Featured Posts

Blog
Otherwise Objectionable episode 6: ‘The Rest of the World’
The sixth episode of Otherwise Objectionable, the narrative-driven podcast that tells the true story of Section 230 of the 1996 Telecommunications Act, focuses on…

Blog
How valuable will anonymous comments be to the Ferguson FTC?
Comments to the Federal Trade Commission (FTC) for its “Inquiry on Tech Censorship” are due next month on May 21, 2025, and the public has…

Blog
Otherwise Objectionable episode 5: ‘Blowback, and the Dust Settles’
The fifth episode of Otherwise Objectionable, the narrative-driven podcast that tells the true story of Section 230 of the 1996 Telecommunications Act, recounts how the…
Search Posts
News Release
Free Market Think Tank Urges House to Reject Patriot Act Extension
Washington, D.C., February 8, 2011 – Today, the House of Representatives is scheduled to vote on an extension of three provisions of the Patriot…
News Release
FCC Presses Forward With Destructive Net Neutrality Rules
Washington, D.C., December 1, 2010—This morning, Federal Communications Commission (FCC) Chairman Julius Genachowski announced that the Commission will vote on net neutrality rules during…
News Release
The Open Internet and Lessons from the Ma Bell Era
Washington, D.C., August 19, 2010 — Earlier this week, The Daily Show’s Jon Stewart summed up the debate over net neutrality by stating, “On one…
Newsletter
Kagan Confirmed, Ford Motor’s Finances and Critiquing Obama’s Economic Policy
The U.S. Senate confirms Elena Kagan to be the next member of the Supreme Court. President Obama announced a $250 million government loan to Ford…
Newsletter
A Beer Stimulus, Comcast Merger Questions and Urban Beekeeping
A proposed “Beer Stimulus Bill” would reduce the federal excise tax that small brewers must pay. Yesterday lawmakers conducted a field hearing questioning “Who Benefits?”…
Citation
Wayne Crews on Cybersecurity and the Presidential “Kill Switch”
Competitive Enterprise Institute Director of Technology Studies Wayne Crews discusses the need for a decentralized and competitive approach of cybersecurity.