5 EAG licenses and 476 Cellular Market Area licenses. Seventeen winning bidders claimed small or very small business status and won 60 licenses, and nine winning bidders claimed entrepreneur status and won 154 licenses. On July 26, 2005, the Commission completed an auction of 5 licenses in the Lower 700 MHz band (Auction No. 60). There were three winning bidders for five licenses. All three winning bidders claimed small business status. In 2007, the Commission reexamined its rules governing the 700 MHz band in the 700 MHz Second Report and Order. An auction of 700 MHz licenses commenced January 24, 2008 and closed on March 18, 2008, which included, 176 Economic Area licenses in the A Block, 734 Cellular Market Area licenses in the B Block, and 176 EA licenses in the E Block. Twenty winning bidders, claiming small business status (those with attributable average annual gross revenues that exceed $15 million and do not exceed $40 million for the preceding three years) won 49 licenses. Thirty three winning bidders claiming very small business status (those with attributable average annual gross revenues that do not exceed $15 million for the preceding three years) won 325 licenses. Upper 700 MHz Band Licenses. In the 700 MHz Second Report and Order, the Commission revised its rules regarding Upper 700 MHz licenses. On January 24, 2008, the Commission commenced Auction 73 in which several licenses in the Upper 700 MHz band were available for licensing: 12 Regional Economic Area Grouping licenses in the C Block, and one nationwide license in the D Block. The auction concluded on March 18, 2008, with 3 winning bidders claiming very small business status (those with attributable average annual gross revenues that do not exceed $15 million for the preceding three years) and winning five licenses. 700 MHz Guard Band Licensees. In 2000, in the 700 MHz Guard Band Order, the Commission adopted size standards for ``small businesses'' and ``very small businesses'' for purposes of determining their eligibility for special provisions such as bidding credits and installment payments. A small business in this service is an entity that, together with its affiliates and controlling principals, has average gross revenues not exceeding $40 million for the preceding three years. Additionally, a very small business is an entity that, together with its affiliates and controlling principals, has average gross revenues that are not more than $15 million for the preceding three years. SBA approval of these definitions is not required. An auction of 52 Major Economic Area licenses commenced on September 6, 2000, and closed on September 21, 2000. Of the 104 licenses auctioned, 96 licenses were sold to nine bidders. Five of these bidders were small businesses that won a total of 26 licenses. A second auction of 700 MHz Guard Band licenses commenced on February 13, 2001, and closed on February 21, 2001. All eight of the licenses auctioned were sold to three bidders. One of these bidders was a small business that won a total of two licenses. Air-Ground Radiotelephone Service. The Commission has previously used the SBA's small business size standard applicable to Wireless Telecommunications Carriers (except Satellite), i.e., an entity employing no more than 1,500 persons. There are fewer than 10 licensees in the Air-Ground Radiotelephone Service, and under that definition, we estimate that almost all of them qualify as small entities under the SBA definition. For purposes of assigning Air-Ground Radiotelephone Service licenses through competitive bidding, the Commission has defined ``small business'' as an entity that, together with controlling interests and affiliates, has average annual gross revenues for the preceding three years not exceeding $40 million. A ``very small business'' is defined as an entity that, together with controlling interests and affiliates, has average annual gross revenues for the preceding three years not exceeding $15 million. These definitions were approved by the SBA. In May 2006, the Commission completed an auction of nationwide commercial Air-Ground Radiotelephone Service licenses in the 800 MHz band (Auction No. 65). On June 2, 2006, the auction closed with two winning bidders winning two Air-Ground Radiotelephone Services licenses. Neither of the winning bidders claimed small business status. AWS Services (1710-1755 MHz and 2110-2155 MHz bands (AWS-1); 1915- [[Page 59229]] 1920 MHz, 1995-2000 MHz, 2020-2025 MHz and 2175-2180 MHz bands (AWS-2); 2155-2175 MHz band (AWS-3)). For the AWS-1 bands, the Commission has defined a ``small business'' as an entity with average annual gross revenues for the preceding three years not exceeding $40 million, and a ``very small business'' as an entity with average annual gross revenues for the preceding three years not exceeding $15 million. For AWS-2 and AWS-3, although we do not know for certain which entities are likely to apply for these frequencies, we note that the AWS-1 bands are comparable to those used for cellular service and personal communications service. The Commission has not yet adopted size standards for the AWS-2 or AWS-3 bands but proposes to treat both AWS-2 and AWS-3 similarly to broadband PCS service and AWS-1 service due to the comparable capital requirements and other factors, such as issues involved in relocating incumbents and developing markets, technologies, and services. 3650-3700 MHz band. In March 2005, the Commission released a Report and Order and Memorandum Opinion and Order that provides for nationwide, non-exclusive licensing of terrestrial operations, utilizing contention-based technologies, in the 3650 MHz band (i.e., 3650-3700 MHz). As of April 2010, more than 1270 licenses have been granted and more than 7433 sites have been registered. The Commission has not developed a definition of small entities applicable to 3650- 3700 MHz band nationwide, non-exclusive licensees. However, we estimate that the majority of these licensees are Internet Access Service Providers (ISPs) and that most of those licensees are small businesses. Fixed Microwave Services. Microwave services include common carrier, private-operational fixed, and broadcast auxiliary radio services. They also include the Local Multipoint Distribution Service (LMDS), the Digital Electronic Message Service (DEMS), and the 24 GHz Service, where licensees can choose between common carrier and non- common carrier status. At present, there are approximately 31,428 common carrier fixed licensees and 79,732 private operational-fixed licensees and broadcast auxiliary radio licensees in the microwave services. There are approximately 120 LMDS licensees, three DEMS licensees, and three 24 GHz licensees. The Commission has not yet defined a small business with respect to microwave services. For purposes of the IRFA, we will use the SBA's definition applicable to Wireless Telecommunications Carriers (except satellite)--i.e., an entity with no more than 1,500 persons. Under the present and prior categories, the SBA has deemed a wireless business to be small if it has 1,500 or fewer employees. For the category of Wireless Telecommunications Carriers (except Satellite), preliminary data for 2007 show that there were 11,927 firms operating that year. While the Census Bureau has not released data on the establishments broken down by number of employees, we note that the Census Bureau lists total employment for all firms in that sector at 281,262. Since all firms with fewer than 1,500 employees are considered small, given the total employment in the sector, we estimate that the vast majority of firms using microwave services are small. We note that the number of firms does not necessarily track the number of licensees. We estimate that virtually all of the Fixed Microwave licensees (excluding broadcast auxiliary licensees) would qualify as small entities under the SBA definition. Broadband Radio Service and Educational Broadband Service. Broadband Radio Service systems, previously referred to as Multipoint Distribution Service (MDS) and Multichannel Multipoint Distribution Service (MMDS) systems, and ``wireless cable,'' transmit video programming to subscribers and provide two-way high speed data operations using the microwave frequencies of the Broadband Radio Service (BRS) and Educational Broadband Service (EBS) (previously referred to as the Instructional Television Fixed Service (ITFS)). In connection with the 1996 BRS auction, the Commission established a small business size standard as an entity that had annual average gross revenues of no more than $40 million in the previous three calendar years. The BRS auctions resulted in 67 successful bidders obtaining licensing opportunities for 493 Basic Trading Areas (BTAs). Of the 67 auction winners, 61 met the definition of a small business. BRS also includes licensees of stations authorized prior to the auction. At this time, we estimate that of the 61 small business BRS auction winners, 48 remain small business licensees. In addition to the 48 small businesses that hold BTA authorizations, there are approximately 392 incumbent BRS licensees that are considered small entities. After adding the number of small business auction licensees to the number of incumbent licensees not already counted, we find that there are currently approximately 440 BRS licensees that are defined as small businesses under either the SBA or the Commission's rules. In 2009, the Commission conducted Auction 86, the sale of 78 licenses in the BRS areas. The Commission offered three levels of bidding credits: (i) A bidder with attributed average annual gross revenues that exceed $15 million and do not exceed $40 million for the preceding three years (small business) will receive a 15 percent discount on its winning bid; (ii) a bidder with attributed average annual gross revenues that exceed $3 million and do not exceed $15 million for the preceding three years (very small business) will receive a 25 percent discount on its winning bid; and (iii) a bidder with attributed average annual gross revenues that do not exceed $3 million for the preceding three years (entrepreneur) will receive a 35 percent discount on its winning bid. Auction 86 concluded in 2009 with the sale of 61 licenses. Of the ten winning bidders, two bidders that claimed small business status won 4 licenses; one bidder that claimed very small business status won three licenses; and two bidders that claimed entrepreneur status won six licenses. In addition, the SBA's Cable Television Distribution Services small business size standard is applicable to EBS. There are presently 2,032 EBS licensees. All but 100 of these licenses are held by educational institutions. Educational institutions are included in this analysis as small entities. Thus, we estimate that at least 1,932 licensees are small businesses. Since 2007, Cable Television Distribution Services have been defined within the broad economic census category of Wired Telecommunications Carriers; that category is defined as follows: ``This industry comprises establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired telecommunications networks. Transmission facilities may be based on a single technology or a combination of technologies.'' The SBA has developed a small business size standard for this category, which is: all such firms having 1,500 or fewer employees. To gauge small business prevalence for these cable services we must, however, use the most current census data that are based on the previous category of Cable and Other Program Distribution and its associated size standard; that size standard was: all such firms having $13.5 million or less in annual receipts. According to Census Bureau data for 2002, there were a total of 1,191 firms [[Page 59230]] in this previous category that operated for the entire year. Of this total, 1,087 firms had annual receipts of under $10 million, and 43 firms had receipts of $10 million or more but less than $25 million. Thus, the majority of these firms can be considered small. 5. Satellite Service Providers Satellite Telecommunications Providers. Two economic census categories address the satellite industry. The first category has a small business size standard of $15 million or less in average annual receipts, under SBA rules. The second has a size standard of $25 million or less in annual receipts. The most current Census Bureau data in this context, however, are from the (last) economic census of 2002, and we will use those figures to gauge the prevalence of small businesses in these categories. The category of Satellite Telecommunications ``comprises establishments primarily engaged in providing telecommunications services to other establishments in the telecommunications and broadcasting industries by forwarding and receiving communications signals via a system of satellites or reselling satellite telecommunications.'' For this category, Census Bureau data for 2002 show that there were a total of 371 firms that operated for the entire year. Of this total, 307 firms had annual receipts of under $10 million, and 26 firms had receipts of $10 million to $24,999,999. Consequently, we estimate that the majority of Satellite Telecommunications firms are small entities that might be affected by our action. The second category of All Other Telecommunications comprises, inter alia, ``establishments primarily engaged in providing specialized telecommunications services, such as satellite tracking, communications telemetry, and radar station operation. This industry also includes establishments primarily engaged in providing satellite terminal stations and associated facilities connected with one or more terrestrial systems and capable of transmitting telecommunications to, and receiving telecommunications from, satellite systems.'' For this category, Census Bureau data for 2002 show that there were a total of 332 firms that operated for the entire year. Of this total, 303 firms had annual receipts of under $10 million and 15 firms had annual receipts of $10 million to $24,999,999. Consequently, we estimate that the majority of All Other Telecommunications firms are small entities that might be affected by our action. 6. Cable Service Providers Because Section 706 requires us to monitor the deployment of broadband regardless of technology or transmission media employed, we anticipate that some broadband service providers may not provide telephone service. Accordingly, we describe below other types of firms that may provide broadband services, including cable companies, MDS providers, and utilities, among others. Cable and Other Program Distributors. Since 2007, these services have been defined within the broad economic census category of Wired Telecommunications Carriers; that category is defined as follows: ``This industry comprises establishments primarily engaged in operating and/or providing access to transmission facilities and infrastructure that they own and/or lease for the transmission of voice, data, text, sound, and video using wired telecommunications networks. Transmission facilities may be based on a single technology or a combination of technologies.'' The SBA has developed a small business size standard for this category, which is: all such firms having 1,500 or fewer employees. To gauge small business prevalence for these cable services we must, however, use current census data that are based on the previous category of Cable and Other Program Distribution and its associated size standard; that size standard was: all such firms having $13.5 million or less in annual receipts. According to Census Bureau data for 2002, there were a total of 1,191 firms in this previous category that operated for the entire year. Of this total, 1,087 firms had annual receipts of under $10 million, and 43 firms had receipts of $10 million or more but less than $25 million. Thus, the majority of these firms can be considered small. Cable Companies and Systems. The Commission has also developed its own small business size standards, for the purpose of cable rate regulation. Under the Commission's rules, a ``small cable company'' is one serving 400,000 or fewer subscribers, nationwide. Industry data indicate that, of 1,076 cable operators nationwide, all but eleven are small under this size standard. In addition, under the Commission's rules, a ``small system'' is a cable system serving 15,000 or fewer subscribers. Industry data indicate that, of 7,208 systems nationwide, 6,139 systems have under 10,000 subscribers, and an additional 379 systems have 10,000-19,999 subscribers. Thus, under this second size standard, most cable systems are small. Cable System Operators. The Communications Act of 1934, as amended, also contains a size standard for small cable system operators, which is ``a cable operator that, directly or through an affiliate, serves in the aggregate fewer than 1 percent of all subscribers in the United States and is not affiliated with any entity or entities whose gross annual revenues in the aggregate exceed $250,000,000.'' The Commission has determined that an operator serving fewer than 677,000 subscribers shall be deemed a small operator, if its annual revenues, when combined with the total annual revenues of all its affiliates, do not exceed $250 million in the aggregate. Industry data indicate that, of 1,076 cable operators nationwide, all but ten are small under this size standard. We note that the Commission neither requests nor collects information on whether cable system operators are affiliated with entities whose gross annual revenues exceed $250 million, and therefore we are unable to estimate more accurately the number of cable system operators that would qualify as small under this size standard. 7. Electric Power Generators, Transmitters, and Distributors Electric Power Generators, Transmitters, and Distributors. The Census Bureau defines an industry group comprised of ``establishments, primarily engaged in generating, transmitting, and/or distributing electric power. Establishments in this industry group may perform one or more of the following activities: (1) Operate generation facilities that produce electric energy; (2) operate transmission systems that convey the electricity from the generation facility to the distribution system; and (3) operate distribution systems that convey electric power received from the generation facility or the transmission system to the final consumer.'' The SBA has developed a small business size standard for firms in this category: ``A firm is small if, including its affiliates, it is primarily engaged in the generation, transmission, and/or distribution of electric energy for sale and its total electric output for the preceding fiscal year did not exceed 4 million megawatt hours.'' According to Census Bureau data for 2002, there were 1,644 firms in this category that operated for the entire year. Census data do not track electric output and we have not determined how many of these firms fit the SBA size standard for small, with no more than 4 million megawatt hours of electric output. Consequently, we [[Page 59231]] estimate that 1,644 or fewer firms may be considered small under the SBA small business size standard. Description of Projected Reporting, Recordkeeping, and Other Compliance Requirements for Small Entities As indicated above, the Internet's legacy of openness and transparency has been critical to its success as an engine for creativity, innovation, and economic development. To help preserve this fundamental character of the Internet, the Order requires that broadband providers must, at a minimum, prominently display or provide links to disclosures on a publicly available, easily accessible Web site that is available to current and prospective end users and edge providers as well as to the Commission, and at the point of sale. Providers should ensure that all Web site disclosures are accessible by persons with disabilities. We do not require additional forms of disclosure. Broadband providers' disclosures to the public include disclosure to the Commission; that is, the Commission will monitor public disclosures and may require additional disclosures directly to the Commission. We anticipate that broadband providers may be able to satisfy the transparency rule through a single disclosure, and therefore do not require multiple disclosures targeted at different audiences. This affects all classes of small entities mentioned in Appendix B, part C, and requires professional skills of entering information onto a Web page and an understanding of the entities' network practices, both of which are easily managed by staff of these types of small entities. Steps Taken To Minimize the Significant Economic Impact on Small Entities, and Significant Alternatives Considered The RFA requires an agency to describe any significant alternatives that it has considered in reaching its proposed approach, which may include (among others) the following four alternatives: (1) The establishment of differing compliance or reporting requirements or timetables that take into account the resources available to small entities; (2) the clarification, consolidation, or simplification of compliance or reporting requirements under the rule for small entities; (3) the use of performance, rather than design, standards; and (4) an exemption from coverage of the rule, or any part thereof, for small entities. The rules adopted in this Order are generally consistent with current industry practices, so the costs of compliance should be small. Although some commenters assert that a disclosure rule will impose significant burdens on broadband providers, no commenter cites any particular source of increased costs, or attempts to estimate costs of compliance. For a number of reasons, we believe that the costs of the disclosure rule we adopt in this Order are outweighed by the benefits of empowering end users to make informed choices and of facilitating the enforcement of the other open Internet rules. First, we require only that providers post disclosures on their Web sites and at the point of sale, not that they bear the cost of printing and distributing bill inserts or other paper documents to all existing customers. Second, although we may subsequently determine that it is appropriate to require that specific information be disclosed in particular ways, the transparency rule we adopt in this Order gives broadband providers flexibility to determine what information to disclose and how to disclose it. We also expressly exclude from the rule competitively sensitive information, information that would compromise network security, and information that would undermine the efficacy of reasonable network management practices. Third, by setting the effective date of these rules as November 20, 2011, we give broadband providers adequate time to develop cost effective methods of compliance. Thus, the rule gives broadband providers--including small entities--sufficient time and flexibility to implement the rules in a cost-effective manner. Finally, these rules provide certainty and clarity that are beneficial both to broadband providers and to their customers. Report to Congress The Commission has sent a copy of the Order, including this FRFA, in a report to Congress and the Government Accountability Office pursuant to the Congressional Review Act. In addition, the Commission will send a copy of the Order, including this FRFA, to the Chief Counsel for Advocacy of the SBA. B. Paperwork Reduction Act of 1995 Analysis This document contains new information collection requirements subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104- 13. C. Congressional Review Act The Commission has sent a copy of this Report and Order to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). D. Data Quality Act The Commission certifies that it has complied with the Office of Management and Budget Final Information Quality Bulletin for Peer Review, 70 FR 2664, January 14 (2005), and the Data Quality Act, Public Law 106-554 (2001), codified at 44 U.S.C. 3516 note, with regard to its reliance on influential scientific information in the Report and Order in GN Docket No. 09-191 and WC Docket No. 07-52. E. Accessible Formats To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an e-mail to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202-418-0530 (voice), 202-418-0432 (tty). Contact the FCC to request reasonable accommodations for filing comments (accessible format documents, sign language interpreters, CARTS, etc.) by e-mail: FCC504@fcc.gov; phone: (202) 418-0530 (voice), (202) 418- 0432 (TTY). VIII. Ordering Clauses Accordingly, it is ordered that, pursuant to Sections 1, 2, 3, 4, 201, 218, 230, 251, 254, 256, 257, 301, 303, 304, 307, 309, 316, 332, 403, 503, 602, 616, and 628, of the Communications Act of 1934, as amended, and Section 706 of the Telecommunications Act of 1996, as amended, 47 U.S.C. secs. 151, 152, 153, 154, 201, 218, 230, 251, 254, 256, 257, 301, 303, 304, 307, 309, 316, 332, 403, 503, 522, 536, 548, 1302, this Report and Order is adopted. It is further ordered that Part 0 of the Commission's rules is amended as set forth in Appendix B. It is further ordered that Part 8 of the Commission's Rules, 47 CFR Part 8, is added as set forth in Appendix A and B. It is further ordered that this Report and Order shall become effective November 20, 2011. It is further ordered that the Commission's Consumer and Governmental Affairs Bureau, Reference Information Center, shall send a copy of this Report and Order, including the Final Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of the Small Business Administration. List of Subjects 47 CFR Part 0 Cable television, Communications, Common carriers, Communications common carriers, Radio, Satellites, Telecommunications, Telephone. [[Page 59232]] 47 CFR Part 8 Cable television, Communications, Common carriers, Communications common carriers, Radio, Satellites, Telecommunications, Telephone. Federal Communications Commission. Marlene H. Dortch, Secretary. For the reasons discussed in the preamble, the Federal Communications Commission amends 47 CFR part 0 to read as follows: PART 0--COMMISSION ORGANIZATION 0 1. The authority citation for part 0 continues to read as follows: Authority: Sec. 5, 48 Stat. 1068, as amended; 47 U.S.C. 155, 225, unless otherwise noted. 0 2. Section 0.111 is amended by adding paragraph (a)(24) to read as follows: Sec. 0.111 Functions of the Bureau. (a) * * * (24) Resolve complaints alleging violations of the open Internet rules. * * * * * 0 3. Add part 8 to read as follows: PART 8--PRESERVING THE OPEN INTERNET Sec. 8.1 Purpose. 8.3 Transparency. 8.5 No Blocking. 8.7 No Unreasonable Discrimination. 8.9 Other Laws and Considerations. 8.11 Definitions. 8.12 Formal Complaints. 8.13 General pleading requirements. 8.14 General formal complaint procedures. 8.15 Status conference. 8.16 Confidentiality of proprietary information. 8.17 Review. Authority: 47 U.S.C. secs. 151, 152, 153, 154, 201, 218, 230, 251, 254, 256, 257, 301, 303, 304, 307, 309, 316, 332, 403, 503, 522, 536, 548, 1302. Sec. 8.1 Purpose. The purpose of this part is to preserve the Internet as an open platform enabling consumer choice, freedom of expression, end-user control, competition, and the freedom to innovate without permission. Sec. 8.3 Transparency. A person engaged in the provision of broadband Internet access service shall publicly disclose accurate information regarding the network management practices, performance, and commercial terms of its broadband Internet access services sufficient for consumers to make informed choices regarding use of such services and for content, application, service, and device providers to develop, market, and maintain Internet offerings. Sec. 8.5 No Blocking. (a) A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not block lawful content, applications, services, or non-harmful devices, subject to reasonable network management. (b) A person engaged in the provision of mobile broadband Internet access service, insofar as such person is so engaged, shall not block consumers from accessing lawful Web sites, subject to reasonable network management; nor shall such person block applications that compete with the provider's voice or video telephony services, subject to reasonable network management. Sec. 8.7 No Unreasonable Discrimination. A person engaged in the provision of fixed broadband Internet access service, insofar as such person is so engaged, shall not unreasonably discriminate in transmitting lawful network traffic over a consumer's broadband Internet access service. Reasonable network management shall not constitute unreasonable discrimination. Sec. 8.9 Other Laws and Considerations. (a) Nothing in this part supersedes any obligation or authorization a provider of broadband Internet access service may have to address the needs of emergency communications or law enforcement, public safety, or national security authorities, consistent with or as permitted by applicable law, or limits the provider's ability to do so. (b) Nothing in this part prohibits reasonable efforts by a provider of broadband Internet access service to address copyright infringement or other unlawful activity. Sec. 8.11 Definitions. (a) Broadband Internet access service. A mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service. This term also encompasses any service that the Commission finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in this part. (b) Fixed broadband Internet access service. A broadband Internet access service that serves end users primarily at fixed endpoints using stationary equipment. Fixed broadband Internet access service includes fixed wireless services (including fixed unlicensed wireless services), and fixed satellite services. (c) Mobile broadband Internet access service. A broadband Internet access service that serves end users primarily using mobile stations. (d) Reasonable network management. A network management practice is reasonable if it is appropriate and tailored to achieving a legitimate network management purpose, taking into account the particular network architecture and technology of the broadband Internet access service. Sec. 8.12 Formal Complaints. Any person may file a formal complaint alleging a violation of the rules in this part. Sec. 8.13 General pleading requirements. (a) General pleading requirements. All written submissions, both substantive and procedural, must conform to the following standards: (1) A pleading must be clear, concise, and explicit. All matters concerning a claim, defense or requested remedy should be pleaded fully and with specificity. (2) Pleadings must contain facts that, if true, are sufficient to warrant a grant of the relief requested. (3) Facts must be supported by relevant documentation or affidavit. (4) The original of all pleadings and submissions by any party shall be signed by that party, or by the party's attorney. Complaints must be signed by the complainant. The signing party shall state his or her address and telephone number and the date on which the document was signed. Copies should be conformed to the original. Each submission must contain a written verification that the signatory has read the submission and to the best of his or her knowledge, information and belief formed after reasonable inquiry, it is well grounded in fact and is warranted by existing law or a good faith argument for the extension, modification or reversal of existing law; and that it is not interposed for any improper purpose. If any pleading or other submission is signed in violation of this provision, the Commission shall upon motion or upon its own initiative impose appropriate sanctions. (5) Legal arguments must be supported by appropriate judicial, Commission, or statutory authority. [[Page 59233]] Opposing authorities must be distinguished. Copies must be provided of all non-Commission authorities relied upon which are not routinely available in national reporting systems, such as unpublished decisions or slip opinions of courts or administrative agencies. (6) Parties are responsible for the continuing accuracy and completeness of all information and supporting authority furnished in a pending complaint proceeding. Information submitted, as well as relevant legal authorities, must be current and updated as necessary and in a timely manner at any time before a decision is rendered on the merits of the complaint. (7) Parties seeking expedited resolution of their complaint may request acceptance on the Enforcement Bureau's Accelerated Docket pursuant to the procedures at Sec. 1.730 of this chapter. (b) Copies to be Filed. The complainant shall file an original copy of the complaint, accompanied by the correct fee, in accordance with part 1, subpart G (see Sec. 1.1106 of this chapter) and, on the same day: (1) File three copies of the complaint with the Office of the Commission Secretary; (2) Serve two copies on the Market Disputes Resolution Division, Enforcement Bureau; (3) Serve the complaint by hand delivery on either the named defendant or one of the named defendant's registered agents for service of process, if available, on the same date that the complaint is filed with the Commission. (c) Prefiling notice required. Any person intending to file a complaint under this section must first notify the potential defendant in writing that it intends to file a complaint with the Commission based on actions alleged to violate one or more of the provisions contained in this part. The notice must be sufficiently detailed so that its recipient(s) can determine the specific nature of the potential complaint. The potential complainant must allow a minimum of ten (10) days for the potential defendant(s) to respond before filing a complaint with the Commission. (d) Frivolous pleadings. It shall be unlawful for any party to file a frivolous pleading with the Commission. Any violation of this paragraph shall constitute an abuse of process subject to appropriate sanctions. Sec. 8.14 General formal complaint procedures. (a) Complaints. In addition to the general pleading requirements, complaints must adhere to the following requirements: (1) Certificate of service. Complaints shall be accompanied by a certificate of service on any defendant. (2) Statement of relief requested--(i) The complaint shall state the relief requested. It shall state fully and precisely all pertinent facts and considerations relied on to demonstrate the need for the relief requested and to support a determination that a grant of such relief would serve the public interest. (ii) The complaint shall set forth all steps taken by the parties to resolve the problem. (iii) A complaint may, on request of the filing party, be dismissed without prejudice as a matter of right prior to the adoption date of any final action taken by the Commission with respect to the petition or complaint. A request for the return of an initiating document will be regarded as a request for dismissal. (3) Failure to prosecute. Failure to prosecute a complaint, or failure to respond to official correspondence or request for additional information, will be cause for dismissal. Such dismissal will be without prejudice if it occurs prior to the adoption date of any final action taken by the Commission with respect to the initiating pleading. (b) Answers to complaints. Unless otherwise directed by the Commission, any party who is served with a complaint shall file an answer in accordance with the following requirements: (1) The answer shall be filed within 20 days of service of the complaint. (2) The answer shall advise the parties and the Commission fully and completely of the nature of any and all defenses, and shall respond specifically to all material allegations of the complaint. Collateral or immaterial issues shall be avoided in answers and every effort should be made to narrow the issues. Any party against whom a complaint is filed failing to file and serve an answer within the time and in the manner prescribed by these rules may be deemed in default and an order may be entered against defendant in accordance with the allegations contained in the complaint. (3) Facts must be supported by relevant documentation or affidavit. (4) The answer shall admit or deny the averments on which the adverse party relies. If the defendant is without knowledge or information sufficient to form a belief as to the truth of an averment, the defendant shall so state and this has the effect of a denial. When a defendant intends in good faith to deny only part of an averment, the answer shall specify so much of it as is true and shall deny only the remainder, and state in detail the basis of that denial. (5) Averments in a complaint are deemed to be admitted when not denied in the answer. (c) Reply. In addition to the general pleading requirements, replies must adhere to the following requirements: (1) The complainant may file a reply to a responsive pleading that shall be served on the defendant and shall also contain a detailed full showing, supported by affidavit, of any additional facts or considerations relied on. Unless expressly permitted by the Commission, replies shall not contain new matters. (2) Failure to reply will not be deemed an admission of any allegations contained in the responsive pleading, except with respect to any affirmative defense set forth therein. (3) Unless otherwise directed by the Commission, replies must be filed within ten (10) days after submission of the responsive pleading. (d) Motions. Except as provided in this section, or upon a showing of extraordinary circumstances, additional motions or pleadings by any party will not be accepted. (e) Additional procedures and written submissions. (1) The Commission may specify other procedures, such as oral argument or evidentiary hearing directed to particular aspects, as it deems appropriate. In the event that an evidentiary hearing is required, the Commission will determine, on the basis of the pleadings and such other procedures as it may specify, whether temporary relief should be afforded any party pending the hearing and the nature of any such temporary relief. (2) The Commission may require the parties to submit any additional information it deems appropriate for a full, fair, and expeditious resolution of the proceeding, including copies of all contracts and documents reflecting arrangements and understandings alleged to violate the requirements set forth in the Communications Act and in this part, as well as affidavits and exhibits. (3) The Commission may, in its discretion, require the parties to file briefs summarizing the facts and issues presented in the pleadings and other record evidence. (i) These briefs shall contain the findings of fact and conclusions of law which that party is urging the Commission to adopt, with specific citations to the record, and supported by relevant authority and analysis. (ii) The schedule for filing any briefs shall be at the discretion of the Commission. Unless ordered otherwise [[Page 59234]] by the Commission, such briefs shall not exceed fifty (50) pages. (iii) Reply briefs may be submitted at the discretion of the Commission. Unless ordered otherwise by the Commission, reply briefs shall not exceed thirty (30) pages. (f) Discovery. (1) The Commission may in its discretion order discovery limited to the issues specified by the Commission. Such discovery may include answers to written interrogatories, depositions, document production, or requests for admissions. (2) The Commission may in its discretion direct the parties to submit discovery proposals, together with a memorandum in support of the discovery requested. Such discovery requests may include answers to written interrogatories, admissions, document production, or depositions. The Commission may hold a status conference with the parties, pursuant to Sec. 8.15, to determine the scope of discovery, or direct the parties regarding the scope of discovery. If the Commission determines that extensive discovery is required or that depositions are warranted, the Commission may advise the parties that the proceeding will be referred to an administrative law judge in accordance with paragraph (g) of this section. (g) Referral to administrative law judge. (1) After reviewing the pleadings, and at any stage of the proceeding thereafter, the Commission may, in its discretion, designate any proceeding or discrete issues arising out of any proceeding for an adjudicatory hearing before an administrative law judge. (2) Before designation for hearing, the Commission shall notify, either orally or in writing, the parties to the proceeding of its intent to so designate, and the parties shall be given a period of ten (10) days to elect to resolve the dispute through alternative dispute resolution procedures, or to proceed with an adjudicatory hearing. Such election shall be submitted in writing to the Commission. (3) Unless otherwise directed by the Commission, or upon motion by the Enforcement Bureau Chief, the Enforcement Bureau Chief shall not be deemed to be a party to a proceeding designated for a hearing before an administrative law judge pursuant to this paragraph (g). (h) Commission ruling. The Commission (or the Enforcement Bureau on delegated authority), after consideration of the pleadings, shall issue an order ruling on the complaint. Sec. 8.15 Status conference. (a) In any proceeding subject to the part 8 rules, the Commission may in its discretion direct the attorneys and/or the parties to appear for a conference to consider: (1) Simplification or narrowing of the issues; (2) The necessity for or desirability of amendments to the pleadings, additional pleadings, or other evidentiary submissions; (3) Obtaining admissions of fact or stipulations between the parties as to any or all of the matters in controversy; (4) Settlement of the matters in controversy by agreement of the parties; (5) The necessity for and extent of discovery, including objections to interrogatories or requests for written documents; (6) The need and schedule for filing briefs, and the date for any further conferences; and (7) Such other matters that may aid in the disposition of the proceeding. (b) Any party may request that a conference be held at any time after an initiating document has been filed. (c) Conferences will be scheduled by the Commission at such time and place as it may designate, to be conducted in person or by telephone conference call. (d) The failure of any attorney or party, following advance notice with an opportunity to be present, to appear at a scheduled conference will be deemed a waiver and will not preclude the Commission from conferring with those parties or counsel present. (e) During a status conference, the Commission may issue oral rulings pertaining to a variety of matters relevant to the conduct of the proceeding including, inter alia, procedural matters, discovery, and the submission of briefs or other evidentiary materials. These rulings will be promptly memorialized in writing and served on the parties. When such rulings require a party to take affirmative action, such action will be required within ten (10) days from the date of the written memorialization unless otherwise directed by the Commission. Sec. 8.16 Confidentiality of proprietary information. (a) Any materials filed in the course of a proceeding under this part may be designated as proprietary by that party if the party believes in good faith that the materials fall within an exemption to disclosure contained in the Freedom of Information Act (FOIA), 5 U.S.C. 552(b). Any party asserting confidentiality for such materials shall so indicate by clearly marking each page, or portion thereof, for which a proprietary designation is claimed. If a proprietary designation is challenged, the party claiming confidentiality will have the burden of demonstrating, by a preponderance of the evidence, that the material designated as proprietary falls under the standards for nondisclosure enunciated in FOIA. (b) Submissions containing information claimed to be proprietary under this section shall be submitted to the Commission in confidence pursuant to the requirements of Sec. 0.459 of this chapter and clearly marked ``Not for Public Inspection.'' An edited version removing all proprietary data shall be filed with the Commission for inclusion in the public file within five (5) days from the date the unedited reply is submitted, and shall be served on the opposing parties. (c) Except as provided in paragraph (d) of this section, materials marked as proprietary may be disclosed solely to the following persons, only for use in the proceeding, and only to the extent necessary to assist in the prosecution or defense of the case: (1) Counsel of record representing the parties in the proceeding and any support personnel employed by such attorneys; (2) Officers or employees of the parties in the proceeding who are named by another party as being directly involved in the proceeding; (3) Consultants or expert witnesses retained by the parties; (4) The Commission and its staff; and (5) Court reporters and stenographers in accordance with the terms and conditions of this section. (d) The Commission will entertain, subject to a proper showing, a party's request to further restrict access to proprietary information as specified by the party. The other parties will have an opportunity to respond to such requests. (e) The persons designated in paragraphs (c) and (d) of this section shall not disclose information designated as proprietary to any person who is not authorized under this section to receive such information, and shall not use the information in any activity or function other than the prosecution or defense of the case before the Commission. Each individual who is provided access to the information by the opposing party shall sign a notarized statement affirmatively stating, or shall certify under penalty of perjury, that the individual has personally reviewed the Commission's rules and understands the limitations they impose on the signing party. (f) No copies of materials marked proprietary may be made except copies [[Page 59235]] to be used by persons designated in paragraphs (c) and (d) of this section. Each party shall maintain a log recording the number of copies made of all proprietary material and the persons to whom the copies have been provided. (g) Upon termination of the complaint proceeding, including all appeals and petitions, all originals and reproductions of any proprietary materials, along with the log recording persons who received copies of such materials, shall be provided to the producing party. In addition, upon final termination of the proceeding, any notes or other work product derived in whole or in part from the proprietary materials of an opposing or third party shall be destroyed. Sec. 8.17 Review. (a) Interlocutory review. (1) Except as provided below, no party may seek review of interlocutory rulings until a decision on the merits has been issued by the Commission's staff, including an administrative law judge. (2) Rulings listed in this paragraph are reviewable as a matter of right. An application for review of such ruling may not be deferred and raised as an exception to a decision on the merits. (i) If the staff's ruling denies or terminates the right of any person to participate as a party to the proceeding, such person, as a matter of right, may file an application for review of that ruling. (ii) If the staff's ruling requires production of documents or other written evidence, over objection based on a claim of privilege, the ruling on the claim of privilege is reviewable as a matter of right. (iii) If the staff's ruling denies a motion to disqualify a staff person from participating in the proceeding, the ruling is reviewable as a matter of right. (b) Petitions for reconsideration. Petitions for reconsideration of interlocutory actions by the Commission's staff or by an administrative law judge will not be entertained. Petitions for reconsideration of a decision on the merits made by the Commission's staff should be filed in accordance with Sec. Sec. 1.104 through 1.106 of this chapter. (c) Application for review. (1) Any party to a part 8 proceeding aggrieved by any decision on the merits issued by the staff pursuant to delegated authority may file an application for review by the Commission in accordance with Sec. 1.115 of this chapter. (2) Any party to a part 8 proceeding aggrieved by any decision on the merits by an administrative law judge may file an appeal of the decision directly with the Commission, in accordance with Sec. Sec. 1.276(a) and 1.277(a) through (c) of this chapter. [FR Doc. 2011-24259 Filed 9-22-11; 8:45 am] BILLING CODE 6712-01-P
TOP-SECRET – Operación Clandestina de la Inteligencia Militar Argentina en México
Una escuadra del Área de Inteligencia 121 dirigido por el General Galtieri intentó matar a la dirigencia Montonera radicada en la capital azteca
National Security Archive Electronic Briefing Book No. 241
|
Gastbeitrag: WIE AUCH SIE “GoMoPa”-Rufmordopfer werden können
Liebe Leserin, lieber Leser!
Stellen Sie sich bitte kurz vor, dass Sie mit einer tollen Geschäftsidee oder einer Geschäftserweiterung zu mehr Geld kommen möchten. Beispielsweise auch Ihr Unternehmen vergrössern oder gar Ihre Waren exportieren wollen.
Sie werben damit natürlich über die Medien….
Da meldet sich bei Ihnen möglicherweise ein Beauftragter des Finanz-Nachrichtendienstes GoMoPamit der Mitteilung, dass im GoMoPa-Forum sehr negative Forenbeiträge über Ihre Person oder Ihr Vorhaben stünden. Äusserst Schlimmes wir über Sie berichtet. Zum Beispiel, dass Sie bisher schonIhr Geld mit betrügerischen Machenschaften verdient hätten oder Ihr Sohn als erfolgreicher Sportler nach neuesten Ermittlungen in einem Kokain-Dealer-Ring verwickelt sei.
Ein anonymer User ( Schreiberling) habe dies geschrieben, wird vom GoMoPa-Beauftragten berichtet. Man könne jetzt noch nicht feststellen, ob dies so wahr sei. Man könne aber auch nicht den Beitrag einfach rausnehmen, denn es könne ja auch was Wahres daran sein!
Falls Sie selbst an der Wahrheitsfindung interessiert seien, könnten Sie auch beim ´seriösen Nachrichtendienst` GoMoPa als Gesellschafter oder als Premium-Mitglied einsteigen, dann könne man ja…..usf. …ganz einfach den Beitrag herausnehmen!
So ähnlich könnte es geschehen und glauben Sie mir: ´Dies ist kein böser Traum,-keine Fata Morgana`, sondern schon Zigtausendmal in der fast 10-Jährigen GoMoPa- Geschichte so abgelaufen.
Wir, von der CSA-Agency, wurden selbst aus Wettbewerbsgründen seit 2002 von GoMoPa auf primitivste Weise im Forum diffamiert oder die von uns als seriöse Dienstleister empfohlenen Unternehmungen wurden per Rufmord mit schmutzigsten, unwahren Verleumdungs-Attacken vonanonymen Bloggern ( bezahlte Helfershelfer vom GoMoPa) nahezu ruiniert. Nicht nur finanziell , sondern auch gesundheitlich nieder gemacht! Nicht umsonst heisst es RUFMORD.
Der Begriff ´Stalking` ist da noch eine vornehme Bezeichnung.
Auf gut deutsch passt Rufmord besser.
Geschäftlicher und gesundheitlicher RUFMORD gehört auch entsprechend bestraft.
Die Justiz tut sich sehr schwer damit. Vor allem, wenn die Rufmörder mit Ihren Machenschaften mit Gesellschaften wie z.B. ´GoMoPa` als Briefkastenfirma aus dem Ausland agieren. UND zum anderen, weil sich die Stalking-Terror-Experten von GoMoPa sich mit ihren Methoden auch der Justiz und der Medien bedienen.
TOP-SECRET – Confirmed Identity of the CIA Official behind 9/11, Rendition & Torture Cases is Revealed
BFP Breaking News: Confirmed Identity of the CIA Official behind 9/11, Rendition & Torture Cases is Revealed
Wednesday, 21. September 2011 by Sibel Edmonds
Alfreda Frances Bikowsky: The Current Director of the CIA Global Jihad Unit
BNBoiling Frogs Post has now confirmed the identity of the CIA analyst at the heart of a notorious failure in the run-up to the September 11th tragedy. Her name is Alfreda Frances Bikowsky and she is the current director of the CIA Jihad Unit. Through three credible sources and documents we have confirmed Ms. Bikowsky’s former titles and positions, including her start at the CIA as an analyst for the Soviet Desk, her position as one of the case officers at the CIA’s Bin Laden Unit-Alec Station, her central role and direct participation in the CIA’s rendition-torture and black sites operations, and her current position as director of the CIA’s Global Jihad Unit.
The producers Nowosielski and Duffy have now made both names available at their website. They also identify the second CIA culprit as Michael Anne Casey. We have not been able to obtain confirmation by other sources on this person yet, but we are still working on it.
Alfreda Frances Bikowsky is the person described in New Yorker journalist Jane Mayer’s book The Dark Side as having flown in to watch the waterboarding of terrorist Khalid Sheikh Mohammad without being assigned to do so. “Its not supposed to be entertainment,” superiors were said to have told her. She was also at the center of “the el-Masri incident,” in which an innocent German citizen was kidnapped by the CIA in 2003 and held under terrible conditions without charges for five months in a secret Afghan prison. The AP characterized it as “one of the biggest diplomatic embarrassments of the U.S. war on terrorism.”
Both the previous and current administrations appear to have deemed Alfreda Frances Bikowsky’s direct involvement in intentional obstruction of justice, intentional cover up, lying to Congress, and overseeing rendition-kidnapping-torture practices as qualifying factors to have kept promoting her. She now leads the CIA’s Global Jihad Unit and is a close advisor to the President.
TOP-SECRET – State Dept Background Briefing on Nuclear Safety
Background Briefing: Preview of High-Level Meeting on Nuclear Safety
Special Briefing
Via Teleconference
Washington, DC
September 21, 2011
MODERATOR: Thank you callers for joining us today for this background briefing on tomorrow’s High-Level Meeting on Nuclear Safety at the United Nations. We are delighted to have as our briefer today [Senior State Department Official], hereafter known as Senior State Department Official.
Go ahead and start, [Senior State Department Official].
SENIOR STATE DEPARTMENT OFFICIAL: Thank you very much, [Moderator]. Thanks for being on the call, everyone. The United States welcomed UN Secretary General Ban’s call for the High-Level Meeting, that will be conducted tomorrow, on Nuclear Security and Safety. This meeting is intended to build political support and momentum at the highest levels for international efforts to strengthen nuclear safety and security.
As you know, the international community has a lot of lessons to learn from the recent Fukushima accident in Japan, which resulted from the tragic earthquake and tsunami that devastated Japan. Indeed, we’re still learning lessons from the Chernobyl disaster, which took place over 25 years ago. The most fundamental lesson for our countries is that nuclear accidents can transcend national borders and have international consequences. A nuclear accident anywhere affects all of us, and it is also important that all states do everything they can to prevent nuclear proliferation and nuclear terrorism because of the global implications and consequences.
Another critical lesson is the necessity of being prepared for the unexpected, especially when it comes to nuclear matters. The double disaster of an earthquake and a tsunami was hard for many to imagine. All states with nuclear power must apply the highest standards for nuclear safety. And the United States wants to set the gold standard for nuclear safety and, frankly, that should be the goal of every state. It’s everyone’s responsibility to own– of each country’s own regulatory body to ensure that its nuclear facilities meet the highest standards of safety.
The United States remains committed to nuclear power as an important component of our energy (inaudible) as well as the world’s. We cannot take nuclear energy off the table, but it must be safe and secure, which is why the United States continues to reaffirm the importance of strengthening the IAEA.
This meeting will welcome the IAEA action on nuclear safety, which calls for states to request voluntary peer reviews on a regular basis to facilitate transparency and improve standards of nuclear safety. The meeting also highlights the importance of nuclear safety and compliments the Nuclear Security Summit that will be hosted next year by South Korea. The South Korea summit is a follow-on to the Nuclear Security Summit that President Obama hosted in April 2010.
I’m happy to answer any questions you might have about the High-Level Meeting tomorrow.
MODERATOR: Great. Before we jump into the questions, just to tell callers that [Senior State Department Official] is on a train, so we are hoping that the line holds. And if you hear funky noise in the background, that’s what it’s about.
Tanya, why don’t you go ahead.
OPERATOR: Thank you. We will now begin the question and answer session. If you would like to ask a question, please press * then 1. To withdraw your question, press * then 2. Once again, to ask a question, please press * then 1. One moment, please, for the first question.
Once again, to ask a question, please press * than 1. One moment please. We do have a question from Bill Freebairn. Your line is open.
QUESTION: Good afternoon. Thanks for holding the call. I was wondering whether the U.S. is going to push or press for additional measures that go, perhaps, beyond what the IAEA is saying about sort of voluntary peer reviews and suggest something a little more mandatory and/or support strengthening of a emergency response capacity, which IAEA has also talked about.
SENIOR STATE DEPARTMENT OFFICIAL: Right. The United States has always been a strong supporter of the IAEA’s peer review programs, both in conducting regular missions in the United States and also urging other countries to do the same. And we always send our senior experts, many of them in leadership capacities, to represent the United States on missions in other countries.
Establishing a mandatory requirement for member-states to submit to regular IAEA peer reviews would require the negotiation of a binding international agreement among member-states that most likely would take several years to come to fruition and no guarantee that all member-states would join in. And that’s why we settled on the voluntary peer review part of this. We are very much open to exploring longer term approaches that could including legally binding requirements, but in the meantime, we believe that these are important voluntary peer reviews that can happen and that will add to the data and the knowledge that we have and the kind of cooperation that we think we need to have.
Bill, your second question was?
QUESTION: It was on the emergency response capacity. IAEA is talking about regional centers, possibly for emergency response. So how does the U.S. support that, and do they see the IAEA as the right organization to coordinate this?
MODERATOR: [Senior State Department Official], are you still on the line? I wonder if we have lost her.
OPERATOR: I show her line as still connected.
SENIOR STATE DEPARTMENT OFFICIAL: Hello?
MODERATOR: Hi. Did you hear the question, [Senior State Department Official]? Do you need it again?
SENIOR STATE DEPARTMENT OFFICIAL: Yes. No. I just —
MODERATOR: Okay. Go ahead.
SENIOR STATE DEPARTMENT OFFICIAL: I dropped off, I’m now back.
MODERATOR: Okay. Good.
SENIOR STATE DEPARTMENT OFFICIAL: The – after Fukushima, President Obama ordered a comprehensive safety review of all 104 active power plants in the United States – almost a quarter of all nuclear reactors operating around the world. The U.S. Nuclear Regulatory Commission has already completed its near term inspections, and we believe that it’s important that because you cannot take nuclear energy off the table, we must be able to assert that these plants are safe and secure, which is why the United States continues to reaffirm the importance of strengthening the IAEA. And we also are looking forward to welcoming the IAEA action plan on nuclear safety in this meeting tomorrow, which calls for states to request voluntary peer reviews on a regular basis to facilitate transparency and improve standards of nuclear safety.
QUESTION: Yeah. But on the emergency response capability, there’s been talk about IAEA taking a strong role in putting together regional centers that could respond quickly–
SENIOR STATE DEPARTMENT OFFICIAL: Yes.
QUESTION: — to an emergency.
SENIOR STATE DEPARTMENT OFFICIAL: Yes. And we are looking for the opportunity to support these efforts. We think that the regional approach is a smart one because it provides for the fastest response and gives regions a sense of empowerment, and we look forward to making sure that we can support these issues and hearing more about them tomorrow.
QUESTION: Thank you.
SENIOR STATE DEPARTMENT OFFICIAL: You’re welcome.
OPERATOR: Once again, if you would like to ask a question, please press * then 1. At this time we have no further questions.
MODERATOR: Thank you very much, and thank you, [Senior State Department Official].
PRN: 2011/1557
TOP-SECRET – Protection of Critical Cyber Assets
[Federal Register Volume 76, Number 184 (Thursday, September 22, 2011)] [Proposed Rules] [Pages 58730-58741] From the Federal Register Online via the Government Printing Office [www.gpo.gov] [FR Doc No: 2011-24102] [[Page 58730]] ======================================================================= ----------------------------------------------------------------------- DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 40 [Docket No. RM11-11-000] Version 4 Critical Infrastructure Protection Reliability Standards AGENCY: Federal Energy Regulatory Commission. ACTION: -----------------------------------------------------------------------N otice of proposed rulemaking. SUMMARY: Under section 215 of the Federal Power Act, the Federal Energy Regulatory Commission (Commission) proposes to approve eight modified Critical Infrastructure Protection (CIP) Reliability Standards, CIP- 002-4 through CIP-009-4, developed and submitted to the Commission for approval by the North American Electric Reliability Corporation (NERC), the Electric Reliability Organization certified by the Commission. In general, the CIP Reliability Standards provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets'' to support the reliable operation of the Bulk-Power System. Proposed Reliability Standard CIP-002-4 requires the identification and documentation of Critical Cyber Assets associated with Critical Assets that support the reliable operation of the Bulk-Power System. The ``Version 4'' CIP Reliability Standards propose to modify CIP-002-4 to include ``bright line'' criteria for the identification of Critical Assets. The proposed Version 4 CIP Reliability Standards would replace the currently effective Version 3 CIP Reliability Standards. The Commission also proposes to approve the related Violation Risk Factors and Violation Severity Levels with modifications, the implementation plan, and effective date proposed by NERC. DATES: Comments are due November 21, 2011. ADDRESSES: You may submit comments, identified by docket number and in accordance with the requirements posted on the Commission's Web site http://www.ferc.gov. Comments may be submitted by any of the following methods: Agency Web Site: Documents created electronically using word processing software should be filed in native applications or print-to-PDF format and not in a scanned format, at http://www.ferc.gov/docs-filing/efiling.asp. Mail/Hand Delivery: Commenters unable to file comments electronically must mail or hand deliver an original copy of their comments to: Federal Energy Regulatory Commission, Secretary of the Commission, 888 First Street, NE., Washington, DC 20426. These requirements can be found on the Commission's Web site, see, e.g., the ``Quick Reference Guide for Paper Submissions,'' available at http://www.ferc.gov/docs-filing/efiling.asp or via phone from FERC Online Support at 202-502-6652 or toll-free at 1-866-208-3676. FOR FURTHER INFORMATION CONTACT: Jan Bargen (Technical Information), Office of Electric Reliability, Division of Logistics and Security, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502- 6333. Edward Franks (Technical Information), Office of Electric Reliability, Division of Logistics and Security, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502- 6311. Kevin Ryan (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-6840. Matthew Vlissides (Legal Information), Office of the General Counsel, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426, (202) 502-8408. SUPPLEMENTARY INFORMATION: September 15, 2011. 1. Under section 215 of the Federal Power Act (FPA),\1\ the Commission proposes to approve eight modified Critical Infrastructure Protection (CIP) Reliability Standards, CIP-002-4 through CIP-009-4. The proposed ``Version 4'' CIP Standards were developed and submitted for approval to the Commission by the North American Electric Reliability Corporation (NERC), which the Commission certified as the Electric Reliability Organization (ERO) responsible for developing and enforcing mandatory Reliability Standards.\2\ In general, the CIP Reliability Standards provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets'' to support the reliable operation of the Bulk-Power System.\3\ In particular, the Version 4 CIP Reliability Standards propose to modify CIP-002-4 to include ``bright line'' criteria for the identification of Critical Assets, in lieu of the currently-required risk-based assessment methodology that is developed and applied by applicable entities. In addition, NERC developed proposed conforming modifications to the remaining cybersecurity Reliability Standards, CIP-003-4 through CIP- 009-4. --------------------------------------------------------------------------- \1\ 16 U.S.C. 824o (2006). \2\ North American Electric Reliability Corp., 116 FERC ] 61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd sub nom. Alcoa, Inc. v. FERC, 564 F.3d 1342 (D.C. Cir. 2009). \3\ The NERC Glossary of Terms defines Critical Assets to mean ``Facilities, systems, and equipment which, if destroyed, degraded, or otherwise rendered unavailable, would affect the reliability or operability of the Bulk Electric System.'' --------------------------------------------------------------------------- 2. The Commission proposes to approve Version 4, the Violation Risk Factors (VRFs),the Violation Severity Levels (VSLs) with modifications, the implementation plan, and effective date proposed by NERC. The Commission also proposes to approve the retirement of the currently effective Version 3 CIP Reliability Standards, CIP-002-3 to CIP-009-3. The Commission seeks comments on these proposals to approve. 3. While we propose to approve the Version 4 CIP Standards, like NERC, we recognize that the Version 4 CIP Standards represent an ``interim step'' \4\ to addressing all of the outstanding directives set forth in Order No. 706.\5\ We believe that the electric industry, through the NERC standards development process, should continue to develop an approach to cybersecurity that is meaningful and comprehensive to assure that the nation's electric grid is capable of withstanding a Cybersecurity Incident.\6\ Below, we reiterate several topics set forth in Order No. 706 that pertain to a tiered approach to identifying Cyber Assets, protection from misuse, and a regional perspective. We expect NERC will continue to improve the CIP Standards to address these and other outstanding matters addressed in Order No. 706. --------------------------------------------------------------------------- \4\ NERC Petition at 6. \5\ Mandatory Reliability Standards for Critical Infrastructure Protection, Order No. 706, 122 FERC ] 61,040, order on reh'g, Order No. 706-A, 123 FERC ] 61,174 (2008), order on clarification, Order No. 706-B, 126 FERC ] 61,229 (2009). \6\ Section 215(a) of the FPA defines Cybersecurity Incident as ``a malicious act or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communication networks including hardware, software and data that are essential to the reliable operation of the Bulk-Power System.'' --------------------------------------------------------------------------- 4. Moreover, as discussed below, the Commission seeks comments from NERC and other interested persons on establishing a reasonable deadline for NERC to satisfy the outstanding directives in Order No. 706 pertaining to the CIP Standards, using NERC's development timeline. [[Page 58731]] I. Background A. Mandatory Reliability Standards 5. Section 215 of the FPA requires a Commission-certified ERO to develop mandatory and enforceable Reliability Standards, which are subject to Commission review and approval. Once approved, the Reliability Standards may be enforced by the ERO, subject to Commission oversight, or by the Commission independently.\7\ --------------------------------------------------------------------------- \7\ See 16 U.S.C. 824o(e). --------------------------------------------------------------------------- 6. Pursuant to section 215 of the FPA, the Commission established a process to select and certify an ERO \8\ and, subsequently, certified NERC as the ERO.\9\ On January 18, 2008, the Commission issued Order No. 706 approving eight CIP Reliability Standards proposed by NERC. --------------------------------------------------------------------------- \8\ Rules Concerning Certification of the Electric Reliability Organization; and Procedures for the Establishment, Approval and Enforcement of Electric Reliability Standards, Order No. 672, FERC Stats. & Regs. ] 31,204, order on reh'g, Order No. 672-A, FERC Stats. & Regs. ] 31,212 (2006). \9\ North American Electric Reliability Corp., 116 FERC ] 61,062, order on reh'g & compliance, 117 FERC ] 61,126 (2006), aff'd sub nom., Alcoa, Inc. v. FERC, 564 F.3d 1342 (DC Cir. 2009). --------------------------------------------------------------------------- 7. In addition, pursuant to section 215(d)(5) of the FPA,\10\ the Commission directed NERC to develop modifications to the CIP Reliability Standards to address various concerns discussed in the Final Rule. In relevant part, the Commission directed the ERO to address the following issues regarding CIP-002-1: (1) Need for ERO guidance regarding the risk-based assessment methodology for identifying Critical Assets; (2) scope of Critical Assets and Critical Cyber Assets; (3) internal, management, approval of the risk-based assessment; (4) external review of Critical Assets identification; and (5) interdependency between Critical Assets of the Bulk-Power System and other critical infrastructures. Subsequently, the Commission approved Version 2 and Version 3 of the CIP Reliability Standards, each version including changes responsive to some but not all of the directives in Order No. 706.\11\ --------------------------------------------------------------------------- \10\ 16 U.S.C. 824o(d)(5). \11\ North American Electric Reliability Corp., 128 FERC ] 61,291 (2009), order denying reh'g and granting clarification, 129 FERC ] 61,236 (2009) (approving Version 2 of the CIP Reliability Standards); North American Electric Reliability Corp., 130 FERC ] 61,271 (2010) (approving Version 3 of the CIP Reliability Standards). --------------------------------------------------------------------------- B. Current Version 3 CIP Reliability Standards 8. Reliability Standard CIP-002-3 addresses the identification of Critical Assets and associated Critical Cyber Assets. Pursuant to CIP- 002-3, a responsible entity must develop a risk-based assessment methodology to identify its Critical Assets. Requirement R1 specifies certain types of assets that an assessment must consider for Critical Asset status and also allows the consideration of additional assets that the responsible entity deems appropriate. Requirement R2 requires the responsible entity to develop a list of Critical Assets based on an annual application of the risk-based assessment methodology developed pursuant to Requirement R1. Requirement R3 provides that the responsible entity must use the list of Critical Assets to develop a list of associated Critical Cyber Assets that are essential to the operation of the Critical Assets. 9. In addition, the Commission approved the following ``Version 3'' CIP Standards: CIP-003-3 (Security Management Controls); CIP-004-3 (Personnel & Training); CIP-005-3 (Electronic Security Perimeter(s)); CIP-006-3 (Physical Security of Critical Cyber Assets); CIP-007-3 (Systems Security Management); CIP-008-3 (Incident Reporting and Response Planning); CIP-009-3 (Recovery Plans for Critical Cyber Assets). II. Proposed Version 4 CIP Reliability Standards A. NERC Petition 10. On February 10, 2011, NERC filed a petition seeking Commission approval of proposed Reliability Standards CIP-002-4 to CIP-009-4 and requesting the concurrent retirement of the currently effective Version 3 CIP Reliability Standards, CIP-002-3 to CIP-009-3.\12\ The principal differences are found in CIP-002, where NERC replaced the risk-based assessment methodology for identifying Critical Assets with 17 uniform bright line criteria for identifying Critical Assets. NERC does not propose any changes to the process of identifying the associated Critical Cyber Assets that are then subject to the cyber security protections required by CIP-003 through CIP-009. NERC also submitted proposed VRFs and VSLs and an implementation plan governing the transition to Version 4. NERC proposed that the Version 4 CIP Reliability Standards become effective the first day of the eighth calendar quarter after applicable regulatory approvals have been received. --------------------------------------------------------------------------- \12\ NERC Petition at 1. The proposed Reliability Standards are not attached to the NOPR. They are, however, available on the Commission's eLibrary document retrieval system in Docket No. RM11- 11-000 and are available on the ERO's Web site, http://www.nerc.com. Reliability Standards approved by the Commission are not codified in the CFR. --------------------------------------------------------------------------- 11. On April 12, 2011, NERC made an errata filing correcting certain errors in the petition and furnishing corrected exhibits and the standard drafting team minutes. In the errata, NERC also replaced the VRFs and VSLs in the February 10 petition with new proposed VRFs and VSLs.\13\ --------------------------------------------------------------------------- \13\ NERC states that the Version 4 VRFs and VSLs are carried over in part from the VRFs and VSLs in the Version 3 CIP Reliability Standards. NERC Petition at 46. The Commission approved the Version 2 and 3 VRFs and VSLs in Docket Nos. RD10-6-001 and RD09-7-003 on January 20, 2011 but required NERC to make modifications in a compliance filing due by March 21, 2011. North American Electric Reliability Corporation, 134 FERC ] 61,045 (2011). The February 10 petition did not carry over the modified Version 3 VRFs and VSLs since it was filed before the March 21 compliance filing. NERC submitted new Version 4 VRFs and VSLs that carried over the modified Version 3 VRFs and VSLs in the April 12 errata. On June 6, 2011, NERC filed the March 21, 2011 compliance filing in the present docket, Docket No. RM11-11-000. --------------------------------------------------------------------------- 12. In its Petition, NERC states that the Version 4 CIP Standards satisfy the Commission's criteria, set forth in Order No. 672, for determining whether a proposed Reliability Standard is just, reasonable, not unduly discriminatory or preferential and in the public interest.\14\ According to NERC, CIP-002-4 achieves a specified reliability goal by requiring the identification and documentation of Critical Cyber Assets associated with Critical Assets that support the reliable operation of the Bulk-Power System. NERC opines that the Reliability Standard ``improves reliability by establishing uniform criteria across all Responsible Entities for the identification of Critical Assets.'' \15\ Further, NERC states that CIP-002-4 contains a technically sound method to achieve its reliability goal by requiring the identification and documentation of Critical Assets through the application of the criteria set forth in Attachment 1 of CIP-002-4. --------------------------------------------------------------------------- \14\ Order No. 672, FERC Stats. & Regs. ] 31,204 at P 323-337. \15\ NERC Petition at 4. --------------------------------------------------------------------------- 13. NERC states that CIP-002-4 establishes clear and uniform criteria for identifying Critical Assets on the Bulk-Power System.\16\ NERC also states that CIP-002-4 does not reflect any differentiation in requirements based on size of the responsible entity. NERC asserts that CIP-002-4 will not have negative effects on competition or restriction of the grid. NERC also contends that the two-year implementation period for CIP-002-4 is reasonable given the time it will take responsible entities to determine [[Page 58732]] whether assets meet the criteria included in Attachment 1 and to implement the controls required in CIP-003-4 through CIP-009-4 for the newly identified assets. --------------------------------------------------------------------------- \16\ Id. at 38. --------------------------------------------------------------------------- 14. Finally, NERC acknowledges that CIP-002-4 addresses some, but not all, of the Commission's directives in Order No. 706. NERC explains that the standard drafting team limited the scope of requirements in the development of CIP Version 4 ``as an interim step'' limited to the concerns raised by the Commission regarding CIP-002.\17\ NERC states that it has taken a ``phased'' approach to meeting the Commission's directives from Order No. 706 and, according to NERC, the standard drafting team continues to address the remaining Commission directives. According to NERC, the team will build on the bright line approach of CIP Version 4.\18\ --------------------------------------------------------------------------- \17\ NERC Petition at 6 (citing Order No. 706, 122 FERC ] 61,040 at P 236). \18\ NERC Petition at 6. --------------------------------------------------------------------------- B. Proposed Reliability Standard CIP-002-4 15. Proposed Reliability Standard CIP-002-4 contains 3 requirements. Requirement R1, which pertains to the identification of Critical Assets, provides: The Responsible Entity shall develop a list of its identified Critical Assets determined through an annual application of the criteria contained in CIP-002-4 Attachment 1--Critical Asset Criteria. The Responsible Entity shall update this list as necessary, and review it at least annually. Attachment 1 provides seventeen criteria to be used by all responsible entities for the identification of Critical Assets pursuant to Requirement R1. The thresholds pertain to specific types of facilities such as generating units, transmission lines and control centers. For example, Criterion 1.1 provides ``[e]ach group of generating units (including nuclear generation) at a single plant location with an aggregate highest rated net Real Power capability of the preceding 12 months equal to or exceeding 1500 MW in a single Interconnection.'' With regard to transmission, Criterion 1.6 provides ``Transmission Facilities operated at 500 kV or higher,'' and Criterion 1.7 provides ``Transmission Facilities operated at 300 kV or higher at stations or substations interconnected at 300 kV or higher with three or more other transmission stations or substations.'' 16. Reliability Standard CIP-002-4, Requirement R2 requires responsible entities to develop a list of Critical Cyber Assets associated with the Critical Assets identified pursuant to Requirement R1. As in previous versions, the Requirement further states that to qualify as a Critical Cyber Asset, the Cyber Asset must: (1) Use a routable protocol to communicate outside the Electronic Security Perimeter; (2) use a routable protocol within a control center; or (3) be dial-up accessible. In the proposed version, in the context of generating units at a single plant location, the Requirement limits the designation of Critical Cyber Assets only to Cyber Assets shared by a combination of generating units whose compromise could within 15 minutes result in the loss of generation capability equal to or higher than 1500 MW. 17. Requirement R3 requires that a senior manager or delegate for each responsible entity approve annually the list of Critical Assets and the list of Critical Cyber Assets, even if the lists contain no elements. As mentioned above, proposed Reliability Standards CIP-003-4 to CIP-009-4 only reflect conforming changes to accord with the CIP- 002-4 Reliability Standard. C. Additional Information Regarding Attachment 1 Criteria 18. In response to a Commission data request, NERC provided additional information regarding the bright line criteria for