The Big US Tech Corporations Are A ‘Monopoly of Power’

report by the US House Judiciary Committee has advocated massive changes that would lead to the disintegration of some of large US tech companies. It states “The majority staff accurately portrays how Apple, Amazon, Google, and Facebook have used their monopoly power to act as gatekeepers to the marketplace, undermine potential competition, and pick winners and losers, all while simultaneously aligning up to unfriendly nations like China in order to further expand their global footprint " 
 
The historic investigation is the most significant effort to check big tech’s power since the government sued Microsoft for antitrust violations in the 1990s. It follows the committee’s lengthy inquiry into the effects of market dominance by major web platforms. 
 
While a number of Democratic lawmakers believe these firms have too much power but some Republicans also involved with the Report do not agree with the findings.  In a statement, Jim Jordan a Republican congressman, dismissed the report as "partisan" and said it advanced "radical proposals that would refashion antitrust law in the vision of the far left."  
 
Others have said they support many of the report's conclusions about the firms' anti-competitive tactics but that remedies proposed by Democrats go too far.
 
Monopoly Power
 
Because of their growing size the US tech companies, sometimes collectively known as FAANG (Facebook, Apple, Amazon, Netflix, Google) have become a focus of investigation. This investigation by the House Judiciary Committee is just one of a number of investigations into these large tech companies. The report accuses the companies of charging high fees, forcing smaller customers into unfavorable contracts and of using "killer acquisitions" to hobble rivals. 
 
It said the findings should prompt politicians to consider a series of changes. Those included stronger enforcement of existing competition law, as well as changes to limit the areas in which a firm may do business or prevent companies from operating as players in areas where they are the dominant provider of infrastructure, as Amazon does, for example, when it acts as both a seller and marketplace for other merchants.
 
The Report Says:
 
  • Facebook had "monopoly power" in the market for social networking, which it maintained by using its data advantage to "acquire, copy or kill" nascent threats. Facebook’s algorithms, advertising policies, and content moderation rules have all combined to discriminate against conservative viewpoints, shadow ban conservative organisations and individuals, and suppress political speech. The majority also left Twitter and its suppression of speech out of the investigation completely. 
  • Google used its dominant advertising technology product to demonetize conservative media outlets, including The Federalist. YouTube, a Google subsidiary, blocked videos from Republican politicians and media groups. Amazon censored conservative organizations, including the Family Research Council and the Alliance Defending Freedom by blocking Americans’ ability to donate to these groups through the AmazonSmile tool. 
  • Google monopolised online search and advertising using "a series of anti-competitive tactics", including privileging its own content ahead of other websites. 
  • Amazon possessed "significant and durable market power" in online shopping, which it furthered in part by "anticompetitive conduct in its treatment of third-party sellers" which it referred to as "internal competitors" behind closed doors.
  • Apple exerted monopoly power via its App store, which it leveraged "to create and enforce barriers to competition and discriminate against and exclude rivals while preferencing its own offerings".
Reaction
 
Amazon said in a statement that any actions against it “would have the primary effect of forcing millions of independent retailers out of online stores”, leaving consumers with fewer choices. “Large companies are not dominant by definition, and the presumption that success can only be the result of anti-competitive behavior is simply wrong,” Amazon said. A spokesman from Google said the company disagrees with the report and accused it of relying on” “outdated and inaccurate allegations from commercial rivals”. It said solutions offered in the report would “cause real harm to consumers”.
 
US House Judiciary Subcommittee:      Guardian:          Amazon:         BBC:        Congressman Ken Buck:
 
You Might Also Read: 
 
Is Big Tech 'Fixing' The US Election?:
 
 
« AI Is Evolving Into A Business Necessity
Big Regulatory Changes In Store For The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.