recommended reading

Former FCC Official to Head Cellphone Lobby

Meredith Attwell Baker, a former FCC commissioner, will head CTIA

Meredith Attwell Baker, a former FCC commissioner, will head CTIA // Flickr user icannphotos

Verizon, AT&T, and the other cellphone service providers have a new top lobbyist.

Meredith Attwell Baker, a former member of the Federal Communications Commission, will be the new CEO of CTIA-The Wireless Association, the group announced Wednesday.

Baker, a Republican, was a target of fierce criticism from consumer groups when she stepped down from the FCC in 2011 to become a lobbyist for Comcast. Although top government officials often join the influence industry, Baker's move was considered particularly ostentatious because she joined Comcast just four months after voting to approve the cable giant's purchase of NBC-Universal.

Comcast is now ramping up its lobbying force to get permission to buy Time Warner Cable. Losing Baker will be a blow, but the company still has an impressive roster of lobbyists, including former Sens. Blanche Lincoln and Don Nickles and former Reps. Robert Walker and Ron Klink.

At CTIA, Baker will replace Steve Largent, a Republican, former Oklahoma congressman, and NFL Hall of Fame wide receiver who announced his plan to retire last October.

The explosive growth of the wireless industry over the past decade has helped CTIA become one of the most influential lobbies in Washington. A top priority for the group is to gain access to more airwaves for the industry. Surging demand for wireless data could lead to congestion and slower speeds for smartphones in the coming years.

In a statement, Baker said she will develop a five-year plan for future use of the airwaves, and will put more emphasis on technical and engineering expertise at the group. 

"I plan to bring new ideas and new initiatives to the association that will take it from good to great. We will recruit and keep the best and brightest experts in spectrum and wireless communications," she said.

Baker will have to balance the competing interests of her group's members. AT&T and Verizon are frequently at odds with the industry's smaller players, such as Sprint and T-Mobile.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.