Featured Posts
Blog
A year end blessing: No net neutrality
As we approach the end of the year, it’s a natural time to reflect on what we’re grateful for. While many blessings come to mind,…
News Release
New CEI paper: FCC should stop regulating news content
The Federal Communications Commission (FCC) has long used its role in licensing spectrum to broadcast television and radio stations to regulate those outlets under the…
Blog
Free Speech Week: The speech that ignited a revolution — and still speaks to us today
A Richmond story, a Virginia legacy, and the American ethos Richmond is my home city. My family has lived in Virginia for generations, and our…
Search Posts
News Release
Free Market Think Tank Urges House to Reject Patriot Act Extension
Washington, D.C., February 8, 2011 – Today, the House of Representatives is scheduled to vote on an extension of three provisions of the Patriot…
News Release
FCC Presses Forward With Destructive Net Neutrality Rules
Washington, D.C., December 1, 2010—This morning, Federal Communications Commission (FCC) Chairman Julius Genachowski announced that the Commission will vote on net neutrality rules during…
News Release
The Open Internet and Lessons from the Ma Bell Era
Washington, D.C., August 19, 2010 — Earlier this week, The Daily Show’s Jon Stewart summed up the debate over net neutrality by stating, “On one…
Newsletter
Kagan Confirmed, Ford Motor’s Finances and Critiquing Obama’s Economic Policy
The U.S. Senate confirms Elena Kagan to be the next member of the Supreme Court. President Obama announced a $250 million government loan to Ford…
Newsletter
A Beer Stimulus, Comcast Merger Questions and Urban Beekeeping
A proposed “Beer Stimulus Bill” would reduce the federal excise tax that small brewers must pay. Yesterday lawmakers conducted a field hearing questioning “Who Benefits?”…
Citation
Wayne Crews on Cybersecurity and the Presidential “Kill Switch”
Competitive Enterprise Institute Director of Technology Studies Wayne Crews discusses the need for a decentralized and competitive approach of cybersecurity.