<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Terrell McSweeny | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2019-03-06T10:16:40+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/terrell-mcsweeny" />
	<id>https://www.vox.com/authors/terrell-mcsweeny/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/terrell-mcsweeny/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Terrell McSweeny</name>
			</author>
			
			<author>
				<name>Mignon Clyburn</name>
			</author>
			
			<title type="html"><![CDATA[Let’s not stack the deck against consumers and innovators by rolling back the Open Internet Order]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2017/1/5/14178744/fcc-ftc-net-neutrality-privacy-internet-data-innovation-protection" />
			<id>https://www.vox.com/2017/1/5/14178744/fcc-ftc-net-neutrality-privacy-internet-data-innovation-protection</id>
			<updated>2017-01-24T07:56:42-05:00</updated>
			<published>2017-01-05T14:00:02-05:00</published>
			<category scheme="https://www.vox.com" term="Privacy &amp; Security" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[As two of the members of the Federal Communications Commission and the Federal Trade Commission, we have helped shape how our government has responded to the rapid shifts in our economy and our relationship to technology. From our vantage point, we have come to realize that the main component of our innovation economy is not [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="FCC Chairman Tom Wheeler holds hands with FCC Commissioners Mignon Clyburn (L) and Jessica Rosenworcel during an open hearing on net neutrality, Feb. 26, 2015 in Washington, D.C. | Mark Wilson / Getty" data-portal-copyright="Mark Wilson / Getty" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/7756879/net_neutrality.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
	FCC Chairman Tom Wheeler holds hands with FCC Commissioners Mignon Clyburn (L) and Jessica Rosenworcel during an open hearing on net neutrality, Feb. 26, 2015 in Washington, D.C. | Mark Wilson / Getty	</figcaption>
</figure>
<p>As two of the members of the Federal Communications Commission and the Federal Trade Commission, we have helped shape how our government has responded to the rapid shifts in our economy and our relationship to technology. From our vantage point, we have come to realize that the main component of our innovation economy is not data or communication networks, but is instead the trust of the American consumer.</p>

<p>When a consumer trusts that their data will be secure as it travels across the internet&nbsp;or that they can access new online services without discrimination, they become part of the virtuous cycle that drives an idea to an invention and ultimately to adoption. &nbsp;Undermining this ecosystem threatens our continued innovation.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>Let’s not stack the deck against consumers and innovators, or undermine the technological revolution at our fingertips.</p></blockquote></figure>
<p>This is why <a href="http://www.recode.net/2016/12/12/13919952/net-neutrality-fcc-rosenworcel-trump-senate">efforts</a> to <a href="http://www.recode.net/2016/11/9/13570340/trump-president-policy-regulation-net-neutrality-fcc">roll back</a> the <a href="https://www.fcc.gov/general/open-internet">Open Internet Order</a> would be harmful to consumers <em>and</em> to innovators. Ensuring that the internet remains a fountain of innovation and disruption is at the heart of open internet policy. The elimination of clear rules protecting a free and open internet would put us in uncharted territory and would create uncertainty for ISPs, edge providers and consumers alike.</p>

<p>The FCC also took an important step in protecting consumers&rsquo; privacy, following in large part the standards that the FTC has long set in its own privacy cases. These rules come at a time when consumers need and want more and better privacy choices. Both agencies bring complementary expertise and differentiated authorities to what, for many consumers, is a largely frustrating feature of their online lives.</p>

<p>Having both the FTC and the FCC on the privacy beat provides consumers with protections for their sensitive data from the moment they receive broadband service to when they update their favorite social media post. While joint privacy enforcement is good for the American consumer, more can be done. This is why we both support efforts in Congress to pass meaningful privacy legislation, and encourage our commissions to work together with other agencies to formulate a unified approach to privacy and data security protection.</p>

<p>In many ways, what the FTC and the FCC have accomplished these past eight years aligns with the promises of the next administration &mdash; standing up for the little guy, unleashing the power of the entrepreneur, and making sure that America continues to be the most dynamic economy in the world. Let&rsquo;s not stack the deck against consumers and innovators, or undermine the technological revolution at our fingertips. Let us instead focus on preserving a &lrm;free and open internet and privacy protections to the benefit of all consumers.</p>
<hr class="wp-block-separator" />
<p><a href="https://www.ftc.gov/about-ftc/biographies/terrell-mcsweeny"><em>Terrell McSweeny</em></a><em> is a commissioner at the&nbsp;</em><a href="http://www.ftc.gov"><em>Federal Trade Commission</em></a><em>. McSweeny began her service at the FTC in April 2014, after serving as chief general counsel for Competition Policy and Intergovernmental Relations for the U.S. Department of Justice Antitrust Division. She joined the Antitrust Division after serving as deputy assistant to the president and domestic policy adviser to the vice president from January 2009 to February 2012. She also worked as an attorney at O&rsquo;Melveny &amp; Myers LLP. Reach her&nbsp;</em><a href="https://twitter.com/TMcSweenyFTC"><em>@TMcSweenyFTC</em></a><em>. </em></p>

<p><a href="https://www.fcc.gov/general/commissioner-mignon-clyburn"><em>Mignon Clyburn</em></a><em> is a commissioner at the </em><a href="https://www.fcc.gov"><em>Federal Communications Commission</em></a><em>. Clyburn began her service at the FCC in August 2009, after spending 11 years as a member of the sixth district on the Public Service Commission (PSC) of South Carolina. She served as its chair from July 2002 through June 2004. Reach her </em><a href="https://twitter.com/MClyburnFCC"><em>@MClyburnFCC</em></a><em>.</em></p>
<hr class="wp-block-separator" /><!-- Recode Newsletter Signup -->
<div class="container newsletter-sign-up-form">

  
  <h3>Subscribe to Recode Newsletters</h3>
  <div class="newsletter-signup">
    <div class="field">
      <div class="input-contain">
        
      </div>
      <label for="daily_digest">
        <h4>Recode Daily (Top News)</h4>
      </label>
    </div>
    <div class="field">
      <div class="input-contain">
        
      </div>
      <label for="conference">
        <h4>Events</h4>
      </label>
    </div>
    <div class="field">
      <div class="input-contain">
        
      </div>
      <label for="products">
        <h4>Products</h4>
      </label>
    </div>
    <div class="field sign-up">
      
      <button type="submit">Go</button>
    </div>

</div>

.newsletter-sign-up-form *{vertical-align:baseline;font-feature-settings:"kern" 1;font-variant-ligatures:no-common-ligatures;box-sizing:border-box;-webkit-tap-highlight-color:transparent}::-webkit-input-placeholder{color:#a9a9a9}:-moz-placeholder{color:#a9a9a9}::-moz-placeholder{color:#a9a9a9}:-ms-input-placeholder{color:#a9a9a9}.newsletter-sign-up-form form{margin:1em 0;padding:0 5% 1rem 5%;width:100%;border-top:1px solid #e7e7e8;border-bottom:1px solid #e7e7e8}.newsletter-sign-up-form .newsletter-signup{position:relative;z-index:2;height:100%;display:-ms-flexbox;display:flex;flex-wrap:wrap;-moz-flex-wrap:wrap;-ms-flex-wrap:wrap;-webkit-flex-wrap:wrap;-ms-flex-direction:row;flex-direction:row}.newsletter-sign-up-form .field{padding:.2rem 0;-ms-flex:1 100%;flex:1 100%;displa
y:-ms-flexbox;display:flex;flex-wrap:wrap;-moz-flex-wrap:wrap;-ms-flex-wrap:wrap;-webkit-flex-wrap:wrap;-ms-flex-direction:row;flex-direction:row}.newsletter-sign-up-form .field.sign-up{cursor:default;display:inline-block;-ms-flex:none;flex:none;width:100%;margin-top:.4rem}.newsletter-sign-up-form label{margin-bottom:.25em;color:#3b3b3b;font-family:"Open Sans",Helvetica,sans-serif;font-size:.8em;letter-spacing:.015rem;-ms-flex:1 33%;flex:3 33%}.newsletter-sign-up-form .input-contain{-ms-flex:2 10%;flex:2 10%;max-width:1.75rem}.newsletter-sign-up-form input:hover{border:1px solid #e7e7e8}.newsletter-sign-up-form input[type=checkbox]{vertical-align:top;font-size:1rem}.newsletter-sign-up-form input[type=text],.newsletter-sign-up-form input[type=email]{cursor:text;padding:.5rem .6rem;outline:0;color:#3b3b3b;border:1px solid #e7e7e8;font-size:16px;font-family:"Open Sans",Helvetica,sans-serif;width:80%;margin-right:-1px;letter-spacing:0.02rem;max-width:25rem}.newsletter-sign-up-form h3,.newsletter-sign-up-form h4{font-family:"Klavika Medium",Helvetica,sans-serif;line-height:1.38;letter-spacing:0.025rem}.newsletter-sign-up-form input[type=text]:focus,.newsletter-sign-up-form input[type=email]:focus{border:1px solid #bb2323}.newsletter-sign-up-form h3{font-size:1.4em;letter-spacing:.02rem;margin-bottom:.4rem}.newsletter-sign-up-form h4{margin:0 .2rem .1rem 0;color:#3b3b3b;font-weight:900;font-size:1.3em;text-transform:capitalize;display:block}.newsletter-sign-up-form .label-contain{max-width:20em}.newsletter-sign-up-form button{padding:.65rem 1rem;letter-spacing:.05rem;border:none;background-color:#f62217;color:#FEFEFE;text-transform:uppercase;vertical-align:top;font-weight:700;font-style:normal;font-size:.9em;display:inline-block;font-family:"Open Sans",Helvetica,sans-serif;-webkit-appearance:none;cursor:pointer;margin-left:-4px;width:20%;transition:background .12s;max-width:8rem}.newsletter-sign-up-form button:hover{background-color:#6b0000}@media (min-width:40rem){.newsletter-sign-up-form form{margin:0;padding:1rem 5% 2rem 5%;width:100%;border-top:none;border-bottom:none}.newsletter-sign-up-form .field{padding:1rem 1rem .6rem 1rem;border:1px solid #e7e7e8;border-bottom:none;-ms-flex:3 33%;flex:3 33%}.newsletter-sign-up-form .field.sign-up{padding:1rem 1rem 1rem 1rem;background-color:#FAFAFA;margin-top:0;border-bottom:1px solid #e7e7e8}.newsletter-sign-up-form .field:nth-child(2){border-left:none}.newsletter-sign-up-form .field:nth-child(3){border-left:none}.newsletter-sign-up-form .field:nth-child(3),.newsletter-sign-up-form .field:nth-child(4){}.newsletter-sign-up-form button{font-size:.85em}}

<!-- /Recode Newsletter Signup -->
</div>
<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Terrell McSweeny</name>
			</author>
			
			<title type="html"><![CDATA[Hampering Innovations in Data Security Could Harm Consumers]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/2/25/11588226/hampering-innovations-in-data-security-could-harm-consumers" />
			<id>https://www.vox.com/2016/2/25/11588226/hampering-innovations-in-data-security-could-harm-consumers</id>
			<updated>2019-03-06T05:12:37-05:00</updated>
			<published>2016-02-25T11:00:25-05:00</published>
			<category scheme="https://www.vox.com" term="Apple" /><category scheme="https://www.vox.com" term="Big Tech" /><category scheme="https://www.vox.com" term="Business &amp; Finance" /><category scheme="https://www.vox.com" term="Media" /><category scheme="https://www.vox.com" term="Money" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[On Tuesday, the Federal Trade Commission announced an important data security case involving routers. Routers are the first line of defense for home networks and the backbone for connecting and operating our Internet-connected devices. The security of our routers is necessary for the security of the Internet of Things. If a router is insecure, it [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="asharkyu/Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15792358/shutterstock_273546485.0.1484666324.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>On Tuesday, the Federal Trade Commission announced <a href="http://arstechnica.com/security/2016/02/asus-lawsuit-puts-entire-industry-on-notice-over-shoddy-router-security/">an important data security case involving routers</a>.</p>

<p>Routers are the first line of defense for home networks and the backbone for connecting and operating our Internet-connected devices. The security of our routers is necessary for the security of the Internet of Things. If a router is insecure, it can create a significant vulnerability exposing our networks and all the information we have on them. Indeed, in this case, attackers could reconfigure vulnerable routers to control and redirect consumers&rsquo; Web traffic, and could gain unauthorized access to thousands of people&rsquo;s personal files on attached storage devices.</p>
<blockquote class="red right"><p>There&rsquo;s a lot at stake for consumers in this debate, because it could affect how companies secure the IoT products permeating our daily lives &mdash; the microphones, sensors and cameras in our homes, our connected cars, the fitness trackers we&rsquo;re wearing and, of course, our phones.</p></blockquote>
<p>There were several problems with the router manufacturer&rsquo;s approach to security that led to these breaches &mdash; for example, the manufacturer allegedly did not perform reasonable security testing and did not have an adequate system for receiving and addressing vulnerability reports. Once the manufacturer knew about serious vulnerabilities in its products, it not only failed to remediate them, it also failed to notify customers of them. Moreover, in spite of marketing a cloud feature on its routers as &ldquo;a way to safely secure and access your treasured data through your router,&rdquo; the company allegedly failed to encrypt data in transit.</p>

<p>Over the last decade, the FTC has brought more than 50 data security consumer protection cases. These cases have shaped reasonable security measures for consumer products Encryption is one such measure. Earlier this year, the FTC <a href="https://www.ftc.gov/news-events/press-releases/2016/01/dental-practice-software-provider-settles-ftc-charges-it-misled">brought a case</a> against a company that makes software for dental practices that claimed it was using industry-standard encryption when it was not. The FTC also <a href="https://www.ftc.gov/news-events/press-releases/2014/03/fandango-credit-karma-settle-ftc-charges-they-deceived-consumers">brought enforcement actions when encryption wasn&rsquo;t configured properly</a>, leaving consumers vulnerable to man-in-the-middle attacks, and where the agency <a href="https://www.ftc.gov/news-events/press-releases/2005/09/mortgage-company-settles-information-security-charges">alleges that information wasn&rsquo;t kept securely throughout its life cycle</a>.</p>

<p>The use of encryption and types of security measures in consumer products is getting a lot of attention due to the San Bernardino iPhone case. While the FTC has stopped short of dictating what type of technology companies should use to secure consumer information, <a href="https://www.ftc.gov/tips-advice/business-center/guidance/start-security-guide-business">it has pointed to encryption as a way that companies can store and transmit sensitive information securely</a>. With good reason: Last year the FTC found that <a href="https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf">the IoT sector was rife with security risks</a>. Our growing connectivity is putting wonderful innovations at our fingertips &mdash; but it can also make more of our private information vulnerable.</p>
<blockquote class="red right"><p>These issues are too important to be decided around the exigencies of one case.</p></blockquote>
<p>So, is the FTC pushing companies to use strong security measures at the same time the FBI is taking them to court for doing so? The San Bernardino case involves the FBI asking for Apple&rsquo;s help to create tools to disable features that strengthen the phone&rsquo;s passcode security system. It raises the question of whether this type of request is reasonable for law enforcement to make. Among the issues in the policy debate swirling around the San Bernardino iPhone case are whether companies should be required to implement encryption in insecure ways. There is a lot at stake for consumers in this debate, because it could affect how companies secure the IoT products permeating our daily lives &mdash; the microphones, sensors and cameras in our homes, our connected cars, the fitness trackers we&rsquo;re wearing and, of course, our phones. Chilling innovation in the security of these products would be unfortunate.</p>

<p>These issues are too important to be decided around the exigencies of one case. Some have suggested that the government should convene a commission made up of law enforcement, industry, technologists, civil liberties advocates and national security experts to make thoughtful recommendations. That may be a good approach &mdash; especially if it stops misguided attempts to require back doors or weaken the security of consumer products. A careful and balanced approach is necessary in order to avoid a major setback for consumer privacy and data security.</p>
<hr class="wp-block-separator" />
<p><em>Terrell McSweeny is a commissioner at the </em><a href="http://www.ftc.gov"><em>Federal Trade Commission</em></a><em>. Prior to joining the Commission, McSweeny served as Chief Counsel for Competition Policy and Intergovernmental Relations for the U.S. Department of Justice Antitrust Division. Her government service also includes her work as Sen. Joe Biden&rsquo;s deputy chief of staff, and policy director in the U.S. Senate. The views expressed in this article are her own and do not necessarily reflect those of the Federal Trade Commission or any other commissioner. Reach her </em><a href="https://twitter.com/TMcSweenyFTC"><em>@TMcSweenyFTC</em></a>.</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Terrell McSweeny</name>
			</author>
			
			<title type="html"><![CDATA[Security Is a Must for the Internet of Things]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2015/1/27/11558088/security-is-a-must-for-the-internet-of-things" />
			<id>https://www.vox.com/2015/1/27/11558088/security-is-a-must-for-the-internet-of-things</id>
			<updated>2019-03-06T04:50:05-05:00</updated>
			<published>2015-01-27T06:26:25-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[My kitchen of the future will be smart. My refrigerator will be able to tell me what I need from the store &#8212; and maybe even order it. I will be able to turn on my coffeepot when I switch on my bedside lamp in the morning and preheat my oven as I head home. [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Maksim Kabakou / Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15786895/security-lock-maksim-kabakou-shutterstock.0.1488661047.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>My kitchen of the future will be smart. My refrigerator will be able to tell me what I need from the store &mdash; and maybe even order it. I will be able to turn on my coffeepot when I switch on my bedside lamp in the morning and preheat my oven as I head home. My counter will helpfully suggest recipe options when I place ingredients on it. My lights will gradually adjust depending on the time of day.</p>

<p>These innovations &mdash; and much more &mdash; will be possible because our appliances will connect to the Internet and each other, and our homes will be filled with sensors.</p>

<p>The shorthand moniker that describes this evolution of household products &mdash; light bulbs, toasters, etc. &mdash; into Wi-Fi enabled, cloud-connected devices is the &ldquo;Internet of Things,&rdquo; or IoT. Today, the Federal Trade Commission released a <a href="http://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf">report</a> identifying some of the opportunities and complications presented by the expanding IoT universe.</p>

<p>There is one area where an ounce of prevention will be worth a pound of cure: Security.</p>

<p>Security &mdash; <a href="http://www.csoonline.com/article/2687653/data-protection/new-toolkit-seeks-routers-internet-of-things-for-ddos-botnet.html">or the lack of it</a> &mdash; will largely determine the success or failure of widespread adoption of Internet-connected devices. As the Future of Privacy Forum <a href="http://www.futureofprivacy.org/2014/01/13/comments-about-the-internet-of-things/">has noted</a>, &ldquo;Inadequate security presents the greatest risk of actual consumer harm in the Internet of Things.&rdquo;</p>

<p>Troublingly, the FTC report finds a wide range of security practices in IoT products. Some companies have already adopted relatively mature security frameworks, while others have not.</p>

<p>It is unlikely that insecure appliances will become targets just for the data they contain. Why would someone take the time and effort to hack my refrigerator only to figure out that I need to buy milk?</p>

<p>The real risks are threefold. First, a compromised device may not work properly. A bit of malware or a virus might cause my refrigerator to turn off. At a minimum, this could be an inconvenience. However, the danger posed by an attack could escalate swiftly from a mere nuisance to a serious safety risk or even a life-threatening situation, depending on the device. A hacked connected insulin pump might send incorrect data or fail to dispense properly, potentially causing grave physical harm. Or a family&rsquo;s home security system may be turned off by an intruder.</p>

<p>Second, a vulnerability in one of the devices in my kitchen of the future &mdash; let&rsquo;s say my coffee pot &mdash; might provide a gateway to my entire home network and all the data stored on it, including sensitive financial and medical information.</p>

<p>Finally, poorly secured connected devices could be launching points for attacks, such as Distributed Denial of Service actions or breaches into other networks &mdash; causing serious consequences far beyond the originally compromised &ldquo;thing.&rdquo;</p>

<p>The number of Internet-connected devices that may be vulnerable to attackers is increasing exponentially. The possibility of many devices &mdash; such as thousands of connected meters, cars or kitchen appliances &mdash; simultaneously suffering from the same attack could threaten public health and safety.</p>

<p>Vulnerable IoT products may also undermine public trust in adopting these new technologies. In fact, a recent poll found that only 22 percent of consumers believe that the benefits of smart devices outweigh privacy and security concerns.</p>

<p>To mitigate security risks, the FTC recommends that IoT device manufacturers incorporate security into the design of connected products. Properly implemented, security by design requires manufacturers to consider security throughout the entirety of a product&rsquo;s lifecycle.</p>

<p>This means, for example, incorporating security practices into the culture of a corporation, bringing security expertise into the design phase of a product, working with vendors who prioritize it, and establishing breach protocols that can be implemented when flaws are discovered or attacks occur. Specific security measures required may depend on a number of factors, including the sensitivity of the information collected by a device and the costs of remedying security vulnerabilities.</p>

<p>For some manufacturers &mdash; particularly those that previously never needed to consider security in product design &mdash; properly securing connected consumer products will require changes in how they bring products to the marketplace and manage them once there. The FTC report, along with the <a href="http://www.nist.gov">NIST</a> cyber security framework, provides useful guidance for security best practices. But it is unclear whether sufficient incentives exist for IoT product manufacturers to voluntarily adopt best practices.</p>

<p>We are on the cusp of a rapid expansion of the IoT. Many of the products in my kitchen of the future are available today. Now is the time to insure there is a clear set of ground rules for the security of these products &mdash; before the marketplace and our homes fill with exploitable devices. Congress should pass comprehensive data security legislation establishing the basic requirements for how to notify consumers when breaches occur and creating a technology-neutral security framework that will provide clarity to consumers and innovators.</p>
<hr class="wp-block-separator" />
<p><em>Terrell McSweeny is a commissioner at the </em><a href="http://www.ftc.gov"><em>Federal Trade Commission</em></a><em>. Prior to joining the Commission, McSweeny served as Chief Counsel for Competition Policy and Intergovernmental Relations for the U.S. Department of Justice Antitrust Division. Her government service also includes her work as Sen. Joe Biden&rsquo;s deputy chief of staff, and policy director in the U.S. Senate. The views expressed in this article are her own, and do not necessarily reflect those of the Federal Trade Commission or any other commissioner. Reach her </em><a href="https://twitter.com/TMcSweenyFTC"><em>@TMcSweenyFTC</em></a>.</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Terrell McSweeny</name>
			</author>
			
			<title type="html"><![CDATA[Broadband Competition Should Be Encouraged, Not Restricted]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2015/1/13/11557724/broadband-competition-should-be-encouraged-not-restricted" />
			<id>https://www.vox.com/2015/1/13/11557724/broadband-competition-should-be-encouraged-not-restricted</id>
			<updated>2019-03-06T05:16:40-05:00</updated>
			<published>2015-01-13T13:22:51-05:00</published>
			<category scheme="https://www.vox.com" term="Big Tech" /><category scheme="https://www.vox.com" term="Google" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[There are vast disparities in Americans&#8217; access to fast, affordable broadband service. In part, this is a result of demographic differences: Denser, richer neighborhoods present a more attractive opportunity for investment by broadband providers than areas that are either less populous or less affluent. But another important factor is the presence (or absence) of meaningful [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Marcelo Graciolli/Flickr" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15793370/no-internet-today_marcelo-graciolli.0.1488932380.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>There are vast disparities in Americans&rsquo; access to fast, affordable broadband service. In part, this is a result of demographic differences: Denser, richer neighborhoods present a more attractive opportunity for investment by broadband providers than areas that are either less populous or less affluent. But another important factor is the presence (or absence) of meaningful competition in a particular market. In a number of cities and towns across America, new entry &mdash; often by a municipal service or public-private partnership &mdash; has increased competition and led to faster speeds and cheaper prices.</p>

<p>Chattanooga, Tennessee, is home to the first gigabit fiber network in the U.S. EPB, the local public utility that built the network, offers gigabit service to Chattanooga consumers for $70 per month, with even cheaper plans for those who don&rsquo;t quite need 100 times the average U.S. broadband connection speed. With gigabit broadband service, you can download a three gigabyte HD movie in 24 seconds (versus 40 minutes with a 10 megabits per second connection).</p>

<p>In response, the incumbent cable broadband provider put up billboards around Chattanooga touting its service, and began offering highly discounted introductory packages and gift cards to customers willing to switch back from EPB. It also lowered its cable prices and increased the speed of its fastest broadband packages. Consumers in Chattanooga now benefit from more choices and faster speeds.</p>

<p>They aren&rsquo;t alone. Kansas City also boasts a gigabit fiber network. As in Chattanooga, a new entrant &mdash; in this case, Google &mdash; built the next-generation network. Following Google&rsquo;s entry, the incumbent cable companies both announced they would increase Internet speeds for their Kansas City customers &mdash; without any increase in prices.</p>

<p>Similar stories have played out in other communities. In some places, incumbents initially decline requests by local governments to upgrade networks. However, when a new provider enters the market, these same incumbents invest in upgrades and deploy new technologies.</p>

<p>The experiences of Chattanooga, Kansas City, and other cities and towns like them concretely demonstrate the benefits of broadband entry for consumers. The <a href="http://muninetworks.org/content/charter-fights-dirty-kill-competition-monticello">Open Technology Institute found</a> that consumers have better options and faster speeds in communities where three or more providers compete.</p>

<p>But according to a <a href="http://www.esa.doc.gov/Reports/competition-among-us-broadband-service-providers">December 2014 report</a> by the U.S. Department of Commerce, less than one in 10 Americans is served by three or more wireline providers capable of providing 25 Mbps service &mdash; the <a href="http://recode.net/2015/01/07/will-25-mbps-soon-be-the-new-u-s-definition-of-broadband/">new threshold for broadband service</a> proposed last week by Chairman Tom Wheeler of the Federal Communications Commission. The majority of Americans face (at best) a broadband duopoly.</p>

<p>In spite of this, rather than lowering barriers for new broadband entry, many states are raising them. <a href="http://www.publicintegrity.org/2014/08/28/15402/where-states-stand-municipal-broadband">Twenty states</a> have enacted laws that restrict municipal broadband projects in one form or another. More states may join these ranks, as state legislatures return for 2015 sessions and consider restrictions. In some states, these restrictions take the form of outright bans &mdash; including bans on public-private partnerships. Other states don&rsquo;t formally ban municipal offerings, but hinder municipal entry as a practical matter.</p>

<p>Proponents of laws restricting municipal broadband frequently assert that public investment in municipal broadband infrastructure is unfair to private companies and discourages investment by the private sector. They note, in some cases correctly, that local broadband projects are expensive and can fail &mdash; and if they do, taxpayers can end up on the hook.</p>

<p>But broadband networks are infrastructure that generates public benefits related to education, health and economic development. As such, they are textbook cases for public support. Because a private company cannot monetize the full value of its broadband network, it will tend to underinvest in broadband deployment.</p>

<p>Not surprisingly, a recurring story told by cities and towns that have built their own fiber networks is that they did so only after the incumbent providers declined to make those investments themselves. In these cases, the city or town stepped in where the market failed to meet the demand for more modern infrastructure.</p>

<p>The experience of cities like Chattanooga demonstrates that the prospect of new broadband entry actually appears to spur investment by incumbents. Competition &mdash; whether provided by a private entity or a municipality &mdash; works. It is important that legislators and policy makers considering restrictions recognize the vital role competition plays in achieving better, faster Internet services.</p>
<hr class="wp-block-separator" />
<p><em>Terrell McSweeny is a commissioner at the </em><a href="http://www.ftc.gov"><em>Federal Trade Commission</em></a><em>. Prior to joining the Commission, McSweeny served as Chief Counsel for Competition Policy and Intergovernmental Relations for the U.S. Department of Justice Antitrust Division. Her government service also includes her work as Sen. Joe Biden&rsquo;s deputy chief of staff, and policy director in the U.S. Senate. The views expressed in this article are her own, and do not necessarily reflect those of the Federal Trade Commission or any other commissioner. Reach her </em><a href="https://twitter.com/TMcSweenyFTC"><em>@TMcSweenyFTC</em></a>.</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
	</feed>
