Feeds

US senator accuses FCC of rigging 700MHz auction

Kevin Martin's ménage à trois

5 things you didn’t know about cloud backup

Wireless watchers are still waiting for the final results of the The Great American Wireless Auction, but that hasn't stopped at least one US Senator from dubbing the FCC's $20bn bid-off "a disaster".

Yesterday, as bids continued to trickle in for the so-called 700-MHz band - a juicy portion of the US airwaves - Senator Mark Pryor told a room full of radio and TV people that Federal Communications Commission chair Kevin Martin has really fouled things up. So says Broadcasting & Cable.

You see, Pryor (a Democrat from Arkansas) doesn't like Martin (a Republican from North Carolina). "Maybe it’s always been this way," Pryor told the National Association of Broadcasters' State Leadership Conference. "But under [Martin’s] leadership, [the FCC] seems particularly secretive, and he carries an agenda into their agenda."

We don't know what that means either. But then he said this: "History will show that the way the FCC structured the auction basically helped the two big wireless companies to the detriment of competition in this country."

Naturally, he means Verizon and AT&T. He's sure that the FCC allowed these telco behemoths to outbid smaller companies and "basically just control the auction after that."

How's does he know this? We aren't quite sure. The FCC won't release the names of winning bidders until after the auction is over, and Pryor's press officer didn't return our phone calls.

That said, we feel the need to point out that where auctions are concerned, big companies often outbid smaller companies. After all, they have more money.

It's also worth noting that once you win a chunk of wireless spectrum, it takes even more money to actually build a network. When it comes to the most coveted portion of the 700-MHz band - the officially "open access" C Block - it only makes sense that a large company would win the day.

The real question is whether the world's largest search engine made a serious play for the C-Block. Google has flirted with the block for months, but many believe this was merely an effort to force that open access requirement into place. "Google doesn't want the C Block," the voices say. "It wants to make sure the C Block provides access to any device and any application - Internet-style."

Clearly, two wealthy companies put down large bids for the C Block, and recently, we speculated that those companies were Google and Verizon. But one well-informed source tells us that we'll "be surprised" when the bidders are finally revealed. .

Bidding on the C Block is basically finished. But we're still waiting on other parts of the spectrum. In all, the FCC has already raked in close to $20bn. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
EE plonks 4G in UK Prime Minister's backyard
OK, his constituency. Brace yourself for EXTRA #selfies
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.