recommended reading

Obama's FCC Pick Has Some Surprising Allies

Barack Obama presented Tom Wheeler Wednesday at the White House.

Barack Obama presented Tom Wheeler Wednesday at the White House. // Jacquelyn Martin/AP

It's official: Obama has just nominated Tom Wheeler to be America's next top telecom regulator. Wheeler, a former wireless and cable lobbyist, might on paper be seen as a boon to industry and a blow to public-interest groups. The fear among critics is that Wheeler's ties to big business could threaten consumers. But in fact, the battle lines on Wheeler's confirmation process aren't hardening in a predictable way at all.

Consumer advocates themselves are somewhat divided on the pick. On Tuesday, Sascha Meinrath of the New America Foundation said he was "skeptical" of Wheeler's ability to "[hold] his former clients accountable." At the same time, a number of high-profile influentials have spoken out in Wheeler's favor -- including Susan Crawford, a professor at Cardozo Law School who was said to be in the running for FCC chair herself.

Crawford often finds herself at odds with industry in her role as an outspoken defender of consumers, making the split among public-interest groups all the more noteworthy. But Gigi Sohn, the president and co-founder of Public Knowledge, said Wheeler's left-wing critics simply don't know him well enough and that he plans to be more than a "traffic cop" with little actual power over policymaking and regulation.

"They've never worked with Tom Wheeler," said Sohn. "They're just going off his resume. And I just don't think a resume tells you everything."

Sohn was quick to downplay the divide among consumer advocacy groups, but as a parting shot drew comparisons between Wheeler and sitting commissioner Mignon Clyburn, whom many initially opposed over ties that her father, Rep. Jim Clyburn, had with AT&T.

"We were convinced she was going to be an AT&T toadie," said Sohn. "We assumed the worst about Clyburn and we were totally wrong."

Obama's decision also sets up a theoretical confrontation with Senate Democrats, who rallied not behind Wheeler but behind a sitting commissioner, Jessica Rosenworcel. Last month, Commerce Committee chairman Sen. John Rockefeller and dozens of his colleagues sent a letter to the president recommending Rosenworcel for the top FCC post. Yet there, too, Wheeler's name brings with it a sense of inevitability. Despite both the opportunity and a motive for making Wheeler's confirmation a difficult process, Rockefeller isn't likely to stand in the way.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.