{"id":4724,"date":"2008-08-01T15:35:13","date_gmt":"2008-08-01T22:35:13","guid":{"rendered":"http:\/\/bennett.com\/blog\/2008\/08\/the-fccs-alleged-findings-are-full-of-holes\/"},"modified":"2008-08-01T15:35:13","modified_gmt":"2008-08-01T22:35:13","slug":"the-fccs-alleged-findings-are-full-of-holes","status":"publish","type":"post","link":"https:\/\/bennett.com\/blog\/2008\/08\/01\/the-fccs-alleged-findings-are-full-of-holes\/","title":{"rendered":"The FCC&#8217;s alleged findings are full of holes"},"content":{"rendered":"<p>\t\t\t\tAccording to Drew Clark, these are <a href=\"http:\/\/broadbandcensus.com\/blog\/?p=245\">the FCC&#8217;s findings in the Comcast dispute:<\/a><\/p>\n<blockquote>\n<p>   1. Comcast\u00e2\u20ac\u2122s network management practices discriminate among applications and protocols. It uses deep packet inspection.<\/p><\/blockquote>\n<p>There is no law against deep packet inspection for the purpose of reasonable network management, and Kevin Martin&#8217;s press release says it&#8217;s OK to discriminate for and against applications: &#8220;We do not tell providers how to manage their networks. They might choose, for instance, to prioritize voice-over-IP calls.&#8221; So no problem here, but nice attempt at scaring people with &#8220;deep packet inspection.&#8221;<\/p>\n<blockquote><p>\n   2. Comcast\u00e2\u20ac\u2122s practices are not minimally intrusive, but are invasive, and have significant effect.<\/p><\/blockquote>\n<p>Comcast&#8217;s actions only affect BitTorrent in unattended seeding mode, which actually helps BitTorrent in peering mode and download mode, so it is minimally intrusive.<\/p>\n<blockquote><p>\n   3. Comcast has blocked content and significantly interfered with person\u00e2\u20ac\u2122s ability to access applications and content of their choice.<\/p><\/blockquote>\n<p>Comcast&#8217;s actions have no effect on the ability of its customers to access content. In fact, they help. Seeding cannot be construed as &#8220;accessing content&#8221; under any reasonable definition. In fact, it&#8217;s &#8220;offering content&#8221; and the Four Freedoms don&#8217;t enumerate that as a right.<\/p>\n<blockquote><p>\n   4. Comcast\u00e2\u20ac\u2122s practices do not constitute reasonable network management practices.<\/p><\/blockquote>\n<p> In the opinion of actual working engineers, these practices are reasonable, if less than ideal. In engineering as in politics the perfect is the enemy of the good.<\/p>\n<blockquote><p>\n   5. The economic harms have been compounded by Comcast\u00e2\u20ac\u2122s failure to disclose its practices.<\/p><\/blockquote>\n<p>There has been no demonstrated economic harm. In fact, the system discourages piracy, and therefore prevents economic harm.<\/p>\n<blockquote><p>\n   6. Comcast\u00e2\u20ac\u2122s practice contravenes federal internet policy, and limits consumers\u00e2\u20ac\u2122 ability to access the lawful internet content of their choice.<\/p><\/blockquote>\n<p>Once again, this practice doesn&#8217;t affect consumer ability to download content.<\/p>\n<p>So the Commission is wrong on the facts, wrong on the law, and generally pounding on the table.<\/p>\n<p>Technorati Tags: <a class=\"performancingtags\" href=\"http:\/\/technorati.com\/tag\/net neutrality\" rel=\"tag\">net neutrality<\/a>, <a class=\"performancingtags\" href=\"http:\/\/technorati.com\/tag\/FCC\" rel=\"tag\">FCC<\/a>, <a class=\"performancingtags\" href=\"http:\/\/technorati.com\/tag\/broadband\" rel=\"tag\">broadband<\/a>, <a class=\"performancingtags\" href=\"http:\/\/technorati.com\/tag\/Comcast\" rel=\"tag\">Comcast<\/a>\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Drew Clark, these are the FCC&#8217;s findings in the Comcast dispute: 1. Comcast\u00e2\u20ac\u2122s network management practices discriminate among applications and protocols. It uses deep packet inspection. There is no law against deep packet inspection for the purpose of reasonable network management, and Kevin Martin&#8217;s press release says it&#8217;s OK to discriminate for and &hellip; <a href=\"https:\/\/bennett.com\/blog\/2008\/08\/01\/the-fccs-alleged-findings-are-full-of-holes\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;The FCC&#8217;s alleged findings are full of holes&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[33,38],"tags":[],"class_list":["post-4724","post","type-post","status-publish","format-standard","hentry","category-fcc","category-net-neutrality"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbifyw-1ec","_links":{"self":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/4724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/comments?post=4724"}],"version-history":[{"count":0,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/4724\/revisions"}],"wp:attachment":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/media?parent=4724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/categories?post=4724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/tags?post=4724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}