The Big US Tech Corporations Are A ‘Monopoly of Power’

report by the US House Judiciary Committee has advocated massive changes that would lead to the disintegration of some of large US tech companies. It states “The majority staff accurately portrays how Apple, Amazon, Google, and Facebook have used their monopoly power to act as gatekeepers to the marketplace, undermine potential competition, and pick winners and losers, all while simultaneously aligning up to unfriendly nations like China in order to further expand their global footprint " 
 
The historic investigation is the most significant effort to check big tech’s power since the government sued Microsoft for antitrust violations in the 1990s. It follows the committee’s lengthy inquiry into the effects of market dominance by major web platforms. 
 
While a number of Democratic lawmakers believe these firms have too much power but some Republicans also involved with the Report do not agree with the findings.  In a statement, Jim Jordan a Republican congressman, dismissed the report as "partisan" and said it advanced "radical proposals that would refashion antitrust law in the vision of the far left."  
 
Others have said they support many of the report's conclusions about the firms' anti-competitive tactics but that remedies proposed by Democrats go too far.
 
Monopoly Power
 
Because of their growing size the US tech companies, sometimes collectively known as FAANG (Facebook, Apple, Amazon, Netflix, Google) have become a focus of investigation. This investigation by the House Judiciary Committee is just one of a number of investigations into these large tech companies. The report accuses the companies of charging high fees, forcing smaller customers into unfavorable contracts and of using "killer acquisitions" to hobble rivals. 
 
It said the findings should prompt politicians to consider a series of changes. Those included stronger enforcement of existing competition law, as well as changes to limit the areas in which a firm may do business or prevent companies from operating as players in areas where they are the dominant provider of infrastructure, as Amazon does, for example, when it acts as both a seller and marketplace for other merchants.
 
The Report Says:
 
  • Facebook had "monopoly power" in the market for social networking, which it maintained by using its data advantage to "acquire, copy or kill" nascent threats. Facebook’s algorithms, advertising policies, and content moderation rules have all combined to discriminate against conservative viewpoints, shadow ban conservative organisations and individuals, and suppress political speech. The majority also left Twitter and its suppression of speech out of the investigation completely. 
  • Google used its dominant advertising technology product to demonetize conservative media outlets, including The Federalist. YouTube, a Google subsidiary, blocked videos from Republican politicians and media groups. Amazon censored conservative organizations, including the Family Research Council and the Alliance Defending Freedom by blocking Americans’ ability to donate to these groups through the AmazonSmile tool. 
  • Google monopolised online search and advertising using "a series of anti-competitive tactics", including privileging its own content ahead of other websites. 
  • Amazon possessed "significant and durable market power" in online shopping, which it furthered in part by "anticompetitive conduct in its treatment of third-party sellers" which it referred to as "internal competitors" behind closed doors.
  • Apple exerted monopoly power via its App store, which it leveraged "to create and enforce barriers to competition and discriminate against and exclude rivals while preferencing its own offerings".
Reaction
 
Amazon said in a statement that any actions against it “would have the primary effect of forcing millions of independent retailers out of online stores”, leaving consumers with fewer choices. “Large companies are not dominant by definition, and the presumption that success can only be the result of anti-competitive behavior is simply wrong,” Amazon said. A spokesman from Google said the company disagrees with the report and accused it of relying on” “outdated and inaccurate allegations from commercial rivals”. It said solutions offered in the report would “cause real harm to consumers”.
 
US House Judiciary Subcommittee:      Guardian:          Amazon:         BBC:        Congressman Ken Buck:
 
You Might Also Read: 
 
Is Big Tech 'Fixing' The US Election?:
 
 
« AI Is Evolving Into A Business Necessity
Big Regulatory Changes In Store For The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Caulis

Caulis

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

The IoT Academy

The IoT Academy

The IoT Academy is a reputed Ed-Tech Institute that provides training in emerging technologies such as embedded systems, the Internet of Things (IoT), Data Science and many more.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

ZeroGPT

ZeroGPT

ZeroGPT.com stands at the forefront of AI detection tools, specializing in the precise identification of ChatGPT-generated text.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.