recommended reading

FCC Blames Net-Neutrality Glitch on Budget Woes

FCC Chairman Tom Wheeler

FCC Chairman Tom Wheeler // FCC

The Federal Communications Commission is blaming a lack of funding from Congress after its website crashed on Tuesday due to an onslaught of outraged comments on net neutrality.

An agency spokesman said Congress has failed to give the agency enough money to upgrade its information-technology systems. The official said additional funding could help prevent similar backlogs and ensure that the public is able to share its views with the agency.

The technical problems forced the FCC to postpone the deadline for the first round of comments on the net-neutrality proposal until Friday at midnight.

Republicans seem more inclined, however, to move the agency's budget in the opposite direction.

The House is set to vote on an appropriations bill Wednesday that would slash $17 million from the FCC's budget. The funding level is $53 million below the president's requested budget.

President Obama issued a veto threat on the bill, which would also cut funding to other agencies such as the IRS.

At the committee vote last month, Rep. Ander Crenshaw, the chairman of a House Appropriations subcommittee, said cuts to various agencies were necessary because of a congressional budget cap. He said the legislation is "sufficient to fund priority programs while reducing funding for activities that are not essential to the operations of the federal government or that have a history of wasting taxpayer resources."

The FCC spokesman said the agency has now received a total of 780,000 comments on the controversial net-neutrality proposal.

The FCC first enacted net-neutrality regulations in 2010, but a federal court struck them down earlier this year. The agency is now trying to rework them in a way that can survive future court challenges. But the proposal from Chairman Tom Wheeler has sparked a massive public backlash because it would allow Internet service providers to charge websites for faster service in some cases.

The FCC's website also crashed earlier this year after comedian John Oliver blasted the proposal and urged Internet "trolls" to vent their rage to the FCC.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.