Feeds

Wrong scapegoat, 3G auction architect says

Why they remain a Good Thing

  • alert
  • submit to reddit

High performance access to file storage

Almost three years on, the carpers and cavillers are still complaining about the huge sums extracted from the telcos in the European 3G spectrum auctions. It is blamed for all manner of things, including the telecoms industry crisis, shareholder misery, wife-beating and crop failure.

At the time, some of us (OK, me) - at The Register thought the 3G spectrum auction was an impressive government funding mechanism. We (OK, me) hold this view still.

Much more eloquent is Paul Klemperer, Edgeworth Professor of Economics, Nuffield College, who advised the UK government on its 3G licence auction. This week, Klemperer conducted the defence of the effects of the 3G auctions, through the pages of the FT. The article is published in full (pdf) on his website (pdf).

Here is the potted version: First the opposition, as characterised by the prof.

The critics assume three things: that the telecoms companies paid more for the licenses than they thought the licenses were worh; that this expenditure has reduced investment in 3G; and that it destroyed market value."

Now, the defence: Of course, the licences look expensive. In retrospect many things do. But "like any other market, an auction simply matches willing buyers and willing sellers - it cannot protect them agains their own mistakes".

The 3G reduced investment argument is odd, Klemperer argues: "The auction fees are history; they have (almost) all been paid in full, cannot be recouped by cutting investment and make no difference to its profitability.

As for destruction in shareholder value in the telecoms sector, US companies have come out worse, even though no 3G auctions took place in the US. It seems a stretch to blame $700bn of shareholder misery on $100bn of shareholder fees.

Klemperer concludes: The main effect of the licence fees was simply to transfer $100bn from shareholders to certain European governments. This was both equitable, since the companies were buying a public asset that they valued this highly at the time, and efficient, since such a lump sum transfer is much more efficient than most forms of taxation. Efficient, equitable and voluntary government funding is not easy to find: perhaps we should be more enthusiastic about it.

And so say all of us(OK, me). ®

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.