Feeds

Minister intervenes in Oz spectrum auction

‘Red undies day’ arrives

The Power of One Infographic

Australia’s communications minister, Senator Stephen Conroy, who famously told Australian telcos they’d wear red undies on their heads if he told them to, has stepped into the auction process for new mobile spectrum.

His intervention comes amid speculation that the troubled state of Vodafone would leave Telstra and Optus as the only bidders – and thereby prevent the spectrum from being the river of gold the government hopes for.

Late yesterday, Senator Conroy issued this terse ministerial direction. It simply states that the Australian Communications and Media Authority’s normal power, under the spectrum allocation process, to set the reserve price is subject to the minister’s power.

As noted in industry newsletter Communications Day, the direction will delay the auction process, since the ACMA was due to issue information packs today (November 21).

The minister was the target of criticism after telling a conference in September that his ministerial powers mean he could direct carriers to wear “red undies” on their heads if he felt like it.

The auction process covers new spectrum in the 700 MHz and 2.5 GHz bands, including so-called “digital dividend” spectrum vacated by broadcasters in the move to digital TV in Australia. With the government implacably tied to a political commitment to deliver a budget surplus next year regardless of international economic conditions, anything less than the hoped-for billions would be a disaster. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.