Clouds behind the clouds Aitor Ortiz Abstract Cloud computing is revolutionizing the way that companies use IT services. The advantages of cloud computing for companies are numerous, from substantial cost reductions to global access to data. However, this new channel of communication brings a new antitrust risk, exchange of sensitive information among competitors in the cloud. The features of cloud computing (i.e. data location) together with some IT techniques (i.e. encryption of information) may facilitate the creation of sophisticated systems to share information. These refine systems may even prevent antitrust authorities from finding evidence of the illicit conduct. This article shows how companies planning to engage in cartel activities may remain undetected from the competition authorities if they used the adequate technique. This article further discusses the tools available to competition authorities to detect and to prevent this behavior and it argues how some authorities are a priori better prepared than others to combat these ‘cloud cartels’. Finally, the last section of this article suggests new policies to deter the illegal use of cloud computing services. 1. Introduction Cloud computing is seen by companies as a new technological tool which will enable them to save resources by dedicating time and money to their core business instead of updating and upgrading their current IT systems. It is fair to say that the recent flourishing of cloud computing services is demand driven rather than a new marketing strategy launched by private cloud providers (CPs). A recent study conducted in Germany shows that the number of companies willing to use cloud services in their businesses is rapidly increasing. 1 The estimations for the next five years indicate a market expansion up to EUR 71 billion worldwide.2 In fact, it is surprising to read that the share of companies rating the use of cloud services as very positive is actually growing faster than the cloud usage rate itself.3 LL.M. in International Legal Studies, Georgetown University Law Center; MA in European Economic Studies, College of Europe. Former International Antirust Consultant at the U.S. Federal Trade Commission and Associate lawyer at J&A Garrigues SLP. Contact: ao339@law.georgetown.edu. 1 See Stefan Heng and Stefan Neitzel, Cloud computing Clear skies ahead, Deutsche Bank AG DB Research, March 1, 2012, at 16. 2 Id. 3 Id. 1 However, not everything in cloud computing services is bright and positive. The voices clamoring for more data protection, data security and legal certainty are numerous. 4 Other professionals and scholars have directed their concerns to the foreseeable anticompetitive effects that cloud providers may cause in the market.5 For instance, the difficulties of migrating data to and from different clouds (data portability) and the interoperability problems between the clouds may produce lock-in effects at the cloud provider level.6 Another interesting report goes even further suggesting that companies such as Amazon, Google, Cisco Systems, I.B.M., Microsoft, Oracle and other competitors will be in a position to run a cartel on the cloud business.7 These antitrust concerns have already been detected and hopefully addressed (or at least envisaged to be addressed) by the competent antitrust authorities. However, this article advances a new antitrust concern that does not affect the cloud market itself, but rather is facilitated by the existence of the cloud and its multiple applications. Two questions may summarize the purpose of this article: What would happen if competing firms start using cloud services as virtual storage of data to share information with illegitimate purposes? And how are antitrust authorities going to detect this conduct and eventually seize this information? In both the U.S. and in Europe the exchange of information between competitors that facilitate the formation of a cartel violates Sherman Act section 1 and Article 101 of the Treaty of Functioning of the European Union (TFEU), respectively. However, antitrust authorities on both sides of the Atlantic may encounter tremendous difficulties in gathering evidence of illegal conduct if stored on a cloud, and, even if they do, they might not have jurisdiction to claim this data. In this article I argue that cloud computing creates a new channel for companies to share information that might be used to engage (or remain) in a cartel and that competition authorities may lack the necessary tools to deter and investigate this conduct. In part two, I briefly explain the basis of cloud computing and its associated risks. Part three discusses the possibility for firms to store, share and delete information from a cloud without leaving any trace. These new alternatives will have a clear impact on the economic incentives of the firms when deciding which commercial behavior to adopt. In section four, I explain how the current technology may allow an Internet user to remain completely anonymous while sharing information with others on the cloud and how this technology, together with some regulatory/administrative burdens, may impede the antitrust authorities from conducting adequate investigations. Among other issues, absence of jurisdiction, identification of the cloud provider, encryption of information and rights of defense are some of the problems that antitrust watchdogs may face when gathering the 4 See for the U.S. the Preliminary FTC staff report, A proposed framework for Businesses and Policy makers, December 2010. Available at http://www.ftc.gov/os/2010/12/101201privacyreport.pdf and the Public Research Center ‘EPIC’ at http://epic.org/privacy/cloudcomputing/. For the European counterpart, see speech by the commissioner Neelie Kroes in Brussels, January 30, 2012 available at http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/12/40&format=HTML&aged=0&language=EN &guiLanguage=en 5 See Jasper P. Sluijs, Pierre Larouche, and Wolf Sauter, Cloud Computing in the EU policy Sphere, TILEC Discussion Paper, Tilburg University, August 2011 and New York Times, Here come the clouds cartels (March 16, 2012, 4.50 PM) available at http://bits.blogs.nytimes.com/2012/01/30/here-come-the-cloud-cartels/ 6 See Sluijs, Larouche and Sauter, supra note 5, at 9. 7 See Here come the clouds cartels, supra note 5, at 1. 2 evidence of an alleged cartel orchestrated ‘up on the cloud’. Section five suggests preliminary solutions to these new challenges such as regulatory, economic, technological and social measures. Part six concludes. 2. Clouds 2.1. Basic concepts of cloud computing To identify the antitrust issues, first I will briefly describe what cloud computing is and what the different emerging markets for cloud computing services are. To begin with, there is not a single definition of cloud computing, we might find rather complex definitions for IT experts and plain explanations for beginners.8 Therefore, I have selected the following two definitions of cloud computing to satisfy all readers: “Cloud computing is a way of delivering shared, flexible and scalable IT services through non-firmly allocated IT resources over a network. Typical characteristics are real-time, metered delivery as a self-service on the basis of Internet technologies charged according to use. The IT services can cover applications, application development and operating platforms and basic infrastructure”9. “Cloud computing provides flexible, location-independent access to computing resources that are quickly and seamlessly allocated or released in responde to demand”.10 Cloud computing might be public, where several users share the cloud infrastructure with separate individual allocation of the data, private, customized to the customers requirements and with an exclusive use of the special cloud infrastructure, and hybrid, combining elements of both public and private clouds.11 The main cloud computing activities are normally categorized in three service models: Infrastructure as a Service (IaaS): the CP provides basic IT infrastructure as storage, network and computing capacity. Examples of this service are Rackspace, Amazon’s EC2 and S3. 12 IaaS is the main service I will look at in this article since storage of information and exchange thereof is the only service that companies may require from a CP to run a cartel. Platform as a Service (PaaS): the CP provides higher infrastructure-level services for the consumers. It helps developers to run applications and test them before coming with the ultimate version. Examples of this service are Google’s App Engine and Microsoft’s 8 For an introduction to cloud computing see JUDITH HURWITZ, ROBIN BLOOR & MARCIA KAUFMAN, COMPUTING (Wiley Publishing Inc., 2010). 9 See Stefan and Neitzel supra note 1, at 3. 10 See Kuan Hon, Christopher Millard and Ian Walden, The problem of ‘Personal Data’ in Cloud Computing – What Information is Regulated?, Queen Mary University of London, School of Law. Legal Study Research Paper No. 75/2011 at 6. 11 See Stefan and Neitzel supra note 1, at 3-4 12 See Hon, Millard and Walden, supra note 10, at n. 30. FOR DUMMIES HP SPECIAL EDITION 3 Windows Azure. 13 This service may bring lock-in problems for customers if they are using proprietary language or tools provided by a single vendor, reducing portability to and from the cloud. Software as a Service (SaaS): the CP provides an integrated service network based on the cloud infrastructure. It provides the highest level of functionality of the three models. Examples of this service are webmail services such as Yahoo! Mail and social networking sites such as Facebook.14 The main idea to keep in mind after this brief description is that companies may now rent space in a public or private cloud (at a cheaper cost than carrying out these activities by themselves) for almost any IT activity they wish, from storing data to running new applications and using software such as webmail, personnel database, accountability programs, etc. But as indicated above, the use of cloud computing may pose risks for both companies and individuals. 2.2. Problems related to cloud computing services When a company seeks services from a CP, it should evaluate the conditions under which the CP is providing the service. Some elements like the (physical) location of the data, the number and identity of the cloud providers involved in the service, and the data retention and data protection policies must be carefully analyzed.15 Unfortunately for cloud users, CPs follow a model of mass customization establishing a general service agreement, leaving almost no room for negotiating the terms of the agreement with the CP.16 Next, I will outline some of the problems that might arise from a CP’s commercial policy. These problems will be further linked to the antitrust concerns suggested in this article. 2.2.1. Location of the data The location of a CP’s server may determine the law applicable to the data stored in that server and it is not unusual that the cloud provider exclude the actual location in the terms of the agreement.17 For instance, when a new client wants to contract with Amazon EC2, the company gives the client the choice to indicate in which region (s)he wants the content to be stored, but does not indicate where the information is stored if the customer fails to do so.18 Google’s App engine includes a similar provision by which the customer may select the U.S. or Europe as a permanent place for the storage of the data, and if a selection is not made, the data is stored in the U.S. by 13 Id. at n. 31. Id. at n. 32. 15 The main risk that individuals face when using cloud services concerns to leakage of private data, and though it is a very hot topic in Europe and the U.S., it falls outside the scope of this article. 16 See Sluijs, Larouche and Sauter, supra note 5, at 9. 17 Robert Gellman, Privacy on the clouds: Risks to Privacy and Confidentiality from Cloud Computing. World Privacy Forum, February 23, 2009. Available at http://www.worldprivacyforum.org/pdf/WPF_Cloud_Privacy_Report.pdf 18 See Amazon Web Services Customer Agreement available at http://aws.amazon.com/agreement/ (last visit March 18, 2012, 5:00 PM) 14 4 default. 19 Although this policy could become customary in the industry (or even imposed by regulation), smaller cloud providers may not be in a position to facilitate storage in different regions since they might be limited to building servers in countries where the infrastructure and the commodities are cheaper (i.e. Indonesia, India, Centro-America) and consequently they may prefer to hide this information from customers. From the CP’s perspective, the election of one or another jurisdiction brings different obligations as regards data protection, regulatory compliance and data retention. Accordingly, a company might decide to store its data in a specific location based, for instance, on the level of protection of trade secrets or the level of government intervention (i.e. limited discovery rules). From an antitrust point of view, the election of Europe or the U.S. may not have important consequences since both the European Commission and its counterparts in the U.S. (the FTC and DOJ) collaborate closely with each other in sharing the necessary information to conclude an investigation.20 However, the outcome might be different if the information is stored in a less cooperative jurisdiction or in a jurisdiction not embedded with an antitrust culture (i.e. Indonesia, Belarus or Sudan). Consequently, the location of the data and its possible re-location has a clear impact in the CP, the customers and the antitrust authorities. 2.2.2. Different layers of cloud providers As important as the location of the data is the identity and the number of cloud providers involved in storing the data. In many instances users have no idea who is delivering the service at the end of a long chain of sub-contractors.21 An example of this is found in DropBox, a CP who provides its services through Amazon’s IaaS infrastructure.22 Therefore, a company’s choice of data location may be jeopardized due to the subcontracting services of CPs if the company does not carry out adequate due diligence. 2.2.3. Data protection Companies are very keen on securing the data they store on the cloud. A failure in a server may represent billions of dollars in losses for companies, and if the failure is systemic the consequences will have a macroeconomic magnitude. However, CPs do not normally take responsibility for any damage or loss on the data stored. As an example, Amazon23 and Google24 19 See Google Cloud Storage Terms of services available https://developers.google.com/storage/docs/terms (last visit March 18, 2012, 5:00 PM) 20 Rachel Branderburger and Randy Tritell, Global antitrust policies: how wide is the gap?, Concurrence No. 12012 at 3-11. Available at http://www.ftc.gov/oia/speeches/RandolphTritellGrlobalAntitrust.pdf 21 See Stefan and Neitzel supra note 1, at 6. 22 See DropBox website available at https://www.dropbox.com/help/7 (last visit March 18, 2012, 5.20 PM) 23 AWS does not warrant that this site information, content, materials, products (including any software) or services […] are free of viruses or other harmful components. AWS will not be liable for any damages of any kind arising from the use of this site or from any information, content, materials, products (including software) or services included on or otherwise made available to you through this site, including, but not limited to direct, indirect, incidental, punitive, and consequential damages, unless otherwise specified in writing. Available at http://aws.amazon.com/terms/. 5 state very clearly in their terms and conditions that they are not held liable for any damage or loss of information occurred while using their services. 2.2.4. Data retention Perhaps more important for our purposes than data protection is the data retention policy that CPs have to observe. For the time being, CPs are not obliged to keep customers’ records for an unlimited period of time. In fact, depending on the applicable law, they might not be obliged to retain data at all. In Europe, the EU Directive on data retention establishes that European member states may impose an obligation on providers of publicly available electronic communication to retain limited information for a period from six months to two years with the only purpose of prosecuting serious crimes.25 In this regard, cloud providers could be obliged to keep only the necessary information to trace a source of a communication (such as an IP address) but in no way might they be compelled to retain and/or reveal the content of the communication. 26 Regardless, it remains to be seen whether CPs are considered providers of publicly available electronic communication and if an antitrust investigation is deemed a serious crime. The new draft of the EU General Data Protection Regulation is far from providing a strict timeframe; it seems to invert the burden of proof, setting out that it is the controller (i.e. CP) who shall provide the individual the period for which the personal data will be stored. 27 In the U.S., there are no similar data retention provisions. Therefore, CPs are not obliged to keep any information about their customers.28 In summary, users and CPs are required to negotiate the data retention policy that will govern the service agreement. Contrary to what we might think, corporations might not be interested in keeping their records for a long time; instead they demand that the data remain accessible for a certain time and afterwards be deleted permanently with no recoverable trace. 29 This policy allows companies to comply with some regulatory obligations and to reduce the cost of ever24 Subject to the universal terms, Google and its licensors disclaim all warranties in connection with the product and will not be liable for any damage or loss resulting from your use of the product. Available at http://tools.google.com/dlpage/res/cloudconnect/en-GB/eula_text.html?hl=en-in 25 See Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC, Official Journal L105/54, 13.04.2006 at Article 6. 26 Id. at Article 5. 27 Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels 25.1.2012 COM (2012) 11 final, at Article 14.1.c. 28 The only requirement that the U.S. Congress has imposed to Internet Service Providers (ISP) was introduced on May 25, 2011 by law 18 U.S.C. §, 2701, forcing ISP to save log of all of their customers’ activities for 12 months to enhance the fight against child pornography. Available at http://www.gpo.gov/fdsys/pkg/BILLS112hr1981rh/pdf/BILLS-112hr1981rh.pdf 29 Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp, Managing Data Retention Policies at Scale, HP Laboratories http://www.hpl.hp.com/techreports/2010/HPL-2010-203.pdf at 3 6 growing data, but as I will further explain this might also be the best way to keep evidence of illegal conduct away from regulators. 3. Cartels 3.1. Exchange of information on the cloud Cloud computing is thought to be used for individual purposes, understood as each company contracting CP services for its own use. As shown above, private CPs guarantee customers an individual space protected from unwelcome guests. In order to ensure privacy and to enhance security in accessing the data, CPs provide passwords, passphrases and even the possibility to encrypt information (encryption keys). However, nothing prevents a CEO or manager from voluntarily providing direct access to the company’s cloud to suppliers, customers or any other company. What is more, nothing prevents him from uploading detailed information about the company’s price list, production, salaries, etc. and granting access to its competitors and vice versa. As obvious as it seems, under U.S. and EU law this practice would violate the antitrust provisions laid down in the Sherman Act30 and the TFEU31. 3.2. Prohibition of the exchange of information In the U.S., the exchange of information among competitors on prices, output or other competitively sensitive variables has long been recognized as a source of anticompetitive concerns that may violate Section 1 of the Sherman Act.32 The antitrust concern is that the information exchange may facilitate collusion among companies or a tacit coordination to lessen competition. The Supreme Court has held that sharing information among competitors, in itself, is not per se illegal, being normally examined under the “rule of reason”. 33 Nonetheless, this exchange may serve as evidence of per se illegal conspiracy to fix prices.34 Alternatively, information exchanges concerning technology, know-how or intellectual property have been acknowledged by the courts and the antitrust agencies as essential to achieve the procompetitive benefits of R&D collaboration.35 30 15 U.S.C § 1. Treaty of Functioning of the European Union (TFEU), Official Journal of the European Union C83/47, 30.03.2010 at Article 101. 32 15 U.S.C § 1. 33 See United States v. Citizens & So. Nat’l Bank, 422 U.S. 86, 113 (1975) (“But the dissemination of price information is not itself a per se violation of the Sherman Act.”) 34 ABA Section of Antitrust Law, 1 Antitrust Law Developments 93 (6th ed. 2007) citing, inter alia, In Re Flat Glass Antitrust Litig., 385 F.3d 350, 368-69 (3rd Cir. 2004) cert. denied , 544 U.S. 948 (2005); Petroleum Products Antitrust Litigation, 906 F.2d 432, 445-50 (9th Cir. 1990). 35 See Maple Flooring Mfrs.’ Ass’n v. United States, 268 U.S. 563, 582-83 (1925) and FTC and U.S. Dep’t of Justice, Antitrust Guidelines for Collaborations Among Competitors (2000) at 15, available at http://www.ftc.gov/os/2000/04/ftcdojguidelines.pdf. 31 7 Determining which exchange Elements like the nature and intent, the industry structure whether the data exchanged detriment of consumers.36 of information is harming consumers is a case-by-case exercise. quantity of the information, how recent the data is, the parties’ and the frequency of the exchanges are assessed to conclude may facilitate collusion or coordination in the market to the Europe shares similar antitrust concerns to the U.S. The first sign of antitrust concerns shown by the European Commission about information exchange came with the Notice concerning Agreements, Decisions and Concerted Practices in the field of Co-operation between Enterprises. 37 But it was in the early 1990s when the European Commission carried out a comprehensive assessment of the potential restrictive effects of an information exchange system,38 which was further endorsed by the General Court (then Court of First Instance) and the Court of Justice of the European Union (then European Court of Justice).39 The subtle differences with the U.S. approach became clearer with the new EU Guidelines on horizontal cooperation. 40 Unlike U.S. law, the new EU guidelines foresee that the communication of information among competitors may constitute by itself an agreement or concerted practice with the object of fixing prices or quantities infringing article 101 TFUE41. Having said that, the European Commission also examines the information exchanged on a caseby-case basis, analyzing the type of information exchanged (strategic data), the features of the market (more or less transparent), the age of the data, frequency, etc. to determine the likely result in the market.42 For the sake of simplicity, in this article I will assume that the type of information exchanged between competitors on the cloud clearly facilitates collusion and it would lead to a Sherman Act section 1 or Article 101 of the TFEU violation. 3.3. It is time to play: Setting up a cartel Next, with the cards, the table, the croupier and the players in place, it is time to decide whether to play a risky hand. There is only one new rule in the game: everybody knows everybody’s hands except the croupier. 36 See Antitrust Guidelines for Collaborations Among Competitors (2000), supra note 35, at 15. In [1968] OJ C075, p. 3. The 1968 Notice was replaced in 2001 by the Commission’s Guidelines on the applicability of Article 81 to horizontal co-operation agreements (see OJ C 3 of 06.01.2001, p. 2). 38 See Commission Decision, UK Agricultural Tractor Exchange, in [1992] OJ L 68/19. 39 See for the General Court, J. Deere vs. Commission, [1994] ECR II-957; Fiatagri and New Holland Ford vs. Commission, [1994] ECR II-905. See for the Court of Justice of the EU, J. Deere vs. Commission, [1998] ECR I3111; New Holland Ford vs. Commission, [1998] ECR I-3175. 40 European Commission Communication: Guidelines on the Applicability of Article 101 of the Treaty on the Functioning of the European Union to Horizontal Co-operation Agreements ch. 2, 2011 O.J. (C. 11) 1 (Jan. 14, 2011), available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2011:011:0001:0072:EN:PDF. 41 Id. at 59. 42 Id. at 86-94. 37 8 This scenario seeks to exemplify the new situation that cloud computing offers to companies that are willing to form or continue in a cartel. Companies are well aware of the technical features of cloud computing: the feasibility of storing and erasing data from any point, over any network, using any device; relocation of data to different jurisdictions; absence of regulation (only limited requirements imposed on CPs as regards to privacy in Europe) and great discretion to negotiate with the CP whether to retain the company’s data or not. With these alternatives in mind, companies may have more incentives – or be less constrained – to orchestrate a cartel on the cloud. To date, cartels have had to use more rustic techniques to exchange relevant information or monitor the effective implementation of an unlawful agreement. Among others, members of a cartel have used inserts in the newspapers43, telephone surveys and public press releases44, regular meetings45 and in the last decade more advanced but equally traceable emails46 to invite others to collude. To a greater or lesser extent, all these techniques require regular contact (physical or not) between the members of the cartel to police the adequate implementation of the agreement, leaving evidence of the alleged conduct. Cloud computing diminishes the risk of being caught. Cloud computing offers broad and ubiquitous network access modifying the normal pattern followed until now to share information. Now the information does not circulate from one computer to another, it remains in virtual storage and any authorized person may have access to it. Cloud computing is also a multi-tenancy, which means that a cloud offers access and service to multiple users at the same time, unlike other means of communications (i.e. telephone). 47 Therefore, it is possible for all members of a cartel upload information at the same time, obtain access to the same document with the information needed (i.e. price) and delete the document before the antitrust authorities become aware. In this regard, although cloud computing does not eliminate the need to establish a first contact among competitors to agree in engaging in the anticompetitive behavior, it certainly facilitates the carrying out of all the communications and decisions on the cloud, where the information may be accessed and deleted permanently on a daily or weekly basis. Therefore, companies may deem this new channel of communication as a more efficient (data available in real time) and less risky method (no traceable evidence) of running a cartel. 3.4. Refining the cartel Storing information in a cloud may seem attractive for companies thinking about forming a cartel, but some of these companies may feel uncomfortable uploading detailed information about the company’s record in a commercial cloud for illegal purposes. 43 In re Valassis Communications, Inc., F.T.C. No. C-4160 (April 19, 2006) (consent order), available at http://www.ftc.gov/os/caselist/0510008/0510008c4160ValassisDecisionandOrder.pdf. 44 In re Stone Container Corporation, F.T.C. No. C-3806, all relevant information available at http://www.ftc.gov/os/caselist/c3806.shtm. 45 In re Nat’l Ass’n of Music Merchants, Inc., F.T.C. No. C-4255 (March 4, 2009) (analysis to aid public comment), available at http://www.ftc.gov/os/caselist/0010203/090304nammanal.pdf. 46 European Commission Decision in the case COMP/C-3/37.990 Intel, Brussels 13.5.2009 available at http://ec.europa.eu/competition/antitrust/cases/dec_docs/37990/37990_3581_11.pdf 47 See Sluijs, Larouche and Sauter, supra note 5, at 5. 9 After all, once the data is not in their exclusive custody, they may lose control over it and it might end up in the wrong hands. In the U.S., according to United States v. Miller48 and Smith v. Maryland,49 the personal records held by a third party might not have the same constitutional privacy protection as applies when an individual holds it. Therefore, if this doctrine is applied to cloud computing (those cases referred to banking and telephone services), the FTC or DOJ would simply need to request a subpoena to obtain the information they need from a CP.50 In Europe, an antitrust investigation is administrative in nature. Therefore, there is no need, a priori, for judicial intervention to request the data wanted. The EC, pursuant to Articles 18 and 20 of Regulation 1/2003, may request from any undertaking the necessary information.51 Only under certain circumstances does the EC need prior authorization from a national judicial authority to inspect premises where it suspects there might be relevant information.52 In fact, one of these circumstances, as explained below, is when the EC seeks information in premises different than the company’s premises, such as the CP. Notwithstanding the power of the agencies to access the data, the CP may also in some cases access the information stored, modify the contract at its will or terminate the contract with very short notice.53 These uncertainties about ‘who’ will have access to ‘what’ data and under ‘which’ circumstances might push companies to design and create their own ad hoc cloud, exactly matching their needs such as complete control over who has access to the data and the technical and other barriers raised to impede regulators from tracking the information. Even though this possibility seems complex and only open to companies with large economic and IT resources, the truth is that almost any corporation, or in our case a group of companies, may afford to pay a technology broker to set up a cloud. The role of this broker would basically be to install the server of the cloud in a selected country and to provide multiple authorizations (as many as companies or individuals), fake logins (to avoid any link between the person and the company involved) and the necessary tools to encrypt the information (in doing so if an outsider ever gets access to the data without the necessary code will have serious difficulties to decipher the message). Consequently, an ad hoc cloud removes the few concerns that companies may have when deciding whether or not to run a cartel using cloud computing. No hard-copy evidence, electronic 48 425 U.S. 435 (1976). 442 U.S. 735 (1979). 50 It is still unclear which characterization should be given to the storage of data on the cloud and the level of protection may vary accordingly. Under the Electronic Communication Privacy Act (ECPA) if an ‘electronic communication service’ holds a text message in ‘electronic storage’, then law enforcement requires a warrant to obtain access to it, but if a ‘remote computing service’ holds the same text on behalf of the subscriber, a subpoena is sufficient. See Privacy on the clouds, supra note 17, at 13. 51 COUNCIL REGULATION (EC) No 1/2003 of 16 December 2002 on the implementation of the rules on competition laid down in Articles 81 and 82 of the Treaty, Official Journal L1/1, 4.1.2003. 52 Id. at Article 21.3. 53 As an example see Amazon’s terms and conditions, available at http://aws.amazon.com/agreement/ 49 10 evidence very difficult to detect and in any event easy to delete, fake identities to make the identification of the companies more difficult, reduction of the risk of leakages by the CP for an unexpected change of policy or subpoena, high jurisdictional barriers if the data is located in a remote server and finally encrypted information may render the efforts made by the antitrust authorities useless. Companies’ incentives may now be different thanks to cloud computing. While it is difficult to think that companies will now massively engage in cartel activities relying on the ‘immunity’ that virtual storage can provide them, we should acknowledge that sharing information between competitors was never easier and less detectable. Regulation is still unclear and companies will have fewer incentives to betray the other members of the cartel if they know that the risk of being caught is minimal. As a result, in my opinion cloud computing has the potential to modify the outcome of a company’s prisoner’s dilemma of whether or not to engage in anticompetitive conduct. 4. Competition Authorities 4.1. Powers and limits The role of the competition authorities in discovering this type of behavior on the cloud is essential, though the powers they have been given might not be sufficient to detect and collect the evidence to condemn the companies involved. Regulatory boundaries and limited investigative tools may play a decisive role in the success or failure of an antitrust investigation. First, as indicated above, the location of the data and the ultimate owner of the data may pose significant barriers for competition authorities to access the data. As one cyber security expert asserted, the cloud is multijurisdictional and it is not possible to know what legal standard applies to the documents stored on the cloud unless it is linked to a physical location.54 In the U.S., the USA PATRIOT Act55 (Patriot Act) grants authority to the FBI (after obtaining a court order) to compel disclosure of records held by cloud providers.56 This mechanism would prevent a company from deleting incriminating evidence before the authorities have the opportunity to seize the data. However, even with the Patriot Act a subpoena is necessary, and U.S. courts cannot issue a subpoena to gather data located outside the U.S. In Europe, the European Commission enjoys similar powers with the advantage of not depending on a subpoena or warrant to request the information, but again, this competence extends only to the territory of the 27 European member states. It is implied from the above that cooperation among competition authorities is going to be extremely important in the upcoming years. There are already mechanisms in place between Europe and the U.S. to share information, and the current cooperation with other jurisdictions Speech by Mark Rasch, Director, Cybersecurity and Privacy Consulting, CSC in the Seminar “Lawful Access to Data on the cloud” at Georgetown University Law Center, Washington D.C., March 20, 2012. 55 Public Law 107-56. 56 50 U.S.C. § 1861. 54 11 like Australia, Mexico, Japan, Brazil or South Africa invites the belief that achievement of this goal is likely. However, a mere commitment to cooperate is not enough; instead, a quick, diligent and efficient response from the authorities involved will be required if we want to avoid a continuous relocation of the data until it is ultimately erased and the investigation jeopardized. This goal – a quick response from all the competition authorities involved – might be particularly difficult to attain in those jurisdictions with less human and technical resources, which might potentially be the target of a technology broker setting up a cloud for cartel members. To remedy this problem, the International Competition Network (ICN), 57 which currently counts 120 members and advocates for convergence in competition policies and fostering international cooperation, may provide a unique forum to discuss this issue and to draft a common framework or guidelines establishing the steps to be taken when a cloud investigation is initiated by one of its members. Second, besides data location and the necessity to collaborate, traditional dawn raids might not be enough to collect the data and alternatives may infringe upon the rights of defense. Should competition authorities still bother to seize computers from a company’s premises when all the documents might be stored on the cloud? Yes, they should definitely bother. Although a well run cartel on the cloud might leave almost no trace of the illegal activity, it is more than likely that middle or top managers without IT skills will leave traces of this behavior, from documents saved on the hard drive, to undeleted emails with attachments, to simply documents sent to the bin but not erased. But even if executives are careful, the information provided by the hash values embedded in documents and the IT forensic techniques available to the antitrust authorities will provide valuable information for the investigation.58 In addition, as some readers have probably already noticed, information on the cloud might be exchanged, encrypted and deleted, but there is a traceable IP address which will lead the competition agency to the electronic device where the information has been accessed that belongs to a person (even if fake logs on are used). This might not be initially sufficient to discover the content of the information, but it will enable the competition authority to request the relevant information from the owner of this device and if (s)he refuse to do so, most of the competition authorities are empowered to imposed economic sanctions 59 and even criminal sanctions60. 57 For more information see http://www.internationalcompetitionnetwork.org/ A hash value is a mathematical algorithm produced against digital information (a file, a physical disk) thereby creating a digital fingerprint for that information. It is by purpose a one-way algorithm and thus it is not possible to change digital evidence without changing the corresponding hash values. In other words, if the hash value of a file has (not) changed, the file itself has (not) changed. International Competition Network, Anti-Cartel Enforcement Manual, Chapter 3 Digital Evidence Gathering, March 2010, at page 2. Available at http://www.internationalcompetitionnetwork.org/uploads/library/doc627.pdf 59 For instance in Europe the EC, pursuant Article 23.1 of Regulation 1/2003, may impose on undertakings fines of up to 1% of their turnover if they fail to provide the information requested. See COUNCIL REGULATION (EC) No 1/2003 of 16 December 2002, supra note 51, at Article 23.1. 60 In the United Kingdom, under Section 42 of the Competition Act 1998 it is a criminal offence punishable by a fine and imprisonment not to comply with a request of information. See Competition Act 1998 available at http://www.legislation.gov.uk/ukpga/1998/41 at 42. 58 12 The alternative to carrying out dawn-raids on a company’s premises is to go directly to the cloud provider (if known) and request the information that the alleged infringer has stored. As indicated above, this might be a feasible option depending upon where the data is stored, but even assuming that the agency has jurisdiction and the data has not been either relocated or deleted, there might still be some regulatory burdens to surmount and some rights of defense to respect. Seizure of indiscriminate amounts of data without prior notice to the company concerned and without granting the possibility to be present during the investigation might violate the rights of defense in both, Europe and in the U.S. In Europe, pursuant to Regulation 1/2003, the EC has to provide a written authorization specifying the subject matter and purpose of the investigation to the person responsible in the company before proceeding with the inspection. 61 Since cloud computing is slightly different because the data is not on the premises of the company investigated but in the CP’s premises, according to Article 21 of Regulation 1/2003 the EC must issue a Decision, not simply a written authorization, and obtain a prior authorization from the national judicial authority to execute this decision.62 But even if the EC complies and notifies the company involved, the real problem is how the EC will ensure that the data provided by the CP is within and not beyond the scope of the investigation. How can the EC respect the privilege information such as lawyer-client correspondence without granting the company the possibility to monitor which information the CP is providing? The failure to comply with these requirements, which may jeopardize the surprising effects of a dawn-raid, will most likely prevent the company from exercising its rights of defense that in return will render the evidence gathered by the EC useless for prosecuting the company.63 In the U.S., the Patriot Act gives more leeway to the FBI to collect certain information from third parties without compromising an ongoing investigation. Even if a subpoena is normally needed for these types of interventions, the CP will be very limited in its ability to reveal to its client that it received the order.64 Therefore, it is likely that the company investigated only gets notice of such investigation when the DOJ or FTC discloses the final report. Nonetheless, in both jurisdictions, all these efforts to comply with the procedural rules may be in vain because of the retention policy established between the CP and the companies. In other words, if companies request the CP to permanently erase the information stored on a daily basis, by the time the antitrust authorities may suspect the existence of this data and proceed to seize it, it will be gone. As I suggested at the outset of this article, to alleviate this problem competition 61 See COUNCIL REGULATION (EC) No 1/2003 of 16 December 2002, supra note 51, at Article 20.3. Id. at Article 21.3. 63 Yves Van Gerven, Bringing “Dawn Raids” to light. Regulation 1/2003: Inspections (“Dawn Raids”) and the rights of defense. Available at http://www.vvgb-law.eu/lawyers/yves-vangerven/Resources/VanGerven_Regulation1_2003InspectionsDawnRaids.pdf 64 50 U.S.C. § 1861(d)(1). According to this provision, the CP could only disclose the request made by the FBI to those persons to whom disclosure is necessary to comply with the order, but this would normally not include CP’s client. The CP could also disclose to an attorney in order to obtain legal assistance and lastly to other persons authorized by the Director of the FBI. 62 13 authorities may impose a regulatory obligation on CPs to create a back-up of certain clients’ data for a limited period of time. In summary, competition authorities still have tools to fight cartels on the cloud, but it is crucial to boost cooperation and refine dawn-raids to minimize the opportunities for companies to delete or relocate the evidence. 4.2. Onion Routing: just when you thought it could not get worse This name refers to a new technique that enables Internet users to remain completely anonymous when they operate on the net, including hiding information about the websites they have visited and the physical locations of users.65 Onion routing (OR) works as follows: messages are repeatedly encrypted and then sent through multiple network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions and sends the message to the next router where the activity repeats until the message reaches its final destination.66 OR is not very well known yet in the legal arena, but it might be incredibly troublesome for competition agencies to detect cartels when combined with cloud computing. The aim of Tor Project, an OR provider, is to enhance privacy and security on the Internet. Among the positive applications of this technique are (i) the ability of users to prevent websites from tracking them, (ii) the possibility of publishing web sites and other services without revealing the location of the site, and (iii) for law enforcement to conduct web site surveillance without leaving government IP addresses on their web logs and strengthen security during sting operations.67 On the other hand, the potential implications for antitrust investigations are obvious. By using this technique, companies wishing to form a cartel may find the way to break the only link that competition authorities could establish between the data stored on the cloud and the companies involved: the IP address of the device used to access the data. As I have mentioned before, if a cartel is well managed, companies will use a private ad hoc cloud, accessing it through a Tor email account containing encrypted information. If that occurs, antitrust authorities may find it practically impossible to ascertain who and where the sender and receiver are and what the content of the information exchanged is. Only a mistake by one of the members could facilitate a trace to begin an investigation. One might think that the authorities could request the OR provider, for instance Tor, to provide the information necessary to ascertain who and where one of its users is located. Unfortunately, not even the founders of this technique are able to break the anonymity of its users, and they have asserted that if the U.S government ever requests that they install a backdoor in their system, they will strongly – and legally – oppose it.68 An example of onion routing is EFE’s Tor, available at https://www.torproject.org/ See Privacy on the clouds, supra note 17, at 20. 67 https://www.torproject.org/about/overview.html.en 68 https://www.torproject.org/docs/faq.html.en 65 66 14 This technique, not widely used for the time being, adds a hurdle in an antitrust investigation and in my view it should be addressed not from a technological point of view, but rather by modifying the incentives for firms to come to the authorities with the evidence. 4.3. Consequences Technology advances much faster than regulation and competition authorities do. Besides, competition authorities normally do not have the economic and personal resources to invest in IT experts and to train their personnel in IT forensics. Therefore, the most adequate solution to address this problem is by offering more incentives for companies to betray a cartel. For the time being, the most successful tool to create instability in a cartel has been a wellstructured leniency program. 69 However, even if its validity is not at stake here, leniency programs may become less efficient if companies have no reason to believe that a cartel member will blow the whistle. In this regard, it is worth remembering that in a cloud, evidence is destroyed on a regular basis, so cartel members may feel more reluctant to depart from the collusive agreement because the benefits of remaining are higher than the likelihood of being caught. Even if caught, the evidence presented by the whistle blower might refer to a shorter period of time than the actual duration of the cartel, limiting the amount of the fine that the company is facing and consequently diminishing its deterrent effect. New policies such as amnesty plus 70 and rewards schemes 71 strengthened the efficiency of leniency programs. However, as suggested in the next section, antitrust authorities should add new measures to incentivize companies to terminate cartel agreements. 5. Attempted Solutions To Deal With These Challenges 5.1. Technological Solutions 69 See Scott D. Hammond, The Evolution of Criminal Antitrust Enforcement Over the last two Decades, National Institute of White Collar Crime, February 25, 2010 available at http://www.justice.gov/atr/public/speeches/255515.htm and Neelie Kroes, Recent Developments in the European Commission’s campaign against Cartels, the 10th Annual Competition conference at the European Institute, Fisole, Italy October 13, 2006, available at http://europa.eu/rapid/pressReleasesAction.do?reference=SPEECH/06/595&format=HTML&aged=0&language=EN &guiLanguage=en 70 Amnesty Plus refers to benefits that prosecutors can offer to a cartel member who discloses previously undetected antitrust offenses involving a cartel different from the one that first brought that cartelist to the prosecutors' attention. See Thomas Barnett, Criminal Enforcement of Antitrust laws: the U.S. model, Fordham Competition Law Institute’s Annual Conference on International Antitrust Law and Policy, New York, September 14, 2006 available at http://www.justice.gov/atr/public/speeches/218336.htm. United Kingdom adopted a similar system called leniency plus available at http://www.oft.gov.uk/shared_oft/reports/comp_policy/oft803.pdf. 71 See D. Daniel Sokol, Detection and Compliance in Cartel Policy, CPI Antitrust Chronicle, September 2011. This article briefly explains the South Korean antitrust experience that in 2007 established a system by which individual informants of a cartel may be rewarded with up to $850 million if they provide valuable information that allows the agency to defeat the cartel. In 2008, United Kingdom also adopted a similar reward scheme. For more information about the UK reward scheme see http://www.oft.gov.uk/OFTwork/competition-act-and-cartels/cartels/rewards 15 Coming up with an adequate technological solution to this problem exceeds the scope of this article. Instead, I propose approaching this antitrust problem in a way that mirrors the approach adopted in other areas of law, particularly in white-collar crime. In the same way that artificial intelligence and smart systems detect fraudulent financial transactions that are subsequently reported to the authorities, it should also be possible to develop software to examine the access and data logs of cloud providers in order to flag anomalies in the sharing of information among different users or cloud clients. This software should be able to detect, for instance, when an ‘outsider’ is trying to get access to a different cloud than its own, when sensitive information like prices or output is exchanged, or even when a CP’s clients belonging to the same horizontal market are sharing information (regardless the content thereof). This software, together with the appropriate investigative tools (i.e. discovery rules, request of information to third parties, IT forensic techniques), would allow antitrust authorities to use these systems to canvass documents and databases on the cloud to identify cartel activity and likely to engage in an undercover investigation. 5.2. Legal & Regulatory Solutions Regulatory measures are probably the first idea that comes to the European regulator’s mind but the last in the minds of U.S. regulators. These type of measures are aimed at regulating the commercial relation between CPs and businesses to diminish the antitrust risk associated with cloud computing. Therefore, this category will include provisions to challenge data location, jurisdiction and data retention policy: List of clients: By obliging CPs to regularly provide a list of clients to the antitrust authorities cartels might be deterred by two means. First, antitrust authorities will have a list of the companies using cloud services before conducting an investigation that will allow the agency to refine its searches or raids (i.e. not limiting the search to seize computers). Second, companies will be restrained from using cloud computing for illegal purposes if they fear intervention by the antitrust agency (i.e. in some jurisdiction the intervention will be conducted without prior notice). Mandatory Back-up: Since companies might delete the information stored on the cloud at any time, CPs might be required to keep a back up of a client’s data upon request of the antitrust authority, especially for those companies who demand a very short retention of the data. The authorities should not have access to the information retained by the CP unless they provide the necessary subpoena or court order. This measure seeks to avoid the loss of relevant information during the initial steps of an investigation or while processing the court order. Should the investigation lack merit or the court order is not granted, the back up will be deleted permanently as requested by the company. Limiting ability to relocate data: This is probably the most intrusive clause of the three and likely the most difficult to adopt. The terms of the CPs’ contracts should limit the capacity of the parties to choose the location of the data and even the possibility to relocate this data. One possibility is to require that the location of the data be one of the parties’ legal registration, and to permit its relocation upon notification to the competent authority. A waiver of jurisdiction in favor of a given authority might be also used to limit the capacity to relocate data. 16 5.3. Economic Solutions The measures abovementioned mainly address the risks that may come along with commercial CPs, but they are not designed to tackle antitrust problems originating with ad hoc clouds. It is difficult to believe that members of a cartel who decide to set up a cloud for illegal purposes will comply with regulatory obligations. Therefore, the next set of policy recommendations is thought to deter companies from engaging in cartels using cloud-computing resources by strengthening the stick and sweetening the carrot. Aggravating circumstances: If antitrust authorities pursue more transparent clouds, they should include as an aggravating circumstance for the calculation of the fine the storage of data in a non-registered cloud provider or in a cloud that does not comply with the regulatory obligations foreseen above (see section 5.2). Antitrust authorities may grant an exception if there is a legitimate justification (i.e. the cloud is located in a territory with lower cost but the competent authority does not impose regulatory obligations) subject to the submission of evidence that the data stored is not used for illegal purposes. In this regard, the provision of hash numbers and IP addresses from the initial moment of uploading documents on the cloud may provide information to the authorities about who has accessed to the data, what modifications have been made and which documents are not longer available. Heavy fines for cartel cooperators: Fines should be imposed not only on members of a cartel but also on companies and individuals (i.e. technology brokers) who cooperate in setting up a cloud for illegal purposes. At this point, the U.S. and Europe differ widely. Whereas the U.S. would probably impose the same fine on the companies and the cooperator, in Europe, the EC had once the opportunity to sanction a company whose purpose was basically to assist companies in running their cartels, but it finally imposed a symbolic fine (EUR 1000) which obviously lacks any deterrence effect.72 5.4. Social norms and conventions Create a culture of competition: following the example of the FTC, antitrust agencies should consider the possibility of imposing Antitrust Compliance Programs for antitrust offenders. 73 These programs are imposed as a result of a violation and not ex-ante, therefore the deterrent effect of these programs resides in two elements: the economic burden that it entails to comply with it and the unpleasant situation for companies to have an antitrust compliance officer who oversees the company in order to detect and report possible antitrust concerns that might arise in the course of regular business. However, by adopting these programs the problem of recidivism is sharply reduced because companies subject to them are continuously monitored, their opportunities to 72 Judgment of the GC (then CFI) of July 8, 2008, in the case T-99/04, AC-Treuhand v. Commission. The FTC has imposed in three cases Antitrust Compliance Programs to companies found guilty of violations of Section 5 of the Federal Trade Commission Act, as amended, 15 U.S.C. § 45. The three orders were imposed to Pool Corporation (Docket No. C-4345, adopted January 10, 2012), Transitions Optical, Inc. (Docket No. C-4289, adopted April 22, 2010) and NAMM (Docket No. C-4255 adopted April 8, 2009). These programs impose, inter alia, the following obligation on the companies: appointment of an Antirust Compliance Officer, in-person antitrust training to Executive and Sales staff, distribution of the order to the company’s clients, publication in the company’s website the content of the order and retention of documents to comply with further obligations. 73 17 depart from competitive behavior are rather limited and because companies free of these programs but with an antitrust history might decide ex ante not to use cloud computing for these purposes. More media coverage showing the ‘bad behavior’ of antitrust offenders: while this action is not specifically addressed to combat cartel activities using cloud computing, some articles show that the economic impact of a bad reputation for a corporation might be more devastating than a fine.74 Consequently, if antitrust violations gain some weight in the public media, companies and CPs will be more diligent in their businesses to ensure that they are not on the front page of a newspaper accusing them of depriving consumers from better prices and services. Adoption of criminal sanction: Even though this proposal appears at the very end of this article, the adoption of criminal sanctions could really mitigate an individual’s incentives to operate a cartel in a cloud. There is vast literature about the pros and cons of adopting criminal sanctions to obtain the optimal deterrent effect.75 However, it seems undeniable that those jurisdictions like the U.S. or U.K. where individuals can be imprisoned are in a better position to deter executives from uploading information in a cloud or acceding to somebody else’s cloud than other jurisdictions like Europe where only companies might be fined. To articulate a refined cartel using cloud computing requires a continuous commitment from an individual to upload and exchange information, to share personal passwords, to use personal electronic devices and to adopt decisions the company might not be aware of even when conducting internal investigations and compliance programs. Therefore, it is important to allocate some risks to the individual to avoid companies’ arguments that the conduct was unknown by the board and it is the sole responsibility of the individual, because unlike traditional cartels, this time it might be true. 6. Conclusion Cloud computing is offering IT solutions for companies worldwide, but new technology is not exempt from problems. Some of the problems mentioned in this article (i.e. location of the data, data protection and data retention) are a result of the cloud infrastructure itself and from the business model chosen by the CPs. However, other problems might be brought by companies using cloud services for illegal purposes (i.e. sharing sensitive information with competitors). The sophistication in exchanging 74 See Johan J. Graafland, Collusion, Reputation Damage and Interest in Codes of Conduct: The Case of a Dutch Construction Company, MPRA Paper No. 20281, January 27, 2010 available at http://mpra.ub.unimuenchen.de/20281/1/MPRA_paper_20281.pdf and Pete Engardio and Michael Arndt, What Price Reputation? Many savvy companies are starting to realize that a good name can be their most important asset—and actually boost the stock price, BUS. WK., July 9, 2007 available at http://www.businessweek.com/print/magazine/content/ 75 See, inter alia, OECD, Policy Roundtable Cartel Sanctions Against Individuals, January 10, 2005 available at http://www.oecd.org/dataoecd/61/46/34306028.pdf; Wouter P.J. Wils, Is criminalization of EU Competition law the Answer? European University Institute Robert Schuman Center for Advance Studies, 2006 EU Competition Law and Policy Workshop, available at http://www.eui.eu/RSCAS/Research/Competition/2006(pdf)/200610-COMPedWils.pdf and Cindy R. Alexander & Mark A. Cohen, The Causes of Corporate Crime: An Economic Perspective in PROSECUTORS IN THE BOARDROOM: USING CRIMINAL LAW TO REGULATE CORPORATE CONDUCT 33 (Anthony Barkow & Rachel Barkow eds., 2011) 18 that information may reach levels never seen before, preventing antitrust authorities from finding evidence of the unlawful conduct. The technology nowadays allows Internet users, corporations included, to navigate the web anonymously, to exchange files without leaving any trace and to access information stored in a cloud anywhere at anytime. To fight the collusive effects that are envisaged to occur, competition authorities across the globe will have to cooperate closer than ever and foresee common procedures to react quickly every time that a competition agency requests assistance in compelling a CP or a third party to furnish the information needed. Notwithstanding this cooperation, the real challenge for the authorities will be to cope with the new technological developments having scarce resources and, sometimes, limited investigative tools to achieve satisfactory results. In this regard, it is worth noting that some jurisdictions are initially in a better position than others to deter and investigate cartels. For instance, in the U.S. the powers granted by the Patriot Act to the FBI to collect information from third parties (cloud providers) without notifying the concerned company are far more effective than the requests of information that the European Commission is authorized to convey. Similarly, the possibility of imposing criminal sanctions to individuals has a wider deterrent effect that the pecuniary sanctions. Yet, irrespective of the investigative tools, the still unclear legal characterization of cloud providers may add administrative hurdles in an investigation, obliging the antitrust authorities to refine their investigations to avoid breaching the rights of defense of the company investigated. To overcome these problems I suggest a combination of technological, regulatory and economic solutions that will deter companies from using clouds for the wrong purposes. By creating software that detects suspicious movements in a cloud, such as the exchange of prices between cloud users, and by imposing some data retention obligations on CPs it would be possible to eliminate most of the antitrust problems related with the cloud infrastructure and the CP business model. In addition to these measures, if competition authorities strengthen the stick for companies that exchange information on the cloud (i.e. higher fines, imposition of antitrust compliance programs and adoption of criminal sanctions) it is almost certain that companies will see cloud computing as it should be, a powerful technological tool that will help them to reduce costs, work more efficiently and compete more fiercely in the market to offer better prices and services to customers. 19