[Senate Hearing 111-1043]
[From the U.S. Government Publishing Office]



                                                       S. Hrg. 111-1043
 
                  PROTECTING YOUTHS IN AN ONLINE WORLD

=======================================================================

                                HEARING

                               before the

   SUBCOMMITTEE ON CONSUMER PROTECTION, PRODUCT SAFETY, AND INSURANCE

                                 of the

                         COMMITTEE ON COMMERCE,
                      SCIENCE, AND TRANSPORTATION
                          UNITED STATES SENATE

                     ONE HUNDRED ELEVENTH CONGRESS

                             SECOND SESSION

                               __________

                             JULY 15, 2010

                               __________

    Printed for the use of the Committee on Commerce, Science, and 
                             Transportation


                  U.S. GOVERNMENT PRINTING OFFICE
67-765                    WASHINGTON : 2011
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202�09512�091800, or 866�09512�091800 (toll-free). E-mail, [email protected].  

       SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION

                     ONE HUNDRED ELEVENTH CONGRESS

                             SECOND SESSION

            JOHN D. ROCKEFELLER IV, West Virginia, Chairman
DANIEL K. INOUYE, Hawaii             KAY BAILEY HUTCHISON, Texas, 
JOHN F. KERRY, Massachusetts             Ranking
BYRON L. DORGAN, North Dakota        OLYMPIA J. SNOWE, Maine
BARBARA BOXER, California            JOHN ENSIGN, Nevada
BILL NELSON, Florida                 JIM DeMINT, South Carolina
MARIA CANTWELL, Washington           JOHN THUNE, South Dakota
FRANK R. LAUTENBERG, New Jersey      ROGER F. WICKER, Mississippi
MARK PRYOR, Arkansas                 GEORGE S. LeMIEUX, Florida
CLAIRE McCASKILL, Missouri           JOHNNY ISAKSON, Georgia
AMY KLOBUCHAR, Minnesota             DAVID VITTER, Louisiana
TOM UDALL, New Mexico                SAM BROWNBACK, Kansas
MARK WARNER, Virginia                MIKE JOHANNS, Nebraska
MARK BEGICH, Alaska
                    Ellen L. Doneski, Staff Director
                   James Reid, Deputy Staff Director
                   Bruce H. Andrews, General Counsel
                 Ann Begeman, Republican Staff Director
             Brian M. Hendricks, Republican General Counsel
                  Nick Rossi, Republican Chief Counsel
                                 ------                                

   SUBCOMMITTEE ON CONSUMER PROTECTION, PRODUCT SAFETY, AND INSURANCE

MARK PRYOR, Arkansas, Chairman       ROGER F. WICKER, Mississippi, 
BYRON L. DORGAN, North Dakota            Ranking
BARBARA BOXER, California            OLYMPIA J. SNOWE, Maine
BILL NELSON, Florida                 JIM DeMINT, South Carolina
CLAIRE McCASKILL, Missouri           JOHN THUNE, South Dakota
AMY KLOBUCHAR, Minnesota             JOHNNY ISAKSON, Georgia
TOM UDALL, New Mexico                DAVID VITTER, Louisiana


                            C O N T E N T S

                              ----------                              
                                                                   Page
Hearing held on July 15, 2010....................................     1
Statement of Senator Pryor.......................................     1
Statement of Senator Rockefeller.................................    31
    Prepared statement...........................................    31
Statement of Senator Wicker......................................    34
    Prepared statement...........................................    34
Statement of Senator Klobuchar...................................    37

                               Witnesses

Jessica Rich, Deputy Director, Bureau of Consumer Protection, 
  Federal Trade Commission.......................................     3
    Prepared statement...........................................     5
Hemanshu Nigam, Co-Chair, Online Safety Technology Working Group; 
  Safety Advisor, News Corporation; and Founder, SSP Blue........    11
    Prepared statement...........................................    13
Jeff Mcintyre, Director--National Policy, Children Now...........    16
    Prepared statement...........................................    18
Michelle Collins, Vice President, Exploited Children Division, 
  The National Center for Missing & Exploited Children...........    19
    Prepared statement...........................................    21
K. Dane Snowden, Vice President, External and State Affairs, 
  CTIA--the Wireless Association ...............................    23
    Prepared statement...........................................    25

                                Appendix

Letter, dated July 15, 2010 to Chairman Mark Pryor and Ranking 
  Member Roger Wicker, Subcommittee on Consumer Protection, 
  Product Safety, and Insurance, U.S. Senate from Laura W. 
  Murphy, Director, Washington Legislative Office and Michael W. 
  Macleod-Ball, Chief Legislative and Policy Counsel, American 
  Civil Liberties Union..........................................    57
Yahoo!, Inc., prepared statement.................................    59


                  PROTECTING YOUTHS IN AN ONLINE WORLD

                              ----------                              


                        THURSDAY, JULY 15, 2010

                               U.S. Senate,
      Subcommittee on Consumer Protection, Product 
                             Safety, and Insurance,
        Committee on Commerce, Science, and Transportation,
                                                    Washington, DC.
    The Subcommittee met, pursuant to notice, at 2:02 p.m. in 
room SR-253, Russell Senate Office Building, Hon. Mark Pryor, 
Chairman of the Subcommittee, presiding.

             OPENING STATEMENT OF HON. MARK PRYOR, 
                   U.S. SENATOR FROM ARKANSAS

    Senator Pryor. I'll go ahead and call this hearing to 
order.
    And I want to thank all of our witnesses and our audience 
members for being here.
    We are, if you all have probably noticed, we're kind of 
scurrying around here to figure out the schedule. As is the 
custom in the U.S. Senate, the schedule is changing rapidly, 
and we now have a rollcall vote that has just started on the 
floor. And, even though I think we're going to have several 
members participate today, the rollcall vote is going to, you 
know, upset the smooth flow of this hearing.
    But, nonetheless, what I thought I would do is give a brief 
opening statement, and if Senator Wicker's able to make it here 
before the vote, let him give his statement. And if he's not 
able or no one else is able to be here, go ahead and try to get 
as far along as we can before I have to recess and go vote. And 
if I have a fellow subcommittee member here, we'll just 
continue the hearing, but we may have to recess in order to get 
these two votes behind us. But, anyway, that's just 
housekeeping.
    Thank you all for being here. And I really appreciate the 
time and effort that you have made to be here for our hearing 
on protecting youths in an online world.
    As I said, the Subcommittee members may be coming and going 
and a little bit disrupted because of the vote on the floor. 
But, this is a follow-up hearing to the children's privacy 
hearing we held in April, and the second in a series to 
consider how to best protect our young people online.
    Young people are spending an increasing amount of time on 
the Internet. They have Internet access points in their cell 
phones through which they can now connect to social networking 
sites, play games, and use various apps. According to one 
reporter, approximately 83 percent of 17-year-olds and over 50 
percent of 12-year-olds now own a cell phone. Despite the 
valuable benefits of technology--and those are many--some young 
people can be hurt by this instant access.
    Researchers are seeing disturbing trends in cyberbullying 
and harassment, among other risky online behaviors, including 
the forwarding or sending of sexually explicit messages. 
According to one Cox Communications Teen Online Safety and 
Digital Reputation Survey, approximately one-third of teenagers 
using the Internet report they have been victims of online 
harassment. Recent press articles have highlighted injurious 
practices among teens who tease and harass their peers online, 
creating hurt feelings and uncomfortable learning environments.
    A recent New York Times article, entitled ``Online Bullies 
Pull Schools Into the Fray,'' underscored the pain that some 
middle school students are facing when targeted by, or bullied 
by, their peers online. The article captured the complexity 
surrounding this debate, how to teach expectations of behavior 
while promoting parental control and discipline, empowering 
educators, strengthening school safety, and protecting privacy 
concerns.
    A few years ago, one press article featured a student from 
Fayetteville, Arkansas, who experienced aggressive bullying 
both online and offline. In junior high, the student was hit so 
hard he lost consciousness. In 9th grade he was struck with so 
much force that his braces became caught on the inside of his 
cheek. Some of his classmates started a page on Facebook called 
``Everyone that hates'' and then inserted the name of the 
child.
    When I hear about the psychological and emotional damage 
inflicted on teenagers and younger children as a result of 
cyberbullying, online harassment, or forms of exploitation 
online, I become deeply concerned, both as a father and as a 
lawmaker. Children deserve to learn in peace and safety. I 
believe that is one basic premise upon which we all should be 
able to agree.
    I look forward to hearing from the Federal Trade Commission 
about how its education campaign for online socializing is 
working, whether improvements can be made, and how we can 
create solutions together to strengthen the online safety and 
security of our Nation's children.
    I also look forward to hearing from the witnesses about the 
greatest threats to minors' safety in the online space, 
strategies to mitigate them, suggestions for promoting safe use 
of digital media, and how the FTC could work with other groups 
or schools to encourage safe navigation of online sites to 
better defend against risks to their mental health and well-
being.
    It is critical that we work together to determine how to 
integrate the research of our online media and technology 
experts, our public, private, and law enforcement officials, 
and agencies' staff the--at the Federal Trade Commission to 
craft meaningful and effective policies to better protect our 
young people against threats on the Internet.
    So, what I'd like to do now is go ahead and introduce our 
panels here and get as far along as possible with their opening 
statements. And again, I may have to recess at some point 
during the--you know, during the middle of the panel opening 
statements.
    But, I'll go ahead and just very briefly say--let's see, in 
order we have, Ms. Jessica Rich, Deputy Director of Bureau of 
Consumer Protection, Federal Trade Commission; Mr. Hemanshu 
Nigam, Safety Advisor, News Corporation, and Founder of SSP 
Blue, and former Chief Safety and Security Officer for MySpace; 
Mr. Jeff McIntyre, Director of National Policy for Children 
Now; Ms. Michelle Collins, Vice President, Exploited Children 
Division, National Center for Missing & Exploited Children; and 
Mr. K. Dane Snowden, Vice President, External and State 
Affairs, CTIA--The Wireless Association.
    Ms. Rich, would you mind leading us off?

STATEMENT OF JESSICA RICH, DEPUTY DIRECTOR, BUREAU OF CONSUMER 
              PROTECTION, FEDERAL TRADE COMMISSION

    Ms. Rich. Chairman Pryor, my name is Jessica Rich, Deputy 
Director of the Bureau of Consumer Protection with the Federal 
Trade Commission.
    And there I am. I'm on.
    [Laughter.]
    Ms. Rich. I appreciate this opportunity to discuss the 
Commission's efforts to protect the privacy and security of 
teens in the digital environment. While the views expressed in 
this written testimony represent the views of the Commission, 
my oral testimony and responses to questions are my own, and do 
not necessarily reflect the views of the Commission or any 
commissioner.
    The Federal Trade Commission is committed to protecting 
teens as they use and explore the online world. Today, I'll 
talk about the FTC's efforts to educate teens and parents about 
cybersafety, enforce the privacy laws, and develop policy 
approaches to make the digital world safer for all consumers, 
including teens.
    Parents of teens won't be surprised to learn that more 
teens go online than any other age group, over 90 percent. 
Teens have earned the nickname ``digital natives,'' since they 
use the Internet so much to socialize with their peers, learn 
about topics that interest them, and express themselves. Teens 
avidly communicate using instant message and social networks, 
share music and photos on P2P networks, and use smart phones to 
text, watch videos, and surf the web.
    Despite the many positives, teens may be less able to 
handle some challenges online than adults. For example, teens 
may not always think about the consequences of their actions, 
so they may post personal details online without thinking that 
it could leave them vulnerable to identity theft or cost them a 
job if a future employer sees it. And problems, once limited to 
the school hallway or the bus stop, like bullying and 
harassment, now spill into the online world.
    So, what's the FTC doing? First, we educate teens and 
parents about online threats and how to avoid them. The 
Commission's online safety portal, onguardonline.gov, helps 
consumers of all ages use the Internet safely and responsibly. 
Our new booklet, titled ``Net Cetera: Chatting With Kids About 
Being Online,'' provides practical tips on how parents, 
teachers, and other trusted adults can talk to kids about 
issues like cyberbullying, sexting, social networking, mobile 
phone use, and online privacy. We've already distributed more 
than 3.7 million copies of Net Cetera with partners, including 
school districts and individual schools, and we are actively 
working to expand the reach of these efforts.
    Second, the Commission aggressively enforces existing laws 
to protect consumers' privacy. Let me highlight just a couple 
of areas affecting teens: social networks and peer-to-peer file 
sharing.
    About three in four American teens now use social 
networking sites, nearly half on a daily basis. Since social 
networking exploded on the youth scene, the Commission has 
brought a number of enforcement actions against these sites. 
For example, just 2 weeks ago the Commission announced a 
consent order against Twitter, settling charges that it falsely 
represented that it maintain reasonable security and would take 
reasonable steps to ensure that private tweets remain private.
    In addition, many teens use P2P file sharing to share 
music, games, and software online. P2P programs present privacy 
and security risks because people may inadvertently allow 
others to copy private files they never intended to share. The 
Commission recently sent letters notifying several dozen 
entities that their customer information had been exposed on 
P2P file-sharing networks. We also sent them educational 
materials to help them secure their confidential data and 
opened nonpublic investigations into the most serious cases.
    Third, we're exploring policy approaches that would help 
all consumers preserve their privacy in commercial settings, 
including teens. For example, we've been gathering information 
about social networking as part of a recently concluded series 
of public roundtables examining ways to foster privacy 
protections in the Information Age. Participants discussed the 
difficulty of defining consumer expectations on social 
working--networking sites, as well as issues related to data 
collection by numerous third-party applications operating at 
those sites.
    Mobile space is another key area. As the Chairman 
mentioned, a recent study found that 58 percent of 12-year-olds 
and 83 percent of 17-year-olds own a cell phone. And an 
increasing number of teens own more sophisticated smart phones. 
These devices collect and store information from teens, and 
host all sorts of third-party applications which do the same. 
The increasing use of smart phones and similar devices was one 
of the main reasons we decided to accelerate our review of the 
Children's Online Privacy Protection Act.
    Before I conclude, let me address the scope of COPPA. As 
you know, some have suggested that COPPA should be extended to 
teens. COPPA requires websites and online services to obtain 
parental consent prior to the collection, use, or disclosure of 
personal information from children. When drafting COPPA, 
Congress decided to define ``child'' as under age 13, largely 
on the basis that most young children don't possess adequate 
knowledge or judgment to decide if and when to divulge personal 
information online.
    This reasoning does not necessarily extend to adolescents, 
who have greater access to the Internet outside the home than 
younger children. Teens may also be less likely than young 
children to provide their true age or their parents' contact 
information. And as children approach adulthood and use 
general-audience websites, it becomes more difficult to craft 
laws that don't unduly restrict free speech.
    That being said, we are very happy to work with the 
Committee if it determines to enact legislation providing 
special protections for teens online. We'll also continue our 
efforts to educate teens and their parents and develop policy 
recommendations to protect all consumers, including teens.
    In conclusion, the Commission is committed to protecting 
all consumers in the digital environment, especially those, 
such as teens, who are particularly vulnerable to threats on 
the Internet.
    Thank you. I look forward to your questions.
    [The prepared statement of Ms. Rich follows:]

         Prepared Statement of Jessica Rich, Deputy Director, 
        Bureau of Consumer Protection, Federal Trade Commission

I. Introduction
    Chairman Pryor, Ranking Member Wicker, and members of the 
Subcommittee, my name is Jessica Rich and I am the Deputy Director of 
the Bureau of Consumer Protection at the Federal Trade Commission 
(``FTC'' or ``Commission'').\1\ I appreciate this opportunity to appear 
before you today to discuss the Commission's efforts to protect the 
privacy and security of teens in the digital environment.
---------------------------------------------------------------------------
    \1\ While the views expressed in this statement represent the views 
of the Commission, my oral presentation and responses to questions are 
my own and do not necessarily reflect the views of the Commission or 
any individual Commissioner.
---------------------------------------------------------------------------
    The Federal Trade Commission is committed to protecting teens as 
they navigate digital technologies and applications. The agency has 
actively engaged in education, law enforcement, and policy efforts to 
help make the digital world safer for all consumers, including teens.
    This testimony first highlights some of the privacy and safety 
risks teens face as they participate in the digital world. Second, it 
summarizes the Commission's efforts to educate teens and their parents 
about these risks. Third, it highlights the Commission's efforts to 
protect privacy in the context of technologies used heavily by teens in 
particular--social networking, mobile computing, and peer-to-peer 
(``P2P'') file-sharing programs. Finally, the testimony addresses 
proposals to create separate privacy protections for teens online.

II. Teens in the Digital Environment
    Teens are heavy users of digital technology and new media 
applications including social networking, mobile devices, instant 
messaging, and file-sharing. Indeed, a 2007 study found that over 90 
percent of kids between the ages of 12 and 17 spend time online.\2\ The 
online world has changed how teens learn, socialize, and are 
entertained. In many ways, the experiences teens have online are 
positive--they use the Internet to socialize with their peers,\3\ to 
learn more about topics that interest them,\4\ and to express 
themselves.\5\
---------------------------------------------------------------------------
    \2\ Amanda Lenhart, Mary Madden, Alexandra Rankin Macgill, & Aaron 
Smith, Pew Internet & American Life Project, Teens and Social Media 
(Dec. 19, 2007), available at www.pewinter
net.org//media//Files/Reports/2007/
PIP_Teens_Social_Media_Final.pdf.pdf.
    \3\ See Amanda Lenhart & Mary Madden, Pew Internet & American Life 
Project, Social Networking Websites and Teens (Jan. 2007), available at 
www.pewinternet.org/Reports/2007/Social-Networking-Websites-and-Teens/
Data-Memo/Moredetails-from-the-survey.aspx?r=1.
    \4\ See Kaiser Family Foundation, Generation M2: Media in the Lives 
of 8- to 18-Year-Olds (Jan. 2010), available at www.kff.org/entmedia/
upload/8010.pdf.
    \5\ See Amanda Lenhart, Kristen Purcell, Aaron Smith, & Kathryn 
Zickuhr, Pew Internet & American Life Project, Social Media and Young 
Adults (Feb. 2010), available at www.pewinter
net.org/Reports/2010/Social-Media-and-Young-Adults.aspx?r=1.
---------------------------------------------------------------------------
    But teens also face unique challenges online. For example, research 
shows that teens tend to be more impulsive than adults and that they 
may not think as clearly as adults about the consequences of what they 
do.\6\ As a result, they may voluntarily disclose more information 
online than they should. On social networking sites, young people may 
share personal details that leave them vulnerable to identity theft.\7\ 
They may also share details that could adversely affect their potential 
employment or college admissions.\8\ Teens also sometimes ``sext'' to 
their peers--send text messages and images with sexual content--without 
considering the potential legal consequences and harm to their 
reputations. According to one recent study, 4 percent of cell phone 
owners aged 12 to 17 have sent sexually suggestive images of themselves 
by phone, while 15 percent have received ``sexts'' containing images of 
someone they know.\9\ In addition, bullies or predators--most often 
teens' own peers--may try to take advantage of adolescents on the 
Internet. About one-third of all teens online have reported 
experiencing some kind of online harassment, including 
cyberbullying.\10\
---------------------------------------------------------------------------
    \6\ See, e.g., Transcript of Exploring Privacy, A Roundtable Series 
(Mar. 17, 2010), Panel 3: Addressing Sensitive Information, available 
at htc-01.media.globix.net/COMP008760MOD1/ftc_web/transcripts/
031710_sess3.pdf; Chris Hoofnagle, Jennifer King, Su Li, and Joseph 
Turow, How Different Are Young Adults from Older Adults When It Comes 
to Information Privacy Attitudes & Policies? (April 14, 2010), 
available at ssrn.com/abstract=1589864.
    \7\ See Javelin Strategy and Research, 2010 Identity Fraud Survey 
Report (Feb. 2010), available at www.javelinstrategy.com/uploads/files/
1004.R_2010IdentityFraudSurveyConsumer.pdf.
    \8\ See e.g., Commonsense Media, Is Social Networking Changing 
Childhood? A National Poll (Aug. 10, 2009), available at 
www.commonsensemedia.org/sites/default/files/CSM_teen_social
_media_080609_FINAL.pdf (indicating that 28 percent of teens have 
shared personal information online that they would not normally share 
publicly) .
    \9\ Press Release, Pew Internet & American Life Project, Teens and 
Sexting (Dec. 15, 2009), available at www.pewinternet.org/Press-
Releases/2009/Teens-and-Sexting.aspx.
    \10\ Amanda Lenhart, Pew Internet & American Life Project, 
Cyberbullying and Online Teens (June 27, 2007), available at 
www.pewinternet.org//media//Files/Reports/2007/PIP%20Cyber
bullying%20Memo.pdf.pdf.
---------------------------------------------------------------------------
    Despite teens' sharing and use of personal information in the 
digital world, there is data that suggests teens are concerned about 
their online privacy. For example, one study of teens and privacy found 
that teens engage in a variety of techniques to obscure or conceal 
their real location or personal details on social networking sites.\11\ 
The Commission seeks to address these privacy concerns--as well as 
parents' concerns about their teens' online behavior and interactions--
through education, policy development, and law enforcement, as 
discussed further below.
---------------------------------------------------------------------------
    \11\ Amanda Lenhart and Mary Madden, Pew Internet & American Life 
Project, Teens, Privacy, and Online Social Networks (Apr. 18, 2007), 
available at www.pewinternet.org/Reports/2007/Teens-Privacy-and-Online-
Social-Networks.aspx?r=1.
---------------------------------------------------------------------------
III. Consumer Education
    The FTC has launched a number of education initiatives designed to 
encourage consumers of all ages to use the Internet safely and 
responsibly. The Commission's online safety portal, OnGuardOnline.gov, 
developed in partnership with other Federal agencies, provides 
practical information in a variety of formats--including articles, 
game, quizzes, and videos--to help people guard against Internet fraud, 
secure their computers, and protect their personal information.\12\ The 
Commission's booklet, Net Cetera: Chatting With Kids About Being 
Online,\13\ is the most recent addition to the OnGuardOnline.gov 
consumer education campaign. This guide provides practical tips on how 
parents, teachers, and other trusted adults can help children of all 
ages, including teens and pre-teens, reduce the risks of inappropriate 
conduct, contact, and content that come with living life online.
---------------------------------------------------------------------------
    \12\ The OnGuardOnline.gov website is the central component of the 
OnGuardOnline consumer education campaign, a partnership of the Federal 
Government and the technology community. Currently, 13 Federal agencies 
and a large number of safety organizations are partners on the website, 
contributing content and helping to promote and disseminate consistent 
messages. Since the launch of OnGuardOnline.gov and its Spanish-
language counterpart AlertaenLinea.gov in September 2005, more than 12 
million visitors have used these sites for information about computer 
security.
    \13\ Net Cetera is available online at www.onguardonline.gov/pdf/
tec04.pdf.
---------------------------------------------------------------------------
    Net Cetera focuses on the importance of communicating with children 
about issues ranging from cyberbullying to sexting, social networking, 
mobile phone use, and online privacy. It provides specific advice to 
parents about talking to their children about each of these topics. For 
example, on the subject of sexting, it discusses the risks sexting 
poses to kids' reputations and friendships--as well as possible legal 
consequences if kids create, forward, or save these kinds of messages--
and gives parents straightforward advice: ``Tell your kids not to do 
it.'' With respect to cyberbullying, Net Cetera advises parents to talk 
with their kids about online behavior and about any messages or images 
that make them feel threatened or hurt. The guide advises parents to 
work with a child who is being bullied by helping them to not react, 
save the evidence, and block or delete the bully.
    The Commission has partnered with schools, community groups, and 
local law enforcement to publicize Net Cetera, and the agency has 
distributed more than 3.7 million copies of the guide since it was 
introduced in October 2009. The FTC will continue to work with other 
Federal agencies, state departments of education, school districts, and 
individual schools to distribute Net Cetera and OnGuardOnline.gov to 
parents and educators. Additionally, the FTC plans to reach out to 
other groups that work with kids, such as summer camps, state education 
technology associations, and scouting organizations to publicize these 
materials.
    In furtherance of the FTC's education efforts, Commission staff 
also participated in the Online Safety and Technology Working Group 
(OSTWG), a working group composed of private sector members and Federal 
agencies. OSTWG reported its findings about youth safety on the 
Internet to Congress on June 4, 2010.\14\ Among its tasks, OSTWG 
reviewed and evaluated the status of industry efforts to promote online 
safety through educational efforts, parental control technology, 
blocking and filtering software, and age-appropriate labels for 
content. With respect to Internet safety education, OSTWG recommended 
greater interagency cooperation, publicity, and public-private sector 
cooperation for projects such as OnGuardOnline and Net Cetera to 
improve their national uptake in schools and local communities. As 
described above, the FTC is actively working to expand the reach of the 
already successful OnGuardOnline and Net Cetera projects.
---------------------------------------------------------------------------
    \14\ Youth Safety on a Living Internet: Report of the Online Safety 
and Technology Working Group (June 4, 2010), available at 
www.ntia.doc.gov/reports/2010/OSTWG_Final_Report
_060410.pdf.
---------------------------------------------------------------------------
IV. Social Networking, Mobile Computing, and P2P
    In addition to education efforts to improve teen privacy, the 
Commission is also focused on specific technologies of which teens are 
particularly high users--social networking, mobile computing, and P2P 
file-sharing.

A. Social Networking
    Social networking is pervasive among teens: 73 percent of American 
teens aged 12 to 17 now use social networking sites such as Facebook 
and MySpace, up from 55 percent 2 years ago.\15\ Nearly half of teens 
use these sites on a daily basis to interact with their friends.\16\ 
Teens use social networking to send messages to friends, post comments, 
and share photos and videos.\17\
---------------------------------------------------------------------------
    \15\ See Amanda Lenhart, Kristen Purcell, Aaron Smith, & Kathryn 
Zickuhr, Pew Internet & American Life Project, Social Media and Young 
Adults (Feb. 2010), available at www.pewinternet.org/Reports/2010/
Social-Media-and-Young-Adults.aspx?r=1.
    \16\ See Amanda Lenhart & Mary Madden, Pew Internet & American Life 
Project, Social Networking Websites and Teens (Jan. 2007), available at 
www.pewinternet.org/Reports/2007/Social-Networking-Websites-and-Teens/
Data-Memo/Moredetails-from-the-survey.aspx?r=1..52.
    \17\ See Amanda Lenhart, Mary Madden, Alexandra Rankin Macgill, & 
Aaron Smith, Pew Internet & American Life Project, Teens and Social 
Media (Dec. 19, 2007), available at www.pew
internet.org//media//Files/Reports/2007/
PIP_Teens_Social_Media_Final.pdf.pdf.
---------------------------------------------------------------------------
    The Commission has sought to protect teenage and other consumers in 
this environment through law enforcement, research, and education. It 
has brought a number of enforcement actions against social networking 
sites since 2006, when social networking exploded on the youth scene. 
Most recently, the Commission announced a consent order against 
Twitter, Inc. settling charges that it falsely represented to consumers 
that it would maintain reasonable security of its system and that it 
would take reasonable steps to ensure that private tweets remain 
private. Under the order, Twitter has agreed to maintain reasonable 
security and to obtain independent audits of its security procedures 
every 2 years for 10 years.\18\ The Commission also has brought actions 
against several social networking sites that targeted youth but failed 
to adhere to the Children's Online Privacy Protection Act (``COPPA'') 
with respect to users under the age of 13.\19\ The Commission will 
continue to examine the practices of social networking sites and bring 
enforcement actions when appropriate.
---------------------------------------------------------------------------
    \18\ In re Twitter, FTC File No. 092 3093 (June 24, 2010) (approved 
for public comment), available at www.ftc.gov/opa/2010/06/twitter.shtm.
    \19\ United States v. Xanga.com, Inc., No. 06-CIV-6853(SHS) 
(S.D.N.Y.) (final order Sept. 11, 2006); United States v. Industrious 
Kid, Inc., No. 08-CV-0639 (N.D. Cal.) (final order Mar. 6, 2008); 
United States v. Sony BMG Music Entm't, No. 08-CV-10730 (S.D.N.Y.) 
(final order Dec. 15, 2008); United States v. Iconix Brand Group, Inc., 
No. 09-CV-8864 (S.D.N.Y.) (final order Nov. 5, 2009).
---------------------------------------------------------------------------
    In addition to its enforcement work, the Commission has been 
gathering information about social networking as part of a recently-
concluded series of public roundtables on consumer privacy.\20\ The 
goal of the roundtables was to explore how best to protect consumer 
privacy without curtailing technological innovation and beneficial uses 
of information.\21\ Participants at the roundtables repeatedly raised 
issues related to social networking, and a specific panel was devoted 
to the subject. Experts on this panel discussed the difficulty of 
defining consumer expectations on social networking sites, issues 
related to third-party applications that use data from social 
networking sites, and the effectiveness of privacy disclosures and 
privacy settings in the social networking space.
---------------------------------------------------------------------------
    \20\ More information about the Privacy Roundtables can be found at 
www.ftc.gov/bcp/workshops/privacyroundtables/index.shtml.
    \21\ Several key concepts emerged from the roundtable discussions. 
First, participants stated that data collection and use practices 
should be more transparent by, for example, simplifying privacy 
disclosures so that consumers can compare them. Second, participants 
said that it should be easier for consumers to exercise choice. For 
example, rather than burying important choices in a lengthy privacy 
policy, such choices should be presented at the most relevant time--
e.g., the point of information collection or use. Further, it may not 
be necessary to provide choice about uses of data that are implicit or 
expected as part of a transaction--for example, sharing address 
information with a shipping company to send a product that the consumer 
has requested. Finally, participants noted that companies should build 
basic privacy protections into their systems at the outset by, for 
example, collecting and retaining information only if they have a 
business need to do so. The Commission is taking these basic principles 
into account as it develops privacy proposals to be released for 
comment later this year.
---------------------------------------------------------------------------
    The Commission is reviewing the information it received as part of 
the roundtable series and drafting initial privacy proposals, which it 
will release for public comment later this year.\22\ The Commission 
will consider the information it obtained about social networking as it 
makes its recommendations.
---------------------------------------------------------------------------
    \22\ In addition to the information presented at the roundtables, 
the Commission received over 100 submissions in response to its request 
for written comments or original research on privacy, available at 
www.ftc.gov/os/comments/privacyroundtable/index.shtm.
---------------------------------------------------------------------------
B. Mobile Technology
    Teens' use of mobile devices is increasing rapidly--in 2004, 45 
percent of teens aged 12 to 17 had a cell phone; by 2009, that figure 
jumped to 75 percent.\23\ Many teens are using their phones not just 
for calling or texting, but increasingly for applications like e-
mailing and web browsing, including accessing social networking sites 
and making online purchases.\24\ They are also using relatively new 
mobile applications that raise unique privacy concerns, such as 
location-based tracking.\25\
---------------------------------------------------------------------------
    \23\ Amanda Lenhart, Rich Ling, Scott Campbell, Kristen Purcell, 
Pew Internet & American Life Project, Teens and Mobile Phones (Apr. 20, 
2010), available at www.pewinternet.org//media//Files/Reports/2010/
PIP-Teens-and-Mobile-2010.pdf.
    \24\ Id.
    \25\ Nielsen, How Teens Use Media (June 2009), available at 
blog.nielsen.com/nielsenwire/reports/
nielsen_howteensusemedia_june09.pdf.
---------------------------------------------------------------------------
    The FTC has been actively addressing privacy issues relating to 
mobile technology for several years. In 2008, the Commission held a 
Town Hall meeting to explore the evolving mobile marketplace and its 
implications for consumer protection policy. Participants in the 
meeting examined topics such as consumers' ability to control mobile 
applications and mobile commerce practices targeting children and 
teens. In April 2009, FTC staff issued a report setting out key 
findings and recommendations based on the Town Hall meeting. Having 
highlighted that the increasing use of smartphones presents unique 
privacy challenges regarding children, the Town Hall meeting led to an 
expedited regulatory review of the Children's Online Privacy Protection 
Rule.\26\ The review is taking place this year, even though it was 
originally set for 2015.
---------------------------------------------------------------------------
    \26\ Under the rulemaking authority granted to it by the Children's 
Online Privacy Protection Act of 1998 (``COPPA''), the FTC promulgated 
the COPPA Rule, 16 CFR Part 312, in 1999.
---------------------------------------------------------------------------
    More recently, the privacy roundtable discussions devoted a panel 
to addressing the privacy implications of mobile computing. This panel 
focused on two significant issues: the extent to which location-based 
services were proliferating in an environment without any basic rules 
or standards, and the degree to which transparency of information 
sharing practices is possible on mobile devices. As with social 
networking, the Commission staff's upcoming report on the privacy 
roundtables will further address these issues.
    In addition to these policy initiatives, the FTC is ensuring that 
it has the tools necessary to respond to the growth of mobile commerce 
and conduct mobile-related investigations. In the past month, the FTC 
has expanded its Internet lab to include smartphone devices on various 
platforms and carriers. The Commission also has obtained the equipment 
necessary to collect and preserve evidence from these mobile devices. 
With these smartphones, FTC staff can now improve its monitoring of 
unfair and deceptive practices in the mobile marketplace, conduct 
research and investigations into a wide range of issues, and stay 
abreast of the issues affecting teens and all consumers.

C. P2P File-Sharing
    P2P file-sharing allows people to share their files through an 
informal network of computers running the same software. Teens use P2P 
programs to share music, games, or software online. However, P2P file-
sharing presents privacy and security risks because consumers may 
unknowingly allow others to copy private files they never intended to 
share. The FTC has sought to address these risks in several ways.
    First, the Commission has undertaken an initiative targeting 
businesses that use or allow P2P programs on their networks without 
implementing reasonable safeguards to protect their customers' 
information from inadvertent disclosure through these programs. This 
customer information can be leaked onto a P2P network when, for 
example, an employee downloads a P2P program directly onto his or her 
work computer, or when a business chooses to utilize P2P file-sharing 
programs, but does not configure its network correctly to protect such 
information.
    To address this problem, the Commission recently sent letters 
notifying several dozen public and private entities--including 
businesses, schools, and local governments--that customer information 
from their computers had been made available on P2P file-sharing 
networks.\27\ In the notification letters, the FTC urged the entities 
to review their security practices, explained that they should take 
steps to control the use of P2P software on their networks, and shared 
new business education materials designed to help them protect their 
confidential data from inadvertent sharing to a P2P network.\28\ Many 
entities that received these notifications contacted FTC staff for 
additional information to aid in their investigations into the file-
sharing incidents, and a number reported making changes to their 
security practices to prevent inadvertent file-sharing to P2P networks. 
At the same time it sent the notification letters, the FTC opened non-
public investigations into other companies whose customer or employee 
information had been exposed on P2P networks.\29\
---------------------------------------------------------------------------
    \27\ FTC Press Release, Widespread Data Breaches Uncovered by FTC 
Probe, (Feb. 22, 2010), available at www.ftc.gov/opa/2010/02/
p2palert.shtm.
    \28\ These materials are available at www.ftc.gov/bcp/edu/pubs/
business/idtheft/bus46.shtm.
    \29\ FTC Press Release, supra note 27.
---------------------------------------------------------------------------
    FTC staff has also assisted P2P file-sharing software developers in 
devising best practices to help prevent consumers from inadvertently 
sharing personal or sensitive data over P2P networks. In July 2008, the 
Distributed Computer Industry Association published voluntary best 
practices to guard against inadvertent file sharing. With the 
assistance of an independent P2P technology expert, FTC staff have been 
assessing whether members are complying with these best practices.
    The FTC also seeks to educate consumers about the risks of P2P file 
sharing software. Among other things, the agency provides tips for 
consumers about P2P in a consumer alert entitled ``P2P File-Sharing: 
Evaluate the Risks,'' \30\ which is available through 
OnGuardOnline.gov, and in Net Cetera.
---------------------------------------------------------------------------
    \30\ The consumer alert is available at www.ftc.gov/bcp/edu/pubs/
consumer/alerts/alt128
.shtm.
---------------------------------------------------------------------------
    Finally, the FTC has brought enforcement actions alleging that 
certain P2P file sharing software providers made deceptive claims in 
connection with the marketing of their products.\31\
---------------------------------------------------------------------------
    \31\ FTC v. Cashier Myricks Jr., Civ. No. CV05-7013-CAS (FMOx) 
(C.D. Cal., filed Sep. 27, 2005) (suit against the operator of the 
website MP3DownloadCity.com for making allegedly deceptive claims that 
it was ``100 percent LEGAL'' for consumers to use the file-sharing 
programs he promoted to download and share music, movies, and computer 
games); FTC v. Odysseus Marketing, Inc., Civ. No. 05-330 (D.N.H., filed 
Sep. 21, 2005) (suit against website operator that encouraged consumers 
to download free software falsely marketed as allowing consumers to 
engage in anonymous P2P file-sharing).
---------------------------------------------------------------------------
V. Privacy Models and Teens
    The issues surrounding teens' use of digital technology raise the 
question whether there should be special privacy protections for them. 
Some have suggested that COPPA's protections be extended to cover 
adolescents between the ages of 13 and 18; others suggest that separate 
privacy protections should be established for teens.\32\
---------------------------------------------------------------------------
    \32\ See Hearing: an Examination of Children's Privacy: New 
Technologies and the Children's Online Privacy Protection, Prepared 
Statement of Professor Kathryn Montgomery Before the Subcommittee on 
Consumer Protection, Product Safety, and Insurance, Committee on 
Commerce, Science, and Transportation, U.S. Senate (Apr. 29, 2010), 
available at www.demo
craticmedia.org/files/u1/2010-04-28-montgomerytestimony.pdf; see also 
An Examination of Children's Privacy: New Technologies and the 
Children's Online Privacy Protection Act (COPPA), Prepared Statement of 
Marc Rotenberg, EPIC.org, available at epic.org/privacy/kids/EPIC
_COPPA_Testimony_042910.pdf.
---------------------------------------------------------------------------
    The COPPA statute and implementing regulations enforced by the FTC 
require operators to provide notice to, and receive consent from, 
parents of children under age 13 prior to the collection, use, or 
disclosure of such children's personal information on websites or 
online services. In the course of drafting COPPA, Congress looked 
closely at whether adolescents should be covered by the law, ultimately 
deciding to define a ``child'' as an individual under age 13. This 
decision was based in part on the view that most young children do not 
possess the level of knowledge or judgment to make appropriate 
determinations about when and if to divulge personal information over 
the Internet. The FTC supported this assessment.\33\
---------------------------------------------------------------------------
    \33\ See Testimony of the Federal Trade Commission Before the 
Subcommittee on Communications, Senate Committee on Commerce, Science, 
and Transportation (Sept. 23, 1998), available at www.ftc.gov/os/1998/
09/priva998.htm.
---------------------------------------------------------------------------
    While this parental notice and consent model works fairly well for 
young children, the Commission is concerned that it may be less 
effective or appropriate for adolescents. COPPA relies on children 
providing operators with parental contact information at the outset to 
initiate the consent process. The COPPA model would be difficult to 
implement for teens, as they have greater access to the Internet 
outside of the home than young children do, such as in libraries, 
friends' houses, or mobile devices. Teens seeking to bypass the 
parental notification and consent requirements may also be less likely 
than young children to provide accurate information about their age or 
their parents' contact information. In addition, courts have recognized 
that as children age, they have an increased constitutional right to 
access information and express themselves publicly.\34\ Moreover, given 
that teens are more likely than young children to spend a greater 
proportion of their time online on websites that also appeal to adults, 
the practical difficulties in expanding COPPA's reach to adolescents 
might unintentionally burden the right of adults to engage in online 
speech.\35\
---------------------------------------------------------------------------
    \34\ See, e.g., American Amusement Mach. Ass'n. v. Kendrick, 244 
F.3d 572 (7th Cir. 2001) (citing Erznoznik v. city of Jacksonville, 422 
U.S. 205, 212-14 (1975); Tinker v. Des Moines Independent School 
District, 393 U.S. 503, 511-14 (1969).
    \35\ See ACLU v. Ashcroft, 534 F.3d 181, 196 (3d Cir. 2008) (citing 
ACLU v. Gonzales, 478 F. Supp. 2d 775, 806 (E.D. Pa. 2007) (``Requiring 
users to go through an age verification process would lead to a 
distinct loss of personal privacy.'')); see also Bolger v. Youngs Drug 
Prods. Corp., 463 U.S. 60, 73 (1983) (citing Butler v. Michigan, 352 
U.S. 380, 383 (1957) (``The Government may not reduce the adult 
population . . . to reading only what is fit for children.'')).
---------------------------------------------------------------------------
    The Commission will continue to evaluate how best to protect teens 
in the digital environment and take appropriate steps to do so. In 
specific instances, there may be opportunities for law enforcement or 
advocacy in this area. For example, just this week, the Commission's 
Bureau of Consumer Protection sent a letter to individual stakeholders 
in XY corporation, which operated a now-defunct magazine and website 
directed to gay male youth. The letter expressed concern about these 
individuals' efforts to obtain and use old subscriber lists and other 
highly sensitive information--including names, street addresses, 
personal photos, and bank account information from gay teens. The 
letter warns that selling, transferring, or using this information 
would be inconsistent with the privacy promises made to the 
subscribers, and may violate the FTC Act; thus, the letter urges that 
the data be destroyed.
    More generally, the FTC believes that its upcoming privacy 
recommendations based on its roundtable discussions will greatly 
benefit teens. The Commission expects that the privacy proposals 
emerging from this initiative will provide teens both a greater 
understanding of how their data is used and a greater ability to 
control such data. Finally, the Commission is available to work with 
this committee, if it determines to enact legislation mandating special 
protections for teens.

VI. Conclusion
    The Commission is committed to protecting all consumers in the 
digital environment, especially those consumers, such as teens, who are 
particularly vulnerable to threats on the Internet. The FTC will 
continue to act aggressively to protect teens through education, law 
enforcement, and policy initiatives that will better enable teens to 
control their information online.
    Thank you for this opportunity to discuss the privacy and security 
of teens on the Internet. I look forward to your questions.

    Senator Pryor. And thank you.
    At this point, since I just have a couple of minutes left 
in the rollcall, I will recess the hearing, and we'll reconvene 
when--hopefully, I'll be back in just 10 minutes or so. I 
mean--but, as soon as one of us gets back, we'll reconvene the 
hearing, and we'll hear from the rest of the panel.
    And look forward to that. And thank you, again.
    [Recess.]
    Senator Pryor. I'll go ahead and reconvene the 
Subcommittee.
    Again, thank you all for your patience. We had two votes. 
And I talked to at least a couple of my colleagues that said 
they're heading over here, maybe more. But, if we can, let's go 
ahead and pick up with where we were.
    And, Mr. Nigam, go ahead, please. Thank you.

         STATEMENT OF HEMANSHU NIGAM, CO-CHAIR, ONLINE 
     SAFETY TECHNOLOGY WORKING GROUP; SAFETY ADVISOR, NEWS 
               CORPORATION; AND FOUNDER, SSP BLUE

    Mr. Nigam. Chairman Pryor, thank you for giving me the 
opportunity to address you today on the best ways that we can, 
collectively, protect youth online.
    My name's Hemanshu Nigam, and I bring over 20 years of 
experience in the safety worlds in the online and offline 
sites. I'm the Founder of SSP Blue, a safety, security, and 
privacy strategic consulting business, and a board member of 
the National Center for Missing and Exploited Children. I'm 
also a News Corporation Safety Advisor, having previously been 
MySpace's Chief Security and Safety Officer. Before News, I led 
Microsoft's child safety and cyberenforcement teams, and, prior 
to that, was Vice President of Worldwide Internet Enforcement 
at MPAA. I have also served as a Department of Justice 
prosecutor against Internet child exploitation and computer 
crimes, advised the COPA Commission and advised the White House 
on cyberstalking. Finally, I began my career as a prosecutor in 
the Los Angeles County District Attorney's Office, where I 
specialized in prosecuting child molestation and sex crime 
cases.
    And so, I speak to you from various perspectives in the 
private sector, in government, and law enforcement. As Co-Chair 
of the Online Safety Technology Working Group, I led the review 
and evaluation of industry efforts in four key areas: online 
safety, education, and awareness; reporting of child 
pornography; data retention; and online safety technologies. 
The OSTWG had representatives from nearly every facet of the 
online safety--child safety ecosystem who brought more than 250 
years of experience to the table.
    Our goal is to find holistic solutions to what is a 
multidimensional challenge. We built upon the teachings of 
previous online safety task forces that have occurred over the 
past 10 years by inviting experts to inform our subcommittees 
on the latest online safety developments. From the breadth and 
depth of the 39 recommendations--in case you were wondering how 
many there actually were--from the breadth and depth of the 39 
recommendations we make in our report, ``Youth Safety in a 
Living Internet,'' I think we succeeded in meeting our goal.
    And before I share some of these recommendations, I'd like 
to talk about one concept that became quite clear. As we state 
in the report, the Internet is a living thing that constantly 
mirrors our society, our lives, and our publications. And, as 
such, we have to treat safety online in much the same way as we 
treat safety offline. And just as it takes a village to raise a 
child in the physical world, it takes the same village to raise 
a child in the online world. And given its dynamic nature, 
there is no one-size-fits-all solution and no silver bullet, 
just like in the physical world. Not surprisingly, our children 
seem to know how our offline and online worlds are intertwined 
far better than we adults do.
    And it is with full recognition of this living Internet 
that we make our recommendations to you. And here is just a 
sampling:
    The Subcommittee on Internet Safety Education recommended 
that an online research database be created and better 
coordination of the multitude of Federal Government educational 
efforts be done.
    The Subcommittee on Parental Controls and Child Protection 
Technology recommended that a common set of terms be created to 
help parents understand the various tools better, and that 
these technologies be baked into online products, where 
possible.
    The Subcommittee on Child Pornography Reporting recommended 
that smaller service providers be helped by the larger 
industry, folks like ourselves, to get them to comply with 
reporting requirements. This subcommittee also recommended tax 
credits for industry to offset the high development costs of 
reporting.
    Finally, the Subcommittee on Data Retention recommended 
that the discourse about data retention be held at the Federal 
level and that Congress take a closer look at data preservation 
before considering mandatory data retention.
    And, just as we observed that the Internet had evolved from 
merely a technical tool to a reflection of our living society, 
we also became markedly aware of two important areas that 
require congressional action:
    First, create a cross-functional, cross-agency coordinating 
body, led by the government, that includes members from every 
sector of the child safety ecosystem, to build consensus and 
coordinate education efforts.
    Second, enact legislation that would require a review of 
all the online safety-related programs the Federal Government 
has already undertaken in order to evaluate their 
effectiveness.
    We in the industry must be a critical part of solutions, as 
well. Having led safety efforts at MySpace, I'd like to offer 
you examples of just how the industry should take a holistic 
approach to online safety by building programs that consist of 
safety technologies, education, collaboration, and enforcement.
    As builders of technological platforms, MySpace provides 
both front-end user tools and back-end member protections. We 
give users the ability to block other users to reduce incidents 
of cyberbullying. We also review images to keep out unwanted 
content.
    Technical solutions must be coupled with educational 
programs that raise awareness about safety online. MySpace has 
distributed safety guides to over 55,000 schools in this 
country, and has an informative safety section on its site for 
all visitors.
    The industry must also collaborate with child safety 
experts. And we've partnered with leading child advocacy 
organizations in the country, like the National Center. These 
partnerships have been used to protect children, assist in 
recovering runaways, and preventing suicides.
    At the end of the day, as you know, Mr. Chairman, as former 
Attorney General of Arkansas, illegal incidents can and do 
occur; thus, we work closely with law enforcement--24 hours, 7 
days a week--to help ensure the safety of our users.
    And speaking more broadly, and as I close, Congress also 
has a critical role to play in protecting children online:
    First, we ask that you convene the experts. Today's hearing 
is a great example of a place where we can identify problems 
and cutting-edge solutions.
    Second, educate the masses. The more we can implement 
educational programs at every level of our education system, 
the healthier our citizens will be online.
    And third, fund online safety programs. A solution, without 
proper funding is, frankly, no solution at all.
    So, thank you, Chairman Pryor, Chairman Rockefeller, and 
Ranking Member Wicker, for giving me this opportunity to 
address you on this important topic.
    [The prepared statement of Mr. Nigam follows:]

     Prepared Statement of Hemanshu Nigam, Co-Chair, Online Safety 
    Technology Working Group; Safety Advisor, News Corporation; and 
                           Founder, SSP Blue

    Chairman Pryor, Ranking Member Wicker, and members of the 
Subcommittee, thank you for giving me the opportunity to address you 
today on the best ways that we can collectively protect youth online. I 
bring with me over 20 years of experience in safety in the online and 
offline worlds. I am the Founder of SSP Blue, a safety, security, and 
privacy strategic consulting firm for online businesses. I am also News 
Corporation's Safety Advisor, having previously served as News 
Corporation and MySpace's Chief Security Officer from the birth of 
social media. Before coming to News Corporation, I set in motion a 
cross-company strategy for child safe computing and led a cyber 
enforcement team at Microsoft Corporation. And prior to that, I was 
Vice President of Worldwide Internet Enforcement against digital movie 
piracy at the Motion Picture Association of America. I have also served 
as a Federal prosecutor against Internet child exploitation and 
computer crimes at the U.S. Department of Justice, an advisor to the 
COPA Commission, and an advisor to the White House's Committee on 
Cyberstalking. Finally, I began my career as a prosecutor in the LA 
County District Attorney's office, specializing in child molestation 
and sex crimes cases. And so, I speak to you from various perspectives 
in private industry, government, and law enforcement.
    As co-chair of the Online Safety Technology Working Group, I had 
the honor of leading the mandate to review and evaluate:

        1. The status of industry efforts to promote online safety 
        through educational efforts, parental control technology, 
        blocking and filtering software, age-appropriate labels for 
        content or other technologies or initiatives designed to 
        promote a safe online environment for children;

        2. The status of industry efforts to promote online safety 
        among providers of electronic communications services and 
        remote computing services by reporting apparent child 
        pornography, including any obstacles to such reporting;

        3. The practices of electronic communications service providers 
        and remote computing service providers related to record 
        retention in connection with crimes against children; and

        4. The development of technologies to help parents shield their 
        children from inappropriate material on the Internet.

    The OSTWG had representatives from nearly every facet of the child 
online safety ecosystem totaling more than 250 years of experience in 
online safety. Members were appointed from the Internet industry, child 
safety advocacy organizations, educational and civil liberties 
communities, the government, and law enforcement communities.
    In order to best identify the best solutions for protecting youth 
online, the OSTWG quickly created four subcommittees to focus on each 
area we were asked to evaluate. These subcommittees were chaired as 
follows: Lawrence J. Magid of Connect Safely led the Education 
subcommittee; Michael W. McKeehan of Verizon led the Data Retention 
subcommittee; Christopher G. Bubb of AOL led the Child Pornography 
Reporting subcommittee; and Adam Thierer of the Progress and Freedom 
Foundation led the Technology subcommittee. Given the deadline of 
providing a report to Congress within 1 year of the first meeting, we 
set and followed a very strict timeline that began with an introductory 
meeting on June 4, 2009. We then held meetings at which each 
subcommittee invited experts to provide valuable insights to inform the 
work of that particular subcommittee. Each subcommittee meeting also 
began with a special guest who provided context for the day.
    Our goal was to provide holistic solutions to the multidimensional 
challenge of protecting youth online. This was accomplished by building 
upon the teachings of three task force reports issued over the prior 10 
years--the COPA Commission report, the ``Thornburgh report,'' and the 
Harvard University Berkman Center Internet Safety and Technical Task 
Force report--and hearing from every aspect of the child safety 
ecosystem. From the breadth and depth of the 39 recommendations we made 
in our report, ``Youth Safety on a Living Internet,'' I think we 
succeeded in meeting our goal.
    Before I share these specific recommendations, I want to share one 
concept that became quite clear as a result of this engaging process. 
As we say in the first line of the report, the Internet is a living 
thing that reflects at any given moment in time our humanity's lives, 
sociality, publications and productions. It is very much a part of our 
lives and similarly our lives are very much a part of it. As such, 
users online are intertwined with and often responsible for their own 
safety in this living thing. And given its dynamic nature, there is no 
one-size-fits-all solution and no silver bullet. Finally, our youth 
recognize how our offline and online worlds are intricately intertwined 
far better than we adults do.
    It is with full recognition of this moving, living, breathing 
medium that we make our recommendations.
    Instead of repeating the Subcommittee reports in its entirety, here 
are some key recommendations that came from the work of each 
subcommittee.
    The Subcommittee on Internet Safety Education found that applying 
the Primary/Secondary/Tertiary models used in risk prevention programs 
would work well in Internet safety programs, especially since a high 
correlation exists between offline and online risk. Thus, this 
subcommittee recommended in part that a continually updated online 
research database is necessary, as is the need to coordinate the 
multitude of Federal Government educational efforts in progress.
    The Subcommittee on Parental Controls & Child Protection Technology 
found that a diverse array of protective tools is available today. 
These tools are most effective as part of a ``layered'' approach to 
child online safety especially one that supplements parental education. 
Thus, this subcommittee recommended that a common set of terms be 
created to help parents understand the various tools better and that 
these technologies be ``baked'' into online products where possible.
    The Subcommittee on Child Pornography Reporting found that the 
PROTECT Our Children Act of 2008 had made marked improvements in the 
child pornography reporting process having instant impact on the volume 
of reports being made by the online industry to the National Center for 
Missing and Exploited Children. Yet, nascent and smaller service 
providers need to be brought into the reporting fold. Thus, the 
subcommittee recommended that these smaller providers be helped along 
by the larger industry and work more closely with NCMEC. The 
subcommittee also recommended the consideration of tax credits for 
industry given the high development cost of proper reporting and data 
protection.
    Finally, the Subcommittee on Data Retention highlighted the 
multiple facets to determining what data and how much data should be 
retained by service providers. Varying viewpoints from the law 
enforcement, privacy advocacy, and industry sectors were considered. It 
was clear that law enforcement has a significant need for certain data 
to properly investigate crimes against children online. It was also 
clear that this need must be balanced with privacy concerns from 
legitimate users and the costs of data retention by service providers. 
Thus, the Subcommittee recommended that this discourse be maintained at 
the Federal level to achieve the greatest progress and that Congress 
take a close look at data preservation procedures enacted through the 
PROTECT Act before considering mandatory data retention.
    These are just some of the 39 recommendations we make in the OSTWG 
report. Just as we observed that the Internet had evolved from merely a 
technical tool to a reflection of our living society, we also became 
markedly aware of what I consider to be 50,000 foot-level achievable 
recommendations for future Congresses to consider when creating task 
forces and working groups.
    First, provide proper support and funding to task forces and 
working groups. Unfunded mandates quickly place undue burdens on our 
citizens who stand ready to serve the American public.
    Second, fill the prescription that this and any working group 
writes by perhaps mandating a group whose sole purpose is to drive 
execution of the recommendations.
    Third, create a cross-functional/cross-agency coordinating body led 
by the government with members from every sector of the child safety 
ecosystem to build consensus and coordinate execution efforts.
    Fourth, conduct a review of all the online safety related programs 
the Federal Government has already undertaken and highlight the most 
successful ones. These programs can be a great place for public/private 
partnerships.
    Fifth, take a multi-stakeholder approach when solving the complex 
issues presented by today's new media environment. The OSTWG was 
successful for exactly this reason.
    We in the industry must be a critical part of the solutions as 
well.
    Having led safety efforts at MySpace and News Corporation from the 
time that the social media industry was just an infant and before that 
at Microsoft Corporation, I offer you examples of just how the industry 
can take a holistic approach to online safety. As unusual as it may 
sound, the industry can find parallel and sometimes exact solutions to 
online challenges in the real world. Every online safety program must 
consist of technology, education, collaboration and enforcement 
designed to prevent unwanted content, contact and conduct.
    As builders of these technological platforms, industry must provide 
both front end user tools and back end member protections. MySpace, for 
example, provides users the ability to block anyone from contacting 
them, reducing incidents of cyberbullying. MySpace also automatically 
locks an account that appears to have anomalous activity to prevent 
phishing and spam attacks against users.
    The best technical solutions must then be coupled with educational 
programs to raise awareness about healthy online behaviors. MySpace 
provides guides for parents, teens and school officials with exactly 
this purpose. The school guides have reached over 55,000 schools in 
this country. MySpace also uses teachable moments across the site such 
as during the photo posting process where users are informed about 
acceptable content policies.
    While industry may be expert in technology, we must collaborate 
with experts in other sectors of child online safety. MySpace has 
formed relationships with the National Center for Missing and Exploited 
Children, iKeepSafe, Connect Safely, and Enough is Enough--some of the 
leading child advocacy organizations in the country. Working with 
NCMEC, MySpace sends AMBER Alerts to users when a child is kidnapped or 
missing. MySpace also works with the National Suicide Prevention 
Lifeline when a user is in crisis to get them help immediately thereby 
preventing possible suicides.
    At the end of the day, we know that illegal incidents can occur, 
thus working closely with law enforcement 24/7/365 is a must for all of 
us. MySpace works with law enforcement to respond to requests for 
information that might help bring a perpetrator to justice. MySpace 
also works with law enforcement directly to assist in runaway 
situations in an effort to reunite runaway teens with their families.
    Thus, any industry online safety program must be holistic in nature 
encompassing technology, education, collaboration, and enforcement. I 
will say that the industry has come a long way since my own days as a 
child predator prosecutor in the Department of Justice.
    Speaking more broadly, as this subcommittee examines Protecting 
Youths in an Online World, you have a significant and undeniably 
critical role to play that we in the industry would embrace with open 
arms and one that is necessary for the protection of this Nation's 
children online.

        Convene the Experts to inspire the dialogue. Today's hearing is 
        a great example of just this. The more places that you can 
        inspire folks to gather, discuss, and analyze, the more pointed 
        solutions can be identified.

        Educate the Masses to increase safer online practices. The more 
        we can mandate educational programs at every level of our 
        education system, including colleges, the healthier our 
        citizens will be in their daily online practices.

        Fund the Programs to implement safety solutions. A perfect 
        solution to a complex problem without proper funding is no 
        solution at all. This is very much like recommending that 
        students learn to read in elementary school without providing 
        teachers and books to make that happen.

    I look forward to working with this subcommittee to identify 
specific action items that can help you convene the experts, educate 
the masses and fund the programs.
    In closing, I think we can step forward fully cognizant of the 
challenges that lie before us in protecting youth online and at the 
same time greatly hopeful that we can find and implement solutions that 
will allow our children to grow up healthy in this digital age.
    Thank you Chairman Pryor, Ranking Member Wicker, and members of the 
Subcommittee for giving me this opportunity address you.

    Senator Pryor. Thank you.
    Mr. McIntyre.

                  STATEMENT OF JEFF McINTYRE, 
            DIRECTOR--NATIONAL POLICY, CHILDREN NOW

    Mr. McIntyre. There we go.
    Good afternoon, Chairman Pryor, Chairman Rockefeller, 
Ranking Member Wicker, and the other members of the 
Subcommittee. I'm Jeff McIntyre, and I'm the Director of 
National Policy for Children Now. I'm also the Chair of the 
Children's Media Policy Coalition, which includes the American 
Academy of Pediatrics, the American Psychological Association, 
and the National PTA.
    My main concerns are children's health and education in 
media. The issues this subcommittee and the Online Safety and 
Technology Working Group report deal with are, frankly, issues 
we've been dealing with since well before media was prevalent 
in our lives: predators, bullies, invasion of our children's 
privacy, their information being used inappropriately, the 
effects of advertising on children's health. These are issues 
that parents are generally worried about.
    So, why is it--so, why is interactive media important in 
this? Basic child development teaches us that children learn 
from the environments they are in: schools, families, religious 
institutions, and communities. But, according to a recent 
Kaiser Family Foundation report, the place where children and 
youth spend most of their time is in the media environment. 
Children spend more time immersed in media than they do in any 
other activity. They average just over seven and a half hours a 
day in nonacademic media, and just under 11 hours a day if you 
account for multi-tasking. In today's world, that means 
children and youth are spending enormous amounts of time 
interacting with media and the individuals behind that media.
    Parents can exert great control over where a child is, 
geographically; but, in the interactive world, that's an 
immensely difficult task to do. This has been an issue, for 
those of us concerned about children, for years. With the 
introduction of television came the very first Congressional 
hearings on whether it contributed to juvenile delinquency back 
in the 1950s, violent media, sexualization, unhealthy food 
marketing. It's about kids receiving information detrimental to 
their health that is inappropriate for their developmental 
level.
    Now it's no longer just passive watching. It's about 
children and youth receiving and giving and then receiving 
targeted, sometimes even individualized, information across 
platforms. Children and youth are no longer just observers of 
media, soaking up information like a sponge. Now they are 
active participants, often bypassing parents to create and 
remix games, websites, social networking profiles, or 
participate in chat rooms and advergames. These platforms, 
however, are increasingly designed for the individual, and the 
software often tweaked for that individual. Every time a child 
or youth get propositioned online, bullied, asked for 
inappropriate information, or sent a coupon on their wireless 
without their parents actively choosing for that to happen, 
that parent's authority has been hijacked.
    It's easy to get stars in our eyes when we start talking 
about technology and media or the latest app, but the basics of 
what's healthy or harmful for our children have existed since, 
well, before television, and will exist long after the latest 
platform fad has passed. Simply put, ``buyer beware'' should 
not apply to our kids, especially in an interactive 
environment, not with predators in chat rooms, not with 
bullies, and not with advertisers using their information 
against them.
    Let me also say that an over-reliance on media literacy as 
the panacea to these issues is an incomplete response. Media 
literacy is about education, it's about building awareness. 
It's something that no one is really opposed to. However, it is 
only a small part of the overall equation.
    I think it's very important that the Subcommittee and the 
Committee understand that building awareness ``may'' result in 
a slow shift of attitude, which ``might'' influence behavior 
over an extended period of time, usually years or more. And 
even then, the amount of media literacy content is 
exponentially dwarfed by the amount of contrary unhealthy media 
content that is available and actively marketed to children and 
youth.
    For instance, in 19---excuse me, a 2007 study showed that 
tweens, between the ages of 8 and 12, were exposed to almost 
8,000 advertisements a year on television alone, the majority 
of which were for food items, such as candy and fast food; none 
were for healthy foods, such as fruits or vegetables. And one 
in five of those ads included a push to a website. And that was 
3 years ago. The same group would see a public service 
announcement, a PSA, roughly about once every 3 days.
    Our boat is small here, and the ocean of other media is 
wide and deep, that our children are in. Education is about 
citizenship, digital or otherwise. Years of Children Now 
research on children's media, whether the--on the effects of 
media duopolies on children's educational programming, the 
presence of minorities in children's programming, or the 
extreme lack of effectiveness of advertising pledges by the 
food and beverage companies, has demonstrated that industrywide 
standards tend to meet only the barest minimum dictated by that 
regulation. And that doesn't matter whether it's government or 
self-regulatory. Then they tend to punt to public affairs to 
attempt to shift the burden of responsible media onto the 
parent or child viewer.
    Now, if you think of this with sexual predators, just 
achieving the lowest common denominator and just talking to our 
children about sexual predators is a very small step, but it 
doesn't really come close to helping solve that issue. Other 
protections need to be put in place to have a comprehensive, 
truly safe, healthy environment for our children and youth. 
While media education is incredibly important, it should not be 
a loophole for structural attention to these issues. Real 
demonstrated change must occur in the media environment, for 
our children to be truly safe.
    I want to thank the members of the Subcommittee and 
Committee for their attention and leadership on this issue. 
Children Now stands ready to offer our assistance and resources 
as you move forward--as we move forward in addressing this 
critical moment in our media history.
    [The prepared statement of Mr. McIntyre follows:]

                 Prepared Statement of Jeff Mcintyre, 
                Director--National Policy, Children Now

    Good Morning Chairman Pryor, Ranking Member Wicker and members of 
the Subcommittee. I'm Jeff McIntyre and I'm the Director of National 
Policy for Children Now. I'm also the Chair of the Children's Media 
Policy Coalition, which includes the American Academy of Pediatrics, 
the American Psychological Association, and the National PTA.
    My main concerns are children's health and education--in media. The 
issues this Subcommittee and the Online Safety and Technology Working 
Group Report deal with are, frankly, issues we've been dealing with 
since well before media was prevalent in our children's lives. 
Predators, bullies, invasion of our children's privacy, their 
information being used inappropriately, the effects of advertising on 
our children's health--these are issues that all parents are worried 
about.
    So, why is interactive media important in this? Basic child 
development teaches us that children learn from the environments they 
are in--schools, families, religious institutions, and communities. 
But, according to a recent Kaiser Family Foundation report--the place 
where children and youth spend most of their time is in the media 
environment. Children spend more time immersed in media than any other 
activity. They average just over seven and a half hours a day in non-
academic media--and just under 11 hours a day, if you account for 
multi-tasking. In today's world, that means children and youth are 
spending enormous amounts of time interacting with media--and the 
individuals behind that media. Parents can exert great control over 
where a child is geographically. In the interactive world, that's an 
immensely difficult task to do.
    This has been an issue for those concerned about children for 
years--with the introduction of television came the first Congressional 
hearings on whether it contributed to juvenile delinquency in the 
1950s. Violent media, sexualization, unhealthy food marketing--it's 
about kids receiving information detrimental to their health that is 
inappropriate for their developmental level. Now, it's no longer just 
passive watching--it's about children and youth receiving and giving 
and then receiving targeted--sometimes individualized--information 
across platforms. Children and youth are no longer just observers of 
media, soaking up information like a sponge. Now, they are active 
participants--often bypassing parents--to create and remix--games, 
websites, social networking profiles, or participate in chat rooms or 
adver-games. These platforms, however, are increasingly designed for 
the individual and the software tweaked for that individual.
    Every time a child or youth gets propositioned online, bullied, 
asked for inappropriate information, or sent a coupon on their wireless 
without their parents actively choosing for that to happen--that 
parent's authority has been hijacked. It's easy to get stars in our 
eyes when talking about technology, media, or the latest app. But the 
basics of what's healthy or harmful for our children have existed since 
before television and will exist long after the latest platform fad has 
passed. Simply put, ``Buyer Beware'' should not apply to our kids, 
especially in an interactive environment. Not with predators in chat 
rooms, not with bullies, and not with advertisers using their 
information against them.
    Let me also say that an over-reliance on media literacy as the 
panacea to these issues is an incomplete response. Media literacy is 
about education--about building awareness. It is something that no one 
is opposed to. However, it is only a small part the overall equation. I 
think it's important that the Subcommittee understand that ``building 
awareness'' may result in a slow shift of attitude which might 
influence behavior over an extended period of time--usually years or 
more. And, even then--the amount of media literacy content is 
exponentially dwarfed by the amount of contrary, unhealthy media 
content available and actively marketed to children and youth.
    For instance--A 2007 study showed that tweens between 8 and 12 were 
exposed to almost 8000 ads a year on television alone--the majority of 
which were for food items, such as candy and fast food. None were for 
healthy foods such as fruits or vegetables. One in five ads included a 
push to the website. That same group would see a PSA only once every 3 
days.
    Our boat is small and the ocean of other media is wide and deep.
    Education is about citizenship--digital or otherwise. Years of 
Children Now research on children's media--whether on the effects of 
media duopolies on children's educational programming, the presence of 
minorities in children's programming, or the extreme lack of 
effectiveness of advertising pledges by the food and beverage 
companies--has demonstrated that industry wide standards tend to meet 
only the barest minimum dictated by that regulation--whether government 
or self-regulatory. Then, they punt to public affairs to attempt to 
shift the burden of responsible media onto the parent or child viewer.
    If you think of this with sexual predators--just achieving the 
lowest common denominator and just talking to our children about sexual 
predators is a very small step--but it doesn't really come close to 
helping solve that issue. Other protections need to be put in place to 
have a comprehensive, truly safe, healthy environment for our children 
and youth. While media education is incredibly important, it should not 
be a loophole for structural attention to these issues. Real, 
demonstrated change must occur in the media environment for our 
children to be truly safe.
    I want to thank Chairman Pryor, Ranking Member Wicker and the 
Subcommittee for their attention and leadership on this issue. Children 
Now stands ready to offer our assistance and resources to you as we 
move forward in addressing this critical moment in our media history.

    Senator Pryor. Thank you.
    Ms. Collins.

         STATEMENT OF MICHELLE COLLINS, VICE PRESIDENT,

        EXPLOITED CHILDREN DIVISION, THE NATIONAL CENTER

                FOR MISSING & EXPLOITED CHILDREN

    Ms. Collins. Mr. Chairman and members of the Subcommittee, 
I welcome this opportunity to appear before you to discuss the 
risk to children on the Internet. The National Center for 
Missing & Exploited Children, NCMEC, joins you in your concern 
for the safety of our youth, and thanks you for bringing 
attention to this very serious problem facing America's 
communities.
    As you know, NCMEC is a not-for-profit corporation mandated 
by Congress and working in partnership with the U.S. Department 
of Justice. NCMEC is a public/private partnership funded in 
part by Congress and in part by the private sector. For 26 
years, NCMEC has operated under Congressional mandate to serve 
as the Nation--or the national resource center for missing and 
exploited children.
    This statutory mandate includes 19 specific operational 
functions, among which is the CyberTipline, which is the 9-1-1 
of the Internet, that public and electronic service providers 
may use to report Internet crimes against children.
    The CyberTipline is the national clearinghouse for leads 
and tips regarding child sexual exploitation crimes. It's 
operated in partnership with Federal, State, and local law 
enforcement agencies, including the FBI and the Internet Crimes 
Against Children Task Forces that are located throughout the 
country. We receive reports in eight categories of crime--or 
crimes against children, including the possession, manufacture, 
and distribution of child pornography, as well as online 
enticement of children for sexual acts.
    NCMEC is pleased to have participated in the Online Safety 
and Technology Working Group, OSTWG, created by this 
committee's legislation. Its membership comprised a broad 
spectrum of knowledge and experience in online safety arena. 
The report recently issued by OSTWG contains important 
recommendations for progress. I'd like to underscore the 
OSTWG's report's conclusion that approaches to online safety 
must take into account the dynamic nature of the Internet and 
technology and the way that things can be used.
    We agree that everyone has a role to play. Parents and 
guardians can become more involved in their children's online 
activities, industry can actively self-regulate to keep its 
safe--or, its users safer, and the government can help increase 
awareness and encourage digital literacy. These efforts would 
benefit significantly from comprehensive, up-to-date 
information on these issues. Given the rapidly changing 
landscape of online communication, we strongly recommend that 
current research be conducted and maintained.
    The Internet offers tremendous potential, especially for 
youth. It has changed the way we communicate, learn, and 
conduct our daily activities. Unfortunately, the Internet can 
also be used to victimize children. The combination of 
widespread use and relative anonymity makes it an appealing 
tool for those who wish to victimize children. This is 
supported by our data. Reports to the CyberTipline about online 
enticement of children for sexual acts has increased 714 
percent since 1998. The attachments to my written testimony 
contain excerpts from actual CyberTipline reports that 
illustrate the problem.
    Youth will often engage in risky behavior in both the real 
world and the online world. The combination of the Internet, 
easy transmission of digital images, and poor judgment can lead 
to serious and unintended consequences for youth, including 
becoming the victim of enticement, blackmail, harassment, and 
exploitation by both adults and other youths.
    Webcams, cell phone Internet access, and social networking 
sites increase the vulnerability of our children. Webcams offer 
this exciting ability to see the person you're communicating 
with over the Internet. While this technology has many 
benefits, it can also be used, and is used, to exploit 
children. The reports to our CyberTipline of incidents 
involving children and Webcams have increased. Many children 
are victimized inadvertently by appearing on their Webcams 
without clothes as a joke or on a dare from friends, unaware 
that these images may end up in a global child pornography 
enterprise. Other children are victims of blackmail, threatened 
with disclosure to friends and family of his or her performance 
before the Webcam doesn't become more sexually explicit.
    Cell phones have placed the--or, has placed the Internet 
basically in our children's pockets. From January of 2008 until 
December of 2009, there was a 650-percent increase in the 
number of CyberTip reports we've received in which a cell phone 
was used in the sexual victimization of a child.
    ``Sexting'' is a term coined by the media that generally 
refers to a youth writing sexually-explicit messages and 
sending sexually-explicit images of themselves to their peers. 
This is an increasing problem that should be addressed through 
education of both parents and youth about the long-term 
consequences of apparently innocent activity amongst friends.
    Social networking sites appeal to children's natural desire 
for self-expression. These hugely popular sites permit users to 
create profiles containing detailed and highly personal 
information about themselves, which sometimes can lead to 
individuals forging relationships with that child. Children 
need to be taught the value of limiting access of their 
personal information to those who are within their known circle 
of family and friends.
    NCMEC has two resources that can help parents and youths 
learn about ways to be safer on the Internet. NetSmartz is an 
interactive, educational safety resource for children, parents, 
guardians, educators, and law enforcement, that uses age-
appropriate 3-D activities to teach children how to be safer on 
the Internet. And, NetSmartz411--it's an Internet safety help 
desk and online resources for parents and guardians that can 
help answer their questions about Internet safety.
    The National Center is actively engaged with industry 
leaders on their efforts to make youth less vulnerable when 
using their services. We encourage them to prohibit illegal and 
abusive activity as one of their terms of services, and to 
enforce this vigorously.
    However, the critical factor in youth online safety is 
parental involvement. Nothing can replace the value of parents 
understanding what their children are doing online, and why, 
and helping them develop good judgment in their online 
communication.
    Thank you very much.
    [The prepared statement of Ms. Collins follows:]

   Prepared Statement of Michelle Collins, Vice President, Exploited 
Children Division, The National Center for Missing & Exploited Children

    Mr. Chairman and members of the Subcommittee, I welcome this 
opportunity to appear before you to discuss the risks to children on 
the Internet. The National Center for Missing & Exploited Children 
(NCMEC) joins you in your concern for the safety of our youth and 
thanks you for bringing attention to this serious problem facing 
America's communities.
    As you know, the National Center for Missing & Exploited Children 
is a not-for-profit corporation, mandated by Congress and working in 
partnership with the U.S. Department of Justice. NCMEC is a public-
private partnership, funded in part by Congress and in part by the 
private sector. For 26 years NCMEC has operated under Congressional 
mandate to serve as the national resource center and clearinghouse on 
missing and exploited children. This statutory mandate (see 42 U.S.C.  
5773) includes 19 specific operational functions, among which are:

   operating a national 24-hour toll-free hotline, 1-800-THE-
        LOST (1-800-843-5678), to intake reports of missing children 
        and receive leads about ongoing cases;

   providing technical assistance and training to individuals 
        and law enforcement agencies in the prevention, investigation, 
        prosecution, and treatment of cases involving missing and 
        exploited children;

   tracking the incidence of attempted child abductions;

   providing forensic technical assistance to law enforcement;

   facilitating the deployment of the National Emergency Child 
        Locator Center during periods of national disasters;

   working with law enforcement and the private sector to 
        reduce the distribution of child pornography over the Internet;

   operating a child victim identification program to assist 
        law enforcement in identifying victims of child pornography;

   developing and disseminating programs and information about 
        Internet safety and the prevention of child abduction and 
        sexual exploitation;

   providing technical assistance and training to law 
        enforcement in identifying and locating non-compliant sex 
        offenders; and

   operating the CyberTipline, the ``9-1-1 for the Internet,'' 
        that the public and electronic service providers may use to 
        report Internet-related child sexual exploitation.

    The CyberTipline is the national clearinghouse for leads and tips 
regarding child sexual exploitation crimes. It is operated in 
partnership with the Federal Bureau of Investigation (FBI), the 
Department of Homeland Security's Bureau of Immigration and Customs 
Enforcement (ICE), the U.S. Postal Inspection Service, the Internet 
Crimes Against Children Task Forces (ICAC), the U.S. Secret Service, 
the U.S. Department of Justice's Child Exploitation and Obscenity 
Section, as well as other state and local law enforcement. We receive 
reports in eight categories of crimes against children:

   possession, manufacture and distribution of child 
        pornography;

   online enticement of children for sexual acts;

   child prostitution;

   sex tourism involving children;

   extrafamilial child sexual molestation;

   unsolicited obscene material sent to a child;

   misleading domain names; and

   misleading words or digital images on the Internet.

    These reports are made by both the public and by Electronic Service 
Providers, who are required by law to report to the CyberTipline. The 
leads are reviewed by NCMEC analysts, who examine and evaluate the 
content, add related information that would be useful to law 
enforcement, use publicly-available search tools to determine the 
geographic location of the apparent criminal act, and provide all 
information to the appropriate law enforcement agency for 
investigation. These reports are also triaged to ensure that children 
in imminent danger get first priority.
    The FBI, ICE and Postal Inspection Service have ``real time'' 
access to the CyberTipline, and assign agents and analysts to work at 
NCMEC. In the 12 years since the CyberTipline began, NCMEC has received 
and processed more than 920,000 reports. To date, electronic service 
providers have reported to the CyberTipline more than 7.5 million 
images of sexually exploited children. To date, more than 35 million 
child pornography images and videos have been reviewed by the analysts 
in our Child Victim Identification Program, which assists prosecutors 
to secure convictions for crimes involving identified child victims and 
helps law enforcement to locate and rescue child victims who have not 
yet been identified.
    NCMEC is pleased to have participated in the Online Safety and 
Technology Working Group (OSTWG) created by this Committee's 
legislation. Its membership comprised a broad spectrum of knowledge and 
experience in the online safety arena. The report recently issued by 
OSTWG contains important recommendations for progress.
    I'd like to underscore the OSTWG Report's conclusion that 
approaches to online safety must take into account the dynamic nature 
of technology and the ways that it can be used. We agree that everyone 
has a role to play: parents/guardians can become more involved in their 
children's online activities; industry can actively self-regulate to 
keep its users safer; and the government can help increase awareness 
and encourage digital literacy. These efforts would benefit 
significantly from comprehensive, up-to-date information on these 
issues. Given the rapidly changing landscape of online communication, 
we strongly recommend that current research be conducted and 
maintained.
    The Internet offers tremendous potential, especially for youth. It 
has changed the way we communicate, learn and conduct our daily 
activities. Unfortunately, the Internet can also be used to victimize 
children. The combination of widespread use and relative anonymity 
makes it an appealing tool for those who seek child victims.
    This is supported by our own data: reports to the CyberTipline 
about online enticement of children for sexual acts have increased 714 
percent since 1998. The attachments to my written testimony contain 
excerpts from actual reports that illustrate this problem.
    Youth will often engage in risky behavior, in both the ``real'' 
world and in the online world. The combination of the Internet, easy 
transmission of digital images, and poor judgment can lead to serious 
and unintended consequences for youth--including becoming the victim of 
enticement, blackmail, harassment and exploitation by both adults and 
other youth. Webcams, cell phone Internet access and social networking 
sites increase the vulnerability of our children.
    Webcams offer the exciting ability to see the person you're 
communicating with over the Internet. While this technology has many 
benefits, it can also be used to exploit children. The reports to our 
CyberTipline of incidents involving children and webcams have 
increased. Many children are victimized inadvertently, by appearing on 
their webcams without clothes as a joke, or on a dare from friends, 
unaware that these images may end up in a global child pornography 
enterprise. Other children are victims of blackmail, threatened with 
disclosure to friends and family if his or her ``performance'' before 
the webcam doesn't become more sexually explicit.
    Cell phones have placed the Internet in our children's pockets. 
From January 2008 to December 2009, there was a 650 percent increase of 
CyberTipline reports in which a cell phone was involved in the sexual 
victimization of a child. A 2008 online survey of 653 teens between the 
ages of 13 and 19 conducted by TRU and presented by the National 
Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com 
found that 20 percent of teens surveyed have posted nude or seminude 
pictures of themselves online. In addition, 39 percent of teens 
surveyed have sent or posted sexually suggestive messages (text, e-
mail, IM).
    ``Sexting'' is a term coined by the media that generally refers to 
youth writing sexually explicit messages, taking sexually explicit 
photos of themselves or others in their peer group, and transmitting 
those photos and/or messages to their peers. This is an increasing 
problem that should be addressed through education of both parents and 
youth about the long-term consequences of apparently ``innocent'' 
activity among friends.
    Social networking sites appeal to children's natural desire for 
self-expression. These hugely popular sites permit users to create 
online profiles containing detailed and highly personal information--
which can sometimes be used by individuals to forge a ``cyber-
relationship'' that can lead to a child being victimized. Children need 
to be taught the value of limiting access to their personal information 
to only those who are in their known circle of friends and family.
    NCMEC has two resources that can help parents and youth learn about 
ways to be safer on the Internet:

   NetSmartz is an interactive, educational safety resource for 
        children, parents, guardians, educators, and law enforcement 
        that uses age-appropriate, 3-D activities to teach children how 
        to stay safer on the Internet.

   NetSmartz411 is an Internet Safety Helpdesk, an online 
        resource for parents and guardians that can answer questions 
        about Internet safety, computers, portable communications 
        devices, and much more.

    NCMEC is actively engaged with industry leaders on their efforts to 
make youth less vulnerable when using their services. We encourage them 
to prohibit illegal and abusive activity as one of their terms of 
service and to enforce this vigorously. It is important for them to 
take reports of abuse by their users and to make their users aware of 
this reporting ability.
    However, the critical factor in youth online safety is parental 
involvement. Nothing can replace the value of parents understanding 
what their children are doing online, and why, and helping them develop 
good judgment in their online communications.
    Thank you.

    Senator Pryor. Thank you.
    Mr. Snowden.

         STATEMENT OF K. DANE SNOWDEN, VICE PRESIDENT,

                  EXTERNAL AND STATE AFFAIRS,

                CTIA--THE WIRELESS ASSOCIATION 

    Mr. Snowden. Good afternoon, Chairman Pryor, Ranking Member 
Wicker, Chairman Rockefeller, and Senator Klobuchar.
    My name is Dane Snowden, and, as the Vice President of 
External and State Affairs at CTIA, I was the wireless industry 
representative on the NTIA Online Safety and Technology Working 
Group. Thank you for affording me this opportunity to share 
CTIA's views on protecting youth in an online and mobile world.
    Across a diverse wireless ecosystem, the wireless industry 
is proactively doing its part to augment the educational and 
social growth of today's youth by preparing them for an 
increasingly digitized and mobile future. CTIA is proud of the 
wireless industry's commitment to make mobile safety and 
responsible use a priority.
    With respect to the Working Group's report, we support the 
recommendations regarding online safety education, parental 
control tools, and child pornography reporting and data 
retention issues. Specifically, we agree that there is no one-
size-fits-all, once-and-for-all solution to every aspect of 
online safety, especially in the rapidly innovating wireless 
industry.
    There are several areas of the Working Group's report which 
I would like to highlight today. First, it will come as no 
surprise to every parent in the room that wireless devices are 
omnipresent with American teens and tweens, who often seem to 
communicate with text messaging, photo and video sharing, more 
than they do the old-fashioned way, by voice. That, I suppose, 
is a sign of the times.
    However, we recognize that the many advantages wireless 
provides also present opportunities for inappropriate behavior, 
such as texting while driving, sexting, and cyberbullying. In a 
sense, this is not new behavior, and the introduction of new 
technology has often raised parental and policymaking concerns 
about the impact of that technology on young people.
    As innovation in the wireless industry expanded 
exponentially, we anticipated that these same concerns would be 
raised, and have worked to stay ahead of them. In 2004, CTIA 
developed carrier content and Internet guidelines. Our goal was 
to provide consumers with information and tools to make 
informed choices when accessing wireless content. Fast forward 
to today, we see a demand for more content available via the 
Internet versus the old walled-garden approach.
    The wireless industry has responded, and currently a 
majority of the 600 unique devices available can access the 
open Internet. In response to the evolution, the wireless 
industry has taken action to empower parents with choice and 
control over mobile wireless content so that parents may 
determine what is appropriate for their children.
    Some of the tools our members offer include: content 
filters, based on rating for music, games, and apps; limits on 
calling, texting, and camera features; and parental 
notification and monitoring services. In addition, CTIA has 
worked to extend this successful self-regulatory model to 
location-based services, common short codes, and mobile 
financial services.
    Built on notice and consent policies, CTIA's LBS guidelines 
promote and protect user privacy, especially for children, as 
innovative LBS services are developed and deployed.
    Given the growing variety of devices and services capable 
of Internet access, it is worth noting that the Working Group's 
consensus is that there is no single one-size-fits-all 
parental-control technology or safeguard for all media 
platforms. Instead, as the Working Group recommended, CTIA 
recognizes the education and awareness-building efforts are 
absolutely crucial to helping parents navigate the diverse 
parental-control marketplace and keep up with their children's 
evolving mobile usage.
    For this reason, CTIA and the Wireless Foundation recently 
launched ``Be Smart. Be Fair. Be Safe: Responsible [Wireless] 
Use,'' a national education campaign to help teach children 
responsible wireless-use techniques and link parents to the 
available tools and services offered by our member companies.
    And consistent with our belief that education is key, we 
support legislation, offered by Senator Menendez and 
Representative Wasserman-Schultz, which provides government 
grants to a variety of stakeholders who promote Internet 
safety, digital citizenship, and media literacy.
    As proud as we are of our efforts to date, we also know 
that our work to promote online safety will not be finished 
anytime soon, as a new cohort of users signs on, each and every 
day. It is our hope that the Working Group's report, along with 
our industry's efforts, will help to inform online safety 
initiatives at the Federal, State, and local levels.
    The wireless industry believes that, with strategic 
collaborations, we will continue to meet the demand and ensure 
the benefits of wireless to the ever-growing list of American 
wireless consumers. We look forward to working with the 
Committee and other stakeholders to craft policies which 
properly balance the goal of online safety and the need for 
flexibility in responding quickly to behavioral, technological, 
and market changes.
    Thank you. And I look forward to answering any questions 
you have.
    [The prepared statement of Mr. Snowden follows:]

        Prepared Statement of K. Dane Snowden, Vice President, 
      External and State Affairs, CTIA--the Wireless Association 

    Good afternoon, Chairman Pryor, Ranking Member Wicker, and members 
of the Subcommittee. My name is K. Dane Snowden, and I am the Vice 
President of External and State Affairs at CTIA--The Wireless 
Association  (``CTIA''). Before joining CTIA, I was Chief of the 
Consumer and Governmental Affairs Bureau at the Federal Communications 
Commission (``FCC'') for 4 years. In my capacity at the FCC, I oversaw 
all agency consumer related policy issues ranging from the creation of 
the National Do-Not-Call regulatory policy to the consumer outreach and 
complaint divisions. Thank you for affording me this opportunity to 
share with you the views of CTIA and our member companies on protecting 
youth in an online world.
    Today, my comments will highlight the wireless industry's 
continuing efforts to empower parents, safeguard privacy, and help 
ensure America's children and teens are using their wireless devices in 
a responsible manner. Through a diverse wireless ecosystem of service 
providers, device manufacturers, and software and application 
developers, the wireless industry is proactively facilitating the 
educational and social growth of today's youth by preparing them for an 
increasingly digitized and mobile future. Mobile technology offers many 
benefits to children and teens, including thousands of applications 
(``apps'') focused on civic, educational, health care and social 
opportunities. Even with the challenge of protecting children in the 
more ``open'' mobile wireless ecosystem, the wireless industry 
continues to empower parents with choice and control over mobile 
content so that they may determine appropriate mobile uses for their 
children and encourage responsible behavior. The wireless industry also 
has launched a series of educational initiatives and partnerships 
designed to promote mobile safety and responsible use.
    Given the wireless industry's substantial ongoing efforts, CTIA and 
our member companies support Congressional efforts which encourage 
stakeholders to educate parents and children regarding responsible 
mobile device practices. As an active member of the U.S. Department of 
Commerce National Telecommunications & Information Administration's 
(``NTIA'') Online Safety and Technology Working Group (``Working 
Group''), CTIA also supports the Youth Safety on a Living Internet 
(``OSTWG Report'') report's findings that there is no ``one-size-fits-
all, once-and-for-all solution'' to every aspect of online safety, 
rather there must be a layered, multi-stakeholder approach which 
utilizes available content control tools and enhances online safety 
educational strategies for children and parents.\1\
---------------------------------------------------------------------------
    \1\ National Telecommunications and Information Administration, 
Youth Safety on a Living Internet: Report of the Online Safety and 
Technology Working Group (June 4, 2010), available at http://
www.ntia.doc.gov/reports/2010/OSTWG_Final_Report_060410.pdf (``OSTWG 
Report'').
---------------------------------------------------------------------------
I. Children Are Using Mobile Devices and Services to Access Internet 
        Content and Utilize Numerous Innovative Benefits on a Regular 
        Basis
    CTIA recognizes the increasingly prominent and common role that 
wireless devices and services are playing in the development of 
America's youth. Children are actively using mobile devices on a 
regular basis, and progressively using mobile phones at younger ages. 
According to an April 2010 report by the Pew Internet & American Life 
Project, 83 percent of 17-year-olds now own a cell phone (up from 64 
percent in 2004), and 58 percent of 12-year-olds now own a cell phone 
(up from 18 percent in 2004).\2\ These children view mobile devices as 
critical tools for meeting their communications needs and a 
``centerpiece in teen social life'' through text messaging, photo and 
video sharing, Internet access, ``apps'', and other mobile data 
services.\3\ In addition, a mobile device may often be the only link to 
the Internet for children from low-income or minority homes where home 
broadband adoption is generally lower than other demographic 
communities.\4\
---------------------------------------------------------------------------
    \2\ Pew Internet & American Life Project, Teens and Mobile Phones 
(April 20, 2010), available at http://www.pewinternet.org/Reports/2010/
Teens-and-Mobile-Phones.aspx (``Pew Teens and Mobile Phones Report'').
    \3\ Comments of CTIA--The Wireless Association , MB Docket No. 09-
194 (filed Feb. 24, 2010) (``CTIA Empowering Parents NOI Comments''); 
see also, Pew Internet & American Life Project, Teens and Sexting 2 
(Dec. 15, 2009), available at http://www.pewinternet.org//media//
Files/Reports/2009/PIP_Teens_and_Sexting.pdf (``Pew Sexting Report'').
    \4\ CTIA Empowering Parents NOI Comments at 8.
---------------------------------------------------------------------------
    As part of this surge in children's mobile technology use, all 
elements of the wireless ecosystem, including carriers, manufacturers, 
and software and application developers, have enabled numerous 
innovative and beneficial tools for children, from education to health 
care to safety and civic participation. Using ``mLearning'' as just one 
example, innovative mobile wireless services offer personalized 
educational benefits as children use mobile devices to harness 
information on the Internet, choose from the thousands of educational 
``apps,'' and participate in class through text messaging, online 
polling and other multi-media uses. In fact, an entire segment of the 
mobile device market dedicated entirely to promoting reading through 
``e-readers'' and downloadable books has recently developed.
    It is not hard to imagine that one day soon mobile devices may 
replace students' traditional ``book bags.'' Indeed, today millions of 
school-age children never leave home for school without a hand-held 
mobile device. And while some parents insist on this for safety 
reasons, the versatility of mobile devices for recreation as well as 
communication ensures that few kids need to be convinced to carry one 
to and from school. Despite their popularity with students, however, 
the utility of mobile devices as part of the educational mission has 
not been widely appreciated, and school administrators occasionally 
bemoan their potentially distracting influences. Unfortunately, this 
perception overlooks the vast educational benefits of mobile devices 
discussed above.
    In order to address these issues, the OSTWG Report recommends 
policies and incentives to support ``digital citizenship'' which 
encourages children to respect themselves and others online and off and 
``media literacy'' which promotes critical thinking about what is 
posted, shared, produced and uploaded as well as content that's 
consumed.\5\ In addition, CTIA recommends that government agencies help 
ensure parents, teachers, and children take advantage of the learning 
opportunities provided by mobile devices, including updating school 
technology policies to more fully utilize mobile and Internet services 
and modify Federal Universal Service programs to be more technology 
neutral.\6\ As mobile devices and services become more ubiquitous among 
America's children and teens, Congress should consider these 
recommendations which can help provide guidance in the evolving online 
mobile environment which children are increasingly and regularly 
utilizing.
---------------------------------------------------------------------------
    \5\ OSTWG Report at 31-34.
    \6\ CTIA Empowering Parents NOI Comments at 13-20.
---------------------------------------------------------------------------
II. The Wireless Industry Continues Proactive Efforts to Empower 
        Parents and Encourage Responsible Use

a. The Wireless Industry Has Proactively Offered Tools and Developed 
        Best Practices to Empower Parents and Protect Children
    The wireless industry has taken action to empower parents with 
choice and control over mobile wireless content so that they may 
determine what is appropriate for their children. Carriers, moreover, 
have taken extensive steps to meet the demands of parents for these 
tools and have introduced a series of initiatives to educate parents 
and children about the responsibilities and risks of mobile 
connectivity. In the ``open'' mobile wireless ecosystem, the OSTWG 
Report found that children are increasingly exposed to the same risks 
faced across other technological platforms, even as many of those risks 
are similar to ones they face offline.\7\
---------------------------------------------------------------------------
    \7\ OSTWG Report at 5.
---------------------------------------------------------------------------
    In response to consumer and governmental demand for open access, 
open devices, and greater Internet connectivity on handsets, carriers 
have moved away from ``walled garden'' approaches which offered 
consumers service provider-reviewed services and protected consumers, 
including children, from harmful content and online activities. Today, 
wireless carriers generally have little control over content consumers 
may access on their networks in the ``open'' wireless ecosystem. 
Instead, numerous entities in the wireless ecosystem create, 
distribute, and manage content that can be accessed by consumers, 
including children. As a result, children may be exposed to the same 
questionable content that is available on the open Internet including 
violent, offensive and adult-themed content, personalized advertising, 
privacy risks and the plethora of mobile applications which are not 
intended for use by children. In addition, the technological advantages 
of mobile previously highlighted which have opened doors for positive 
educational and social interactions also present opportunities for 
children to engage in irresponsible or inappropriate behavior on mobile 
devices and services, such as texting while driving, sexting, textual 
harassment and cyberbullying.
    In addressing these issues, CTIA plays a key role in facilitating 
industry discussions about mobile safety and responsible use through 
voluntary, self-regulatory best practices and guidelines under which 
carriers, manufacturers and application vendors agree to provide 
significant protections for consumers and, most specifically, children. 
In 2004, well before the influx of wireless data services, applications 
and video services, CTIA developed Guidelines for Carrier Content 
Classification and Internet Access to provide consumers with 
information and tools to make informed choices when accessing wireless 
content.\8\ Under these voluntary guidelines, participating carriers 
agree to develop content classification standards and educate consumers 
about the meaning of the chosen categories and ratings. While the 
implementation of advanced parental control technologies is left to 
individual wireless providers and third-party application vendors, the 
guidelines play an important role in providing a set of baseline 
requirements that help standardize content classifications for the 
carrier-content available on wireless devices. This in turn facilitates 
outreach and educational campaigns intended to inform parents about the 
types of content accessible via wireless devices, as well as the tools 
available to offer children a safe user experience.
---------------------------------------------------------------------------
    \8\ Wireless Content Guidelines, CTIA Consumer Info, http://
www.ctia.org/consumer_info/service/index.cfm/AID/10394 (last visited 
June 28, 2010) (``Guidelines for Carrier Content Classification and 
Internet Access'').
---------------------------------------------------------------------------
    Today, individual wireless carriers offer parents a variety of 
tools that can control children's access to certain content (e.g., 
filters) and prevent the distribution or receipt of inappropriate 
content (e.g., feature or service limits); educate children and parents 
about how to be safe online; and provide parents with options to manage 
their children's messaging, calling, and data usage.\9\ Product 
manufacturers have also deployed effective parental and content 
controls to help protect children.\10\ In addition to carrier-provided 
advanced technologies and parental controls, consumers today can 
independently download third-party solutions to their wireless devices 
through app stores, websites, and other outlets, opening up a host of 
additional content management tools for parents.\11\ As the OSTWG 
Report found, the marketplace for parental controls is functioning 
fairly well, but more can be done to improve awareness and usage of 
existing tools while also striving to improve the tools themselves.\12\
---------------------------------------------------------------------------
    \9\ FCC, Implementation of the Child Safe Viewing Act; Examination 
of Parental Control Technologies for Video or Audio Programming, 
Report, MB Docket 09-26,  99 (2009) (``FCC Child Safe Viewing Act 
Report'').
    \10\ For example, the Apple iTunes and App Stores include content-
based age ratings for apps, and the iPhone and iPad allow users to 
restrict apps based on their rating. Apple's rating system includes 
four categories: 4+, 9+, 12+, and 17+. See Apple iTunes Store and 
product descriptions as of June 26, 2010.
    \11\ FCC Child Safe Viewing Act Report at  104.
    \12\ OSTWG Report at 60.
---------------------------------------------------------------------------
    In addition to the Guidelines for Carrier Content Classification 
and Internet Access, CTIA has worked with carriers and other members of 
the wireless ecosystem to extend this successful, self-regulatory model 
to location based services (``LBS''), common short codes and mobile 
financial services. With the aggregation of personal information on the 
Internet and evolving wireless ecosystem which may rely on, use or 
incorporate the location of a device to provide or enhance a service, 
great diligence is necessary to safeguard privacy, prevent fraud and 
unwanted dissemination of personally identifying information (``PII''), 
especially with regard to children. CTIA's Best Practices and 
Guidelines for Location-Based Services (``LBS Guidelines''), built on 
the now familiar foundation of ``Notice-andConsent,'' promote and 
protect user privacy as new LBS services are developed and 
deployed.\13\
---------------------------------------------------------------------------
    \13\ In April 2010, CTIA released an update of the wireless 
industry's voluntary ``Best Practices and Guidelines for Location-Based 
Services,'' which promotes and protects the privacy of wireless 
customers' location information. CTIA--The Wireless Association , Best 
Practices and Guidelines for Location Based Services, http://
www.ctia.org/business_resources/wic/index.cfm/AID/11300 (last visited 
June 28, 2010).
---------------------------------------------------------------------------
    CTIA's LBS Guidelines provide special protections for children, and 
they recognize that in some circumstances--including protecting the 
safety of children--a wireless carrier's account holder (rather than an 
authorized user, such as a child) may need to determine whether LBS may 
be used at all or a location disclosed to a third-party. For example, a 
parent/account holder may want to subscribe to LBS to know when a child 
arrives at school or may want to prevent the disclosure of a child's 
location information for safety reasons. Importantly, CTIA's LBS 
Guidelines are expansive in scope by applying to all LBS providers, 
including application developers and equipment providers, and not 
simply limited to wireless carriers. These guidelines, which CTIA 
recently updated to reflect changes in the technology, the market, and 
consumers' demands, are an example of how self-regulation has the 
flexibility and the speed to adapt to the rapidly evolving wireless 
ecosystem.
    CTIA understands that protecting children in these online and 
mobile environments is a challenging task for the industry, government 
and--especially--parents. Despite these challenges, the wireless 
industry continues to respond with effective, innovative solutions to 
empower parents with choice and control over the mobile content and 
services their children increasingly utilize. However, Congress should 
recognize the consensus of online safety experts and industry that 
there is no single, one-size-fits-all parental control technology or 
safeguard for all media platforms because of the great variety in 
capabilities and operating systems, even among competing providers 
within the same media platform, and rapidly innovating 
technologies.\14\ As the Working Group recommended, government policies 
can and should encourage stakeholders to help educate parents and 
children regarding safe, responsible mobile device practices that are 
already available.\15\
---------------------------------------------------------------------------
    \14\ See FCC Child Safe Viewing Act Report; OSTWG Report at 65.
    \15\ OSTWG Report at 65-66.
---------------------------------------------------------------------------
b. The Wireless Industry Develops and Implements Educational Outreach 
        and 
        Partnership Efforts to Empower Parents and Educate Children
    Even with the availability of parental control tools and self-
regulatory best practices, CTIA recognizes that education and 
information are the keys to helping parents navigate the diverse 
marketplace of parental control tools and keep up with their children's 
evolving mobile usage. For this reason, CTIA and The Wireless 
Foundation recently announced Be Smart. Be Fair. Be Safe: Responsible 
Wireless Use (``Be Smart'') (www.besmartwireless.com), a national 
education campaign focused on equipping parents with the necessary 
materials and tools to help children use their wireless devices 
responsibly. This site features resources such as sample family rules 
for parents, lesson plans for teachers, information about the latest 
research and surveys, and a toolkit with links to parental controls 
features offered by our member companies.
    Launched in March 2010, the ``Be Smart'' campaign has already 
reached millions of viewers and listeners of newspapers, magazines and 
radio stations around the country. Just last month, The Wireless 
Foundation held a ``Be Smart'' event with Illinois Attorney General 
Lisa Madigan to bring together local and national online safety 
experts, parents, law enforcement and industry representatives to 
discuss the latest research and initiatives in mobile online safety and 
more events are being planned. In addition, the ``Be Smart'' site links 
to CTIA and the National Safety Council's On the Road, Off the Phone 
campaign to educate young people and empower parents to talk to their 
teenage drivers about the dangers of potential distracted driving 
resulting from cell phone use while behind the wheel.\16\
---------------------------------------------------------------------------
    \16\ On the Road, Off the Phone: How to Talk to Your Teenagers, 
http://info.howcast.com/onroadoffphone (last visited June 28, 2010).
---------------------------------------------------------------------------
    As the OSTWG Report recommended, these education and awareness-
building efforts are absolutely crucial to ensure parents have the 
tools they need and children are taught to make informed and 
responsible choices. In March 2010, CTIA joined representatives from 
industry, academia and online safety advocates to support Congressional 
legislation which promotes online safety education through government 
grants to educational agencies, nonprofit organizations, and schools to 
carry out Internet safety and digital media literacy measures in 
schools to prevent harm from occurring in the first place.\17\ Grant 
recipients would be authorized to use the funds to develop tools to 
teach children how to safely, securely and ethically use the Internet 
and support peer-driven Internet safety initiatives and develop public 
education campaigns to promote awareness of online risks and improve 
the health of young people.
---------------------------------------------------------------------------
    \17\ See Adolescent Web Awareness Requires Education Act, H.R. 
3630, 111th Cong. (2009) (``AWARE Act''); see also, School and Family 
Education About the Internet Act of 2009, S. 1047 111th Cong. (2009) 
(``SAFE Internet Act'').
---------------------------------------------------------------------------
    CTIA also supports efforts to coordinate and share information at 
the Federal and state levels. For example, the recent efforts between 
the FCC, Federal Trade Commission (``FTC''), and the U.S. Department of 
Education (as part of the OnGuardOnline public-private coalition) to 
release the Net Cetera online safety guidebook for parents is a 
positive example of how government agencies can help protect children. 
Among other things, the Net Cetera guidebook can help parents 
communicate with their children about using mobile phones safely and 
responsibly and OnGuardOnline.gov provides links to information about 
available parental control tools and technologies across technological 
platforms. CTIA also supports efforts of state Attorneys General to 
provide information and education about issues such as cyberbullying, 
textual harassment and online predation of children.\18\ Given these 
ongoing public and private initiatives, CTIA believes that awareness 
and outreach can help parents utilize the available tools and that 
education is the best way to ensure children are utilizing mobile 
devices and services for responsible and positive purposes.
---------------------------------------------------------------------------
    \18\ See, National Association of Attorneys General, 2008-2009 
Presidential Initiative--Year of the Child: Protecting and Empowering 
Our Next Generation, http://www.naag.org/year-of-the-child1.php (last 
visited June 27, 2010).
---------------------------------------------------------------------------
III. Conclusion
    Today's tech-savvy children continue to embrace mobile technologies 
for educational, entertainment, safety, and other purposes. The 
wireless industry has proactively deployed effective tools that empower 
parents, and it will continue to innovate in the future. As the 
wireless industry develops innovative devices, cutting-edge 
applications and deploys next-generation networks, CTIA believes that 
our industry's best practices must continue to evolve to reflect the 
growing consumer demands in the wireless ecosystem. It is our hope that 
the OSTWG Report will help to inform online safety initiatives at the 
Federal, state and local levels of government and further encourage 
partnerships with the wireless industry to educate parents and children 
about responsible wireless use. We look forward to working with this 
committee to craft policies which properly balance the need for 
flexibility in responding quickly to behavioral, technological and 
market changes. The Wireless industry believes with voluntary 
initiatives and strategic collaborations, we will continue to ensure 
the delivery of the benefits of wireless products and services to all 
Americans. Thank you.

                              Attachment A

            Wireless Industry Initiatives to Empower Parents

Parental Empowerment Tools
    Content filters--Wireless carriers may provide parents with the 
ability to filter content available on a carrier's network. Wireless 
carriers, manufacturers and third party vendors may also offer wireless 
content filters for open Internet access.
    Calling and text limits--Wireless carriers offer a variety of 
calling, text and data plan options which allow parents to place limits 
on the amount of wireless services their children use.
    Camera function limits--Wireless devices may include password 
protected locks on camera and video features. Wireless carriers offer 
data plans which allow parents to place limits on the use of e-mail and 
picture messaging.
    Parental notifications--Wireless carriers may offer features to 
notify a parent when a child sends or receives calls or messages from 
unknown sources or when their child's wireless device leaves a 
specified area.
    Pre-approved calls--Wireless carriers may offer features which 
allow a child's wireless device to receive or send calls or messages 
only to specified numbers.
    Purchase limitations--Wireless carriers offer plans and features 
which allow parents to place limits on the type of content a child may 
purchase such as music, games, and video. Wireless devices may also 
include built-in feature limitations.
    Ratings--A system for classifying and providing information about 
specific content such as games, music, video and apps. Wireless 
carriers and manufacturers may rate content or utilize existing rating 
systems to help parents filter content for children.
    Time of day restrictions--Wireless carriers may offer tools to 
limit wireless usage to certain periods (i.e., non-school hours).

Educational Outreach
    Be Smart. Be Fair. Be Safe. Responsible Wireless Use--Together with 
kids, parents, experts and educators, The Wireless Foundation and our 
member companies, CTIA developed the Be Smart. campaign to help 
parents, educators and policymakers locate and utilize the tools and 
information necessary to ensure children make the right choices when 
using their wireless devices and services. The campaign's cornerstone 
is its website (www.besmartwireless.com) which offers a tool kit of the 
parental control features and filters that are offered by the CTIA's 
member companies and an example of family rules; educators are provided 
two lesson plans for 6th-12th grade students; and policymakers can 
learn more about industry initiatives as well as suggestions on what 
they can do to help foster the digital future.
    Get Wise About Wireless--A partnership between the Wireless 
Foundation and the Weekly Reader Corporation Consumer & Custom 
Publishing that equips parents and teachers with tips and tools to help 
students defeat digital bullies by practicing proper cell phone 
etiquette and safety behaviors. Educational kits sent to schools 
contain an educator guide, a family take-home pamphlet, a classroom 
poster and a student mini-magazine. (www.wirelessfoundation.org/
getwise)
    On Road, Off Phone--As teens and novice drivers learn the complex 
task of driving a motor vehicle, safety should always come first. The 
wireless industry and National Safety Council urge teens to adopt an 
``On the Road, Off the Phone'' philosophy to avoid the dangers of 
distracted driving. (www.onroadoffphone.org)
    Wireless Carrier Tools--Wireless carriers offer websites which 
highlight their parental empowerment tools and educate their customers 
about responsible wireless use. (http://www.besmartwireless.com/pages/
tools_from_the_wireless_industry)

Partnerships
    National Center for Missing & Exploited Children (NCMEC)--In 2008, 
CTIA and our member companies joined forces with NCMEC to keep child 
pornography off of wireless networks by creating the Wireless Child 
Safety Task Force, whose mission is to help keep wireless devices and 
services free of child pornography.
    Family Online Safety Institute--In 2009, CTIA and FOSI held a joint 
conference where Federal and state policymakers, industry leaders and 
online safety advocates discussed major challenges and solutions for 
children in the mobile environment.
    National Crime Prevention Council--The Wireless Foundation and NCPC 
developed the 2009-2010 Crime Prevention Month Kit: Staying Safe in a 
High-Tech World.
    National Safety Council--The wireless industry and National Safety 
Council teamed up for the driving ``On the Road, Off the Phone'' 
campaign.

    Senator Pryor. Thank you.
    Again, I want to thank the panel for your testimony.
    And since we have the Chairman of the Commerce Committee 
here----
    Senator Rockefeller?

           STATEMENT OF HON. JOHN D. ROCKEFELLER IV, 
                U.S. SENATOR FROM WEST VIRGINIA

    The Chairman. I'll put my statement in the record, but I'd 
probably revise it to make it copy what Mr. McIntyre said.
    [Laughter.]
    [The prepared statement of Senator Rockefeller follows:]

       Prepared Statement of Hon. John D. (Jay) Rockefeller IV, 
                    U.S. Senator from West Virginia
    Thank you, Senator Pryor. And thank you for all of your hard work 
on this important hearing.
    As Chairman of the Consumer Protection Subcommittee, you've been 
such a strong advocate for protecting kids and teens in our digital 
world. I appreciate your leadership on this issue.
    I know this is a concern weighing heavily on the minds of so many 
parents across America, and we are both deeply committed to doing all 
we can to safeguard our Nation's youth.
    When most of us think of a ``bully,'' we think of a big kid picking 
on a smaller kid on the playground, or stealing his lunch at the 
cafeteria.
    In those scenarios, the bullying is confined to a school. There are 
teachers, principals and parents to turn to.
    But the Internet--and our new digital world--has changed things. It 
has made the ability to bully and harass more pervasive, more 
anonymous, and, in many ways, more insidious.
    Even in the confines of his or her own home, a child can become the 
victim of vicious e-mails, text messages, viral videos, or the subject 
of cruel rumors that spread like wildfire.
    Very tragically, such cruel behavior has, in some cases, driven 
some desperate and devastated teens to take their own lives.
    Cyberbullying is just one example of the threats our children face 
in our online world. Unfortunately, there are many more.
    The Internet, for all its good--and there really is so much good: 
rich resources, educational material, networking advances--can also be 
fraught with violent and sexually explicit sites.
    Unfortunately, many parents do not know what their children do 
online--or cannot comprehend the magnitude of the risks they face.
    So the questions we must answer today are:

   What are we going to do about it?

   How do we better protect youths in our online world?

   And what tools can we give parents, teachers and kids to 
        empower and protect themselves and their loved ones?

    I don't pretend there's an easy answer, but I do firmly believe we 
can do better--and can do more--to protect our youth online.
    Our efforts will require all of us--parents, the private sector, 
government and educators--to work together.
    But when the challenges we face involve the safety of our kids, we 
all must get involved.
    I believe:

   the private sector must be more proactive in taking steps to 
        safeguard kids' online safety and security.

   State and local governments must raise awareness about the 
        problem--and educate and empower kids about proper and safe 
        online behavior.

   Congress also has a critical role to play. If companies do 
        not act to better address children's online needs, then 
        Congress should.

    As long as I am Chairman of this Committee, I will continue to work 
toward a safer online environment for our kids. Inaction in the face of 
this growing problem is simply not an option.
    Thank you again, Senator Pryor, for holding this very important 
hearing.
    I look forward to hearing from our witnesses today.

    Senator Pryor. Well, let me go ahead and call on you to ask 
the first questions.
    The Chairman. Well, I got here after you two did.
    Senator Pryor. Now, we--we've already worked it out. We 
insist. Go.
    [Laughter.]
    Senator Pryor. You're the Chairman. Go. It's your turn. Am 
I going to have to hit you----
    The Chairman. What about----
    Senator Pryor.--with this gavel?
    The Chairman.--ladies first?
    [Laugher.]
    Senator Pryor. She's fine with it. She's fine with it, I 
promise.
    Senator Klobuchar. I promise.
    Senator Pryor. You go.
    The Chairman. OK.
    Ms. Rich, the argument is made--now, I'm very skeptical on 
this subject. And I hear Mr. Snowden talk about, ``We're doing 
everything we can. We're sort of staying ahead of the curve. 
And, oh, by the way, can't we have more government grants to 
educate the people?'' And he sort of implied that they were 
doing everything they could to educate the people. And so, I 
guess, logically, he'd be correct--one plus one equals two. 
But, I think, basically, what they want to do is make money and 
that the rest of you, and this particular Senator, have a--sort 
of a different approach to it.
    What is the FTC's assessment with regard to teens, 13 
through 17? We've agreed that kids under 13 are incapable of 
making, you know, intelligent--or mature, informed decisions. 
Does the same hold true for--on this matter, does the same hold 
true for 13 through 17?
    Ms. Rich. We believe there are significant challenges, in 
terms of the impulsiveness and the judgment of teens, they're 
not functioning like adults, and they don't have the decision-
making capacities of adults to protect themselves. But, in 
terms of the COPPA model and whether you can impose parental 
consent for teens' use of technologies and the collection of 
information for teens, we are very skeptical that that model 
would work for teens. They have access to the Internet through 
all sorts of outlets outside the home. They're more likely to 
alter their age information, in order to get online. They may 
not readily go to their parents and ask for permission. So, we 
don't believe that that model would work for teens, but we're 
happy to work with the Committee to develop appropriate 
protections for teens, of a different sort.
    The Chairman. Well, I might ask you to explain that. But, 
let me ask another question. The whole concept--and we've been 
through this in so many ways, on so many subjects--of parental 
responsibility, whether it's the use of the remote, blocking 
out--listing and programming in what programs can and can't be 
seen. I, unlike, Senator Pryor, who comes from a very large and 
urban and sophisticated state--I come from a rather small and 
rural state. And parents really don't have a whole lot of time 
for that, or a whole lot of instinct for that, or, in many 
cases, any training at all for that.
    I mean, and there's the television set. They know how to 
turn it on and off, the way they used to work, but the whole 
concept of the technology of a remote is now extraordinary. I 
mean, they're so large and long, have so many buttons that you 
actually have to get very conversant with them, almost talk to 
them, to find out where the mute button is. Takes--that's 
probably 15 minutes just to find the mute button. So, expecting 
parents--yes, we should expect parents to do that, but is that 
not--maybe I should just ask you: What percentage of parents, 
roughly, in this country, would you say, are actively and 
effectively engaged in dealing with their younger children, 
with respect to the subject of today?
    Ms. Rich. I don't have a figure for that, but we are----
    The Chairman. Don't have to. You could guess.
    Ms. Rich.--we--I really wouldn't be able to estimate that. 
But, we are working hard to get our booklet Net Cetera, which 
is all about parents talking to their kids about the use of 
these technologies, into the schools. Just in the last 10 
months, we've distributed 3.7 million of them. One came home in 
my 12-year-old's backpack, and he gave it to me, and we talked 
about it. We'd already talked about those things.
    The Chairman. Well, you work for the FTC. I would have 
hoped you would have talked to him----
    Ms. Rich. Right. Yes.
    [Laughter.]
    Ms. Rich.--and we intend to do that. That being said, I 
agree that education is not the only solution, because people 
are busy. There's more that could be done. Mr. Snowden talked 
about controls on cell phones. I think more could be done to 
educate parents about those controls, because I think phones 
provide the unique opportunity to add controls at the outset, 
because parents still pay for most phones. And, I know, when I 
got my 12-year-old a cell phone, I was not told about all of 
the defaults that I could set, and, as a result, we got home, 
and he was on the Internet and using all sorts of games that I 
did not think I got with my phone, and was very unhappy about.
    In addition, enforcement is hugely important in this area. 
And the FTC has a long record of enforcement against companies 
that misused children and teens information. GeoCities, Liberty 
Financial, Toysmart, Gateway--I could name a lot of cases. And, 
most recently, we sent a letter to a company that was 
potentially planning to release very sensitive information 
about gay youth, the XY Company. So, enforcement is also very 
important in this area.
    The Chairman. OK. Ms. Rich, my time has run out, but I 
just--I want to take the concept that this is not just another 
subject that we're talking about. I think this is a game-
changer, in terms of the values that our children will grow up 
with and carry on. What Mr. McIntyre or Ms. Collins, either one 
of them, or both of them, said, reading is no longer, sort of, 
appropriate behavior; thinking is not necessarily appropriate 
behavior, you have to do some of it at school, but you 
certainly don't have to do it when you're, you know, doing what 
we're talking about here, or watching television, you just 
watch, somebody else thinks for you. And I really--I think it's 
a huge problem for our culture and for our future, because we 
are so open and so free and so noninterventionist. People can 
take advantage of vulnerability, at great profit, and yet not 
be tagged with being, themselves, purveyors or encouragers of 
predatory or bullying or whatever type behavior.
    I think we have to think very seriously about whether we 
can let people continue to think that way. It's not just a 
matter of educating people what they could do, but it's a 
matter of scaring the heck out of people about what's going to 
happen to--what is happening to their kids, that they don't 
know about.
    Thank you, Mr. Chairman.
    Senator Pryor. Thank you.
    Senator Wicker.

              STATEMENT OF HON. ROGER F. WICKER, 
                 U.S. SENATOR FROM MISSISSIPPI

    Senator Wicker. Well, I think I will follow the Chair's 
lead and insert my statement in the record.
    [The prepared statement of Senator Wicker follows:]

     Prepared Statement of Hon. Roger F. Wicker, U.S. Senator from 
                              Mississippi

    Thank you, Mr. Chairman, for holding this hearing on protecting 
young Americans in an online world. This is a very important topic, 
which deserves and requires continuing research and investigation if we 
are to keep up with the ever-changing Internet. It is also an issue 
that I know you and I both are interested in personally, and I commend 
you for your commitment and determination to ensure that our youth are 
protected online. I look forward to continuing to work with you to find 
the best way we can assist educators, industry, and most importantly 
parents in keeping their children safe online.
    The Internet is unquestionably one of the marvels of modern times. 
Accessing the World Wide Web has impacted our daily lives as much as 
nearly any technological achievement in history. Education, 
entertainment, travel, commerce and even health care have all been 
revolutionized by the Internet's influence. Access to online content 
has gone from a luxury to a virtual necessity in the classroom, 
boardroom, and even the offices of the Capitol. One of the most 
critical components to the Internet's success has been its dynamic 
nature. It is changing and growing constantly, unencumbered by 
unnecessary regulation and driven to provide a better product that 
meets increasing consumer demand. However, this continuous evolution 
also presents one of the Internet's biggest challenges.
    Keeping pace with technological changes is a difficulty that many 
industries face. It seems that almost every day a new service, 
application or product is unveiled that is a little faster, better, and 
more complicated than those we were using yesterday. This presents new 
and unique challenges in efforts to ensure that online technologies are 
safe for children. We continue to search for the right balance that 
will ensure safety without unnecessarily restricting development of 
beneficial products. Finding that balance is especially challenging 
when we are discussing content viewed and used by people of all ages.
    Children today are interacting in new ways online and often are 
providing the content themselves. Through mobile broadband and texts, 
many of today's children are connected to each other and the Internet. 
This fact was underscored in a recent report by the Pew Internet and 
American Life Project, which found that 72 percent of teens use text 
messages and almost 60 percent of 12-year-olds own a cell phone.
    Gone are the days when the best advice to parents for protecting 
their children online was to monitor their child's activity by putting 
the family computer in a visible location in the house. Today, parents 
must get involved directly and talk with children about what they are 
doing online and how to do it safely. One problem is that most parents 
know less about these technologies than their children. We must all 
work together not only to equip parents with the best tools to keep 
their children safe but also the knowledge to use the tools effectively 
and to talk to their kids about safe behavior online.
    Industry, child advocacy groups, and relevant government agencies 
have made great strides studying the online dangers for youth, and in 
finding ways to protect children. Several of our witnesses participated 
in the Online Safety and Technology Working Group, which recently 
published a report titled ``Youth Safety on a Living Internet.'' This 
report acknowledged that there is no one silver bullet answer for 
keeping children safe online.
    I am particularly interested in the report's finding that there are 
numerous tools available for parents but more needs to be done to 
improve awareness and usage of these resources. That is one area I 
would like to explore further with our witnesses today. Working 
together, what can we do to help parents better understand the problems 
they are facing? What tools are available to help them? And how do we 
encourage parents to utilize these tools?
    I want to thank all our witnesses for being with us today and 
sharing your expertise on this topic.

    Senator Wicker. Thank you, to the Chairman of the 
Subcommittee, particularly for the efficient way in which he 
has run this hearing today, getting it started as the vote was 
going, and moving it along at an efficient pace. So, thank you, 
Mr. Chairman, for your concern with this. And my statement in 
the record will stand.
    I hope it's still all right for Americans to make money in 
this industry. Mr. Nigam, I would assume that the people at 
MySpace don't mind making a dollar, either. I think there's a 
way for innovation and investment and job creation to occur in 
this industry while still protecting children and young people, 
and I hope we can do that.
    I appreciate the testimony of all of you.
    Let me just ask this, and I'll start down here with Mr. 
Snowden, and maybe people can respond if they disagree. I'm 
trying to figure out where we might have differences of 
approach on the panel.
    Mr. Snowden, you say, ``We look forward to working with 
this committee to craft policies which properly balance the 
need, on the one hand, for flexibility in responding quickly to 
behavioral, technological, and market changes, with 
concerns''--and I'm paraphrasing your words--``concerns for 
safety.'' So, what are your specific concerns there, Mr. 
Snowden, that might upset the balance between the need for 
flexibility in innovation and safety?
    And also, you say, ``The wireless industry believes, with 
voluntary initiatives and strategic collaborations, we'll 
continue to ensure delivery of benefits of wireless products 
and services to all Americans.''
    What gives you pause, Mr. Snowden, beyond voluntary 
initiatives that might have a stifling effect on innovation and 
keeping the United States on the cutting edge of this industry?
    Mr. Snowden. Thank you very much for your question, sir. I 
think the short answer is: I'm not sure if there is large scale 
or any disagreement among any of us. We work collaboratively 
with just about everyone on this panel. And I've just met Mr. 
McIntyre today, but I look forward to working with him as we go 
forward.
    In terms of our concern, is--and I think you saw this in 
the Working Group's report--there is no-one-size-fits all. And 
if you take the mobile space, and you say, ``Well, you need to 
do this,'' the--you treat the mobile community the same way you 
treat the online community, versus e-mail or whatever it might 
be, or television--it's not going to work. And I think--we 
spent a whole year debating this issue of, Is there one way to 
do this? And at conclusion, as you saw in the Working Group 
that you saw from Hemu, is that there isn't one way to do it.
    And I think, from our standpoint, we're not in this to make 
money, in terms of on the backs of exploiting children. That is 
not our goal. We saw the headlights of what was going on in 
other industries when we began to watch our industry grow and 
explode, in terms of the technology. And one of the things that 
we did immediately, for example, is we started working with the 
National Center for Missing & Exploited Children on child 
pornography. We wanted to make sure that wasn't on our 
networks. We began to work with the FTC. We began to work with 
other parties so that we could make sure we were smart on these 
issues, so that we can protect kids.
    A lot of this is behavior of children that's facilitated by 
various products that are out there. We look at it from a 
three-pronged way that takes education, it takes the law, it 
takes technology. And so, there is not just one way to do it. 
It's everything, working together.
    Senator Wicker. Anybody wish to take issue with Mr. Snowden 
in that regard? Follow-ups?
    Mr. Nigam. Yes.
    Senator Wicker. Mr. Nigam?
    Mr. Nigam. I noticed you kept looking at me, so I assume 
that's a hint to say something.
    [Laughter.]
    Mr. Nigam. Senator, what I want to point out--I actually 
want to step back and try to frame the discussion a little bit. 
And it's partly in response to what you said, but partly in 
response to what Chairman Rockefeller also said.
    When we looked at these issues--and I, for one, have looked 
at them for many years--one thing that's become very clear is 
this, and this is the pain point for parents.
    And I know, I was asked to let you know that I'm speaking 
on behalf of myself rather than News Corporation and--during 
the question session.
    Parents are looking at technology and saying, ``It's that 
thing that my kids know, and I know nothing about.'' And then 
they're making a jump to a conclusion, which they don't need to 
make, but they're doing it. And that is, ``My kids know that 
technology. I don't. And therefore, I cannot raise them, when 
it comes to technology.'' And, I think what we have to do is 
help parents understand that, as parents, they still have the 
right, the power, and the ability to educate their teens and 
their kids about safety, just like they did from the day their 
baby was brought home from the hospital. When they did it with 
the cribs and teaching them. Then they did it with the parks. 
Then they did it when they sent their 13-year-old to the mall 
and said, ``You're not going to do this. You're going to stick 
with your group. You're not going to talk to strangers. You're 
not going to disclose info.'' Things like that. And what you'll 
find is, the lessons they've been teaching all along, if they 
continue to teach that in these new mediums, whatever they 
are--it doesn't even matter what they are--those lessons apply 
perfectly well.
    And the second thing you find is that teens and kids 
actually learn them. We often think they don't, but they do. 
They learn how to look both ways when they cross the street. 
They learn how to avoid that creepy guy in the mall or tell 
somebody there's somebody in the mall that they want to stay 
away from. They learn those things.
    And then, from a purely business perspective, what's really 
interesting is, oftentimes people have a feeling, ``Businesses 
got to make money, got to make money, got to make money.'' 
What's really interesting here, in the safety area 
particularly, is that in--businesses actually benefit by doing 
the right thing--tremendously. And they benefit because their 
reputation is at stake, and nobody wants their reputation to be 
tied to predators and other misconduct as, ``That's the 
business where you find that.'' VCs won't invest in businesses 
like that. Advertisers won't advertise and align their, you 
know, billion-dollar-supported brands with businesses with 
reputation issues or criminal issues and things like that.
    So, there's actually an incentive, from day one, to focus 
on Business 101. And that is, you can do the right thing, and 
you will be doing the right thing for your business. So, from 
that perspective, I go back to what I've said before in other 
settings, and that is: Look at this issue from the perspective 
of, How do you build a town into a city, into a country, into a 
state, and look at all the different things you do there, and 
take those same learnings and start applying them in this area, 
and help people understand that they can actually do that and 
succeed that way?
    Senator Pryor. Senator Klobuchar.

               STATEMENT OF HON. AMY KLOBUCHAR, 
                  U.S. SENATOR FROM MINNESOTA

    Senator Klobuchar. Thank you very much, Mr. Chairman. And 
thank you for convening this important hearing.
    As a parent of a 15-year-old that just did her birthday 
invitations by Facebook, I know how technology has changed our 
children's lives. The Pew Internet in American Life Project 
documented that 73 percent of American teens now use social 
networking website, up from 55 percent, 2 years ago. So, I 
think it's no surprise, with that exponential growth, that we 
are looking at this and trying to figure out new ways to 
respond. The same study found that 83 percent of 17-year-olds, 
and nearly 60 percent of 12-year-olds, own a cell phone.
    So, my question, first, is--in fact, just this morning, I 
sent a letter to Facebook's CEO Mark Zuckerberg, asking about 
the feasibility of adding a safety button to Facebook pages of 
kids under the age of 18.
    On Monday, Facebook partnered with a child protection 
agency to create a panic-button application for users in the 
United Kingdom, but this application is not available in the 
U.S. There is a Help button on the pages, but it doesn't--you 
have to go through two clicks to get to any security 
information. And, in my opinion, a prominent button or link, 
given some of the numbers that we're seeing in the numbers with 
predators on the Internet, would make this a sensible way to 
handle this, for kids who have no idea what they're getting 
into, often.
    How readily available, do you think--and anyone can answer 
this--if you want to start, Ms. Collins, because the group that 
they partnered with in the U.K. was similar to your group--how 
readily available are public safety materials to teenagers 
online? Do you think children know and understand the basic 
risk and threat? As you know, most children don't always report 
the threats to law enforcement. And how can we better get 
information to teens and parents? And does this type of thing 
going on in the U.K. make sense?
    Ms. Collins. Thank you, Senator. Those are excellent 
questions.
    One of the most important things, in the online world and 
the various platforms that children and adults are using, is 
the ability to be able to report incidents that they find 
disturbing or harmful, possibly illegal, in an easy-to-do-
format, an easy-to-do way. Most companies have an Abuse button, 
some sort of policy and procedure in place, but if it's not 
easy for the user to do, they're not going to report it. In 
most cases, as you mentioned, very often they won't report the 
incident in the first place. So, the availability of a 
prominent and easy-to-use, easy-to-find Abuse button, Report 
button is very important.
    There have been discussions, amongst the industry and 
amongst child protection groups, about the importance of really 
having some sort of--essentially, if you can imagine a 
``splash'' page, because there are many resources that are 
really necessary for families to be able to access. Certainly, 
in my world, it's the sexual predation of children by adults 
and others. But, of course, there are other issues that people 
encounter on social networking sites, on the Internet, in 
general, whether it be, you know, potential domestic violence 
that they are witnessing information on; suicide; bullying; you 
know, gender identity issues--that there are many qualified and 
very good entities out there that we need to be able to find 
some way to be able to easily point parents, children, 
concerned members of the public--when they see an incident, 
something they find disturbing, something they want to report, 
that they can easily access the reputable entities that they 
would then be able to make a report to. And working across the 
industry to do such an initiative, I think, would be very 
important, because we need to make it easy for people to report 
something if they find it disturbing or harmful.
    Senator Klobuchar. So, the easier it--and the more obvious 
that it's more available, the better it is for those that could 
be the victims of predators.
    Ms. Collins. Well, most companies--yes--most companies also 
have abuse and compliance teams. Most of the large players have 
compliance teams that also take reports and--because people 
really do report many different types of abuse, whether it be 
language, whether it be content, and, of course, predation. And 
those companies will make reports regarding the sexual 
predation of children and online child pornography to the 
National Center for Missing & Exploited Children.
    But, to your point, accessibility and ease of use is 
critical.
    Senator Klobuchar. OK. That's why I was focused on that. 
And we hope we can work with them on this.
    One issue that hasn't been discussed is peer-to-peer file 
sharing and the privacy concerns that arise when kids use these 
programs. As you know, these programs are popular with children 
and teenagers because they can download songs and movies to 
their computer. Oftentimes, however, children will share 
personal files, such as family photos, home movies, family 
documents, and there are many cases of predators using peer-to-
peer networks to download pornographic materials and target 
kids.
    Senator Thune and I have recently introduced legislation 
that attempts to address the problem of inadvertent sharing on 
file-sharing networks. I did an event at--actually, at Best 
Buy, with a number of victims, not child victims, but people 
who had just simply gone home to work on their computer, put 
all the documents from their employer on there as they were 
working on it. They didn't know that their kid had one of these 
peer-to-peer file-sharing programs on the Internet, and 
suddenly all of their company's private employee data was 
stolen and where they became victims of identity theft. We had 
a number of cases like this.
    So, if anyone wants to comment on the peer-to-peer issue.
    Ms. Rich?
    Ms. Rich. Yes, Senator, this is a hugely important area. 
And if you talk to people who monitor this area, they say that 
the amount of information--sensitive information flowing over 
the peer-to-peer networks is enormous. We recently did a sweep 
and sent warning letters to many dozens of companies whose 
sensitive information was exposed over the networks, probably 
for the same reason you were just describing, which is, their 
employees downloaded it, maybe at home, or their kids did, and 
then all this sensitive information--tax records, health 
information, financial records--was exposed.
    So, it's a hugely important area. And I know you have been 
working on a bill, that we support, that provides greater 
transparency for this, and warnings. And we're very supportive.
    Senator Klobuchar. Anyone else want to add anything?
    [No response.]
    Senator Klobuchar. All right. Thank you very much.
    Senator Pryor. Thank you.
    Ms. Rich, let me start with you, if I may. And I have a 
copy of your Net Cetera publication here. And I'm just 
curious--I don't know, really, how to ask this, other than say, 
kind of, on a scale of 1 to 10, how successful do you think 
this effort has been? And I guess, also, what kind of feedback 
are you hearing from people on it?
    Ms. Rich. Well, it's interesting you should use that 
number, because we actually do have an online survey we use for 
our ``OnGuard Online,'' of which this is part, and have asked 
consumers, or users, to rate it on a scale of, well, 1 to 100. 
And it's at 79 percent, which is higher than the information 
provided on other government websites. If you take into account 
the reach we've obtained through this, I think we're very 
pleased with where we are. As I said earlier, in less than 10 
months, we distributed over 3.7 million. And when one school 
district finds out another one has distributed it, they call us 
up and ask for it. So, every week, we take a tabulation, and it 
rises. So, we're very pleased with how it's going, and we 
intend to find additional outlets to distribute it.
    Senator Pryor. Great.
    Mr. Nigam, let me ask you, if I may, about the children who 
are online and--you may not be qualified to give, like, a 
psychological profile, but what kind of--you know, what--is 
there a pattern out there about who does the bullying and who 
gets bullied the most? Or is it just kind of a random selection 
of kids?
    Mr. Nigam. Chairman Pryor, I have four children, so I can 
probably create psychological profiles of children.
    [Laughter.]
    Senator Pryor. I understand.
    Mr. Nigam. But, that said, in particular, what the research 
has--and this is research done in four different, I think, 
specialists doing research, and they all came to the same 
conclusion, which is really an eye opener, and that is, kids 
who are at risk in the physical world are the exact same kids 
who are at risk online. Those who engage in bullying activity 
in the physical world are the same ones who will engage in 
bullying activity online. Those who get bullied in the physical 
world will also be the ones who will get bullied online.
    And what this has done is, in essence, confirmed that the 
physical and the online have really become one. And, I think, 
as long as we're focused on treating them separately and 
finding separate solutions, we're actually missing an 
opportunity, and that is to really look at it from that larger 
50,000-foot context and say, ``Is there more that needs to be 
done in the physical side?'' And, if it's going to be done, 
apply that, and make sure it gets applied online. If you find a 
kid who's bullied or a child, in the physical side, then start 
engaging and saying, ``That could also be happening online''; 
and vice versa on the bully, which is, if they're doing it in 
the bully--if your school is saying your child is causing 
trouble, or another parent is saying that, well, then also 
start considering, ``Are they doing that and extending it to 
the online environment?'' because, more than likely, that's 
going to be true.
    Senator Pryor. OK. Let me ask you a different question, and 
that is--you mentioned, in your statement, that MySpace 
provides to parents and teens and school officials some sort of 
guide. Is it a written guide?
    Mr. Nigam. Yes.
    Senator Pryor. And wouldn't it be more effective, and 
perhaps the most effective, if there was something very clear 
at the point of use, you know, there on MySpace itself, online, 
that the kids and the parents somehow could utilize. And--or do 
you already do that?
    Mr. Nigam. Actually, Senator, we have a section on 
myspace.com/safety that is designed specifically for parents, 
for--and another section for teens, and one for educators----
    Senator Pryor. But----
    Mr. Nigam.--that has the guides for downloading. And on 
every page, including the front page of the site, there is a 
Safety button that takes you----
    Senator Pryor. OK.
    Mr. Nigam.--to all the right places.
    Senator Pryor. That's really was what I was asking, 
because----
    Mr. Nigam. Right.
    Senator Pryor.--I know a lot of companies are well-
intentioned, but you've got to click and follow certain links 
to get where you need to be. And what you're saying, on 
MySpace, it is there on every page, so they can easily get to 
it if they need to.
    Mr. Nigam. Right. And this ties exactly back to--from a 
purely business perspective, it builds reputation with your 
user base, it builds trust, it's good for business, it's the 
right thing to do. And that's a good example of why you should 
do that, whatever business you are.
    Senator Pryor. OK. Great.
    Ms. Collins, let me switch to you, if I may, and that is, 
What are your recommendations on how to generate more awareness 
about safety resources that are already available to parents 
and children? I mean, my experience is, most parents really 
don't have a real good idea that some of these resources are 
available. So, how do you think we can best get that word out 
in the most effective way?
    Ms. Collins. I think it's an excellent question. And, you 
know, I've participated and gone out to some schools in the 
evenings or on weekends to do parent events, to talk about 
Internet safety. And, unfortunately, you usually get the same 
parents who are probably pretty engaged in their children's 
lives at that time also.
    There are many, many good resources out there for parents, 
including NetSmartz411, which explains technology in very easy-
to-understand language. But, we--you know, all of us, everyone 
continues to put parents right there at the front line in order 
to educate their children, but they don't necessarily have the 
tools of what they need to educate them on.
    I think that, just off the top of my head, one of the 
interesting ways that--maybe would be, rather than expecting 
the parents to be coming into the schools in the evenings or on 
the weekends and so forth, bring it into the workplaces. Bring 
in some of the information, bring it to them, rather than 
expect them to come to an event at the schools.
    I think the schools still, though, are front-line for 
getting information home to the families. And I agree with much 
of what Mr. Nigam was saying about making sure that we teach 
these overarching lessons of safety, rather than teaching to a 
specific technology, because the one guarantee we have is, it's 
going to be different in 2 years.
    Senator Pryor. What is the--from your standpoint, Ms. 
Collins, what's the most alarming trend that you're seeing, in 
terms of, you know, children being targeted or, you know, just 
prevalent problems on the Internet with kids? What's the most 
alarming trend that you're seeing?
    Ms. Collins. The trend that we're seeing most, just in the 
last year and a half, 2 years, are the teens creating sexually 
explicit material of themselves and sending it to others 
online. We have many cases, and you can pretty much speak with 
law enforcement across the country working these cases. And 
they're challenged with these cases, not only on how to respond 
as a law enforcement officer, but how to intervene with the 
families. Kids who are producing very sexually explicit 
materials, sending it to their boyfriends/girlfriends, posting 
it up on their social networking pages, many of them, you know, 
the distribution may occur within a small group of their 
friends or their school, but we've heard from so many kids and 
teens, the humiliation the long-term impact of it.
    And, in fact, there are more cases that we're hearing 
about, across the country, where a child may put something 
explicit of themselves somewhere online, I take it down, send 
it around the Internet, and someone then can use that to 
blackmail the child. And we're seeing those cases, really, 
across the country and around the world. And the hard part then 
is, When is the child going to be able to tell somebody and 
report it?
    So, I think, right now, the most obvious trend for us is 
the kids who are using this technology now, lots of technology, 
lots of privacy, they're at a sexually curious age, and making 
some poor decisions.
    Senator Pryor. Right.
    Well, listen. I'm going to call on Chairman Rockefeller, 
and he's actually going to take over chairing the hearing for 
me.
    So, thank you very much for your time.
    The Chairman [presiding]. For a price.
    Senator Pryor. Yes, I understand.
    [Laughter.]
    The Chairman. It's a busy time here.
    The--Mr. Snowden, do you think that--one of the things 
we've done here in the Commerce Committee is to say that you 
cannot text or cannot use a cell phone while you're driving. 
And----
    Mr. Snowden. And we support that.
    The Chairman. That wasn't my question.
    Mr. Snowden. OK.
    [Laughter.]
    The Chairman. The--do you think that--you see, it keeps on 
growing. People, they may know that it's a--it has nothing to 
do with bullying or exploitation, but it's just endangerment of 
other people, including the other person in the car that you're 
driving or the car that you hit. Five thousand people a year, 
maybe more than that, die; and I think there's something like--
I think it's something like 50,000 a year are wounded, maimed, 
or whatever, as a result of that behavior.
    Now, in this committee, we've sort of agreed that that 
should be illegal. In other words, the government is 
intervening in a behavioral matter, having nothing to do with 
kids, you know, up to the age of 17, by definition, but people 
much more mature than that who are doing something which is 
lethal. And so, we would have the choice, I suppose, of saying, 
``Well, in time, this is going to be apparent.'' And to which 
my answer is, ``No, it wouldn't be apparent. People just keep 
on dying, because texting is--you know, is just necessary to so 
many people.'' And so, the government has to intervene.
    Now, why do you think it is that the government has to 
intervene in a mature situation leading to a bad or lethal 
result, in many cases, and many, many very close misses--why is 
it that the government has to intervene, probably, in that? 
And, you say--I didn't ask you, but you said you were in 
support of that. And that's not--that has the same sort of 
parallel logic involved in it as the subject that we're talking 
about, which, in fact, worries me much more, for the long-term 
health of the country.
    Mr. Snowden. If I'm following you correctly, sir, the--
where we support is--and we've put, as you put it earlier, 
money behind it by doing a PSA on driving, ``On The Road, Off 
The''--``On The Phone, Off The Road Campaign'' about text 
messaging. We don't want people doing that. And what states 
have done around the country is made the behavior illegal. And 
I think what we're seeing here in this context of what young 
people are doing is--the question that you're asking me is, 
Should that be illegal?
    The Chairman. No. I'm saying don't you think it was 
appropriate--it's appropriate for the government to have to 
intervene and make it illegal, with penalties?
    Mr. Snowden. It depends what you mean by--what the 
government's saying is----
    The Chairman. If you're----
    Mr. Snowden.--illegal.
    The Chairman.--caught texting or using a cell phone in a 
car.
    Mr. Snowden. And we--we've--I have, personally, written 
letters to----
    The Chairman. So, what's the----
    Mr. Snowden.--in----
    The Chairman.--difference?
    Mr. Snowden.--support of this in----
    The Chairman. What's the difference? That's the lesser evil 
than what we're talking about at this hearing, to me.
    Mr. Snowden. What is the difference----
    The Chairman. What we're talking about----
    Mr. Snowden.--between----
    The Chairman.--at this hearing shapes the future of the way 
children grow up to be adults.
    Mr. Snowden. What I'm not following, sir, is--you're 
saying----
    The Chairman. Well, I'll try somebody else, then.
    Mr. Snowden. Well----
    The Chairman. Ms. Rich, maybe you can respond.
    Ms. Rich. Well, can I translate for him?
    [Laughter.]
    Ms. Rich. What he's saying is that----
    The Chairman. No, no. I don't ask you to translate me----
    Ms. Rich. Yes.
    The Chairman.--to him. I asked you to----
    Ms. Rich. You want me to answer it?
    The Chairman.--answer my question.
    Ms. Rich. You're saying these consequences are even far 
more serious than the texting----
    The Chairman. For the long-term, I think.
    Ms. Rich.--because we're shaping the minds of youth----
    The Chairman. Yes.
    Ms. Rich.--and the safety of youth.
    The Chairman. Yes.
    Ms. Rich. So, we, at the FTC, would agree that the privacy 
and safety of teens is immensely important, and that's why 
we've done all the efforts that I described earlier.
    Mr. Snowden. And may I go back to this, sir?
    The Chairman. Well, you can try again.
    Mr. Snowden. Sure.
    The Chairman. Neither of us are doing very well.
    Mr. Snowden. Well, we're not disagreeing with you. We're 
not disagreeing with anything you're saying. What I was trying 
to understand before I answered your question clearly was, Are 
you saying that the behavior that--of sexting should be made 
illegal, are you saying that the behavior of cyberbullying 
should be made illegal? And, in that case, particularly 
cyberbullying, there are cases--that is illegal. I mean, 
States' attorneys have already----
    The Chairman. Well, I mean, I--I'd take it in a different--
--
    Mr. Snowden.----. So, we support that.
    The Chairman.--direction. I would say--and, you know, I'm 
pretty hardcore on all of this. I don't have a whole lot of 
tolerance. I mean, when the good Senator from Mississippi 
said--turned the hearing from something about, ``Are we getting 
in the way of innovation in technology?''--not seeming to 
understand that this is about sexual predating and bullying and 
all kinds of things. And people--I mean, I--you know, the 
Internet, to me, is very interesting.
    There's nobody here, so I can just talk as long as I want. 
The----
    [Laughter.]
    The Chairman. It's very interesting. The Internet was a 
magnificent discovery. Everybody lives and dies by it. At the 
very same time that we're spending a great deal of time on this 
committee and on the Intelligence Committee, in which I also 
serve, working on something called Cybersecurity.
    Mr. Snowden. Right.
    The Chairman. Cybersecurity has everything to do with the 
destruction--the physical destruction or shutdown of the a 
nation, or large sectors of a nation, at will, by a 14-year-old 
kid in Indonesia or a state--a hostile state in some other part 
of the world, so that the Internet there becomes, in fact, both 
President Bush's, the last one, and Obama's Director of 
National Intelligence have identified cybersecurity as the 
national--the major national security threat, more than 
plutonium, more than dirty bombs, more than all kinds of other 
things. So, that's one iteration of the Internet.
    Then we come to what we're discussing today. So, you know, 
``We should do more--get out more of these pamphlets,'' I don't 
disagree with. But, I want to hear out of your words, the folks 
who produce this--not produce it, but who produce the 
instruments that allow it, is a more aggressive attitude about 
intervention. Now, I don't think you can--you can't monitor 
what kids are doing, but there has to be----
    Mr. Snowden. Correct.
    The Chairman.--some hookup--and maybe, Mr. McIntyre and Ms. 
Collins, you could help me on this--where people are--they pay 
a penalty. I mean, surely, if they are turned in or it could be 
verified, that their cell phone is shut down for a week--I'm 
talking about something which sort of says, ``Uh, this is 
important. This is not acceptable.'' And I don't know exactly 
what it is.
    But, just--you know, I can remember when Jack Watson was 
President of the Motion Picture Association. They were--and I 
was furious about motion picture indecency and violence and all 
the rest of it, and the way it's going. And he kept talking 
about a $500-million TV--national TV advertising program which 
he was going to do. And I was on this committee at the time, 
and so, he brought this magnificent work into reality and 
showed it to this committee. I didn't want to watch it, because 
I thought it was such a fraud, that they were, sort of, buying 
their way out by buying--putting down X hundreds of millions of 
dollars, out of their trillions, for national advertising on 
``Don't be sexual,'' ``Don't be violent,'' ``Don't be 
explicit.'' And there's some evidence to show that, in the war 
against drunk driving, it had--other effects of that sort had 
some effect emanating from the government, not from the 
industry trying to protect its own future. But--and then he 
wanted to come show it to me in my office, and I wouldn't see 
it.
    It was not a serious attempt on the part of the movie 
industry, in that case, to monitor its own content. I could say 
the same thing to the cable companies. They do not seriously 
monitor their content. They say, ``We do what the watchers 
want. We give them what they want.'' That is ridiculous. They 
give them what they teach their watchers to want to want. 
That's not Shakespeare, but it's very clear to me.
    [Laughter.]
    The Chairman. And that's the way this world works. That's 
the way money speaks. That's what Wall Street does. That's what 
people who have do to people who don't have. Now, that's a 
little bit broad, but you understand. I'm very angry and 
passionate on this issue.
    So, I look at you and I think, ``Well, we're doing the best 
we can to try, and we're putting out little pamphlets, or we're 
putting out--sending stuff to schools,'' all of which sounds to 
me wholly in adequate when you're dealing with teenage basic, 
you know, sexual instincts, bullying instincts, ``I've got to 
be stronger than the next fellow.'' Did you see the movie 
``Doubt''?
    Mr. Snowden. I did.
    The Chairman. Did you remember the African-American boy who 
was bullied because he was African American? That made a 
profound impact on me. He was totally helpless. And it took a 
Priest to come pick up his stuff that was dumped on the floor. 
He was bullied.
    I cannot tolerate that kind of thing in the world that I 
want my children to live in. And so, maybe I'll just address to 
the panel, so I can just stop talking, What is the best 
approach to this? A serious, aggressive approach.
    We have an Intelligence Committee, and we have an 
intelligence community, which assumes bad behavior, well proven 
throughout all of the centuries, from one country to another, 
or countries within countries to that country, as we now have, 
you know, cells that are made up of Americans trying to damage 
their own country's government. And then we have a military. 
And the Intelligence Committee informs the military, in case it 
gets to that stage. We don't take chances on things that are a 
matter of national security.
    In this case, I'm saying the future of what goes on in the 
minds, or does not go on in the minds, of our children--our 
young children--is a matter of enormous importance, if not 
national security, you know, currently defined.
    I--to me, it's a terribly important matter, and I think 
your answer to it is within the classic bounds of a sense of 
corporate responsibility. You want to do the right thing----
    Mr. Snowden. Correct.
    The Chairman.--but it just never ends up being effective 
enough, quick enough. And I don't think we have a whole lot of 
time. And, actually, I don't want you to answer this. I want 
Mr. McIntyre--I just pick on you, Mr. Snowden, and I get my 
answers from the others.
    Ms. Collins, Mr. McIntyre, could you give me some help on 
this? And I do it--I mean, I do it----
    Mr. Snowden. I'd like to offer some, as well, sir.
    The Chairman. And you will have a chance.
    Mr. Snowden. OK.
    Mr. McIntyre. Thank you, Senator. It's hard to know where 
to pick a starting point on this, because there are so many 
different places we could make an impact.
    I wholeheartedly agree, from my experience in working with 
Mr. Valenti and the television industry on the efforts that 
we've experienced there, and that we continue to experience. I 
sit on the Oversight Monitoring Board for the Television Rating 
System, which is mostly just concerned with coming up with a 
better PSA. And it makes no impact at all. That group hasn't 
even met since 2008, and we've experienced a lot of 
difficulties in trying to move that aspect of media forward.
    If I may offer, it seems to me that, when we talk about 
these issues, we tend to still focus on mostly a market-based 
approach to this. There's nothing wrong with that, but I think 
it is short-sighted to only have a market-based approach to 
this. As I have said repeatedly, media, for us, in the 
Children's Media Policy Coalition and the groups we represent, 
is a kids' health issue. The exposure to media impacts 
children's behavior regarding their health. It impacts their 
physical health, their sexual health, their mental health. It 
is the most dominant environment they're in, right now, that 
it--that impacts their health.
    The Chairman. And you're including the Internet----
    Mr. McIntyre. Yes. Absolutely.
    The Chairman.--and cell phones among those.
    Mr. McIntyre. Absolutely. All media in this.
    If you look at trying to impact health behavior using a 
market-based approach--and I'm not antimarket when I'm saying 
this--but, just from a more objective analytical perspective, a 
market-based approach tends to be reactive. Something happens, 
then the market reacts around it, and you get this kind of slow 
trickle effect when that occurs. That's totally inadequate when 
it comes to a health-based effect, especially for children, 
which are not small adults. They're different, and they're 
different, developmentally, well into their teen years.
    What is most successful in health-based communities is a 
prevention approach. You know, we don't want to wait for the 
disease to happen, and then have to continue to treat it. We 
really haven't done much there.
    And so, it's a real struggle to try to get the media 
environment involved in that. Yes, it takes all of these great 
programs that these individuals have talked about to be able 
have. We need pamphlets. We need education. We need the PSAs. 
But, it is--I think I could best say, it's, at best, a good 
half-step. There has to be other things.
    We need--most of the agreements on privacy right now are 
opt-out agreements. We need to be able to have an opt-in 
agreement, with informed consent by the people that are 
participating in that. And ``informed consent'' is a very 
specific technical legal term that the health community uses 
that assumes autonomy and informs in a certain--what's the 
other word that I've got--assumes a certain ability to be able 
pursue malpractice, should that be violated.
    And so, yes, I think we've got lots of other options here, 
but, you know, when we have another great pamphlet given to us, 
it really becomes kind of frustrating. We're not against the 
pamphlets; we just think it's a really small half-step to go 
forward with.
    The Chairman. Ms. Collins?
    Ms. Collins. Senator, we're--we review child pornography, 
sexually explicit images and videos, day in and day out. We've 
received over 140,000--or, I'm sorry, 940,000 CyberTipline 
reports regarding child sexual exploitation over the last 12 
years. The numbers continue to skyrocket. The problem of child 
pornography, you know, from very, very little children 
certainly through the teens, you know, with the creating 
sexually explicit material and so forth.
    The type of behavior that we see the teens engaging in, 
taking these sexually explicit images and videos, they're 
modeling it after what they see and what they're surrounded by. 
One of the initiatives--it's a little off point with what you 
asked, but one of the initiatives that I did want to tell you 
about, that you may or may not be familiar with--the National 
Center, during the course of operating the CyberTipline, we 
come across, every single day, active child pornography 
websites, that are hosted anywhere in the world, that contain 
vile, reprehensible images of children being sexually abused or 
exploited.
    We make available, to participating electronic service 
providers here in the U.S.--those who wish to be engaged, more 
involved in ensuring that they're not easily facilitating 
transmission or access to these types of websites--we make 
available, every single day, a list of active child pornography 
Web pages, so they can--basically, provide them the tools that 
they can do more to try to reduce further proliferation of 
these images. Many of these children who have been sexually 
abused, their abusers are long gone and in jail, but their 
images continue to circulate on the Internet. And industry 
really can do a lot to try to reduce that.
    In addition, we provide industry participating members with 
hash values, which are basically digital signatures of 
photographs of child victims of pornography. Some of the--
again, some of these children, you know, their abusers are long 
gone, but their images and their revictimization continues to 
happen every single day. We provide these tools to the 
industry, on a voluntary basis, asking them to do what they can 
to try to reduce the further distribution of these images--not 
only because it's the right and legal thing to do, but also 
because it's really a victim- rights issue, that something 
awful happened to a child, and we really should do everything 
that we can to try to reduce that victimization in the future.
    So, we do have initiatives--voluntary initiatives with 
companies here in the U.S., trying to exchange information. We 
provide information to other law enforcement agencies overseas, 
really to try to do--approach it from many different angles. 
Certainly, law enforcement arrests the people who are abusing 
our children; try to educate the kids and the parents and the 
community at large about, ``These are the things you need to 
watch for. If something happens, please report it''; and, 
finally, working with the industry, trying to give tools, also, 
that they will be able to do more, really trying impact it from 
many different levels.
    Ms. Rich. Mr.----
    Mr. Snowden. Mr. Chairman, may I----
    Ms. Rich. We're all----
    Mr. Snowden.--may I address it, as well----
    The Chairman. Yes.
    Mr. Snowden.--sir?
    The Chairman. Yes, you can, in a minute. Two things on my 
mind.
    I have held so many roundtable or, you know, classroom 
discussions with superintendents and parents and psychologists 
and teachers and students all over West Virginia. I mean, this 
is a very, very big subject, as far as I'm concerned. And I 
really have the feeling that those meetings, when you put them 
all together, have made virtually no difference at all. Because 
the parents who came were the ones who--you know, the--we asked 
parents, or we asked the school to pick parents. And so, maybe 
they picked, you know, the most with-it, tech-savvy parents, or 
maybe they pick really good parents. But, I think the--my 
impression is that most of the parents of most of the kids 
don't show up at those things because they--they're scared to, 
because they would show that they didn't know how to do the 
remote-control stuff, much less how do you intervene in--you 
know, in something which goes up on a blog, or whatever. And, 
you know, on blogs, you can take things down. You can take 
things down.
    So, can you just discuss--and then I'll get to you, Mr. 
Snowden--can you--any of you discuss the taking down--and 
somebody, a moment ago, suggested liability, suing. Boy, that's 
a stopper. That's a national attention-getter, too. Now, I 
don't know--would you--you wouldn't it on the kid, I think 
you'd do it on the ISP. I mean, I don't know. What--how can you 
take stuff down so that the kid who sent it is embarrassed, 
maybe becomes a little local news story? I mean, I don't know. 
What--I--but, I know you can take stuff down. Who can do that?
    Ms. Collins. Whoever owns the servers can do that. And 
bringing it to the attention of whoever owns that server, 
whether it's an online service provider, whether it's an 
Internet service provider--bringing that to the company is the 
first step. Then, of course, reporting it. Somebody needs to 
know to be able to take it down. You know, most members of the 
public and most parents, you know, if there's something very 
disturbing up there about their child--inappropriate photos, 
whatever it may be--would not necessarily know how to contact a 
company to try to take those steps.
    The Chairman. Right.
    Ms. Collins. Many companies do, in fact--certainly, with 
child pornography, there is really no problem with getting 
companies to take that down. It's illegal material, and it's 
violations of terms of service, it's contraband.
    The Chairman. Who tries to get it down? Who takes it down?
    Ms. Collins. The actual company that is hosting the 
servers. Where the content is----
    The Chairman. So, they do it themselves.
    Ms. Collins. They will take it down if they're notified, if 
they become aware of it. Most companies, we have not 
experienced any problem with them removing that material and 
reporting it to law enforcement.
    Regarding, you know, abusive, disturbing, harassing, 
upsetting quotes to a blog or social networking site, the 
different companies would have different policies, I assume. 
So, I would probably pass off to one of them to determine at 
what level would they be willing to take it down if a member of 
the public approached them.
    Mr. Nigam. Mr. Chairman, can I speak from my experience in 
MySpace and having built the program there?
    One of the things that all companies can do is be proactive 
when it comes to the kind of content that goes on the site. And 
by that, my--what I mean by that is, employ individuals who 
actually review the images that are posted, identify ones that 
have child pornography, hate speech, extreme violence, drugs, 
paraphernalia, things like that, and remove those and then 
punish the member who violated the rules.
    Second--that's the proactive side--in case you miss 
something, give every user the opportunity to report an abusive 
situation in the place where it may happen. In other words, if 
there's any ability to generate content by a user, that 
location should also have a reporting capability to allow 
anybody who's there to let us know.
    And then employ the 24/7 staff that actually looks at the 
reports coming in, prioritizes based on, ``Is it suicide?''--
goes to the top; ``Is it child exploitation?''--goes to the 
top. And there are lots of----
    The Chairman. You----
    Mr. Nigam.--key words that can be used.
    The Chairman. You mean if somebody takes the initiative--a 
citizen makes the initiative to report to you, for example, 
that you will act.
    Mr. Nigam. Absolutely.
    The Chairman. And my question would be--that's a pretty 
scary thing for a citizen to do. How do they know what they're 
getting into?
    Mr. Nigam. Well, that's where----
    The Chairman. In other words, my question is, Why wouldn't 
you set up your own standards for Facebook and what you will 
allow to appear or what you will--you know, I don't know the 
answer to it. I'm asking.
    Mr. Nigam. I can answer that. Every company has a ``terms 
of use'' that sets the rules and it also sets the expectation 
of what it allows and doesn't allow. At MySpace specifically--
--
    The Chairman. But, that's the small-print thing that people 
get?
    Mr. Nigam. Well, actually, that's the thing that you have 
to agree to that says, ``You are not allowed to post 
pornography, you're not allowed to harass another member, bully 
another member, you're not allowed''--and it goes through a 
list of things. Then the company, like MySpace, proactively, 
using----
    The Chairman. Yes. But, where do they see that? Where do 
they get that? How many times do they get that? Does the child 
or the parent, or whatever----
    Mr. Nigam. Well----
    The Chairman. How many times do you make that----
    Mr. Nigam. Children actually get the message more, because, 
when they are signed up, they get special messages that are 
different than what adults get. But, at the bottom of every 
page, the terms are--if you click on it, in front of you will 
pop the terms. And that's every page you're on, this site.
    But, I think the more important focus point here is, How 
proactive is a company in enforcing the rules? In other words, 
is it using keyword technology, like MySpace does, to trigger a 
review that, because there may be something bad in this area, 
``Staffer go and take a look at it.'' And if there is something 
bad remove it, report it to law enforcement if it's illegal, 
punish the user, take action. And then follow the trail deeper. 
If, for example, you're finding an adult who has befriended 
some kids, and one of them is saying, ``I think he's exploiting 
me in some sense,'' not only do you act on that, you then look 
at everything else that adult may be doing, and follow the 
trail to see if there's a criminal case to be reported to law 
enforcement.
    So, I think companies can be a great deal more proactive 
than they, historically, have been. And it is--and, Senator, I 
agree with you on this--it's time to change the paradigm on how 
companies approach bad behavior, unwanted behavior, illegal 
behavior, from simply a reactive, ``Let me know and I'll take 
it down,'' to a proactive, ``Let me identify it before the user 
base does, or before victimization occurs.''
    Ms. Rich. Mr. Chairman?
    The Chairman. Yes. I've got to do Mr. McIntyre, then Mr. 
Snowden, and then Ms. Collins.
    Mr. McIntyre. Thank----
    The Chairman. And then, Ms. Rich, you're----
    [Laughter.]
    Ms. Rich. If we have time.
    The Chairman.--you have life, as of this afternoon, right? 
The FTC lives.
    Ms. Rich. Right. Terrific.
    [Laughter.]
    Mr. McIntyre. That's good news.
    Ms. Rich. Yes.
    Mr. McIntyre. Thank you. I'll be brief.
    It seems to me, when I think of enforcement in this area--I 
am not a techie, by any means, but my, kind of, an external 
observation is that these companies are incredibly efficient--
even cutting-edge--when it comes to identifying and prosecuting 
copyright enforcement and trademark infringement. I would 
wonder if there was something in that process, that those 
companies employ, that would allow for them to also pursue 
these other infringements with equal enthusiasm.
    The Chairman. Mr. Snowden, then Ms. Collins, and then Ms. 
Rich, and then we'll probably wind up.
    Mr. Snowden. There are a lot of ideas that have been 
presented here. And, Mr. Chairman, I would like to say that 
your passion--you're not alone in that.
    And it's not so much the words that I'm conveying on behalf 
of the industry, I think our actions actually demonstrate this, 
as well, particularly as we look at what we've--we embarked 
upon over 7 years ago. Before we started seeing anything on our 
networks, we started talking with the National Center for 
Missing & Exploited Children to make sure child pornography 
wasn't there. We started working with the various groups. So, 
it is fair to say that the wireless industry actually looked at 
lessons from other industries and said, ``We want to get ahead 
of this.''
    You raised a couple of questions earlier about: Can we just 
shut the phone down for a week? The question that really gets 
debated in that is, Who is the--who has the authority to do 
that? If we were to do that, I would imagine we would be called 
up here before the Hill, with several different committees and 
the FCC, because net neutrality rules would probably come into 
place, about shutting service down and things of that nature. 
So, we need to look at the competing public policy goals that 
are going on right now.
    We used to have a--for years there was a walled garden that 
we had in our networks, and we controlled that. Now, with open 
access, that Congress and other have said, ``We want to have 
more open access, not a walled garden,'' that means there are 
less--there's less control. So, there's something that--we need 
to factor that in as we go through this debate.
    I want to convey that we want to work with this committee, 
and other committees as well, as we go through this, but we 
have to look at it at a macro level, not just in a micro level 
of one single public policy goal. From our standpoint----
    The Chairman. No, no. I'm not going to let you get away 
with that. That--you ended your first statement, that there 
isn't one single approach to this. And I'm not disinclined to 
agree--I'm--double negative. I'm inclined to agree with you 
that there isn't one approach. But, you can't just sort of say 
that, and therefore, stop, and then saying, ``But we were there 
7 years ago.''
    Mr. Snowden. We were there 7 years ago, with our 
technology, with our industry, figuring out how we can do it 
for our issues. For example----
    The Chairman. Are you satisfied with what you're doing?
    Mr. Snowden. We are very satisfied with----
    The Chairman. You're----
    Mr. Snowden.--what we're doing.
    The Chairman.--speaking for----
    Mr. Snowden. And we know----
    The Chairman.--a lot of people.
    Mr. Snowden.--there is more to be done, because we know, as 
the evolution--as innovation continues, kids get smarter, 
technology gets smarter, we all have to get smarter. As you 
listen to what was going on with MySpace, you put rules in 
place for MySpace, that may not work in the mobile environment, 
much like the V-Chip won't work in the mobile or the social 
networking environment, as well. So, we have to look at it, as 
the Working Group said, in a macro level and not one-size-fits-
all.
    The Chairman. But, don't make it so complicated. Look, 
that's--it's doable. OK? I mean, you've got----
    Mr. Snowden. We agree.
    The Chairman.--you've got, MySpace--I'm sorry, I called you 
``Facebook,'' and I apologize.
    [Laughter.]
    The Chairman. But, I mean, you've got that, and you've got 
other venues for it, but there aren't that many. I mean if you 
have to have a multipronged attack--I mean, when Eisenhower 
designed Normandy Beach, I don't think he, sort of, said, 
``Well, we have to do everything the same.'' He said, ``Where 
are you landing? What are the situations? Where are the Germans 
planted?''--and all the rest of it. But, it has to be attacked, 
like we had to do Normandy in order to win that war.
    And we have to do something, a lot more than we're doing, 
in order to win this--or to try to slow down this disease. The 
great influenza epidemic of 1918. I'm ready to make a 
comparison. You know, people aren't dying from it, but 
they're--some are, and their minds are being changed, and 
they're being turned from readers and thinkers into followers 
and bullyers, and, ``I want to please my peers,'' and all of 
that. That's been--that was true when I grew up, but we didn't 
have the tools that are available now. And I think those 
tools----
    It's like the spectrum. Everybody uses the spectrum. And 
all telecommunications companies think that the spectrum 
belongs to them. It doesn't. It belongs to the government. It 
belongs to the American people. And therefore, it can be 
exercised for the benefit of the American people. Which means 
that we ought to be--I mean, the FTC--or the FCC, for example, 
is allowed to comment on promiscuity, but they can't talk on 
violence. That doesn't make any sense.
    In other words, you have to take action at a higher level 
to cause things to happen at a lower level, I think, unless you 
don't consider the problem that serious. If it's not that 
serious a problem, or if the kids are going to evolve out of 
this behavior because they'll grow up and become more mature 
and just their--stop their kids from doing it, whatever it is, 
and then the market works, fine. I don't happen to believe 
that's going to happen.
    Mr. Snowden. Well, that's why we created tools on our 
networks. We have tools that parents can have by literally just 
asking, ``What are the filtering tools that I can put on my 
device?'' That's why we partnered with the National Center, to 
make sure we don't have child pornography. And this is why we 
have launched BeSmartWireless.com so that there's--there are 
tool kits there for teachers and parents and students to 
understand what the landscape is.
    This is a massive issue, and you're absolutely correct. And 
it's something that I think we have to all work together to try 
to achieve. And we feel that we are providing the tools, we are 
working in concert with very--many of these organizations here 
today, and others, and we want to work with Congress, as well.
    The Chairman. Yes. We always have the choice that, if we 
don't like what you're doing, we could do something ourselves, 
right?
    Mr. Snowden. Absolutely.
    The Chairman. You don't want that, do you?
    Mr. Snowden. Well, we want to make sure that we do 
something that's balanced.
    The Chairman. I--it wasn't the question I asked.
    [Laughter.]
    The Chairman. OK.
    Closing thoughts. Anybody.
    Ms. Rich. Yes. I just wanted to come back to the issue of 
consumer privacy, which has been mentioned. You used the term 
``game-changer'' before, and we're working hard now on privacy 
issues, because we believe that some of the technologies you're 
talking about--mobile social networking, we didn't mention 
cloud computing, but all the new ways data is used--are really 
a game-changer for privacy.
    Data is ubiquitous. And right now the dominant model for 
addressing privacy are these privacy policies which we've just 
talked about. The terms of service, it's fine print. People 
don't stop, in the middle of what they're doing, to go read the 
20-page privacy policy, and then decide, oh, in fact, they're 
not going to do what they were doing.
    So, we are looking hard--and this is for adults and teens--
on whether there are better rules of the road, better ways to 
manage data collection, because otherwise teens' data and 
adults' data really can be used by anybody.
    Mr. Nigam. Mr. Chairman, first, I want to thank you and the 
Committee for having this hearing, because one of the things 
that always inspires solutions is dialogue.
    You asked, in many ways, what people were doing, but you're 
also, I think, heavily focused on--and this committee is--on 
what can be done. And I think sometimes, especially in the 
technology side, it's hard, when you're looking from the 
outside in, to see what the possibilities are, but it's 
definitely easier just to ask.
    And I think there's an opportunity here for this committee 
to convene a series of gatherings, if--perhaps that's the 
easiest way to put the word--but, not of the policy folks, like 
us, but of the engineers, because there are amazingly smart 
minds in this country who know how to solve problems, using the 
power of technology. I know the National Center had talked 
about it, with the image-hashing and the fingerprinting, which 
I know MySpace uses, and a lot of other companies do. That's 
just one tiny example of the power of technology being used for 
good. There are hundreds of others that can be created. Many 
are.
    But, at some point, I think what we have to do is focus on 
what to do and how to do, as opposed to what are the issues. 
It--I think we all know what the issues are, and I think it's 
time that we can step forward and say, ``Let's put together the 
what to do and the how to do.'' And the folks who can do the 
``how to do'' are the engineers and that community in this 
country. And I think this body and others in the government 
have the opportunity to convene that gathering and convene a 
series of gatherings like that. And I think a lot of progress 
can be made through that methodology. OK?
    The Chairman. Mr. McIntyre.
    Mr. McIntyre. Thank you for allowing closing comments, 
Senator.
    I would say that I'm not sure that we do know what all the 
issues are here, or that they have been fully acknowledged and 
realized by the industry representatives. Most of this hearing 
deals with the critical issues around sexual and child 
predators. But, ultimately, the heart of the issue is about 
children and their giving out information, whether that be 
through a picture, or whether it be through their personal 
information, where privacy concerns can arise, or whether it is 
in ways that it is solicited inappropriately and then used 
against them by advertisers, as well.
    And so, my concern in this is the public health concern. 
When I look at this report that was just recently generated, as 
great as it is in dealing with the very limited issues that it 
deals with, there are no members from the public health 
community that were a part of that to be able to represent the 
broader spectrum of health issues that are important to 
recognize around our children.
    This is a health issue for our children. It is a basic 
health issue for our children. And we would love to see more 
involvement from the public health community and more 
involvement of the public health priorities as we go forward on 
this.
    The Chairman. Ms. Collins?
    Ms. Collins. Mr. Chairman, it's interesting, when we're 
discussing future steps--and it is very difficult because there 
isn't a whole lot of very current research regarding exactly 
what is happening online, because the platforms keep changing, 
technology keeps changing quickly, and kids and the Internet 
are moving fast.
    I think that it's very important when--you know, to do 
timely research, empirically-based findings, in order to 
determine where exactly to move forward with education, as well 
as bringing law enforcement to the table. Because law 
enforcement across the country are overwhelmed with these types 
of cases, and they're seeing all sorts of things that may or 
may not come through when interviewing children.
    You--the research is needed. We have over 900,000 anecdotes 
within the CyberTipline. One of my light-bulb moments, you 
know, over the past few years, working with some of the 
technologists that Mr. Nigam mentioned--you have these 
brilliant geniuses who are building all these amazing games and 
technologies and so forth, and they're creative and they're 
building these wonderful products that are going to go out 
there. They're not thinking, for a second, about how those 
products are going to be used and exploited to victimize 
children. And in my experience, working with them and talking 
with them and telling them some of these anecdotes, telling 
them some of these stories, it helps them really have a light-
bulb moment themselves to try to build the architecture of that 
system a little bit differently so it's less easy to exploit 
kids, less easy for them--for individuals to take advantage of 
the system.
    I think that really clear examples and cases that would 
help demonstrate how products will be exploited, potentially, 
is very important. So, you know, that's a--you know, kind of a 
forward-movement thing.
    But, I think, lessons learned from the companies that have 
been doing this for some time, so new companies, new products, 
new platforms may avoid some of the pitfalls that have been 
seen in the past.
    The Chairman. OK.
    Mr. Snowden?
    Mr. Snowden. Mr. Chairman, we look forward to working with 
you and--specifically--and this committee, generally--on 
ensuring that consumers have choice and control over their 
products and services, particularly when it comes to wireless. 
And I just wanted to say, thank you for the opportunity to be 
here. We appreciate it.
    The Chairman. OK.
    Am I satisfied? No.
    [Laughter.]
    The Chairman. But, am I grateful? Yes, to all of you, for 
coming.
    And I'm just very much thinking about when a government and 
a private sector of enormous power, stand and watch, and 
sometimes intervene, maybe, as the most vulnerable--you know, 
kids from 5 to 13, 13 to 17, and, frankly, it certainly goes 
beyond that--are being exploited and are being taught, through 
peer pressure and the availability of this medium, and the 
excitement of it, to lose curiosity as I would--and, I would 
say, to think less. That's why I'll never--I will always read 
books. I'm not reading a book if I'm reading it on, you know, 
iPad or whatever. I'm just not doing it. And I just--I think 
there are certain disciplines that young people have to go 
through in the training of their minds. Chess is good, for a 
reason. Teaching kids to play chess is good, for a reason, 
because, like going to law school, it makes you use your mind. 
And it takes up time, then you get into competitions, and you 
go out and you--you know, a whole new life begins.
    Here, what we're talking about is the opposite, and that 
is--and I will always come back to fine print, because this 
committee has done so much work on consumer protection, where 
fine print is the way that people--health insurance companies, 
pop-up Internet things--you know, come to win over people, 
because nobody wants to read fine print, and then--well, in the 
middle of the fine print, there's just a big blue thing saying 
``Yes'' if you want the service. And obviously you think, 
``yes,'' and you don't have to pay for it, you think, and 
whatever. So, I--the fine print, I think, is a--it was probably 
a subject for a hearing, but certainly not today.
    Something has to happen on this. And I think people on this 
committee, at least I would think the majority of them, feel 
pretty strongly about it. And, you know, so we will see what 
happens.
    And I thank you all very much for your courtesy and your 
time in being here.
    [Whereupon, at 4:16 p.m., the hearing was adjourned.]


                            A P P E N D I X

    American Civil LIberties Union--Washington Legislative 
                                                     Office
                                      Washington, DC, July 15, 2010

Chairman Mark Pryor,
Subcommittee on Consumer Protection, Product Safety, and Insurance,
U.S. Senate,
Washington, DC.

Ranking Member Roger Wicker,
Subcommittee on Consumer Protection, Product Safety, and Insurance,
U.S. Senate,
Washington, DC.

Re: Subcommittee hearing on ``Protecting Youths in an Online World''

Dear Chairman Pryor, Ranking Member Wicker, and Members of the 
            Subcommittee:

    Thank you for offering the American Civil Liberties Union (ACLU) 
the opportunity to submit this statement for the record in connection 
with the Subcommittee's hearing titled ``Protecting Youths in an Online 
World.'' The ACLU is a non-partisan organization with more than a half 
million members, countless additional activists and supporters, and 53 
affiliates nationwide. While recognizing the concern many Americans 
have about the dangers facing children on the Internet, we urge the 
Subcommittee to avoid taking steps that would criminalize protected 
first amendment speech and, instead, to support programs that would 
educate and inform children, parents and educators about online risk 
prevention and Internet safety practices.
    The Internet presents new ways for young people to communicate--but 
it does not inherently increase the dangers that have been present in 
human society for centuries. Reported incidents involving youths online 
have produced heartbreaking stories with which all Americans 
sympathize. From these reports, one might conclude that the online 
world is becoming an increasingly dangerous place for children. But it 
is also well-documented that online activity, particularly among youth, 
is increasing exponentially and so it is only logical that online 
incidents--such as online harassment, bullying or worse--would also be 
increasing. We must not let the compelling nature of these anecdotal 
reports stand in for a more reasoned assessment of the threats facing 
young people online.
    It is understandable to want to protect young people online. But 
before taking action in a way that would narrow the rights of adults 
and youth online, there should be a clear understanding of the 
differences between online threats and the kinds of issues young people 
have been dealing with for generations. There is evidence to suggest 
that some of the reported risks young people face online may be 
exaggerated. For example, one respected social media researcher at 
Harvard said that child abduction by a stranger is an extremely rare 
threat--12 out of 300,000 in a year.\1\ It stands to reason that such 
abductions resulting from online activity are similarly rare. And 
despite dire warnings that 20 percent of children have been sexually 
solicited in chat rooms, by instant messenger, or e-mail, it is 
routinely overlooked that these solicitations overwhelmingly originate 
with other young people--96 percent--and that such solicitations are 
easily and typically ignored.\2\ The phenomenon of ``cyberbullying'' 
has also received attention recently and in a rush to address this 
problem, lawmakers have forgotten that bullying has been around since 
long before the Internet. Previously young people harassed and 
intimidated each other face to face, through third parties, through the 
mails, by telephone, across the airwaves, and--only now--via Internet 
communications. Yet there is very little research to suggest the 
dangers to young people are dramatically worse online than offline. 
Before taking legislative steps that may restrict online free speech, 
we urge Congress to make sure it accurately assesses the severity of 
the threat and narrowly focuses any legislative proposal.
---------------------------------------------------------------------------
    \1\ Technology Review, ``The Moral Panic over Social-Networking 
Sites'' (Aug. 7, 2006) (quoting Danah Boyd).
    \2\ Id.
---------------------------------------------------------------------------
    Federal attempts to circumvent the first amendment and regulate 
online behavior with the goal of protecting youths are nothing new. 
They began in the mid-1990s with the Communications Decency Act (CDA), 
which attempted, among other things, to protect minors from harmful 
material on the Internet by criminalizing the knowing transmission of 
obscene or indecent messages to any minor recipient or the knowing 
sending or display of any message that depicts patently offensive 
activities.\3\ After the Supreme Court struck down the CDA, Congress 
tried again by enacting the Child Online Protection Act (COPA), which 
provided for civil and criminal penalties for anyone who knowingly 
posts material that is harmful to minors on the web for commercial 
purposes.\4\ Both laws were declared unconstitutional for 
overreaching--imposing a broader speech restriction than necessary to 
achieve the narrow objective of protecting children from obscene 
material.\5\
---------------------------------------------------------------------------
    \3\ Telecommunications Act of 1996, Pub. L. 104-104, 110 Stat. 56 
(Title V--Communications Decency Act of 1996) (CDA was an add-on to the 
bill and received no substantial public airing of its provisions, 
unlike the remainder of the bill).
    \4\ 47 U.S.C. s. 231.
    \5\ See Reno v. ACLU, 521 U.S. 844, 117 S. Ct. 2329 (1997) (CDA 
facially overbroad); ACLU v. Mukasey, 534 F.3d 181 (3d Cir. 2008) 
(cert. denied) (COPA not narrowly tailored and not the least 
restrictive alternative).
---------------------------------------------------------------------------
    Other Federal legislative efforts have been more successful. The 
Child Online Privacy Protection Act (COPPA) protects children under 13 
from the collection of personally identifying information by operators 
of commercial websites or online services. The Children's Internet 
Protection Act (CIPA) mandates that schools and libraries employ 
software filters to restrict access by minors to inappropriate material 
as a condition of receiving Federal funds. Many Federal and state 
legislative initiatives have attempted to impose restrictions, 
sometimes successfully, on sex offenders in their use of the Internet 
even after completion of their sentences.
    Criminalizing online speech is unconstitutional and will be 
ineffective. Harassing speech will either continue online in violation 
of the law or it will simply shift to other spheres within which it 
simultaneously exists. This does not serve to minimize the potential 
dangers facing young people online, but rather it demonstrates that we 
may be better served by working to educate youth on the 
responsibilities associated with electronic communications.
    Legislation has been introduced to inform children, parents, and 
educators about the risks and opportunities associated with online 
communications. H.R. 3630 and related bill H.R. 3222, the ``Adolescent 
Web Awareness Requires Education Act (AWARE Act),'' offered by 
Representative Wasserman-Schultz, both have elements aimed at doing so. 
The latter bill, in particular, would direct grant funds to the 
development of Internet safety education programs and would provide 
training and tools to teachers and parents to help keep young people in 
a position to use the Internet safely. The former bill--H.R. 3630--
would put a greater emphasis on crime awareness which in our view 
misplaces priorities about the Internet, a facility that should be 
viewed as a vast and expanding resource and not primarily as a place of 
criminality and intimidation. However, the bill also includes some of 
the same opportunities for education of children, parents and educators 
and, as such, represents a better step forward than an overbroad 
attempt to criminalize certain kinds of online speech.
    Young people are always quick to adopt new technologies and this 
should be recognized and encouraged as we move into the digital age. 
The Internet has made it easier for them to learn about the world and 
communicate with others. While some might say that such ease of 
communication necessitates the need for special restrictions on minors 
who haven't learned the restraint that comes with maturity, we believe 
that any restriction specifically aimed at curbing the speech rights of 
minors in the new electronic forum is a step in the wrong direction and 
not in keeping with the ideals of our constitutional framework.
    We do not take issue with the Subcommittee's interest in looking at 
the issues of harassment, intimidation, or abuse faced by youth, but we 
would encourage taking a broad view of the phenomenon, not limited to 
the particular tools of communications used to convey such messages 
that may lead to harmful actions. For example a review of the tools 
that the Internet can provide to assist in limiting bullying or 
harassment, such as documentation of incidents and identifying when 
intervention is necessary, could yield valuable insights for fighting 
the problem. If additional legislation at the Federal level is deemed 
necessary, we would urge the Subcommittee to carefully define its terms 
before moving forward, taking care to draw any prohibitions very 
narrowly so as to avoid limitations on protected First Amendment 
rights. In the meantime, as we still stand on the opening threshold of 
the Internet age, there is much good that can be done by expanding 
public awareness of both the benefits and risks associated with online 
activity and we would encourage the Subcommittee to support such 
efforts.
    If you have questions or comments on ACLU's position on this issue, 
please feel free to contact Michael Macleod-Ball at 202-675-2309 or by 
e-mail at [email protected].
            Sincerely,
                                           Laura W. Murphy,
                           Director, Washington Legislative Office.

                                   Michael W. Macleod-Ball,
                              Chief Legislative and Policy Counsel.
                                 ______
                                 
                   Prepared Statement of Yahoo! Inc.

    Chairman Pryor, Ranking Member Wicker and members of the 
Subcommittee, you are to be commended for your continued and long-
standing interest in child online safety issues. Yahoo! also has a deep 
commitment to online safety issues and is grateful for the opportunity 
to share some relevant information learned through a study we released 
in honor of National Internet Safety Month in June. Yahoo! was also a 
participant in the Online Safety and Technology Working Group 
(``OSTWG'') that was set up pursuant to legislation that started in 
this committee in 2007. In June, the OSTWG issued its report to 
Congress entitled ``Youth Safety on a Living Internet'' which addresses 
several key areas of online safety including education, safety tools, 
reporting and cooperation with law enforcement. Yahoo! has many 
activities in these areas and will take this opportunity to briefly 
describe what is being done in these areas.

Yahoo! Background
    Yahoo! attracts hundreds of millions of users every month through 
its innovative technology and engaging content and services, making it 
one of the most visited Internet destinations and a world-class online 
media company. Yahoo!'s vision is to be the center of people's online 
lives by delivering personally relevant, meaningful Internet 
experiences. Yahoo! is headquartered in Sunnyvale, California.
Yahoo! Online Safety and Digital Protection Survey
    In April of this year, Yahoo! conducted an online survey with Ipsos 
OTX to gain insight into consumers' behaviors and perceptions with 
regard to online safety. The survey is based on a sample size of 2003 
Internet users in the United States, ages 18-64 years old. Our goal in 
conducting the survey was to gain insights into people's behaviors and 
sentiments regarding online safety so we can better align our safety 
education, product features, and outreach efforts to user needs. We 
wanted to drive awareness of National Internet Safety month in June by 
uncovering trends around online safety--specifically with parents and 
children and digital reputation management.
    The survey interviewed a cross-section of U.S. adults, with 40 
percent of the respondents being parents with children of the age of 17 
or younger. The survey asked a variety of questions relating to parents 
and kid's online safety management, including cyberbullying, sexting; 
and digital reputation management.
    The findings of the survey are very encouraging as they show 
parents are being much more proactive than generally believed when it 
comes to their children's online safety. The data also shows that there 
is more work to be done. Overall, Yahoo! gave parents a B+ for their 
efforts to monitor their children's online activities. Yahoo! also 
concluded, based on the survey results, that more education and 
resources are needed to help parents and children address cyberbullying 
and digital reputation management. More detailed information on the 
survey findings is attached as a presentation at the end of this 
document.

Parents Are Taking Action
    Yahoo! celebrates the parents who are proactively monitoring their 
children's online safety and are having appropriate discussions with 
their kids. The Yahoo! survey shows:

   78 percent of parents are concerned about their children's 
        online safety, with almost 50 percent being ``very concerned.''

   70 percent of parents talk to their children about online 
        safety at least 2-3 times a year; 45 percent talk to their 
        children at least once a month.

   74 percent of parents are connected to their children's 
        profiles on social networking sites.

   71 percent of parents have taken at least one action to 
        manage their children's use of the Internet or cell phones such 
        as:

     Checking to see where children are searching online.

     Setting time limits for children's use of computers or 
            cell phones.

     Setting parental controls on video sites.

     Using filters to limit where children go on the web.

    This level of parental engagement is an encouraging sign that 
parents and children are becoming more comfortable with safety issues 
and discussing them with each other. It also shows parents are 
embracing the tools that are available to empower them to control their 
own and their children's online experiences. But there is always room 
for improvement.

Cyberbullying Findings
    While many parents are actively engaged in their children's online 
experiences, cyberbullying presents significant challenges. Most 
parents are aware of the problems presented by cyberbullying, yet are 
unsure of appropriate actions to take in response. The data from our 
survey shows:

   81 percent of parents know what cyberbullying is.

   1 in 4 adults (25 percent) who are aware of cyberbullying 
        have either been victims or know someone else affected by 
        cyberbullying.

   37 percent of parents feel that they know what to do about 
        cyberbullying.

   Almost three-quarters (73 percent) of people want their 
        child's school to play an active role in teaching kids about 
        online safety and citizenship.

Yahoo! Tips on Cyberbullying
    Yahoo! has developed an extensive safety site accessible from 
nearly every page of yahoo.com. Yahoo! Safely (safely.yahoo.com) helps 
inform parents, students, and teachers about online safety through 
timely videos, simple strategies and advice from non-profit safety 
experts. Specifically, Yahoo! Safely offers the following tips for 
young people to help prevent cyberbullying.

   Own your digital reputation. The Internet is a public space, 
        so before you share photos or personal details, make sure it's 
        info that you'd share with teachers, colleges, or job 
        prospects.

   Keep your private information under your control. Keeping 
        Internet conversations (and your user names/profiles) free of 
        personal information like your password, full name, or even the 
        name of your school, is important.

   Be nice (and pass it on)! Be respectful online and treat 
        people the way you'd want to be treated. If someone is being 
        disrespectful or bullying you, try to ignore them and use 
        privacy tools to block them from viewing your full profile and 
        contacting you.

   Know your rights. You have the right to not respond to e-
        mail or other messages that are inappropriate or make you feel 
        uncomfortable. If you get a message that doesn't feel right, 
        show it to your parents, guardians, or another trusted adult 
        and report the incident to your Internet service provider.

   Have a family chat. Talking with your parents or guardians 
        doesn't mean giving up your privacy. Everyone benefits when 
        you're on the same page about online activities, including when 
        you can go online, how long you can stay, and what activities 
        you can do online.

Digital Reputation Management Findings
    Digital reputation management is a growing concern for both 
children and adults as they share more and more personal information 
online. New stories have reported everyone from potential employers to 
college admissions officers conducting online searches and considering 
the findings in evaluating an applicant. The information a user posts 
online can have important safety consequences, and important long term 
implications on the user's reputation.
    However, according to the recent Yahoo! online safety survey, 65 
percent of people do not know, or are not sure what a digital footprint 
is and 31 percent do not feel they are in control of their online 
image. ``Digital reputation management'' as defined by the study 
includes both a user's digital footprint--the content and information 
that is posted by or about a user on the web over time, including 
online profiles, comments and blogs--and a user's online image--the way 
people are perceived based on content.
    The survey also concluded that

   48 percent of respondents do not realize or are not sure if 
        the information they put on the web will remain online forever 
        and 7 percent think that it won't remain online forever if they 
        simply delete it.

   20 percent of people plug their own name into a search 
        engine once a month or more; 49 percent do it 2-3 times a year 
        or less.

   Adults ages 18-34 are more proactive about managing their 
        digital profiles than adults 35-49 and adults 50+.

    Online safety education has long urged children, and actually users 
of all ages, to be careful about the types of personal information they 
post online and who they make it available to--such as information 
about where they live or where they go to school--as an important part 
of maintaining their physical safety. Given the many other implications 
that a user's online activity can have for their present and future, 
these survey results suggests that there is a need to cultivate greater 
awareness among Internet users of all ages about the broader impacts of 
what they choose to share online.

Yahoo! Tips on Digital Reputation Management

   Know your connections: Only connect with people you know 
        offline.

   Think before you post: Once something is posted online, it's 
        virtually impossible to take back because words, pictures, and 
        videos can be easily forwarded, copied, and taken out of 
        context.

   Protect your personal information: Posting personal 
        information or photos can identify you to strangers. Never 
        reveal personal information to people unless you are friends 
        with them offline.

   Configure your settings: Take the time to understand the 
        profile settings that are available to you on websites and 
        social networks, and tailor those settings for you.

   Understand your digital footprint: On a monthly basis, 
        search for your name on search engines, like Yahoo! Search, and 
        on social networks to understand what type of content is 
        associated with you.

Yahoo! Online Safety Efforts
    At Yahoo!, we are very proud of our long history of promoting safer 
environments for kids to experience the benefits of the Internet. In 
1996, Yahoo! was the first Internet company to launch a child and 
teacher-friendly web resource of safe, child-appropriate websites. 
Yahoo! Kids (formerly Yahooligans!) is Yahoo!'s award-winning web guide 
for children ages 7 to 12. All content on Yahoo! Kids has been reviewed 
by human editors for appropriateness for it's young audience. Yahoo! 
Kids (kids.yahoo.com) also includes a substantive Parents Guide that 
covers all manner of media safety, especially online safety issues.
    Today, Yahoo! Kids, Yahoo! Shine, and Yahoo! Safely all feature 
safety information targeted to kids, teens, and adults. Yahooligans! 
was our starting point, but we have grown our safety program into a 
multi-faceted approach to online safety that focuses on: (1) education; 
(2) user and ISP reporting; (3) technology and user empowerment tools; 
and (4) relationships with law enforcement, industry peers and child 
advocacy organizations. Many of our most recent efforts are directly 
related to the issues raised in our online safety survey. They also 
largely coincide with the findings of the recently released Online 
Safety and Technology Working Group (OSTWG) study entitled ``Youth 
Safety on a Living Internet.''

OSTWG Study and Recommendations
    The National Telecommunications and Information Administration 
(NTIA) was tasked by the ``Protecting Children in the 21st Century 
Act,'' a title of the ``Broadband Data Improvement Act,'' P.L. 110-385, 
to create a multi-disciplinary working group to report to Congress on 
four key areas relating to the safety of children while online. These 
four areas are: (1) online safety education; (2) parental controls and 
other empowerment tools; (3) child pornography reporting; and (4) data 
retention. Yahoo! was pleased to provide expert participation in the 
OSTWG. The OSTWG issued its report this past June and it included over 
30 recommendations for the continued study and improvement of online 
safety efforts.
    As many of the participants in the hearing are likely to comment on 
the OSTWG report findings, Yahoo! would like to focus on those findings 
and recommendations that are most relevant to our areas of focus.

Online Safety Education Findings and Recommendations
    The OSTWG Subcommittee on Internet Safety Education made a number 
of important findings about the elements of successful education and 
awareness efforts that should be carefully considered by any entity 
seeking to promote safety education. These findings include that: 
educational messages should not be fear based nor follow a one-size-
fits-all approach given that those who are at risk in the offline world 
also tend to be at the greatest risk in the online world; messages and 
advice should be appropriately tailored to the risks being addressed, 
how technology is actually being used and the intended audience. For 
example, the OSTWG Report notes that at one point the primary safety 
advice given to parents was to locate the family computer somewhere 
central in the house.\1\ Today, widespread use of mobile devices makes 
this messaging far less relevant. Safety education needs to evolve as 
use of technology evolves. The subcommittee also noted that there are 
many stakeholders who have key roles to play in promoting safe online 
practices including schools, parents and online services.\2\
---------------------------------------------------------------------------
    \1\ Youth Safety on a Living Internet, Report of the Online Safety 
and Technology Working Group, June 2010 http://www.ntia.doc.gov/
reports/2010/OSTWGFinalReport060410.pdf at 6.
    \2\ Id. at 5.
---------------------------------------------------------------------------
    Similar to our survey findings, The OSTWG report finds that 
cyberbullying is the most serious concern for students, parents, and 
schools because it is currently the online danger that children and 
teens are most likely to face.\3\
---------------------------------------------------------------------------
    \3\ Id. at 12.
---------------------------------------------------------------------------
    The OSTWG report offers a number of recommendations that Yahoo! 
agrees are of key importance to continuing to improve the effectiveness 
of safety awareness. I would like to specifically highlight a few of 
these recommendations and the corresponding Yahoo! efforts that support 
the goals of the recommendations.

   ``Keep Up With Research and Base Education On It'': \4\ 
        Yahoo!'s recent survey, as well as our extensive work with 
        safety experts, is designed to provide the basis for a fact-
        driven approach to developing on our online safety programs, 
        including which issues to focus on and how best to convey 
        safety messages. We welcome more coordinated national efforts 
        to bring together the great academic and scientific work that 
        has been done in this space and to further develop our common 
        understanding of the risks we want to address.
---------------------------------------------------------------------------
    \4\ Id. at 30-31.

   ``Coordinate Federal Government Educational Efforts'': \5\ 
        Yahoo! applauds the efforts of government entities, 
        particularly the Federal Trade Commission, for its online 
        safety education efforts. OnGuard Online has been a leading 
        educational effort that, Yahoo!, like many service providers 
        point our users to as a key safety resource both from 
        safely.yahoo.com and from security.yahoo.com. Other efforts to 
        consider online safety or citizenship funding within 
        reauthorization of the Elementary and Secondary Education Act 
        should also be seriously considered.
---------------------------------------------------------------------------
    \5\ Id. at 31.

   ``Establish Industry Best Practices'': \6\ The OSTWG Report 
        recommends that providers evaluate the specific safety needs of 
        their users and to tailor educational efforts, safety tools and 
        other resources to those needs. In addition, it calls on 
        providers to work collaboratively with other companies, non-
        profits, schools and governments. Yahoo! has a wide range of 
        programs under way with each of these groups. To name a few:
---------------------------------------------------------------------------
    \6\ Id. at 32.

     Yahoo! has created educational videos for Yahoo! 
            Profiles, integrates tips and advice into product help 
            pages, and issues regular blog posts to educate people on 
            online safety issues on Yodel Anecdotal (yodel.yahoo.com) 
---------------------------------------------------------------------------
            and the Yahoo! Policy blog (ypolicyblog.com).

     Yahoo! is engaged in partnerships with Ikeepsafe.org, 
            Family Online Safety Institute, Teen Angels/wiredsafety, i-
            Safe, CARU/BBB, connectsafely.org, and Commonsense Media. 
            These activists and experts are on the cutting edge of 
            relevant advice, solutions and emerging issues.

     Yahoo! hosts an annual Cybercitizenship Summit to 
            bring together educational thought leaders to discuss 
            issues, developments, and solutions around youth and online 
            safety. Our last Summit, held on December 4, 2009 focused 
            on cyberbullying and online reputation management.

     Yahoo! has partnered with Ikeepsafe.org/DARE to 
            develop Internet safety curriculum for grades K-6. We work 
            collaboratively with iKeepSafe in developing the Project 
            PRO curriculum, aimed at helping educators coach their 
            students on how to manage their digital reputations.

     Yahoo! increases awareness around online safety 
            throughout the year during Safer Internet Day (February), 
            Internet Safety Month (June), and National Cyber-Security 
            Awareness Month (October). This can include messages on our 
            front page, which attracts over 600 million users per 
            month. Yahoo! has also worked closely with the National 
            Cyber Security Alliance on a consumer messaging project in 
            2010.

     Yahoo! works collaboratively with local police 
            departments to deliver preventative and diversion safety 
            courses. Yahoo! has been working on a pilot Diversion 
            course with the Sunnyvale, California Police. The course is 
            designed to train students on better online behavior if 
            they receive detention or other sentencing by the courts 
            for online crimes such as sexting.

Parental Control and User Empowerment Tools Findings and 
        Recommendations
    The Parental Control and User Empowerment Tools subcommittee found 
that the parental control marketplace is functioning fairly well--at 
least for parents with some degree of technical sophistication--and yet 
there is more that can be done to increase awareness and usage of 
existing tools and to continue to improve capabilities. After studying 
the range of tools in the marketplace--both stand alone solutions and 
integrated product safety features--and their effectiveness and level 
of use, the subcommittee developed, among others, the following 
conclusions and recommendations.

   User empowerment tools and parental controls are ``most 
        effective as part of a `layered' approach to online safety that 
        views them as one of many strategies or solutions.'' \7\ In 
        addition, the report found that ``technical solutions can 
        supplement, but can never supplant the educational and 
        mentoring role.'' \8\
---------------------------------------------------------------------------
    \7\ Id. at 66.
    \8\ Id. at 7.

   ``Parental empowerment technologies and options should be 
        included in new offerings whenever possible'' and ``[s]afety by 
        design'' should be encouraged. The OSTWG also recommends that 
        industry carefully review default settings which are an 
        important element of safety by design. Yahoo! has been 
        examining its default settings in the context of new product 
        and feature launches, and, within the context of the overall 
        operation of the service, attempts to set defaults to embrace 
        safety as a key objective. Examples of ``safety by design'' and 
---------------------------------------------------------------------------
        use of default settings include:

     Enhancements to our social experience within Yahoo! 
            Pulse launched in early June, defaulting users registered 
            as being ages 13-17 to allow only ``connections'' (those 
            that have been confirmed by the user as a friend) to see 
            their profiles. Yahoo! also has defaulted settings on Pulse 
            for users under age 18 that are designed to steer users 
            away from revealing their ages and addresses.

     The launch of our ``Updates'' service where users can 
            post status updates from various places throughout the 
            Yahoo! network also defaults the sharing of these updates 
            to ``connections only'' for teen users.

     Flickr, Yahoo!'s photo sharing service, provides 
            various controls for users to tailor their experience 
            including the ability to make photos public, private or 
            viewed by friends and/or family; categorize photos as safe, 
            moderate or restricted content; turn SafeSearch on so only 
            photos designed as safe for a global, public audience will 
            be returned in results; hide photos from public searches; 
            customize settings around privacy and permissions; and the 
            ability to report abuse.

     The Yahoo! SafeSearch feature is designed to filter 
            out explicit, adult-oriented content from Yahoo! Search 
            results. Yahoo! defaults to a filter that removes adult 
            video and image search results. Parents can password-
            protect the search filter setting for their computer by 
            ``locking'' their SafeSearch settings.

     Yahoo! Messenger allows people to block others from 
            contacting them as well as report suspected spammers and 
            report abuse.

     Yahoo! Groups gives users control over how they 
            receive e-mail messages, the ability to block users under 
            the age of 18 from receiving messages, and the ability to 
            report abuse.

     Yahoo! Chat does not support user created chat rooms--
            all chat rooms are created by Yahoo!; we have restricted 
            usage of the service to 18 and older, no longer support a 
            ``teen'' category, and have included a ``report abuse'' 
            button.

   Community Policing was also recommended by the OSTWG as an 
        important part of service provider options to allow users to 
        flag inappropriate content and report inappropriate 
        behavior.\9\ User and third party reporting have long played an 
        important role in Yahoo!'s safety approach. We use these 
        efforts to help us identify material in violation of our Terms 
        of Service so that we can remove it from our site, discover 
        users who are violating our guidelines, and to assist us in 
        identifying and reporting child pornography content to the 
        National Center for Missing & Exploited Children (``NCMEC''). 
        In addition to leveraging the power of our users to help us 
        identify abuse of our services, we also employ filters, 
        algorithms, human and automated resources to detect child 
        pornography content, as well as work with third parties that 
        have lists of URLs where known child pornography is found.
---------------------------------------------------------------------------
    \9\ Id. at 67.
---------------------------------------------------------------------------
Child Pornography Reporting Findings and Recommendations
    As a result of the Protect Our Children Act of 2008, Public Law No. 
110-401, 122 Stat. 4229 (2008), the reporting obligations for Internet 
Service Providers, previously captured at 42 U.S.C. 13032, have been 
improved by a new law that: (1) clearly states what should be included 
in a report; (2) provides appropriate immunities for the transmission 
of images as part of fulfilling the reporting obligation; and (3) 
provides for preservation of materials included in a report and related 
to a report.
    OSTWG recommendations in this area in large part focus on smaller 
ISP and OSPs that may not understand or have mechanisms in place to 
report as required by the new law. Other recommendations focus on the 
continued need for dialogue with law enforcement and NCMEC, as well as 
increased technology and information sharing among service 
providers.\10\ Yahoo!'s efforts as a leader on reporting issues is 
evidenced by our visible presence on these issues over many years.
---------------------------------------------------------------------------
    \10\ Id. at 89-91.

     Yahoo! features prominent ``Report Abuse'' links 
            across our network near user generated content to encourage 
---------------------------------------------------------------------------
            users to flag problem issues.

     Yahoo! was an active participant in developing with 
            industry peers and NCMEC the service provider sound 
            practices for reporting child pornography, which were the 
            model for changes in the law passed as part of the Protect 
            our Children Act in 2008.

     Yahoo! has had a long-time relationship with Internet 
            Watch Foundation and uses the Foundation's URL list along 
            with NCMEC's URL list to remove known child pornography 
            sites from its search index.

     Yahoo! is a founding member of the Technology 
            Coalition working to develop improved detection and 
            reporting technologies for child pornography images.

Data Retention in Child Exploitation Investigations Findings and 
        Recommendations
    Unlike other areas of the Report, no clear consensus emerged on 
whether there is a need for mandatory retention obligations beyond 
those required as part of the preservation regime in the Protect our 
Children Act. Instead of attempting to arrive at a consensus view, the 
Report focuses on conveying the diverse viewpoints of law enforcement, 
industry, and privacy advocates. Indeed, following the subcommittee's 
investigation, there remain many unanswered questions about the need 
for data retention, the potential scope of data retention, technical 
costs and limitations, and the impact on user privacy.

   The recommendation to study the impact of the new 
        preservation provisions of the Protect our Children Act is 
        perhaps the most important.\11\ Yahoo! supported the 
        legislation that became the Protect our Children Act, including 
        the preservation provision, because it was designed to balance 
        law enforcement's needs for ISPs and OSPs to hold data 
        regarding those who misuse services to exploit children online 
        with the overall privacy interests of the entire user 
        community. This balance was struck by focusing preservation 
        efforts on those users who ISPs and OSPs are already required 
        by law to report as being involved in an apparent incident of 
        child pornography. This focus makes sense because the vast 
        majority of other users will never be investigated for the 
        commission of a crime.
---------------------------------------------------------------------------
    \11\ Id. at 116.

    When the legislation was passed in 2008, approximately 30,000 
        reports by ISPs and OSPs were submitted to NCMEC. However, 
        there were over 60,000 reports in 2009 and over 27,000 just in 
        the first quarter of 2010, on track for a 78 percent year over 
        year increase from 2009.\12\ These provider reports provide an 
        important and underutilized means to pursue child predation. 
        This is a well-tailored solution to the need for data retention 
        in online child exploitation cases and should be given a chance 
        to be fully implemented and evaluated on its merits before 
        additional data retention measures are considered.
---------------------------------------------------------------------------
    \12\ Id. at 88-89.

   The OSTWG Study further suggests Internet Crimes Against 
        Children Task Forces hold regular meetings with ISPs and 
        OSPs.\13\ This recommendation is in synch with our own online 
        safety principle to work constructively with law enforcement as 
        a partner in creating a safer Internet. That is why Yahoo! has 
        built a law enforcement compliance function to respond to valid 
        law enforcement demands and to be able to respond appropriately 
        in investigations of online child exploitation crimes.
---------------------------------------------------------------------------
    \13\ Id. at 116.

     Yahoo! maintains a 24x7 law enforcement compliance 
            function which responds to requests related to child 
---------------------------------------------------------------------------
            exploitation in an expedited fashion.

     We engage in law enforcement educational efforts 
            including presentations for Internet Crimes Against 
            Children investigators, Federal investigators, and state 
            Attorneys General offices.

     We work with law enforcement and NCMEC to take swift 
            action when we become aware of harmful activities to 
            children that are in violation of our policies.

     Yahoo! was also an early participant in the Financial 
            Coalition Against Child Pornography, a coalition of credit 
            card issuers and Internet services companies which seeks to 
            eliminate commercial child pornography by taking action on 
            the payment systems used fund these illegal operations.

    As evidenced by the many of examples of our engagement on these 
issues over a number of years, Yahoo! is very much in line with the 
actions suggested by the OSTWG report. We have found our niche and will 
continue to work to protect kids online.

Role for Government
    Yahoo! believes government agencies can follow up on the 
recommendations of the OSTWG report and the findings of our survey by 
sponsoring additional research, highlighting best practice and safety 
advice through sites like the FTC's OnGuard Online, encouraging the 
development of online safety tools, continuing to promote education and 
training of students and teachers, and maintaining oversight of 
reporting and enforcement efforts. While many of the other players 
engaged in this dialogue can educate and create technologies or tools, 
only the government can enforce the laws passed to fight against child 
predation and exploitation.
    To that end, Yahoo! supports implementation of the provisions of 
several laws passed in the 110th Congress, including the Protect our 
Children Act, P.L. 110-401, which provided authorization for new 
computer forensics labs to assist law enforcement investigations, a new 
national strategy for child exploitation prevention and interdiction, 
strengthening the role of ICAC Task Forces, and creation of a Crimes 
against Children Data System. Additionally, Congress passed the 
Protecting Children in the 21st Century Act, P.L. 110-385, which 
authorized an education campaign on child safety to be run by the FTC 
as well as limitations on funding for schools and libraries unless they 
have online safety and cyberbullying education. Congress also passed 
the Kids Act, P.L. 110-400 designed to allow service providers to 
access lists of sexual predators' screen names, but no rule has yet 
been established for sharing online identities. Other legislation 
passed in 2008 and known as the Effective Child Pornography Prosecution 
Act, P.L. 110-358, included changes to interstate commerce definitions 
to include child pornography as well as stricter penalties for 
violations of the law in this area. All of these changes are still in 
the implementation stage or are awaiting rulemakings and testing in the 
market and/or courts. It is important for this committee and others in 
this Congress to ensure the laws you have passed are moving forward, as 
you are doing today by reviewing these issues in depth.

Conclusion
    Our survey findings are both encouraging and cause for reflection. 
While parental engagement is overall at a positive level, kids, parents 
and educators are all struggling with how best to approach the 
challenging issue of cyberbullying. And parents and kids both need to 
better understand digital reputation management--the long-term impact 
of the information they share in the online world.
    The OSTWG Report both reinforces the findings from our survey and 
our ongoing dialogue with safety experts, and suggests additional data 
and education are needed. Yahoo! is committed to continuing down the 
path of promoting user awareness and cultivating safe online behaviors 
among our subscribers. We look forward to continuing the safety 
dialogue with our partners, peers and law enforcement and, in 
particular, with this committee. We further look forward to seeing how 
Congress conducts oversight over the many varied agencies implementing 
the four new child safety laws enacted in 2008.
    Thank you, once again, for taking our testimony on these issues.
                                 ______
                                 
                  Online Safety and Digital Protection
                Yahoo! Consumer Pulse Survey--April 2010

Background & Methodology
   Yahoo!, in partnership with Ipsos OTX, conducted an online 
        survey to gain insight into consumers' behaviors and 
        perceptions with respect to online safety.

   2003 respondents were recruited via Ipsos OTX's Internet 
        panel for an 18 minute online survey. Interviews were conducted 
        from April 16-April 21.
        
        
                Parents & Kid's Online Safety Management



    Letters indicate statistically significant differences at the 90 
percent confidence level between corresponding groups. PARENT1. On a 
scale of 1-5 how concerned are you about your child's safety online?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups. 
PARENT17. How often do you talk to your child(ren) about online safety?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    PARENT18. Are you connected ('friends' with) to your kids on social 
network sites? Base: Children visit social networking sites PARENT19. 
Which of the following, if any, do you know? Base: Children visit 
social networking sites.
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding groups.
    PARENT5. Do you, and does your child(ren), know what cyber-bullying 
is? Cyber-bullying, happens when people use the Internet, cell phones, 
or other devices to send or post text or images intended to hurt or 
embarrass another person. *Base: Total Answering--changed mid-field.
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Letters indicate statistically significant differences at the 90 
percent confidence level between corresponding groups.
    PARENT7. Have you ever witnessed or experienced cyber bullying?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PARENT8. Do you know what to do about cyber bullying?
    OE2: Imagine if you or your child(ren) were the victim of cyber 
bullying. What, if anything, would you do about it?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PARENT24. What role do you think schools should play in teaching 
children about online safety and citizenship?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Lettering indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PARENT6. Does your child(ren)'s school have a cyber-bulling policy?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    PARENT9 .Which of the following have you done?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Lettering indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PARENT3. Which of the following, if any, regarding your kid's use 
of the Internet and cell phones do you do?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PARENT17. How often do you talk to your child(ren) about online 
safety?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    PARENT15. How often, if ever, do you search your children's name 
online to see what comes up or to check his/her profile? Base: Parents 
Boxes indicate statistically significant differences at the 90 percent 
confidence level between corresponding demographic groups.
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)

Adult Online Image Management



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PROFPR13. Do you know what a digital footprint is?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PROFPR15. Do you think you are in control of your online image 
(i.e., the image you portray online)?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PROFPRO4. When you send an e-mail or post a comment on someone's 
wall or a blog, do you think it will remain online forever?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PROFPRO10. How often, if ever, do you search online your own name 
to see what comes up or to check your profile?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Lettering indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    DIGFTPR5. Which, if any, of the following steps do you take to 
manage your ``digital profile''?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    DIGFTPR4. How concerned are you about protecting your ``digital 
profile,'' to guard against identity theft or other fraud/misuse/abuse?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Boxes indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PROFPRO9. How often do you think that information found online 
about people is used to make a hiring or other important decision?
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)



    Lettering indicate statistically significant differences at the 90 
percent confidence level between corresponding demographic groups.
    PROFPRO6. Whom are you most concerned will see your personal 
information online? Select all that apply.
    Source: Yahoo! Online Safety & Digital Protection Survey (April 
2010)