- Market power — Rights — Internet — Technology
18.01 We have explored the acquisition and use of personal data to obtain significant market power. Data-driven mergers and network effects, as we have seen, are two important ways to obtain power. A third way is data-driven anticompetitive exclusionary and predatory behaviour, our focus here.
18.02 This chapter cuts through the rhetoric of the virtues of monopolies and inapplicability of antitrust in dynamic industries. The harm from data-driven monopolies can be greater and longer lasting. The chapter explores the issue of path dependence and competitive portals, namely critical inflection points when antitrust can make a key difference. Moreover, Big Data can provide some dominant firms with a ‘Nowcasting Radar,’ which makes them more dangerous than past monopolies. Thus another signpost of progress is when competition authorities, to protect society from these harms, become more proactive in identifying and challenging anticompetitive data-driven strategies that monopolies use to maintain or attain their power.
A monopoly like Google is different. Since it doesn’t have to worry about competing with anyone, it has wider latitude to care about its workers, its products and its impact on the wider world. Google’s motto—‘Don’t be evil’—is in part a branding ploy, but it is also characteristic of a kind of business that is successful enough to take ethics seriously without jeopardizing its own existence. In business, money is either an important thing or it is everything. Monopolists can afford to think about things other than making money; non-monopolists can’t. In perfect competition, a business is so focused on today’s margins that it can’t possibly plan for a long-term future. Only one thing can allow a business to transcend the daily brute struggle for survival: monopoly profits.
(p. 278) … the world we live in is dynamic: We can invent new and better things. Creative monopolists give customers more choices by adding entirely new categories of abundance to the world. Creative monopolies aren’t just good for the rest of society; they’re powerful engines for making it better.1
18.04 Some large tech firms have joined the chorus for non-intervention in dynamic markets. They raise the risk of false positives. The Four Horsemen of the Apocalypse arising from governmental intervention are chilling innovation; chilling investment; protecting competitors, rather than competition; and public choice theory of how companies manipulate competition authorities to punish rivals or erect entry barriers. For some, these Four Horsemen are so scary, that the company gets a pass, whenever it can show any efficiency from its anticompetitive behaviour (even if the efficiency is as little as one dollar, euro, yen, or pound).
18.05 There is no empirical support that monopolies—whether in dynamic or static industries—are generally good for society.2 As Professor Baker notes, the claim that monopoly enhances incentives to innovate ignores important ways that greater competition enhances these incentives. Thus firms often increase research and development investment in response to greater investment by their rivals. The claim also ignores the ability of firms exercising market power to restrict, deter, or eliminate new forms of competition through exclusionary conduct. ‘To relax antitrust rules on the rationale that one firm is enough for competition, in rapidly changing high-technology markets or otherwise, would undermine innovation incentives under the guise of protecting them’.3 Ensuring a multiplicity and diversity of independently innovating firms can promote the search for new problem solutions, safeguard the effectiveness of competition as a process of parallel experimentation and mutual learning, and enable faster adaptation to exogenous shocks.4
(p. 279) 18.06 The US and EU competition laws seek to prevent mergers that create monopolies. But in neither jurisdiction are monopolies guilty for being a monopoly: ‘it is not in itself illegal for an undertaking to be in a dominant position and such a dominant undertaking is entitled to compete on the merits’.5 To be liable, the monopoly must monopolize, that is engage in unfair anticompetitive practices. The EU law is arguably broader than the US law in that the dominant firm has ‘a special responsibility not to allow its conduct to impair genuine undistorted competition on the common market’.6 Under EU law, unlike in the US, a dominant firm could be liable for charging an excessively high price.7 Nonetheless, in both jurisdictions, the emphasis is on ‘safeguarding the competitive process’ and ensuring that dominant firms ‘do not exclude their competitors by other means than competing on the merits of the products or services they provide’.8 Thus, both the US and EU are mindful that ‘what really matters is protecting an effective competitive process and not simply protecting competitors’.9 The expectation is that competitors ‘who deliver less to consumers in terms of price, choice, quality and innovation will leave the market’.10
18.07 Nor is there any empirical support that many companies with market power are now cowering in fear of improving their products so as to not raise antitrust concerns. Google and Apple, for example, were caught colluding. They agreed with their competitors not to poach each other’s employees in order to depress wages.11 So if they are violating antitrust’s per se illegal offences, one wonders how seriously they are worried about abusing their dominant position. Moreover, as we shall see, the US, unlike the EU, has been less willing to intervene in technology markets and pursue dominant companies for potential abuse.
18.08 When competition authorities investigate new, technologically dynamic markets, one response is that the competition laws are inapposite. Microsoft argued—unsuccessfully—in the 1990s that the competition laws were ill-suited for its fast-moving tech market. The argument is that competition comes from surprising sources, so the monopolist needs to continually innovate for fear of the next competitive threat. Few, if any, anticipated Facebook’s and Google’s significance, when the US Department of Justice (DOJ) prosecuted Microsoft in the 1990s, just as few anticipated Microsoft’s dominance when the DOJ prosecuted International Business Machines Corporation (IBM) in the 1970s. If innovation comes from unexpected sources, then competition officials and the public need not worry about monopolistic abuses, since the next disruptive innovator is currently tinkering away in some lab, garage, basement, or attic.
As the record in this case indicates, six years seems like an eternity in the computer industry. By the time a court can assess liability, firms, products, and the marketplace are likely to have changed dramatically. This, in turn, threatens enormous practical difficulties for courts considering the appropriate measure of relief in equitable enforcement actions, both in crafting injunctive remedies in the first instance and reviewing those remedies in the second. Conduct remedies may be unavailing in such cases, because innovation to a large degree has already rendered the anticompetitive conduct obsolete (although by no means harmless). And broader structural remedies present their own set of problems, including how a court goes about restoring competition to a dramatically changed, and constantly changing, marketplace.12
18.10 But these challenges, the DC Circuit added, did not mean that the competition laws no longer play an important role in curbing abuses by dominant firms in dynamic markets; nor should courts assume this in assessing the case’s merits.13
18.11 One problem is that the dynamic disruption, especially in markets characterized by network effects, can take a long time. Suppose someone devises a better search engine or social network. With data-driven network effects, the innovations of ‘one’ will not immediately convert the many.
(p. 281) 18.12 To illustrate, Microsoft benefits from network effects in the personal computer operating system market.14 It still commanded in 2015 a worldwide share of 90.85 per cent in that market. The threat to Microsoft’s core business, which is built around personal computers, comes not from other PC operating systems, but from mobile phones and tablets. Benefitting from several data-driven network effects, Google continues to dominate the search market, despite Microsoft’s reportedly investing in 2010 over USD 4.5 billion into developing its algorithms and building the physical capacity necessary to operate its rival search engine Bing. Facebook identifies numerous competitors, including Google+ and other, largely regional, social networks that have strong positions in particular countries.15 Nonetheless, benefitting from several network effects, Facebook continues growing. In December 2014, it had on average 890 million daily active users, an 18 per cent increase from December 2013; on average, 745 million daily active users accessed Facebook from a mobile device, a 34 per cent increase from December 2013.16 Both Google’s and Facebook’s average revenue per user (ARPU) has steadily increased in the US, Canada, Europe, and Asia.17 Google’s and Facebook’s dominance on the free side enable both companies to significantly profit from their advertising platforms: Google’s net income in 2014 was USD 14.4 billion.18 Facebook’s net income was USD 2.925 billion.19
18.13 As new products or technologies are introduced and existing products evolve, the dominant platforms may become subject to additional competition. Nonetheless, monopolies can persist, even in tech industries. There is no reason why consumers should suffer from monopolistic abuses while waiting for the next big thing.
18.14 Another assumption is that potential competitors will materialize and veer the market towards its natural competitive equilibrium (and what the market would have looked like absent the monopolistic restraints). So, yes, the monopoly temporarily causes harm, but dynamic disruption will shepherd us to the new competitive equilibrium where we would have been (but for the monopoly).
(p. 282) 18.15 This may be true for homogeneous goods, where price is the key parameter of competition. The monopoly elevates the price of bolts, entrants lower the price. The bolts remain the same, but their price differs. In tech industries, the assumption goes further: innovators will materialize whatever competition officials and monopolists do, or do not do, and bring us the innovations that would have occurred but for the monopoly. Indeed, the race may be for the entire market, not just a piece of it, so the incentives to derail a monopoly are said to be even greater.
THOMASINA: … the enemy who burned the great library of Alexandria without so much as a fine for all that is overdue. Oh, Septimus!—can you bear it? All the lost plays of the Athenians! Two hundred at least by Aeschylus, Sophocles, Euripides—thousands of poems—Aristotle’s own library! … How can we sleep for grief?
SEPTIMUS: By counting our stock. Seven plays from Aeschylus, seven from Sophocles, nineteen from Euripides, my lady! You should no more grieve for the rest than for a buckle lost from your first shoe, or for your lesson book which will be lost when you are old. We shed as we pick up, like travellers who must carry everything in their arms, and what we let fall will be picked up by those behind. The procession is very long and life is very short. We die on the march. But there is nothing outside the march so nothing can be lost to it. The missing plays of Sophocles will turn up piece by piece, or be written again in another language. Ancient cures for diseases will reveal themselves once more. Mathematical discoveries glimpsed and lost to view will have their time again. You do not suppose, my lady, that if all of Archimedes had been hiding in the great library of Alexandria, we would be at a loss for a corkscrew?20
18.17 The exchange raises the issue of path dependence and competitive portals, namely critical inflection points when antitrust can make a difference. Under Septimus’s perspective, high tech products and services are like bolts. Path dependencies play a minor role; we eventually arrive at the same competitive equilibrium and enjoy the same innovations (with or without the monopoly). So monopolies, like the destruction of the Library of Alexandria, do not impose any long-term harm. Thomasina is less confident. For her, under an evolutionary economic process, ‘chance plays a significant role’, and ‘small, random (and therefore unpredictable) events may have severe long-run consequences’.21 We may not recover what was lost (by the fire or abuses of a dominant firm).
(p. 283) 18.18 A personal observation are the three adjacent Connecticut rivers: the Housatonic, Shepaug, and Naugatuck. Over time, the persistence of random events—such as a failed company, a leak in a canal, and the growth in demand for brass—accumulated leading to completely different outcomes among the three rivers.22 Today, the bucolic Housatonic and Shepaug Rivers in northwestern Connecticut attract trout anglers, kayakers, and hikers along their heavily wooded banks; the Naugatuck is industrialized. If the history tape was rewound, and random events unfolded differently (say the canal in Falls Village did not leak), the situation today among the three rivers might differ, and walking along the Housatonic may be less inspiring.
18.19 This may be especially true in complex adaptive industries, such as many tech industries. When the competitive portals are open, entry, expansion, or random events during these periods of competitive opportunity can foster significant innovation. On the other hand, a dominant firm may use its market power to close the competitive portals. Thus abuse of dominance, if unchecked, may have greater negative implications beyond that immediate industry and timeframe. The long-run consequences of monopolistic practices may not simply be higher prices, but foregone innovations. So, like some great works lost in the Library of Alexandria that, contrary to Septimus’s belief, were never recreated, so too one price we may pay—when monopolies are unchecked—are innovations foregone.
18.20 Policymakers generally recognize the economist Joseph Schumpeter’s ‘creative destruction’ thesis that capitalism ‘is by nature a form or method of economic change and not only never is but never can be stationary’.23 Many accept that competition from new commodities, technologies, sources of supply, and organizational structures can be more important than static price competition. The difficulty lies in predicting where and when this innovation will emerge and what motivates this innovation.
18.21 More recent economic theory (building on Schumpeter’s disequilibrium dynamics) has identified the shortcomings of neoclassical economic theory in explaining industries where technological change drives economic growth. As economist (p. 284) Douglass North noted in his Nobel Prize speech, ‘Neoclassical theory is simply an inappropriate tool to analyze and prescribe policies that will induce development.’24 Neoclassical economic theory assumes static equilibrium systems. When subject to an exogenous force (entry, government regulation, new technology, energy crisis), this equilibrium is disrupted temporarily. But neoclassical theory does not explain how markets develop.
18.22 Instead many markets may be complex adaptive systems. Firms, as individuals, make mistakes, readjust, and undertake new strategies. The competitive process ‘is inherently a process of trial and error with no stable end-state considered by the participants in the process.’25 And innovation and dynamic forces may need competitive portals, ie windows of opportunity.26
18.23 To illustrate competitive portals, let us consider whether the former AT&T and IBM monopolies still affect us today. Would our current technological developments exist if AT&T’s and IBM’s monopolies went unchallenged during the 1970s? Can we really say that the level of innovation would be the same today if the DOJ never prosecuted these monopolies?
18.24 The DOJ’s break-up of AT&T is considered one of antitrust’s success stories in unleashing innovation.27 Less clear is IBM. The Reagan administration famously sacked the DOJ’s 13-year-old investigation into the computer monopoly. In a memo to Reagan’s Attorney General, John Roberts (before he was Chief Justice of the US Supreme Court) discussing an upset conservative’s upcoming visit: he ‘will doubtless arrive with many criticisms of the Department for not advancing conservative ideals’. Among the points Roberts mentioned: ‘More reasonable [approach] to antitrust law, epitomized in the dropping of the IBM case’.28 One scholar called the government’s case ‘the greatest waste of resources in the history of antitrust enforcement’.29 Some might say that IBM’s computer dominance (outside mainframes), with or without any antitrust investigation, was destined to be eclipsed—and cite the Wintel combination of Microsoft’s Windows operating system and Intel microprocessors.
(p. 285) 18.25 But one issue is whether the DOJ’s antitrust investigation opened the competitive portal that facilitated Microsoft’s growth. In the late 1960s, IBM controlled about 70 per cent of the computer market. After the DOJ challenged IBM’s practices, particularly its ‘bundling’ hardware and software, IBM changed course. This led to the development of the computer software industry. As IBM’s second president Thomas J Watson, Jr wrote, ‘[p]recipitated by a massive antitrust complaint filed against IBM by the Justice Department in January 1969, the company reexamined its practices and decided to stop requiring customers to buy software, services, and hardware as one bundle in June of the same year. This pricing change opened up software markets to independent companies.’30
18.26 A decade later, when preparing to launch its personal computers, the still dominant IBM approached the start-up Microsoft about creating a version of a BASIC computer program. Microsoft suggested that IBM talk to Digital Research, whose CP/M operating system had become the standard for computer hobbyists. One account is that Digital Research’s president apparently disliked the arrogant IBM from his university days and was late in meeting the IBM executives. After the negotiations stalled, IBM returned to Microsoft to create an operating system for its personal computer. When introducing its personal computer, IBM sold the Microsoft operating system for a much lower price than the CP/M-86 system.31
18.27 So one cannot assume that with or without antitrust enforcement, Microsoft (or some other operating system) would have become dominant by the 1990s. If anything, the DOJ’s investigation of IBM, it appears, opened a competitive portal, namely IBM’s decision to unbundle software from its computers, which enabled software development to flourish.
18.28 Before the Big Data era, dominant tech firms were less aware of what their customers and rivals were doing (or planning to do). As Chapter 2 discusses, some platforms have a relative advantage in accessing and analysing data to discern consumer trends well before others. As we saw, companies can nowcast, ie, ‘predict the present’ by using search inquiries, social network postings, tweets, etc. Nowcasting (p. 286) can yield a competitive advantage. Hedge funds, for example, are nowcasting to see in real-time how market forces are affecting portfolios, such as how many cars are in the Wal-Mart parking lots across the country.32 In monitoring search queries, Google can predict flu outbreaks well before the government health agencies can. Twitter’s data can help companies identify emerging trends. Google and Apple, in controlling the mobile phone app stores, immediately know when users download rivals’ apps. As the UK competition authority observed,
A number of third party firms also now offer tools and services that enable first parties to gain insights on how their brands and products are being discussed online (sometimes referred to as ‘social listening’, ‘opinion mining’ or ‘sentiment tracking’). By analysing the extent to which they are mentioned in social media content (such as blogs, microblogs, forums, news sites and social network sites), whether trends are positive or negative and why, firms can adjust their marketing activity.33
18.29 Nowcasting represents a potent data-based weapon, not previously available for monopolies, to monitor new business models in real-time. The data-opoly can use its relative advantage in accessing and processing personal data (such as watching for trends in its proprietary data from posts on a social network, search queries, emails, etc) to quickly identify (and squelch) nascent competitive threats. The dominant firm can acquire entrants before they become significant competitive threats or blunt the entrant’s growth (such as manipulating its search engine results to make it harder to find the company34). For example, Facebook warns its investors that its ‘[p]latform partners may use information shared by our users through the Facebook Platform in order to develop products or features that compete with us’.35
18.30 Thus, it is as if the monopoly invented a radar system to monitor in real-time the competitive portals. It can track nascent competitive threats shortly after they take off, and intercept or shoot them down long before they become visible to regulators and others. Moreover, the courts and agencies, if they follow the UK competition authority’s logic in Google/Waze, will find that the distant planes (p. 287) pose potential (yet speculative) threats, and will have insufficient evidence to prove that competition was likely harmed. The monopolist, however, is not troubled by the overall welfare effects in shooting down or intercepting the planes. Granted, the monopolist may damage its reputation, if it acts too brazenly, but reputational concerns generally do not inhibit some monopolies from raising prices. For entrants, there is the potential reward of being acquired. But there are also casualties when the monopoly shoots down others. If the blown-up planes come easier to mind, then some potential entrants (or funders), under the availability heuristic, may amplify the risk, and decide not to leave the runway. And the competition authority cannot force (or incentivize) entrants to fly towards the monopolist armed with this radar.
• first ‘how the control of personal information contributes to market power in the digital economy and the implications for data protection’ and
• second ‘the risks to the consumer posed by concentrations and the abuse of market dominance where firms process massive amounts of personal data’.36
18.33 Competition law, when effectively enforced, can deter exclusionary and predatory practices and keep competitive portals open. After all, it is easier for the creative destruction to breeze through a window screen than topple a concrete wall.
18.34 Big Data, as we saw, can confer power and a durable competitive advantage.37 Data-driven network effects can improve the product’s or service’s quality. Firms like Google thrive (and serve their users) by gathering as much data as possible to personalize search results. At times, consumers benefit from this competitive rivalry and drive to maintain a data-advantage. Companies innovate to expand their (p. 288) platform of services to secure a greater following. No one, for example, questions Google’s investment in technology.38
18.35 But when the stakes are greater, so too are the incentives to engage in unfair practices to tip the market in one’s favour and maintain a monopoly.39 Consequently, competition authorities must be alert to dominant companies’ unfair practices to thwart competitors and disruptive innovators. We outline below several potentially anticompetitive data-driven tactics.
18.36 One historic concern is when a monopoly, through exclusive dealing, deprives its rivals of a needed resource. For example, aluminium producers to extract aluminium from alumina, require a ‘very large amount of electrical energy, which is ordinarily, though not always, most cheaply obtained from water power’.40 To foreclose other aluminium producers, Alcoa in its contracts with several hydro-power companies, illegally added covenants binding the power companies not to sell or let power to anyone else for the manufacture of aluminium.41
18.37 Likewise, the European Commission considers that ‘such input foreclosure is in principle liable to result in anti-competitive foreclosure if the exclusive supply obligation or incentive ties most of the efficient input suppliers and customers competing with the dominant undertaking are unable to find alternative efficient sources of input supply’.42
18.38 Data in our industries is a critical input. Thus one obvious concern would be for a dominant firm to foreclose its rivals’ timely access to critical data. The DOJ had this concern in the Google/ITA Software case, where it prevented Google post-merger from restricting, through exclusive dealing, its rivals’ access to the airlines’ seat and booking class data.43 And in a merger between advertising firms, the European Commission inquired whether the competitors would still have access to ‘big data’ from other providers if post-merger, the merged entity were to develop its own ‘big data’ analytics platform, and deny access to its competitors.44
18.39 As the US Court of Appeals for the Eleventh Circuit noted in 2015, a monopoly can violate section 2 of the Sherman Act when its exclusive dealing programme deprives smaller rivals of ‘distribution sufficient to achieve efficient scale, thereby raising costs and slowing or preventing effective entry’.45 So too a dominant data-driven company can use exclusionary tactics to prevent rivals from achieving the minimum efficient scale.46 Scale, as Chapter 12 discusses, can be especially important in data-driven industries, such as search and search advertising. We saw, for example, how increasing the volume of both ‘tail’ and popular search queries can improve the quality of the search algorithm’s results. In unfairly preventing smaller rivals and potential entrants from accessing critical data, the dominant firm can use the network effects (learning-by-doing, scope, and spill-over effects) to widen the quality gap over rivals, attract more users and advertisers, and expand its platform.47
18.40 The Federal Trade Commission (FTC) Bureau of Competition staff, from the released portions of its inadvertently produced report, recommended suing Google for several unfair practices. (The FTC Commissioners instead closed the investigation after Google voluntarily agreed to change some practices.) The FTC legal staff discussed the competitive significance of data and ‘substantial scale effects’ in the Internet search, search advertising, and search syndication markets.48 One alleged anticompetitive practice was Google’s use of exclusivity provisions to prevent its rival Microsoft from achieving scale, including the volume of search queries it received. Google used contractual restrictions, according to the FTC legal staff, to deny Microsoft critical scale and impair its ability to compete effectively in the markets for general search and search advertising.49
(p. 290) 18.41 One can access a search engine in various ways, such as the browser one uses. Twenty companies (including AOL), the FTC legal staff found, account for 90 per cent of all search query volume. To steer users to its search engine, a search engine provider (like Google, Microsoft, or DuckDuckGo) can enter into distribution agreements with these entry points, namely hardware manufacturers, independent software vendors, and Internet service providers, ‘to distribute toolbars and establish default settings that direct user searches to [its] search engine’.50 Google, the FTC legal staff reported, had exclusive or restrictive agreements with four of the top five companies, and 12 of the top 20.51 Google, for example, is the default engine on Apple’s Safari Internet browser. Google reportedly paid Apple USD 82 million in 2009, and USD 1 billion in 2013 and 2014 for this partnership.52 Google’s internal documents, the FTC legal staff found, showed that ‘Google’s interest in renewing deals with some of its largest syndication customers may have been, in part, to keep Microsoft from gaining scale’.53 Interestingly, Amazon decided it was in its long-term interest to funnel some query volume to Microsoft’s Bing, even if it was losing money on each query.54 One wonders why others did not do this. Perhaps, as the European Commission generally noted from its market investigation, the distributors’ major concern was Google’s bargaining power.55
18.42 We saw in Chapter 9 how the regulated French energy monopoly GDF Suez was using its vast customer database to target customers in the unregulated market with deals on gas and electricity.56 Since 2007, French gas customers could opt for the regulated tariffs, which only the incumbent operator GDF Suez offered, or the ‘market’ offers, which GDF Suez and its new rivals offered. In making its market offers, GDF Suez had an unfair advantage over its rivals. It was using the data it collected as a regulated monopoly to target customers with customized offers based on their usage. The personal data in question was commercially valuable. (p. 291) With the data a company could precisely locate gas consumers, identify their consumption level, and propose offers better suited to their profile.57 The data was unavailable to the monopoly’s competitors. Nor could the competitors replicate this data. Moreover, the database was not the ‘product of a specific innovation that GDF Suez may have introduced’ but was ‘merely inherited from its former status as monopolistic gas supplier’.58 GDF Suez was found in 2014 to have abused its dominant position.
18.43 In a similar case, the Belgian Competition Authority in 2015 fined the National Lottery EUR 1,190,000 for abusing its dominant position when launching its sports betting product Scooore!59 Here, too, the defendant used the data it collected as a legal monopoly in organizing public lotteries to enter the sports betting market. The monopoly used the contact details of persons registered in its database to email them about launching Scooore! The National Lottery ‘did not acquire these contact details following competition on the merits but in the context of its legal monopoly’.60 Nor could competitors reproduce the data ‘at reasonable financial conditions and within a reasonable period of time’.61
18.44 In both cases, the dominant firm acquired the data through its legal monopoly. Monopolies in other industries may distinguish these cases. For example, they might have amassed the data following competition on the merits, such as an innovative app. That would be a closer call. But if the firm used other unfair tactics to attain or maintain its dominant position, then arguably using the valuable consumer data from its illegally maintained or attained monopoly is not competition on the merits. Even here, the competition authority must show why competitors could not reproduce the data under reasonable financial conditions and within a reasonable time period.
18.45 To maintain its data-advantage and prevent rivals from attaining scale, a monopoly may make it harder for its customers to leave. Customers, if they are locked-in, will continue to supply the monopoly (rather than its competitors) with data. The basic (p. 292) premise is that as the time and cost needed to switch products or services increase, the greater the customer is locked-in, the harder it will be for rivals to attract users and achieve scale. This is especially the case where consumers cannot readily predict the long-run costs in using that platform or its quality levels over time.62
18.46 Network effects, as we saw, can increase users’ switching costs. For example, users concerned over Facebook’s privacy policies may want to switch to another social network. But unless they can get their friends, family, and acquaintances to switch, they will likely stick with Facebook (if they continue using a social network). This lock-in effect, by itself, does not violate the competition law. Other users’ utility can increase as more join the social network, as they have more people to befriend online.
18.47 But a firm can abuse its dominant position by undertaking additional actions, the net effect of which is to increase users’ switching costs and the firm’s power. One way, in the European Commission’s case against Microsoft, is to reduce the interoperability with other systems or platforms.63 Likewise, in its Facebook/WhatsApp investigation, the Commission inquired, among other things, whether:
• users of the consumer communications apps were locked in to any particular physical network, hardware solution, or anything else that needed to be replaced in order to use competing products;
• the parties controlled and limited the portability of users’ data; and
• the parties had any means to preclude competitors from recreating a user’s network on the parties’ applications.64
18.48 Presumably, if the answer was yes, the risk of anticompetitive unilateral conduct increases. Facebook and WhatsApp users, the European Commission concluded, could easily port their contact data to other texting apps. (Moreover, texting data, the Commission found, had little long-term value.) But if consumers invested a lot of time and effort in the service, such as a homepage with photos, timeline, updates, etc, and the dominant firm blocked customers’ ability to port their data, when data portability was technologically feasible, that would raise antitrust concerns.
18.50 We saw in Chapter 14 why platforms are worth billions, while apps are worth millions. Apple and Google have significant power in effectively controlling the respective mobile operating systems iOS and Android.65 Both Google and Apple have business interests in ‘targeted advertising’ and ‘run the two biggest services, by revenue, for putting advertisements on mobile phones’.66 Google especially relies on personal data for maintaining a competitive advantage for advertising.67 As such, they have a greater incentive to prevent the personal data being diverted (as well as individuals’ using rival apps). To maintain and secure fresh sources of valuable data, Apple and Google have greater opportunities to introduce their own applications and foreclose rival applications on their smartphone platforms. Thus there is a greater risk of exclusionary behaviour.68
18.51 Competition authorities are sensitive to vertical integration by a dominant platform operator (ie where it also becomes a seller on its platform). The platform’s incentives now change, as it may earn greater profits by steering users and advertisers to its own products and services to the detriment of rival sellers (and contrary to consumers’ wishes). The platform has a ‘frenemy’ relationship with the independent application developers.69 The platform and independent apps are friends—in that both (p. 294) benefit as more users and complementary software developers are attracted to that platform, as opposed to rival platforms. Such will be the case when it is costly or time-consuming for independent software developers to customize, promote, and update their apps across multiple platforms or where one platform imposes greater restrictions on functionality, terms of sale, advertising, etc. The platform operator, however, is also competing with the independent software developer’s app, and thus an enemy.70 As the Organisation for Economic Co-operation and Development (OECD) warned, the platform owner ‘may seek to exclude third-party applications developers, either to protect its own vertically integrated applications subsidiary or to prevent the emergence of a potentially competing platform’.71
• the parties controlled any essential parts of the network or any mobile operating system; and
• the parties’ applications were pre-installed on a large base of mobile phones, tablets, or PCs, and if so whether ‘status quo bias’ could potentially affect consumers’ choices.72
18.53 Likewise, Facebook in 2015 warned investors of the risk of the dominant mobile platforms inhibiting Facebook’s apps or preferring their own programs or services.73 So did Twitter, LinkedIn, Yelp, and smaller online platforms, like Coupons.com. They all noted their dependence on the Apple and Android mobile platforms.74 They recognize that web usage is increasingly shifting to mobile platforms such as smartphones and other connected devices.75 Their business growth and success depend on their interoperability with the popular mobile operating systems that they do not control.76 So one significant business risk is if the mobile super-platforms—Apple (p. 295) and Google (and to a much lesser extent Microsoft)—change the mobile operating systems that degrade the functionality of the independent apps and online platforms—like Twitter, Yelp, or Coupons.com—or give preferential treatment to their own similar services or competitive services.
• degrading the independent app’s functionality,
• reducing or eliminating the independent app’s ability to distribute its products,
• giving preferential treatment to competitive products, or
• limiting for any app whose revenues are primarily from advertising its ability to deliver, target, or measure the effectiveness of ads, or imposing fees or other charges related to its delivery of ads.77
18.55 In its 2012 Annual Report, Facebook warned that ‘[c]ertain competitors, including Google, could use strong or dominant positions in one or more markets to gain competitive advantage against us in areas where we operate including: by integrating competing social networking platforms or features into products they control such as search engines, web browsers, or mobile device operating systems; by making acquisitions; or by making access to Facebook more difficult.’78
18.56 Facebook, given its apps’ strong consumer appeal, has less to fear than smaller, lesser known apps. To make it harder for consumers to access and use the smaller independent apps on their smartphones, the super-platform could:
• degrade the independent app’s functionality by having it run slower than the operating system’s app,79
• reduce or eliminate the independent app developer’s ability to distribute its app by making it harder for consumers to find the app on its search engine or app store,80
• give preferential treatment to its own products, by pre-loading its app on the smartphone, having it on the opening screen,81 or integrating its own products into its other popular products, including its search engine and the operating system.
18.57 These concerns are real. One example is Bankrate Inc. Its website allows users to compare online the rates of over 300 financial products, including mortgages, credit cards, automobile loans, money market accounts, certificates of deposit, checking and ATM fees, home equity loans, and online banking fees. As the Internet’s ‘leading aggregator of financial rate information’, Bankrate, according to its website, ‘continually surveys approximately 4,800 financial institutions in all 50 states in order to provide clear, objective, and unbiased rates to consumers’.82 During the fourth quarter of 2015, Google began testing a competing service called Compare Credit Cards. Google’s search engine displayed its own service more prominently on credit card-related search results than Bankrate’s service.83 The fallout was significant. First, Google’s actions ‘adversely affected’ Bankrate’s ‘Credit Cards segment growth and profitability’.84 Second, Bankrate’s stock price, after this news was released, declined 48 per cent in one day, a record drop for the 40-year old company.85 Bankrate’s stock plummeted even though Google earlier announced that it was terminating its Compare services, including Compare Credit Cards.86 Investors were still jittery. Bankrate, along with many other companies, depends on Google’s search engine to attract a significant portion of visitors to its website. As one analyst commented, ‘Bankrate faces an uncertain future, in our opinion, as its ability to maintain low-cost traffic and consistent monetization appears threatened by changes over which it has little control’.87
18.58 The browser war between Microsoft and Netscape in the 1990s is another example. The DOJ challenged several actions Microsoft took in integrating its Internet Explorer browser into its Windows operating system. In technologically binding its browser to Windows, Microsoft, the district court found, both prevented original (p. 297) equipment manufacturers from pre-installing other browsers and deterred consumers from using them.88 The US Court of Appeals for the DC Circuit affirmed that Microsoft’s commingling of its browser and operating system code violated section 2 of the Sherman Act.89 So, too, the super-platform can abuse its dominant position by fusing its app with its operating system code, when it does not achieve any real integrative benefits, but helps maintain its data-advantage and monopoly by reducing users’ likelihood of using competing apps.
18.59 Moreover, data-driven exclusionary conduct may unite some within the Chicago and post-Chicago Schools. University of Chicago professor Dennis Carlton is a member of the Chicago School. Like others in the Chicago School, Carlton is generally sceptical about antitrust enforcement directed towards exclusionary conduct by a monopolist. Carlton, however, accepts that there is a legitimate role for antitrust in refusal to deal cases in certain situations.90 Significantly, he has argued that antitrust enforcement is appropriate in dynamic industries (such as the computer industry) where network effects are present and where scale is especially important to the ability to compete. He argues that:
in a dynamic model, the cost of being small initially can be magnified in later periods, especially with assumptions about network dependencies, importance of installed base, or scale economies. In those settings, strategic behavior designed to keep a rival small initially can yield later significant competitive advantage.91
18.60 Carlton finds these conditions satisfied (and enforcement appropriate) in Lorain Journal, where the owner of a local newspaper, which was the major local advertising vehicle, responded to the entry of a local radio station by refusing to deal with customers who advertised on the radio.92 Carlton notes that most commentators have viewed the case as suggesting that radio and newspapers are substitutes, but it is better to view them initially as complements for some advertisers—ways of reaching different demographic groups. However, over time, radio could grow into a substitute. So, Carlton suggests, the exclusionary conduct was ‘designed to so limit the size of the radio station that it could not survive as a vigorous competitor later on’.93
18.61 Similarly, Carlton argues that the government’s Microsoft cases were appropriate. The first case involved de facto exclusive dealing by Microsoft, which required computer manufacturers to pay Microsoft a licence fee based not on how many (p. 298) computers they shipped with the Windows operating system but based on how many computers they shipped in total. The second case involved contracts with computer manufacturers that either required or created incentives for exclusivity in browsers. Carlton notes that these cases, similar to Lorain Journal, are properly viewed as limiting potential rivals to the operating system monopoly from attaining efficient distribution.94
18.62 The European Commission in 2015 opened a formal investigation involving Google’s Android. Although Android is an open-source mobile operating system, which others can freely use and develop, Google controls the operating system through its licensing agreements. As the Commission stated, the ‘majority of smartphone and tablet manufacturers … use the Android operating system in combination with a range of Google’s proprietary applications and services. In order to obtain the right to install these applications and services on their Android devices, manufacturers need to enter into certain agreements with Google.’95 The European Commission is investigating whether Google has
• ‘illegally hindered the development and market access of rival mobile applications or services by requiring or incentivising smartphone and tablet manufacturers to exclusively pre-install Google’s own applications or services’;
• ‘prevented smartphone and tablet manufacturers who wish to install Google’s applications and services on some of their Android devices from developing and marketing modified and potentially competing versions of Android (so-called “Android forks”) on other devices, thereby illegally hindering the development and market access of rival mobile operating systems and mobile applications or services’; and
• ‘illegally hindered the development and market access of rival applications and services by tying or bundling certain Google applications and services distributed (p. 299) on Android devices with other Google applications, services and/or application programming interfaces of Google’.96
(iii) Contractual restrictions on the transferability of online search advertising campaigns to rival search advertising platforms and the management of such campaigns across Google’s Adwords and rival search advertising platforms.97
Moreover, the Commission in 2015 issued its statement of objections over Google degrading the quality of its search results by systematically favouring its own comparison shopping products in its general search results page.98
18.64 It bears noting that these allegations have not been proven in court. The Commission’s open investigations as of early 2016 have not reached statement of objections or formal action, and even the statement of objections are preliminary, with Google having the right to respond. Our point here is not Google’s potential liability, but to illustrate the types of abuses by dominant firms that touch on Big Data. To adequately assess these claims, the competition authority and court must understand the competitive significance of the four ‘V’s—volume, variety, velocity, and value—of data, the data-driven network effects, and how these data-driven strategies may help companies attain and maintain their dominant position and leverage their power across markets.
G. An Object All Sublime, the Competition Authority Shall Achieve in Time—to Let the Punishment Fit the Crime
18.65 Lastly, competition authorities must respond swiftly to prevent data-opolies from benefitting from their unfair data-driven practices. As we saw, data-driven network effects increase firms’ incentives to resort to unfair tactics. As the benefits from illegality increase, so too must the magnitude and probability of punishment increase to deter the anticompetitive behaviour. Otherwise, monopolization pays.
(p. 300) 18.66 In the US, monopolization pays. The DOJ criminally prosecuted more persons in one year under the Migratory Bird Treaty Act (227 in 2012)99 than it has civilly and criminally prosecuted monopolies over the past 35 years (13 since 1980).100 Between 2005 and 2014, the DOJ opened only 19 monopolization investigations, and brought only one case (in 2011).101 Thus a monopoly has more to fear about its wind turbine killing a golden eagle102 than its executives killing off a competitor.
18.67 In the US, executives conceivably could go to jail for monopolization. Over the past 50 years, Congress has increased the maximum criminal fines and term of incarceration for Sherman Act violations. From a misdemeanour, the criminal penalties now stand as a felony with up to ten years’ imprisonment and a fine up to USD 100 million for corporations and USD 1 million for individuals.103 The Sherman Act does not delineate which conduct should be criminally or civilly prosecuted; this has been left to the DOJ’s discretion. The DOJ, however, has not criminally prosecuted firms or individuals for violating section 2 since the 1970s.104 Since the Reagan administration, the DOJ has criminally prosecuted only horizontal, per se illegal agreements among competitors, such as price-fixing, bid rigging, and customer and territorial allocations. Nor has the FTC brought many monopolization cases.105
18.68 The antitrust fines likely represent a fraction of the monopoly profits. This is especially so, when dominant firms can avoid antitrust liability for their abuses in jurisdictions like the US. Class action antitrust lawsuits, under the recent Supreme Court decisions, are harder to bring. If there is a problem with class action settlements in (p. 301) antitrust cases, the American Antitrust Institute found, ‘it is that plaintiffs sometimes settle strong cases for too little, not weak cases for too much’.106
18.69 While running for president Barack Obama criticized the Bush administration for having ‘what may be the weakest record of antitrust enforcement of any administration in the last half century’.107 Obama noted that ‘in seven years, the Bush Justice Department has not brought a single monopolization case’.108 Obama promised to ‘reinvigorate antitrust enforcement’ and ‘step up review of merger activity.’109 Now with his second term coming to an end, the same criticism has been made about his administration.110
18.70 Many tech firms’ business models depend on collecting and monetizing consumer data. Several network effects can enable the company to become so firmly entrenched, so dominant in a given market, that it has both the ability and incentive to squelch competition, including by mavericks who challenge that data-dependent business model. When that happens, the incentive to innovate and take on that data-opoly is diminished. Consumers, even though they continue to get many apps and services for free, are nonetheless harmed, including the loss of technology that advances their privacy interests.
18.71 Although the EU is more active in investigating abuse of dominance cases, this cannot be left to one jurisdiction. Monopolization pays today. The incentives to abuse a dominant position, given the network effects, are even greater in data-driven industries. So, too, are the opportunities, especially for data-opolies with the nowcasting radar or controlling a critical platform, like smartphones. If the competition authorities ignore data-driven exclusionary and predatory conduct, then we will likely see more industries dominated by a few firms. Thus another signpost of progress is when the US and other jurisdictions investigate and swiftly prosecute data-driven abuses.
1 Peter Thiel, ‘Competition Is for Losers’, Wall Street Journal, 12 September 2014, http://www.wsj.com/articles/peter-thiel-competition-is-for-losers-1410535536.
4 Wolfgang Kerber, ‘Competition, Innovation and Maintaining Diversity Through Competition Law’, in Josef Drexl et al (eds), Competition Policy and the Economic Approach: Foundations and Limitations (Cheltenham: Edward Elgar, 2011), pp 173, 174, 179; Grant Miles et al, ‘Industry Variety and Performance’, 14 Strategic Mgmt J (1993): pp 163, 166–72. Plus, competitors can mutually gain from localized competition, such as knowledge spill-overs, improving the quality of their labour pool, and strengthening their network of suppliers. Kenneth M Davidson, Reality Ignored: How Milton Friedman and Chicago Economics Undermined American Institutions and Endangered the Global Economy (Seattle, WA: CreateSpace Independent Publishing Platform, 2011), pp 96, 152–3; Michael E Porter, The Competitive Advantage of Nations (New York: Free Press, 1990), pp 662–9; Michael E Porter, ‘Competition and Antitrust: A Productivity-Based Approach’, in Charles D Weller et al (eds), Unique Value: Competition Based on Innovation Creating Unique Value (Ashland, OH: Innovation Press, 2004), pp 154, 161–5. By analogy, plant species compete for pollinators (bees). But in mutualistic networks, the more plant species that grow in a field, the more pollinators are attracted to the area; so, the different plant species stand to gain more when they coexist. Jordi Bascompte, ‘Disentangling the Web of Life’, 325 Science (2009): pp 416, 418.
5 European Commission, Guidance on the Commission’s Enforcement Priorities in Applying Article 82 of the EC Treaty to Abusive Exclusionary Conduct by Dominant Undertakings  OJ C 45/7, para 1 (‘EC Article 82 Guidelines’), http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52009XC0224%2801%29&from=EN.
7 Ibid, para 7.
8 Ibid, para 6; Morrison v Murray Biscuit Co, 797 F2d 1430, 1437 (US Ct of Apps (7th Cir), 1986) (‘purpose of antitrust law, at least as articulated in the modern cases, is to protect the competitive process’); see also Tal v Hogan, 453 F3d 1244, 1258 (US Ct of Apps (10th Cir), 2006); SCFC ILC, Inc v Visa USA, Inc, 36 F3d 958, 963 (US Ct of Apps (10th Cir), 1994).
9 EC Article 82 Guidelines, above note 5, para 6.
11 US Department of Justice (DOJ), Office of Public Affairs, ‘Justice Department Requires Six High Tech Companies to Stop Entering into Anticompetitive Employee Solicitation Agreements: Settlement Preserves Competition for High Tech Employees’, Press Release, 24 September 2010, http://www.justice.gov/opa/pr/justice-department-requires-six-high- tech-companies-stop-entering-anticompetitive-employee.
15 Facebook Inc, Form 10-K Annual Report, filed 29 January 2015, p 6 (‘Facebook 2014 Annual Report’), http://files.shareholder.com/downloads/AMDA-NJ5DZ/650609882x0xS1326801-15-6/1326801/filing.pdf.
16 Ibid, p 5.
17 Chapter 13 of this volume.
18 Google Inc, Annual Report Pursuant to Section 13 or 15(D) of the Securities Exchange Act of 1934 for the fiscal year ended December 31, 2014, p 22 (‘Google 2014 Annual Report’), http://www.sec.gov/Archives/edgar/data/1288776/000128877615000008/goog2014123110-k.htm.
19 Facebook 2014 Annual Report, above note 15, p 30.
20 Alice Burton, ‘Where We All Cry About the Library of Alexandria’, Bookriot, 22 July 2015, http://bookriot.com/2015/07/22/cry-library-alexandria/.
21 Bart Verspagen, ‘The Use of Modeling Tools for Policy in Evolutionary Environments’, 76(4) Technological Forecasting & Social Change (May 2009): p 455, http://www.sciencedirect.com/science/article/pii/S0040162508001121.
28 Memorandum from John Roberts to Attorney General on Talking Points for Meeting with Lofton of Conservative Digest, 27 January 1982, http://www.archives.gov/news/john-roberts/accession-60-89-0372/doc053.pdf.
30 R Lougee-Heimer, ‘The Common Optimization INterface for Operations Research: Promoting Open-Source Software in the Operations Research Community’, 47(1) IBM J Research and Development (2003): p 59, citing Thomas J Watson, Jr, Father, Son, and Co: My Life at IBM and Beyond (New York: Bantam, 1990).
31 See Eric Beinhocker, The Origin of Wealth: Evolution, Complexity, and the Radical Remaking of Economics (Cambridge, MA: Harvard Business Review Press, 2006), pp 326–7; Gary Kildall Special, https://archive.org/details/GaryKild.
32 Jessica Toonkel, ‘BlackRock Betting Big Data Can Help Revive Its Active Equity Funds’, Reuters, 6 August 2015, http://www.reuters.com/article/2015/08/06/us-blackrock-bigdata-equity-analysis-idUSKCN0QB0B520150806.
33 UK Competition and Markets Authority, The Commercial Use of Consumer Data: Report on the CMA’s Call for Information, June 2015, para 2.68 (‘CMA Report’), https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/435817/The_commercial_use_of_consumer_data.pdf.
34 For example, Coupons.com identified search degradation as a significant risk. Coupons.com Incorporated, Annual Report Pursuant to Section 13 or 15(D) of the Securities Exchange Act of 1934 for the fiscal year ended December 31, 2014, p 18 (‘Coupons.com 2014 Annual Report’), https://www.sec.gov/Archives/edgar/data/1115128/000156459015001837/coup-10k_20141231.htm; see also Maurice E Stucke and Ariel Ezrachi, ‘When Competition Fails to Optimize Quality: A Look at Search Engines’, 18 Yale J L & Tech (2016): p 70.
35 Facebook Inc, Annual Report Pursuant to Section 13 or 15(D) of the Securities Exchange Act of 1934 for the fiscal year ended December 31, 2012, p 15 (‘Facebook 2012 Annual Report’), http://www.sec.gov/Archives/edgar/data/1326801/000132680113000003/fb-12312012x10k.htm.
36 European Data Protection Supervisor, Privacy and Competitiveness in the Age of Big Data: The Interplay Between Data Protection, Competition Law and Consumer Protection in the Digital Economy, Preliminary Opinion, March 2014, p 8 (‘EDPS Preliminary Opinion’), https://secure.edps.europa.eu/EDPSWEB/webdav/shared/Documents/Consultation/Opinions/2014/14-03-26_competitition_law_big_data_EN.pdf.
37 Ibid, p 6 (‘Extracting value from big data has become a significant source of power for the biggest players in internet markets.’).
38 Google 2014 Annual Report, above note 18, p 22 (far more of Google’s 53,600 full-time employees are involved in research and development (20,832 employees), than in sales and marketing (17,621), general and administrative (7,510), or operations (7,637)).
39 EC Article 82 Guidelines, above note 5, para 20 (noting incentive ‘to “tip” a market characterised by network effects in its favour or to further entrench its position on such a market’).
42 EC Article 82 Guidelines, above note 5, para 32 n 4.
43 United States v Google Inc, Case No 1:11-cv-00688 (US Dist Ct (D DC), filed 8 April 2011), Competitive Impact Statement, http://www.justice.gov/file/497671/download.
44 Publicis/Omnicom (Case Comp/M.7023), Commission Decision C(2014) 89 final, 9 January 2014, para 625. A majority of competitors responded that if the merged entity developed its own big data analytics platform and did not allow access to it, ‘the impact will be limited as they are currently using their own data analytics platform or one from third parties’. Ibid, para 629.
45 McWane, Inc v FTC, 783 F3d 838 (US Ct of Apps (11th Cir), 2015), citing FTC findings; see also LePage’s Inc v 3M, 324 F3d 141, 159 (US Ct of Apps (3rd Cir), 2003) (‘inquiry in Microsoft was whether the monopolist’s conduct excluded a competitor (Netscape) from the essential facilities that would permit it to achieve the efficiencies of scale necessary to threaten the monopoly’).
47 CMA Report, above note 33, para 17 (noting that ‘[t]he ability and incentives to exclude competitors by denying access to data, and/or the barriers to entry arising from consumer data, will be stronger where the data is a significant input into the quality or other attributes of a product or service’ and the concerns related to possible leverage of market power ‘where consumer data obtained in one market is a significant input to products and services produced in a related but separate market’). A number of respondents highlighted market power as a potential concern, ‘noting that a firm might be able to foreclose rivals by cutting off access to vital data’. Ibid, para 3.57.
48 ‘The FTC Report on Google’s Business Practices’, Wall Street Journal, 8 August 2012, p 76 (‘FTC Staff Report’), http://graphics.wsj.com/google-ftc-report/.
49 Ibid, pp 94, 96, 98, 100, 102, 104.
51 FTC Staff Report, above note 48, p 104.
52 ‘Apple Working on Its Own Search Engine; Aims to Take on Google: Report’, IBN Live, 10 February 2015, http://ibnlive.in.com/news/apple-working-on-its-own-search-engine-aims-to-take-on-google-report/527597-11.html; Joel Rosenblatt and Adam Satariano, ‘Google Paid Apple $1 Billion to Keep Search Bar on iPhone’, Bloomberg Business, 21 January 2016, http://www.bloomberg.com/news/articles/2016-01-22/google-paid-apple-1-billion-to-keep-search-bar-on-iphone.
53 FTC Staff Report, above note 48, p 108.
54 Ibid, p 112.
55 Microsoft/Yahoo! Search, above note 50, para 246.
56 See Autorité de la Concurrence, ‘Gas Market’, Press Release, 9 September 2014, http://www.autoritedelaconcurrence.fr/user/standard.php?id_rub=592&id_article=2420.
57 The data in question involved the ‘point de comptage and d’estimation’ [metering and estimating point], ‘consommations annuelles de référence’ [annual reference consumption], consumption profiles, surnames and first names of customers, billing addresses and landline telephone numbers. Ibid.
58 See ibid.
59 Belgian Competition Authority, ‘The Belgian Competition Authority Imposes a Fine of 1.190.000 EUR on the National Lottery for Having Abused Its Dominant Position when Launching Its Sports Betting Product Scooore!’, Press Release No 15/2015, 23 September 2015, http://economie.fgov.be/en/binaries/20150923_Press_release_15_BCA_tcm327-272707.pdf.
62 See, eg, EC Article 82 Guidelines, above note 5, para 17; Eastman Kodak Co v Image Tech Servs, Inc, 504 US 451, 476, 112 S Ct 2072, 2087 (1992).
63 Case T-201/04 Microsoft Corp v Commission  ECR II-03601, para 650 (noting the ‘lack of interoperability that competing work group server operating system products [could] achieve with the Windows domain architecture’ that caused an increasing number of consumers to be locked into a homogeneous Windows solution at the level of work group server operating systems’).
65 OECD, Exploring the Economics of Personal Data: A Survey of Methodologies for Measuring Monetary Value, OECD Digital Economy Papers, No 220 (2013), p 15, http://dx.doi.org/10.1787/5k486qtxldmq-en; see also Google Inc, Annual Report Pursuant to Section 13 or 15(D) of the Securities Exchange Act of 1934 for the fiscal year ended December 31, 2013, p 3, http://www.sec.gov/Archives/edgar/data/1288776/000128877614000020/goog2013123110-k.htm#s1EBF39222B397626A1572E71A8B0E8ED (noting that its ‘Android operating system continues to grow with more than a billion Android devices activated globally as of September 2013’).
66 OECD, Exploring the Economics of Personal Data, above note 65, p 15.
67 Ibid, p 15 (noting that ‘Google was the biggest recipient of data from smart phone apps in test run by the Wall Street Journal’; that ‘Google’s AdMob, AdSense, Analytics and DoubleClick units received information from 38 of the 101 apps tested’; and that Google’s main mobile advertising network, AdMob, ‘lets advertisers target phone users by location, type of device and demographic data, including gender or age group’).
68 See, eg, Public Citizen, Mission Creep-y: Google Is Quietly Becoming One of the Nation’s Most Powerful Political Forces While Expanding Its Information-Collection Empire, November 2014, p 23, https://www.citizen.org/documents/Google-Political-Spending-Mission-Creepy.pdf:
In the transition to Hangouts, Google made it harder for users to disable all chat histories from being recorded by Gmail. It also removed the ability of people to chat with others using different instant message services than Hangouts, or hosting their own chat servers. Unlike before, people chatting through Google can now only chat with others if the others are chatting through Google, creating pressure for users of online chat programs to join the Google universe. Privacy experts say this is bad for users who want to be able to use chat programs that have better privacy protections and still be able to chat with others using Google’s chat services.
69 The frenemy relationship is discussed in Ariel Ezrachi and Maurice E Stucke, Virtual Competition: The Promise and Perils of the Algorithm-Driven Economy (Cambridge, MA: Harvard University Press, forthcoming 2016).
70 OECD, Supporting Investment in Knowledge Capital, Growth and Innovation, 10 October 2013, p 173, http://dx.doi.org/10.1787/9789264193307-en.
72 Facebook/WhatsApp, above note 64, para 134.
73 Facebook 2014 Annual Report, above note 15, p 11.
74 Coupons.com 2014 Annual Report, above note 34, pp 15, 17; Twitter Inc, Quarterly Report Pursuant to Section 13 or 15(D) of the Securities Exchange Act of 1934 for the quarterly period ended June 30, 2015, p 44 (‘Twitter June 2015 Quarterly Report’), http://www.sec.gov/Archives/edgar/data/1418091/000156459015006705/twtr-10q_20150630.htm; LinkedIn Corporation, Quarterly Report Pursuant to Section 13 or 15(D) of the Securities Exchange Act of 1934 for the quarterly period ended June 30, 2015, p 47 (‘LinkedIn June 2015 Quarterly Report’), http://www.sec.gov/Archives/edgar/data/1271024/000127102415000020/a20150630-10qdocument.htm; Yelp Inc, Quarterly Report Pursuant to Section 13 or 15(D) of the Securities Exchange Act of 1934 for the quarterly period ended June 30, 2015, p 33 (‘Yelp June 2015 Quarterly Report’), http://www.sec.gov/Archives/edgar/data/1345016/000120677415002479/yelp_10q.htm.
77 Facebook 2014 Annual Report, above note 15, p 11.
78 Facebook 2012 Annual Report, above note 35, p 15.
79 See, eg, Analysis of Proposed Consent Order to Aid Public Comment, In re Intel Corporation, FTC Docket No 9341, 4 August 2010, p 5, https://www.ftc.gov/sites/default/files/documents/cases/2010/08/100804intelanal_0.pdf (noting how Intel effectively slowed the performance of software written using Intel’s compilers on computers with competing central processing units, and to the ‘unknowing public, OEMs [original equipment manufacturers], and software vendors, the slower performance of non-Intel-based computers when running certain software applications was mistakenly attributed to the performance of non-Intel CPUs’).
80 This is the basis of the privacy app Disconnect’s complaint filed against Google before the European Commission. Noah Swartz, ‘Disconnect Files EU Anti-trust Complaint Against Google’, Electronic Frontier Foundation, 3 June 2015, https://www.eff.org/deeplinks/2015/06/disconnect-files-eu-anti-trust-complaint-against-google. US smartphone users rely mostly on the app store to find apps.comScore, The 2015 US Mobile App Report (2015), p 19.
81 comScore, above note 80, pp 20, 55 (finding that 21% of US smartphone users have not changed their home screen, and app usage is ‘reflexive, habitual behavior, where those occupying the best home screen real estate are used most frequently’).
82 Bankrate, ‘About Bankrate’, http://www.bankrate.com/coinfo/default.asp.
83 Bankrate Inc, Form 8-K Pursuant to Section 13 or 15(d) of the Securities Exchange Act of 1934, filed 24 February 2016, p 4, http://phx.corporate-ir.net/phoenix.zhtml?c=61502&p=irol-sec&control_symbol=.
86 Bankrate Form 8-K, above note 83, p 5.
87 Scholer, above note 85, p C4.
88 United States v Microsoft Corporation, above note 12, p 64.
90 Dennis W Carlton, ‘A General Analysis of Exclusionary Conduct and Refusal to Deal—Why Aspen and Kodak are Misguided’, NBER Working Paper No w8105, February 2001, http://ssrn.com/abstract=258504.
91 Ibid, p 13.
93 Carlton, above note 90, p 28.
94 Ibid, pp 28–9.
95 European Commission, ‘Antitrust: Commission Opens Formal Investigation Against Google in Relation to Android Mobile Operating System’, Press Release, 15 April 2015, http://europa.eu/rapid/press-release_MEMO-15-4782_en.htm. Others have stated that Google has more and more applications for its Android system, ‘which are the lifeblood of any mobile operating system, under its closed source control’. Shane McGlaun, ‘Google Seeks to Control Android by Making More Apps Closed Source’, Slash Gear, 21 October 2013, http://www.slashgear.com/google-seeks-to-control-android-by-making-more-apps-closed-source-21302205/. In particular, the claim is that Google’s ‘real power in mobile comes from control of the Google apps—mainly Gmail, Maps, Google Now, Hangouts, YouTube, and the Play Store’, which phone manufacturers must license from Google: ‘It is at this point that you start picturing a scene out of The Godfather, because these apps aren’t going to come without some requirements attached.’ Ron Amadeo, ‘Google’s Iron Grip on Android: Controlling Open Source by Any Means Necessary: Android is Open—Except for All the Good Parts’, Ars Technica, 20 October 2013, http://arstechnica.com/gadgets/2013/10/googles-iron-grip-on-android-controlling-open-source-by-any-means-necessary/3/. The complaint is that Google requires any licensee who wants Gmail and Maps, to also license ‘Google Play Services, Google+, and whatever else Google feels like adding to the package’. Ibid.
96 European Commission, ‘Commission Opens Formal Investigation Against Google’, above note 95.
98 European Commission, ‘Fact Sheet: Commission Sends Statement of Objections to Google on Comparison Shopping Service’, 15 April 2015, http://europa.eu/rapid/press-release_MEMO-15-4781_en.htm.
99 Migratory Bird Treaty Act of 1918, ch 128, 13 July 1918, 40 Stat 755, codified at 16 USC ss 703–12; Table D-2. US District Courts—Criminal Defendants Commenced, by Offense, During the 12-Month Periods Ending 31 March 2011 Through 2015, http://www.uscourts.gov/statistics/table/d-2/federal-judicial-caseload-statistics/2015/03/31.
100 DOJ, Antitrust Division, Workload Statistics: FY 1980–1989, http://www.justice.gov/atr/division-operations; DOJ, Antitrust Division, Workload Statistics: FY 1990–1999, http://www.justice.gov/sites/default/files/atr/legacy/2009/06/09/246419.pdf; DOJ, Antitrust Division, Workload Statistics: FY 2000–2009, http://www.justice.gov/sites/default/files/atr/legacy/2012/04/04/281484.pdf; DOJ, Antitrust Division, Workload Statistics: FY 2005–2014, http://www.justice.gov/atr/antitrust-division-workload-statistics-fy-2005-2014.
101 DOJ, Workload Statistics: FY 2005–2014, above note 100.
102 DOJ, ‘Utility Company Sentenced in Wyoming for Killing Protected Birds at Wind Projects’, Press Release, 22 November 2013, http://www.justice.gov/opa/pr/utility-company- sentenced-wyoming-killing-protected-birds-wind-projects.
105 A search of the FTC’s Cases and Proceedings for Single Firm Conduct category identified two cases: see Advance Search options at: https://www.ftc.gov/enforcement/cases-proceedings. Intel, which was not listed, was another case. In re Intel Corp, FTC Matter No 061 0247, Docket No 9341, https://www.ftc.gov/enforcement/cases-proceedings/061-0247/intel-corporation-matter.
106 Albert A Foer (ed), The Next Antitrust Agenda: The American Antitrust Institute’s Transition Report on Competition Policy to the 44th President of the United States (Lake Mary, FL: Vandeplas Publishing, 2008), p 234.
107 Statement of Senator Barack Obama for the American Antitrust Institute, http://www.antitrustinstitute.org/files/aai-%20Presidential%20campaign%20-%20Obama%209-07_092720071759.pdf.
110 Brent Kendall, ‘Justice Department Doesn’t Deliver on Promise to Attack Monopolies: Obama Administration Arrived Promising a Tougher Stance, but Few Antitrust Cases Have Been Pursued in U.S. and Enforcement Has Shifted to Europe’, Wall Street Journal, 7 November 2015, http://www.wsj.com/articles/justice-department-doesnt-deliver-on-promise-to-attack-monopolies-1446892202.