The Big US Tech Corporations Are A ‘Monopoly of Power’

report by the US House Judiciary Committee has advocated massive changes that would lead to the disintegration of some of large US tech companies. It states “The majority staff accurately portrays how Apple, Amazon, Google, and Facebook have used their monopoly power to act as gatekeepers to the marketplace, undermine potential competition, and pick winners and losers, all while simultaneously aligning up to unfriendly nations like China in order to further expand their global footprint " 
 
The historic investigation is the most significant effort to check big tech’s power since the government sued Microsoft for antitrust violations in the 1990s. It follows the committee’s lengthy inquiry into the effects of market dominance by major web platforms. 
 
While a number of Democratic lawmakers believe these firms have too much power but some Republicans also involved with the Report do not agree with the findings.  In a statement, Jim Jordan a Republican congressman, dismissed the report as "partisan" and said it advanced "radical proposals that would refashion antitrust law in the vision of the far left."  
 
Others have said they support many of the report's conclusions about the firms' anti-competitive tactics but that remedies proposed by Democrats go too far.
 
Monopoly Power
 
Because of their growing size the US tech companies, sometimes collectively known as FAANG (Facebook, Apple, Amazon, Netflix, Google) have become a focus of investigation. This investigation by the House Judiciary Committee is just one of a number of investigations into these large tech companies. The report accuses the companies of charging high fees, forcing smaller customers into unfavorable contracts and of using "killer acquisitions" to hobble rivals. 
 
It said the findings should prompt politicians to consider a series of changes. Those included stronger enforcement of existing competition law, as well as changes to limit the areas in which a firm may do business or prevent companies from operating as players in areas where they are the dominant provider of infrastructure, as Amazon does, for example, when it acts as both a seller and marketplace for other merchants.
 
The Report Says:
 
  • Facebook had "monopoly power" in the market for social networking, which it maintained by using its data advantage to "acquire, copy or kill" nascent threats. Facebook’s algorithms, advertising policies, and content moderation rules have all combined to discriminate against conservative viewpoints, shadow ban conservative organisations and individuals, and suppress political speech. The majority also left Twitter and its suppression of speech out of the investigation completely. 
  • Google used its dominant advertising technology product to demonetize conservative media outlets, including The Federalist. YouTube, a Google subsidiary, blocked videos from Republican politicians and media groups. Amazon censored conservative organizations, including the Family Research Council and the Alliance Defending Freedom by blocking Americans’ ability to donate to these groups through the AmazonSmile tool. 
  • Google monopolised online search and advertising using "a series of anti-competitive tactics", including privileging its own content ahead of other websites. 
  • Amazon possessed "significant and durable market power" in online shopping, which it furthered in part by "anticompetitive conduct in its treatment of third-party sellers" which it referred to as "internal competitors" behind closed doors.
  • Apple exerted monopoly power via its App store, which it leveraged "to create and enforce barriers to competition and discriminate against and exclude rivals while preferencing its own offerings".
Reaction
 
Amazon said in a statement that any actions against it “would have the primary effect of forcing millions of independent retailers out of online stores”, leaving consumers with fewer choices. “Large companies are not dominant by definition, and the presumption that success can only be the result of anti-competitive behavior is simply wrong,” Amazon said. A spokesman from Google said the company disagrees with the report and accused it of relying on” “outdated and inaccurate allegations from commercial rivals”. It said solutions offered in the report would “cause real harm to consumers”.
 
US House Judiciary Subcommittee:      Guardian:          Amazon:         BBC:        Congressman Ken Buck:
 
You Might Also Read: 
 
Is Big Tech 'Fixing' The US Election?:
 
 
« AI Is Evolving Into A Business Necessity
Big Regulatory Changes In Store For The Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Fortra

Fortra

Fortra (formerly HelpSystems) is your cybersecurity ally, unified through the mission of providing solutions to organizations' seemingly unsolvable cybersecurity problems.

Sistem Integra (SISB)

Sistem Integra (SISB)

SISB provide IT Security Infrastructure & Development, Mechanical & Electrical Services, Fire Safety & Detection Services, Facilities Management & Application Development.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Innova

Innova

Innova is Turkey's leading IT solutions company, providing platform independent solutions to organizations in telecommunication, finance, production, public and service sectors.

Aujus Cybersecurity

Aujus Cybersecurity

Aujas is a pure-play cyber security services company with deep expertise in Identity and Access Management, Managed Security and Security Testing services.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Secmation

Secmation

Secmation are an agile engineering services firm providing advanced DoD level security design and consultation services for both commercial and defense hardware and software applications.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Silverse

Silverse

At Silverse, we specialize in building a comprehensive cybersecurity journey, anchored by our extensive experience, industry expertise, and an ecosystem of trusted partners.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.