[House Hearing, 109 Congress]
[From the U.S. Government Publishing Office]



             H.R. 5319, THE DELETING ONLINE PREDATORS ACT OF 
                                  2006


                                 HEARING

                               BEFORE THE

               SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE 
                                INTERNET

                                 OF THE 

                        COMMITTEE ON ENERGY AND 
                                COMMERCE

                        HOUSE OF REPRESENTATIVES


                       ONE HUNDRED NINTH CONGRESS

                             SECOND SESSION


                             JULY 11, 2006

                           Serial No. 109-121

       Printed for the use of the Committee on Energy and Commerce


Available via the World Wide Web:  http://www.access.gpo.gov/congress/house

                    U.S. GOVERNMENT PRINTING OFFICE
30-410                      WASHINGTON : 2006
_____________________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov  Phone: toll free (866) 512-1800; DC area (202) 
512-1800 Fax: (202) 512-2250  Mail: Stop  SSOP, Washington, DC 20402-0001



                    COMMITTEE ON ENERGY AND COMMERCE
                       JOE BARTON, Texas, Chairman
RALPH M. HALL, Texas                      JOHN D. DINGELL, Michigan
MICHAEL BILIRAKIS, Florida                  Ranking Member
  Vice Chairman                           HENRY A. WAXMAN, California
FRED UPTON, Michigan                      EDWARD J. MARKEY, Massachusetts
CLIFF STEARNS, Florida                    RICK BOUCHER, Virginia
PAUL E. GILLMOR, Ohio                     EDOLPHUS TOWNS, New York
NATHAN DEAL, Georgia                      FRANK PALLONE, JR., New Jersey
ED WHITFIELD, Kentucky                    SHERROD BROWN, Ohio
CHARLIE NORWOOD, Georgia                  BART GORDON, Tennessee
BARBARA CUBIN, Wyoming                    BOBBY L. RUSH, Illinois
JOHN SHIMKUS, Illinois                    ANNA G. ESHOO, California
HEATHER WILSON, New Mexico                BART STUPAK, Michigan
JOHN B. SHADEGG, Arizona                  ELIOT L. ENGEL, New York
CHARLES W. "CHIP" PICKERING,  Mississippi ALBERT R. WYNN, Maryland
  Vice Chairman                           GENE GREEN, Texas
VITO FOSSELLA, New York                   TED STRICKLAND, Ohio
ROY BLUNT, Missouri                       DIANA DEGETTE, Colorado
STEVE BUYER, Indiana                      LOIS CAPPS, California
GEORGE RADANOVICH, California             MIKE DOYLE, Pennsylvania
CHARLES F. BASS, New Hampshire            TOM ALLEN, Maine
JOSEPH R. PITTS, Pennsylvania             JIM DAVIS, Florida
MARY BONO, California                     JAN SCHAKOWSKY, Illinois
GREG WALDEN, Oregon                       HILDA L. SOLIS, California
LEE TERRY, Nebraska                       CHARLES A. GONZALEZ, Texas
MIKE FERGUSON, New Jersey                 JAY INSLEE, Washington
MIKE ROGERS, Michigan                     TAMMY BALDWIN, Wisconsin
C.L. "BUTCH" OTTER, Idaho                 MIKE ROSS, Arkansas                       
SUE MYRICK, North Carolina
JOHN SULLIVAN, Oklahoma
TIM MURPHY, Pennsylvania
MICHAEL C. BURGESS, Texas
MARSHA BLACKBURN, Tennessee


                       BUD ALBRIGHT, Staff Director
                      DAVID CAVICKE, General Counsel
        REID P. F. STUNTZ, Minority Staff Director and Chief Counsel


                SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE 
                                 INTERNET
                       FRED UPTON, Michigan, Chairman
MICHAEL BILIRAKIS, Florida                EDWARD J. MARKEY, Massachusetts
CLIFF STEARNS, Florida                      Ranking Member
PAUL E. GILLMOR, Ohio                     ELIOT L. ENGEL, New York
ED WHITFIELD, Kentucky                    ALBERT R. WYNN, Maryland
BARBARA CUBIN, Wyoming                    MIKE DOYLE, Pennsylvania
JOHN SHIMKUS, Illinois                    CHARLES A. GONZALEZ, Texas
HEATHER WILSON, New Mexico                JAY INSLEE, Washington
CHARLES W. "CHIP" PICKERING,  Mississippi RICK BOUCHER, Virginia
VITO FOSSELLA, New York                   EDOLPHUS TOWNS, New York
GEORGE RADANOVICH, California             FRANK PALLONE, JR., New Jersey
CHARLES F. BASS, New Hampshire            SHERROD BROWN, Ohio
GREG WALDEN, Oregon                       BART GORDON, Tennessee
LEE TERRY, Nebraska                       BOBBY L. RUSH, Illinois
MIKE FERGUSON, New Jersey                 ANNA G. ESHOO, California
JOHN SULLIVAN, Oklahoma                   BART STUPAK, Michigan
MARSHA BLACKBURN, Tennessee               JOHN D. DINGELL, Michigan
JOE BARTON, Texas                           (EX OFFICIO)                            
  (EX OFFICIO)

                               CONTENTS


                                                                        Page
Testimony of:
        Abbott, Hon. Greg, Attorney General, Office of the 
                Attorney General, State of Texas	                  25
        Aftab, Esq., Parry, Executive Director, WiredSafety.org	          31
        Collins, Michelle, Director, Exploited Child Unit, 
                National Center for Missing and Exploited Children	  90
        Davis, Ted, Director, Knowledge Asset Management, IT 
                Department, Fairfax County Public Schools	          95
        Kelly, Chris, Vice President, Corporate Development 
                and Chief Privacy Officer, Facebook	                 104
        Lenhart, Amanda, Senior Research Specialist, Pew 
                Internet and American Life Project	                 111
        Yoke, Beth, Executive Director, ALA Young Adult 
                Library Services Association	                         127
        Zellis, David W., First Assistant District Attorney, 
                Office of the Bucks County District Attorney, 
                Commonwealth of Pennsylvania	                         135
Additional material submitted for the record:
        Racine, Elizabeht, prepared statement of	                 154
        Resnick, Michael A., Associate Executive Director, 
                National School Boards Association, prepared 
                statement of	                                         158

          H.R. 5319, THE DELETING ONLINE PREDATORS ACT OF 
                                   2006


                          TUESDAY, JULY 11, 2006

                         HOUSE OF REPRESENTATIVES,
                     COMMITTEE ON ENERGY AND COMMERCE,
          SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET,
                                                             Washington, DC.


        The subcommittee met, pursuant to notice, at 10:10  a.m., in 
Room 2123 of the Rayburn House Office Building, Hon. Fred 
Upton [Chairman] presiding.
        Members present:  Representatives Upton, Gillmor, Whitfield, 
Cubin, Shimkus, Wilson, Bass, Walden, Terry, Ferguson, 
Blackburn, Barton [ex officio], Markey, Engel, Wynn, Gonzalez, 
Inslee, Eshoo, and Stupak.
        Also Present:  Representatives Fitzpatrick and Kirk.
Staff Present:  Howard Waltzman, Chief Counsel for 
Telecommunications and Internet; Anh Nguyen, Legislative Clerk; 
Jaylyn Jensen, Senior Legislative Analyst; Johanna Shelton, 
Minority Counsel; and David Vogel, Minority Research Assistant.  
        MR. UPTON.  Morning, everyone.  Today we are holding a 
hearing on H.R. 5319, the Deleting Online Predators Act of 2006, 
which was introduced recently by Representatives Fitzpatrick and 
Kirk.  
        Under the leadership of Chairman Whitfield and Chairman 
Barton, the Oversight and Investigations Subcommittee has held 
multiple hearings, exposing the appalling sexual exploitation of 
children on the Internet.  This includes the dark underside of social 
networking websites, which have become stalking grounds for 
sexual predators who are preying on children all across the Nation.  
We have had many such cases in my own State of Michigan, far 
too many.  
        Federal law enforcement officials have described the sexual 
abuse and exploitation of our Nation's youth as an "epidemic" 
propagated by the unlimited access of the Internet.  The statistics 
are alarming.  The FBI has seen a 2,026 percent increase in its 
caseload of online sexual predators in the last 10 years.  Of the 
estimated 24 million child Internet users, one in five kids has 
received unwanted sexual solicitations.  It is estimated that at any 
given moment, 50,000 predators are prowling for children online, 
many of whom are lurking within social networks.  
At a minimum, what our hearings have taught us is that both 
children and parents need to become better educated about the 
dangers of social networking websites, and parents need to police 
their children's online use at home to guard against sexual 
predators.  
        However, to the extent that children are using the Internet 
outside the home, particularly at school or at the public library, 
parents are not able to monitor their children's online use, and that 
is a situation that H.R. 5319 is designed to address.  
        At its heart, H.R. 5319 would require schools and libraries 
which receive E-rate funding to restrict minors' access to 
commercial social networking websites through which such minors 
may easily be subject to unlawful sexual advances, unlawful 
requests for sexual favors, or repeated offensive comments of a 
sexual nature from adults.  
        The approach taken by H.R. 5319 is not dissimilar to the 
approach taken by the Children's Internet Protection Act, through 
which Congress requires schools and libraries that receive E-rate 
funding to impose filtering technology to protect kids from online 
visual depictions of an inappropriate sexual nature.  
        I have long supported and remain a strong supporter of the 
E-rate.  I visit a school every week and I have seen the tremendous 
educational value which the Internet has brought to students 
throughout my congressional district, and I recognize the 
importance of the E-rate in making this a reality.  
        However, as with all technologies, the Internet is a 
double-edged sword, and Congress has a responsibility to ensure 
that, to the extent that a Federal program is involved, it is doing all 
that it can to ensure that kids are protected from  online dangers.  
        H.R. 5319 represents yet another step in making our children's 
online experience at school or at the library safe.  I want to thank 
our witnesses for being with us today, and I look forward to 
hearing their views on H.R. 5319, and I yield to the gentlelady 
from California for an opening statement.  
        [Prepared statement of Hon. Fred Upton follows:] 

PREPARED STATEMENT OF THE HON. FRED UPTON, CHAIRMAN, 
SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET 

        Good morning.  Today we are holding a legislative hearing on 
H.R. 5319, the "Deleting Online Predators Act of 2006," which 
was introduced by Representatives Fitzpatrick and Kirk.  
        Under the leadership of Chairman Whitfield and Chairman 
Barton, the Oversight and Investigation Subcommittee has held 
multiple hearings exposing the appalling sexual exploitation of 
children on the internet.  This includes the dark underside of social 
networking websites, which have become stalking grounds for 
sexual predators who are preying on children all across the nation.  
We have had many such cases in my own home state of 
Michigan.far too many.  
        Federal law enforcement officials have described the sexual 
abuse and exploitation of our nation's youth as an "epidemic" 
propagated by the unlimited access of the Internet.  The statistics 
are alarming - the FBI has seen a 2,026% increase in its caseload 
of online sex predators in the last 10 years.  Of the estimated 24 
million child Internet users, one in five kids has received unwanted 
sexual solicitations.  It is estimated that at any given moment, 
50,000 predators are prowling for children online - many of whom 
are lurking within social networks.  
        At a minimum, what our hearings have taught us is that both 
children and parents need to become better educated about the 
dangers of social networking websites, and parents need to police 
their children's on-line use at home to guard against sexual 
predators.  
        However, to the extent that children are using the Internet 
outside the home, particularly at school or at the public library, 
parents are not able to monitor their children's on-line use - and 
this is the situation that H.R. 5319 is designed to address.
        At its heart, H.R. 5319 would require schools and libraries 
which receive e-rate funding to restrict minors' access to 
commercial social networking websites through which such minors 
may easily be subject to unlawful sexual advances, unlawful 
requests for sexual favors or repeated offensive comments of a 
sexual nature from adults.   
        The approach taken by H.R. 5319 is not dissimilar to the 
approach taken by the Children's Internet Protection Act, through 
which Congress requires schools and libraries that receive e-rate 
funding to impose filtering technology to protect kids from on-line 
visual depictions of an inappropriate sexual nature.  
        I have long supported the e-rate, and I continue to do so.  I visit 
a school a week and have seen the tremendous educational value 
which the Internet has brought to students throughout my district, 
and I recognize the importance of the e-rate in making this a 
reality.  
        However, as with all technologies, the Internet is a double-
edged sword, and Congress has a responsibility to ensure that, to 
the extent that a federal program is involved, it is doing all that it 
can to ensure that children are protected from on-line dangers.   
H.R. 5319 represents yet another step in making our children's on-
line experience at school or at the library safe.  
        So, I want to thank our witnesses for being with us today, and I 
look forward to hearing their views on H.R. 5319.  

        MS. ESHOO.  Thank you, Mr. Chairman.  And thank you to all 
of the witnesses that are here today.  We are going to learn from 
you.  I would particularly like to welcome Chris Kelly, who is 
representing Facebook, a company that is located in the heart of 
my congressional district, Palo Alto.  So thank you for traveling 
across the country and being here with us today.  
        Without a doubt, everyone here today, everyone, whether they 
are at the witness table, in the audience in the hearing room, and 
the Members of Congress that are here, are concerned about 
predators that stalk the most vulnerable in our society, our 
children.  I think the most important thing that can come out of the 
hearing today is raising the awareness of the problem and what 
some of the solutions are.  
        Certainly the bill directs itself to be a solution.  I think we need 
to build on that.  This is an issue that parents--I don't think we 
need to teach them more about it.  They are already concerned.  
They want solutions; that is our job.  
        I think it is important for us to all understand that the computer 
that is in our den or in the family room or in our children's 
bedrooms is really a public space, and I don't think we think of it 
that way.  A computer with Internet access is no more private than 
a busy street or the mall or the grocery store unless we take steps to 
secure it.  No parent or teacher would drop a child off in Times 
Square and say, "Have fun, make sure you don't leave the Disney 
store."  That just isn't a reality.  So why would anyone turn their 
children loose on the Net without supervision and other safeguards 
to protect them?  
        Nothing is more important than close supervision, and 
monitoring of a child's Web surfing, and a host of tools are 
available to make this difficult task even easier and more effective.  
        Ten years ago, I introduced legislation, the On-Line Parental 
Control Act, to encourage the use of technology, and most Internet 
service providers now offer parental control tools to their 
customers.  Combined with technological support, parental 
vigilance is the single most effective thing anyone can do to stop 
online predators.  I believe that, and I think it has been borne out.  
        I think we also have to bear in mind that the Internet and many 
of the sites we will be discussing today are the source of great 
convenience, enriching our educational experiences, and 
collectively are the leading sector of our economy.  Just as the Net 
has revolutionized communications, e-mail, instant messaging, 
VOIP, and e-commerce, websites like Friendster, MySpace, and 
Facebook have transformed the way we, particularly young people, 
socialize, make new friends, and establish business contacts.  
These are tremendous new services, and Web networking is by no 
means a negative development, but it does create real challenges 
for companies, for policymakers, and for parents to ensure the 
safety and well-being of our kids.  
        We have to confront these challenges in a way that addresses 
the dangers that exist, without causing unnecessary collateral 
damage to some of the very valuable sites and services now 
available on the Net.  And I think that this is going to be a real 
valuable exercise in terms of this hearing because the working 
knowledge of Members that are going to make these policy 
decisions, in my view, needs to be broadened and deepened at the 
same time.  
        So I look forward to hearing from each one of the witnesses.  
Mr. Chairman, thank you for your able leadership of our 
subcommittee, and thank you for having this hearing today.  
        MR. UPTON.  I thank the gentlelady.  I would ask at this point 
unanimous consent that the two sponsors of the bill, Mr. Kirk and 
Mr. Fitzpatrick, might be able to participate in the hearing and, 
obviously, follow the regular order, which would be after the 
members of the subcommittee.  And without hearing objection, 
that should be the case.  
        We would recognize for an opening statement the Chairman of 
the full committee, the good gentleman from Texas, Mr. Barton.  
        CHAIRMAN BARTON.  Thank you Mr. Chairman.  I want to 
extend a personal welcome to my good friend, personal friend of 
longstanding, Attorney General of Texas, Greg Abbott.  Glad to 
have you here, General.  We appreciate you being willing to testify 
on this small panel of seven other people.  We appreciate your 
humility, and we certainly appreciate your service to the State of 
Texas and extension of some of the things you are doing for the 
citizens of our entire country.  
        We are here today to have a legislative hearing on H.R. 5319, 
the Deleting Online Predators Act of 2006.  It has been authored 
by Congressman Fitzpatrick, who is also with us up here on the 
dais.  I would like to welcome some of our witnesses who have 
testified before Mr. Whitfield's subcommittee, who has been 
holding a hearing on this malaise.  We have Mr. Chris Kelly from 
Facebook, we have Parry Aftab from WiredSafety.org.  They have 
already participated in Mr. Whitfield's hearings, and we are glad to 
have you here at the legislative hearing.  
        We were not able to get a representative of MySpace to testify 
at today's hearing, which I think is unfortunate.  The Oversight and 
Investigations Subcommittee has been holding a series of hearings 
to investigate the sexual exploitation of children on the Internet.  
The hearings have focused on the growing Internet child 
pornography trade, and the tools that sexual predators use to 
victimize our children.  We have also tried to determine what, if 
anything, is being done or can be done to find, prosecute, and 
convict the child predators in our society.  
        The Oversight Subcommittee has heard from the Federal Trade 
Commission, Federal Communication Commission, law 
enforcement agencies, children subjected to sexual abuse, victims' 
advocates, and some of these Internet service providers.  
        H.R. 5319 targets children's use of social networking websites 
and chat rooms in schools and libraries.  As participation in these 
Internet "social communities" rises to record numbers, so do the 
news reports of a multitude of potential dangers they pose.  
        There is no question that the Internet does and will continue to 
provide innovative benefits to society.  However, we must take 
steps now to protect our children, and this is a priority of this 
subcommittee and also of the full committee, and, I might add, it is 
a priority on both sides of the aisle.  Mr. Dingell shares this 
concern just as much as I do.  We need to prevent predators from 
using the Internet and social networking sites, in particular to prey 
on our children.  
        I look forward to hearing from our witnesses today in order to 
better understand the social networking phenomenon, the benefits 
and the problems that it creates.  If we can understand this, it will 
enable us to strike the right balance regarding the appropriate role 
for the Federal government and Federal legislation to play in 
helping our educators keep our children safe on the Internet.  
        It would seem to me that H.R. 5319 is a step in the right 
direction.  Schools and libraries that receive universal service 
subsidies have an obligation to ensure that their subsidized 
communication services do not become a hunting ground for 
pedophiles.  If social networking sites are not taking the necessary 
precautions to prevent the exploitation of children, then, at the very 
least, Congress should prohibit the use of federally mandated funds 
to access Internet sites that put children in harm's way.  
        Again, I want to thank Attorney General Abbott for being here.  
I want to thank the other witnesses for being here.  And I thank 
you, Mr. Chairman, for holding this hearing. 
        [Prepared statement of Hon. Joe Barton follows:] 

PREPARED STATEMENT OF THE HON. JOE BARTON, CHAIRMAN, 
COMMITTEE ON ENERGY AND COMMERCE 

        Mr. Chairman, thank you for holding this hearing today on 
H.R. 5319, the "Deleting On-line Predators Act of 2006" authored 
by Congressman Fitzpatrick.  I'd like to once again welcome Mr. 
Chris Kelly from Facebook, and Ms. Parry Aftab from 
WebSafety.org, both of whom have participated in earlier hearings 
held by our Oversight and Investigations Subcommittee, on the 
issue of sexual exploitation of children over the Internet.  Although 
I am disappointed that Myspace declined to send a representative 
to attend today's hearing, I would like to offer a warm welcome to 
the Attorney General from my home state of Texas, The Honorable 
Greg Abbott.  Thank you - and all of the witness on the panel  - for 
taking the time out of your busy schedules to appear before us 
today.  
        The Oversight and Investigations Subcommittee is currently 
holding a series of hearings to investigate the sexual exploitation of 
children on the Internet.  The hearings have focused primarily on 
the growing Internet child pornography trade, the tools sexual 
predators use to victimize children, and what can, and is, being 
done to find, prosecute and convict child predators.  The 
Subcommittee has heard from the FTC, FCC, law enforcement 
agencies, children subjected to abuse, victims advocates, and most 
recently from Internet Service Providers and social networking site 
owners.
        H.R. 5319 targets children's use of social networking websites 
and chat rooms in schools and libraries.  As participation in these 
Internet "social communities" rises daily in record numbers, so do 
the news reports of a multitude of potential dangers they pose.  
        There is no question that the Internet does and will continue to 
provide innovative benefits to society far into the future.  However, 
the protection of our children must be a priority of this government 
and of our society.  We need to prevent predators from using the 
Internet, and social networking sites in particular, to prey on 
children.  
        I look forward to hearing from our witnesses today in order to 
better understand the social networking phenomenon and the 
benefits and problems it creates.  Understanding this will enable us 
to strike the right balance regarding what role, if any, the Federal 
Government and educators should play in keeping our children 
safe on the Internet.  
        H.R. 5319 is certainly a step in the right direction.  Schools and 
libraries that receive universal service subsidies have an obligation 
to ensure that their subsidized communications services do not 
become a hunting ground for pedophiles.  If social networking 
sites are not taking the necessary precautions to prevent the 
exploitation of children on their sites, then, at the very least, 
Congress should prohibit the use of federally-mandated funds to 
access Internet sites that put children in harm's way.
        I look forward to hearing from our witnesses, and I yield back 
the balance of my time.

        MR. UPTON.  At this point I would recognize the gentleman 
from Texas, Mr. Gonzalez.  
        MR. GONZALEZ.  I commend you for all of your efforts, and I 
want to welcome all of the witnesses but, again, I want to echo the 
sentiments of the full committee, Mr. Barton, in welcoming our 
esteemed Attorney General Greg Abbott who served admirably on 
our Supreme Court.  It is good to see you again.  As we speak, 
there are different maps being drawn regarding our congressional 
districts.  So I really do welcome you, Greg.  
        But, seriously, what we are dealing with today cannot be 
adequately emphasized as to the importance of our respective 
constituencies.  This is something that is commonly held no matter 
where you go, whether it is a Republican or a Democratic district, 
regardless of the region and such.  The question really is:  What 
can we do in a practical sense and technologically that is feasible, 
and looking at the legalities too?  
        So I really do welcome Greg's perspective on this.  But overall, 
at the end of the whole process, this is really quite limited when 
you think in terms of libraries, schools, and so on.  And the legal 
nexus that allows us to provide or mandate certain conditions on 
these institutions and such is really the Universal Service Fund; 
and that is another issue, by the way, which has still not been 
resolved by this committee as we move forward regarding that 
particular issue.  
        So it is important to keep that in mind.  In other words, what 
gives this Congress jurisdiction to impose those particular 
conditions?  At the end of the process, though, we have to see what 
is the potential of the unintended consequence of the legitimate use 
of the Internet, and I think this committee is always driven with 
that particular goal in mind.  And it is what we are doing because 
we know there are always going to be criminal and illegitimate 
uses of the Internet, but as we attempt to govern those and address 
the concerns of our constituents, the big picture, though, is the 
majority of the use of the Internet is legitimate, and it has been a 
tremendous economic accelerator and such for this country, and we 
can't again impede its progress.  But nevertheless, I think that we 
can still have the best of both worlds, and hopefully the testimony 
of the witnesses will guide us there today, and I yield back.  
        Thank you, Mr. Chairman. 
        MR. UPTON.  Mr. Gillmor.  
        MR. GILLMOR.  Thank you very much, Mr. Chairman, and I 
appreciate your holding this hearing.  As a member of both this 
subcommittee and as a strong advocate of strong sex offender 
laws, I think this hearing is an important step in protecting our 
children from violent predators.  As a sponsor of two bills, H.R. 95 
and H.R. 4815, which were aimed at giving American families 
access to necessary information they need to protect themselves 
from violent sexual offenders through a national database.  I point 
out that both of those bills have been incorporated in other 
legislation and have now passed the House of Representatives.  
However, I believe that our schools and our libraries have been 
taken for granted as a safe haven that is free of illicit and illegal 
cyber content.  Unfortunately, we know that is not the case.  And I 
agree with the concepts promoted by H.R. 5319--but I believe that 
today's discussion is simply the beginning of an in-depth dialogue 
between policymakers and industry leaders.  Clearly, social 
networking and chat technologies are not inherently bad and they 
offer many benefits.  Yet, in using them, we have to be sure that 
we protect the safety of our children.  
        A recent study funded by the National Center For Missing and 
Exploited Children, Dr. David Finkelhor, Director of Crimes 
Against Children Research Center, found that one out of every five 
children received a sexual approach or a solicitation over the 
Internet in the past year.  Additionally, in a separate study 
commissioned by the National Association of School Resource 
Officers and conducted by the National School Safety and Security 
Services, the leading independent national school safety and 
security firm based in Cleveland, Ohio, showed 55 percent of 
school safety officers stating that concerns regarding 
Internet-based crimes had increased in their school community in 
the past 2 years.  These are alarming statistics and I think we ought 
to take the necessary steps to protect our Nation's families before 
tragedy can befall other witnesses.  
        Mr. Chairman, I have been pleased to work closely with the 
Safe Now Project on the two bills of mine that I mentioned, and I 
look forward to working with them, members of this committee, 
industry, and leadership to ensure that our Nation's children are 
protected, while allowing consumers to continue to realize the 
benefits of these technologies.  And I yield back.  
[Prepared statement of Hon. Paul E. Gillmor follows:] 

PREPARED STATEMENT OF THE HON. PAUL E. GILLMOR, A 
REPRESENTATIVE IN CONGRESS FROM THE STATE OF OHIO 

        Thank you for holding this very important hearing.  As a 
member of this subcommittee and as a strong advocate for 
increasing our nation's sex offender laws, I see this hearing as an 
important step in protecting our country's children from violent 
predators.
        As the sponsor of two bills, H.R. 95 and H.R. 4815, aimed at 
giving American families unfettered access to the necessary 
information they need to protect themselves from violent sexual 
offenders, I believe that our schools and libraries have been taken 
for granted as a safe haven that is free from illicit and illegal cyber 
content.  Although I agree with the concepts promoted by H.R. 
5319, I believe today's discussion is simply the beginning of an in-
depth dialogue between policymakers and industry leaders because 
social-networking and chat technologies are not inherently bad and 
offer many benefits-yet we must ensure the safety of our 
children.  
        In a recent study funded by the National Center for Missing 
and Exploited Children, Dr. David Finkelhor, Director of the 
Crimes Against Children Research Center, found that one in every 
five children received a sexual approach or solicitation over the 
Internet in the past year.  Additionally, in a separate study 
commissioned by the National Association of School Resource 
Officers and conducted by National School Safety and Security 
Services, a leading independent national school safety and security 
firm based in Cleveland, Ohio, showed 55% school safety officers 
stating that concerns regarding Internet-based crimes had increased 
in their school-community in the past two years.  Mr. Chairman, 
these are alarming statistics and we must take the necessary steps 
to protect our nation's families and before tragedy can befall 
another needless victim.  
        Mr. Chairman, I have been pleased to work closely with the 
Safe Now Project on both of my bills, and I look forward to 
continuing to work with them, members of this committee, 
industry, and leadership to ensure that our nation's most precious 
assest-our children-are protected while allowing consumers to 
continue to realize the benefits of these technologies.  This 
challenge must be met and a delicate balance must be struck, but 
we must come together in good faith to make certain that our 
schools and libraries continue to be a sanctuary for learning and 
growth.

        MR. UPTON.  I thank the gentleman, and recognize the Ranking 
Member of the subcommittee, Mr. Markey from Massachusetts.  
        MR. MARKEY.  Thank you, Mr. Chairman, very much.  And I 
want to commend you, Mr. Chairman, for calling this hearing this 
morning on Internet chat rooms and social networking sites and 
legislation making certain requirements on K through 12 schools 
and libraries seeking to receive E-rate funding.  There is a rising 
concern over Internet sites in the context of child exploitation.  The 
Oversight and Investigations Subcommittee has held several 
hearings on this subject.  While there are age and other restrictions 
on many of the sites, including MySpace.com and Facebook, there 
are questions as to how such restrictions are verified and enforced.  
This subcommittee has a long history of working to ensure a safe 
environment for children on the Internet.  
        In 2000, Congress enacted the Internet safety requirements for 
schools and libraries receiving E-rate funding to ensure that such 
entities were monitoring children's online activities, to thwart 
access to material that was harmful to minors.  
        In addition, I cosponsored legislation with Representative John 
Shimkus, which promoted healthy and safe Internet surfing for 
children with the dot-kids law.  That law establishes a domain for 
sites with content safe for kids and prevents any links outside of 
the domain.  
        Legislation before this subcommittee seeks to go further and 
proposes to create additional requirements on schools and libraries.  
These requirements would require K through 12 schools and 
libraries to certify that they prohibit access to social networking 
sites and chat rooms through which minors may easily access or be 
presented with indecent materials or easily be subjected to 
unlawful sexual advances.  Without question, combating child 
exploitation and safeguarding children is a high priority.  
        In pursuit of that goal, we should be mindful, however, of 
devising new requirements that may be plagued by terminological 
inexactitude, a standard that is based upon what may or may not be 
easily accessed may be difficult to define and enforce.  
        In addition, I have reservations about utilizing the E-rate 
funding mechanism as the legislative hook for Federal involvement 
in this area.  That is because the E-rate program was not designed 
to be a cop on the beat in the front lines, battling child predators.  
Rather, it was designed to enhance Internet access and bridge the 
digital divide.  As a result, it is a program which may not help or 
assist all K through 12 schools at any time, or individual schools in 
every funding cycle.  
        In other words, if the goal is protecting children and combating 
child exploitation, why should these requirements only apply in 
schools receiving E-rate funding?  In other words, only the poorest 
schools.  Why should we not ensure that every child in every 
school be protected?  
        Our colleague, Representative Melissa Bean of Illinois, has 
similar legislation, the Safeguarding America's Families by 
Enhancing and Reorganizing New and Efficient Technologies Act 
of 2006, or the SAFER NET Act.  This legislation puts authority in 
the Federal Trade Commission to establish an Office of Internet 
Safety and Public Awareness.  That office would have the task of 
evaluating Internet safety efforts and activities provided at various 
levels of government, eliminating redundancy of efforts at various 
levels of government and serving as the primary contact in the 
Federal government, and as a national clearinghouse for 
information and public awareness efforts regarding Internet safety.  
        I commend that legislation as well to the subcommittee's 
attention, recognizing, Mr. Chairman, quite well, that it is not 
within our subcommittee's jurisdiction.  However, it is within the 
full committee's jurisdiction, and it may warrant our attention as 
we continue to look into these matters.  
        I think it is important, Mr. Chairman, that we not be limited 
just to E-rate beneficiaries.  I don't think that really should be the 
purpose of this legislation; otherwise, only if you are in a poorer 
school would you be protected.  Whereas, we want to ensure that 
as we look at this issue, that there is, in fact, a universal 
application, or else in many ways it may be struck down as being 
unconstitutional, as not being a ubiquitous piece of legislation.  So 
I yield back the balance of my time. 
        MR. UPTON.  Mr. Shimkus.  
        MR. SHIMKUS.  Mr. Chairman, I waive for questions.  
        MR. UPTON.  Mrs. Wilson.  
        MRS. WILSON.  Thank you, Mr. Chairman, and thank you for 
holding this hearing today.  I wanted to also thank Congressman 
Fitzpatrick for his leadership on this issue.  When kids are at a 
point in their lives where they are listening to their peers more than 
they are listening to their parents, it is at the point of which they 
are really most vulnerable, and that is really in the teen years 
where they are vulnerable to people who, if they met them in 
person, there might be more flags that went off that said there is 
something not right here, I don't like this, and they would be 
willing to walk away.  But on the Internet, those flags that kids 
learn from a very young age about what is safe and what doesn't 
feel safe are often not there, or are intentionally hidden by people 
who want to exploit them.  
        It is very hard to raise G-rated kids in an R-rated world.  And 
we should be able to give schools and parents more tools to allow 
their kids to grow up safely and to move towards being more 
independent, which is a very natural thing for teenagers while 
being still in a safe place.
        My colleague, Mr. Shimkus, has led this effort on this 
committee on the dot-kids legislation, and Mr. Green of Texas and 
I sponsored legislation that ultimately became the CAN SPAM Act 
to allow parents to have control about the junk e-mail that comes 
into their homes, which has led to several prosecutions and a 
significant reduction in unsolicited commercial e-mail, particularly 
with pornographic content.  
        I think this legislation we are looking at here today will help 
schools battle a problem.  In most middle schools, and certainly 
most high schools, kids can eat their lunch fast and go to the 
library to play games on the computers or use the Internet.  Yet 
they are there, largely or loosely unsupervised.  We need to make 
sure that that is a safe place for them to be.  
        I will also be interested in hearing from our panel, what other 
tools does law enforcement and industry need to track and 
prosecute predators, who are using places that may seem safe to 
kids, to prey on kids.  
        Thank you, Mr. Chairman, for this hearing, and I look forward 
to working on this legislation. 
        [Prepared statement of Hon. Heather Wilson follows:] 

PREPARED STATEMENT OF THE HON. HEATHER WILSON, A 
REPRESENTATIVE IN CONGRESS FROM THE STATE OF NEW MEXICO 

        Mr. Chairman, I thank you for holding this important hearing 
and compliment Congressman Fitzpatrick for his leadership on this 
issue.   
        Popular websites like myspace.com, thefacebook.com, 
xanga.com, and friendster.com have become the way teenagers 
communicate.  When kids are at the point when their peers are 
starting to be more important than their parents, they are very 
vulnerable.  Predators know this and are trolling the chat rooms 
pretending to be someone they are not.   
        Several of us on this committee have worked together to make 
the internet safer for children.   It is hard to raise G-Rated children 
in an R-Rated world.   In the 108th Congress, Mr. Green and I 
authored legislation that was enacted into law as part of the CAN-
SPAM Act to give parents a way to control unsolicited email and 
put the electronic equivalent of a "brown paper wrapper" in the 
body of a message.   We saw results with this piece of legislation 
with 4 people being indicted soon after the legislation was enacted 
and a dramatic reduction in spam - particularly pornographic 
spam.   
        In 2002 our colleague, Mr. Shimkus, authored the "Dot Kids 
Act" which passed the Congress and became law.   The legislation 
created a second-level domain within the internet which promotes 
positive experiences for children and families using the internet 
and provides a safe online environment for children.   Ultimately, 
it helps prevent children from being exposed to harmful material 
over the internet.   
        According to the Center for Missing and Exploited Children, 
more than 2,600 incidents have occurred where adults have used 
the internet to target children online in order to engage in sexual 
activity.  Teenagers 13-18 often communicate over the internet 
with someone they have not met in person and 1/3 of those 
teenagers have talked about meeting someone they have only met 
through the internet.  
        The legislation we are considering today will help schools 
battle this problem by creating additional internet safety 
requirements for schools to receive universal service funding.  
Websites like myspace.com and the facebook.com do not belong in 
our schools.  Parents need to be educated as to what these websites 
are and how their children's personal information can be made 
available by the click of a mouse.  And law enforcement may need 
more tools to track these predators and prosecute them.   
        I look forward to the testimony today and how we can make 
the internet a safer place for children.

        MR. UPTON.  Mr. Inslee. 
        MR. INSLEE.  Thank you.  Having sat through the oversight 
hearings, I can tell you this makes the hair stand up on the back of 
your neck when you hear what is going on. And I do look forward 
to getting some legislation, but I have some concerns about this, 
though, both from not going far enough and also going too far.  
        Not going far enough, I do hope at some point the full 
committee will look at the issue of storage of records to help law 
enforcement.  The one thing we have heard from law enforcement 
over and over again during oversight hearings, is the inability to 
track these offenders to get the information that needs to be 
retained so they can search them out and find them, is what we 
really need.  That is the silver bullet for law enforcement.  I hope at 
some point our full committee will do that.  I don't think that is in 
this bill particularly.  
        Second, the bill doesn't really address the 99 percent of the 
communications where these take place, which is at home.  And, 
finally, getting parents to have access to filtering software is where 
the real megatonnage is in this issue, and I hope at some point our 
committee will look at it.  
        Third, an overly broad aspect of it.  This is a great utility and I 
think it is important when we talk about all the bad things 
happening on the Net; one of the reasons the kids are so much 
smarter than us is because they have access to the Internet.  And 
you hate to shut it down.  And, frankly, the way this bill is written, 
one of our concerns, it would essentially disable Web-based sites 
for schools.  If you want to set up a school government on a 
website, you want to allow kids to vote for one another, to e-mail 
to one another, as I understand it this bill currently would shut that 
down.  I don't think that is something we want to do.  We do have 
prank calls, but we haven't outlawed the phone system.  That is 
something we need to get to to outrefine this bill.  Thank you.  
        MR. UPTON.  Mr. Walden.  
        MR. WALDEN.  Thank you, Mr. Chairman.  I am going to 
waive my opening statement.  
        MR. UPTON.  Mr. Terry.  
        MR. TERRY.  I waive as well.
        [Prepared statement of Hon. Lee Terry follows:] 

PREPARED STATEMENT OF THE HON. LEE TERRY, A 
REPRESENTATIVE IN CONGRESS FROM THE STATE OF NEBRASKA 
        
	Thank you Mr. Chairman Upton for holding today's hearing on 
how we can take action to protect our children from online 
predators.
	My wife and I monitor my three young boys' internet activity 
at home closely.  However, I'm appalled to think that my boys or 
other young children might be using taxpayer dollars and 
computers that are intended to be used for educational purposes to 
access social networking websites as MySpace.com, 
Facebook.com, or similar social networking websites that leave 
them vulnerable to online predators. 
	The focal point of today's hearing is primarily over the bill, HR 
5319, the Deleting Predators Act of 2006.  HR 5319 would require 
schools and libraries that receive Universal Service funds (E-Rate 
money) to enforce a policy that prohibits access to a commercial 
social networking website or chat room through which minors may 
access obscene material, or be solicited for offensive comments or 
actions.  
	I support this limited policing of the Internet because it is 
unacceptable that our students in public schools could be allowed 
to access harmful material.  We would certainly not condone 
pornographic material being accessed in our schools and, after I 
visited MySpace.com I would say at best that some of the material 
on MySpace.com was highly suggestive and borderline offensive, 
if not in some cases clear pornography. 
	The fact that schools and libraries could lose Universal Service 
E-Rate money if violations occur does not bother me in the least.  
The intention of the E-Rate program is to ensure that our schools 
and libraries are connected so that every child has the potential to 
reach their capacity regardless of their location.  Those goals are 
consistent with the over all Universal Service Fund and any 
attempt to permit this public system to be a conduit to a 
Commercial website should not be allowed.
	HR 5319 is a step in the right direction to protect our minors 
from pedophiles that prey on our youth via the Internet.  I look 
forward to hearing from today's witnesses and I hope that we 
move swiftly on legislation that will raise the profile on the 
dangers that the Internet can pose to our youth.

        MR. UPTON.  Mr. Ferguson.  
        MR. FERGUSON.  Thank you, Mr. Chairman.  Thank you for 
holding this hearing.  I particularly appreciate Mr. Fitzpatrick's 
and Mr. Kirk's work on this issue, and I am certainly looking 
forward to hearing from our distinguished panel of witnesses 
today.  
        I particularly want to welcome Ms.  Parry Aftab who is from 
New Jersey.  She is the Executive Director of WiredSafety.  She 
testified in our hearing yesterday, in our Oversight and 
Investigations Subcommittee field hearing in my district in New 
Jersey yesterday.  She is familiar to members of this committee 
and she has done extraordinary work on this particular issue, and 
we are glad she is here.  
        As a member of the O and I Subcommittee of this committee, 
this is an issue that I have become very familiar with over the past 
several months, and it is probably the ugliest and most disturbing 
issue that I have seen in my years in Congress.  We are all aware of 
the promises that the Internet holds for education, for socialization, 
for fun for our children.  However, there is unfortunately a much 
darker side to the Internet that we all need to be very much aware 
of.  This is the side of the Internet that poses hidden dangers for 
unsuspecting children who may think that they are just chatting 
with a friend a few States away or perhaps even in their own 
neighborhood.  
        In these hearings our subcommittee has heard from Internet 
service providers, from social networking sites, from law 
enforcement officials, and from young people themselves.  All of 
these witnesses have done well in helping us to understand the 
problem of child exploitation over the Internet and what can be 
done to help protect our children from these predators who set out 
to harm them.  
        Just yesterday at the field hearing in my district in New Jersey, 
we heard testimony from an impressive group of witnesses, all 
with extensive experience in the field of child exploitation and 
Internet safety.  They offered several suggestions not only to help 
our children stay safe while surfing the Net, but also in 
apprehending these people who prey on our children not only in 
their schools and in their friend's house, but even in the protection 
of their own bedrooms.  Some of these suggestions included more 
Internet education and awareness for both children and their 
parents, extended data retention by Internet service providers to 
help law enforcement officials track these predators down, harsher 
penalties for sex offenders, and closer monitoring by parents of 
what their children are doing on the Internet.  
        I am pleased to be able to say that New Jersey has an 
exemplary law enforcement unit, dedicated to fighting cyber crime 
and apprehending child predators, and I am proud of our New 
Jersey law enforcement officers who told us their stories yesterday 
and who work tirelessly to put these offenders behind bars.  
        I also, of course, again want to commend the gentleman from 
Pennsylvania and the gentleman from Illinois for the work that 
they have done on this issue and for taking time from their 
schedules to testify at our--Mr. Fitzpatrick testified at our hearing 
yesterday--and for their attendance at our hearing today.  
        As our Energy and Commerce Committee moves forward with 
these hearings, we are all becoming acutely aware of the dangers 
facing our children on the Internet today.  There has never been a 
greater need for us as lawmakers and, for many of us, as we can 
speak as parents, to take a stand to protect our children.  
        Again, thank you, Mr. Chairman, for holding this hearing and I 
look forward to hearing from our witnesses. 
        MR. UPTON.  Mr. Stupak.  
        MR. STUPAK.  Thank you, Mr. Chairman, for holding this 
important hearing on what Congress can do to delete online 
predators.  As Ranking Member of the Oversight and 
Investigations Subcommittee I have been impressed, until recently, 
with the bipartisan and thorough nature of the subcommittee's 
continued work in this area.  I am hopeful the O and I 
Subcommittee work will guide this committee as we draft 
legislation to best protect our children from online pornographers 
and child abusers.  
        We heard at the Oversight and Investigations Subcommittee 
hearings that ISPs have widely varied methods for blocking 
predators and pornography from their networks and records of 
reporting offenders to authorities.  We must hold the ISPs, 
including social networking sites, accountable.  As a result of the 
O and I Subcommittee's work, many ISPs have made or are 
planning substantial changes to their policies to protect our 
children.  
        While these recent actions are certainly welcome, they are not 
enough.  The reporting requirements for ISPs need to be updated 
and enforced.  This should be the primary focus of this committee.  
Furthermore, the committee should not ignore the testimony of the 
Federal Communications Commission and the Federal Trade 
Commission, whose hands are tied by lack of authority and 
insufficient laws, respectively.  
        It is important to note, however, that during the series of O and 
I hearings, there is no mention of online child exploitation being 
specific problems at schools and libraries.  Perhaps this is because 
there is already a law on the books that requires schools and 
libraries who receive E-rate support to monitor children's Internet 
use and to employ blocking technology from viewing obscene or 
harmful materials.  Many schools and libraries already block sites 
such as MySpace.  
        While I support holding today's hearings to see if schools and 
libraries need to enact further safeguards, I believe the real threat 
lies in children using these sites in his or her own room without 
adult supervision.  
        The legislation before us today lacks many of the important 
reforms needed that came to light as a result of the O and I 
hearings and investigation.  I commend the Chairman for holding 
today's hearing and starting down a path to craft comprehensive 
bipartisan legislation that responds to the concerns voiced by the 
experts, law enforcement, ISPs, and the victims themselves, and 
not to go off in a direction that will do nothing to really crack 
down on this problem.  
        So with that, Mr. Chairman, I will yield back the balance of my 
time.
        MR. UPTON.  Mrs. Blackburn.  
        MRS. BLACKBURN.  Thank you, Mr. Chairman.  I want to 
welcome our witnesses and thank you for the hearing today and 
also to thank Chairman Stearns.  I am on the O and I committee 
and we have spent a lot of time holding hearings and working on 
this issue.  We appreciate that many of you have been with us 
before, and we appreciate that you have returned to us today.  
        I do want to say that as we worked through these hearings and 
have addressed some of the issues, that we have seen some pretty 
encouraging signs from the industry and from some of those that 
have been involved in the issue.  Fox Interactive Media, the parent 
company of MySpace, in some of the work that MySpace is doing, 
they are taking some steps that are focused on security and 
protections for our minors, those that are under 18, and they have 
also taken some initiatives to start working with law enforcement 
agencies to protect children and to rout out the child predators.  
And this is the kind of activity that we appreciate seeing, and the 
kind of partnerships that we are anxious to see, and we are anxious 
to monitor this progress.  
        And I would encourage all of you to remember, now is the time 
for innovative ideas and now is the time for thinking outside the 
box, and now is the time to participate with us as we move forward 
on this.  This is a tragic, tragic issue, online sexual predators who 
are using computers and the Internet to enter the safe haven of the 
home and attack these children.  
        So your presence and your work, the diligence of our Chairman 
and our committees and our staff, who has been so committed as 
we work through this, we do appreciate.  I know there are lots of 
concerns with the bill that is before us, but I do want to thank 
Mr. Fitzpatrick and Mr. Kirk for their work on the issue in bringing 
the legislation before us.  Their concerns are well placed.  
        We are looking forward to working through this bill.  We are 
looking forward to hearing from the witnesses and, Mr. Chairman, 
I yield back the balance of my time.  
        MR. UPTON.  Mr. Wynn.  
        MR. WYNN.  Thank you, Mr. Chairman, for holding this very 
important hearing on Internet predators.  I would also like to 
compliment the O and I committee for the work they have already 
done on this very important issue.  You know, it is actually very 
refreshing to be discussing an issue with such a direct impact on 
American families, because in this committee we often hear from 
commercial interests basically promoting their bottom line.  But I 
think we can do a great deal of good here today, and I hope we are 
able to work in a bipartisan fashion to produce a product that is 
helpful to all American families.  
        Let me just make an observation that of all the places our 
children go on the Internet, chat rooms are the most difficult sites 
for parents to monitor.  These locations permit the kinds of persons 
you would usually avoid in person to easily and readily approach 
our children.  One in four U.S. teen girls reported they had met 
strangers off the Internet.  One in seven boys admitted that they did 
as well.  While most of these Internet friends turn out to be another 
teen or preteen, that is not always the case.  Unfortunately, children 
are now dying at the hands of the Internet child molesters and not 
all sexual exploitation occurs off line.  At a disturbing rate, child 
predators are forming an online community, a bond that is 
unparalleled in history.  They are openly uniting against legal 
authorities and discussing ways to influence public thinking and 
legislation on child exploitation.  
        In a 2000 study, the National Center for Missing and Exploited 
Children and the Justice Department said one out of every five 
children ages 10 to 17 surveyed said they received a sexual 
solicitation over the Internet during the previous year.  I believe 
parents have primary responsibility.  They must work to minimize 
the chances of this happening by monitoring the hours their 
children spend online.  As a general rule, the later at night one is 
online, the more suspect the activity that occurs.  
We should be sure to point out stories in the newspapers about 
cyber predators and make sure children do not give out information 
over the Internet that would lead a person to find out their child's 
true identity or their location, their address.  
But government has an important role, and this is where this 
committee can do some real good.  We must put together on a 
bipartisan basis a productive bill that will address this problem, not 
inhibit the use of the Internet, but make sure that predators cannot 
exploit the Internet for their nefarious purposes.  
I look forward to hearing from the witnesses today and 
working on producing a quality bill.  I relinquish the balance of my 
time.  
[Prepared statement of Hon. Albert R. Wynn follows:] 

PREPARED STATEMENT OF THE HON. ALBERT R. WYNN, A 
REPRESENTATIVE IN CONGRESS FROM THE STATE OF MARYLAND 

        Mr. Chairman, 
        Thank you for holding this important hearing on Internet 
predators. Since we often hear from commercial interests 
promoting their ideas, it is refreshing to deal with an issue with a 
direct impact on families.  Of all the places your child goes to on 
the Internet, chat rooms are the most difficult sites parents to 
monitor. These locations permit the kind of person you would 
usually avoid in person to easily and readily approach your 
children.  
        One in four US teen girls reported that they met strangers off 
the Internet. One in seven boys admitted they did as well. While 
most of these "Internet friends" turn out to be another teen or 
preteen, that's not always the case. Unfortunately, children are now 
dying at the hands of their Internet child molesters and, not all 
sexual exploitation of children occurs offline.
        At a disturbing rate, child predators are forming an online 
community and bond that is unparalleled in history. They are 
openly uniting against legal authorities and discussing ways to 
influence public thinking and legislation on child exploitation.  In a 
2000 study, the National Center for Missing and Exploited 
Children and the Justice Department said that one of every five 
young people ages 10 to 17 surveyed said they had received a 
sexual solicitation over the Internet in the previous year.
        Parents have primary responsibility to minimize the chances of 
this happening by monitoring the hours that kids can spend online. 
As a general rule, the later at night one is on line, the more suspect 
the activity that occurs.  We should be sure to point out stories in 
the newspaper about cyber predators and make sure children do not 
give out information over the Internet that would lead a person to 
find your child in real life.
        I look forward to hearing from the panelists today to find out 
more information on what can be done to stop this disturbing trend.

        MR. UPTON.  The gentleman from Pennsylvania, 
Mr. Fitzpatrick, is recognized for an opening statement.  
        MR. FITZPATRICK.  Thank you, Chairman Upton and members 
of the committee, for permitting me to participate in today's 
hearing and for allowing me to address what I feel is a new and 
emerging danger to our Nation's children and their safety while 
using the Internet.  
        Your work in this area will help shed new light on this difficult 
problem that affects both law enforcement and America's families, 
and I appreciate the committee's dedication to this issue.  
        I first want to welcome David Zellis, Bucks County, PA's First 
District Attorney, to Washington and thank him for his 
participation today.  David spent his life in a career prosecuting 
crime in my district, and I know that his testimony will be of great 
use and help to the committee today.  
        As the father of six children I know very well the challenges 
technology poses to our families.  In a world that moves at a 
dizzying pace, being a father gets harder all the time.  Monitoring 
our children's use of emerging technologies is a huge task and the 
Internet remains the focus of many parents' concerns.  
        Recently, one aspect of the Internet has attracted a great deal of 
attention and considerable concern:  the rise in popularity of social 
networking sites.  Social networking sites, best known by the 
popular examples of MySpace, Facebook, and Friendster have 
literally exploded in popularity in just a few short years.  MySpace 
alone has over 90 million users and ranks as the sixth most popular 
English language website, and the eighth most popular in the 
world.  
        While these sites were designed to allow their users to share 
virtual profiles of themselves to friends and like-minded users, 
social networking sites have also become a haven for online sexual 
predators who have made these corners of the Web their own 
virtual hunting ground.  
        The danger our children are exposed to by these sites is clear 
and compelling.  According to a study conducted by the National 
Center For Missing and Exploited Children in 1998, there were 
3,267 tips reporting child pornography.  Since then the number has 
risen by over 3,000 percent to an astounding 106,119 tips in 2004.  
        The Department of Justice recognizes child pornography as a 
precursor for pedophiles and is often linked to online predators.  
According to Attorney General Gonzalez, one in five children have 
been approached sexually on the Internet.  One in five children.  
On the face, these numbers are startling.  Even more startling has 
been the visual evidence offered to millions of Americans through 
the news outlets like NBC Dateline's To Catch a Predator series.  
        Chris Hansen testified before this committee last month.  
However, the findings of his reports cannot be understated or 
forgotten.  Throughout his investigations, Chris Hansen proved 
time and again, with disturbing regularity, that child predators are 
ready and willing to approach the prey they stalk online.  
        Who could forget the Dateline investigation in Florida where 
one predator arrived with his own 5-year-old son to meet what he 
thought was a 14-year-old boy?  
        Who can erase from their memory the man who entered the 
"Dateline" house naked, or the man who brought rope and duct 
tape with him for his encounter?  
        What would have happened in these circumstances if the 
children these predators were to meet were not decoys or if Chris 
Hansen were not there?  How many assaults, rapes, and ruined 
lives would have resulted in these encounters?  
        Mr. Chairman, the fact, however disturbing it may be, is that 
child predators have harnessed the power and anonymity of the 
Internet and social networking sites to hunt for their prey.  
Something must be done to stop the spread of sexual predators 
online, and I believe that my legislation is a step in the right 
direction.  
        My legislation would limit access to minors to social 
networking sites in schools and in public libraries.  However, this 
is no substitute for parental supervision, the first line of defense for 
our children's safety.  That is why H.R. 5319 would require the 
FTC to design and publish a website specifically meant to serve as 
a clearinghouse for information for parents and educators.  Finding 
a solution to the problem of sexual predators online and the 
Internet would take the combined efforts of parents, children, law 
enforcement, and the legislature to take action against these 
crimes; and it is my hope that the legislation that lead to the 
On-line Predators Act will assist in that effort.  Thank you, 
Mr. Chairman.  
        MR. UPTON.  The gentleman from Illinois, Mr. Kirk.  
        MR. KIRK.  Thank you, Mr. Chairman, and thank you for 
having an appropriator on the committee here.  I did do the 
customary courtesy--
        MR. UPTON.  Well, we supported the line-item veto here.  
        MR. KIRK.  I did kiss the Chairman's ring before approaching 
the--
My involvement in this issue started from a unique source.  I 
have a student leadership advisory board, made up of the junior 
and senior class presidents of my high schools.  And I asked them, 
what is the biggest threat to kids that your parents do not know 
about?  And they said it was MySpace.com.  
        Julie Wachtenheim, who is the student body president of 
Wheeling High School, said that she took a particularly good class 
picture and put it up on MySpace and within 45 minutes, a creep 
from Wheeling was trying to contact her.  One of our students said 
that they felt that MySpace.com was really mycreepzone.com and 
it represented a unique danger to kids.  That is outside the 
experience of nearly every Member of Congress who, when they 
grew up, did not have this threat to them.  
        I particularly want to admire the work of Congressman 
Fitzpatrick on this, a leader on suburban issues, and this legislation 
as well as several others are part of a bipartisan suburban agenda 
that we have.  But this bill is particularly important because it was 
written by Congressman Fitzpatrick and cosponsored by 
Congresswoman Bean, representing a bipartisan view towards 
protecting kids in the 21st Century.  
        I would hope that the committee would remember we should 
have the conviction of our own convictions represented in 900 
years of legal tradition, that we want a free and open discourse in a 
democracy, but our 900-year legal tradition also says that when 
you make money in doing business with children, you have a 
unique set of obligations to protect your customers and clients.  
And finding a way to apply that 900-year legal tradition of when 
you do business with children, the State has a unique role in 
making sure they are protected is what this legislation is about.  So 
I applaud you, Mr. Chairman, for having it.  Thank you again for 
having it.  
        MR. UPTON.  I thank you again for your leadership and also 
Congressman Fitzpatrick and also Congresswoman Bean for their 
leadership on this issue.  
        We look forward to proceeding.  At this point I would ask 
unanimous consent that all members of the subcommittee be 
allowed to submit their statements as part of the record and we are 
prepared now to listen to our panel of expert witnesses. 
        [Additional statements submitted for the record follows:] 

PREPARED STATEMENT OF THE HON. BARBARA CUBIN, A 
REPRESENTATIVE IN CONGRESS FROM THE STATE OF WYOMING 

        Thank you, Mr. Chairman.  As a mother of two, this issue is of 
particular importance to me.
        When my two sons were young boys in Wyoming, my husband 
and I worried about their safety all the time - like any parent does.  
We did our best to protect them when we could, but we could not 
be with them 24 hours a day.  So we also did our best to teach 
them how to protect themselves from dangerous people and 
dangerous circumstances.  But, boys will be boys, and we are still 
finding out about the risks my sons took.  I thank God they are 
both alive and healthy today.
        My family has come a long way since those days of worrying 
about being wary of strangers on the street, or looking both ways 
before crossing. Now parents and kids must be wary of strangers 
invading our computers and our technological way of life, making 
our very homes the target of their evil designs.  I do not envy the 
work parents of young children must do to teach and protect their 
kids today.  But just like my sons, kids will be kids, and the allure 
of the internet is too great to assume they will not experiment with 
it.
        In many cases I am firm believer in state and local control over 
issues, but this is an interstate problem that requires an interstate 
solution.  When predators can lure kids to ride a bus across state 
lines for the purpose of sexual exploitation, it is a problem that 
Congress must address.  Similarly, I truly believe that parents are 
the single most influential people in kids lives.  Just like efforts at 
stopping underage drinking, smoking and drug use, kids will 
respond to their parent's teaching regarding internet safety.  While 
Congress can and should never replace parents as the role models 
for children, Congress can play a role in assisting parents as they 
struggle to raise children in the online age.  That is the intention of 
this bill we are discussing today.
        I am interested in hearing from the panelists if this particular 
legislation before us would result in any real reductions in online 
predatory activity.  Would this legislation adequately help parents 
keep their children safe from predators?  Are there other policies 
this subcommittee should be pursuing that would result in further 
protection of our children?  Perhaps most importantly, are there 
solutions outside of legislation currently available in the 
marketplace that would protect children without undue restrictions 
on innovation and technology use?  I look forward to hearing the 
opinions of the panelists.
        Thank you again, Mr Chairman, for your leadership on this 
issue.  I yield back.

        MR. UPTON.  We are going to be joined by the Honorable Greg 
Abbott, the Texas Attorney General; Ms. Parry Aftab, Executive 
Director of WiredSafety.org; Ms. Michelle Collins, Director of the 
Exploited Child Unit of the National Center for Missing and 
Exploited Children; Mr. Ted Davis, Director of Knowledge Asset 
Management, IT Department, from Fairfax County Public Schools; 
Mr. Chris Kelly, Vice President of Corporate Development and 
Chief Privacy Officer of Facebook; Ms. Amanda Lenhart, Senior 
Research Specialist for Pew Internet and American Life Project; 
Ms. Beth Yoke, Executive Director of ALA Young Adult Library 
Services Association from Chicago; and Mr. David Zellis, First 
Assistant District Attorney for the Office of Bucks County District 
in Pennsylvania.  
        We welcome you all.  We appreciate you having submitted 
your testimony in advance.  We would like you to take no more 
than 5 minutes to summarize your statement.  I would note that the 
House is expecting votes within the next 20 or 30 minutes.  So we 
will probably take a brief recess when that starts.  

STATEMENTS OF HON. GREG ABBOTT, TEXAS 
ATTORNEY GENERAL; PARRY AFTAB, ESQ., 
EXECUTIVE DIRECTOR, WIREDSAFETY.ORG; 
MICHELLE COLLINS, DIRECTOR, EXPLOITED CHILD 
UNIT, NATIONAL CENTER FOR MISSING AND 
EXPLOITED CHILDREN; TED DAVIS, DIRECTOR, 
KNOWLEDGE ASSET MANAGEMENT, IT 
DEPARTMENT, FAIRFAX COUNTY PUBLIC SCHOOLS; 
CHRIS KELLY, VICE PRESIDENT, CORPORATE 
DEVELOPMENT AND CHIEF PRIVACY OFFICER OF 
FACEBOOK; AMANDA LENHART, SENIOR RESEARCH 
SPECIALIST, PEW INTERNET AND AMERICAN LIFE 
PROJECT; BETH YOKE, EXECUTIVE DIRECTOR, ALA 
YOUNG ADULT LIBRARY SERVICES ASSOCIATION; 
DAVID ZELLIS, FIRST ASSISTANT DISTRICT 
ATTORNEY, OFFICE OF BUCKS COUNTY DISTRICT 
ATTORNEY, COMMONWEALTH OF PENNSYLVANIA 

        MR. UPTON.  Mr. Abbott, we welcome you.
        MR. ABBOTT.  Mr. Chairman, and members of the 
subcommittee--
        MR. UPTON.  I think you just need to hit the mic button there 
too.  
        MR. ABBOTT.  Thank you very much for the instruction.  My 
name is Greg Abbott.  I am the Attorney General of Texas, and I 
appreciate the opportunity to testify before you today.  
        I would like to very quickly follow up on a comment by 
Congressman Gonzalez from Texas.  I think it is fair to say that 
from the brilliance and eloquence spoken by both you and 
Chairman Barton, I think it is clear that the draft drawers of new 
congressional maps in Texas, as we speak, should understand that 
there is no way you two should be paired against each other, so 
Texans can continue to benefit from the brilliance of both of you.  
        That being said, let me get right to the point, and that is that the 
dangers--
        MR. UPTON.  Mr. Burgess is on his way.  He is a member of 
the committee as well, I want you to know.  
        MR. ABBOTT.  You must be present to win.  
        The dangers to children created by social networking websites 
and chat rooms are all too real.  Our experience in Texas is both 
illustrative and alarming.  Three years ago we created a cyber 
crimes unit in the Texas Attorney General's office.  Our goal was 
to find, arrest, and put behind bars child predators who use the 
Internet to stalk children.  
        A remarkable success is also tragic evidence of the risk 
children face when using chat rooms or social networking sites.  
Our investigators log onto chat rooms that are used by teenagers.  
Sometimes they log onto social networking sites, such as 
MySpace.  The investigators typically assume the identity of a 13- 
or 14-year-old girl.  Not long after they log on, and not long after 
they assume the identity of an underage child, they are barraged 
with uninvited, aggressive, and vulgar language.  
        The offensive Internet chat often turns into action.  The 
predator sets a time, date, and location to sexually assault what he 
believes to be a 13- or 14-year-old girl.  Now, on more than 80 
occasions, the predator has shown up at the location of his 
choosing to act out on his criminal intent.  The location is 
sometimes a motel, sometimes an apartment, sometimes a parking 
lot, sometimes other locations.  And it is not uncommon for the 
predator to bring with him things like condoms, alcohol, or even a 
bed.  Each of those more than 80 occasions has resulted in an arrest 
of a child predator by the Texas Attorney General's Office.  
        The 80th arrest was particularly notable.  It was the arrest of a 
man who chatted with what he thought was a 13-year-old girl on 
MySpace.  In reality, the graphic sexual conversations he was 
having were with a Texas Attorney General investigator.  But what 
makes this case particularly frightening is that at the time he was 
arrested, the predator was out on bail from an arrest that had 
occurred 6 months prior.  At the time of his most recent arrest, he 
was already under indictment for the solicitation of a minor.  In 
other words, while he was out on bond, awaiting trial for illegal 
Internet solicitation of a minor, he was back on the Internet trolling 
for his next victim.  This highlights how dangerous and 
incorrigible these predators are.  
        Children simply cannot be safe with the current landscape of 
cyberspace chat rooms and social networking sites.  Unfortunately, 
not all the people chatting with predators are undercover officers 
and not all of the predators are caught in stings.  Real children are 
real victims of real predators.  
        Recently a 14-year-old girl from central Texas was raped by a 
man she chatted with on a social networking site.  Yesterday this 
story appeared on a TV station in Houston.  To summarize it, the 
headline is "Woodlands Man"--Woodlands is a suburb of Houston-
-"Woodlands Man Admits He Seduced Teen Online."  Quickly, 
the story says that Dale Beckham was charged with luring a 
14-year-old boy he met over the Internet into a hotel room, where 
they had sex.  Beckham traveled from his home in Houston to the 
Ottawa, Canada area with a laptop computer and digital camera.  
His home was later searched and authorities found hundreds of 
images of child pornography on his computers, including pictures 
of children younger than 12 engaged in sexual acts with adults.  
        Perhaps the most disturbing thing about these stories is that 
they are becoming all too common, so frequently posted in 
newspapers that the public may become desensitized to the reality, 
the harsh reality for the victim of Dale Beckham and the victims of 
thousands of predators across this country.  
        No one would allow their children to invite a predator over to 
the house for the evening.  The fact is, that is exactly what happens 
when children log on to these social networking sites and chat 
rooms.  Clearly, safeguards are needed at schools, at libraries, as 
well as in our homes if we are to protect our children against these 
predators.  Such safeguards are the kinds of protections that 
Americans have come to expect.  Streets, neighborhoods, and 
playgrounds are essential to our daily lives and are a part of the 
American social and economic fabric.  Nevertheless, we must 
police our streets, neighborhoods, and playgrounds to ensure their 
safety.  
        Similarly, the Internet Super Highway and social network sites 
are vital to our modern-day economy and they provide an effective 
platform for exchange of ideas, information, and commerce.  They 
also have developed into virtual neighborhoods where people can 
simply socialize.  But these modern-day neighborhoods and 
playgrounds are proving just as susceptible to criminal predators as 
their traditional counterparts, if not more so.  
        Countless Federal laws aim to protect our streets and 
neighborhoods.  The need to protect our virtual neighborhoods is 
just as great.  It is time to end the games of pretend and denial.  
Even worse is that some use a nod and wink to imply it is the 
child's fault or the parents' fault when a child is victimized by 
someone they met online.  Well, when a 14-year-old is raped in the 
streets, we don't blame the girl.  Instead, we work to catch the 
rapist and work to ensure that we have safe neighborhoods where 
kids don't get raped.  The scenario doesn't change just because the 
rape victim chatted with the rapist online.  
Your ongoing vigilance is needed to protect children across 
this entire country and make the Internet a safe place for children 
to play, to learn, to explore, and to grow.  We look forward to 
working with you to get that job done.  
        MR. UPTON.  We look forward to working with you too.  
Thank you for your service.  
        MR. ABBOTT.  Thank you.  
        [The prepared statement of Hon. Greg Abbott follows:] 

PREPARED STATEMENT OF THE HON. GREG ABBOTT, ATTORNEY 
GENERAL, OFFICE OF THE ATTORNEY GENERAL, STATE OF TEXAS

        Mr. Chairman and members of the subcommittee, my name is 
Greg Abbott, I am the Attorney General for the state of Texas, and 
I thank you for the opportunity to testify before you today.  
        Let me start by thanking you for shining a spotlight on the 
growing national nightmare of the Internet being used as a 
playground for child predators.  Your legislative proposal - 
appropriately named "Deleting Online Predators Act" - is an 
important step towards making the Internet safer for our children 
and families.  I wish the solution to the growing problem was as 
easy as hitting a delete button.  Unfortunately, it is much more 
complex.  With your active involvement, though, Internet safety 
will become more of a reality for millions of American children.
        The dangers to children created by social networking websites 
and chat rooms are very real.  The Texas experience is both 
illustrative - and alarming.
        Three years ago, we created a Cyber Crimes Unit in the Office 
of the Attorney General of Texas.  One of its primary missions was 
to find, arrest and convict child predators who use the Internet to 
stalk their prey.  The unit's nationally recognized success is tragic 
evidence of the risk children face when using chat rooms or social 
networking websites.
        Our Cyber Crimes Unit has investigators who log onto chat 
rooms that are used by teenagers.  Sometimes they log on to social 
networking sites like MySpace.   The investigators typically 
assume the identity of a teenage girl, usually around the age of 13 
or 14.  Not long after they log on and assume an under-age 
identity, they are barraged with aggressive and vulgar language 
that is uninvited.  All too often, the offensive Internet "chat" turns 
into action.  The predator sets a time, date and location to sexually 
assault what he believes to be a 13 or 14 year old girl.  On more 
than 80 occasions, the predator has shown up at the location of his 
choosing to act out on his criminal intent.  The location is 
sometimes a motel, sometimes an apartment, sometimes a parking 
lot, sometimes other places.  It is not uncommon for the predator to 
bring things like condoms, alcohol, even a bed.  Each of those 80+ 
occasions has resulted in an arrest of the child predator by the 
Texas Attorney General's office.
        As an example, we recently arrested a 50-year-old man after he 
showed up at a Central Texas restaurant to meet what he thought 
was a 14-year-old girl. This predator had been talking with the girl 
- who in reality was one of our Cyber Crimes investigators - in an 
online chat room. He even stopped on his way to the meeting and 
bought some wine coolers to give the girl. 
        And not long ago, we arrested a 52-year-old university 
professor at a bus station in McAllen, Texas, where he was waiting 
for what he thought was a 13-year-old girl he met online.  He even 
bought the would-be teenager a bus ticket so she could travel from 
miles away to meet him. 
        The 80th arrest was particularly notable.  It was the arrest of 27-
year-old John David Payne, who had been chatting with what he 
thought was a 13-year-old girl he met on MySpace.  In reality, the 
graphic sexual conversations he was having were with a Texas 
Attorney General investigator.
        What makes his case particularly frightening - although sadly 
not unusual - is that, at the time of his arrest, Mr. Payne was out on 
bail from an arrest that occurred six months prior.  In fact, at the 
time of his most recent arrest, he was already under indictment for 
online solicitation of a minor.  In other words, while he was out on 
bond awaiting trial for illegal Internet solicitation of a minor, he 
was back on the Internet, trolling for his next victim.   These child 
predators are dangerous and incorrigible, and children simply 
cannot be safe with the current landscape of cyberspace chat rooms 
and social networking sites.
        Unfortunately, not all of the people chatting with predators are 
undercover officers, and not all of the predators are caught in 
stings.  Real children are real victims of real predators.  Recently, a 
14-year-old girl from Central Texas was raped by a man she 
chatted with on a social networking site.  This is just one of the 
most recent examples, examples that are repeated around the 
country with increasing frequency.
        As we hold this hearing today, millions of teenagers are 
chatting online, posting personal information on a profile page, 
talking to other teens on social networking sites, and meeting 
people in chat rooms.  Before we leave here today, countless of 
those teens will have innocently chatted with someone they didn't 
know.  And, before we leave today, some of those unknown 
chatters will turn out to be predators who have just located their 
next target.
        Clearly, safeguards are needed at schools and libraries - as 
well as in our homes - if we are to protect our children against 
these predators.  Such safeguards are the kinds of protections that 
Americans have come to expect.
        Streets, neighborhoods and playgrounds are essential to our 
daily lives and are part of the American social and economic 
fabric.  Nevertheless, we must police our streets, neighborhoods 
and playgrounds to ensure their safety.  Similarly, the Internet 
superhighway and social network sites are vital to our modern day 
economy and they provide an effective platform for the exchange 
of ideas, information and commerce.  They also have developed 
into virtual neighborhoods where people can simply socialize.  
But, these modern-day neighborhoods and playgrounds are proving 
just as susceptible to criminals and predators as their traditional 
counterparts, if not more so.
        As can be expected, the responsibility for protecting children 
and teens who use the Internet is a shared responsibility.   Law 
enforcement will continue to improve its efforts to track down, 
arrest and put behind bars anyone who uses the Internet to harm 
children.
        Parents are also a part of the process.  Parents must use 
oversight, education and vigilance to protect their children.  Just as 
parents warn children not to take candy from strangers and to look 
both ways before crossing the street, parents must warn children 
about the dangers that exist on the Internet.  Parents frequently 
evaluate whether their teen is sufficiently responsible with a car 
before allowing him or her to go driving.  One reason, of course, is 
that teens, if driving irresponsibly, could hurt themselves or others.  
The same is true with the Internet.  Parents should ensure that their 
teenagers are sufficiently informed and responsible in their Internet 
use.  Otherwise, they could get hurt.
        But the great weight of the problem must be shouldered by the 
very creators and hosts of these networking sites and chat rooms 
that provide the previously non-existent opportunity for child 
predators.  Social networking sites and chat rooms have created an 
environment in which predators target their next victim and plot 
their next attack.   Predators use these web locations as a starting 
point for raping a child!   The creators and hosts of these 
networking sites are not the predators who commit the crime, but 
they create the opportunity for the criminal to carry out his crime.  
        The creators and hosts of these networking sites are part of the 
problem, and as part of the solution they must do more than pay lip 
service to providing a safe environment for children.  They must 
take affirmative, definitive action to ensure the protection of 
children who use their sites and chat rooms.  They can no longer be 
allowed to turn a blind eye to the predators who lurk on the 
playground they created.
        Admittedly, some of these networking sites and chat rooms 
have begun the process of a constructive dialogue to address the 
issue.  But, if they are honest, they will admit that the predator 
problem persists, and that there is more they can do to solve the 
problem.
        As mentioned earlier, parents have a role to play.  But parents 
are being denied some of their ability to play that role.  The 
networking sites should structure their systems so parents can 
block access to their sites.  Parents across the country prevent their 
children from going to locations where crime may occur, where 
sex and drugs may be traded, or where their children could be 
harmed.  Parents should not be denied that opportunity (that 
responsibility) simply because the location is in a virtual 
neighborhood, rather than a neighborhood down the street.  If 
parents want their children to have the opportunity to participate on 
the networking sites, the sites should be offer parents filtering 
software to block their child's access to content and websites that 
parents deem inappropriate.
        Heightened precaution must be taken to protect children under 
16 from child predators.  Should networking sites really mix 13 
year old children with adults who are participating in the 
networking site for the purpose of looking for a sex partner?  To 
avoid this problem, the sites should be structured so that only 
children over a certain age can participate in sites with adults.  
        Children who use the sites should not be subjected to sexually 
explicit images and solicitations, or other age-inappropriate 
material.  The sites should be structured so that such material is not 
accessible without age verification.
        While social networking sites are a lot of fun for kids - and 
have the potential to expose our children to a world of knowledge 
and bring them literally worldwide friends - many of the sites also 
subject children to a world of predators, pedophiles and 
pornographers.
        As law enforcement officers, we are asking that social 
networking sites and chat rooms more effectively police 
themselves, or be shut down.  Our society does not tolerate houses 
of prostitution.  Neither should it tolerate virtual houses that 
promote predators.  
        Computer literacy and Internet access are necessities, not 
luxuries.  And without question they have made our lives better.  
But the anonymity of the Internet has created opportunities for 
child predators and child pornographers, giving them cover to act 
on their perversions. 
        It turns out that the Internet, for all of its benefits and all of its 
conveniences, is still a pretty dangerous place.  It would not be an 
exaggeration to say that no child is safe from the unwanted 
advances of chat room predators, men who use the Internet in an 
attempt to realize their worst fantasies.
        Thank you for working to protect children from the nightmare 
of these predators.  We look forward to working with you to win 
the war against those who threaten the safety of our children, our 
families, our homes and our communities. 

        MR. UPTON.  Ms. Aftab.
        MS. AFTAB.  Good morning, Mr. Chairman.  Thank you so 
much.  WiredSafety is honored to be represented on the panel 
today.  We spoke at the first day of the Oversight and 
Investigations Subcommittee, and yesterday I was honored to 
speak again at the field hearing, which was a much closer commute 
to my house in New Jersey.  
        I am an Internet privacy and security lawyer, at least by 
training.  I was one of the first Internet lawyers in the world, and I 
used to earn a good living.  I represented many of the big 
corporations that you hear from, and I used to protect them in 
cyberspace.  
        In 1998, somebody sent me a link to a website.  It was a child 
pornography website, and I clicked on the link and I saw a picture 
of a 3-1/2-year-old being raped.  I cried for a while.  I vomited a 
little bit longer, and I said I might be able to do something if the 
corporations that were paying me so well to protect them online 
might listen to me instead of charging a lot of money.  I would 
give away my time to see if we could protect children and, at the 
same time, made sure they had access to this wonderful 
technology; because online all children can walk, talk and see, all 
of them have access to the world.  And that was a challenge.  But 
as a lawyer who was very well paid in this area, I was always good 
at challenging the risks and benefits of the technology.  
        Luckily, 11,000 people joined me.  We are all unpaid 
volunteers.  We operate in 76 countries around the world.  We 
don't have real offices.  We have no paid staff.  We are just people 
who care a great deal about protecting each other, especially our 
children.  
        Now, we have also been inside the social networks.  Since I 
first called MySpace in February of 2005, screaming about things 
that I saw they were doing when they had 6 million users.  And 
they called me back saying, "Kids?  We don't want kids.  It is 
designed for independent musicians.  We can't handle them.  They 
are doing all these things.  What to do?"  I said you have to do 
some things.  You have to have a law enforcement policy and 
guide.  I wrote it for them.  It is used as the model for their work 
with law enforcement around the country.  I said, you need safety 
tips.  I wrote them in the middle of the night.  They had typos with 
them for 6 months.  We put them on their site until they knew 
enough to take over and put their own there.  And my volunteers 
answered questions from parents when they became concerned 
about social networks.  When they came from 6 million to 90 
million, we became involved in all of the other social networks.  
        The second one was Facebook.  When Chris Kelly came into 
Facebook, Chris and I knew each other for several years and we 
said we will help you, too, because I know how serious they take 
this.  We are now embedded with all the major social networks of 
the world as the watchdog, trying to get them to beef up best 
practices.  The bill specifically is so well intentioned.  
        And I met Congressman Fitzpatrick yesterday.  I know where it 
is coming from.  The problem is, you need to understand both kids 
and social networks.  There is no ISP in this country or major 
entertainment site or major brand that isn't either already using a 
social network technology or contemplating it.  I receive several 
phone calls a day from both venture capitalists and investors, 
telling me that the sites that are coming to them for money will not 
be funded unless we get in on the inside and tell them what they 
need to do.  So they are out there.  
        If this law were implemented as written, they would be 
blocking Microsoft, Yahoo!, Google, AOL, all of the major 
networks, Viacom, every single one that you can imagine, not just 
the new ones that are social networking only.  
        In addition, as we look at the technology, kids are doing it for a 
number of reasons.  For years I have spent time protecting children 
from adult predators.  That is why I got into this.  And then I 
started protecting children from each other, cyber bullying.  
Congressman Shimkus was kind enough to put together a special 
event with Al Roker and my Teen Angels and us on cyber 
bullying.  Cyber bullying has exploded.  It is the biggest problem 
you find on social networks, not the sexual predators which gets a 
great deal of hype, but kids are being victimized right and left on 
social networks as they are cruel to each other.  And now we are 
finding the kids are hurting themselves, posting things that might 
have sounded cool at slumber parties, or they were drinking too 
many bottles of beer, and it might affect them getting into Stanford 
or something else because they posed as drunken sluts, because it 
sounded like a good idea at the time.  It is not cool to say you were 
home baking cookies with your 5-year-old niece.  It is a lot more 
fun to say you were doing something more outrageous, and you 
can do that on your MySpace.  
        As we looked at this, we are all unpaid volunteers.  We are 
largely unfunded.  We realize we have to come up with solutions 
that will work quickly.  And although the law is well intentioned, I 
think that perhaps as we tweak it, if you are looking for something 
that will compel schools and libraries, what we should do is to get 
schools to adopt a risk management plan.  Say to them these are 
the real risks, this is how it works, here are the models.  Send home 
an acceptable use policy to the parents, saying if your kids are 
cyber bullying each other from a home computer, but it impacts 
school, we have the right to do something about it.  Let's get them 
to do something meaningful, and the schools rather than legislators 
can decide what is right for that particular school.  
        In addition, we have gone to the true expert on the Web.  
Marvel Comics has donated Spider-Man as our spokesman, and we 
have a new comic coming out on social networking that we think 
will be effective.  We have gone to kids, Teen Angels is our 
program.  Kids talking to each other can be very effective.  The 
kids said that they never thought smart kids could be caught.  So 
we have been doing a great deal of work on that and we have a 
series of animations, one of which I would have shown you if I 
could get my computer to work.  So much for being a techno 
lawyer.  It says that cute 14-year-old boy may not be cute, may not 
be 14, and may not be a boy.  We have an animation where a girl is 
talking to heartthrob Bob on her social network page.  In one 
section, it is a fat slob sexual predator and another one it is three 
mean girls cyber bullying, setting her up for humiliation.  In the 
third, it is her 8-year-old bratty brother and his friend who want to 
show up with a video camera when she goes to the meet.  We have 
someone who is out on a day pass from prison.  Unfortunately, 
Christina Long, the first girl who was killed by an Internet sexual 
predator, confirmed 4 years ago, after the person was in prison 
awaiting sentencing, he was trying to lure other 13-year-olds from 
prison.  
        What do we do?  We look for folks, people like Nick Lachey.  
He is our new spokesperson.  The kids like that a lot.  We have the 
new Ms. Virginia, Adrian Scarlotta.  We have looked to our new 
program that came out of the hearings, the Oversight and 
Investigations hearings.  It is called WiredMoms.  It is our Moms 
Against Internet Sexual Predators.  We have found that by 
mobilizing people, giving them the tools they need, including our 
new Internet safety plan that will launch in September, parents can 
put in the information they have, the age and genders of their kids, 
what they are doing, what their values are, and it will spit out a 
road map of what they need on a technology site so they can know 
how to talk to their kids and know what to do 
        If we can make it easy, we can make it clean, we can make it 
accessible, we can all get involved.  We can make a difference.  
And for the first time--I have been doing this for 10 years--and for 
the first time, Congress is leading the world.  I do this all over the 
world.  They do it in Singapore, England, Hong Kong.  I work with 
parents to promote a guide for Internet safety.  Now, finally, all of 
the talents of these great groups, national centers, all of these 
fabulous people who I have been admiring for the years have been 
bringing before Congress.  It is time.  
        Let us work together.  I am WiredSafety and our Teen Angels 
and Wired Moms and Spider-Man, and you name it, we are 
working together on this.  You come up with any issues you want, 
I will sit down and help you plot, kick the tires, and let you know 
what is going on.  
        Our new program for the social networks, letting you know 
who is doing a good job and who isn't, will launch in September to 
let you know what is going to make it a little easier.
        [The prepared statement of Parry Aftab follows:] 

PREPARED STATEMENT OF PARRY AFTAB, EXECUTIVE DIRECTOR, 
WIREDSAFETY.ORG

SUMMARY 
        Our children are online. They do their homework, entertain 
themselves, communicate with each other and us, research things, 
shop for things and compare prices online. They need the Internet 
for their education, their careers and for their future. Of all the 
risks our children face online, only one is certain. If we deny our 
children access to these technologies, we have guaranteed that they 
are hurt. All other risks are avoidable through a combination of 
awareness, supervision, parental control and other technologies 
and the adoption of best practices by schools and the Internet 
industry itself. More and more children being lured and stalked by 
online predators who gather information about them from social 
networking profiles, chatrooms, instant messaging, e-mails and 
websites and who use this information and access to "groom" 
them.
        With our children walking around with Internet access in their 
backpacks and pocketbooks, we can no longer rely on parents 
watching whatever they do from a central location computer. Our 
children need to learn to use the "filter between their ears" and 
"ThinkB4TheyClick." This requires that we get them involved in 
framing solutions and educating each other. It also requires that we 
find new ways of building good cyber-citizenship and helping the 
kids and parents spot risks in new technologies and protect 
themselves online. It also requires that we engage the Internet 
industry itself in ways to build safer technologies and adopt best 
practices designed to make all their users, not just children, safer.
        Social networking, a combination of mini-web pages, blogs 
and searchable communities, have expanded in recent years, most 
recently exploding with the growth of MySpace.com. Parry Aftab 
estimates that more than half of the young teens in the US with 
home Internet access have at least one social networking profile. 
Some were set up by their friends, and others by the young teens 
themselves. Many have 2 to 5 separate profiles on just one site, and 
most have at least one profile on two or more social networks (not 
all being used, however). WiredSafety.org first began its social 
networking safety work in 2004, after learning how many young 
teens and preteens were beginning to use them. Unlike the early 
AOL profile pages used by teens and preteens in prior years, where 
the young users could post their contact information and brief 
statements about their interests, these networks were designed to 
be interactive. And instead of dry posts of contact and other 
personal interest information, these networks allowed teens to use 
html coding to add music, movies, animations, sounds, images and 
lots of user generated content to their page. 
        While the media and many others have focused only on the 
dangers of these networks when used by preteens and teens, it is 
important that we also explore their good uses and value and why 
their use has exploded in the last year and a-half. We have spent 
two years studying how and why preteens and teens use these 
kinds of sites. 
        Most use them for innocent purposes. They want to find their 
friends and communicate among larger groups than they can do via 
instant messaging. They can post something and know everyone in 
their class or group can read it at the same time. They want to 
show off their creativity and how special they are. And they can 
pretend to be prettier, more popular, richer and more famous than 
they are in real life. They raise money for their favorite charity and 
awareness for new causes. 
        They can post one message and their 150 best friends can see it 
right away. Unfortunately, so can those who might not have their 
best interests at heart. And sadly, in some cases, our teens are 
acting out, taking risks and seeking romance online (even 
knowingly with adults). That's when things can get dangerous, 
especially for young teens. 
        Our preteens and teens are often intentionally sharing risky 
information online in profiles, blogs and on websites. They may 
also share this information with stranger unwittingly, such as 
posting their cell numbers on their public away messages when 
using IM technologies. They intentionally post graphically sexual 
images and engage in and post cybersexual communications on 
their profiles and in chat-type technologies. And even when they 
are careful about protecting their own privacy, they may not be 
safe from their friends - even well-meaning friends. Their close 
friends may expose personal information about them by posting 
photos and information on their profiles. 
        They are also, in greater and greater numbers, meeting people 
offline that they met online. In 2000, Family PC Magazine 
reported that 24% of the teen girls they polled and 16% of the teen 
boys they polled admitted to meeting Internet strangers in real life. 
I believe that these numbers, when revised, will disclose that many 
more are doing this than 5 years ago. It is becoming more 
commonplace. Our children go willingly to offline meetings with 
these people. They may think they are meeting a cute fourteen year 
old boy, but find that they are meeting a 47- year old child 
molester instead.  This has to stop.
        Smart kids are sharing sexual images online with people they 
don't know, or e-mailing them to others they have a crush on and 
hope to entice. And with the newer video-chats, webcams and 
similar technologies, the predators have moved to luring our kids 
into posing and engaging in sexually explicit activities entirely 
online, in the comfort of their bedrooms, with parents sitting 
unwittingly downstairs.
        And while we focus on sexual predators online and how they 
are using social networks and community interactive technologies 
to reach our children, we too often forget that the most prevalent 
risk our children face on these networks and using these 
technologies is cyberbullying, not adult sexual predators. A vast 
majority of the preteen and young teens we polled have been 
involved, directly or indirectly, in at least one cyberbullying 
incident. They torment and terrorize each other. They threaten and 
embarrass each other. They post fake profiles, hateful messages 
and steal each other's passwords and identities, all designed to 
bully their victims. They do it in groups, singly, openly and 
anonymously. They use cell phones, interactive gaming devices 
and sites and web profiles, blogs and websites where you can vote 
for the ugliest, fattest, least popular or gayest student. And schools 
are the ones most impacted, when students who might be creating 
and posting these hateful communications from home or otherwise 
outside of school ground and after-hours, become engaged in 
violence and hurtful interactivities during school hours. In 
addition, when our teens and preteens are posting real or fantasy 
information about how much alcohol they consumed at this 
weekend's party, or how active their sex life has become, or how 
they cheated on their finals or shoplifted from the local mall, they 
may not realize that college recruiters, scholarship committees, 
coaches and future employers can access this information in years 
to come. This is an increasingly growing risk our children pose to 
themselves. 
        All of this has schools concerned. Private schools, especially, 
are facing real challenge controlling their students' activities 
online. Facebook.com is favored by private and parochial school 
students, who are impressed with the fact that it was formed at 
Harvard and other private and parochial students can be found 
there. It has, as some teens tell us, the "snob factor."
        Our children are sometimes accessing these sites from their 
school laptops, in-classroom desktops and school and public 
libraries. So, a parent's "house rules" may not have much effect 
when their child leaves the house. So, creating a new law 
prohibiting schools and libraries from allowing underage students 
and users to access these sites is an obvious approach. But is the 
answer to these problems found in laws restricting where students 
can go during school hours on school computers? Or can this be 
controlled by blocking access to interactive community networking 
sites, such as MySpace, Facebook and others from public and 
school libraries? While this may appear on its face to be an easy 
answer, it is neither easy nor the answer. 
        As more social networks are launched every day, and every 
ISP, entertainment company and wireless provider is either 
building a social network or finding a way to integrate social 
networking and community interactivity into their new and 
existing sites, it is impossible to block all of them and not other 
valuable Internet features, sites and content. Instead, schools need 
to be armed with the tools and risk management expertise to decide 
what sites their students can access during school hours from their 
servers and how to enforce their decisions and policies. 
        Schools need to decide if their students should have access to 
any non-educational site from school computers, and if so, which 
ones and for what purpose. They then need to develop a policy 
communicating this decision and the rules to the students (in 
language they understand), the teachers, the parents and other 
caregivers and to their IT team. They need to decide whether they 
will be using software to help enforce their policy, or merely 
traditional discipline for violating school policies. That too needs 
to be communicated to the school community. They also need to 
create or adopt educational programs teaching their students what 
information they can and shouldn't be sharing online, the risks of 
irresponsible Internet use and where to go when things go wrong. 
They can play an important role in teaching parents and other 
community members about safe, private and responsible Internet 
and wireless technologies use. 
        Educators, not legislators, should be deciding what students do 
during the school day. They know their students and the learning 
environment best. But schools do need the guidance and help of 
legislators and regulators to do this right. They need reliable 
information and studies on which they can base their decisions. 
They need to be apprised of new trends and developing risks. They 
need to know that websites and services are using the latest and 
best technologies and have adopted the best industry practices with 
their users' safety in mind. They need help that Congress can 
provide.
        Congress can also be very helpful in helping gather relevant 
information about cybercrimes and abuses. I have testified 
previously that actual cybercrime statistics are lacking. Everything 
we know is largely anecdotal. In 1999, the FBI's Innocent Images 
(charged with investigating crimes against children online) opened 
1500 new cases of suspects who were attempting to lure a child 
into an offline meeting for the purposes of sex. Based upon my 
estimates, about the same number of cases were opened by state 
and local law enforcement agencies that year. The same year, 
approximately 25 million minors used the Internet in the U.S. 
Now, with more than 75 million young Internet users in the U.S. 
we don't know if the number of instances have increased, 
decreased or remain flat, given the growth. The crime reporting 
forms don't collect information about the use of the Internet is 
child sexual exploitation crimes, or any other crimes. That has to 
change.
        Creating a central reporting database where all instances of 
cybercrimes are reported for statistical purposes, from 
cyberharassment to Internet-related ID theft, fraud and scams, to 
sexual predators and Internet-related child pornography and sexual 
exploitation would be incredibly helpful. It could track cybercrime 
trends affecting adults, seniors and youth. It could be used to help 
design safer systems and best practices and guide legislation 
directed at a meaningful problem, in a meaningful way.
        In addition, with tax dollars becoming more and more precious 
and the mission of all Congressional representatives to put tax 
dollars into the most effective use, existing programs by trusted 
non-profit groups can be highlighted and made available online to 
schools and community organizations that need them, without cost. 
Without having to reinvent the wheel, massive amounts of 
programs, lesson plans and risks management guides already exist 
that can be used as is, or easily retooled. Finding a way to get these 
wonderful resources into the hands of those who need them the 
most, using interactive technologies and the Internet and 
mobilizing volunteers to help deploy existing programs that were 
developed with or without government dollars is the fastest way to 
make a dent in the problem. Focusing attention on what works and 
what doesn't is something that Congress does best. 
WiredSafety.org and I pledge our help in doing that. 
        It's time.

OPENING STATEMENT

SOCIAL NETWORKS AND COMMUNITY INTERACTIVE 
TECHNOLOGIES AND US TEENS AND PRETEENS
        WiredSafety has been involved in cybersafety for ten years 
(see the attached description of our organization and work in the 
Appendix). It was founded and is run by Parry Aftab, one of the 
first Internet lawyers specializing in security and privacy law. She 
is frequently referred to as "The Kids Internet Lawyer" for her 
work with the children's online industry and child privacy issues 
and is an unpaid volunteer. For ten years we have cautioned 
Internet users of all ages against sharing too much personal 
information online, through profiles (pre-social networking), 
websites and online and mobile chat technologies. So we could 
quickly adapt our expertise to the new social networking 
explosion. It is crucial that this Sub-Committee recognizes that 
social networking is the future of the Internet and cyber-
communications. It is here to stay and being used by every major 
ISP and cyber-industry, by every trusted brand online and offline. 
It is not limited to newcomers, such as MySpace and Facebook, 
but includes Google, AOL, Microsoft, Yahoo! and others. Coming 
to terms with how and why people are using these networks is 
essential. 
        There are always trends in what kids are doing online. And 
some, that may have started as a trend, become core technologies 
adopted by adults and businesses alike. Instant-messaging and 
social networks head this list. Social networks (sometimes 
incorrectly called "blogs") are the future of the Internet and cyber-
technology. They are a cross between an online diary, a 
cyberdating network, an online publishing house, the fastest way to 
reach out to your friends online and a place to share your creativity 
and express yourself - on steroids.  
        MySpace grew in popularity because it offered what teens 
wanted - the ability to express themselves in any way they could 
imagine if they could locate or write the code to do it. But, 
interestingly enough, when MySpace was created, it was designed 
for independent musicians age 18 - 34, not for teens and preteens. 
It was the teens who found MySpace, not the other way around. By 
February 2005, when I first called them with our concerns, 
        MySpace had approximately 6 million users/profiles. By late May, 
2005, they had approximately 23 million users/profiles. By the end 
of 2005 that had increased to approximately 50 million 
users/profiles and stands at about 90 million users/profiles today. 
Until recently, our safety tips appeared on MySpace as their safety 
page, and we were the only watchdog within the site. We remain 
the only watchdog within most of the other major social networks, 
but no longer populate MySpace's safety pages or take abuse 
reports from their users. This is now handled internally by 
MySpace.
        MySpace.com and other similar sites are designed to allow 
people to share their creativity, pictures, and information with 
others. It also allows them to network with others online. 
Sometimes people do this to find romance. Sometimes they do it to 
find friends with similar interests. While this may be okay for 
adults, it is not okay for kids and may not be okay for young teens 
without parental supervision.
        Most social-networking websites agree and prohibit anyone 
under a certain age from using their website. Unfortunately, while 
they may set rules to keep younger teens and preteens off the site, 
they can't prevent kids from lying about their age and pretending 
to be old enough to use the website. (These sites are typically free 
and, without a payment or age verification or authentication, they 
never know who their members are in real life.) To address the 
lying some sites have developed special software applications 
designed to help identify underage members by reviewing the 
contents of member profiles. It's not perfect, but it does help spot 
many underage members.
        I recently visited a Marine Base in Yuma, Arizona and worked 
with teens and preteens on the base. I polled many of the preteens, 
learning that several of them had a "MySpace." When I pointed out 
MySpace's minimum age requirement of 14, they shrugged and 
explained that they were "mature for their age." After a 45-minute 
presentation, these same preteens knew far more about protecting 
themselves on MySpace and similar sites. But they still wanted to 
keep their "MySpace" profiles. This is a problem parents, schools, 
library media specialists and others are facing. How do you keep 
preteens and teens off of the social networks? Parents are told to 
talk with their kids,
        While no one can always tell if someone is lying about their 
age, some of these sites use some method of age verification or 
authentication (such as Facebook.com's college e-mail address 
requirement for their college users or YFly.com's field team 
approach). And these and others really try to keep underage users 
off their site. Many other similar sites do not. So, when allowing 
any teen to use a social-networking website, even with supervision, 
it helps to make sure it's a trustworthy one. WiredSafety allows 
those we consider more trustworthy to use our safety tips and link 
to our help teams. So, looking for our tips is a good way to start 
finding the sites we consider more trustworthy. In addition, our 
new seal program that will review sites for compliance with best 
practices, privacy and safety practices will launch in September.  
This should help in telling the good and responsible players from 
the bad and irresponsible ones. 
        All ISPs, entertainment companies and major wireless 
providers either already have a social network or similar 
community feature or will over the next year. New ones are 
launched daily. I am contacted by leading venture capitalists and 
investor groups daily to advise on a new proposal or network. The 
top five or six networks with substantial US user-bases claim, 
collectively, almost 200 million user profiles. Even if one user may 
set up several profiles (I have learned that most 12-16 year olds 
have between 2 and 5 different profiles, each set up with a 
different e-mail address), it is estimated that at least 80 million 
people are using social networks in the US.  I have polled 
approximately 10,000 teens and preteens face-to-face across the 
US over the last four months on their social network usage. These 
sites include MySpace.com, Xanga.com, Bebo.com, Tagged.com, 
BlackPlanet.com and its sister site, MiGente.com, and 
FaceBook.com, among others. 
        We have learned a great deal about why kids use these kinds of 
sites. Most use them for innocent purposes. They want to find their 
friends and communicate among larger groups than they can do via 
instant messaging. They can post something and know everyone in 
their class or group can read it at the same time. They want to 
show off their creativity and how special they are. And they can 
pretend to be prettier, more popular, richer and more famous than 
they are in real life. They raise money for their favorite charity and 
awareness for new causes. They stage protests from their profiles 
new millennium-style, letting policymakers know how they feel 
about the propose immigration policies and other issues important 
to teens, in interactive petitions. They make and share news. They 
engage in educational activities, such as building profiles of their 
favorite historical characters. One user may write music and 
another he has never met may write the lyrics. It's where they hang 
out and have fun, share their expertise and talents and find others 
like themselves. Or, they may be looking for other teens with lives 
radically different from theirs - farm-kids may want to find city-
kids or conservative kids may want to find outrageous ones. They 
can try on different guises and lifestyles and pretend to be someone 
they aren't, both good and bad.
        They can post one message and their 150 best friends can see it 
right away. Unfortunately, so can those who might not have their 
best interests at heart. But most of our teens aren't there for 
meeting strangers or checking out provocative photos. Sadly, in 
some cases, though, they are acting out, taking risks and seeking 
romance online. That's when things can get dangerous, for users of 
all ages, but especially young teens. (You can learn more about 
Internet sexual predators and how they operate at our new site for 
preventing and helping young victims of Internet sexual predators, 
Katiesplace.org.)
        Most use them for innocent purposes. They want to find their 
friends and communicate among larger groups than they can do via 
instant messaging. They can post something and know everyone in 
their class or group can read it at the same time. They want to 
show off their creativity and how special they are. And they can 
pretend to be prettier, more popular, richer and more famous than 
they are in real life. They raise money for their favorite charity and 
awareness for new causes. They stage protests from their profiles 
new millennium-style, letting policymakers know how they feel 
about the propose immigration policies and other issues important 
to teens, in interactive petitions. They make and share news. They 
engage in educational activities, such as building profiles of their 
favorite historical characters. One user may write music and 
another he has never met may write the lyrics. It's where they hang 
out and have fun, share their expertise and talents and find others 
like themselves. Or, they may be looking for other teens with lives 
radically different from theirs - farm-kids may want to find city-
kids or conservative kids may want to find outrageous ones. They 
can try on different guises and lifestyles and pretend to be someone 
they aren't, both good and bad.
        They can post one message and their 150 best friends can see it 
right away. Unfortunately, so can those who might not have their 
best interests at heart. And sadly, in some cases, our teens are 
acting out, taking risks and seeking romance online (even 
knowingly with adults). That's when things can get dangerous, 
especially for young teens. 
        Our preteens and teens are often intentionally sharing risky 
information online in profiles, blogs and on websites. They may 
also share this information with stranger unwittingly, such as 
posting their cell numbers on their public away messages when 
using IM technologies. They intentionally post graphically sexual 
images and engage in and post cybersexual communications on 
their profiles and in chat-type technologies. And even when they 
are careful about protecting their own privacy, they may not be 
safe from their friends - even well-meaning friends. Their close 
friends may expose personal information about them by posting 
photos and information on their profiles. 
        They are also, in greater and greater numbers, meeting people 
offline that they met online. In 2000, Family PC Magazine 
reported that 24% of the teen girls they polled and 16% of the teen 
boys they polled admitted to meeting Internet strangers in real life. 
I believe that these numbers, when revised, will disclose that many 
more are doing this than 5 years ago. It is becoming more 
commonplace. Our children go willingly to offline meetings with 
these people. They may think they are meeting a cute fourteen year 
old boy, but find that they are meeting a 47- year old child 
molester instead.  This has to stop.
        Smart kids are sharing sexual images online with people they 
don't know, or e-mailing them to others they have a crush on and 
hope to entice. And with the newer video-chats, webcams and 
similar technologies, the predators have moved to luring our kids 
into posing and engaging in sexually explicit activities entirely 
online, in the comfort of their bedrooms, with parents sitting 
unwittingly downstairs.
        And while we focus on sexual predators online and how they 
are using social networks and community interactive technologies 
to reach our children, we too often forget that the most prevalent 
risk our children face on these networks and using these 
technologies is cyberbullying, not adult sexual predators. A vast 
majority of the preteen and young teens we polled have been 
involved, directly or indirectly, in at least one cyberbullying 
incident. They torment and terrorize each other. They threaten and 
embarrass each other. They post fake profiles, hateful messages 
and steal each other's passwords and identities, all designed to 
bully their victims. They do it in groups, singly, openly and 
anonymously. They use cell phones, interactive gaming devices 
and sites and web profiles, blogs and websites where you can vote 
for the ugliest, fattest, least popular or gayest student. And schools 
are the ones most impacted, when students who might be creating 
and posting these hateful communications from home or otherwise 
outside of school ground and after-hours, become engaged in 
violence and hurtful interactivities during school hours. In 
addition, when our teens and preteens are posting real or fantasy 
information about how much alcohol they consumed at this 
weekend's party, or how active their sex life has become, or how 
they cheated on their finals or shoplifted from the local mall, they 
may not realize that college recruiters, scholarship committees, 
coaches and future employers can access this information in years 
to come. This is an increasingly growing risk our children pose to 
themselves. 
        Our preteens and teens are often intentionally sharing risky 
information online in profiles, blogs and on websites. They may 
also share this information with stranger unwittingly, such as 
posting their cell numbers on their public away messages when 
using IM technologies. They intentionally post graphically sexual 
images and engage in and post cybersexual communications on 
their profiles and in chat-type technologies. And even when they 
are careful about protecting their own privacy, they may not be 
safe from their friends - even well-meaning friends. Their close 
friends may expose personal information about them by posting 
photos and information on their profiles. 
        They are also, in greater and greater numbers, meeting people 
offline that they met online. In 2000, Family PC Magazine 
reported that 24% of the teen girls they polled and 16% of the teen 
boys they polled admitted to meeting Internet strangers in real life. 
I believe that these numbers, when revised, will disclose that many 
more are doing this than 5 years ago. It is becoming more 
commonplace. Our children go willingly to offline meetings with 
these people. They may think they are meeting a cute fourteen year 
old boy, but find that they are meeting a 47- year old child 
molester instead.  This has to stop.
        Smart kids are sharing sexual images online with people they 
don't know, or e-mailing them to others they have a crush on and 
hope to entice. And with the newer video-chats, webcams and 
similar technologies, the predators have moved to luring our kids 
into posing and engaging in sexually explicit activities entirely 
online, in the comfort of their bedrooms, with parents sitting 
unwittingly downstairs.
        And while we focus on sexual predators online and how they 
are using social networks and community interactive technologies 
to reach our children, we too often forget that the most prevalent 
risk our children face on these networks and using these 
technologies is cyberbullying, not adult sexual predators. A vast 
majority of the preteen and young teens we polled have been 
involved, directly or indirectly, in at least one cyberbullying 
incident. They torment and terrorize each other. They threaten and 
embarrass each other. They post fake profiles, hateful messages 
and steal each other's passwords and identities, all designed to 
bully their victims. They do it in groups, singly, openly and 
anonymously. They use cell phones, interactive gaming devices 
and sites and web profiles, blogs and websites where you can vote 
for the ugliest, fattest, least popular or gayest student. And schools 
are the ones most impacted, when students who might be creating 
and posting these hateful communications from home or otherwise 
outside of school ground and after-hours, become engaged in 
violence and hurtful interactivities during school hours. In 
addition, when our teens and preteens are posting real or fantasy 
information about how much alcohol they consumed at this 
weekend's party, or how active their sex life has become, or how 
they cheated on their finals or shoplifted from the local mall, they 
may not realize that college recruiters, scholarship committees, 
coaches and future employers can access this information in years 
to come. This is an increasingly growing risk our children pose to 
themselves. 
        All of this has schools concerned. Private schools, especially, 
are facing real challenge controlling their students' activities 
online. Facebook.com is favored by private and parochial school 
students, who are impressed with the fact that it was formed at 
Harvard and other private and parochial students can be found 
there. It has, as some teens tell us, the "snob factor." Teens need to 
be on a social network to have a social life these days. (Although 
many are leaving MySpace in favor of other sites, for various 
reasons.)
        But there's more to it. When I polled an average of 5000 kids 
every month on this, I learned that they love the creativity of it. 
They love expressing themselves so others can appreciate it. They 
enjoy adding sparkly graphics and sharing their stories, poems and 
jokes. One of the Teenangels (WiredSafety's expert teen and 
preteen program, teenangels.org) told me that it's all about "Pink! 
Pink! Pink!" She can build a page using pink font, on a black 
background and feel creative and cool. (Her mother is an interior 
decorator and she has to wear a school uniform, and saw this as her 
sole expressive outlet.)
        As important as allowing them to express themselves in a 
creative way is, though, it's not enough to get me to do a turn-
about with these kinds of sites and teens. I was very negative about 
these sites. I have now taken a second look after talking to another 
one of my Teenangels.
        This Teenangel (a soft-spoken and gentle girl) did a research 
project on social networking websites. She reviewed some of these 
sites and listed the kinds of risks young teens face on these 
websites. She then went on to explain that she had several profiles 
online at these sites. I was initially shocked and disappointed that 
one of my expert teens would take such risks with their personal 
information when they knew better. When I asked her why she 
would do such a risky thing, as the Teenangels often do, this one 
taught me something new. 
        She explained that it's hard being a young teen these days. Few 
kids in the school will give you the chance to see how much you 
have to offer unless you are the captain of the cheerleading squad 
or of the debate team. A profile page that is open to the other 
students at your school gives you a chance to share the special 
things about yourself with them, and will help them get to know 
you better. It's about sharing your favorite movies and books, 
about sharing fun vacation memories and your dreams, it's about 
sharing how special you are. It's about helping you make friends in 
your school with people who appreciate you. It's not about 
strangers, it's about others in their class.
        There is a real value to that. Whether it's by posting a profile 
page that is supervised by their parents, or building a website. It 
can be pink and sparkly, or thoughtful and inspiring. But it's all 
about who your teen is or who they want to be. It's a challenge to 
give them a place where they can express themselves while 
keeping them safe, protected from predators and from sharing too 
much private information online. But if you are willing to 
supervise what they are saying and doing on their profiles, I'm 
willing to help.
        Lying on their pages is part of what this is all about, too. They 
pretend to be older (and not just to get around the age restrictions), 
richer, more famous or more popular. Boys pretend to be girls and 
girls pretend to be boys. They may be tall blonde surfers from 
Malibu or live on a ranch in New Zealand. While this may not be a 
problem, some of their other kinds of pretending can be dangerous 
for teens in a public social network. 
        They may act tougher than they are in real life "rl," provoke 
other, or talk about getting drunk, or their sexuality. They may 
pose as someone they don't like, to cyberbully and harass them, or 
steal their identities. I have spent years protecting children from 
predatorial adults. I never thought I would be spending as much 
time as I am protecting them from each other. But, they are using 
these sites by the millions. And their use will only grow. So, I 
advise the thousands of parents who e-mail us daily and those who 
review our safety tips online that on how to handle the issue and 
that they need to be the parent. 
        Our children are sometimes accessing these sites from their 
school laptops, in-classroom desktops and school and public 
libraries. So, a parent's "house rules" may not have much effect 
when their child leaves the house. So, creating a new law 
prohibiting schools and libraries from allowing underage students 
and users to access these sites is an obvious approach. But is the 
answer to these problems found in laws restricting where students 
can go during school hours on school computers? Or can this be 
controlled by blocking access to interactive community networking 
sites, such as MySpace, Facebook and others from public and 
school libraries? While this may appear on its face to be an easy 
answer, it is neither easy nor the answer. 
        As more social networks are launched every day, and every 
ISP, entertainment company and wireless provider is either 
building a social network or finding a way to integrate social 
networking and community interactivity into their new and 
existing sites, it is impossible to block all of them and not other 
valuable Internet features, sites and content. Instead, schools need 
to be armed with the tools and risk management expertise to decide 
what sites their students can access during school hours from their 
servers and how to enforce their decisions and policies. 
        Schools need to decide if their students should have access to 
any non-educational site from school computers, and if so, which 
ones and for what purpose. They then need to develop a policy 
communicating this decision and the rules to the students (in 
language they understand), the teachers, the parents and other 
caregivers and to their IT team. They need to decide whether they 
will be using software to help enforce their policy, or merely 
traditional discipline for violating school policies. That too needs 
to be communicated to the school community. They also need to 
create or adopt educational programs teaching their students what 
information they can and shouldn't be sharing online, the risks of 
irresponsible Internet use and where to go when things go wrong. 
They can play an important role in teaching parents and other 
community members about safe, private and responsible Internet 
and wireless technologies use. 
        Educators, not legislators, should be deciding what students do 
during the school day. They know their students and the learning 
environment best. But schools do need the guidance and help of 
legislators and regulators to do this right. They need reliable 
information and studies on which they can base their decisions. 
They need to be apprised of new trends and developing risks. They 
need to know that websites and services are using the latest and 
best technologies and have adopted the best industry practices with 
their users' safety in mind. They need help that Congress can 
provide.
        Congress can also be very helpful in helping gather relevant 
information about cybercrimes and abuses. I have testified 
previously that actual cybercrime statistics are lacking. Everything 
we know is largely anecdotal. In 1999, the FBI's Innocent Images 
(charged with investigating crimes against children online) opened 
1500 new cases of suspects who were attempting to lure a child 
into an offline meeting for the purposes of sex. Based upon my 
estimates, about the same number of cases were opened by state 
and local law enforcement agencies that year. The same year, 
approximately 25 million minors used the Internet in the U.S. 
Now, with more than 75 million young Internet users in the U.S. 
we don't know if the number of instances have increased, 
decreased or remain flat, given the growth. The crime reporting 
forms don't collect information about the use of the Internet is 
child sexual exploitation crimes, or any other crimes. That has to 
change.
        Creating a central reporting database where all instances of 
cybercrimes are reported for statistical purposes, from 
cyberharassment to Internet-related ID theft, fraud and scams, to 
sexual predators and Internet-related child pornography and sexual 
exploitation would be incredibly helpful. It could track cybercrime 
trends affecting adults, seniors and youth. It could be used to help 
design safer systems and best practices and guide legislation 
directed at a meaningful problem, in a meaningful way.
        In addition, with tax dollars becoming more and more precious 
and the mission of all Congressional representatives to put tax 
dollars into the most effective use, existing programs by trusted 
non-profit groups can be highlighted and made available online to 
schools and community organizations that need them, without cost. 
Without having to reinvent the wheel, massive amounts of 
programs, lesson plans and risks management guides already exist 
that can be used as is, or easily retooled. Finding a way to get these 
wonderful resources into the hands of those who need them the 
most, using interactive technologies and the Internet and 
mobilizing volunteers to help deploy existing programs that were 
developed with or without government dollars is the fastest way to 
make a dent in the problem. Focusing attention on what works and 
what doesn't is something that Congress does best. 
WiredSafety.org and I pledge our help in doing that. 
        It's time.




Exhibit A: Overview of WiredSafety.org

        WiredSafety.org is a 501(c) (3) charity and the largest and 
oldest online safety, education, and help group in the world. It 
consists of thousands of volunteers from more than 76 countries 
around the world, all working online with the mission of 
promoting a safer and more responsible Internet and wireless 
experience for everyone. 
        Originating in 1995 as a group of volunteers rating websites, it 
now provides one-to-one help, extensive information, and 
education to cyberspace users of all ages and members of the 
Internet industry on a myriad of Internet and interactive technology 
safety issues. These services are offered through a worldwide 
organization comprised entirely of volunteers who administer 
specialized websites and programs. WiredSafety.org volunteers 
range in age from 18 to 80 and run the gamut from TV 
personalities, teachers, law enforcement officers, PhD's, writers 
and librarians to stay-at-home moms, retired persons, and students. 
WiredSafety.org's founder and Executive Director, cyberlawyer 
Parry Aftab, is also an unpaid volunteer. With the exception of its 
TeenAngels, outreach and speaking programs, all work and help is 
provided online and free of charge. 
WiredSafety.org's work falls into four major areas, all 
designed to help promote a safer and more responsible digital 
experience for everyone:
 Assistance for victims of cyberabuse and harassment and 
others who need help online, including parents, teens and 
educators. 
 Advice, Training and Help for law enforcement worldwide on 
preventing, spotting and investigating cybercrimes and for 
members of the Internet and interactive digital industries in 
designing safer technologies and adopting and implementing 
best practices.
 Education for children, parents, communities, law enforcement, 
abuse and customer help staff within the Internet industry and 
professional development for educators.
 Information and Awareness on all aspects of online safety, 
privacy, responsible use and security wired, wireless and as 
new technologies are developed.

Our target audiences include:
 Parents, grandparents and caregivers (including aunts, 
uncles and older siblings);
 Pre-reader lap-surfers, kids, preteens, teens and college 
students;
 Members of the Internet, wireless and interactive 
technology industries;
 Law enforcement, community policing agencies and school 
resource officers, legislators, the judicial community and 
regulatory agencies; and
 Schools and other educational institutions.

        Originally formed in 1995 (under another name) to provide 
help and protection for Internet users of all ages, in recent years, 
Wiredsafety.org's work has increasingly focused on the safety and 
good cybercitizenship of children, tweens, and teens. It serves as 
the umbrella organization for TeenAngels.org, WiredKids.org, 
WiredCops.org and WiredTeens.org. WiredSafety.org is dedicated 
to protecting children in cyberspace from cybercrimes and abuse, 
including from each other. This involves protecting them 
from cyberbullying, hacking, sexual harassment and identity (ID) 
theft. It also includes protecting children everywhere from 
Internet-related sexual exploitation. WiredSafety.org helps protect 
them from risks posed by adults, by each other and more recently 
from themselves, as their reputations and future college and job 
opportunities are impacted by what they post on their MySpace 
and other profiles. The package of programs designed for young 
users with the assistance of our teen and preteen volunteers is 
called "ThinkB4uClick," teaching them the consequences of their 
cyberactivities.
        Marvel Entertainment, Inc. has also joined forces with 
WiredSafety.org to provide superhero assistance in educating our 
children and families on safer online practices. The first Internet 
safety comic, Internet Super Heroes meet the Internet Villains, 
teaches how Internet predators can infiltrate anyone's computer 
and wreck havoc on their lives by stealing their identity and posing 
as them online. Published under its exclusive license with Marvel, 
and sponsored by Microsoft, this first comic will help teach the 
250,000 readers how to be smarter and safer online using Spider-
Man, The Incredible Hulk and Dr. Doom, among others to bring 
the message to life.
        WiredSafety.org also provides information and resources to 
help educate and guide law enforcement officers on Internet safety 
issues, crime prevention and investigation of cybercrimes. It has 
created a special website just for law enforcement officers, 
Cyberlawenforcement.org, also known as WiredCops.org. As part 
of the Wiredcops.org initiative, specially trained volunteers assist 
law enforcement in the investigation and prevention of trafficking 
of children, child pornography, child molestation, and 
cyberstalkers. Recently, at the request of leading law enforcement 
agencies, WiredSafety.org has begun using its teen volunteers to 
provide information that will assist undercover law enforcement 
officers in creating credible profiles of preteens and teens to help 
them become more effective when operating undercover online. 
        In addition to assisting law enforcement agencies, 
WiredSafety.org offers one-to-one assistance for victims of 
cyberabuse that may not arise to the level of a cybercrime and is 
not handled by law enforcement. WiredSafety's cyberhelpline 
gives "netizens" access to free help when they need it via the 
Internet. Its special team of helpline volunteers is assigned to cases 
and works one-to-one online to help resolve individual problems 
and get victims help when they need it. WiredSafety.org assists 
more cases of cyberharassment than any other organization in the 
world, helping thousands each month through its site and report 
line. Cyberbullying cases can be reported to the report line as well. 
        But when dealing with preteens and teens, the challenge has 
always been getting them engaged. Their "selective hearing" can 
get in the way of their learning safer and more responsible 
behavior online, just as it may at home. When approached, teens 
told us that we had to approach them with things that they consider 
important, using their language. So, WiredSafety.org recruited 
teens and preteens who help us do that. These expert Teenangels, 
13 to 18 year olds, (and now their younger version, Tweenangels, 
from 9 - 12 years of age) deliver the message of safe, private, and 
responsible technology use to their peers. These youth-based 
programs were formed in 1999 to provide special perspectives and 
insight into how young people are using the new technologies and 
how to better prepare them to handle the risks they encounter. 
        Teenangels have been recognized and honored by Congress, 
Parliament, John Walsh, Time for Kids and recently, Teen People 
Magazine, among others. Their training is extensive and takes 
almost one year to complete. When they receive their "wings", 
however, they are true experts. It is the only Internet expert youth 
program in the world. And, once trained, these special teens and 
tweens help develop safer technologies, by providing expertise for 
and advising members of the Internet and entertainment industries, 
media and governmental agencies around the world.
        Too often disconnected from the immediate consequences of 
their actions online, many "good" kids and teens find themselves 
doing things online they would never dream of doing in real life. 
This needs to change.  The youth programs created by 
WiredSafety.org focus on cyberwellness and cyberethics which fits 
perfectly within its mission and expertise. To keep our children 
safe online, they need to understand the norms and rules of 
operating online. They must also recognize that they will be held 
accountable for what they do in cyberspace and that what they post 
online has ramifications beyond the momentary click. Teaching 
responsible technology use is crucial.
        WiredSafety.org also offers a wide variety of educational and 
help services to the Internet community at large. Companies such 
as Disney, the Motion Picture Association of America, the 
National Sheriff's Association, Yahoo, Verizon Foundation, 
Marvel Comics, MySpace, Xanga, Johnson & Johnson, Google, 
Oracle, Facebook, Microsoft and AOL support and turn to Parry 
Aftab and WiredSafety.org for guidance and advice in dealing with 
Internet safety issues. Teenangels and Parry have testified before 
leading governmental and legislative bodies worldwide, including 
the U.S. Congress and the U.K. Parliament. Regulatory agencies, 
such as Singapore's Media Development Authority, the U.S. FTC 
and California's consumer protection arm have sought 
WiredSafety's and Parry's help. Their collaborative efforts with 
schools, community organizations, prosecutorial officers, local 
executive branch and law enforcement agencies, such as Alaska's 
Campfire USA, the Baltimore County public schools, Ohio's 
Wayne County Sheriff's office, the San Francisco DA, and 
Westchester County, NY's County Executive Spano, have affected 
hundreds of thousands of families worldwide. Using its unique 
expertise in the field, the charity also assists important trade 
associations, such as the CTIA (the wireless trade association) and 
the U.S. Sheriff's Association. WiredSafety.org also acts as a 
watchdog within most of the social networking websites, to help 
provide their users safety information and help when things go 
wrong.
        Select volunteers find and review family-friendly Web sites, 
filtering software products, and Internet services. Some of the 
outreach team volunteers run programs, summits and also speak at 
local community groups and schools around the world teaching 
Internet safety, privacy and responsible use.
        However, its work is not limited to the Internet alone. 
WiredSafety focuses on all aspects of interactive technology use 
and abuse. Its expertise includes cell phone safety and security, 
interactive gaming, social networking (mobile and online) and 
text-messaging products, as well as any new interactive 
technologies as they are developed. Its long years of working with 
Internet users and handling cybercrimes and abuse have created a 
flexible and knowledgeable volunteer force. If you can view 
content, communicate with others, spend money, or buy things 
using the technology, WiredSafety.org can help.
        WiredSafety.org is headed by Parry Aftab, a mom, 
international cyberspace privacy and security lawyer and children's 
advocate. Parry is the author of the first book written for parents 
about Internet safety - The Parents Guide to the Internet 
(considered the bible of online safety and published in 1997) as 
well as The Parent's Guide to Protecting Your Children in 
Cyberspace (McGraw-Hill, 2000), which has been adapted and 
translated around the world. Her most recent books have been 
especially written and adapted for and published in England, 
China, Spain and Singapore. Her new book, Internet Safety 1-2-3, 
was released in December 2005 in Spain and will be released next 
year in the United States. And her new "Stop Cyberbullying!" 
guide launched in Spain in May 2006.
        WiredSafety is proud of its reputation as the one-stop-shop for 
all cyberspace safety, privacy, security, and help needs. It is even 
prouder of the fact that all this can be accomplished without large 
government funding or money wasted on administration costs. No 
one is paid within WiredSafety.org. They are all unpaid volunteers 
- including Parry herself. This all-volunteer workforce has been 
estimated at providing more than $3 million in unpaid services 
every year. Using a popular website and series of special topic 
sites, the organization has reached millions of Internet users since 
its inception and addresses more than 5000 children, teens and 
tweens and 1000 parents in person every month, on average.
        WiredSafety.org mobilizes people of all ages who want to help 
others, and puts them to work doing just that. It is intent on its 
mission to "Take Back the Net!"


Exhibit B: Parry Aftab's Bio and CV:

Updated July 2006
Parry Aftab
Bio



        Parry Aftab is a security, privacy and cyberspace lawyer, as 
well as an author, columnist and child advocate. A substantial 
portion of her time is donated to Internet issues involving children, 
from equitable access, to privacy, to safety, to helping develop 
quality and reliable content for children. She has also legally 
represented or acted as a consultant to most of the children's 
Internet industry, helping them comply with the law, while 
improving the Internet experience for children. When children and 
the Internet are concerned, Ms. Aftab's name is the first mentioned. 
        Parry Aftab is a worldwide leader in the area of online safety 
and parent and child Internet education. As Executive Director of 
WiredSafety.org, the oldest and largest online safety and 
educational program in cyberspace, Ms. Aftab helps prevent and 
assist law enforcement agencies in investigating cybercrime 
against children and families. Under its former name, her group 
was awarded the President's Service Award in October 1998 from 
the White House and Points of Light Foundation. Ms Aftab also 
works closely with law enforcement around the world to prevent 
cybercrimes and police the Internet and is part of the Home Office 
Cybercrime Task Force in the UK. She was recently appointed a 
Special Deputy Sheriff by Wayne County, Ohio's Sheriff, Thomas 
Maurer.
        In 1999, Ms. Aftab was appointed by UNESCO to head up its 
child Internet sexual exploitation project for the U.S. She has also 
written the leading books for parents on Internet safety since her 
first book was published on the topic in December 1997.
        Although her vocation was Internet security and privacy law, 
her avocation is children online - helping them become good 
cybercitizens and keeping them safe, private and secure online. 
She is dedicated to helping curb Internet-related crimes against 
children and assisting law enforcement in bringing the child 
predators to justice. Everyone who encounters Ms. Aftab is 
impressed with her passion and energy when children's Internet 
issues are involved. 
        While her passion is for protecting children from Internet 
sexual exploitation, she is also devoted to empowering them 
through access to the wonders of the Internet. She hopes to help all 
children become better informed and responsible cybercitizens, 
controlling the technologies instead of being controlled by them. 
Her programs are designed to teach them safe, private and 
responsible technology use, which includes teaching them good 
netiquette and respect for each other and the rights of others, 
including intellectual property rights of the music, movie, gaming 
and software industries.
        Ms. Aftab was among the first in the world to devote her 
talents to keeping children safe online. She has helped design 
programs for parents and children in a wide range of Internet-
related issues for ten years. Her work has been recognized by 
leading technology influencers, such as Family PC Magazine, 
when she was awarded Internet Pioneer of the Year in 2001. And 
child protection agencies have recognized her as well, when Child 
Abuse Prevention Services presented her with their 20th 
anniversary Community Leadership Award in 2005. (Past 
recipients of this award include Senator Clinton, Linda Fairstein, 
Judy Collins, Dr. Joyce Brothers and the "God Squad.")
        Parry Aftab also provides parent Internet education and online 
safety content for such diverse sites as Nickelodeon, Children's 
Television Workshop, Disney, Microsoft, AOL, Yahoo!, Google, 
AT&T and MSNBC. She is a regular keynote speaker, and 
resource on camera for the media on diverse cybercrime, safety, 
privacy and cyberlaw issues. She writes The Privacy Lawyer 
columnist for Information Week Magazine where she writes on a 
range of topics that affect technology, policy and privacy. Her 
expertise is especially in demand on children's Internet issues, 
because no one knows more about children online than Parry 
Aftab.
 	While she is devoted to protecting children online, Ms. Aftab 
seeks to empower children and their parents, not the censors. Her 
common sense approach to technology risks and solutions works 
as well anywhere in the world as it does in the United States. But 
what really makes her special is her ability to tap into the caring 
and creativity of young people to craft solutions that are written in 
their language and designed for their needs.
        She is a frequent and respected resource for news programming 
and print journalists around the world. Her expertise has been 
featured nationally and internationally in online and print 
publications, including Readers Digest, Playboy, TV Guide 
Magazine, Cosmopolitan, People Magazine, Redbook, Biography, 
USA Today, Information Week, Working Women, Teen People, 
U.S. News & World Report, Family Circle, Newsweek, Ladies 
Home Journal, Smart Money Magazine, PC Magazine, Good 
Housekeeping, Better Homes & Gardens, Family PC Magazine, 
Yahoo! Internet Life, Information Week, CIO Magazine, The Wall 
Street Journal, The New York Times, The LA Times, most 
regional newspapers in the United States, The London Times 
Magazine, The Strait Times (Singapore), The South China 
Morning Post Sunday Magazine (Hong Kong), and more. As a 
result of her work online with children, Ms. Aftab was selected as 
a charter member of Children Television Workshop's Advisory 
Board, as well as appointed to The National Urban League's 
Technology Advisory Committee. In 2003 she was elected to 
TRUSTe's Board of Directors. She served on the advisory board 
for the Ad Council for two terms.
        Parry Aftab has spoken to many governmental agencies and 
groups worldwide, conducted briefings for the U.S. Senate, 
testifies regularly before Congress, and has been a key speaker at 
the White House Summit on Online Content, the sole Internet-
related expert speaking at the 2002 White House summit on 
Missing and Exploited Children and testified before leading 
legislative committees and The House of Lords, all with the same 
message: The Internet is a wonderful resource for families, and 
once parents understand the online risks, they can use common 
sense (and perhaps some filtering tools) to help their children enjoy 
cyberspace safely. 
        As one of the first lawyers in the world to specialize in Internet 
legal issues, Parry Aftab is admitted to practice law in New York 
and New Jersey. She attended law school at NYU School of Law 
where she received her J.D. degree. She received her B.A. degree 
as Valedictorian of Hunter College (having completed her full 
undergraduate degree in less than two years), where she was 
inducted into Phi Beta Kappa.
        She resides in the New York metropolitan area and is a mother 
of two. Ms. Aftab can be reached at [email protected].


Parry Aftab

Professional Curriculum Vitae
Phone: 201-463-8663
[email protected]


Internet privacy and security lawyer, licensed to practice law in 
NY and NJ,
The Privacy Lawyer columnist, author, consultant and public 
speaker 
Executive Director of WiredSafety.org

AREAS OF EXPERTISE:   Worldwide Cybercrime Protection and 
Prevention/Identity Theft/ Privacy, Data Collection and Security / 
Workplace Risk Management and Security/ Consumer Protection, 
Advertising and the Internet / E-Commerce/ Cyberstalking and 
Harassment/ Child Exploitation and Child Pornography, Children 
Online, Online Marketing, Cyber-workplace issues, Privacy 
training and coaching


CURRENT POSITIONS	President/CEO - Aftab Cyber-
Consulting
						Executive Director, WiredSafety.org (a 
501c-3 corporation)
						The Privacy Lawyer columnist for 
Information Week

EDUCATION		City University of New York		B.A., 1981
				Hunter College				Valedictorian
				(Completed 4 yr degree in 2 yrs)	Phi Beta Kappa 
(Nu Chapter)

				New York University			J.D., 1984
				School of Law

SELECT HONORS	Community Leadership Award, 2005
	        				Awarded by Child Abuse Prevention 
Services

American Society of Business Publication 
Editors Award "Gold"    Original Web 
Commentary
Informationweek.com for Parry Aftab's 
"Patriotism, Compliance and 
Confidentiality" article 

					Activist of the Year Award, 2002	
						Awarded by Media Ecology Association

					Internet Pioneer of the Year, 2001
						Awarded by Family PC Magazine

					Home Office, U.K.
Child Protection, Criminal Laws and Law 
Enforcement Task Forces

	
ORGANIZATIONS	TRUSTe
						Member- Board of Directors (Elected 
December 2002)

					Ad Council
						Advisory Committee member (1999 - 2003)
					Children's Television Workshop Online 
(Sesame Workshop)
						Advisory Board (1998 - present)
	
					UNESCO
President, U.S. National Action Committee, 
Innocence in Danger (appointed 1999)1998-
present)
	
					The Internet Society
Elected Chair, Internet Societal Task Force 
and Societal 			Steering Group 
(worldwide, 2001)
						Member of Public Policy Committee ISOC 
(2001-present)
	Chair, Privacy and Security Working 
Group of The 			Internet Society Task 
Force (2000-2001) appointed 		
	member since 1999

WiredSafety (wiredsafety.org) the world's 
largest Internet safety and help group, formerly 
functioned as "Cyberangels," recipient of 
President's Service Award, 1998,
						Executive Director (1998-present)

					The National Urban League
						Technology Advisory Committee (1997 - 
present)


AUTHORSHIPS AND	
RELATED ACTIVITIES	

     Author, selected books

Cyberbullying Guide (Spanish and English guide on 
preventing and 	dealing with cyberbullying) 
				Spain 2006
	
			Internet con los menores Riesgos (Spanish guide for 
parents on Internet 					safety, especially written for 
Spain and South and Central America)   
				Spain 2005

			Children and the Internet (official Chinese Internet 
safety guide)
China 2004
	
			The Parent's Guide to Protecting Your Children in 
Cyberspace, McGraw-				Hill, 
(U.S. edition, January 2000; UK edition, March 
2000; Singapore edition May 2000 and Spanish 
language US edition November 2000)

			A Parents' Guide to the Internet, SC Press (October 
1997)

     Contributor, selected books
	
			Child Abuse on the Internet.... Ending the Silence 
(2001) Carlos A. Arnaldo, Editor 
			Chapter 21: The Technical Response: Blocking, 
Filtering
			And Rating The Internet - by Parry Aftab
The Best In E-Commerce Law 
	    			(2001) Warren E. Agin, Editor
			Children's Online Privacy Law

      Selected Speaking Engagements

WiredSafety's Social Networking Summit, June 2006

US Congress, Commerce Committee, Sub-Committee 
Investigations and Oversight, opening day hearings April 4, 2006

National Association of Independent School Annual Conference, 
March 2006

Stonybrook Cyberbullying Summit, September 2005

FDIC Conference on Security Online, August 2005  
 
The Westchester County Cyberbullying Summit, February 8, 2005

The US Copyright Office - Luncheon Speaker (LA and SF events) 
February 2005

Child Abuse Prevention Service 20th Anniversary Luncheon 
Speaker, April 2005

FTC Workshop on P2P, December 2004

House of Commons - Parliamentary Briefing on Internet Safety, 
October 2004

IAPP (International Association of Privacy Professionals), June 11, 
2004 

EU- Safer Internet - Warsaw, March 2004

Media Development Authority- Singapore, Family Internet Week - 
March 15, 2004

Western Attorneys General Conference, July 29, 2003

Domain Day, Milan, Italy, November 5th, 2002

Wired Kids Summit, Washington D.C., October 15th, 2002 
(Mediator and Host of the event at the Russell Senate Building)

White House Conference on Missing and Exploited Children, 
October 2nd, 2002 (Only panel speaker selected to discuss Internet 
issues). Other speakers included President George W. Bush, Colin 
Powell, John Ashcroft, Rod Paige and many distinguished others.

Council of Europe, Children's Online Safety, Belgium, November 
2001

Microsoft, Privacy and Security Summit, Privacy Speaker, San 
Francisco, November 2001

Intellectual Property Organization, Featured Speaker on Internet 
Law, Privacy and Digital Rights, New York, November, 2001

SCOPE, Keynote Speaker, Cyber-terrorism, New York, October 
2001

Rappateour, E.U. Online Content Regulation, Luxembourg, June 
2001

Bertelsmann Foundation, Experts Meeting, Singapore, February 
2001

Microsoft, Privacy and Security Summit, Speaker (only female 
speaker), 	Seattle, November 2000

Keynote Speaker, House of Lords, Kids Helping Kids, London 
(April 2000)

Keynote Speaker, Singapore Broadcasting Authority and Ministry 
of Information Conference, Children Online, Regulatory Issues, 
Singapore (November 1999, May 2000, February 2001)

Panelist, FTC Hearings on COPPA Regulations, Washington (June 
1999)

Keynote Speaker, White House Summit, Online Content, Los 
Angeles (June 1998)

Keynote Speaker, C.A.R.U., Conference On Children's Online 
Privacy 
		(September 1998)

Featured Speaker, Littleton Town Meeting hosted by Tom Brokaw 
and Jane Pauley, MSNBC (April 1999)



                          APPENDIXES:

                          Appendix 1:
Parry's Info for Parents...What are our kids doing online?

        Know that our kids doing things online that we would freak if 
we knew about isn't new. Our kids have been saying and doing 
outrageous things online since the Web was born. We just didn't 
know about it, but all the other kids do. It's how they communicate 
online. In 1999 we conducted the largest academic survey done to 
date for teenage girls. Almost 11,000 of the teens polled answered 
our questions about what they did online. When we asked them to 
explain if they had done anything online that they wouldn't have 
done in person, here's what they said (in their own words):
         "Yes, obviously people are more bold and outgoing on the 
Internet when they don't have to deal with the 
consequences of their actions."
	 "Of course! All people do. A computer with a phone line is 
like a mask to the world. You can do or say anything and 
you won't ever have to meet this person. For instance, my 
little brother is 13 and he tells people he's 16 or older. He's 
a sweet guy and has a very high respect for females. 
Online, however, he says very cruel and suggestive things 
to and about them. He acts like a monster. It's disgraceful... 
and a little scary."
	 "Yes, of course... our usual boundaries and personal walls 
are down and we can act more carefree and outspoken if we 
feel like. At least this is true for me... you can act like a 
goddess."
	 "I have cursed out a lot of ppl [people], and when my bud 
comes over, we go into places like the African American 
room and yell "KKK ALL THE WAY" or go to the Jewish 
room and say "HEIL HITLER," but I haven't done that 
since I started going back to church and was saved by Jesus 
Christ. We were just joking, we weren't really racist." 
	 "Yes, but I'd rather not describe what I did. Instead, I'll 
just say that online, you can be absolutely ANYONE you want 
to be, which is why a lot of people do things that they 
would not normally do. In real life, people everywhere 
judge you based on your looks, actions, and who knows 
what else, but online, all that really matters is your attitude 
and personality."
	 "Uh well, I tried cyber sex before and I wouldn't ever do 
that in real life. Sex period. I don't believe in premarital 
sex. I think that is a great gift you give your husband. I 
once told someone off because he/she was being perverted 
and talking nasty to me and I didn't like it."
         "Well, once I told this guy I met in a chat room all about 
me and, like, my phone number and stuff. I now realize that 
this was really stupid of me and will never do anything like 
it again cause although it's not likely, he could be a psycho 
or something."
	 "I feel I can speak more freely to someone online about my 
problems because most of them don't go to my school or 
even the same state. I can ask them advice and they would 
probably give me the best because they aren't in favor of a 
certain person. I can introduce myself and meet new people 
because it isn't as uncomfortable to look into their eyes and 
if you become really uncomfortable I can just get out of it 
by blocking them or getting offline."
	 "I have had cyber sex... that's something I never have done 
and never will do until I'm married in real life."
	 "I am much more bold online than in real life. I am VERY 
shy and I say things on the Internet that I normally 
wouldn't say in public."
	 "I have lied for no reason. Actually, I told a guy I couldn't 
give him my number cause my mom doesn't want guys 
calling me cause it was during the school year. My mom 
doesn't really care who calls me I just didn't know what to 
say."
	 "Yeah, I wouldn't flirt with people I just met in person, 
unlike on the Internet."
	 "Flirt more easily, say things I wouldn't say in person, not 
bad things, just more honest things."
	 "Yeah, because it's a lot easier to talk and get to 'know' 
someone online because you can't see their face. I never 
have done anything bad but I've been a lot more easy going 
and free for what I'd say online then in a live situation 
which in someways have helped me to be more 
comfortable talking to new guys in person."
	 "Well, honestly... yes. I had cyber sex! I will never have 
real sex until I am married, after I engaged in cybering, I 
totally felt grossed out, like I know I was doing something 
wrong! I will not make that mistake again."

        When we asked them if they ever pretend to be someone else in 
cyberspace, here's what they answered (in their own words):
	 "Of course I've pretended. Everyone does. You pretend to 
be older... or you pretend to be a guy... or you just pretend 
to be whoever you wanna be."
	 "Yes, I just changed myself to be someone I wasn't 
because I wanted to get a different reaction from people. It 
gave me a way to see myself as who I wanted to be but by 
doing it I realized that that is not who I want to be and that 
I just want to be me."
	 "Yes. If I am ever in a chatroom I always make up things 
about myself. This is why I say don't trust anyone because 
everybody else does the same thing."
	 "Since nobody seems to be eager to talk to a 15 year old, I 
always pretended I was 18 year old female. However, that 
sometimes attracted bad attention from guys."
	 "Yes. I pretended to be anyone from Leonardo DiCaprio to 
a serial killer."
	 "I once pretended to be a 16 year old girl. I wanted to talk 
to my boyfriend to see if he would agree to meet her in 
person. He did and I told him who I really was and we 
broke up."
	 "Yes, I've pretended to be so many people. It's fun and 
safe and because nobody knows who you really are."
	 "Well we've ALL pretended to be older or have a different 
name or something. Who doesn't? It's part of the fun about 
being online... you can be whoever you want to be for a 
little while."
	 "Yes, I pretended to be someone that I wish I could be like 
a popular person."
	 "I haven't pretended to be someone else, but I have 
pretended to be a couple of years older than I am, because 
not many people my age are online to talk to, and if they 
are, they must be lying about their age, too."
	 "No, I think it is wrong to lie to other people about who 
you are. I wouldn't want someone to do it to me so I don't 
do it to them." 

        When we asked them if they had ever been in a situation online 
that frightened them, here's what they said:
	 "My friend agreed to meet a guy she met online when he 
came to our hometown, and she wanted some of us to come 
along to keep them company. I told my parents but luckily 
the guy's game got canceled. I wouldn't have gone and I 
would not support her decision to meet anyone in real life. 
She kinda felt betrayed but at least she's still alive."
	 "Once I was scared because this guy kept telling me all this 
stuff about me, like my name, address, friends' names, etc. 
he said he knew where I lived and stuff, and I better watch 
out. It ended up being a joke from a friend of a friend, but I 
was still scared, and I was very angry at the friend who 
gave the person the info just to scare me. It wasn't funny."
	 "Once I was on ICQ talking to a bunch of my friends when 
this guy I had been chatting with sent me a file. 
Unknowingly, I opened it and then I realized that the 
person had hacked into my system. Suddenly, my CD-
ROM drive started opening and closing and annoying (but 
not threatening) messages started appearing on my screen. 
Soon after my mouse buttons switched functions. I had just 
finished a big assignment, so I was afraid the hacker would 
do something to wreck it. I shut down my computer and 
that was about all I did about it. One of my friends had a 
similar experience, only hers was scary and threatening. 
When she got hacked, pictures of a dead girl with her face 
smashed in appeared on her screen, along with threatening 
messages and sound clips."
	 "I know this is normal in fact it doesn't bother me I just 
laugh. Most kids are always exposed to this stuff not just on 
the Internet so its no big deal in fact sometimes it makes it 
interesting. But one time this dude got really mad at me and 
he knew my parents were out of the state and he could have 
called one of my friends and found my address but instead 
he kept calling every 5 minutes...."
	 "There was one time, when I got online to check my e-
mail. I ended up going into my regular chatroom, and when 
I arrived, some guy started giving out my personal 
information. I don't know how he knew anything personal 
about me, but he was telling everyone in there about the 
frightening and terrible things that were done to me as a 
child. My best friend doesn't even know what happened to 
me when I was little. All I did was, denied all of what he 
said and logged off. I cried all week long."
	 "This guy IM'd [instant messaged] me and my best friend 
and he knew all this information about us... and we hadn't 
even talked to him before. He knew who we were, where 
we lived and everything and he kept playing with our 
minds trying to tell us that we started IMing him first and 
so on. I told my parents about it but they didn't really care. 
So this went on for an hour and a half. I had friends try to 
get him to stop. He told us where he worked and he kept 
insisting that we go places with him like out to lunch or 
dinner and he would buy us x-mas and b-day presents even 
though we had never met him. He would leave them on his 
car at work for us to come and get, we would go get them 
and just smash them all over the ground... thinking he 
would get the point. He was convinced that him and my 
best friend were dating then I came along and I'm the one 
who stopped it all. No one could get this guy to stop. We 
changed our screen names plenty of times but he had 
already hacked into our account so he could always find us. 
Well he hacked into mine. Well in December we got a new 
computer and we both changed our screen names and he 
hasn't been able to find us since."
	 "[A]bout a year ago I met a guy online and I told him my 
phone # and found out he lived about 5 minutes away from 
me we talked 4 about a week then he asked me out and I 
agreed. We met up at the mall he was totally normal 15 
year old guy. He wasn't some psycho or anything but I got 
in a lot of trouble from my parents and I will never give out 
any personal information again. It's not safe and its a stupid 
idea. If anyone who reads this is thinking about giving out 
info to someone on the net PLEASE think twice about it 
you could get yourself into a lot of trouble."
	 "I received a threatening E-mail from someone on my E-
mail address. I immediately changed my password, and 
made sure that I didn't have information on my profile. I 
never E-mailed the person back, since that is what lets them 
know your account is active and they can find out more 
about you. Then, I decided to make sure about it, and 
stopped checking my E-mail account. I just got a new one."
	 "I was in a chat room once and this person was threatening 
to kill themselves, and I find that scary. So I IM'd them not 
to do it, and I chatted with them for a while, and made them 
feel better about themselves, and promise not to do 
anything drastic. And they did promise."
	 "I told these people to leave this foreign guy alone because 
they were making fun of him. They were calling him names 
and mocking everything he said. The people I got smart 
with told me I better watch my back because they could 
find out where I lived. That's why I left."

        It would be interesting to ask your children to reply to the same 
questions. You might learn something about your children you 
didn't know.



                             Appendix 2:

The Quick Tips on Keeping Our Kids Safe on Social Networks

        The quick tips for teens:
	 Put everything behind password protected walls, where 
only friends can see
	 Protect your password and make sure you really know who 
someone is before you allow them onto your friends list
	 Blur or morph your photos a bit so they won't be abused by 
cyberbullies or predators
	 Don't post anything your parents, principal or a predator 
couldn't see
	 What you post online stays online - forever!!!! So 
thinkb4uClick!
	 Choose a network that lets you control your own security 
settings and who can see what you post.
	 Don't so or say anything online you wouldn't say offline
	 Protect your privacy and your friends' privacy too...get 
their okay before posting something about them or their pic online
	 Check what your friends are posting/saying about you. That 
cute 14-year old boy may not be cute, may not be 14 and 
may not be a boy! You never know!

        And for parents:
	 Talk to your kids
	 Don't panic
	 Be involved
	 This too will pass!

        For help or more information, visit WiredSafety.org.


                          Appendix 3:

Wireless Safety...Keeping Your Kids Safe Using Cellphones and 
Other Mobile Devices 

        You've already heard the tips about keeping your kids safe 
online. But, now...all bets are off. Welcome to the wonderful new 
world of wireless!  Our families can carry powerful computing in 
handheld devices the size of a pack of playing cards (or smaller!). 
They can download and play music, movies, and games. They can 
shoot, store and share photos, video and audio. They are always in 
touch, always connected, always engaged. (And the newest hottest 
teen social network, Yfly.com, is using broadcast text-messaging 
to keep teens connected to their nearest and dearest friends to 
through their mobile devices too and MySpace and Facebook are 
using text-to-profile posting technologies now too.)
        Great! Except the most often repeated safety tip warns parents 
to keep the computer in a central location to keep an eye on what's 
going on. So, how are we supposed to keep our kids safe when 
they are carrying access and communication devices in the palms 
of their little hands? Are we supposed to tell them to keep their cell 
phone or other handheld device in a central location? Of course 
not. At this point, it's less about standing over their shoulders and 
more about improving the "filter between their ears." 
        You can do this by being proactive and informed (not rocket 
scientists, just informed...). Luckily, it all comes down to 3 key 
issues. I call these the "3C's" - Communication, Content, and 
Commercialism. Every digital device or interactive service 
involves at least one of them, some involve all 3. Once you find 
the Cs involved, spotting the risks and solutions is easy.
Start by reviewing all your interactive technology devices and 
services. If you are shopping for a new device or service, ask the 
salesperson these questions before plunking down your hard-
earned money. 
	 Communication: Does this device or service allow you to 
communicate with others?  Does it allow others to 
communicate with you? If so, how? What controls exist to 
block, filter or monitor these communications? How can I 
implement them? (Text-messaging and voice capabilities 
fall into the first "C". So do e-mail, interactive features on 
profiles, and on blogs.)
	 Content: What content or images can be accessed or shared 
using the device or service? Can you surf the Web, access 
blog or profile sites, post your blog or profile sites or 
download media? Can you store images, personal 
information, video, songs, etc? What controls exist to rate, 
block, filter or monitor the content? How can I implement 
them? (Music and video downloads, pictures taken by the 
mobile device, adult content, content on profiles and on 
blogs fall into this second "C".)
	 Commercialism: Can this device/service cost me money? If 
so, how? Are their ways to spend money or buy things 
using the device / service? Are their ways to control costs 
or prevent my kids from spending money or buying things 
without my approval? What controls exist to block, filter or 
monitor these costs or spending ability? How can I 
implement them? (Ringtones, music downloads, text-
messaging and games fall into this third C.)

        Next, you need to refer to the common sense tips our 
grandmothers taught our parents and they taught us --we just need 
to translate them from "Grandma-speak" to "cyberspeak." 

Don't talk to strangers. 
        It's easy for our children to spot an adult in a schoolyard, but 
not as easy to do the same in cyberspace, or on text-messaging. 
Our kids need to learn that unless they know the people in real life 
("RL"), the person has to be treated like a stranger no matter how 
long they have chatted online. Period. 

Come straight home after school. 
        When kids wander around, unsupervised, after school they 
inevitably get into trouble. Allowing your children to spend 
unlimited time surfing or texting aimlessly is no different. Set a 
time limit. Create a "no texting" zone, where they spend time with 
their real life friends and engaging in family activities (and 
homework). 
 
Don't steal.
        Illegal music, movie and game downloads. Enough said!

Don't start fights. 
	Cyberbullying is when one minor uses interactive technology 
to harass, frighten or humiliate another minor. They may even 
spread into RL. Our children should be taught to Stop (don't do 
anything to make matters worse), Block (the offender) and Tell 
(you or another trusted adult). (You can learn more about this at 
stopcyberbullying.org.)

Don't take candy from strangers. 
	While we don't take candy from people online, we do often 
accept attachments. A seemingly innocent attachment can contain 
a virus, spyware or a hacking tool. Many of the good anti-virus 
programs have mobile versions. They are worth the investment.  

Don't share personal information with others. 
        Our children often post their cell number on their instant 
messaging "away page." Mobile device cameras can be used to 
take a picture and post it online. Make sure your children 
understand what can and cannot be shared. Remember...The more 
information you give your children, the less information they'll 
give a stranger.

Look before they leap.
	Check things out before your child starts using a new 
interactive device or technology or activity. Let them know what 
features you don't want them using and which ones are safe. And 
remind them that you will be watching. This is a matter of parental 
choice and control. The wireless industry is providing some 
significant help here too. They have voluntarily adopted a set of 
principles relating to mobile content provided by the carriers 
themselves, rating them as "restricted" (for those over the age of 
18). Restricted content is only available with authentication, 
allowing parents stay in control. Disney has a new cell phone 
service and phones launching in June, 2006 too. (Visit 
disneymobile.com and ctia.org for more information.)

Do unto others as you would have them do unto you.
	It is too easy for our children to act out online knowing that 
they may never have to face the other person in real life. Not 
having to look them in the eyes makes it easier to be rude, lewd or 
hostile. This is a good time to remind your children to treat others 
online and off with R-E-S-P-E-C-T.
        Now...go have some fun and play a little! And if you are still 
tech-challenged, ask your kids for help.
        And for more cybersafety tips and help or to book a program 
for your community, visit WiredSafety.org, the world's largest 
Internet and wireless safety and help group or contact Parry Aftab 
directly at [email protected].


                             Appendix 4:

Parry's Social Networking Advice for Parents: 
        It's worth the effort to find out if your child is one of the social 
networks. Start by asking them. Hopefully they will be honest with 
you. If they aren't or you suspect they may be lying, it doesn't hurt 
to check out the more popular ones yourself. Search for your child 
by e-mail address, name and school. While they often lie about 
their e-mail address (either creating a special free web-based one 
just for this, that you may not recognize, or by making one up) or 
their name, they NEVER lie about their school. That's the only 
way their friends can find them. If you discover that your child has 
one of these profiles (or several, which is very common) and is 
lying to you, you need to take action. This isn't about technology, 
it's about dishonesty and hiding something important from you. 
And it might be a good time to buy and install a monitoring 
product, to be able to find their other lies and their next social-
networking website they are trying to keep you from seeing.
        If they admit that they have a page and show it to you, review 
it carefully, without over-reacting. Keep an open mind. (And take 
5! To keep from panicking!) Have they posed as someone older? 
Posted person images? Included their friends on their site or been 
included by their friends on their sites? Forget the language. It's 
what kids do online. Caution them, but don't judge them by the 
language they use online. If they are posting using chatlingo 
shorthand, you can visit Teenangels.org and use our chatlingo 
translator to see what they are saying.
        Then you have two choices. You can have the site taken down, 
or you can supervise what they are posting and doing. It's 
important hat you help keep your child safe online, even if you 
may be shocked by what you find your child is saying behind your 
back. And be aware that these are important to them. They all do it, 
even if they shouldn't. So, it's possible that your young teen will 
rebel and just set up a page again, but hide it better this time. It 
may be better to work with them than prohibit the profiles 
altogether.
        Next, don't panic. You should take advantage of this 
opportunity to review their page first. You might be surprised 
(hopefully pleasantly) by what they are saying. 
        If they haven't posted anything to put them at risk, and aren't 
communicating with strangers, ask them why they want a social-
networking profile page. You might be surprised at what they tell 
you. While parents freak out (understandably) at the provocative 
images and wild language used by many on these sites, most of the 
teens don't see them or pay attention to them. They are there to 
show off their creativity and self-expression and to communicate 
with their offline friends. As long as they are old enough to 
understand the rules and adhere to them (no one under 13 is old 
enough for this, even with parental approval in my humble 
opinion), and as long as you keep an eye on what they are doing, 
posting and how they are communicating with others, it's YOUR 
choice as to whether they keep their site up or not. (Make sure that 
you don't become the self-appointed profile site, reporting other 
people's kids for posting underage until you speak with their 
parents first!)
        If you find that they are saying and posting inappropriate things 
or those comments don't seem to conform to their otherwise good 
offline behavior, don't panic yet. Think about how our parents 
would have reacted if they could have seen or heard everything we 
said to our friends when no adult was around. I guarantee that they 
would have been almost as shocked as many parents are about 
what their kids are posting online. 
Also, remember that many of the things your kids are saying 
are being said to impress their audience and are often not true. 
(Luckily!)
        The important difference between what we used to say or do 
and their posting online, however, is that when we acted out or 
boasted about acting out, we didn't do it to an audience of millions 
of people. So, while you shouldn't panic, you should take quick 
action if your kids are posting personal information in a public 
forum, or communicating with strangers online.
        Now repeat after me..."I am the parent!" 


Appendix 5: How schools are handling these issues

A letter for parents from a school, using Parry's tips:


Lakewood High School
14100 Franklin Boulevard   Lakewood, OH 44107
Voice:  (216) 529-4028   Fax:  (216) 529-4459
Web:  http://www.lnoca.org/lakewood/lhs/					

        Dear Parents/Guardians:
        Many of you are aware of the popular websites used by 
teenagers for blogging and socializing, such as MySpace.com.  
Recently, our staff has become aware of inappropriate content that 
many of our students are posting on these public websites.  This 
letter is being sent to inform you of these websites and to 
encourage you to talk to your child about internet safety and 
appropriate postings.  The following information is provided by 
Parry Aftab, cyberspace lawyer and executive director of 
WiredSafety.org, the world's largest Internet safety and help group 
and taken from her safety tips published at MySpace.com with her 
permission.
        MySpace.com and other similar sites are designed to allow 
people to share their creativity, pictures, and information with 
others. Sometimes people do this to find romance. Sometimes they 
do it to find friends with similar interest. While this may be okay 
for adults, it is not okay for kids.
        MySpace.com recognizes this, and prohibits anyone under 14 
years of age from using their website. Unfortunately, while they 
may set rules to keep younger kids off the site, they can't prevent 
kids from lying about their age, pretending to be 14 years of age or 
older. To address this, MySpace.com has developed special 
software to review the profiles of their members, to try and find 
anyone under age, based on information the members post about 
themselves. It's not perfect, but it does help spot many underage 
members.
        While MySpace.com is doing its best to keep your children 
from using their website and lying about their age, it's up to 
parents to do their job too. Parents need to talk with their children 
about not sharing personal information online. Personal 
information includes pictures, names and addresses, schools they 
attend, cell and phone numbers and many other less obvious 
things, such as the name of their school team, ethnic background 
and even a mall near your house. (You can learn more about how 
to talk to your kids and what you should be asking at 
WiredKids.org or WiredSafety.org. I am an Internet privacy and 
security lawyer and founded the all-volunteer Wired Safety Group. 
We can help you if things go wrong online, or you just have 
questions. We provide information, education and one-to-one help 
for victims of cyberabuse.) 
        We at WiredSafety.org are developing a special program just 
for parents concerned about their kids using social-networking and 
online dating sites. It will teach you what you need to know about 
finding out if your child has a profile on one of these sites, how to 
review them and remove them, if you want to. It will also help you 
if your child is being cyberbullied using one of these sites or 
members from these sites, or is cyberbullying others. 
        So what do you, as a parent, do? First you need to find out if 
your child has a page on one of these sites. The best way to find 
out if your child has a profile on this or another similar site is to 
ask them. If you're not sure that your child is being honest with 
you, you can search MySpace.com (or the other sites) using their 
e-mail address, or by searching for their school. (You click on 
"search" and enter their email address or full name in the 
appropriate search box.) 
        If you find that your child has a profile on the Web site, you 
should review it. It's amazing how much you can learn about your 
child by reading their profiles. Does it contain personal 
information, such as their full name, address or phone numbers? 
Has your child posted photos? Are they photos of themselves or 
someone else? Are they sharing poems they write or provocative 
comments about themselves or others? 
        If you want the profile removed (you must remove your child's 
profile if they are under age), first ask your child to remove it 
themselves. If that doesn't work, MySpace.com has a section 
explaining how to remove a page. If you find someone who is 
underage, you can report it there as well. It's not as easy a 
procedure as the other Web sites.
        While MySpace.com is working hard to keep kids off their Web 
site, ultimately, protecting your child is your job. But you have lots 
of help. At WiredKids.org and WiredSafety.org thousands of 
volunteers donate their time to helping parents and children surf 
responsibly and safely. And we will be building a few tutorials help 
parents and their children understand how to be careful when 
communicating publicly online.
        A good thing to do is to ask your kids why they created the 
profile. You might learn that they wanted to share their thoughts 
with others, make new friends or even allow others in their school 
to get to know them better. But not all of their motives are as noble 
or safe. Some may be interested in meeting new romantic interests 
or role-playing inappropriately online. And when a young preteen 
lies about their age posing as a seventeen year old at the site, that 
can be a serious problem. Others in their late teens might 
approach your child thinking they were older. That's bad for 
everyone.
        If you discover that your child is posting provocative comments 
or inappropriate images online, it's time for the tough talk. The 
one about stranger dangers and how that cute fourteen year old 
boy they meet online may not be cute, may not be fourteen and may 
not be a boy. (Parents of young boys need to understand that their 
children are equally at risk. About one-third of the cases of 
Internet sexual exploitation are men exploiting boys.) Our children 
need to realize that there are real risks relating to meeting 
strangers offline, including murder. 
        It's not easy raising children anymore. It is even harder when 
the parent is expected to be expert in Internet, cell phone and 
interactive game risks. The good thing is that you're not facing 
these challenges alone. We're here to help.
        Just remember that while your kids may know more than you 
do about technology, you know more about life. And you are 
allowed to set the rules and enforce them. You're still the parent! 
There is software you can install that will record what your kids 
say and post online. There is even one that will e-mail you reports 
at work. The ones I like best are made by Spectorsoft, and can be 
found at software4parents.com or spectorsoft.com. But don't use 
them just to spy on your kids. Treat them like a security video 
camera in the corner of a bank. No one views the tapes unless and 
until there is a break-in. Do the same here. Check the program 
reports if something goes wrong. It will collect whatever you need 
for evidence and to help your child if something goes wrong.
        Also, check your parental control programs. Many, such as 
AOL's and MSN's, can block access to social-networking Web 
sites or other sites you think are inappropriate for your younger 
child. There are many other products you can purchase to block 
sites as well. (Check out software4parents.com to learn about and 
purchase some of these.) Just remember that the best filter is the 
one between your children's ears. 
        Please feel free to contact your child's counselor or house 
principal if you have any concerns. And visit Parry's cybersafety 
blog and podcast, http://parryaftab.blogspot.com, and 
WiredSafety.org for more tips on cybersafety and social 
networking issues.



A principal's letter to the parents of his students: 
        I know that history repeats itself and some things never change 
and there is nothing new under the sun, etc, etc, etc. Having spent 
so many years in school buildings, I really understand how much 
truth there is to these clich�s. From the first day I started working 
in schools more than 38 years ago, I have been involved in helping 
young people deal with the consequences of making poor decisions 
involving things like drugs, alcohol, vandalism, theft, bullying, etc. 
It will always be this way and that is part of the job of teachers and 
administrators in public schools.
        It can come as no surprise to anyone reading this that drinking 
is rampant among many of our students almost every weekend. 
Drinking to excess (bingeing) is now more common than ever 
before. Is it watching MTV Spring Break year after year that has 
caused this new form of excess to be so common? I don't know. I 
do know that our kids do it, and do it often.
        I'm sure everyone knows at some level that to smoke, or snort, 
or ingest, or inject drugs costs lots of money. How do our kids who 
choose to engage in this kind of behavior get the money to sustain 
it? It is either provided to them by way of an allowance or bank 
card, OR it becomes available in other ways...theft, sale of 
personal items, providing services of some kind, etc. We all know 
enough about drugs either through reading, watching movies, or 
hearsay, to know that no one provides a sustained supply of drugs 
to someone else out of the goodness of their hearts. They want 
something in return. How do our kids get access?
        Bullying used to be relegated to the big, tall, tough guy/gal in 
school. After all, it took muscle and might to back up those words 
and deeds. Now, through e-mail, instant messages, text messages, 
the phone, personal home pages, etc. just about anyone can bully 
someone else and remain anonymous. The 98 pound weakling no 
longer has to bulk up to be a bully. She/he can do it from the 
privacy of the bedroom and remain at that weight.
        Here is what has really changed. Personal home pages are now 
almost the norm among our young people with access to computers 
and broadband Internet service. You would be shocked and 
surprised to visit some of the home pages of our middle school and 
high school students. Some of the information they share about 
themselves is embarrassingly personal, graphic, and explicit, AND 
it comes with names, addresses, and phone numbers. In truth, most 
of these kids think they are setting up a page that they and only 
their close friends have access to. In truth, just about anyone with a 
real facility with computers can find these sites and pick someone 
who interests them to prey upon.
        I am sharing this disturbing information with you because we 
all worry about your/our children. Most, if not all of this activity, 
takes place at home or at someone else's home. If it took place in 
school, we would have a record and would track it. There are 
consequences for this kind of behavior at school using school 
machines and our Internet service. When it happens from 
elsewhere, we have no control over it. I don't even know how you 
can control it. I simply want the piece of mind knowing that I have 
shared this with you. It is epidemic among our young people and 
opens the door for unimaginable problems for them and for YOU, 
their parents.
        I rarely write or speak about problems for which I have few or 
no solutions. I can't even suggest a solution other than to be 
vigilant and to know it is going on, if not at your home with your 
child then with your child's best friend or your neighbor's child. 
Let's bring this topic into the open and start talking about it 
whenever groups of adults gather for whatever purpose. Our 
children need to know that we know what is going on. It is 
dangerous and they are too young to understand. If you can think 
of something that would be helpful to parents and you plan on 
attending the next evening "coffee" in March, please share it with 
me and I will pass it along to other parents via e-mail or this 
Newsletter.


                           Appendix 6:

Parry's Myspace Guidebook Table of Contents	
(the guide will be released for back to school without charge at 
WiredSafety.org)	

1-	Introduction to Myspace
a. Origins/History
b. Why people use it
c. Basic ideas of how Myspace works
d. Explaining the 'cyber friends' process 
e. Pitfalls of chatting online  
f. Reasons to use social networks

2-   Getting started
a. Creating your homepage
b. Uploading images/Using appropriate images
c. Content- not revealing too much personal information
d. Settings, and controlling 'Friends' lists
e. Finding others with similar interests, in your area or at your 
school
f. Using Myspace to network 
g. Searching for specific people on Myspace
h. Creating and using an avatar
i. Privacy settings
j. Younger profiles settings (between 14 and 16)
k. Reporting abuse
l. Getting help
m. Pics, quizzes and getting codes from third party sites
   
 3- Writing a profile 
a. Creativity-expressing yourself through a blog/profile
b. Blog/profile ideas, like a diary, it can be a journal of your 
thoughts
c. Writing with some caution-not revealing detailed information 
d. Reading and contributing to other members blogs/profiles

4- Hazards of meeting people from the Internet in real life
 a. Using caution when replying to e-mails and communications 
from strangers
 b. Unsolicited contact, using judgment to better safeguard yourself
 c. Meeting people face to face offline
 d. "You never know..." how even smart teens and preteens are 
tricked by posers
 e. You don't have to meet them offline to be sexually exploited - 
webcams, cybering and child pornography	   
		
5- Risks from adults, from other teens and risks you pose to 
yourself
a. Sexual exploitation issues
b. Cyberbullying, stalking and harassment
c. Protecting your reputation online
d. What employers, colleges and police are doing on social 
networks
e. ID theft, scams and posing
f. Protecting your passwords and personal information
g. Protecting your personal information - when your friends post 
your info	

6- What you need to know to keep yourself safer
a. Having fun on Myspace, safely
b. Using good judgment to identify potential dangers
c. Using creativity to express yourself through blogs/profiles
d. Letting an adult know if something happens 
e. Talking to parents/adults about people you meet online
f. Using extra caution when sharing images or chatting
g. Talking to friends about safety - protecting yourself and your 
friends online


                        Appendix 7:

Parry Aftab's Guide to Keeping Your Kids Safe Online

MySpace, Facebook and Xanga, Oh! My!

Keeping yourself and your kids safe on social networks

The quick tips for teens:



         Put everything behind password protected walls, where 
only friends can see
         Protect your password and make sure you really know who 
someone is before you allow them onto your friends list
         Blur or morph your photos a bit so they won't be abused by 
cyberbullies or predators
         Don't post anything your parents, principal or a predator 
couldn't see
         What you post online stays online - forever!!!! So 
thinkb4uClick!
         Don't so or say anything online you wouldn't say offline
         Protect your privacy and your friends' privacy too...get 
their okay before posting something about them or their pic online
         Check what your friends are posting/saying about you. 
Even if you are careful, they may not be and may be 
putting you at risk.
         That cute 14-year old boy may not be cute, may not be 14 
and may not be a boy! You never know!
         And, unless you're prepared to attach your MySpace to 
your college/job/internship/scholarship or sports team 
application.don't post it publicly!

And for parents:

         Talk to your kids - ask questions (and then confirm to 
make sure they are telling you the truth!)
         Ask to see their profile page (for the first 
time).tomorrow! (It gives them a chance to remove 
everything that isn't appropriate or safe.and it becomes a 
way to teach them what not to post instead of being a 
gotcha moment! Think of it as the loud announcement 
before walking downstairs to a teen party you're hosting.)
         Don't panic.there are ways of keeping your kids safe 
online. It's easier than you think!
         Be involved and work with others in your community. 
(Think about joining WiredSafety.org and help create a 
local cyber-neighborhood watch program in your 
community.)
         Remember what you did that your parents would have 
killed you had they known, when you were fifteen.
         This too will pass!  Most kids really do use social networks 
just to communicate with their friends. Take a breath, 
gather your thoughts and get help when you need it. (You 
can reach out to WiredSafety.org.)
         It's not an invasion of their privacy if strangers can see 
it. There is a difference between reading their paper diary that 
is tucked away in their sock drawer.and reading their 
MySpace. One is between them and the paper it's written 
on; the other between them and 700 million people online!
         Don't believe everything you read online - especially if 
your teens posts it on her MySpace!
         And, finally..repeat after me - "I'm still the parent!" If 
they don't listen or follow your rules, unplug the 
computer.the walk to the library will do them good.  

        For more information, visit WiredSafety.org. Copyright Parry 
Aftab 2006, all rights reserved. For permission to duplicate, e-mail 
[email protected]. 


                             Appendix 8:

SNAPSHOT OF U.S. MINORS ONLINE AND HOW PREDATORS 
REACH THEM
(Taken from Parry Aftab's testimony before the House Sub-
Committee on Investigations and Oversight on April 4, 2006)

        It is estimated that approximately 75 million minors in the 
Unites States access the Internet either from home, schools, 
community centers and libraries or from some newer Internet-
capable device. This is up more than ten-fold since 1996, when 
only 6 million U.S. minors were online. Now our children are 
using cell phones with Internet and text-capability, interactive 
gaming devices (such as X-Box Live and Sony Playstation 
Network) with voice over Internet and live chat features, handheld 
devices with Bluetooth and other remote-communication 
technology (such as PSP gaming devices and mobile phones) and 
social networking profiles (such as MySpace, Facebook, Bebo, 
YFly and others) where they can advertise their favorite things, 
where they live and pictures of themselves and their friends to 
anyone who wants to see them.
        Ten years ago, when I first wrote my safety tips telling parents 
to put the computer in a central location, that made sense. It was a 
central point, where parents could get involved and supervise their 
children's interactive communications and surfing activities. Now, 
where they take their communication technologies with them in 
their pockets, backpacks, and purses, it is not longer as relevant as 
it once was. Now, instead of expecting parents to watch everything 
their children are doing online from the comfort of their 
familyrooms, or kitchen counter, we have to do more. Now, we 
have to teach our children to use the "filter between their ears" and 
exercise good judgment and care when using any interactive 
device. While teaching parents how to supervise their children 
online was a challenge (I have written the leading books, 
worldwide, for parents on Internet safety), teaching children to 
"ThinkB4uClick" is much harder.
        When I was growing up (in the days before electricity and 
indoor plumbing, when we had to walk up hill, both ways!, in 
blizzards to get to school), parents used to blame us for not 
behaving.  We were disciplinary problems. Now pediatric neuro-
psychologists tell us that preteens and young teens are hardwired, 
through immature brain development, to be unable to control their 
impulses at this age.  Either way, we recognize that preteens and 
teens take risks, don't appreciate the consequences of their actions 
and act before they think. When their audience was their school 
friends, family and neighbors, the risks were containable. When 
they act out where 700 million Internet users can see, it takes on a 
much deeper significance.

Putting Their Heads into the Lion's Mouth
        Now, I will share something very controversial. While 
educators and child psychologists understand this, most parents 
will be shocked at the suggestion that their preteens and teens are 
in control of their safety online and putting themselves at risk, 
often intentionally. But unless we accept this, and direct our 
attentions at solutions aimed at this reality, we are all wasting our 
time. We will focus on the much smaller segments of preteens and 
teens who are being victimized through not fault of their own - 
those who are targeted at random. All others need to change their 
online behaviors. And that's where we need to devote all our 
attentions.
        For this to happen, you need to understand the truth. For years 
we have told parents and minors not to share too much personal 
information online. "You can be tracked down in real life," we told 
them. But, notwithstanding anything to the contrary reported in the 
media and by some local law enforcement officers, to my 
knowledge, to this date, no preteen or teen has been sexually-
exploited by someone who tracked them down from information 
they posted online. In each and every case, to my knowledge, to 
teens and preteens have gone willingly to meet their molester. 
They may have thought they were meeting someone other than the 
46 year old who is posing as a teen, but they knew they didn't 
know this person in real life. They are willingly agreeing to meet 
strangers offline.
        What does this mean? It means we can do something about 
this. It means we can educate teens and preteens about the realities 
of meeting people in real life they only know in cyberspace. It 
means we can create solutions. It means that this is, at least for the 
time being, 100% preventable. It means that what we do today will 
have an immediate impact on the safety of our youth. It means we 
have to join together and work on things that are effective and 
abandon those that are not.
        But we have to act quickly. When I testified before the U.S. 
House Of Representatives, Committee On Commerce, 
Subcommittee On Telecommunications, Trade, And Consumer 
Protection on October 11, 2000, I cautioned:
Law enforcement is not aware of anyone who is using the 
information children provide online to seek them out offline, by 
hiding behind a bush or grabbing them on their way home from 
school. But it's only a matter of time before this happens, since 
universal access to the Internet means that even violent sexual 
offenders who are online can use it for their own horrible purposes. 
(See Testimony of Parry Aftab, Esq. U.S. House Of 
Representatives, Committee On Commerce, Subcommittee On 
Telecommunications, Trade, And Consumer Protection on October 
11, 2000.)
        Luckily, while our young people are sharing much more 
information online than ever before, to my knowledge, predators 
aren't using it to hunt down our children offline. They are like 
vampires. They need to be invited in. Sadly, our teens and preteens 
are too often doing just that. They are inviting them to offline 
meetings, phone calls and videochats. But, as an expert in 
cyberrisk management, I can tell you that this is good news. 
Because we have a single point of risk - our children, preteens and 
teens. If we stop their risky and unsafe behaviors, and teach them 
when to reach out for help, we can manage this risk. We can keep 
our children safe.
        Our children are mainly at risk because of their own actions.  
Some are intentional. Others are inadvertent. They may willingly 
engage in communications with people they don't know in real life 
"RL," agree to meet them offline or send them sexually-
provocative images or perform sex acts on webcams they share 
with people they encounter online. They cyberbully each other by 
advertising their victims for sexual services, posting real or 
manufactured sexually explicit  images of them online or by 
passing online rumors able their sexual preferences or activities.
        Preteens and Teens at Risk: Most of the high risk preteens and 
teens fall into three categories: those who are naive and looking for 
love and affection (typically the "loners" and "shy" preteens and 
teens), those who already engage in other high risks activities, such 
as drug and alcohol abuse, driving too fast or doing risky things for 
the thrill of it (often the student leaders, athletes, cheerleaders and 
very competitive teens, the risks takers and thrill seekers looking to 
let off steam or impress their peers) and those who don't realize 
that what they do online is real, the ones who are looking to appear 
older, cooler, more fun and more popular (most of the teens and 
especially preteens fall into this category at least once). Sadly, 
most of our preteens and teens fit one of these categories. Sadder 
still is the fact that in recent years we have learned that most 
preteens and teens are potential victims. 
        Naive, loners and socially-shy preteens and teens: Some 
believe that they are communicating with a cute 14 year old boy, 
who they later discover isn't cute, isn't fourteen and isn't a boy. 
Most of the reported cases fall into this category, and until the 
death of Christina Long four years ago this May, experts all 
believed that all victims fell into this category. They are conned, 
and easy to spot online. Predators can seek them out, and find their 
vulnerabilities. They are groomed with care, and often fall in love 
with their molesters. Sadly, when the molestation finally occurs, 
not only are their bodies broken, their hearts and trust are too.
        They need to understand how the predators work online. Too 
often they tell me that they can "tell" how old someone is online. 
They can't. No one can. Many predators spend years cultivating the 
right tone and language to look like a fellow teen online. 
        These preteens and teens are sitting ducks. While they may 
have learned not to fall for the "help me find my puppy" ploy 
offline, they need to learn how that same ploy (appeal for 
assistance) works online. They need to know how to spot the risks 
and the predators, when online everyone can look like a cute 14 
year old boy. They need to learn that romance shouldn't occur only 
in cyberspace, and that parents can get involved to help them meet 
their soul-mate, assuming they really are. So, if they aren't, and 
turn out to be a 46 year old child molester, they can come home 
safely and help put that molester behind bars where they deserve.
        Risk-takers, Thrill-seeking preteens and teens: Some preteens 
and teens (mainly teens) are looking for the thrills and challenge of 
engaging in a relationship (or at least prolonged communication) 
with an adult. They "play games" with the adult, and are 
intentionally extra sexually-provocative. They think they are smart 
enough to do this without getting hurt.  They see this as a game, 
without realizing the consequences of their actions. And crossing 
the sexual line isn't as frightening online as it would be in real life. 
The problem is that the consequences are not as apparent, the 
realities not as immediate. They take risks. And they think they can 
handle them. (They don't often understand the consequences, 
though.) They often willingly engage in sexual communications 
with men they know are adults. That's part of the thrill. They are 
also often willing to engage in sexual activities with the adult, but 
don't realize what that can mean when things go very wrong. We 
rarely hear about these kinds of victims, because they never report 
it when things go wrong. They feel as though they "asked for it," 
or are to blame. When we hear of these cases, it's because they are 
killed or kidnapped. (Christina Long was in this category. She was 
the first confirmed murder victim of an Internet sexual predator in 
the U.S. and died four years ago this May.)
        Friends are the answer here. If we can get friends too help 
watch out for each other, it is less likely that they will meet adults 
in real life, or if they do, got alone. Also, finding cool 
spokespeople, like Nick Lachey, to explain that it isn't cool to be 
stupid and campaigns such as our "Don't Be Stupid" help. So do 
real life stories from victims themselves about how they got caught 
and advice from the trenches. Kateisplace.org has sections 
specifically directed at this type of victim. And Teen People is an 
important partner of ours in spreading the word.
        Not really a drunken slut, just playing one online:  We've all 
been reading about this new trend in the news (often with me as 
the expert). Good, respectful, otherwise well-mannered preteens 
and teens acting out in cyberspace.  In profiles, blogs, on social 
networking sites and their away messages on IM, on their websites 
and interactive gaming bios, they act out. They pose in their bras, 
or worse. They simulate sexual activities (and in some cases post 
images of actual sexual activities). They pretend to be someone or 
something other than what they really are. And this alter-ego may 
be a sexually promiscuous teen "up for anything." 
        They don't think it is cool to tell others they were home 
coloring with their five year old niece last weekend. Instead they 
claim to have snuck out after everyone was asleep to get drunk at a 
wild party. To them it isn't real. They lie. They pose. They do thing 
online they would never dream of doing in RL. They aren't really 
drunken sluts - they are just playing one online. (Shannon, one of 
our award-winning Teenangels, will share insight into why teens 
and preteens are doing this, during her testimony today.)

The Anatomy of a Cyberpredator: 
        There have been many cases recently where pedophiles and 
other adults have lured children into offline meetings and molested 
them. Luckily, there are even more cases when such attempts to 
lure a child have brought about the attention of law-enforcement 
groups. I debated whether I should discuss any of these cases, 
because I did not want to sensationalize them. But if explaining the 
methods used by offenders might make parents more aware, and 
their children safer, it's worth it.
        Cyberpredators, just like their offline counterparts, usually 
aren't the scary, hairy monsters in trench coats we imagine 
standing on a dark street corner. Many are the kind of person you 
would be inviting to your home as a guest, and often have. They 
are pediatricians, teachers, lawyers, clergy, vice cops, welfare 
workers, journalists, Boy Scout leaders, baseball coaches, 
scientists, etc. They are almost always men. (Sometimes women 
are accomplices, but rarely are women the molesters.) They are 
often articulate and well-educated. They come in all shapes, sizes, 
and colors, and they can be very rich or out of work. But they have 
one thing in common: they want your child. 
        Most of us are sickened at the thought of an adult having 
sexual relations with a child, but to be able to protect our children, 
we must get into the mind of the predator. First of all, predators 
often don't see themselves as predators. They see themselves as 
loving partners with the children they molest. To them this isn't 
rape, it's a seduction. And, as with any seduction, it's a slow and 
painstaking process. (Predators have been known to wait more than 
two years, collecting data on a particular child, before striking.) 
That's what makes them hard to detect. They don't appear to your 
child to be dangerous. 
        An FBI agent who shared a panel with me recently said it best: 
"Before the Internet, these people had to get physically close to 
your children. They had to lurk near schoolyards, or playgrounds. 
Kids would see them. Adults would see them. It was a dangerous 
situation to be in for them, because everyone would notice an adult 
male lurking around children. They often had to take jobs and 
volunteer positions that allowed them to work with children in a 
position of trust in order to reach their victims. Now, however, the 
personal risks the pedophiles had to expose themselves to in order 
to be around children are gone. Now they can be 'one of the kids' 
and hang out with your kids online without exposing themselves. 
As long as they don't say or do something in the public room that 
makes them stand out, they can stay there forever, taking notes."
        And, many of them do. They have been known to create large 
databases on children. They track the children's likes and dislikes. 
They track information such as whose parents are divorced, who 
doesn't like their father's new girlfriend or their mother's 
boyfriend, or who likes computer games or a particular rock group. 
Kids often share personal information about their lives in 
chatrooms or on profiles. This is one reason why they shouldn't. 
The more the predator knows about your child, the more easily 
they can "groom" them or appear to be their soulmate.
        Some cyberpredators (known as "travelers" to law 
enforcement) seek out the good kids, the smart ones, the ones who 
are not street-smart and are from sheltered suburban or rural 
families. Many of our children match that profile perfectly. Others, 
however, target (or are targeted by) popular, super achiever, risk 
preferring teens. It took the death of a young teen from 
Connecticut, Christina Long, before we realized that many of the 
incidents involved teens who did not fit the loner profile. What we 
learned was that these kids never report any attacks or exploitation. 
The only time we hear of these cases is when the teen is kidnapped 
or killed. 
        So who is a typical victim of an Internet sexual predator? 
Anyone between 11-1/2 and 15. All are vulnerable.

It Doesn't Take Torture for Them to Spill Their Guts
        Here's a mock chatroom discussion that my law-enforcement 
friends and I agree is pretty realistic. Imagine a predatorial 
pedophile sitting and taking notes on this child, and using this 
information to lure them later. Would your child fall for this? 
Most, unfortunately, would. This one is more typical of a boy 
victim and predator communication than a girl victim 
communication.

Child: I hate my mom! I know it's her fault that my parents are 
getting divorced.
Predator: I know. My parents are getting divorced, too.
Child: We never have any money anymore, either. Every time I 
need something, she says the same thing: "We can't afford it." 
When my parents were together, I could buy things. Now I can't.
Predator: Me too. I hate that!
Child: I waited for six months for the new computer game to come 
out. My mom promised to buy it for me when it came out. She 
promised! Now it's out. Can I buy it? Nope. "We don't have 
enough money!" I hate my mom!
Predator: Oh! I'm so sorry! I got it! I have this really kewl uncle 
who buys me things all the time. He's really rich.
Child: You're sooooo lucky. I wish I had a rich and kewl uncle.
Predator: Hey! I got an idea! I'll ask my uncle if he'll buy you one 
too....I told you he's really kewl. I bet he'd say yes.
Child: Really!? Thanks!!
Predator: BRB [cybertalk for "be right back"]... I'll go and call 
him.
- - -
Predator: Guess what? He said okay. He's gonna buy you the 
game!
Child: Wow, really? Thanks. I can't believe it!!!
Predator: Where do you live?
Child: I live in NJ. What about you?
Predator: I live in New York. So does my uncle. New Jersey isn't 
far.
Child: Great!
Predator: Is there a mall near you? We can meet there.
Child: Okay. I live near the GSP Mall.
Predator: I've heard of that. No prob. What about Saturday?
Child: Kewl.
Predator: We can go to McDonald's too if you want. We'll meet 
you there at noon.
Child: Okay. Where?
Predator: In front of the computer game store. Oh! My uncle's 
name is George. He's really kewl.
Child: Great... thanks, I really appreciate it. You're so lucky to 
have a rich and kewl uncle.

        Saturday arrives, and the child goes to the mall and meets an 
adult outside the computer game store. He identifies himself as 
"Uncle George" and explains that his nephew is already at the 
McDonald's waiting for them. The child is uncomfortable, but the 
uncle walks into the store and buys the $100 game. He comes out 
and hands it to the child, who is immediately neutralized and 
delighted. Stranger-danger warnings are not applicable. This isn't a 
stranger-he's "Uncle George," and if any proof was needed, the 
computer game is it. He gets into Uncle George's car without 
hesitation to meet his friend at McDonald's. The rest is reported on 
the 6 o'clock news.
        It's disgusting. It makes us sick to our stomachs, but it 
happens. Not very often, but often enough that you need to be 
forewarned. (Several thousand cyberpredator cases are opened 
each year by law enforcement agents in the United States.) But no 
matter how often it happens, even once is too often. Knowing how 
they operate and the tricks of the trade will help us teach our child 
how to avoid being victimized. Each case differs, but the predators 
tend to use the same general tactics. Aside from the "bait and 
switch" scam discussed above, they often attempt to seduce a 
child. They want the child to "want" them. 



The Script-How They Operate Online 
        They begin by striking up a conversation with the child, trying 
to create a relationship of trust and friendship. They often 
masquerade as another child or teenager, typically of the opposite 
sex, unless the child has indicated homosexual interests. (The child 
may or may not know the "seducer's" real age by the time they 
meet face-to-face.) Phone calls usually start at this point. 
Sometimes gifts are sent to the child as well, which may include a 
Polaroid camera and film. Once they have broken down barriers of 
caution, they begin introducing sexual topics gradually, often with 
the use of child pornography to give the child the impression that 
other children are regularly involved in sexual activities. 
        Then they begin to approach the child's own sexuality and 
curiosity, by asking questions and giving them "assignments," like 
wearing special underwear, sending sexually suggestive photos of 
themselves to the pedophile, or performing certain sexual acts. 
These assignments eventually broaden to the exchange of sexually 
explicit photographs (using the Polaroid, cell phone camera or 
digital camera) or videos of the child. Finally, the pedophile 
attempts to arrange a face-to-face meeting. (He may also have 
divulged his true age or an age closer to his actual age at this 
point.) 

Why It Works
        All the lectures we have given our children from the time they 
are very young about not talking to strangers aren't applicable 
online, where everyone is a stranger. A large part of the fun online 
is talking to people you've never met. In addition, our children's 
stranger-danger defenses are not triggered when other kids are 
involved. The warnings apply only to adult strangers, not to other 
children. 
        If any of us walked up to a child in a playground and tried to 
strike up a conversation, they would ignore us and probably run 
away. But if an unknown eleven-year-old came up to another 
eleven-year-old in the same playground, they'd be playing in ten 
seconds flat! That's how the pedophiles get in under our kids' 
stranger-danger radar-they pretend to be other kids. And children 
often believe what they read and hear. They "know" things about 
the predator because they believe what he told them. They also 
believe what they read about him in his "staged" profile, which 
supports what he told them. So it's not just true, it's confirmed. 
        There are many stages at which the pedophile can be thwarted 
by an observant parent. In addition, children with healthy 
friendships and a strong, open, and trusting relationship with their 
parents are less likely to fall victim to pedophiles online. 
Pedophiles typically prey on a child's loneliness. They feed the 
child's complaints about her home life-creating an "us-versus-
them" atmosphere. "Your mom is so mean to you! I don't know 
why she won't let you _____." (Fill in the blank with whatever we 
try and limit: makeup, malls, concerts, etc.) 
        This atmosphere does two things: It creates a distance between 
the child and her parents, at the same time bringing the child into a 
special secret alliance with the pedophile. (You should know that 
boys are almost as often the victims of Internet sexual exploitation 
as girls are, but they report it less frequently.) 
        I have followed many cases over the last few years. In my role 
as WiredSafety executive director, I've also been responsible for 
reporting several of these to law enforcement and for helping many 
families through the pain of prosecution. Sometimes we just help 
the families survive what the molestation has done to them. (The 
child isn't the only victim-entire families are torn apart in the 
aftermath of a molestation.) Parents feel guilty for not having 
protected their child, siblings don't know how to treat their fellow 
sibling-the pain can continue for a lifetime, and even more. And, 
in addition to being hurt physically, the young victim's heart is 
broken by the betrayal of trust. 



Anatomy of a Real and Early Case
        One case I reviewed many years ago involved a New Jersey 
teenager and an Ohio adult predator. It was one of the earliest 
reported cases of cyber-predatorial conduct, discovered in 1996. 
Luckily, the liaison was discovered before the girl met the man 
face-to-face. But it had gone on for a year and a half before being 
discovered by the girl's mother. As you read the details, think 
about what could have been done to discover the situation earlier 
and how you can use these precautions to protect your children.
        Paul Brown, Jr., an Ohio resident, was forty-six years old. He 
was also unemployed, weighed over four hundred pounds, and 
lived in a basement. He had accounts with several ISPs. Mary (a 
hypothetical name for the young girl involved) was twelve when 
her mother, a schoolteacher, bought her a computer, reportedly 
because Mary was having problems making friends. When she got 
online, Mary posted a message on an online service, in the spring 
of 1995, looking for a pen pal. In her message she described 
herself as a teenage girl. Paul Brown, Jr., responded to the 
message, using his real name (something they often do, 
surprisingly) but identifying himself as a fifteen-year-old boy.
        Brown and Mary maintained an e-mail and telephone 
relationship for several months. As the relationship became more 
involved, they began writing letters, and Mary sent Brown a 
photograph. He told her that he was living at home with his mother 
and was hoping to find a girlfriend. In early August, Brown asked 
Mary for a "favor." "If I sent you a roll of film, could you get one 
of your friends to take pictures of you in different outfits and 
maybe hairstyles? Makeup if you use any, and different poses. 
Some sexy, if possible. Please. Baby for me. Thanx. You're the 
best. Love Ya."
        Mary complied. For the next eight months, they continued to 
converse and correspond, and Mary sent additional photos. Brown 
encouraged her with juvenile antics, such as using stickers in his 
letters to her saying things like "Getting better all the time!" In 
May 1996, Brown sent Mary a special love note. "Saying I love 
you... seems to be an understatement. At the age of 14 you have 
captured my heart and made it sing... I love everything about 
you.." 
        Shortly thereafter, Brown confessed to being in his twenties. 
He also suggested that Mary videotape herself in sexually 
provocative poses. She did. After Brown had reviewed her 
videotape, he returned it to her with instructions to redo the tape 
and include views of her genitalia and breasts. He later admitted to 
being divorced and in his thirties. He reportedly also sent her small 
gifts from time to time. 
        A few months later, in response to Brown's promise to pass 
copies of the tape to four members of a rock band Mary admired, 
she sent additional videotapes to Brown. (Brown told Mary that he 
knew the band members very well.) Each tape sent to Brown was 
designated for a different member of the band and contained 
sexually explicit conduct. Brown apparently had also sent her his 
size 48 underwear. When her mother discovered the underwear, 
the authorities were notified. Tracing Brown through phone 
records, special agents of the FBI in Cleveland seized the 
videotapes and photos of Mary and of more than ten other teenage 
girls from across the country.
        Mary was fourteen when this was all discovered. Brown pled 
guilty to enticing a minor to produce sexually explicit photos and 
videos and was sentenced to a little less than five years in prison 
(the maximum penalty for a first offense). In a written statement to 
Brown following all of this, Mary said, "I trusted you. I thought 
you were my friend." 
        There are several things that stand out in this case. One, 
interstate phone calls were made by Mary. Parents should always 
be reviewing long-distance bills for suspicious calls. Two, Mary 
was lonely. These kinds of children are often the most vulnerable; 
a parent should be involved in their online friendships, and monitor 
their online lives. And, three, as hard as it is to know what our kids 
are doing when we're not  around, especially if you are a single 
parent, a year and a half is a long time for a relationship to be 
going on undiscovered. You should spend time learning who your 
children's friends are, online and off. But Monday-morning 
quarterbacking is always easier than playing the game in real time. 
We may look at the situation and say that could never happen to 
one of our kids. However, there but for the grace of God go all of 
us....
        Knowing your child is lonely and has problems making friends 
is the first sign that the child may fall prey to a pedophile or cyber- 
predator. Predators can spot lonely children. They can also spot 
kids who are new online and may not yet know all the rules. Most 
teens, when surveyed, admit to having been propositioned online. 
But what may be obvious to a cyberstreetsmart kid may not be so 
obvious to a child not yet familiar with cyberspace. Pedophiles 
befriend these kids and patiently build trust and a relationship-
looking toward the day when they can meet face-to-face. 
        Encourage your children to make online friends, but learning 
about their online friends is an important way to avoid these secret 
relationships. Education is important in avoiding this danger, too. 
(Had Mary been forewarned about how pedophiles operate online, 
she may have been more attentive to how old Brown sounded on 
the phone, and been more aware of his classic tactics.) So is 
control over incoming and outgoing information when younger 
children are involved, using technology blockers, monitors, and 
filters. These kinds of situations can be avoided if you plan ahead, 
educate and communicate with your children, and keep your eyes 
open.

Getting in Under Your Radar: 
        Even when parents are watching, bad things can happen.
I included the Paul Brown case in my first book, A Parents' 
Guide to the Internet. (He was sentenced in 1997, when I wrote the 
book.) I included it because it was a good example of how 
cyberpredators typically operate, and suggested that if the mother 
had been a bit more attentive, it might have been discovered 
earlier. I was right about how cyberpredators operate. I was wrong 
about how being attentive might have avoided the sexual 
exploitation. It takes more. It takes both an attentive parent and a 
teenager who has been taught how these pedophiles operate online.
        In November 1998, I met a mother who did everything right. 
She was attentive and inquisitive about her daughter's online 
relationships. She asked the right questions. She had a good 
relationship with her daughter, and yet Charles Hatch, a child 
molester from Utah, got in under everyone's radar and sexually 
exploited her thirteen-year-old daughter. 
        Jennifer (not her real name) was eleven and a half when she 
first met "Charlie" online. She thought he was a few years older, 
and was intrigued about befriending a slightly older teenage boy. 
Jennifer was an honors student and had already been taking 
advanced college courses while still in middle school. She lived in 
a loving and warm household with her mother and father. She also 
had siblings and half siblings from her father's previous marriage. 
They were all close. 
        Jennifer's mother, Sharry (also not her real name), talked to 
Jennifer about her online friend, Charlie. She insisted on talking to 
Charlie himself, by phone, once he and Jennifer had started calling 
each other. He passed the phone call test, and Sharry was 
convinced that he really was the teenage boy he professed to be. 
Either he had manipulated his voice to sound younger or he had a 
younger person make the call. Charlie even called and spoke to 
Jennifer's brothers, talking about when he would be their brother-
in-law someday, after he and Jennifer were married. He pleaded 
with Jennifer to come and visit him in Utah. Sharry invited him to 
visit them instead. But Charlie always had a reason he couldn't 
come. 
        As things progressed, Sharry insisted on talking to Charlie's 
mother. He first avoided it by saying she was sick, later that her 
sickness had become cancer, and that eventually she died from the 
cancer. The family fell for this, hook, line, and sinker. Most caring 
families would. Although the "relationship" progressed for almost 
two years, it remained relatively tame. Charlie was romantic rather 
than predatorial, and he sent her expensive gifts, including a 
Polaroid camera. (Remember the Polaroid camera Paul Brown 
sent?)
        Jennifer was inexperienced with boys and dating, and Charlie 
seemed to know not to push her too fast. But about a year and a 
half after they met online, Charlie sent her sexually explicit photos 
of himself from the neck down. She became very uncomfortable 
and pulled back. But several tragedies occurred around the same 
time, which made Jennifer easier prey. Her father was hospitalized 
with a serious illness, and her sixteen-year-old half brother died of 
a brain hemorrhage. 
        Charlie, like all good predators, knew when to strike. He told 
Jennifer that she owed him sexually explicit photos of herself, 
since he had sent those of himself. When she refused, he told her 
that she would be left alone, since her family was dying or would 
die-and he threatened to leave her.  Reluctantly, after fighting 
against it as hard as she could, she acquiesced and sent him 
sexually explicit photos of herself. 
        When Sharry was cleaning Jennifer's room, she discovered a 
letter in which Charlie had set forth the sexual poses he wanted 
Jennifer to photograph. Sharry sent him a letter, confronting him. 
She said that he didn't sound like a teenager in the letter. She told 
him that if he ever contacted her daughter again, she would inform 
the police. He never replied, and Jennifer was not permitted to use 
the Internet for months.
        One day, just when Jennifer and Sharry thought that the whole 
episode was past them, the phone rang. It was a detective from 
Utah, who informed Sharry that Jennifer's photos had been 
discovered in Hatch's day planner by a coworker. He wasn't 
sixteen-he was thirty-six. He was a former teacher who had been 
dismissed by the school after having been accused by a student of 
sexual abuse. (The school hadn't taken any other action.) He was 
currently employed by the welfare office in Utah, and was married 
with children and step-children. 
        Six months later, Charles Hatch was convicted of sexual 
exploitation in a Utah federal court. He began his six-and-a-half 
year sentence in early June 1999. As a condition of his plea, he 
will not be permitted to use the Internet. This mother has become a 
dear friend of mine, after seeking WiredSafety' help in getting 
through this. She was the first parent to speak out publicly about 
her child being targeted by a sexual predator online.
        Unfortunately, the predators are willing to try many different 
ploys until one finally works.

Using Celebrity's Names
        I was having lunch in Los Angeles with one of my girlfriends 
when Nick Lachey walked into the restaurant. She pointed him out 
to me and I immediately grabbed my business card and approached 
his table (to the utter embarrassment of my friend). I introduced 
myself and told him I needed his help. I explained that predators 
were using his name and the name of other celebrities to lure kids 
into meetings and unsafe activities. They find teens who post their 
favorite celebrities on their profiles, websites or other online 
communications. Then they create a profile claiming to be a close 
personal friend of that celebrity. They offer to forward a pic of the 
teen to the celebrity, and seek sexier and sexier pics as time goes 
on, ultimately ending with an offer to introduce the teen to their 
favorite celebrity in real life. Years ago, Justin Timberlake was the 
most popular of these celebrity lures. Nick is now. He listened 
intently and turned white when he realized people where using his 
name to hurt his young fans. He offered his help. 
        When I left his table, he has agreed to do a public service 
announcement to help teens understand that is anyone claims to be 
a close personal friend of a celebrity, they aren't. Or won't be for 
long. I was very excited, but not as excited as I was two weeks 
later when someone from Nick's office called asking me to help 
them create a safer teen-only social networking site called 
YFly.com. I agreed and YFly.com became a reality with the 
financial assistance of Tom Petters (and the Petters Group), and the 
creativity and energy of its founders, Drew Levin and Daniel 
Perkins. I joined the team to set up a safer network and create the 
most advanced educational and awareness content online, just for 
teen users. The young users can click on "Report the Creep" if they 
suspect someone is an adult posing as a teen.
        It's a beginning. Finding safer technologies and services is part 
of the solution. So is awareness using teenspeak.
        Shannon, one of our Teenangels is 14 years old. She was 
selected by Teen People as one of the twenty teens who will make 
a difference. She has gone them one better...she is already making 
a difference. It is with pride that I introduce Shannon Sullivan, one 
of my Teenangels.

[Appendixes omitted]



                      Appendix 9: Parenting Online


Parenting Online

        What do we do when our eight-year-old knows more than we 
do about cyberspace? How do we guide our children safely 
through this new world? How do we set the rules when we don't 
even understand the risks? The childproof locks, seatbelts and 
helmets we use to help keep them safe in everyday life won't 
protect them in cyberspace. There we need new and different 
gadgets and safety tips.
        Welcome to the new world of parenting online! It's your 
newest challenge. But don't worry...it's not as hard as you think and 
it's well worth the effort.
        Parenthood is never easy and the ground rules are always 
changing. We go from playing the role of confidante, to co-
conspirator, to police chief, to teacher, to playmate and back...all in 
the same day. We barely have the chance to catch our breath!
        The things we do to make sure our children stay safe are 
constantly changing too. When they crawl, we learn how to keep 
things off the floor. Then, they pull themselves upright, we have to 
keep them safe from the new dangers at eye level. Training wheels 
have to be removed, and we have to watch while they pedal away 
(generally into the nearest tree). We watch their sugar intake, make 
sure they take their vitamins and keep small items out of their 
mouths.
        That's our job, as parents. So the tried and true warnings, 
passed down from generation to generation, are repeated... "don't 
talk to strangers...," "come straight home from school...," "don't 
provoke fights...," "don't tell anyone personal information about 
yourself..." and "we need to meet your friends..." This is familiar 
territory after all. We know the dangers our kids face in the street 
or at the mall or in the school yard, because we faced them.
        As in any large community, there are dangers our children 
encounter in cyberspace, too. But, since our children know more 
than we do about cyberspace, we worry about how we can teach 
them to avoid those dangers. Don't panic... those dangers can be 
managed using the same old warnings we've always used.
        We just need to translate them into cyberspace terms...
        And there are wonders around every cyber-corner too...
        The Internet is the largest collection of information in the 
world, always available without a charge and delivered to your 
home computer. Every question you might have can be answered 
online. When your child asks you how deep the ocean is or why 
the sky is blue, you can "ask the Internet," together.

        You and your children can communicate with others too, 
worldwide and in every language, with the click of your mouse. 
Their artwork can be displayed, their news reporting published and 
their poems posted on the largest "refrigerator door" in the 
universe, where 700 million people can appreciate them.
        You can research your family tree and build a family Web site. 
And, best of all...the most complicated homework assignment can 
be researched online (even last-minute on the Sunday night before 
it's due).
        You can search online for just about anything and any 
information you want. The easiest way to do that is by using search 
engines. You can type your search into one of the search engines 
and often will find what you are seeking. Just as often, though, you 
will find sites that are trying to get your or your children's 
attention. Pornographers are the most frequent abusers of search 
engines, registering and coding their sites to trick people into 
visiting them, thinking they are Disney, Pokemon or even the 
White House.
        Most of the search engines now have filtering options. By 
selecting one of these options, most inappropriate content is 
filtered out and the search results are typically kid-friendly. Two 
commercial search engines were designed just for kids, though, 
and are wonderful places to begin your child's search online. 
Yahooligans!, Yahoo! kid-sized search engine hand-selects the 
sites, making sure nothing slips through. It is best for younger 
children, ten and under. Ask Jeeves for Kids is Ask Jeeves kid-
sized search engine. Although not as scrubbed clean as 
Yahooligans! hand-selected sites, it contains many more sites 
which make it perfect for slightly older children. I recommend it 
for children ten and older.
        In addition, most full-size search engines have a filtered option 
you can select. But remember that even if you use a search engine 
filter, if the kids search for images, the can find things you wish 
they hadn't. That's when using a filtering product that can block 
images too might come in handy.
        In addition to kid-sized search engines, there are many 
wonderful family-friendly site lists. WiredKids has one of its own, 
where the sites are selected and reviewed by our specially-trained 
volunteers. You can even recommend your favorite sites to be 
added.
        There are some entertaining sites that teach children online 
safety, as well. Although we prefer our WiredKids.org, 
StopCyberbullying.org and InternetSuperHeroes.org the best, (she 
says modestly...) another very special one we want to point out. 
Disney's Surfswellisland.com teaches online safety Disney-style. 
Mickey Mouse, Donald Duck, Minnie Mouse and Goofy all find 
themselves involved in tropical island cyber-challenges relating to 
viruses, privacy, netiquette (cyber-etiquette) and responsible 
surfing. Lesson plans, online safety worksheets and other 
wonderful resources are all available without charge at the site. 
        Looking for homework help? Check out Discovery.com, 
Nationalgeographic.org, PBSkids.org and The National Gallery of 
Art kids page www.nga.gov/kids/kids.htm. And ask your school 
librarian or the librarian at your public library for sites they 
recommend. Librarians and library media specialists are the guides 
to valuable and safe online resources for children. And if you need 
something you can't find, send me an email at "Ask Parry," ( 
[email protected] ) my Internet-syndicated online safety 
column. Drop by WiredKids.org or WiredSafety.org to find out 
how to submit a question.



CyberSense
...translating common sense for cyberspace

 Don't talk to or accept anything from strangers. That's the first 
one we learn while growing up, and the first one we teach our 
children. The problem in cyberspace though is teaching 
"stranger danger." Online, it's hard to spot the strangers. 
        The people they chat with enter your home using your 
computer. Our kids feel safe with us seated nearby. Their 
"stranger" alerts aren't functioning in this setting. Unless they 
know them in real life, the person is a stranger no matter how 
long they have chatted online. Period. You need to remind 
them that these people are strangers, and that all of the 
standard stranger rules apply.
        You also must teach them that anyone can masquerade as 
anyone else online. The "12-year-old" girl they have been 
talking to may prove to be forty-five year old man. It's easy for 
our children to spot an adult in a schoolyard, but not as easy to 
do the same in cyberspace.
 Come straight home after school. Parents over the generations 
have always known that children can get into trouble when 
they wander around after school. Wandering aimlessly online 
isn't any different. Parents need to know their children are safe, 
and doing something productive, like homework. Allowing 
your children to spend unlimited time online, surfing aimlessly, 
is asking for trouble.
        Make sure there's a reason they're online. If they are just 
surfing randomly, set a time limit. You want them to come 
home after they're done, to human interaction and family 
activities (and homework).
 Don't provoke fights. Trying to provoke someone in 
cyberspace is called "flaming." It often violates the "terms of 
service" of your online service provider and will certainly get a 
reaction from other people online. 
        Flaming matches can be heated, long and extended battles, 
moving from a chat room or discussion group to e-mail 
quickly. If your child feels that someone is flaming them, they 
should tell you and the sysop (system operator, pronounced sis-
op) or moderator in charge right away and get offline or surf 
another area. They shouldn't try to defend themselves or get 
involved in retaliation. It's a battle they can never win.
 Don't take candy from strangers. While we don't take candy 
form people online, we do often accept attachments. And just 
like the offline candy that might be laced with drugs or 
poisons, a seemingly innocent attachment can destroy your 
computer files, pose as you and destroy your friends or spy on 
you without you even knowing it. Use a good anti-virus, update 
it often and try one of the new spyware blockers. You can get a 
list of the ones we recommend at WiredSafety.org. Practice 
safe computing!
 Don't tell people personal things about yourself. You never 
really know who you're talking to online. And even if you 
think you know who you are talking to, there could be 
strangers lurking and reading your posts without letting you 
know that they are there. Don't let your children put personal 
information on profiles. It's like writing your personal diary on 
a billboard.
        With children especially, sharing personal information puts 
them at risk. Make sure your children understand what you 
consider personal information, and agree to keep it confidential 
online and everywhere else. Also teach them not to give away 
information at Web sites, in order to register or enter a contest, 
unless they ask your permission first. And, before you give 
your permission, make sure you have read the web site's 
privacy policy, and that they have agreed to treat your personal 
information, and your child's, responsibly.
 We need to get to know your friends. Get to know their online 
friends, just as you would get to know their friends in everyday 
life. Talk to your children about where they go online, and who 
they talk to. 
 R-E-S-P-E-C-T. We all know the golden rule. We have a 
special one for cyberspace. Don't do anything online you 
wouldn't do offline. If you teach your child to respect others 
online and to follow the rules of netiquette they are less likely 
to be cyberbullied, become involved in online harassment or be 
hacked online. You can learn more about the ways to combat 
cyberbullying at our new website, StopCyberbullying.org or at 
WiredSafety.org's cyberstalking and harassment section. 
Remember that it is just as likely that your child is a cyberbully 
(sometimes by accident) as a victim of one. Let them know 
they can trust you not to make matters worse. You have to be 
the one they come to when bad things happen. Be worthy of 
that trust.

        Remember that the new handheld and interactive gaming 
devices you buy have real risks to. Your children can send and 
receive text-messages from anyone on their cell phones or text-
messaging devices and interactive games allow them to chat, on 
Internet phone, to anyone who wants to talk with them. The new 
Bluetooth devices let your child receive messages form anyone in a 
300 foot range, and could be a problem if they play the new 
Bluetooth handheld games in a mall. Think about the features you 
are buying when you buy new devices for your children. Check 
into privacy and security settings. Our Teenangels (teenangels.org) 
are working on new guides for parents and other teens on what to 
look for and think about before you buy a new interactive device. 
Look for them at your local retailer or on the WiredSafety.org and 
Teenangels.org websites. 
        Don't just set up the computer in the corner of their bedroom, 
and leave them to surf alone. Take a look at their computer 
monitor every once in awhile, it keeps them honest. Sit at their side 
while they compute when you can. It will help you set rules that 
make sense for your child. It also gives you an unexpected 
benefit...you'll get a personal computing lesson from the most 
affordable computer expert you know!

        And it's worth the effort. When our children surf the Internet, 
they are learning skills that they will need for their future. They 
become explorers in cyberspace, where they explore ideas and 
discover new information.
        Also, because there is no race, gender or disability online, the 
Internet is the one place where our children can be judged by the 
quality of their ideas, rather than their physical attributes.




        What Tech Tools Are Out There?
        Blocking, filtering and monitoring...when you need a little help
        There are many tools available to help parents control and 
monitor where their children surf online. Some even help regulate 
how much time a child spends playing computer games, or prevent 
their accessing the Internet during certain preset times.
        I've listed the type of protections that are available. But, most 
of the popular brands now offer all of these features, so you don't 
have to choose. Recently, given parents' concerns about strangers 
communicating with their children online, monitoring software has 
gained in popularity. Although it might have its place in protecting 
a troubled child, it feels more like "spyware" than child protection. 
But it's ultimately your choice as a parent. The newest trend is to 
use products supplied by your ISP called parental controls. AOL's 
parental controls were the first of these to be developed and used. 
MSN 8.0 launched the first set of parental controls for MSN. To 
read more about the various products and services we have 
reviewed, visit WiredKids.org and WiredSafety.org.

Blocking Software
        Blocking software is software that uses a "bad site" list. It 
blocks access to sites on that list. They may also have a "good site" 
list, which prevents your child from accessing any site not on that 
list. Some of the software companies allow you to customize the 
lists, by adding or removing sites from the lists. I recommend you 
only consider software that allows you to customize the list, and 
lets you know which sites are on the lists.

Filtering
        Filtering software uses certain keywords to block sites or 
sections of sites on-the-fly. Since there is no way any product can 
keep up with all the sites online, this can help block all the sites 
which haven't yet been reviewed. The software blocks sites 
containing these keywords, alone or in context with other 
keywords.
        Some companies allow you to select certain types of sites to 
block, such as those relating to sex, drugs or hate. This feature 
engages special lists of keywords that match that category. As with 
the "bad site" lists, the lists of keywords used by the filtering 
software should be customizable by the parent, and every parent 
should be able to see which terms are filtered.

Outgoing Filtering
        No... this doesn't mean your software had a sparkling 
personality :-) (that's cyberspace talk for "grin" and means you're 
supposed to smile at my brilliant humor, and if you want to learn 
more about this stuff...you need to read my Ms. Parry's Guide to 
Correct Online Behavior). It means that your child won't be able to 
share certain personal information with others online. Information 
such as your child's name, address or telephone number can be 
programmed into the software, and every time they try to send it to 
someone online, it merely shows up as "XXXs." Even with kids 
who know and follow your rules, this is a terrific feature, since 
sometimes, even the most well-intentioned kids forget the rules.

Monitoring and Tracking
        Some software allows parents to track where their children go 
online, how much time they spend online, how much time they 
spend on the computer (such as when they are playing games) and 
even allows parents to control what times of day their children can 
use the computer. This is particularly helpful when both parents 
are working outside of the home, or with working single-parents, 
who want to make sure their children aren't spending all of their 
time on the computer. Many parents who don't like the thought of 
filtering or blocking, especially with older children and teens, find 
monitoring and tracking satisfy their safety concerns. They can 
know, for sure, whether their children are following their rules.
        We particularly recommend using a monitoring software and 
then forgetting it's installed. Think of it as the security video 
camera in the corner of the bank. No one views the tapes until the 
bank is robbed. If something bad happens, you can play back the 
monitoring log and see exactly what occurred, and who said what, 
and in dire situations, where your child went to meet an adult 
offline. We particularly like Spectorsoft.com, because their 
products can monitor all instant messaging platforms, which is key 
to keeping your children safe online.
        Parents have to remember, though, that these tools are not 
cyber-babysitters. They are just another safety tool, like a seat belt 
or child safety caps. They are not a substitute for good parenting. 
You have to teach your children to be aware and careful in 
cyberspace. Even if you use every technology protection available, 
unless your children know what to expect and how to react when 
they run into something undesirable online, they are at risk. 
Arming them well means teaching them well.



Your Online Safety "Cheatsheet"
Some Basic Rules for You to Remember as a Parent . . .
         Make sure your child doesn't spend all of her time on the 
computer. People, not computers, should be their best 
friends and companions.
         Keep the computer in a family room, kitchen or living 
room, not in your child's bedroom. Remember that this tip 
isn't very helpful when your children have handheld and 
mobile Internet and text-messaging devices. You can't 
make them keep their cell phones in a central location. So 
make sure that the "filter between their ears" is working at 
all times.
         Learn enough about computers so you can enjoy them 
together with your kids.
         Teach them never to meet an online friend offline unless 
you are with them.
         Watch your children when they're online and see where 
they go.
         Make sure that your children feel comfortable coming to 
you with questions and don't over react if things go wrong.
         Keep kids out of chat rooms or IRC unless they are 
monitored.
         Encourage discussions between you and your child about 
what they enjoy online.
         Discuss these rules, get your children to agree to adhere to 
them, and post them near the computer as a reminder.
         Find out what e-mail and instant messaging accounts they 
have and (while agreeing not to spy on them) ask them for 
their passwords for those accounts.
         "Google" your children (and yourself) often and set alerts 
for your child's contact information. The alerts will e-mail 
you when any of the searched terms are spotted online. It's 
an early warning system for cyberbullying posts, and can 
help you spot ways in which your child's personal 
information may be exposed to strangers online. To learn 
how to "Google" them, visit InternetSuperHeroes.org.
         Teach them what information they can share with others 
online and what they can't (like telephone numbers, 
address, their full name, cell numbers and school).
         Check your children's profiles, blogs and any social-
networking posts. Social-networking websites include 
myspace.com, facebook.com and xanga.com. (We work 
closely with MySpace and Facebook to help keep their 
users safer.)  Social networks, generally, shouldn't be used 
by preteens and should be only carefully used by teens. 
Yfly.com is a new teen-only social network that is designed 
from top to bottom to keep teens safer and teach them 
about more responsible behaviors.
         For those of you with preteens and young teens, read the 
Safer Social Networking guide at WiredSafety.org.
         Get to know their "online friends" just as you get to know 
all of their other friends.
         Warn them that people may not be what they seem to be 
and that people they chat with are not their friends, they are 
just people they chat with.
         If they insist on meeting their online friend in real life, 
consider going with them. When they think they have 
found their soul mate, it is unlikely that your telling them 
"no" will make a difference. Offering to go with them 
keeps them safe.
         Look into the new safer cell phones and cell phone features 
that give you greater control over what your children can 
access from their phone and how can contact them.

PARENT ONLINE
MY AGREEMENT ABOUT USING THE INTERNET

        Once you understand enough about cyberspace and how your 
children surf the Internet, you can set your own rules. These are the 
basic rules, even though you may want to add some of your own.
        Some kids like setting the rules out clearly in an agreement. 
Here's one you can use, and post near your computer to help them 
remember how to surf safely. (Note that while the tips may work 
for teens, the contract is designed for preteens and younger.)
        I want to use our computer and the Internet. I know that there 
are certain rules about what I should do online. I agree to follow 
these rules and my parents agree to help me follow these rules:

1. I will not give my name, address, telephone number, school, or 
my parents' names, address, or telephone number, to anyone I 
meet online.
2. I understand that some people online pretend to be someone 
else. Sometimes they pretend to be kids, when they're really 
grown ups. I will tell my parents about people I meet online. I 
will also tell my parents before I answer any e-mails I get from 
or send e-mails to new people I meet online.
3. I will not buy or order anything online without asking my 
parents or give out any credit card information.
4. I will not fill out any form online that asks me for any 
information about myself or my family without asking my 
parents first.
5. I will not get into arguments or fights online. If someone tries 
to start an argument or fight with me, I won't answer him or her 
and will tell my parents.
6. If I see something I do not like or that I know my parents don't 
want me to see, I will click on the "back" button or log off.
7. If I see people doing things or saying things to other kids 
online I know they're not supposed to do or say, I'll tell my 
parents.
8. I won't keep online secrets from my parents.
9. If someone sends me any pictures or any e-mails using bad 
language, I will tell my parents.
10. If someone asks me to do something I am not supposed to do, I 
will tell my parents.
11. I will not call anyone I met online, in person, unless my parents 
say it's okay.
12. I will never meet in person anyone I met online, unless my 
parents say it's okay.
13. I will never send anything to anyone I met online, unless my 
parents say it's okay.
14. If anyone I met online sends me anything, I will tell my 
parents.
15. I will not use something I found online and pretend it's mine.
16. I won't say bad things about people online, and I will practice 
good netiquette.
17. I won't use bad language online.
18. I know that my parents want to make sure I'm safe online, and I 
will listen to them when they ask me not to do something.
19. I will help teach my parents more about computers and the 
Internet.
20. I will practice safe computing, and check for viruses whenever 
I borrow a disk from someone or download something from the 
Internet.
21. I won't post my cell number on my away message, and will 
check with someone before posting something personal about 
me on my blog or on a networking site.
22. I will Stop, Block and Tell! If I am harassed online or 
cyberbullied.
23. I will Take 5! before reacting to something that upsets me or 
makes me angry online.
24. I will practice responsible "thinkB4Uclick" rules. (I know I can 
find out more about these things at InterentSuperHeroes.org 
and StopCyberbullying.org.)
25. I will learn how to be a good cybercitizen and control the 
technology, instead of being controlled by it.


_________________________________________________
I promise to follow these rules. (signed by the child)


________________________________________________
I promise to help my child follow these rules and not to over react 
if my child tells me about bad things in cyberspace (signed by 
parent).


From Parry:

        I am asked questions about kids online safety at least a hundred 
times a day. Is the Internet a dangerous place? Are there predators 
out there looking to set up a meeting with my child? How can we 
find good and reliable content online? How can I supervise my 
child's surfing when I can't even turn on the computer?
        These any other question like these fill my inbox daily. (If you 
have a question of your own, visit WiredKids.org or 
WiredSafety.org and click on "Ask Parry." Here is the one simple 
answer:
        The single greatest risk our children face in connection with the 
Internet is being denied access. We have solutions for every other 
risk.
        That bears repeating, over and over, especially when we hear 
about Internet sexual predators, hate, sex and violence online. But 
our children need the Internet for their education, careers and their 
future. 
        Happily, most of the risks are easily confined. In each and 
every case when children encounter Internet sexual predators 
offline, they go willing to the meeting. They may think the person 
is a cute fourteen year old girl or boy, but they know they are 
meeting someone they don't know in real life. That means we can 
prevent 100% of these crimes. Merely teach our children not to 
meet Internet strangers offline. If they are set on meeting that 
person anyway, go with them. That way, if the person turns out to 
be a cute fourteen year old, you are the hero. And if they aren't, 
you're an even bigger hero.
        Our WiredKids, WiredTeens and Teenangels programs, in 
addition to being fun and educational sites, are also volunteer 
programs where children and teens are taught online safety and 
privacy and responsible surfing. They then use these skills to help 
other children and teens learn to surf safely, as well. Talk to your 
children about what they do online (and offline also), and let them 
know you are there to help if things go wrong. You will note that 
in our safe surfing agreement parents have to promise only one 
thing...not to overreact if their children come to them for help. 
Earn their trust, and be worthy of it. Register your children at 
WiredKids.org, our children's online safety site, and we will make 
sure they learn what they need to know about enjoying the Internet 
safely and privately. It's not about technology at all...it's about 
communication and good parenting.
        Remember, we're all in this together!

Parry
Parry Aftab, Esq.
Executive Director
WiredSafety.org and its family of sites and programs, including 
Teenangels.org, WiredKids.org and CyberLawEnforcement.org

WiredSafety is a 501c-3 non-profit organization formed under the 
laws of the State of New York. (Its legal name is "Wired Kids, 
Inc.") This publication is copyrighted to Parry Aftab, Esq. All 
rights reserved. For permission to duplicate this publication, 
contact [email protected].

        MR. UPTON.  Ms. Collins.
        MS. COLLINS.  Mr. Chairman and distinguished members of the 
committee, I welcome this opportunity to appear before you to 
discuss these issues.  Chairman Upton, you have a demonstrated 
record of commitment to child protection.  I commend you and 
your colleagues for your leadership initiative.  The National Center 
for Missing and Exploited Children joins you in your concern for 
the safety of the most vulnerable members of our society.  Let me 
first provide you with the background information.  
        We are a not-for-profit corporation mandated by Congress and 
working in partnership with the U.S. Department of Justice as the 
National Resource Center and Clearinghouse on Missing and 
Exploited Children.  NCMEC is a true public-private partnership, 
funded in part by Congress and in part by the private sector.  
        One of the programs that we operate that I am responsible for 
is the CyberTipline.  It is the 9-1-1 of the Internet, which serves as 
the Nation's clearinghouse for investigative leads and tips 
regarding crimes against children, both online and off. 
        The leads are reviewed by the analyst in the Exploited Child 
Unit of NCMEC, who visit the website, examine and evaluate the 
content, use search tools to identify the perpetrators, and provide 
all of the information to the appropriate law enforcement agency. 
The results:  In 8 years since the Cyber site began, we received 
over 400,000 leads.  We average about 1,500 a week at this point.  
        Despite our progress, the victimization of children continues 
and there is evidence that it is increasing.  The number of reports 
on online enticement of children to the CyberTipline has increased 
400 percent since 1992.  Our records are showing that there is a 
significant and steady increase in the reports of online entities.  
        Recently there has been great attention to the Social 
networking websites.  While they are used by adults, kids are 
finding them attractive and there have been incidents, as has been 
mentioned earlier, where predators have taken advantage of the 
information that the kids have presented about themselves.  And 
the information they are putting onto these networking sites do 
make them vulnerable. 
        At this point we are receiving approximately 250 reports of 
entities each week, and those are just people who know to report to 
the CyberTipline. 
        Last month, we hosted a dialogue of social networks sites here 
in Washington, D.C.  It was a day-long series of panels, audience 
discussion on the popularity of social networking sites as well as 
the misuse of technology.  The panelists included leaders from the 
technology industries, policymakers, law enforcement, child 
advocacy groups.  The attendees were able to question 
representatives from MySpace, Facebook, and Xanga, the FBI's 
Innocent Images Unit, two Internet Crimes Against Children Task 
Force investigators, age verification and digital imaging analysis 
experts, the Internet Education Foundation, Net Family News, the 
Pew Foundation, and two State attorneys general.  
        It was a vigorous and informative exchange, but what did we 
learn?  We learned that social networking sites tapped into the 
lives of teenagers to exploit themselves.  We learned that the 
operator of social networking sites don't want the customers to be 
endangered by their sites, but state they want to remain 
competitive in the booming market.  We have learned that more 
restrictions could cause teens to go somewhere else that has fewer 
restrictions, but have the unintended consequences of increasing 
their chances of being victimized.  We have learned that the 
current age verification technology is ineffective for children too 
young to appear in a public record database.  We learned the 
increased importance of education messages and engaging teens to 
become a part of their own online safety.  We learned they can 
work together to solve this problem with the help of policymakers, 
law enforcement, and child advocacy groups.  
        The recent concern about social networking sites has given the 
operators of these sites a clear window of opportunity to take this 
problem seriously and take action to make their sites safer for 
children.  NCMEC is encouraged by the steps already taken by 
some of these sites.  MySpace has named a new chief security 
officer, a former Federal prosecutor with experience in child 
exploitation issues.  And other sites have demonstrated a similar 
commitment and are in the process of changing certain features in 
the architecture of their sites to make children safer.  
        These are important first steps, but we strongly encourage the 
social networking companies to continue their progress by working 
closely with the various State attorneys general, law enforcement, 
and others to bring about real change.  There is more that can be 
done and it must be done now.  
        We need to do a better job, as a Nation, of identifying and 
addressing the greater risk to our children today.  We need to help 
protect children through education, open dialogue, and elevated 
awareness.  By working with industry leaders, we can expand our 
outreach, educate parents, guardians, and teens and the general 
public about social network sites and ensure safer ways for them to 
be online. 
        MR. UPTON.  Thank you.  
        [The prepared statement of Michelle Collins follows:] 



PREPARED STATEMENT OF MICHELLE COLLINS, DIRECTOR, 
EXPLOITED CHILD UNIT, NATIONAL CENTER FOR MISSING AND 
EXPLOITED CHILDREN

        Mr. Chairman and distinguished members of the Committee, I 
welcome this opportunity to appear before you to discuss social 
networking websites and the use of the Internet to victimize 
children. Chairman Upton, you have a demonstrated record of 
commitment to child protection and I commend you and your 
colleagues for your leadership and initiative.  The National Center 
for Missing & Exploited Children ("NCMEC") joins you in your 
concern for the safety of the most vulnerable members of our 
society and thanks you for bringing attention to this serious 
problem facing America's communities.
        Let me first provide you with some background information 
about the National Center for Missing & Exploited Children 
(NCMEC).  NCMEC is a not-for-profit corporation, mandated by 
Congress and working in partnership with the U.S. Department of 
Justice as the national resource center and clearinghouse on 
missing and exploited children.  NCMEC is a true public-private 
partnership, funded in part by Congress and in part by the private 
sector. Our federal funding supports specific operational functions 
mandated by Congress, including a national 24-hour toll-free 
hotline; a distribution system for missing-child photos; a system of 
case management and technical assistance to law enforcement and 
families; training programs for federal, state and local law 
enforcement; and our programs designed to help stop the sexual 
exploitation of children. 
        These programs include the CyberTipline, the "9-1-1 for the 
Internet," which serves as the national clearinghouse for 
investigative leads and tips regarding crimes against children on 
the Internet.  The Internet has become a primary tool to victimize 
children today, due to its widespread use and the relative 
anonymity that it offers child predators.  Our CyberTipline is 
operated in partnership with the Federal Bureau of Investigation 
("FBI"), the Department of Homeland Security's Bureau of 
Immigration and Customs Enforcement ("ICE"), the U.S. Postal 
Inspection Service, the U.S. Secret Service, the U.S. Department of 
Justice's Child Exploitation and Obscenity Section and the Internet 
Crimes Against Children Task Forces, as well as state and local 
law enforcement.  Leads are received in seven categories of 
crimes: 
          possession, manufacture and distribution of child 
pornography;
          online enticement of children for sexual acts;
          child prostitution;
          child-sex tourism;
          child sexual molestation (not in the family);
          unsolicited obscene material sent to a child; and
          misleading domain names.
This last category was added as a result of enactment of the 
PROTECT Act in 2003.
        These leads are reviewed by NCMEC analysts, who visit the 
reported sites, examine and evaluate the content, use search tools 
to try to identify perpetrators, and provide all lead information to 
the appropriate law enforcement agency. The FBI, ICE and Postal 
Inspection Service have "real time" access to the leads, and all 
three agencies assign agents and analysts to work directly out of 
NCMEC and review the reports.  The results: in the 8 years since 
the CyberTipline began operation, NCMEC has received and 
processed more than 400,000 leads, resulting in hundreds of arrests 
and successful prosecutions.
        However, despite our progress the victimization of children 
continues and there is evidence that it is increasing. The number of 
reports of online enticement of children to the CyberTipline 
increased 400 percent since 1998. Our records show a significant 
and steady increase in these reports over the years. This upward 
trend is very disturbing and shows the seriousness of this issue. But 
this is not the only evidence.
        It has been established that youth who use the Internet 
regularly receive sexual solicitations over the Internet. However, 
very few of these sexual solicitations are reported to authorities. 
This clearly demonstrates that children are at risk and that we must 
do more. 
        Over the years as technology has evolved so, too, have the 
methods for victimizing children.  The Internet has provided a veil 
of apparent anonymity, enabling predators to seek out children, 
win their confidence and then victimize them.
        As technology evolves, so does the creativity of the predator.  
Today, we are hearing a great deal about new innovations, 
including the use of webcams, social networking websites and 
Internet access on cell phones. 
        These innovations are popular and are utilized by millions of 
Americans.  Yet, as with every other new program or service, there 
are those who would use them inappropriately and for unlawful 
purposes.
        Recently there has been great attention to the social networking 
websites.  While they are used by adults, kids are enormously 
attracted to them, and there have been instances in which offenders 
have taken advantage of the images and information displayed to 
target kids.  The unprecedented amount of personal information 
that teens are posting to social networking websites makes them 
vulnerable to people who want to harm them.
        Some of the social networking sites link defined communities 
of registered users, such as students attending a particular college 
or high school.  Others are open to anyone over a certain age. 
These websites permit registered users to create an online profile, 
including photographs, with categories of interest such as music 
and sports, as well as an online journal. They are highly 
personalized and often extremely detailed. Children consider this 
to be an easy way to connect with friends, find new friends and 
share their thoughts and feelings. The teenage years are a time of 
personal exploration. This is only natural. However, the new form 
of social interaction is over the Internet, exposing children to, 
literally, a world of potential danger. 
        Child predators consider these sites to be an easy way to find 
child victims. They can use the information posted by children to 
forge a 'cyber-relationship' that can lead to that child being 
victimized. The number of reports to our CyberTipline involving 
social networking sites has increased. In recent years, many kids 
were using their email profiles and chat rooms in a similar fashion 
to share their hobbies and interests and make "friends."  However, 
those forums didn't have nearly the same implications as the social 
networking sites, with their enormous universe of users.  
        Last month, NCMEC hosted a Dialogue on Social Networking 
Sites here in Washington, D.C.  It was a day-long series of 
panelist-audience discussions on the popularity and misuse of this 
technology and ways to help keep children safer while using them. 
The panelists included leaders from the technology industry, policy 
makers, law enforcement, academia and children's advocacy 
groups. The attendees questioned representatives from the social 
networking sites Myspace, Facebook, and Xanga, the FBI's 
Innocent Images Unit, two Internet Crimes Against Children Task 
Force investigators, age verification and digital imaging analysis 
experts, the Internet Education Foundation, Net Family News, the 
Pew Foundation and two state attorneys general.
        It was a vigorous and informative exchange. 
        What did we learn? 
        We learned that social networking sites tap directly into the 
needs of teenagers to define themselves, explore their own 
creativity and reach out to their peers. We learned that operators of 
social networking site don't want their customers to be endangered 
by their sites but at the same time want to remain competitive in 
this booming market. We learned that more restrictions will cause 
teens to go somewhere else that has fewer restrictions, with the 
unintended consequence of increasing their chances of being 
victimized. We learned that the current age verification technology 
is ineffective for children too young to appear in public records 
databases. We learned the increased importance of education 
messages, and engaging teens to become a part of their own online 
safety.
        We learned that the industry's brightest minds that created this 
technology in the first place can work together to solve this 
problem, with the help of policy makers, law enforcement and 
children's advocacy groups. 
        The recent concern about social networking sites has given the 
operators of these sites a clear window of opportunity to take this 
problem seriously and take action to make their sites safer for 
children.  NCMEC is encouraged by the steps already taken by 
some of these sites. Myspace has named a new Chief Security 
Officer, a former federal prosecutor with experience in child 
exploitation issues. Other sites have demonstrated a similar 
commitment, and are in the process of changing certain features on 
their sites that help make children less vulnerable.
        These are important first steps, but we strongly urge them to 
continue their progress by working closely with the various state 
Attorneys General, law enforcement and others to bring about real 
change. There is more that can be done and the time to do it is 
now. 
        We need to do a better job as a nation of identifying and 
addressing the greatest risks to our children today. We need to help 
protect children through education, open dialogue and elevated 
awareness.  By working with industry leaders we can expand our 
outreach and educate parents, guardians, teens and the general 
public about this recent technology and ways to ensure safer 
experiences online.
        Thank you.

        MR. UPTON.  Mr. Davis.
        MR. DAVIS.  Thank you, Chairman Upton and Members of the 
Subcommittee, for this opportunity to testify on Deleting the 
Online Predators Act of 2006.  I have to tell you, I have already 
learned a lot this morning just from the testimony I have heard so 
far.  
        My name is Ted Davis, and I am an Information Technology 
Director with the Fairfax County Public Schools in Virginia.  
FCPS is the 14th largest school district in the United States, with 
over 163,000 students at 228 schools.  FCPS has long since 
recognized the promise of the Internet as an educational resource 
as well as its perils.  Thus in 1997, I was tasked with leading the 
effort to develop our Internet use policy and to implement filtering 
technology.  
        FCPS supports the goals of the legislation but opposes the 
legislation in its current form.  As I will elaborate, public schools 
are addressing the dangers of online predators.  Legislation would 
not substantially improve the safety of our students and would 
place an added burden on schools. 
        Based on input gathered from nearly 800 educators, we 
recognize that technology alone could not address our shared 
concerns for the safety of our students.  Thus in 1998, the Fairfax 
County School Board adopted a policy that emphasized education, 
classroom management, personal responsibility, as well as 
technology.  
        Two years prior to the Children's Internet Protection Act of 
2000, FCPS implemented a filtering technology now known as 
Symantec Web Security.  FCPS filters Web content that is 
obscene, harmful to juveniles, child pornography, and promotes 
illegal activities.  Today all 90,000-plus of our computers are 
filtered for such consent.  
        SWS enables school districts to select from a wide range of 
categories of inappropriate materials for filtering, such as sex, 
crime, violence, intolerance, and interactive chat.  So the districts 
may select materials to be blocked based on their policies.  
        As you know, the Internet is constantly changing.  Thus, 
filtering vendors like Symantec continually update their lists of 
inappropriate websites in these categories.  Filtering vendors use a 
combination of technology and human review to identify and 
classify inappropriate websites.  
        Furthermore, SWS provides school districts to block or 
unblock additional sites in accordance with the needs of the school 
system.  FCPS put into place a process and guidelines for 
identifying and evaluating websites for possible filtering.  Social 
sites like MySpace fail under this process.  In the case of MySpace, 
FCPS began blocking this site last November.  The same is true for 
many sites that predated MySpace.com.  A neighboring school 
district took similar action.  
        As you might expect, there will always be some determined 
students that seek to bypass technology protection measures.  
These students are subject to policy enforcement.  Each school 
year, FCPS students are required to sign our acceptable use policy 
which outlines appropriate and inappropriate use of computers and 
the Internet.  Failure to comply with this policy results in 
disciplinary action.  
        Fortunately, this is not a significant problem.  In this past 
school year, 578 students were disciplined for violating our 
acceptable use policy.  This represents 0.3 percent of our student 
population.  One strategy for deterring AUP infractions is through 
good classroom management.  That is how teachers make use of 
their Internet in their classrooms:  arranging computers so that 
screens are visible to a teacher, preselecting websites for 
instruction, walking the classroom, and interacting with students as 
they use the Web.  
        The teachers are trained to use these practices, to work them 
into their routine.  Technology measures, policy enforcement, and 
classroom management are good strategies for preventing access to 
inappropriate materials in school, but they do not sufficiently 
prepare our students to deal with potential dangers outside of 
school, at home, a friend's house, a coffee shop or even when they 
become adults.  We know that our students will need to deal with 
many dangers, not only sexual predators but also identity thieves, 
scams, phishing scams, viruses, deceptive advertising, and 
misinformation.  
        Education is the key to preparing our students to deal with 
these dangers.  
        That is why FCPS began at the earliest age to teach students 
how to take advantage of the Internet and to deal with its dangers.  
We teach them not to give out personal information, that people 
may not be who they say they are, and never agree to meet 
someone via the Internet.  To make our point, we also partner with 
the Fairfax County Police who can speak to our students of these 
dangers from real experience.  
        Parents are also key to protecting and educating their children.  
To help parents, we conduct senior safety nights to educate them 
on the benefits and dangers.  We teach parents to get involved in 
their children's Internet use at an early age, to set rules on Internet 
use, and to place computers in the common areas of the home.  We 
also reach out to businesses and parents via brochures and videos.  
        The strategies I described, taken together, have been effective 
in FCPS for many years now.  These are not the direct result of 
State or Federal legislation; rather, they are the result of the close 
relationship our schools enjoy with our students, parents, and 
community and our shared passion to provide a safe learning 
experience.  
        Nevertheless, since the passage of the Children's Protection 
Act 6 years ago, these strategies are now commonplace in schools 
throughout the country.  
        The proposed legislation, though an extension of similar 
provisions in effect today, does not lend itself to a technical 
solution.  It would require that schools block commercial social 
networking sites that may easily be misused to perpetrate 
inappropriate contact with students.  Unlike current restrictions 
against obscene materials that can be objectively identified, this 
legislation requires schools to subjectively protect which sites may 
be misused.  Identifying and evaluating such sites would not take 
advantage of the technical capabilities of filtering vendors and 
likely lead to blocking of legitimate instructional cites.  Thus this 
burden would fall back on to the schools.  
        More could be done, of course.  You could help protect our 
students by pursuing those individuals who would do harm to our 
children.  And you can help us educate and prepare our students to 
be safe citizens of the Internet.  To these ends you could support 
law enforcement activities that seek to apprehend perpetrators 
before they harm a child.  
        I like the concept of the CyberTipline.  You can facilitate 
collaboration between law enforcement agency, filtering vendors, 
and schools to share information on websites used to commit 
crimes, such as that proposed by the Federal Trade Commission, 
and you can foster an information campaign to reach parents and 
students on how to face the dangers on the Internet.  A novel 
approach here would be to require social networking sites to 
commit some of their prominent advertising space to public service 
announcements.  That way, those who profit from these sites will 
bear some of those costs.  
        Thank you again for this opportunity to speak before the 
committee.  I welcome your questions. 
        [The prepared statement of Ted Davis follows:] 

PREPARED STATEMENT OF TED DAVIS, DIRECTOR, KNOWLEDGE 
ASSET MANAGEMENT, IT DEPARTMENT, FAIRFAX COUNTY PUBLIC 
SCHOOLS

Background:
 Ted Davis is an information technology director at Fairfax 
County Public Schools (FCPS) that led the development of the 
FCPS Internet use policy and filtering technology 
implementation.
 FCPS is the 14th largest public school district in the United 
States.
 FCPS supports the goals of the legislation, but opposes the 
legislation as written.

Protecting students on the Internet at FCPS:
 Internet use policy emphasizes education, classroom 
management, personal responsibility, as well as 
technology.
 Implemented the Symantec Web Security (SWS) product in 
1998.
 Filters content based on pre-selected SWS categories.
 Established a process for filtering additional web sites.
 Began blocking MySpace.com in November, 2005.
 Enforces an Acceptable Use Policy to deter inappropriate 
behaviors.
 Performs classroom management activities to mitigate 
infractions of its policies.
 Technology measures, policy enforcement, and classroom 
management do not prevent inappropriate behaviors outside 
of the school.
 Education of students and parents is key to preparing 
children to deal with dangers on the Internet.

Legislation:
 The proposal to block social networking sites that "may 
easily be" misused does not lend itself to a technical 
solution.
 Identifying sites that may be misused is subjective and 
would place an added burden on schools.
 The Subcommittee could help schools by:
 Supporting law enforcement in identifying and 
apprehending predators.
 Facilitating collaboration between law enforcement 
agencies, filtering vendors, and schools in 
identifying web sites used to commit crimes.
 Fostering an information campaign to reach parents 
and students on how to face dangers on the Internet.


        Thank you Chairman Upton and members of the Subcommittee 
for this opportunity to testify on the Deleting Online Predators Act 
of 2006.
        My name is Ted Davis and I am an information technology 
director with Fairfax County Public Schools (FCPS) in Virginia. 
FCPS is the 14th largest public school district in the United States 
with over 163,000 students at 228 schools. FCPS long ago 
recognized the promise of the Internet as an educational resource, 
as well as its perils. Thus, in 1997, I was tasked with leading the 
effort to develop our Internet use policy and to implement filtering 
technology. FCPS supports the goals of the proposed legislation, 
but opposes the legislation in its current form. As I will elaborate, 
public schools are addressing the dangers of online predators, the 
legislation would not substantially improve the safety of our 
students, and it will place an added burden on schools.
        Based on input gathered from nearly 800 educators, students, 
parents, and community members, we recognized that technology 
alone could not address our shared concerns for the safety of our 
students. Thus in 1998 the Fairfax County School Board adopted a 
policy that emphasized education, classroom management, 
personal responsibility, as well as technology.
        Two years prior to the Children's Internet Protection Act of 
2000, FCPS implemented a filtering technology now known as 
Symantec Web Security (SWS). FCPS filters web content that is 
obscene, harmful to juveniles, child pornography, and promotes 
illegal activities. Today, all 90,000+ of our computers are filtered 
for such content. 
        SWS enables school districts to select from a wide range of 
categories of inappropriate materials for filtering, such as sex, 
crime, violence, intolerance, and interactive chat, so that districts 
may select materials to be blocked based on their policies. As you 
know, the Internet is constantly changing, thus filtering vendors, 
like Symantec, continually update their lists of inappropriate web 
sites in these categories. Filtering vendors use a combination of 
technology and human review to identify and classify 
inappropriate web sites.
        Furthermore, SWS provides school districts the ability to block 
(or unblock) additional sites in accordance with the needs of the 
school system. FCPS put into place a process and guidelines for 
identifying and evaluating web sites for possible filtering. Social 
sites, like MySpace.com, fell under this process. In the case of 
MySpace.com, FCPS began blocking this site last November. The 
same is true for many sites that preceded the popularity of 
MySpace.com. Neighboring school districts took similar actions-
much to the relief of parents and dismay of students.
        As you might expect, there will always be some determined 
students that seek to bypass technology protection measures-
these students are subject to policy enforcement. Each school year 
FCPS students and their parents are required to sign our 
Acceptable Use Policy, which outlines appropriate and 
inappropriate uses of computers and the Internet. Failure to comply 
with this policy results in disciplinary action. Fortunately, this is 
not a significant problem. In this past school year 578 students 
were disciplined for violating our Acceptable Use Policy-
representing 0.3% of our student population.
        One strategy for deterring AUP infractions is through good 
classroom management. That is how teachers make use of the 
Internet in their classrooms. This includes approaches such as 
arranging computers so that screens are visible to the teacher, pre-
selecting web sites for instruction, walking the classroom, and 
interacting with students as they use the web. FCPS teachers are 
trained to work these practices into their technology routine.
        Technology measures, policy enforcement, and classroom 
management are good strategies for preventing access to 
inappropriate materials in school, but they do not sufficiently 
prepare our students to deal with potential dangers outside of 
school-at home, a friend's house, a coffee shop-or even when 
they become adults. We know that our students will need to deal 
with many dangers-not only sexual predators, but also identity 
thieves, scams, phishing schemes, viruses, deceptive advertising, 
and misinformation. Education is the key to preparing our students 
to deal with these dangers. 
        That is why FCPS begins at the earliest age to teach students 
how to take advantage of the Internet and to deal with its dangers. 
We teach them not to give out personal information, that people 
may not be who they say they are, and never to agree to meet 
someone via the Internet. To make our point, we also partner with 
the Fairfax County Police who can speak to our students of these 
dangers from real experience.
        Parents are also key to protecting and educating their children. 
To help parents, we conduct cyber safety nights to educate them on 
the benefits and dangers. We teach parents to get involved in their 
children's Internet use at an early age, to set rules on Internet use, 
and to place computers with Internet access in a common area of 
their homes. We also reach out to busy parents via brochures and 
videos.
        The strategies I described, taken together, have been effective 
in FCPS for many years now. These strategies are not the direct 
result of state or federal legislation. Rather, they are the result of 
the close relationship our schools enjoy with our students, parents, 
and community-and our shared passion to provide a safe learning 
experience that meets our students' needs. Nevertheless, since the 
passage of the Children's Internet Protection Act six years ago, 
these strategies are now commonplace in school districts 
throughout the country.
        The proposed legislation, though an extension of similar 
provisions in effect today, does not lend itself to a technical 
solution. It would require that schools block commercial social 
networking sites that "may easily be" misused to perpetrate 
inappropriate contact with students. Unlike current restrictions 
against obscene materials that can be objectively identified, this 
legislation would require schools to subjectively predict which 
sites may be misused. Identifying and evaluating such sites would 
not take advantage of the technical capabilities of filtering vendors 
and likely lead to blocking of legitimate instructional sites. Thus 
this burden would fall back on to the schools.
        More could be done, of course. You can help protect our 
students by pursuing those individuals who would do harm to our 
children, and you can help us educate and prepare our students to 
be safe citizens of the Internet. To these ends, you could support 
law enforcement activities that seek to apprehend predators before 
they harm a child. You can facilitate collaboration between law 
enforcement agencies, filtering vendors, and schools to share 
information on web sites used to commit crimes; and you could 
foster an information campaign to reach parents and students on 
how to face the dangers on the Internet.
        Thank you again for this opportunity to speak before the 
committee. I welcome your questions.

 

        MR. UPTON.  Mr. Kelly.
        MR. KELLY.  Good morning, Chairman Upton, and thank you 
very much for holding this hearing.  I want to personally thank my 
Representative, Ms. Eshoo, for her warm welcome, and all 
committee members as well.  
        My name is Chris Kelley.  I serve as Chief Privacy Officer of 
Facebook, a social utility that allows people to share information 
easily with their real world communities.  
        I joined Facebook last September as the first Chief Privacy 
Officer in the social neatworking space. In my previous role as a 
chief privacy officer and technology attorney, I represented many 
clients in the technology media industry on safety privacy issues.  I 
was also part of the founding team and served as a Fellow at 
Harvard Law School's Berkman Center for Internet and Society, a 
leading think tank focused on public policy issues of the digital 
age.  
        I am happy to be here today to talk about social networking 
sites generally, and particularly about Facebook.  By now you have 
heard a lot of things about the site.  You are also going to hear 
some positive things, and I understand a number of you have 
hopefully experienced some of the positives today.  
        I would like to begin telling you why teenagers and young 
adults love these sites, and then also about what is special about 
Facebook and especially our approach to online safety. 
        Facebook at its core is about community.  It is about providing 
an online way for people to communicate with friends and to meet 
new ones who are part of their real world communities.  It is about 
providing individuals with avenues for self-expression and 
creativity.  It is about providing the community members with easy 
ways to learn and share new ideas.  For all of these reasons, 
Facebook is fun and very popular, beginning with college students, 
and now with high school students and validated work 
communities.  
        Although only founded by Mark Zuckerberg, our CEO, in his 
dorm room in February of 2004, modeled after the paper Facebook 
that is given to many students at universities, we now have over 
800 million users.  Facebook is the seventh busiest website in the 
United States.  
        Facebook at its inception recognized the community's need to 
feel safe in order to thrive.  As a result, Mark and our other 
founders placed users' privacy, security, and safety at the center of 
Facebook's mission and its architecture.  It is a radical difference 
between sites with controlled access based on real world 
communities and those that make massive amounts of personal 
information available to anyone on the open Internet.  
        We implement our safety principles at Facebook with four 
levels of user protection.  First, we require validation.  E-mail is 
the primary token where it is possible for almost all colleges and 
for about 15 percent of high schools.  We use invitations where a 
school-validated e-mail address is not available.  
        Second, we place users in individual networks based on the 
real world school communities and we partition information 
availability within those networks.  This provides a built-in 
neighborhood watch program where abuse of the system can be 
easily identified and dressed.  So if you are a student at Walt 
Whitman High School in the Maryland suburbs, you only have 
access to other students at that high school.  
        Third, we empower members in our network to make choices 
about how they reveal information.  We offer detailed privacy 
settings and easy reporting of the violations of our terms of service.  
        Finally, we have a technology and safety net to detect misuse 
of the site and protect our members.  We employ technology tools 
that we deploy to detect misuse of the site and human capital 
dedicated to potential problems.  We highlight those accounts.  We 
do an automatic disband when people exceed a certain threshhold, 
and we examine that member's account to see if they are 
potentially harming other people on the site.  
        As a result of these important privacy, security, and safety 
features, we have very rarely encountered the same unfortunate 
problems that other social networking sites have been having.  
Facebook employs these because we recognize there is always a 
potential for bad actors in any online community, just as in the real 
world.  
        We have vigorously sought to support the construction of safe 
online communities both through our technology tools and other 
educational developers.  More specifically, Facebook supports the 
educational law enforcement efforts of the Federal Trade 
Commission.  We have been engaged in a dialogue with the 
National Southern Office of Attorneys General with best practices 
for social networking sites.  WiredSafety.org and I have worked 
with Parry for quite a number of years, and parents everywhere, 
because they are ultimately the first line of defense.  
        We also support the efforts of all companies in the social 
networking industry to make the world safer and more secure for 
their members.  So, in short, we think the competition to provide 
social networkers with safer choices is a very good thing, so we 
commend this committee for its efforts and we welcome the 
opportunity to serve as a community tie to you.  
        Facebook is proud to have led the way in giving the people an 
ability to share and control sharing of information online.  With 
these factors in mind, I would like to offer two quick observations 
about the Deleting of Online Predators Act. 
        We are very concerned about the vagueness of the "easily 
access" or "may easily be subject to" standards that the Deleting of 
Online Predators Act articulates as a basis for blocking a social 
networking site.  We are not certain there is an effective way for us 
to articulate the likelihood of such an event, though we do 
appreciate the attempt to distinguish between a distant possibility 
and a more easily foreseeable one.  
        As the committee further considers the legislation, it might 
examine the possibility of a safe harbor for sites deploying 
reasonably effective measures to limit general availability of 
profiles or adult-child interaction through the site.  We found that 
deploying technical tools allowing validation and segmentation of 
communities effectively limit adult-child interaction.  
        Second, I would stress that any congressional action should 
encourage the deployment of technology to protect children and be 
very conscious of avoiding discouragement of the pro aspects of 
the online site.  There is a reason that children and young adults 
make these sites major parts of their day: the natural desire of all 
people to express themselves and share information with friends.  
It is why a number of you went into politics.  
        I would encourage you to discuss Facebook with your staffers 
and interns who are students or recent graduates and let them 
articulate the sites and the benefits of the sites that it gives to their 
users.  Thank you for the opportunity to comment before the 
committee, and I look forward to the discussion.  
        [The prepared statement of Chris Kelly follows:] 

PREPARED STATEMENT OF CHRIS KELLY, VICE PRESIDENT, 
CORPORATE DEVELOPMENT AND CHIEF PRIVACY OFFICER, 
FACEBOOK

        Thank you Chairman Upton, ranking member Markey, and 
members of the Subcommittee for this opportunity to be with you 
and explain how Facebook uses technology and policy to protect 
people on our network.
        My name is Chris Kelly, and I serve as Chief Privacy Officer 
of Facebook, a social utility that allows people to share 
information with their real world communities.  I am very happy to 
be here today to explain how the two core ideas of social 
interaction and privacy guide everything that we do, and help 
protect people on our network.  As we say in our basic statement of 
principles, we believe that people want to share information with 
their friends and those around them, but they don't necessarily 
want to share personal information with the entire world.
        I joined Facebook last September as the first Chief Privacy 
Officer in the social networking space, and am creating the role at 
an Internet company for the fourth time.  In my previous service as 
a Chief Privacy Officer and technology attorney I have represented 
many clients in the technology and media industries on privacy, 
security, safety, and intellectual property issues.  I was also part of 
the founding team and served as a Fellow at Harvard Law School's 
Berkman Center for Internet and Society, a leading think tank 
focused on public policy issues of the digital age.
        In February of 2004, our CEO and Founder Mark Zuckerberg 
launched the first version of Facebook from his college dorm 
room.  Now, Facebook is the seventh busiest site overall and runs 
the busiest photo site in the United States, according to 
independent service ComScore Networks.  We have more than 8 
million registered members for whom Facebook has become a core 
part of how they interact within their communities.  Starting with 
our college communities, we have since expanded to offer school-
focused interactions for high-school students, and more recently 
have followed our graduating students into the work world.
        Privacy, security, and safety have been at the forefront of our 
concerns since the founding of the site.  There is one overarching 
way that Facebook differs from nearly all other social networking 
sites - profile information is not generally available to the outside 
world.  It is only available to Facebook members inside their 
individual, validated networks or through confirmed friends.  We 
want to give people extensive power over their ability to share 
information, and the ability to limit who has access to it.
        Of course, no protection mechanism is perfect.  But the mere 
fact that Facebook does not make information available by default 
to anyone with access to the Internet, combined with the other 
measures we have taken to focus information sharing on real-world 
communities, makes a radical difference in the privacy, security, 
and safety of the Facebook experience.  
        Following this major differentiator from most sites, we have set 
up four levels of protection for our members that I would like to 
outline for you today.
        First, we require validation in order to get on the site in the first 
place.  For college students, and those high schools where it is 
possible, membership in the school community is proven through a 
valid email associated with that college or school.  Where high 
schools do not offer students email addresses, we have instituted 
an invitation-based system that is designed to limit even initial 
access to that school network.
        Second, we segment information access within networks based 
on real-world communities.  Being a member of Facebook does 
not give you access to the profiles of all people on Facebook.  You 
are only allowed to access the profiles of other members at your 
college, high school, work, or (with explicit user choice) 
geographic network, and have power to add confirmed friends in 
other networks. This has two positive effects.  First, users are 
gaining more information about those around them in the real 
world, which has pro-social effects on campuses around the 
country.  Second, there is a built-in neighborhood watch program, 
especially with respect to high schools, where abuse of the system 
can be easily identified and addressed.
        Third, we put power in our users' hands to make choices about 
how they reveal information.  I have mentioned already the ability 
to confirm friends from other networks, and the "My Privacy" tab 
on every navigation bar throughout the site allows users to make 
detailed choices about who can see particular pieces of information 
about them, including their contact information and photos. 
        Finally, we have a safety net of protection through both 
technological tools we deploy to detect misuse of the site and 
human capital dedicated to potential problems -- our 20 person and 
growing customer service staff, headed by a seasoned veteran and 
backed up by myself and two other attorneys.  Most of our 
customer service representatives are recent graduates of 
outstanding colleges, and dedicated Facebook users, so they know 
the system inside and out.  On those rare occasions where someone 
has attempted to misuse our network, we engage rapidly with the 
relevant authorities.  Because the system is built for accountability 
with its validation requirements and segmentation of communities, 
misuse is both deterred and generally detected quickly.  We 
quickly launch an internal investigation and step in where we 
receive reports of the misuse of Facebook in any way.
        Overall, the fact that information posted on Facebook is not 
generally available has made Facebook a different experience for 
our users, and one they clearly enjoy as reflected in their frequent 
visits. Our intuition about the importance of tying access to 
information based on the networks where people already exist in 
real life has been shown to have huge effect in both deterring and 
exposing misuse.  By focusing on real-world networks as the 
touchstone for access, we provide both a built-in reflection of 
people's expectations about who will know information about 
them, and restrictions that make access difficult for those who 
might have harmful intentions.
        Facebook is proud to have led the way in giving people the 
ability to share, and to control sharing, information online.  
        With these factors in mind, I would like to offer two 
observations.  We are very concerned about the vagueness of the 
"easily access" or "may easily be subject to" standards that the 
Deleting Online Predators Act articulates as a basis for blocking a 
social networking site.  We are not certain that there is an effective 
way to articulate likelihood of such an event, though we do 
appreciate the attempt to distinguish between a distant possibility 
and a more easily foreseeable one.  As the committee further 
considers the legislation, it might examine the possibility of a "safe 
harbor" for sites deploying reasonably effective measures to limit 
general availability of profiles or adult-child interaction through 
the site.  We have found that deploying technological tools 
allowing validation and segmentation of communities effectively 
limit adult-child interaction.  
        Second, I would stress that any Congressional action should 
encourage the deployment of technology to protect children and be 
very conscious of avoiding discouragement of the pro-social 
aspects of online sites.  There is a reason that children and young 
adults make these sites major parts of their day - the natural desire 
of all people to express themselves and share information with 
friends.  I would encourage you to discuss Facebook with your 
staffers and interns who are students or recent college graduates 
and let them articulate the benefits that the site delivers to its more 
than 8 million users.
Thank you again for the opportunity to comment before the 
committee, and I look forward to your questions.



        MR. UPTON.  Ms. Lenhart.
        MS. LENHART.  Chairman Upton and honorable members of 
the Subcommittee, it is a privilege for the Pew Internet and 
American Life Project to be asked to testify at this important 
hearing.  
        The project is a nonprofit organization created to examine the 
social impact of the Internet, with grants from the Pew charitable 
trust.  We at the Pew Internet Project do not take positions on 
policy questions.  Still, we try to do primary research about the 
impact of people's Internet use that would be helpful to 
policymakers and other stakeholders.  
        We have been doing research for 7 years about how teenagers 
use the Internet and how families are addressing challenges related 
to new technologies.  Our national surveys show that fully 87 
percent of Americans between the ages of 12 and 17 go online.  Of 
those that do not currently go online, about half have had some 
previous Internet experience, which means that in all, 93 percent of 
American youth have used the Internet at some point.  
        Their parents use the Internet in large numbers as well; 87 
percent of parents with online teens between the ages of 12 and 17 
use the Internet compared with 73 percent of all American adults 
who go online.  Our research shows that while parents believe that 
the Internet can bring both positive opportunity and potential 
threats into their homes, their overall judgment is that the Internet 
is a good thing for their children; 67 percent of parents with online 
teens report this, and their optimism has grown markedly since we 
first asked the question in year 2000.  
        This hearing is particularly focused on the role that social 
networking sites play in teenagers' lives.  But it is important to 
point out the social interaction that takes place online has been an 
integral, if not an important, part in the Internet experience since 
the first e-mail was transmitted in 1971.  
        There are websites where individuals can post information 
about themselves by creating a profile or website where they can 
connect with others in the same network.  This definition 
encompasses online dating sites, collaborative software spaces, as 
well as popular social networking sites like Xanga and Live 
Journal and places like MySpace, Facebook, and MyYearbook 
which are based around the creation of a personal profile.  
        Social networking sites are not the same as chat rooms, though 
some of these sites do have discussion forums where live chat can 
take place.  The vast majority of communication in online social 
networks takes place asynchronously and within the network of 
friends that the user has established.  
        Other research has recently documented the popularity of 
social networking sites among teens.  A March 2006 survey of 
1,160 online teenagers between the ages of 13 and 17 found that 61 
percent of teens have personal profiles on sites like MySpace, 
Friendster, or Xanga, and about half of them have posted photos of 
themselves somewhere online. 
        Teenager use of these networks dwarfs that of adults.  A Pew 
Internet Project survey conducted in September of 2005 found that 
just 16 percent of young adults between the ages of 18 and 29 had 
used an online social or professional networking site.  Older users 
are even less likely to use the sites.  
        There are two primary functions of social networking sites that 
are appealing to teens:  
        First, the sites enable the user to create sites and share content 
with others.  
        Second, the sites enable users to communicate with others 
using a wide array of messaging, blogging, and posting tools.  
        Our surveys of teens show that 57 percent of online teens have 
created some kind of concept for the Internet.  This includes blogs, 
creating websites, posting photos, written material, videos, songs, 
or other artwork.  Much of this content, when posted on social 
networking sites, is expressive of their view of the world, which 
can be angry, angst-ridden, or full of idealism.  In other words, this 
is a terrain where teens display their moods in acting out their 
vision of themselves, sometimes doing it in ways that ignore or 
downplay risks to their privacy and safety.  
        Psychologist Erik Erikson argues that most of the work of 
being an adolescent involves youths' testing as they establish their 
place in the world.  The online environment is for this.  It is easy to 
create materials online and then change it.  It enables feedback 
from peers, the most compelling group of people in teens' lives.  
        The Internet and social networking sites are the latest iteration 
in a long line of technologies that have changed the way teenagers 
communicate and socialize, technologies like the car and the 
telephone. 
        The second element of online social networks that contribute to 
their popularity is that they provide another channel to 
communicate with others.  The act of developing friendships and 
romantic relationships is also the work of teenagers.  And the 
Internet and its communications applications allow them to do this 
easily.  Our data shows that 89 percent of teens are e-mail users 
and 75 percent are instant message users.  During recent focus 
groups, we heard from teens that both of these methods of 
communication were being supplanted in many teens'; lives by the 
communications tools embedded in social networking websites 
such as bulletins, messaging, and commenting.  
        While social networks are attractive for all of the information 
they enable, there has been considerable information on the dark 
side.  What may seem like harmless disclosure of information, and, 
in the worst cases, allow them to be tracked and targeted, our most 
recent work suggests that growing numbers of teens are aware of 
these problems and are taking steps to address them.  
        We have just completed a series of focus groups with middle 
and high schools, that safety and social networking sites has 
become a major concern of many, if not most, of the teens we 
interviewed, particularly younger teens and some of the girls.  
Time and again, these teens detailed their concerns about online 
predators and the steps they took to keep themselves safe.  
Sometimes they feel it is sufficient to hit the delete key in response 
to unwanted messages or requests from strangers.  Other times 
teens in our groups said they would post false information on their 
sites to protect themselves. 
        They are now more aware of the dangers of posting 
information on their profile that might help lurkers find them.  
        But even as they detailed their fears and concerns about 
perceived dangers of these sites, they also talked about how 
important these sites were to them, not just as a place to learn 
about and share new music, video, or photos, but also as a place 
that helps them develop and maintain friendships that they rely on 
for support.  
        Looking more closely at safety issues, parents and children also 
agree about some fundamental truths about the online generational 
divide.  Both parents and their children agree that parents are 
generally less tech-savvy than their children.  
        Still, 54 percent of parents report having some type of filtering 
or monitoring software on the home.  Two-thirds of parents also 
take nontechnical steps online by checking on their Web use and 
placing the computer in a public place in the home.  In the end, the 
picture we get is that teens and their parents are aware of the 
double-edged nature of technology, and they welcome access to 
tools and tech needs that help them make informed choices about 
what they do online.  
        I thank you for the opportunity to speak to the committee and I 
look forward to answering any questions you may have. 
        [The prepared statement of Amanda Lenhart follows:] 

PREPARED STATEMENT OF AMANDA LENHART, SENIOR RESEARCH 
SPECIALIST, PEW INTERNET AND AMERICAN LIFE PROJECT

        Chairman Upton and honorable members of the Subcommittee, 
it is a privilege for the Pew Internet & American Life Project to be 
asked to testify at this important hearing. The Project is a 
nonprofit, nonpartisan research center created to examine the 
social impact of the internet with grants from the Pew Charitable 
Trusts. We at the Pew Internet Project do not take positions on 
policy questions or endorse industry sectors, organizations, or 
individuals. Still, we try to do primary research about the impact of 
people's internet use that would be helpful to policy makers and 
other stakeholders as they consider ideas to improve technology or 
mitigate its harms. 

There is pervasive use of the internet among teenagers
        We have been doing research for seven years about how 
teenagers use the internet and how families are addressing 
challenges related to new technologies. Our national surveys show 
that internet use is pervasive among teens and that families are 
spending time trying to work through all the issues that brings into 
their homes. 
        Fully 87% of Americans of middle- and high-school age - 
those between the ages of 12 and 17 - go online. Of those that do 
not currently go online, about half have had some previous internet 
experience, which means that, in all, 93% of American youth have 
used the internet at some point. 
        Their parents use the internet in large numbers as well - 87% 
of parents with teens between the ages of 12 and 17 use the 
internet, compared with 73% of all American adults who go online. 
It is clear that many parents extend themselves financially to buy 
computers and internet access in the belief that mastery of high-
tech skills is a prerequisite for their children's future success. 

Weighing the pluses and minuses, parents think the internet is a 
benefit to their children
        Indeed, while parents believe that the internet can bring both 
positive opportunities and potential threats into their homes, their 
overall judgment is that the internet is a good thing for their 
children: 67% of parents with online teens report this, and their 
optimism has grown markedly since we first asked the question in 
the year 2000.  
        This hearing is particularly focused on the role social 
networking websites such as MySpace.com and Facebook.com 
play in teenagers' lives. But it is important to point out that social 
interaction takes place in a wide variety of contexts online and has 
been an integral part - if not the most compelling part - of internet 
experience since the first email was transmitted in 1971. 

Online social networks are popular among teenagers
        Our working definition of online social networks is broad. 
They are "web spaces where individuals can post information 
about themselves, usually by creating a profile or website, and 
where they can connect with others in the same network." This 
definition encompasses online dating sites, some instant messaging 
tools, collaborative software spaces, as well as popular social 
networking web sites like Xanga and Live Journal, which are built 
mainly around connecting friends via their blogs, and places like 
MySpace, Facebook, Tagged.com, and MyYearbook. 
        Social networking sites are not the same as chatrooms, though 
some of these sites do have discussion forums where live chat can 
take place. The vast majority of communication in online social 
networks takes place asynchronously and within the network of 
"friends" that the user has established.
        Other research has recently documented the popularity of 
social networking sites among teens. A March 2006 survey of 
1,160 online teenagers between the ages of 13 and 17 found that 
61% of teens have personal profiles on sites like MySpace, 
Friendster or Xanga, and about half of them have posted pictures 
of themselves somewhere online.   
        Teenagers' use of these networks appears to dwarf that of 
adults. A Pew Internet Project survey conducted in September 
2005 found that just 16% of young adult internet users between the 
ages of 18-29 had used an online social or professional networking 
site. Older users are even less likely to use the sites.

Social network sites are popular because they enable new 
expression and activities that appeal to teenagers
        There are two primary functions of social networking sites that 
are especially appealing to teens:
         First, the sites enable users to create and share content 
with others -- generally, this is content that is expressive of 
users' identities. 
         Second, the sites enable users to communicate with others 
using a wide array of messaging, blogging and posting 
tools.

New online tools help teens explore their identities
        Our surveys of teens show that 57% of online teens have 
created some kind of content for the internet. This includes 
blogging, creating websites, posting photos, written material, 
videos, songs, or other artwork. Teens also remix content they find 
online into something new and share that online with others. Much 
of this content when posted on social networking or other websites 
is expressive of their view of the world - a view that can be 
playful, angry, riveting, revolting, angst-ridden, hilarious, or full of 
idealism. In other words, this is a terrain where teens display their 
moods and act out their vision of themselves - sometimes doing it 
in ways that ignore or downplay risks to their privacy and safety
        Psychologist Erik Erikson argues that much of the "work" of 
being an adolescent involves youths' testing of their identities as 
they establish their place in the world. The online environment 
offers many opportunities to do this type of developmental "work." 
It's easy to create material and change it when the mood strikes. 
Most importantly, it enables feedback from peers - the group about 
which teens are most keenly interested.
        The internet and social networking sites are the latest iteration 
in a long line of technologies that have changed the way teenagers 
communicate and socialize. As historian Beth L. Bailey notes in 
her book, From Front Porch to Back Seat, the invention of the 
automobile, which brought youth radically new levels of mobility 
and privacy in the early 20th Century, is often credited as the 
technological catalyst that spurred a new and controversial social 
practice among young men and women called "dating."   

Staying in touch with peers is a big draw
        The second element of online social networks that contributes 
to their popularity is that they provide another channel for teens to 
communicate with others, especially with those who are connected 
through a visible web. The act of developing friendships and 
romantic relationships is also the "work" of teenagers, and the 
internet and its communications applications allow them to do this. 
	Our data show that 89% of teens are email users and 75% are 
instant message users. During recent focus groups, we heard from 
teens that both of these methods of communication were being 
supplanted in many teens' lives by the communications tools 
embedded in social networking websites -- such as "bulletins," 
messaging, and commenting.

Teens, especially younger youth and girls, are developing new 
awareness about the risks of some disclosures on social network 
sites
        While social network sites are attractive for all the content and 
communication they enable, there has been considerable public 
attention focused on the dark side of all this public disclosure by 
teenagers. What may seem like harmless disclosures of 
information can sometimes compromise teens' privacy and, in the 
worst cases, allow them to be tracked and targeted.  
        Our most recent work suggests that growing numbers of teens 
are aware of these problems and are taking steps to address them. 
We have just completed a series of focus groups with middle and 
high school students and it was striking to note that safety on social 
networking sites has become a major concern of many if not most 
teens we interviewed, particularly younger teens and girls. 
        Time and again, these teens detailed their concerns about 
online predators and the steps they took to keep themselves safe. 
Sometimes they feel it is sufficient to hit the delete key in response 
to unwanted messages or requests from strangers. Other times, the 
teens in our groups said they would post false ages on their sites. 
Often, they would say they were younger than they actually were 
because privacy protections at some social network sites are 
stronger for younger users. Finally, these teens told us that they are 
more aware now of the dangers of posting information in their 
profiles that might help lurkers find them. 
        Even as they detailed their fears and concerns about the 
perceived dangers of these sites, they also talked about how 
important these sites were to them - not just as place to learn about 
and share new music, video, or photos, but also as a place that 
helps them develop and maintain friendships that they rely on for 
support. 

Parents and children agree there is a generational divide in many 
households
        Looking more closely at safety issues, parents and children also 
agree about some of the fundamental truths that characterize the 
online generational divide. Both parents and their children agree 
that parents are generally less tech savvy than their children. In 
addition:   
         81% of parents and 79% of teens agree that children are not 
as careful as they should be about the information they give 
out online
         62% of parents with online teens and 62% of online teens 
agree that children do things online that they wouldn't want 
their parents to know about. 

Many parents try to take steps to safeguard their children
        Still, 54% of parents report having some type of filtering or 
monitoring software installed on a computer in the home. Two 
thirds of parents also take non-technical steps to protect their 
children online, by checking up on their web use, setting rules and 
time limits and placing the computer in a public place in the home.
        In the end, the picture we get is that teens and their parents are 
aware of the double-edged nature of technology, and they welcome 
access to tools and techniques that help them make informed 
choices about what they do online. 
        Thanks again for the opportunity to speak to the committee 
today and I look forward to answering any questions you may 
have.
 


        MR. UPTON.  Ms. Yoke.
        MS. YOKE.  I would like to ask your permission to insert this 
document into the record. 
        MR. UPTON.  Without objection.  
[The Information follows:]



        MS. YOKE.  Chairman Upton and members of the 
subcommittee, thank you for inviting me to testify on behalf of the 
American Library Association.  I sincerely appreciate the chance to 
comment on the Deleting of Online Predators Act.  
        My name is Beth Yoke, and I am Executive Director of the 
Young Adult Library Association, the division in ALA that strives 
to ensure the Nation's teens have access to excellent library service 
and resources.  Before taking this position with ALA, I was a 
young adult librarian and instructor of future school instructors in 
Fairmont, West Virginia.
        I would like to summarize our main points.  But first let me say 
that no one is more concerned with the safety of children online 
than librarians, especially youth librarians, media specialists like 
those with whom I work.  Librarians believe, and, more 
importantly, know from experience that education about safe 
Internet practices for both youth and parents is the best way to 
protect young people.  
        With that in mind, let me go through our key points.  
First, the technology used in DOPA is overly broad.  DOPA 
uses the term "social networking sites" to describe virtually all 
interactive Web applications in which users converse or interact 
with each other.  As written, it would block access to many 
valuable websites that utilize this type of communication, websites 
whose benefits far outweigh their detriments.  
        Second, DOPA ignores the value of interactive Web 
applications.  New Internet Web applications for collaboration, 
business and learning are becoming increasingly important, and 
young people must be prepared to thrive in a work atmosphere 
with meetings that take place online and online networks are 
essential communications tools.  
        A number of businesses are increasingly leaning to the use of 
interactive Web applications as a primary mode of business 
communication.  This is exactly what kids must be ready for:  a 
professional environment where only the Web-savvy thrive.  
        Finally, one example that wasn't included in my written 
testimony.  A young adult with whom I recently spoke told me, 
quote, "My dad is a truck driver.  And before social networking 
sites existed, it was hard for him to feel connected with our family 
when he was away.  If the library blocks social networking sites, I 
will no longer be able to have live chats with him by computer, to 
share photos with him, or share moments across the country."  No 
doubt thousands of other teens have equally compelling stories to 
tell.  
        Third, education, not laws blocking access to social networking 
access is the key to safe use of the Internet.  Librarians and 
schools--
        MR. UPTON.  We will freeze the clock.  We will let you finish.  
        MS. YOKE.  Libraries and schools are where kids learn 
education.  Legislation like DOPA sends the wrong message at the 
wrong time. 
        MR. UPTON.  It means we could have a series of votes but it is 
likely we are going to have one.  Go ahead.
        MS. YOKE.  Instead of allowing librarians and teachers to 
instruct students about how to use all kinds of applications safely 
and effectively, it creates barriers to information, literacy 
instruction.  This flies in the face of logic and hundreds of years of 
educational theory.  Why would we limit access to interactive Web 
application in the first place where students came to use them 
actively?  
        Fourth, local decision-making is the way to address the law.  
Many of the problems that DOPA seeks to remedy are already 
addressed at the local level.  Federal legislation like DOPA robs 
education communities of control.  Decisions, about what is best 
for an individual community is best made by the community itself.  
        Fifth, DOPA would restrict technology in the communities that 
need public access most.  According to research, African 
Americans and Hispanics are much more likely to rely exclusively 
on the library computer for Internet access than are their white and 
Asian counterparts.  DOPA, as presently drafted, would require 
libraries and schools receiving E-rate discount to block computer 
users from accessing interactive Web actions of all kinds, thereby 
limiting opportunity for those who do not have Internet access at 
home.  
        Research shows that use of the Internet is used to improve 
reading and other academic successes, but as Bruce Bower states, 
"children most likely to benefit from home Internet access are the 
least likely to have it."  
        The American Library Association would like to affirm the 
importance of online interaction and collaboration as an 
indispensable tool for education and communication in today's 
information society.  They also affirm the role of social networking 
sites of essential literacy skills.  We at the American Library 
Association stand ready to work with you to assure that our 
children are protected, educated, informed and made as safe as 
possible.  
        Thank you.
        [The prepared statement of Beth Yoke follows:] 

PREPARED STATEMENT OF BETH YOKE, EXECUTIVE DIRECTOR, 
ALA YOUNG ADULT LIBRARY SERVICES ASSOCIATION

        Librarians believe, and more importantly know from 
experience, that education about safe Internet practices - for both 
youth and parents - is the best way to protect young people. We 
believe that the overly broad technological controls that would be 
required under DOPA are often ineffective given the fast-moving 
nature of modern technology.  Further, such technological controls 
often inadvertently obstruct access to beneficial sites. In essence, 
we believe that this legislation would lead to the blocking of 
essential and beneficial Interactive Web applications and would 
further widen the digital divide.

I. The terminology used in DOPA is flawed. 
        DOPA uses the term "social networking sites" in an overly-
broad way to describe virtually all Interactive Web applications in 
which users converse or interact with each other. As written, HR 
5319 would block access to many valuable applications.  

II. DOPA ignores the value of Interactive Web applications.
        New Internet-based applications for collaboration, business and 
learning are becoming increasingly important, and young people 
must be prepared to thrive in a work atmosphere where meetings 
take place online, where online networks are essential 
communication tools.

III. Education, not laws blocking access, is the key to safe use of 
the Internet.
        Libraries and schools are where kids learn essential 
information literacy skills that go far beyond computer instruction 
and web searching to include the development of critical thinking 
skills necessary to make good choices online.

IV. Local decision-making - not federal law - is the way to solve 
the problems addressed by DOPA.
        Many of the problems that DOPA seeks to remedy are already 
addressed at the local level. Decisions about what is best for an 
individual community should be made by the community itself.

V. DOPA would restrict access to technology in the communities 
that need public access most.
        African Americans and Hispanics are much more likely to rely 
exclusively on the library computer for Internet access than are 
their white and Asian counterparts. DOPA, as presently drafted, 
would require libraries and schools receiving E-rate discounts 
through the Universal Service Program to block computer users 
from accessing Interactive Web applications of all kinds, thereby 
limiting opportunities for those who do not have Internet access at 
home.


        Chairman Upton and Members of the Subcommittee, thank you 
for inviting me today to testify on behalf of the American Library 
Association (ALA). I sincerely appreciate the opportunity to 
comment on H.R. 5319, the Deleting Online Predators Act 
(DOPA).  ALA has three primary concerns about DOPA:  1) that 
the broad scope of this legislation will limit access to essential 
Interactive Web applications; 2) that the legislation would widen 
the digital divide by limiting access for people who use library and 
school computers as their primary conduits to the Internet; and 3) 
that education and parental involvement are and have always been 
the best tools to keep kids safe online and to ensure that they can 
make the right decisions.
        I am the Executive Director of ALA's Young Adult Library 
Services Association (YALSA).  The American Library 
Association is the oldest and largest library association in the 
world with some 65,000 members, primarily school, public, 
academic, and some special librarians, but also trustees, publishers, 
and friends of libraries. The Association's mission is to provide 
leadership or the development, promotion, and improvement of 
library and information services and the profession of librarianship 
in order to enhance learning and ensure access to information for 
all.
        Before taking this position with ALA, I was a young adult 
services librarian and an instructor of future school library media 
specialists and youth librarians at West Virginia University.  I can 
say with authority that no one is more concerned with the safety of 
children online than librarians - especially youth librarians. 
        Youth librarians believe, and more importantly know from 
experience, that education about safe Internet practices - for both 
youth and parents - is the best way to protect young people. We 
believe that the overly broad technological controls that would be 
required under DOPA are often ineffective given the fast-moving 
nature of modern technology.  Further, such technological controls 
often inadvertently obstruct access to beneficial sites. In essence, 
we believe that this legislation will lead to the blocking of essential 
and beneficial Interactive Web applications and will further widen 
the digital divide.

The terminology used in DOPA is flawed. 
        It is very difficult to define many of the terms used in the 
debate over Internet usage.  DOPA uses the term "social 
networking sites" in an overly-broad way to describe virtually all 
Interactive Web applications in which users converse or interact 
with each other. As it is currently written, the definition (even with 
the educational exemption) would include: educational tools used 
to provide distance education, community forums that allow 
children to discuss issues of importance, online email programs 
through which family members can communicate with each other 
and with teachers and librarians at their local schools and libraries 
and even find one another in cases of emergency. There is 
enormous value to be found in these interactive online 
environments.  Blocking access to them denies young people the 
opportunity to benefit from all the Internet has to offer while not 
necessarily ensuring kids' safety online.  As written, HR 5319 is 
simply too broad and would block access to many valuable 
applications.  We urge you to consider changes in the bill 
language.
        There are many examples of online education applications that 
would be blocked under DOPA.   One example reported in 
Education Week indicated that more than 10 million students were 
part of an online field trip to the Carlsbad Caverns National Park in 
Carlsbad, N.M. - without leaving their classrooms. 
        The April 25 field trip, coordinated by Ball State University in 
Muncie, Ind., was to consist of two live virtual tours of the cave 
featuring scientists, park guides, and First Lady Laura Bush. 
Students in grades 3-8 were invited to call in or e-mail questions to 
be answered on the air, or to participate in an online discussion 
during the 90-minute broadcasts.  The organizers billed the event 
as the largest simultaneous visit ever to a national park. It was also 
described as the largest "electronic field trip" ever broadcast by 
BSU, which has organized more than 50 such trips since 1996. 
        Use of the site WebCT.com, an online education application, 
has helped thousands of people get their degrees through distance 
learning.  WebCT is a site that allows users to enroll in and 
participate in classes online. It can also act as a forum for class 
discussions. Users create profiles and become students in a virtual 
classroom through online bulletin boards, real-time chat, student 
blogs, and more. In the rural areas of states like Texas, Wyoming, 
the Upper Peninsula of Michigan and West Virginia - where I 
worked, distance from major hubs once created an enormous 
barrier to learning. 
        Today, applications, like those available through WebCT, 
make it possible for young adults to complete degrees online at 
schools that are hundreds of miles away as well as access other 
non-credit courses for personal interests.  It is our analysis that 
DOPA would make this type of distance learning impossible, since 
the bill requires that interactive applications, like courses available 
through WebCT, can only be used in libraries or schools if there is 
adult supervision. But what does "adult supervision" mean?  Or 
how is "education" defined in the pertinent exemption?  Is it 
formal for-credit only courses?  And, why would we create barriers 
for young people who want to take advantage of online educational 
opportunities?
        There are countless positive uses for networking applications 
that are not necessarily related to formal education. Networking 
applications include support groups for teenagers with physical or 
emotional disabilities, forums for the exchange of ideas, and even 
tools to help kids become acclimated to new surroundings. For 
example, when teenagers leave for college they often use 
networking sites to find other students with similar interests.
        Finally, with specific regard to "social networking sites," 
young adults all over the country have begun to use these sites as a 
primary means of communication, whether with their peers or with 
young adult authors, musicians, artists, and with libraries. Some 
libraries are taking advantage of this by using some of these sites 
to stay in touch with their communities. For example, Sean 
Rapacki from the Wadsworth Public Library in Wadsworth, Ohio 
informed us that his staff has created a MySpace profile page FOR 
the library, allowing library staff to communicate with young adult 
patrons much more effectively.

DOPA ignores the value of Interactive Web applications.
        Today's interactive online environment is an essential and 
growing part of economic, cultural, civic, and social life. New 
Internet-based applications for collaboration, business and learning 
are becoming increasingly important, and learning to use the online 
environment effectively and safely is now an essential component 
of education.
        The popularity of interactive online environments is extending 
to the corporate world, as a number of businesses - including 
corporate leaders like Ernst & Young and IBM - are increasingly 
moving to the use of interactive Web applications as a primary 
mode of business communication. These companies recognize that 
technology can be an essential way to achieve a home/work 
balance and maximize efficiency.  As the corporate, professional, 
and civic use of interactive Web applications grows, there is an 
increasing need for today's young people to be prepared to thrive in 
a work atmosphere where meetings take place online, where e-
business is a driving force behind the world economy, and where 
online networks are essential communication tools. This is exactly 
what kids must be ready for: a professional environment where 
only the web-savvy thrive. 
        The Internet is changing how we live, learn, work, and interact 
with one another. If today's young people are to succeed in the 
workplace of the future, they must learn information literacy skills 
for the technologies of today and tomorrow. Libraries are far and 
away the best places to learn these skills, and social networking 
sites, which introduce kids to the world of online interaction, are 
key to successful development in that field.

Education, not laws blocking access, is the key to safe use of the 
Internet.
        Libraries and schools are the locations where students develop 
the information literacy skills that are vital to success in today's 
world. Information literacy includes "the abilities to recognize 
when information is needed and to locate, evaluate, effectively use, 
and communicate information in its various formats. " These are 
skills that public librarians and school library media specialists are 
in a unique position to foster in young people. In today's world, 
information literacy skills go far beyond computer instruction and 
web searching. In a fully developed information literacy program, 
students learn how to find, evaluate, and use online information 
and also learn how to use critical thinking skills to make good 
choices online.
        This type of information literacy instruction is going on in 
schools and libraries all across the country. Legislation like DOPA 
sends exactly the wrong message at the wrong time - instead of 
allowing librarians and teachers to instruct students about how to 
use all kinds of applications safely and effectively, it creates 
barriers to information literacy instruction. This flies in the face of 
hundreds of years of educational theory - why would you limit 
access to interactive Web applications in the one place where 
students can learn to use them safely?
        Fortunately, thousands of public and school libraries across the 
country, along with websites like Ms. Aftab's WiredKids.org, are 
doing an outstanding job in helping parents teach children how to 
use the Internet safely and responsibly. For example, Baltimore 
County Public Schools and the Baltimore County Public Library 
co-sponsored a Family Guide to Child Safety on the Internet, a 
valuable resource for helping parents teach their kids the do's and 
don'ts of web surfing. 

Local decision-making - not federal law - is the way to solve the 
problems addressed by DOPA.
        As advocates for effective use of information, librarians and 
teachers are fully committed to helping young people have safe 
online experiences; furthermore, we teach young people the 
information literacy and critical thinking skills they need to use the 
Internet safely and effectively. We reach the goal of educating kids 
to safely use online tools with information literacy education 
programs as described above, and through locally-developed 
online safety policies, which in many cases include the use of 
technological barriers like filters. In other words, many of the 
problems that DOPA seeks to remedy are already addressed at the 
local level.
        About 80% of all public library funding is local, library 
programs are developed to be responsive to local requests, and the 
policies governing libraries are developed with local trustees and 
community members; comparable policy decisions are made by 
school boards. Federal legislation like DOPA robs libraries and 
communities of local decision-making and control. Decisions 
about what is best for an individual community should be made by 
the community itself.

DOPA would restrict access to technology in the communities that 
need public access most.
        According to recent statistics from the U.S. Census Bureau the 
digital divide is large and does not appear to be shrinking. 
Currently, roughly one out of seven African Americans and only 
one out of eight Hispanics subscribe to broadband service at home. 
Meanwhile, 26.1% of whites and a full one third of Asians have 
broadband at home.  Further, according to a Gates Foundation 
report on the role of libraries in Internet access, African Americans 
and Hispanics "rely exclusively on the library computer for 
Internet access to a greater degree than their white and Asian 
counterparts," with approximately a fifth of African American 
users and nearly 16% of Hispanic users exclusively relying on 
library-based computers. Also, nearly a third of those in the lowest 
income bracket who use library computers rely exclusively on 
them.  These data indicate that public access computing in libraries 
is playing an important role in closing the digital divide.
        Since DOPA, as presently drafted, would require libraries and 
schools receiving E-rate discounts through the Universal Service 
Program to block computer users from accessing Interactive Web 
applications of all kinds, opportunities for those who do not have 
Internet access at home would be further limited. 
        There is a great deal of research being conducted on young 
people and their use of the Internet and interactive applications.  
There is much to learn from this research about educating young 
people and helping them to safely use the Internet.  For instance, 
research shows that use of the Internet, including interactive sites, 
leads to improved reading and other academic successes.  Sadly, 
research reported by Bruce Bower indicates that "children most 
likely to benefit from home Internet access are the very children 
least likely to have [it]." 
        The ALA would like to affirm the importance of online 
interaction and collaboration and the development of essential 
information literacy skills. We at ALA stand ready to work with 
you, to assure that our children are protected, educated, informed 
and made as safe as possible.


Biography for Beth Yoke
        Beth Yoke earned a B.A. in History from Gettysburg College 
in 1991, a teaching certificate from Tulane University in 1995 and 
a Masters in Library and Information Science from Louisiana State 
University in 1998.  From 1991-1993 she taught in Orleans Parish 
Schools, New Orleans, LA, as a member of the Teach for America 
corps.  From 1993-1997 she continued her teaching career in 
Orleans Parish Schools.  While pursuing her masters in Library 
and Information Science, Yoke worked at in the research and 
development library for Albemarle Corporation in Baton Rouge, 
LA.  After completing graduate school, Yoke worked as a high 
school librarian in Stafford, VA then as a university librarian at 
Fairmont State University in Fairmont, WV.  At Fairmont State 
Yoke coordinated the online school library media certification 
program and became active in the West Virginia Library 
Association, where she served as first as chair of the School 
Library Division and later as WVLA's Second Vice-President.  
Since 2004 Yoke has served as Executive Director of the Young 
Adult Library Services Association (YALSA), the fastest growing 
division of the American Library Association.

        MR. UPTON.  Mr. Zellis, we will hopefully conclude with you 
and we will break and go vote, so go ahead.  
        MR. ZELLIS.  Chairman Upton and members of the committee, 
ladies and gentlemen, thank you for the opportunity to be here 
today to talk about the serious issue that affects our most treasured 
resource, our children, and our efforts to protect them from the 
dangers of social networking sites that exist on the World Wide 
Web.  
        My name is David Zellis and I am the highest-ranking 
prosecutor next to the elected district attorney in Bucks County.  I 
have spent the last 22 years fighting in the courtroom to put 
criminals behind bars.  My courtroom experience involves every 
type of case including capital murder.  I also worked hand in hand 
with law enforcement as they investigated criminal activities.  One 
could say that during my tenure as a county prosecutor I have seen 
it all.  Despite my exposure to all kinds of criminal behavior, I, like 
many of my colleagues, have been shocked and dismayed by the 
latest rage, politely known as social networking sites, but 
commonly known as MySpace, Friendster, Facebook, and Xanga.  
        It was not many years ago the police arrested and I prosecuted 
child molesters for making advances toward our children on the 
street corner or some park.  It was not that long ago the drug 
dealing took place on the street corners and I locked those drug 
dealers up.  And it was only a short time ago that bullying meant 
beating up a kid on the playground.  
        Times have changed.  The Internet and these social networking 
sites have redefined, reinvented, and reinvigorated child predators, 
drug dealers, and bullies.  Now sexual predators troll the social 
networking sites rather than the streets and get all of the 
information they need in order to groom children for the ultimate 
purpose of victimizing them.  Drug dealers in suburban 
communities like Bucks County can now conduct business in 
cyber space instead of on the street corner, and bullies do not have 
to throw a punch when they can go on the Internet and engage in 
cyber bullying and inflict more pain and suffering on kids than a 
night on the school yards used to cause.  
Bucks County, Pennsylvania is a diverse northern suburb or 
Philadelphia-- 
        MR. UPTON.  Keep going.  
        MR. ZELLIS.--with over 600,000 residents.  It represents a 
typical suburban community.  We have areas where crime is higher 
than other areas, but on the whole, the streets of Buck County are 
very safe.  The Information Superhighway, however, poses a 
significant challenge to law enforcement, schools, parents, and 
legislators as we try to balance the benefits and the dangers that 
lurk in cyberspace.  
        There are four recent cases that occurred in Bucks County that 
poignantly illustrate the dangers posed by such sites as MySpace.  
In the first case, a 14-year-old boy had his profile posted on 
MySpace.  In April of 2006 he was contacted by a male posing as a 
teenager, who convinced the 14-year-old to lie to his mother and 
have her drop him off at the local mall.  The male met the 
14-year-old at the mall and then took him to a motel where he had 
sexual intercourse with the child.  This scenario has happened on a 
number of occasions and was only discovered when a school 
official overheard the 14-year-old's conversation with a friend and 
reported it to law enforcement. 
        Following the arrests, the male perpetrator was identified as a 
25-year-old.  The 14-year-old who had never been in trouble 
before and prior to this had no sexual experience.  The sexual 
predator now sits in the Bucks County prison awaiting trial.  
        The next case is one of the first cases in which law 
enforcement arrested someone for selling drugs on MySpace.  Not 
only was this juvenile selling drugs on MySpace but he was 
pictured on MySpace with an assortment of guns.  
        The third case involves a 13-year-old girl who posted her 
pictures on MySpace.  A male began conversing with her on the 
Internet.  Fortunately, the child's mother contacted law 
enforcement and the police took over the conversations with this 
sexual predator and ultimately arrested him.  He was identified as a 
male who was working in an OB-GYN office.  
        Finally, we have seen street gangs taking advantage of the 
opportunities provided through social networking sites, and such 
street gangs as the Bloods and the Crips used the site's social 
networking recruitment tools in the suburbs.  Too often as a society 
we think that sexual predators' Internet crime is somebody else's 
problem, not ours.  Those of us in law enforcement know that 
nothing could be further from the truth.  
        These four examples within the last 6 months indicate the kinds 
of criminal activity in cyber space know no boundaries and now 
happens on a national/international level.  My office is not only 
prosecuting such cases in court, but we are proactively engaged in 
prevention activities.  We have gone into the elementary, middle, 
and high schools to educate students about the dangers involved in 
social networking sites.  We have held town meetings around the 
county about how to keep their children safe on the Internet.  
These programs have been well received by students and parents 
and it has become clear to us that parents and most kids do not 
want pornography or sexual propositions to interfere with their use 
of the Internet.  
        During the course of our town meetings with parents, we have 
found a hunger on the part of parents to learn as much as they 
possibly can, because parents legitimately feel they are playing 
catch-up to their children when it comes to the Internet.  One of the 
critical components of the Deleting Online Predators Act is 
requiring the Federal Trade Commission to create a website which 
can be used as a resource for parents, teachers, and others 
regarding the dangers on the Internet to child users.  
        In addition, to require that the Federal Trade Commission issue 
alerts is critical to providing parents and teachers with worthwhile 
information that they crave.  
        This begins to address one of the most significant concerns, 
and that is that no one is controlling the Information Highway.  
        Finally with respect to the Deleting Online Predators Act, if 
you knew that a child molester was going to the library or to the 
school and grooming children for future sexual exploitation, would 
you allow such behavior to go on?  Of course not.  But that is 
exactly what is going on when children in the school or at the 
library are permitted to freely access commercial networking sites 
like MySpace and chat rooms while sexual predators lurk in their 
midst on cyber space.  We cannot and should not permit our 
children to fall prey to the exploits of sexual predators while they 
are at school or at the library.  We have seen firsthand that when 
law enforcement officers pose as a teenager online, sexually 
explicit instant messaging and solicitation occur quickly and 
rampantly.  There can be no doubt that a child's innocence, and 
perhaps even more, can be lost in an incident on the Internet.  
        On behalf of Bucks County, we endorse the act because it 
educates parents and children about the dangers of the Internet and 
limits access to certain sites during the school days.  Our children's 
safety must come first. 
        [The prepared statement of David W. Zellis follows:] 

PREPARED STATEMENT OF DAVID W. ZELLIS, FIRST ASSISTANT 
DISTRICT ATTORNEY, OFFICE OF THE BUCKS COUNTY DISTRICT 
ATTORNEY, COMMONWEALTH OF PENNSYLVANIA

	Chairman Upton, members of the committee, ladies and 
gentlemen.  Thank you for the opportunity to be here today to talk 
about a serious issue that affects our most treasured resource, our 
children, and our effort to protect them from the dangers of "social 
networking sites" that exist on the World Wide Web.
	As the highest ranking prosecutor next to the elected District 
Attorney, I have spent the past twenty-two (22) years fighting in 
the courtroom to put criminals behind bars.  My courtroom 
experience involves every type of case, including capital murder.  I 
also work hand in hand with law enforcement as they investigate 
criminal activity.  One could say that during my tenure as a county 
prosecutor "I have seen it all".  Despite my exposure to all kinds of 
criminal behavior, I, like many of my colleagues, have been 
shocked and dismayed by the latest rage, politely known as "social 
networking sites", but commonly known as MySpace, Friendster, 
Facebook and Xanga.
	It was not that many years ago that police arrested and I 
prosecuted child molesters for making advances toward children 
on the street corner or in the park.  It was not that long ago that 
drug dealing took place on the street corners, and I locked those 
dealers up, and it was only a short time ago that "bullying" meant 
beating up a kid on the playground.  Times have changed.  The 
internet and these social networking sites have redefined, 
reinvented and reinvigorated child predators, drug dealers and 
bullies.  Now sexual predators troll the social networking sites 
rather than the streets, and get all the information they need in 
order to groom children for the ultimate purpose of victimizing 
them.  Drug dealers in suburban communities like Bucks County 
can now conduct business in cyberspace instead of the street 
corner.  And bullies do not have to throw a punch when they can 
go on the internet and engage in cyber bullying and inflict more 
pain and suffering on kids than a fight in the school yard used to 
cause.
	Bucks County, Pennsylvania, is a diverse northern suburb of 
Philadelphia.  With over 600,000 residents, in many ways it 
represents a typical suburban community.  We have areas where 
crime is higher than other areas, but on the whole the streets of 
Bucks County are very safe.  The information superhighway, 
however, possesses a significant challenge to law enforcement, 
schools, parents and legislators, as we try to balance the benefits 
and the dangers that lurk in cyberspace.
	There are four recent cases that occurred in Bucks County that 
poignantly illustrate the dangers posed by such sites as MySpace.  
In the first case, a fourteen year old boy had his profile posted on 
MySpace.  In April of 2006 he was contacted by a male posing as a 
teenager, who convinced the fourteen year old to lie to this mother 
and have her drop him off at the local mall.  The male met the 
fourteen year old at the mall and then took him to a motel, where 
he had sexual intercourse with the child.  This scenario happened 
on a number of occasions, and was only discovered when a school 
official overheard the fourteen year old's conversation with a 
friend, and reported it to law enforcement.  Following the arrest, 
the male perpetrator was identified as a twenty-five year old.  The 
fourteen year old had never been in trouble before, and prior to this 
had had no sexual experience.  The sexual predator now sits in the 
Bucks County Prison awaiting trial.  
	The next case is one of the first cases in which law 
enforcement arrested someone for selling drugs on MySpace.  Not 
only was this juvenile selling drugs on MySpace, but he was 
pictured on MySpace with an assortment of guns.
	The third case involves a thirteen year old girl who posted her 
pictures on MySpace.  A male began conversing with her on the 
internet.  Fortunately, the child's mother contacted law 
enforcement and the police took over the conversations with this 
sexual predator and ultimately arrested him.  He was identified as a 
male who was working in an OB/GYN office.
	Finally, we have seen street gangs taking advantage of the 
opportunities provided through social networking sites, and such 
street gangs as the Bloods and Crips use the sites as a recruitment 
tool in the suburbs.
	Too often as a society we think that sexual predators and 
internet crime is somebody else's problem, not ours.  Those of us 
in law enforcement know that nothing could be further from the 
truth.  These four examples which occurred in Bucks County 
within the last six months indicate that the kind of criminal activity 
in cyberspace knows no boundaries, and now happens on a 
national and international level.
	My office is not only prosecuting such cases in court, but we 
are proactively engaged in prevention activities.  We have gone 
into elementary, middle and high schools to educate students about 
the dangers involved in social networking sites.  We have held 
town meetings around the county to educate parents about how to 
keep their children safe on the internet.  These programs have been 
well received by students and parents, and it has become clear to 
us that parents and most kids do not want pornography or sexual 
propositions to interfere with their use of the internet
	During the course of our town meetings with parents, we have 
found a hunger on the part of the parents to learn as much as they 
possibly can, because parents legitimately feel that they are playing 
"catch up" to their children when it comes to the internet.  One of 
the critical components of the Deleting Online Predators Act is 
requiring the Federal Trade Commission to create a website which 
can be used as a resource for parents, teachers and others regarding 
the dangers on the internet to child users.  In addition, the 
requirement that the Federal Trade Commission issue consumer 
alerts to parents and other regarding the potential dangers of 
internet child predators is critical to providing parents and teachers 
with worthwhile information that they crave.  This begins to 
address one of the most significant concerns, and that is that no 
one is controlling the information highway.
	Finally, with respect to the Deleting Online Predators Act, if 
you knew that a child molester was going to the library or to a 
school and grooming children for future sexual exploitation, would 
you allow such behavior to go on?  Of course not.  But that is 
exactly what is going on when children in school or at the library 
are permitted to freely access commercial networking sites like 
MySpace and chat rooms, while sexual predators lurk in their 
midst in cyberspace.
	We cannot and should not permit our children to fall prey to 
the exploit of sexual predators while they are at school or at the 
library.  We have seen first hand that when a law enforcement 
officer poses as a teenager on line, sexually explicit instant 
messaging and solicitations occur quickly and rampantly.  There 
can be no doubt that a child's innocence and perhaps even more 
can be lost in an instant on the internet.
	On behalf of Bucks County District Attorney Diane E. 
Gibbons, we wholeheartedly endorse the Deleting Online Predators 
Act because it educates parents and children about the dangers of 
the Internet and limits access to certain sites during the school day.  
Our children's safety must come first.


        MR. UPTON.  Thank you.  I am going to have to stop.  We have 
less than 5 minutes to go on this vote.  We will come back about 
12:15.
[Recess.]
        MR. FERGUSON.  [Presiding]  Chairman Upton will return 
shortly.  I had some questions for the Attorney General but I don't 
see him.  I know he has to go at some point.  So I wanted to make 
sure we got to him first.  
I am going to start with Mr. Zellis.  We appreciate you being 
here today, and all of our witnesses.  How much of an impact do 
you believe that limiting access to social networking sites and chat 
rooms at schools and/or libraries would have in terms of the crimes 
you see in your own experience in Bucks County?  
        MR. ZELLIS.  It is very hard to say.  If we could save one child 
then it is worth it, because that one child, that innocent child who 
may fall prey during the school hours or at a public school to a 
sexual predator because the legislation wasn't enacted, would just 
be a catastrophe for that child, for that family, and for that child for 
the rest of his or her life.
        MR. FERGUSON.  But in terms of your own experience, it is 
tough to say with specificity as to how this legislation might be 
able to assist you in catching some of these folks.
        MR. ZELLIS.  I did check around my office before coming 
down today to --
        MR. FERGUSON.  Keeping it from happening.
        MR. ZELLIS.  And we are not aware of any case to date in our 
jurisdiction that involves a child falling prey as a result of being 
online at school or in the library.  But that could change this 
afternoon.  That could change tomorrow.  This is an evolving 
problem in our community. 
        MR. FERGUSON.  Thank you.  
Mr. Attorney General, thank you again for being with us here 
today.  How aware do you find that parents are with regard to the 
content and the potential danger at these sites?  Clearly kids are 
ahead of parents many times when it comes to new technology.  
Do you find that parents at this point are doing a good enough job, 
or how widespread is the problem of kids being ahead of their 
parents with regard to this technology, particularly with these 
social networking sites?  
        MR. ABBOTT.  Let me fully answer that, if you don't mind, if I 
could follow up and add on to the last comment.  And I came in 
maybe after the question was already asked, but my perception was 
any of these kids who are assaulted online, at school, then go out 
and get assaulted.  I may not have perceived that correctly.  But 
here is the deal of where that would typically work.  They would 
be online on one of these social networking sites at school or at 
home.  They will chat perhaps for days before they will eventually 
decide to go ahead and make the decision, yeah, I can trust this 
other 14-year-old boy.  I will show up at the mall and meet him.  
It is not something that typically happens like that.  They chat 
for 5 minutes at school.  Meet you after school, for someone they 
have never met before.  So the school location would be one of 
several different locations.  School, home, and maybe a friend's 
house.  These children will chat for a while before they will 
eventually make the decision to show up and wind up getting 
assaulted. 
        MR. FERGUSON.  So in terms of the legislation, if you close off 
one of those opportunities, perhaps it will have some impact.  Is 
that what you are saying?  I was asking about the bill that we are 
talking about today in terms of schools and libraries.
        MR. ABBOTT.  The reality is, if you close off one opportunity, 
it doesn't mean that children will not access the networking 
websites.  It means they will do it at home or do it at a friend's 
house, someplace other than schools.  So shutting it down at 
school--put it this way.  Putting restrictions on children's access to 
this, putting things like age verification in there, things like that 
will all be steps in the right direction.  But if the goal is to shut it 
down at one place and pretend that that is going to solve the whole 
problem, that probably won't achieve a whole lot because kids go 
to friends' houses or homes or wherever else, perhaps in an 
unsupervised situation, and wind up getting caught in the same bad 
scenario.  
        But I would think that limitations on access, age verification, 
like we have talked about before, to ensure that children for one 
are not going to be subjected to pornographic or otherwise age 
material, other kind of restrictions would be helpful for children.  
But if I could, let me address your question about education 
because we find that parents are woefully uneducated about this.  
They feel like they are not up to speed.  Like was testified earlier, 
we have put on several  town hall meetings where we have seen 
literally hundreds of parents come in to one meeting and they are 
absorbing this information as quickly as possible, eager to learn 
everything they possibly can to find ways that they can do 
something to help protect the children.  
        And I will tell you this:  It kind of demonstrates exactly where 
a parent stands on this.  What we do when we put on our town hall 
meetings, we tell parents about the problem.  We go into it and all 
that kind of stuff, and about 15 minutes through the presentation 
we log onto MySpace and we plug in only the school where we are 
putting on the town hall presentation or only the zip code that we 
are in, and we put in only an age bracket of about 2 years that 
would include juniors and seniors; and all of a sudden these 
pictures come up; pictures and names that parents recognize and 
students recognize, and you can hear audible gasps in the audience 
about parents not realizing that their children are on these websites.  
Sometimes very provocative pictures, and parents are aghast at 
what is going on.  
        So they are pretty much--some parents are completely 
unaware.  Some of them--many people have heard about MySpace 
now, but don't know what it does.  They need a vast amount of 
information quickly to help protect their children.  One thing--I 
know you want to ask a question, if I can make this one key point. 
        MR. FERGUSON.  I know your time is short but my time is 
short.  I have a more specific question about language in the bill.  
        Some have raised concerns about language in the bill about this 
prohibiting minors from being able to easily access--and those are 
words from the bill--easily access obscene content or otherwise 
easily be approached by predators online.  In your written 
testimony, you had raised some concerns with this language.  You 
didn't mention it in your verbal testimony.  Can you expand a little 
bit on your thoughts on the language "easily access"?  
        MR. ABBOTT.  As a lawyer who litigates cases in court, as a 
former judge, I believe the word "easily" would be categorized as 
vague.  It is hard to know exactly what that means.  Frankly, I 
can't tell you what it means.  And if we had 12 different jurors we 
could have 12 different decisions about what it means.  
        Now, the position I would advocate probably would be one 
different than some other folks on this panel.  I think an easy 
solution for it is to delete the word "easily," so that it just goes 
straight to "access."  But the word "easily" is potentially vague, 
and here is what would wind up happening if the bill passed with 
this current language.  We would all spend years in court litigating 
what "easily" means, and the evidence will be put on, no, we are 
not easily accessible and the evidence would be put on, yes, you 
are.  So it would lead to litigation that would frustrate 
implementation of the bill.  
        MR. FERGUSON.  I recognize Ms. Eshoo for questions.  
        MS. ESHOO.  Thank you, Mr. Chairman.  I want to thank all of 
the panel.  I have learned a great deal from listening to you this 
morning--from law enforcement, Attorney General, and Mr. Zellis; 
the horror of what is taking place.  And I certainly want to salute 
you for the work that you are doing to bring these predators to 
justice.  To all of the other panelists, thank you.  
        Ms. Aftab, it seems to me a lifetime of work that you are doing.  
Mr. Davis, I think that you have really offered a solid model of 
how to address this, and I want to thank you for your work.  To 
Chris Kelly and the work that you are doing, which I think really is 
the model for any social networking operation, the work that you 
are doing and that they all have someone like you.  We need to 
clone you.  To the Pew Center, and I think what you have put out 
should be kept in the top drawer of everyone's desk here because it 
is unbiased, solid information about how everything works.  To the 
libraries, who are absolutely terrific.  
        Now it seems to me that the intention of the authors of the 
legislation is really very good but it is really not the prescription to 
handle this.  
        The language in the bill as I see it, on page 2, I think it is line 
24, "may easily access or be presented with obscene or indecent 
material," I don't really know what that means legally.  And I think 
the Attorney General just suggested that the world "easily" be 
dropped.  
        But if we just go with "access," I think, Mr. Attorney General, 
we need to appreciate that Google will be completely knocked out 
of business in schools and libraries; Yahoo, anyone in the Internet 
business, is in one fell swoop going to be erased.  And that is not 
pragmatic.  That is not what we are going to do.  But we are still 
left with the challenge of addressing this.  
        What I would like to press, whomever would like to come up 
with a prescription here, what your prescription would be.  It 
seems to me, just off the top of my head, I think that if the 
Congress had actually put into place broadband for everyone in the 
country and we had money in it, then we could restrict the money.  
And that would be I think a win-win.  But since we don't have a 
national broadband policy, that is not in the offing right now, that 
being able to restrict any funding that would be attached to that is 
not something that we are going to be exercising.  
        Now, having said that, knowing the language of the bill not 
really being workable, I mean it is again the case of the intentions 
are great but it is not the way we are going to resolve it.  
        Let me ask the law enforcement people, number one.  Maybe 
you don't agree with me.  If you don't, say so.  What is your 
prescription for a solution to this?  
        MR. ABBOTT.  A couple of things.  And these are things that 
may be coming from left field with regard to these particular bills, 
but these are the things that we in the law enforcement field need 
to see and need to see from the social networking sites and 
basically anyone, and that is we must have better retention of IP 
records or logs.  Literally, as we speak, records of predators are 
being lost and deleted.  Retention periods must be extended to give 
law enforcement time to issue the legal processes that are needed 
to obtain the records for evidentiary purposes.  That is for one.  
        For another, education has been talked about a lot as absolutely 
necessary.  The providers of this software, the providers of these 
sites, can take the lead in ensuring the education is provided.  They 
are on the site.  So those would be two things.  
        Age verification, again, I believe would be very helpful.  
        MS. ESHOO.  Chris, do you want to speak to this, please--
        MR. KELLY.  Age verification, we use kind of a proxy process 
for age verification in terms of associating people with an 
associated high school.  That seems to be about as effective as we 
have been able to get it, as we talked about on the dialoguing.  
There is a lot of public record checking.  But we found that the 
approximate e-process through the high school association is 
relatively good in terms of keeping in terms of keeping under-13s 
off the site, and that is a standard that has been set by Congress, 
obviously, in whether or not you need verifiable parental consent 
at that stage.  So that for age verification, that seems to be 
somewhat workable for us.  
        But we don't have the only model in the industry and we do 
think that there are a number of good things facilitated by some of 
the other sites.  I mean, we like our model the best, but we don't 
think the others should be outlawed.
        MR. ABBOTT.  If I could very briefly say one thing about their 
website.  I don't believe that any of these sites are perfect, but I 
believe that the program that Facebook has created is superior.  If 
you compare it to the real world of neighborhoods, where all of 
you live, you have seen so-called safe neighborhood programs.  
They do as well of a job as I have seen at creating safe 
neighborhoods, neighborhoods that are confined.  And that I think 
is a superior approach to what we have seen elsewhere.  Perhaps 
you can look at some aspects of their model and require those 
similar components to be required above the board.  
        But don't get me wrong; I am not going to concede your model 
is perfect.  It is a great first step.  
        MS. ESHOO.  I think what we have to keep in mind, 
Mr. Chairman, is that there isn't any such thing as good technology 
and bad technology.  Technology is neutral in that sense.  It is how 
it is used and how we help shape the direction of it.  But we really 
can't go after the technology itself.  This is really a sticky wicket 
because we have some constitutional issues involved in this as 
well.  
        So, I am over my time.  Now I will stop.  I really want to thank 
the Chairman for the hearing and for the testimony today because I 
find it is enhancing.  So thank you. 
        MR. FERGUSON.  Mr. Shimkus.  
        MR. SHIMKUS.  Thank you, Mr. Chairman; and I appreciate you 
all coming.  
        This is a legislative hearing, but sometimes we digress and 
address things.  My good friend Anna and I work on a lot of these 
issues together; and this is very similar, I think, to the discussions 
we had years ago when we started doing the actual purchasing of 
items and goods over the Internet, remember, with digital 
signatures.  VeraSign was in here.  
        So my first--one of my questions was--Anna, you were already 
mentioning to Chris--was age verification; and my comment, based 
on listening to the testimony, is a program like VeraSign or some 
authentication, which has really been successful, and it was a 
private sector, it was technologically neutral, but it had some 
standards by which we could allow some current commerce to 
flow and identification really be taken--
        I mean, how many times do we do stuff now--I mean, there is 
identity theft.  We still have problems.  I mean, we are still in a 
central world.  There is still going to be bad guys who figure out--
but for most of us, when you can do on some standards-- 
        So you kind of addressed it, Chris, but, I mean, is that the 
approach that we have--is this a third-party age verification 
process?  You can out there, in essence, do that?  I mean, you 
shake your head, no, Parry, but we do it for commerce.  
        MS. AFTAB.  If I may, the reason I am shaking my head no, we 
can do it technologically, but the kids won't buy it.  So I have just 
finished polling 14,000 pre-teens and teens over the last 4 months 
in person, face to face; and they are scared.  I have never seen kids 
scared before.  
        MR. SHIMKUS.  These are the same kids who are going to 
download a piece of music for, what, 75 cents a song, 25 cents a 
song.  
        MS. AFTAB.  Or for free.  
        MR. SHIMKUS.  But probably have more discretionary income 
than any kids in any generation before.  
        MS. AFTAB.  Because they are not paying for music.  
        But, Mr. Shimkus, what they all say to me, we want 
authentication.  We want the site to know who everyone is.  
        One girl who lives on a Marine base in Yuma said the answer 
is to keep all boys over the age of 14 off MySpace.  
        MR. SHIMKUS.  Let me interrupt you there.  But wouldn't there 
then be a market?  
        MS. AFTAB.  Yes, except--
        MR. SHIMKUS.  I am a market Republican, believe market 
principles, wouldn't someone set up a Facebook for girls?  
        MS. AFTAB.  Well, what happens is--
        MR. SHIMKUS.  With authentication--I mean, we still have 
girl's schools.  We still have guy's schools.  
        MS. AFTAB.  The kids don't want parents involved in 
authentication.  They don't want schools involved in 
authentication.  
        MR. SHIMKUS.  They are kids.  They are kids.  
        MS. AFTAB.  You can authenticate them, but they won't go 
there.  So they will go someplace else.  
        There is a model that Facebook is using which is for the 
school, school e-mail addresses.  Xanga is now using some new 
models that are having kids identify each other.  YFly, the new one 
with Nick Lachey, will do that, but the kids will go someplace else 
because they don't want their parents and schools to know who 
they are.  They want the site.  
        MR. SHIMKUS.  I do have the basic problem with the premise 
that kids are adults, and that brings a parenting aspect back into 
this.  As much as we are going to push industry and individuals 
and government to solve this problem, it is still a parental issue.  
        MS. AFTAB.  Yeah.  I just want to be clear.  I am not saying 
that we should let kids run it.  What I am going to tell you, as much 
as we can set these things up, it won't work because the kids won't 
do it.  They will just go underground someplace else tomorrow.  
And that is our only concern, as we have been facing this.  
        MR. KELLY.  If I may jump in a minute.  
        MR. SHIMKUS.  Please save me.  
        MR. KELLY.  You want to have some means by which they are 
associated with the community and that enables not just the basic 
sort of identity verification but it has the community aspect over 
time of saying this person is a member of this community or not.  
        MR. SHIMKUS.  That is what you do.  
        MR. KELLY.  That is what we do at this point.  By only 
allowing that to be associated with particular high schools, we 
have a proxy for age at that point because there just aren't many 
12-year-olds or under in high schools.  It is not perfect, 
nonetheless, but it gets the job done better than a lot of other means 
and, without driving kids away.  So it is a balance there, as Parry 
articulates, between imposing a great number of burdens on kids in 
terms of authentication of their identity and driving them to sites 
that just wouldn't have anything at all.  
        MR. SHIMKUS.  Well, and the Attorney General mentioned that 
you have a particular--I mean, he praised what you all do, and that 
may be a good model.  
        Again, my premise is our kids; and if we don't get them in 
some arena by which they can do this that is somewhat controlled 
then there are no controls.  
        MR. KELLY.  Our preferred method is to validate with e-mail 
addresses, and we can only do that right now for 15 percent of high 
schools.  We are constantly looking at effective non, deterring 
ways to get kids into validated networks in a meaningful way 
without driving them away.  
        MR. SHIMKUS.  Yeah.  I have three small boys, and I am 
watching this development.  I taught high school for 4 years, and I 
grew up, so I am trying to remember my history of growing up 
versus what my kids are going through.  
        And when I taught psychology, talking over the phone was the 
way that you shared information discretely with your friends for 
hours--I don't want to typecast it to girls, but I think primarily it 
was--but they wouldn't have shared as much information if they 
knew it was a party line.  
        What the problem is, people don't understand that this is a 
party line, and it is huge.  
        Let me ask--if you know the answer, don't answer the question.  
I want to ask everybody.  Is there a safe site for kids for 
information services now on the Internet?  Just go from left to 
right.  
        MR. ABBOTT.  For information services?  
        MR. SHIMKUS.  For information.  
        MR. ABBOTT.  A safe site?  
        MR. SHIMKUS.  A safe site.  
        MR. ABBOTT.  I don't have one at hand.  
        MR. SHIMKUS.  Okay.  Good.  That is a no.  
Parry, do you know the answer?  
        MS. AFTAB.  Can I give you maybe?  I mean, Toontown with 
Disney is interactive safely because it is a dropdown menu, but, 
otherwise, no.  Because it is not--
        MR. SHIMKUS.  Okay.  Next.  
        MS. COLLINS.  Well, the National Center for Missing and 
Exploited Children, we actually have a website set up for kids, 
netsmartz.org--with a Z.  It has information on safety for kids.
        MR. SHIMKUS.  Can you hyperlink out of it?  
        MS. COLLINS.  Actually, we are in control of the website, so, 
no.  
        MR. SHIMKUS.  Okay.  That is good.  
        MR. DAVIS.  I would vote for her site.  
        MR. SHIMKUS.  All right.  
        MR. KELLY.  We would never claim to be perfectly safe.  
        MR. SHIMKUS.  The question is, is there one out there for 
information?  
        MR. KELLY.  I mean, information, there are quite a number--
        MR. SHIMKUS.  That you can't hyperlink out once you go on 
the Internet to get information.  
        MS. AFTAB.  Where people can post information safely?  
        MR. SHIMKUS.  No, just information.  
        MR. KELLY.  To get information safely.  
        MR. SHIMKUS.  The librarian should have this, I hope.  
        MR. KELLY.  Netsmartz does a fantastic job.  
        MR. SHIMKUS.  All right.  You guys are failing.  
Next, next, next.  
        MS. LENHART.  For information about online safety.  
        MR. SHIMKUS.  Not information on online safety.  For 
information, period.  
        MS. LENHART.  Well, as long as there is no interactivity.
        MR. SHIMKUS.  Is there a site that has no interactivity?  
        MS. LENHART.  Sure, sure.
        MR. SHIMKUS.  Next, next.  
        MS. YOKE.  I very much appreciate your question.  
        MR. SHIMKUS.  I am not setting it up for her, but I just pulled 
out this thing, and I have got the list.  
        MS. YOKE.  Sure.  The ALA believes that education is what 
will keep kids safe; and because of the fact that virtually any and 
every website that is out there on the Internet can link to something 
else and nothing can ever be 100 percent safe, leaving your house 
in the morning does not leave you 100 percent safe, that it is 
education that will help parents and kids stay safe.  
        Driving, for example, can be dangerous, but the solution has 
not been to ban teens and young adults from ever getting behind 
the wheel.  The solution has been to provide them with things such 
as drivers education in high schools across the Nation.  And we 
also--
        MR. SHIMKUS.  You are letting me down.  There was a simpler 
answer for you.  
        MS. YOKE.  We also would agree that driving on the 
information highway can also be dangerous.  So what we need to 
do is give kids the skills, tools, and resources so that they can 
become safe and make good choices on the information highway.  
        MR. SHIMKUS.  Okay.  Next.  You failed.  Dagnab it.  I set you 
up for it.  Home run.  
        MR. ZELLIS.  I am on my seat waiting for the answer.  
        MR. SHIMKUS.  Okay.  The answer is--Mr. Markey mentioned 
in opening statements, Attorney General, when you do your town 
hall meetings--I hope you mention this--especially for kids--we set 
it for kids under the age of 13.  Now that I have kids--they are way 
past that, but it is good for kids 6, 7, 8, 9--www.kids.us.  It is a safe 
site for kids for information.  
        Now there are over 20 users, and the American Library 
Association is a member:  Americanlibraryassociation.kids.us.  
ABC.kids.us, American Library--I said that--games.kids, info.kids, 
connects.kids, music.kids, newyork.kids.  Texas should be on here.  
Shimkus should be on here.  
        So I am taking myself--there are no hyperlinks.  There are no 
chat rooms.  It is information-based only.  
        My sister has just got her degree in education as a third or 
fourth career.  I went to her class on information technology, took 
my 4-year-old with me; and the way my 4-year-old climbs up on 
the desk, he hits E for Internet Explorer and what is his default?  
Kids.us.  Can he go anywhere from there?  No.  It is a safe site for 
kids that we passed here in legislation that it is part of my job to 
make information available, to talk about it because it works; and I 
just hope you take that back with you.  
        My time is way expired.  Thank you.  
        MR. FERGUSON.  The gentleman from New York, Mr. Engel, 
for questions.  
        MR. ENGEL.  Thank you very much, Mr. Chairman.  
        My youngest child is 12, very, very bright young man, but I 
always tell him he is like an addict when it comes to the computer.  
I mean, he comes home from school, and the first thing he does is 
he goes down to the basement and starts with the computer, and he 
is not doing his homework, he is chatting or whatever, and it is just 
a terrible thing.  
        We had a bill that I am doing with the chairman which actually 
passed the House.  It has nothing to do with this.  It is a spoofing 
bill.  And one of the things that I said was the problem is we are 
always playing catch-up.  Because the bad guys are doing things 
and then we find out about it and then we play catch-up to try to 
thwart them.  
        It is very similar here.  I think the bill is fine.  Targeting 
schools and libraries as a condition of E-rate funding is fine, but I 
think that it is only a very small, little part.  I guess we have to start 
somewhere, but I think the bill really doesn't solve the problem.  
Because, just as our children are the first generation to grow up 
with the personal computer, we are the first generation of parents 
to be raising children with these computers.  So the whole thing is 
frustrating.  
        I am thinking, why aren't we doing a massive education 
campaign for parents to learn how to protect their children in the 
online world?  I mean, I am so far behind my children it is really 
almost a joke.  
        Mr. Shimkus talks about his 4-year-old, well, my 12-year-old is 
my youngest; and he can just run circles around me.  When I get 
stuck on the computer, I call him and he--oh, dad, all you need to 
do is this.  
        So, Ms. Aftab, in your written testimony you say, while this 
may appear on its face to be an easy answer, it is neither easy nor 
the answer.  And I agree with you.  I pulled that out because I 
thought that I would agree with you.  
        So I don't know what to say.  I want to just give you an 
opportunity to expand on that, because I think that sort of sums up 
the way I feel.  And I have a couple of questions if anyone else 
would care to answer.  
        MS. AFTAB.  Thank you very much, Mr. Engel.  
I think that everyone is worried.  Law enforcement is worried, 
regulators are worried, legislators are worried, parents are worried, 
schools are worried, kids are worried.  We have to do something.  
        It sounds easy to turn around and say the one thing we can 
control, schools and libraries, through the E-rate, turn it off.  But 
since all of the social networks, the social network technologies are 
going to be used by all of the ISPs, by all of the big sites, by 
Disney and Viacom and everybody else, it is the future of the 
Internet.  This is where everything is going.  So we would be 
turning off, effectively, the entire Internet with this, number one.  
        Number two, it is not really addressing the issue.  The kids, 
when they are involved with sexual predators, require grooming 
time.  It is hard to do that in the library when everyone is fighting 
for a computer or in the classroom when teachers are watching 
what you are doing, and we find the schools who really know what 
they are doing they are not only blocking social networks.  They 
are blocking ESPN, other sites that are not school oriented.  
Because, during the school day, kids are supposed to be studying.  
        So there may be easier ways of dealing with it that aren't as 
hard to craft that won't turn off the entire Internet and will be more 
effective to the real issue.  
        To my knowledge, around the country, I have not found a case 
where a child has been groomed and sexually exploited because of 
their access from a school computer or a library computer on a 
social network.  I think, instead, if we target getting the FTC 
involved on a global site that is doing Internet safety, they have got 
online on guard already, we are partnering with them, getting more 
stuff into the hands of parents, getting kids aware that even smart 
kids can be targeted and that whatever you post online is public, 
and that that cute 14-year-old boy may not be a cute 14-year-old 
boy, if we can get out there and get everyone involved talking 
together, we can stop the turf wars, find out what our group does 
well, find out what NickNick does well.  Get the Facebook and the 
others to put out PSAs, work with the AGs.  I think if we pulled 
together globally--and I think that this committee can help us do 
that--we can come up with answers.  We can make a real 
difference, and that could be easier.  
        MR. ENGEL.  Thank you.  
        Let me ask Ms. Yoke, from the ALA point of view, H.R. 5319, 
as it is currently drafted, would the ALA support it?  
        MS. YOKE.  Well, the goal of DOPA, keeping children safe, is 
a lot of bull.  ALA argues that a more effective and long-term 
solution would be for Congress to authorize and provide 
appropriate funding for Internet education programs that would 
provide resources and support for adequate numbers of qualified 
school library media specialists and public librarians to serve the 
young people in our communities by providing information 
literacy instruction, Internet safety instruction and so on.  
        ALA suggests that Congress does not need to pass another bill 
calling for technological measures to control Internet content.  
Existing CIPA provisions as well as the local policies and activities 
of our school and public libraries are sufficient.  If Congress feels 
that it must pass such a bill, we would ask that libraries be included 
in the FCC Advisory Committee, the terminology be clarified and 
that local decisions be respected.  
        MR. ENGEL.  Thank you.  
        I would just like to ask, with the Chairman's indulgence, one 
question.  I mentioned the spoofing bill and said we are always 
playing catch-up.  The Internet, obviously, from what everyone is 
saying, and we know this, is becoming an enabling technology for 
predators.  Are any of you aware or can share with us what other 
technologies are out there or in research and development that we 
can use to combat and track down predators?  Anyone aware of 
anything that is out there?  Yes.  
        MS. AFTAB.  Social networks can be very helpful in tracking 
predators.  By putting a button on the profiles, the kids can very 
easily report inappropriate communications with them; and it is a 
great way of doing it.  I know Facebook is very responsive to 
abuse reports.  The YFly site has a "report a creep" button.  If 
someone talks to them, they will report it to law enforcement.  It is 
a great way of mobilizing people and reporting bad things.  
        In addition, if you can have a central site so that people know 
where to report different kinds of crimes.  The CyberTipLine is 
fabulous for missing child issues and child pornography issues, but 
it may not be appropriate for cyber bullying.  People need to know 
where to go when bad things happen to make them stop, and I 
think that using social networks and other sites like that to let 
people know where to report them can be very helpful.  
        MR. KELLY.  We have built very extensive reporting tools into 
our site and background monitoring tools for potentially 
inappropriate activities on the network that will highlight accounts 
that could be being misused in terms of too many friend requests, 
especially too many rejected friend requests, somebody just trying 
to make the initial connections, and that basically enforces the 
protections of the user information that we have built into the 
architecture of our system.  
        MR. ENGEL.  Thank you.  Thank you, Mr. Chairman.  
        MR. FERGUSON.  The author of the bill that we are discussing 
today, the gentleman from Pennsylvania, Mr. Fitzpatrick, is 
recognized for questions.  
        MR. FITZPATRICK.  Thank you, Mr. Chairman.  
        First of all, I appreciate all the suggestions of the members of 
the panel, some very good ones about the need to educate children 
about the dangers of surfing on the Internet, who is out there 
lurking beyond where they can see.  It is not just educating 
children, as we have heard from many of the members, educating 
the parents, Members of Congress, educators.  We certainly need 
to do all that.  
        And, Mr. Davis, I certainly applaud the steps that Fairfax 
County Public Schools have taken.  As you indicate in your 
testimony, you have implemented software technology.  I think 
you indicated you may have procedures in place.  You are 
educating children as well.  
        But the purpose of this hearing in discussing the Deleting 
Online Predators Act is to talk about the efficacy or would it make 
sense to protect children unsupervised while in a school computer 
lab setting from being able to access sites like MySpace.com.  We 
do know from the testimony of the prosecutors who were here that 
there are cases of predators who are out there and predators who 
have used the site to get to children, and so we know the predators 
are on the sites.  They are on MySpace, and MySpace is in the 
school.  
        You seem to be saying, Mr. Davis, it is okay for MySpace.com 
to be in the schools as long as we have a policy and we try to 
monitor it.  Wouldn't it be better in the school setting, just in the 
educational setting, to be prohibiting access to that site because we 
know that there are predators on that site, a predator we would not-
-as Mr. Zellis indicated, we would not let a sexual predator walk 
through the front door of the school, but we are permitting them 
access to the school and classroom setting through the Internet.  
What kind of policies can you have in place to protect children 
from that access?  
        MR. DAVIS.  Okay.  I am not saying that it is okay for students 
to have access to this in schools.  In fact, FCPS, we have blocked 
access to these sites for our students.  
        What I am getting at is that the benefits of imposing this--for 
one, school systems that are already subject to or are using E-rate 
funds are subject to the Children's Internet Protection Act, are 
addressing this issue.  I would expect my colleagues across the 
country to already be looking at these sites and already making a 
decision whether that is appropriate for their school to block or not 
to block that site.  
        FCPS, we have decided to block that site.  I know neighboring 
jurisdictions have made that decision as well.  
        So, no, I am not saying that it is okay.  My fundamental point 
is that the benefits would be marginal.  Marginal benefits, though, 
as indicated down here earlier, if it protects one child that is very 
important.  I truly believe that our students have to be prepared to 
deal with these dangers in life, because that is where they are going 
to experience it.  
        There was a comment made earlier about technology and its 
role in this.  Often, technology is accused of having created this 
problem, and we look to technology to solve this problem.  But, in 
fact, it is people who have created this problem, and it is the people 
who create these problems that we need to target with legislation.  
        MR. FITZPATRICK.  I guess my next question would be to the 
prosecutors on the panel.  Mr. Abbott, who has taken leave for a 
moment.  He is gone.  
        Mr. Zellis, I guess this question could be to you.  You spend 
your lifetime prosecuting criminals and you see during the course 
of your time as a district attorney in Bucks County the methods 
that predators prey on children has changed now in the age of the 
Internet.  I mean, would that be a safe thing to say, that the use of 
social networking sites has given predators a new entree to 
children and is it creating greater challenges for prosecutors such 
as yourself?  
        MR. ZELLIS.  As I stated before, it has reinvigorated and has 
given them a new outlet for preying on children.  What happens is 
this is done totally unbeknownst to the parents.  As we went 
around the county, parents are beside themselves when, as the 
Attorney General said, in Texas--and it was no different in Bucks 
County--we did live online presentations, and it just took a few 
minutes to put up on display somebody posing as a teenager--
teenage girl in this instance--and there were hits galore; and it 
frightened and shocked every parent in the town hall meeting.  
        So we have made adjustments as prosecutors.  I know the court 
system has made adjustments in dealing with it.  But we are 
playing catch-up.  
        MR. FITZPATRICK.  In your opinion, in interviewing child 
victims as witnesses for cases in Bucks County or perhaps other 
anecdotal evidence you may have seen, are children prepared for 
the dangers that they encounter while surfing on the Internet?  
        MR. ZELLIS.  I don't think any child is prepared for it.  I think 
the notion that children have to learn what the real life is like, I 
don't think any child could be prepared for what they are seeing on 
the Internet, and these are children who don't even expect it.  They 
are just typing out instant messages to a friend, and all of a sudden 
somebody pops in there.  And it might be pornography, it might be 
explicit language, or it could just be somebody who is trolling 
around and trying to groom children.  
        So, ultimately it is a major, major problem, and you don't 
expect when you are sending your child to school after monitoring 
their computer use at home or after sending the child to the library 
after monitoring their use at home they are going to be exposed to 
this in the school or library.  I certainly wouldn't expect that of my 
children, and I watch their computer use at home.  So to think I 
would send them to school or to the library, they would have 
unfettered or easy access to these social networks that they don't 
have access to at home, I think gets one's blood boiling; and I 
think for the most part most Americans think that kids don't have 
easy access to these social networks when they go to school or they 
go to the library.  
        MR. FITZPATRICK.  It sounds like in Bucks County you have 
done a number of town hall meetings.  You have done Internet 
safety courses.  Is that your experience?  Is that what parents are 
telling you?  
        MR. ZELLIS.  Yes, it is.  I think parents want to know more, and 
that is why I think the FTC part of the legislation is so critical to 
this legislation.  But I also think that parents would be shocked to 
find out that their kids are going to school and while we are telling 
the parents you have to monitor them at home and watch what they 
are doing on the Internet that in school that they have easy access 
to these sites.  
        MR. FERGUSON.  We are going to go to Mr. Kirk for questions.  
        MR. KIRK.  Thank you, Mr. Chairman; and, once again, thank 
you for having me on this committee.  I applaud this legislation by 
Congressman Fitzpatrick and this hearing.  
        The one thing in our panel we have no formal representative of 
what I would regard as the most important group, parents, and I 
think the feeling that I hear from them is overwhelming with 
regard to this legislation.  So my guess is, Mr. Zellis, that since you 
are a prosecutor, you are probably the closest thing to a parental 
representative here as we can get.  
        I am encouraged by a different corporate policy by one social 
networking site and discouraged by another.  Facebook is here.  
And because Facebook's corporate culture--if you can talk about a 
2-year-old company having a corporate culture--Facebook's 
corporate culture is, because it required the dot edu address at the 
beginning, meant that we were overwhelmingly dealing with adults 
who had crossed the age of 18.  And I think that we should have as 
free and open access on the Internet as adults as possible, but our 
law does not say that with regard to children.  There is compelling 
State interest to protect children and their abilities and their rights.  
        And while Facebook is expanding into the high school arena, 
that concerns me.  Because now you are starting to deal with 
children.  It seems to be very responsive and responsible corporate 
policy to deny access to anyone who is not in the same school 
e-mail group.  So only a sexual predator who is actually going to 
school or a teacher can now get access to those kids, but it would 
be a worry.  
        MR. KELLY.  We are very worried about that.  
        MR. KIRK.  Right, as you should.  Because there is a lack of 
common sense here.  
        In Highland Park, Illinois, we have spent an awful lot securing 
the doors of the school.  As a Congressman, when I come to 
school, I have to report to the administrator before I can go 
anywhere, and I am usually challenged by three or four people 
walking through the school.  And yet MySpace can get an Internet 
predator into the school library unhindered.  That should be an 
enormous problem.  
        When we look at the legislation that is currently drafted, I can 
see that easy access is a definitional point, and I might suggest one 
that would make me comfortable, that easy access to be defined as 
any site that has over 100,000 children online.  At that point, I 
really pretty much know who I am talking about.  And the hundred 
grand worth of children is a pretty big group to then begin to think 
about the United States' legal tradition of forcing anyone who 
makes money off of children to offer a unique level of protection.  
        I just think about when we are in the business of making school 
buses or in selling toys to children, we have unique legal burdens; 
and if you get in the business of making money off of children, you 
have a unique legal burden.  I mean, this legislation calls for 
screening.  
        The other approach, if it was written by the other party from 
the start and we could go down this road, is just to let trial lawyers 
rip you to pieces, open up a whole series of Federal liabilities and 
Federal lawsuits that could be leveled against you and go at it that 
way.  
        So I would just say that the Facebook direction is the way to 
go, except I might hold your business plan at less high school and 
more the rest.  
        With regard to privacy rights of kids, we also talk about I think 
it was one Pennsylvania mom that said, I know that all Americans 
have rights, but with regard to my children at home, I am their 
judge, jury, and executioner.  And I think that largely reflects the 
view of a parent.  
        My question is for David.  In your testimony, you just outlined 
that MySpace.com has now been a center of drug activity, of gang 
activity, and of Internet predators, that if it was any other business 
in any other area would be of unique concern to county law 
enforcement.  Isn't it entirely appropriate that the State get 
involved, especially when we are dealing with children?  
        MR. ZELLIS.  Absolutely.  In fact, I brought a picture of a 
MySpace posting which deals with a gang member; and at the 
bottom it says, which gang you should be in?  And it is the Crips.  
It is a recruitment tool used in suburban Bucks County or any 
suburbia around the country.  So, these pose new and unique 
challenges to all of us.  
        We had in Bucks County one of the first cases involving the 
sale of drugs to--and it was a minor who--so the whole idea of the 
age as being the be-all and end-all--this was a juvenile who had a 
posting with drugs, with guns; and he was in the business of selling 
drugs on MySpace.  
        MR. KIRK.  We just heard in Levittown, Pennsylvania, of a 
gang putting a hit out on the class president; and the high school 
graduation had to be cancelled.  
I would just say in Bucks County--I know the answer to this, 
but in Bucks County is it legal for a gang to come into a library 
and recruit children?  
        MR. ZELLIS.  No.  
        MR. KIRK.  Right.  Nationally, we know from the Drug 
Enforcement Administration and ATF that the average drug gang 
shooter is in the seventh grade.  So since we have done so much to 
protect gang recruiting and prevented that from happening in a 
library or in a school, shouldn't we prevent it from happening in a 
library or a school via the Internet?  
        MR. ZELLIS.  One would hope.  
        MR. KIRK.  Right.  Thank you, Mr. Chairman.  
        MR. FERGUSON.  I want to thank all of our panelists for being 
here today.  This is an extremely important discussion that we are 
having.  It is my hope that we will continue to discuss this topic.  
We certainly thank our out-of-town guests for coming in and thank 
Mr. Fitzpatrick and Mr. Kirk for joining us today.  
        With that, this hearing is adjourned.
        [Whereupon, at 1:03 p.m., the subcommittee was adjourned.] 



SUBMISSION FOR THE RECORD OF ELIZABETH RACINE

        Dear Mr. Chairman:
        My name is Elizabeth Racine; I am the mother of three 
teenagers, and have been a writer, editor, and researcher for the 
past 21 years, specializing in family and parenting issues. I've 
appeared in print over 300 times, with articles in Newsday, The 
Chicago Tribune, as well as in Catholic Parent Magazine, Today's 
Catholic Teacher, and Momentum Magazine. I began using the 
Internet extensively in 1994 for my own research projects as well 
as for those of my editorial clients.  Starting in the year 2000, I 
taught eighth grade in Catholic schools for four years before 
returning to full-time freelancing. 
        As my own children began using the Internet, I have 
vigorously monitored their online usage, as well as that of my 
students, with varying degrees of success. Over the past 12 years I 
have grown increasingly concerned-- and now alarmed-- about not 
only what is available for viewing online, especially to our 
children, but also what our children are posting online as well. 
For the past few years I have been giving talks to parents, 
teachers and clergy about these dangers. My real-life stories and 
images have shocked audiences, who previously had no idea that 
this problem existed.  
        I have served as a resource person for many Catholic reporters, 
and recently appeared on Fox 29's special report on Internet abuses 
by children. Despite the increasing news coverage, there is still a 
vast amount of Internet activity that goes unreported. 
        Lately I have been meeting with members of the House of 
Representatives and the Senate to educate and advise them on 
these Internet risks to our children, in hope that they will increase 
legislation and regulation to help protect them. 
        I am grateful for Mike Fitzpatrick's Bill, H.R. 5319,  the 
Deleting Online Predators Act of 2006. While it is not foolproof, it 
is a starting point, a beacon of hope for those, like me, who have 
seen the Internet's underbelly and are alarmed over what is 
happening to our children online. 
        My goal in writing to you today is to help you better 
understand this attack on our children. It is my great hope that 
Congress will assist parents, like me, who are intensely concerned 
about our children's moral and spiritual development. It is time 
that Congress steps in to help parents protect their children.
I began using the Internet in 1994, and my interest in the 
Internet changed abruptly when my then-7-year-old son came to 
me one day while I was in the garage. 
        "Mommy." he started, lower lip trembling, "I saw something 
on the computer." he looked up helplessly when he couldn't find 
the words. Worried, I asked him to explain what happened.
"I was playing games on Lego.com and then when I was done, 
I wanted to find more games for boys to play -so I typed in 
'boys.com.'" 
        And then he stopped.  Seeing his agitation, I ran to the 
computer to see what would possibly be upsetting him (this was 
1997, long before public awareness of rampant pornography). I 
typed in boys.com and was greeted by an image of a young boy, 
about 12 or 13, performing oral sex on a man.  My 9-year-old 
daughter then piped in that she decided to check girls.com also, 
and found an equally appalling photo on that site. 
        Words cannot adequately describe the dark feeling in the pit of 
my stomach or the primordial mother-bear rage that went through 
me over this loss of my precious children's innocence. This feeling 
still wells up in me; my eyes again fill with tears as I write these 
words. No matter how many times I try, I cannot tell this story 
without crying, which is embarrassing, even though I have told this 
story numerous times to parent and teacher groups, trying to get 
parents to pay attention to what their children are doing online. I 
endure this willingly in order to protect the children who are being 
sought so desperately by an industry-indeed, a society-- that is 
professing to try to keep them safe, but is more concerned with 
"free speech" instead of the protection of children. Pornographers 
and its millions of consumers, are only too happy to snare them 
into the web of addiction to pornography to keep them coming 
back for more. Parents and teachers need to be made aware of the 
need to protect our children, at home and at school and the library, 
so that their innocent web wanderings don't turn into a nightmare. 
        We moved to our current home in the year 2000, where we 
enrolled our children in Catholic school. My 12-year-old daughter 
began using Instant Messenger along with her classmates. I would 
check to see what was going on-I would use drop-down menus 
and see what profiles on  the kids were posting, and which ones 
they were viewing. I was in for the shock of my life.one boy had 
a profile on AOL Hometown, and his profile included graphic porn 
cartoons and links to porn sites, when all these porn sites started 
opening rapid-fire on my computer. If you've ever had this happen, 
you don't soon forget it.a link opens, and then ten, twenty, even 
thirty windows pop open on your screen, and you can't stop 
them-and they are all pornographic. I was aghast, and very 
angry-how can MY computer be subject to this? 
        I became a substitute teacher at their school the first year, and 
was asked to become a teacher the following year.  I would be 
teaching 8th grade-the same grade that my daughter would be 
enrolled in. She would not be in my class, but her friends would. I 
still read more and more Internet entries, and came across a saved 
conversation between my daughter and her "friends." The 
language and the cyber bullying that went on were atrocious. And 
here it was, coming from 12-year-olds!! Their parents had no idea 
that they were posting this material.
        This was in 2001. My school became the recipient of a grant 
from the Connelly Foundation to receive a laptop cart, enabling the 
children to have access to a wireless Internet system. Because of 
my prior research, I knew first-hand the dangers of inappropriate 
content on the web, and our school had in place a technology 
person who had a blocking software program installed. We had 
very strict rules about the kids accessing websites in the classroom, 
and what to do if something inappropriate came up on the screen-
the kids were to close the laptop and raise their hand if the 
blocking screen came up, or if something appeared that was out of 
order. As we visited educational websites together as a class, I 
can't tell you the number of times a child received a red "Blocked" 
screen, telling me that they had come upon a site with content 
deemed inappropriate-due to their typing in the educational site's 
name incorrectly for example-a common ploy of pornographers, 
who like to purchase the URLs of misspelled site names in hopes 
of luring in unsuspecting visitors. For example, one of my students 
tried to access the educational site we were using in class 
(Funbrain.com), but accidentally transposed two of the letters in its 
name (FunBrian.com). His computer brought up a red screen, 
which meant it was blocked. 
        Also, it is common for pornographers to purchase expired 
domain names, especially educational websites or those with 
Catholic or religious titles. This is a hot market--they bank on the 
fact that people would innocently click on their stored bookmarks 
and then would be brought to a porn website instead of the 
religious site they were looking for. 
        I have researched kids' use of blog sites, now called Social 
Networking sites, since my own children began using them in 
1999. The first ones were the profile sites on Instant Messenger, 
which could then host "sub-profiles."  These sub-profiles allowed 
children to post all sorts of information about themselves, and I 
immediately saw the danger in them, since kids could write 
whatever they wanted on them, and many posted pornography. I 
tried to alert parents to this danger and met with varying levels of 
response-some were happy to know so they could correct 
matters, others said I was out to get their kids and that I was lying 
about what had been posted! Since I was teaching at the time, this 
put me in a very awkward position. 
        With the exponential growth of the latest social networking 
sites, MySpace being the most popular, I have had my own 
accounts on all of them, and have been solicited by porn stars - all 
the big name porn stars try to lure visitors to their own MySpace 
pages, which feature very suggestive photos, and then, of course, 
links to the porn site. I have posted one such solicitation below, 
which leads to a live web-cam site. I received another one today, 
which invited me to join a MySpace group which is pornographic.  
I visited the group to see what it was about, and I saw comments 
posted by lots of kids who were under 18, and who were upset that 
they had been solicited! So there is hope there, but I can't imagine 
how many more kids were only too happy to visit the web cam site 
and participate in the goings-on.



        The link in her site leads to the following websites: 
        www.imlivenow.net  and  www.ezezdates.info 

        On the www.imlivenow.net site, there are pictures of Melissa 
        along with this message:
        "These pictures are not very revealing because kids may  
        see this page. On my webcam I get naked and nasty ;] 
        All you have to do is Click here for your FREE Password

        Anyone who has spent any amount of time trolling the pages 
on MySpace, Xanga, or other social networking sites cannot help 
but see what a cesspool it is.it's no surprise to me that there is an 
increasing number of child predator solicitations, leading to rape 
and even murder. The thing I CANNOT believe is that all schools 
are not required to have a blocking mechanism in place for the 
students' safety and well-being. Kids are very interested in these 
sites and very excited to interact with their friends online-and 
their hormones are raging and most of them cannot pass up the 
temptation to view porn. They are oblivious to the danger, even 
when they are educated. 
        Even from a schoolwork standpoint, as a teacher, I can't 
imagine trying to teach and having to compete with kids who 
might be more interested in clicking over to their MySpace account 
during a class assignment, and having that eat up their academic 
learning time.  And from what I read on MySpace, they do it ALL 
THE TIME during class. A teacher cannot visually see every 
computer at every moment, so it is only too easy for kids to do this.
        Libraries are another place that blocking software should be 
mandatory. Recent news stories show that news crews have filmed 
men masturbating right there in the open at the library while 
viewing porn on the library computer-only a few feet away from 
the children's room. My stomach lurches when I hear of this taking 
place-how can we not put an end to that sort of thing? What kind 
of sick society allows that to happen, when the answer is readily 
available in the form of blocking technology. 
        WKYC in Cleveland had an expose on this recently: 
http://www.wkyc.com/news/news_article.aspx?storyid=52623

        We can't really show you, we have video of Cooper pleasuring 
himself while watching porn at the Berea Library, just across 
the room from the children's section.  
 
        Take our word for it. And his. 
 
        "I wasn't thinking. I made a mistake," Cooper admitted. 
 
        If Cooper doesn't trust himself, should we? Well, apparently, 
the Berea Library does.  
 
        Berea Library Manager Cindy Bereznay said she saw Cooper 
masturbating the last time he was in her library. 
 
        Bereznay said they caught Cooper in the act a few years ago.  
 
        "I told him I would have to call the police if it continued," she 
said. 
 
        And Cooper ran out of the building.

        I realize that H.R. 5319 is not foolproof, because blocking 
technology is not foolproof. Unfortunately, blocking technology 
can be circumvented, and there are numerous sites being made 
available to children to allow them to get around their school or 
home blocking software-these sites are run by adults, which I can 
hardly believe. But, just because the mechanism isn't foolproof 
does not mean we shouldn't implement it.  Just as seatbelts are not 
a guarantee that no harm will come to someone who wears one, so 
blocking technology is to children. Blocking inappropriate content 
will protect children more than the alternative, which is to allow 
everything to come to them unfiltered. It is better to do something 
rather than to do nothing. In the near future, an organization called 
CP80 (www.cp80.org) will unveil its simple yet ingenious plan to 
protect our children while it still allows for free speech. 
        In the meantime, I implore Congress to evaluate seriously these 
threats to our children and make their protection their foremost 
concern. H.R. 5319 is a solid beginning, and I ask that it be 
implemented, along with other bills that seek to protect our 
children online.



SUBMISSION FOR THE RECORD OF MICHAEL A RESNICK, ASSOCIATE 
EXECUTIVE DIRECTOR, NATIONAL SCHOOL BOARDS ASSOCIATION



  The seal will deal with several issues impacting safety, such as their law enforcement policies (how 
easy it is for law enforcement agencies to work with the site when cybercrimes and abuses are 
reported or in conducting investigations, how long they maintain IP data to assist in tracking the 
identity of cybercriminals and the location of missing children, and how well they inform law 
enforcement about what information they collect and retain and how to legally request it), safety 
(privacy and security settings, abuse reporting mechanisms, the expertise of their abuse reporting 
staff, their terms of service and how well they are enforced), their customer service (how they handle 
request from parents and schools, how easy it is to remove or modify a profile, how well they 
educate their users about safety and security, their technological protections against malicious code 
and ID theft, and their relationship with high-risk sites) and if they cater to preteens or teens, how 
carefully they care for their interests (such as how well they comply with the child-protection 
privacy rules and laws and how sensitive they are to appropriate marketing and advertising practices 
and placement and how well they handle cyberbullying and other youth-centric abuses).
  Some websites, including MySpace.com, make it very difficult to remove a profile. In MySpace's 
case, the user must fill out an online form to request instructions on profile deletion and a special 
code will be e-mailed to the non-MySpace e-mail they used when setting up their account for them 
to use to shut down their profile page. Due to the fact that many users either use a fake e-mail 
address to protect their privacy or have since stopped using the one they provided when the account 
was set-up, the code cannot be delivered. Even if the e-mail address is real and still functioning, 
however, many ISPs and e-mail providers block MySpace communications sent over their networks 
as SPAM. Without the code, the profiles remain up, even if the user wants them removed, which 
may lead to inflated user-numbers. (WiredSafety has arranged for a special process to assist in the 
removal of teen/preteen profiles when the e-mail address is not working, but I suspect that it is not 
widely used unless the user comes to us for our assistance.)
  See attached advice for parents, in Appendix. 
  See the press release from Cox Communications and link to full results here: 
http://www.cox.com/takecharge/survey_results.asp
  Bailey discusses the shift from the old practice of "calling" whereby a male suitor would arrive at 
the house of a young woman "expecting to be received in her family's parlor, to talk, to meet her 
mother, perhaps to have some refreshments or to listen to her play the piano" to the new practice of 
"dating" whereby the young woman would expect to be "taken 'out' somewhere and entertained." 
See p. 13 for this reference and p.19 for a discussion of the automobile's influence in this transition.
  Tonn, Jessica. "Expert Sees Need for School Staff To Access Social-Networking." Education 
Week. Vol. 25 Issue 33, p16. 
  "Life Beyond Pay-Work-Life Balance," The Economist, July 7, 2006.
  Information Literacy: Skills for the Information Age. Westport: Libraries Unlimited. Page 5.
  http://www.bcps.org/offices/lis/
  http://www.census.gov/prod/2005pubs/p23-208.pdf
  Toward Equality of Access: The Role of Public Libraries in Addressing the Digital Divide. Pages 
19-20. http://www.gatesfoundation.org. 
  "Growing Up Online," Science News, Vol. 169 Issue 24, p376.
 
 
 
 







221


(1)