[House Hearing, 107 Congress] [From the U.S. Government Publishing Office] CHATTING ON-LINE: A DANGEROUS PROPOSITION FOR CHILDREN ======================================================================= HEARING before the SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET of the COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED SEVENTH CONGRESS SECOND SESSION __________ MAY 13, 2002 __________ Serial No. 107-102 __________ Printed for the use of the Committee on Energy and Commerce Available via the World Wide Web: http://www.access.gpo.gov/congress/ house __________ 80-669 U.S. GOVERNMENT PRINTING OFFICE WASHINGTON : 2002 ____________________________________________________________________________ For Sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpr.gov Phone: toll free (866) 512-1800; (202) 512�091800 Fax: (202) 512�092250 Mail: Stop SSOP, Washington, DC 20402�090001 ------------------------------ COMMITTEE ON ENERGY AND COMMERCE W.J. ``BILLY'' TAUZIN, Louisiana, Chairman MICHAEL BILIRAKIS, Florida JOHN D. DINGELL, Michigan JOE BARTON, Texas HENRY A. WAXMAN, California FRED UPTON, Michigan EDWARD J. MARKEY, Massachusetts CLIFF STEARNS, Florida RALPH M. HALL, Texas PAUL E. GILLMOR, Ohio RICK BOUCHER, Virginia JAMES C. GREENWOOD, Pennsylvania EDOLPHUS TOWNS, New York CHRISTOPHER COX, California FRANK PALLONE, Jr., New Jersey NATHAN DEAL, Georgia SHERROD BROWN, Ohio RICHARD BURR, North Carolina BART GORDON, Tennessee ED WHITFIELD, Kentucky PETER DEUTSCH, Florida GREG GANSKE, Iowa BOBBY L. RUSH, Illinois CHARLIE NORWOOD, Georgia ANNA G. ESHOO, California BARBARA CUBIN, Wyoming BART STUPAK, Michigan JOHN SHIMKUS, Illinois ELIOT L. ENGEL, New York HEATHER WILSON, New Mexico TOM SAWYER, Ohio JOHN B. SHADEGG, Arizona ALBERT R. WYNN, Maryland CHARLES ``CHIP'' PICKERING, GENE GREEN, Texas Mississippi KAREN McCARTHY, Missouri VITO FOSSELLA, New York TED STRICKLAND, Ohio ROY BLUNT, Missouri DIANA DeGETTE, Colorado TOM DAVIS, Virginia THOMAS M. BARRETT, Wisconsin ED BRYANT, Tennessee BILL LUTHER, Minnesota ROBERT L. EHRLICH, Jr., Maryland LOIS CAPPS, California STEVE BUYER, Indiana MICHAEL F. DOYLE, Pennsylvania GEORGE RADANOVICH, California CHRISTOPHER JOHN, Louisiana CHARLES F. BASS, New Hampshire JANE HARMAN, California JOSEPH R. PITTS, Pennsylvania MARY BONO, California GREG WALDEN, Oregon LEE TERRY, Nebraska ERNIE FLETCHER, Kentucky David V. Marventano, Staff Director James D. Barnette, General Counsel Reid P.F. Stuntz, Minority Staff Director and Chief Counsel ______ Subcommittee on Telecommunications and the Internet FRED UPTON, Michigan, Chairman MICHAEL BILIRAKIS, Florida EDWARD J. MARKEY, Massachusetts JOE BARTON, Texas BART GORDON, Tennessee CLIFF STEARNS, Florida BOBBY L. RUSH, Illinois Vice Chairman ANNA G. ESHOO, California PAUL E. GILLMOR, Ohio ELIOT L. ENGEL, New York CHRISTOPHER COX, California GENE GREEN, Texas NATHAN DEAL, Georgia KAREN McCARTHY, Missouri BARBARA CUBIN, Wyoming BILL LUTHER, Minnesota JOHN SHIMKUS, Illinois BART STUPAK, Michigan HEATHER WILSON, New Mexico DIANA DeGETTE, Colorado CHARLES ``CHIP'' PICKERING, JANE HARMAN, California Mississippi RICK BOUCHER, Virginia VITO FOSSELLA, New York SHERROD BROWN, Ohio ROY BLUNT, Missouri TOM SAWYER, Ohio TOM DAVIS, Virginia JOHN D. DINGELL, Michigan, ROBERT L. EHRLICH, Jr., Maryland (Ex Officio) CHARLES F. BASS, New Hampshire LEE TERRY, Nebraska W.J. ``BILLY'' TAUZIN, Louisiana (Ex Officio) (ii) C O N T E N T S __________ Page Testimony of: Curtin, Caroline, Director, Integrity Assurance, AOL, Inc.... 26 Gregart, James J., Kalamazoo County Prosecuting Attorney..... 14 Karraker, John, Kalamazoo, Michigan.......................... 12 Rodriguez, Ruben D., Director, Exploited Children Unit, National Center for Missing and Exploited Children......... 19 Tarbox, Katherine, New Canaan, Connecticut................... 4 Tucker, Kathleen, Director, I-Safe America, Inc.............. 33 (iii) CHATTING ON-LINE: A DANGEROUS PROPOSITION FOR CHILDREN ---------- MONDAY, MAY 13, 2002 House of Representatives, Committee on Energy and Commerce, Subcommittee on Telecommunications and the Internet, Oshtemo, MI. The subcommittee met, pursuant to notice, at 1 p.m., in the Kalamazoo Valley Community College M-Tec Facility in Oshtemo, Michigan, Hon. Fred Upton (chairman) presiding. Members present: Representatives Upton and Bass. Staff present: Kelly Zerzan, majority counsel; Will Nordwind, policy coordinator/counsel; Hollyn Kidd, legislative clerk; and Brendan Kelsay, minority professional staff. Mr. Upton. Good afternoon everyone. I want to welcome everyone to KVCC's wonderful M-Tec facility for this field hearing of the Telecommunications and Internet Subcommittee entitled Chatting On-Line: A Dangerous Proposition for Children. I want to pay particular thanks to Dr. Marilyn Schlack and Bruce Koper for making sure that everything worked out terrific in having us here today. As the subcommittee chairman and parent of two young children who use the Internet at home for both school, work and fun, there are few issues that are more important than making sure that our kids are protected on-line. I felt it was vitally important to hold this hearing not in Washington DC, but in Kalamazoo to help spread the word to the families of Southwest Michigan that sadly we are not immune from the ugly underside of chat rooms and that we can and must fight back against those on-line sexual predators who seek to sneak into our homes via the home computer and do harm to our kids. When a person comes to your door and knocks on it, you can teach your kids to look out the window or through the peephole and see who it is before they decide whether or not to unlock the door and let that individual in. You teach them never to open the door to a stranger. Also you can always teach your kids not to talk to strangers outside in the street. But in this age of home computers and the Internet, parents do not necessarily have that luxury or security anymore. Pedophiles and sexual predators have figured that out and they have made chat rooms their latest stalking ground. Alarmingly, national surveys suggest that 1 in 5, 20 percent, of young Internet users have received an unwanted sexual solicitation via on-line chat rooms. In the Southwest Michigan area alone, we have had a number of tragic examples. A 21 year old college student has been accused of having sex with three Richmond girls, a 14 year old and two 13 year olds, whom he met on-line. A 23 year old Oregon man pled guilty to crossing State lines to have sex with a 13 year old girl from Kalamazoo; they met in a chat room. A 34 year old Brooklyn man, who claimed to be a 17 year old boy, was sentenced last August for having sex with a 14 year old girl from Michiwauke. They met on-line, traded photos of each other, and had conversations about sex. These are but a few examples of how evil sexual predators are preying on our communities and we know there are many more. Today we will hear from a number of witnesses including Katie Tarbox, a young woman who has the courage to step forward to tell her terrifying story of how, when she was in her early teens, she was preyed upon by an adult who used a chat room to take advantage of her. She is telling her story so that parents and children in Southwest Michigan can learn lessons from her experiences and hopefully avoid such dangers on-line. She is to be commended for her courage and I know that this is not easy for her. We will also hear from John Karraker, father of a Kalamazoo teenager, who was also preyed upon by an adult on-line. John is stepping forward today to provide his perspective in hopes of helping other fathers and mothers protect their kids. He is not only a father, but also a Public Safety Officer here in Kalamazoo. He knows that if it can happen in the house of a Public Safety Officer, it can happen in any house. He is testifying today solely in his capacity as a dad. Given that he courageously puts his life on the line in the service of our community every single day, it should come as no surprise that he is using his off-duty time to be with us today to help our community protect kids on-line. Other witnesses include Mr. Jim Gregart, Kalamazoo County's outstanding prosecuting attorney; Ruben Rodriguez of the National Center for Missing and Exploited Children; Caroline Curtin of America Online, which offers a number of parental controls like kids-only chat rooms; and Kathleen Tucker of I- SAFE, a non-profit organization dedicated to educating kids about on-line safety. I really want to thank all of our out-of-town witnesses for traveling great distances to be with us today. I have voted for and Congress has passed several laws in an attempt to protect kids from some dangers on-line. Unfortunately, the Supreme Court recently struck down one of those laws which banned virtual child pornography. Virtual child pornography looks just like the real stuff, but it is generated by a computer. However, I am an original co-sponsor of a measure that rewrites the law to pass constitutional muster in light of the Court's ruling. I understand that the House will have this legislation up on the House floor next week. The Court's decision follows on the heels of the Court's 1997 decision to strike down those portions of the Communications Decency Act which had made it illegal to send pornography to children via the Internet. Still pending in the courts is the Children's Internet Protection Act, which requires schools and libraries that receive Federal funding to employ Internet filtering software and have written Internet safety policies to protect children from indecent material. Let us hope for a comeback in the Courts. But even those laws did not address the problem of protecting kids from the dangers of chatting on-line. Getting into one of those chat rooms is easier than getting on a bike, but I would argue that it is much more dangerous. I introduced a bill, which was recently approved by our subcommittee, which would set up a child/family space on the Internet known as dot-kids. Just like we have dot-com and dot- org, we will have dot-kids. It will be in essence like a children's section of the library, where parents could send their kids to be safe on-line. Chat rooms would be banned in the dot-kids space unless they were specifically designed and operated to protect children from harm, and the content in the chat room is both suitable for children under 13 and not harmful to them. I expect this Bill to be on the House floor for vote next week as well. However, even with all of these measures, the bottom line is that there is no better protection from on-line dangers than proper parental supervision. This means that we, as parents, need to become better aware of the dangers and how to avoid them. Then we must also teach our kids. So today's hearing is designed to help us accomplish this mission around the country, particularly here in Southwest Michigan. I also want to welcome a friend and dad, Congressman Charlie Bass, to Kalamazoo. He is a member of this subcommittee from New Hampshire. He has traveled a great distance to be with us. He cares deeply about the issue. With that, I recognize my friend and colleague, Mr. Bass. Mr. Bass. I thank you, Mr. Chairman, and I would like to associate myself with your remarks which were right on mark. This hearing is taking place here in Michigan, but it could easily take place in any community anywhere in the country, including anywhere in my district, anywhere where children can have access to the Internet and communicate. Like all communication issues, I have discovered that they are so complex that there are never any clearly definable issues or solutions. One has to examine First Amendment rights and the ability to communicate. One has to look at the issues of the fact that the Internet is really one of the greatest technological inventions of the late 20th, early 21st century which will probably keep America ahead for many, many decades to come. However, as my friend from Michigan here mentioned, there are some very dark and unpleasant sides to this new technology, most notably the issue that we are discussing here today. It is my hope that we can discuss issues, such as whether or not the criminal justice system is adequately prepared to be responsive and to deal with what will undoubtedly be a growing problem in society; what efforts are underway to teach and prepare children to deal with chat rooms, especially children that may not understand the implications of the types of discussions and the motives of sexual predators when they get in a chat room environment; and most importantly, the issue of how communities and parents deal with children that are exposed to this kind of environment. I had the pleasure of having lunch with Katie before we appeared here today, and she was kind enough to give me a copy of her book to read, which I will. I believe in this book one of the issues that is discussed is how she was ostracized by her own community and her own friends and other parents after this event occurred. I know that is not strictly within the jurisdiction of this subcommittee, but I think that it is something that all of us need to think about carefully because we are not going to move forward and deal with this issue until we, as society, are willing to accept the fact that it can happen to anybody, in Michigan or New Hampshire or anywhere else in the country. And there may be policy solutions, but as Congressman Upton said, it is parents, families, and communities that bear the ultimate responsibility for solving and dealing with these problems. With that, I yield back, Mr. Chairman. Mr. Upton. Thank you very much. Our first witness is Ms. Katie Tarbox. Katie, the time is yours. STATEMENTS OF KATHERINE TARBOX, NEW CANAAN, CONNECTICUT; ACCOMPANIED BY JOHN KARRAKER, KALAMAZOO, MICHIGAN; JAMES J. GREGART, KALAMAZOO COUNTY PROSECUTING ATTORNEY; RUBEN D. RODRIGUEZ, DIRECTOR, EXPLOITED CHILDREN UNIT, NATIONAL CENTER FOR MISSING AND EXPLOITED CHILDREN; CAROLINE CURTIN, DIRECTOR, INTEGRITY ASSURANCE, AOL, INC.; AND KATHLEEN TUCKER, DIRECTOR, I-SAFE AMERICA, INC. Ms. Tarbox. Thank you, Chairman Upton, for inviting me here before the House Subcommittee on Telecommunications and the Internet, and thank you, Congressman Bass. I am very pleased to be here today. I am only 20 years old and I have to say that when I first began this fight, as I will call it, in trying to help the education regarding Internet dangers, this has always been one of my goals. I am happy to be here encouraging legislation and whatnot. I believe it is the right step and going in the right direction. I have probably told my story now over 200 times. I go around the country speaking and I have sometimes written it out, but I always feel that the best way to tell my story is just by telling it raw. People can read my written testimony, but even though this happened 7 years ago, I want people to see that there are raw emotions and that this did deeply affect me and my family and my community. I was thirteen years old when I first started using the Internet. My family received the free CD-ROM of hours from America Online, and back in 1995, there was not much press or news regarding the Internet. We knew that we were one of the first families in the country to sign up for the Internet. I had some idea about what a modem was, but I did not really understand what it was. I just knew that it made some funny noises and that it could connect me to millions of other people in the country. My family thought that we were signing up for the Internet to buy airplane tickets, and my sister was going to do a college search. Perhaps we could shop, and, you know, we could go into chat rooms. I had learned about the Internet at school. We were doing an Everglades project connected with CNN and we were connected with other classrooms. The way that we had used the Internet was that we would go into chat rooms to talk to other kids about what they were doing. So my introduction to the Internet was that this was a place where you go on the computer, and you would meet people and you would go into chat rooms. Quite honestly, I thought that was all that America Online had to offer me because it was the thing that was most boldly advertised when you would sign on. I started going into teen chat rooms. I did not use them that much, maybe about an hour a day. I was a very active kid. I was a high honors student. I was a national swimmer. I played piano. I was in my select chorus at school, and one of the things that the Internet offered me was that, while I was pretty busy, if I could not call my friends at 11 o'clock at night, I could go on the Internet and my parents thought that it was a great thing. You know, I could go and talk to other kids, maybe from Florida about swimming, or I could talk to them about music. At times I found it discouraging. There was a lot of heavy sexual remarks, but I kept on signing on hoping, you know, maybe there would be someone out there that I could talk to. It was a September Sunday morning that I signed on and I asked if anyone wanted to talk to a 13 year old female. I immediately got a response from 23 year old Mark. And I sat at my computer and I thought, ``Oh, no, I cannot talk to somebody this old.'' I was hesitant to reply, but sitting there I thought, ``Well, this is never going to leave the Internet. It is never going to go beyond this.'' And so I replied back. He started to ask me a few questions about where I liked to shop and what bands I liked. And I really liked Dave Matthews Band at the time and he had gone to concerts. He could tell me about the lead guitarist; he could tell me about the singers, he could tell me about the songs. And we started to have conversations. We talked about places we had both gone and I honestly never thought that I would have anything in common with an adult, but this had proved me wrong. In my 13 year old mind, I thought, ``Wow, this is fate. I mean we have met on the Internet. This connection, you know, is rare, and we have all these things in common.'' And he was intelligent. And I think that was the thing that most attracted me to him. At 13, you think that you are a little bit more mature than the rest of your classmates at school, or you think that you know it all, and so I was definitely attracted to something like this. I did not think of it as a romantic relationship, but I wanted to see what could happen. I was not really sure. I did not think that any 23 year old guy would have much of an interest in a 13 year old girl. Over the next couple of months, we began corresponding via E-mail, the telephone. My parents did not know about this, and I did not tell my friends. I thought that they would pass it off as this is sexual. ``Katie, this is not a good idea. All he wants you as, he just wants you for sex,'' and this clearly was not. We never once talked about sex or anything romantic really. I thought he was a positive influence in my life. We actually talked about politics. There was a Presidential election that year, and we talked about the different campaigns, and he really made me feel mature. He really made me feel like I was someone special. And at 13 when you are trying to deal with issues of confidence and you are trying to find an identity, this made me feel just, oh, so special. He became my world; he became my best friend. He told me that I was beautiful, told me I was smart; he told me all the things that I thought I needed to hear at that age. And, yes, I did hear this from my parents, but my parents are not an older guy. And, a 13 year old girl, I think that anyone who has been in that position can understand what kind of value you would place on that type of attention. He kept on pressuring me to meet him and I was always hesitant. I did not know how that could happen. I was from Connecticut; he was from California. And I did not expect that I was going to invite him over to my house. I did not expect that I was going to go to California. While I did want to meet him, I just was not sure about logistically how it would work out. He once again suggested more meeting times. I tried to offer up that I was very busy, and in fact that I was going to Texas the next week for a national swim meet. He said, ``Well, why don't I come?'' And before I could say no, I said yes. I think it was my emotional side taking over and just felt that I really did want to meet him. I was not sure what was going to happen. I did not know if he would come to the swim meet and watch me. But nonetheless, I did tell him where I was saying. And I was always so excited about seeing him that I never really thought I am meeting an older man off the Internet. I flew to Dallas, Texas, with my swim team, and my mother was a chaperon. And I was just so, so excited about seeing him. I went to dinner. He was supposed to arrive about 7:30 and he did not come. And I was a little disappointed that he was not there, so I went to bed. And then at 9:30 I got a call from him. I was staying with my swim mate, and he said he was there. I had told this swim mate, because she was a good friend of mine, about this relationship, and she once again said, ``Oh, he just wants you for sex.'' And that confirmed for me that, you know, I could handle this relationship. I was mature, I was responsible, this is different. She held herself against the door and said, ``No, you are not going to see him.'' And I said, ``No, I am.'' I told her the room number where I would be going to and pushed her to the side. I know the scariest part to all of this was that I never thought that I was putting myself in a compromising situation. I never thought that I could be killed or raped. I never thought that Mark would be any other person than he said he was. I was always telling the truth about who I was and you trust so much. You are told to trust adults. And I did not think that anything dangerous could happen. I really felt like I knew this person. We had exchanged pictures, but his were from so far away that, you know, I could not make out any distinguishing features or details. I knocked on the door and opened it up, and I immediately saw an adult. I thought, ``Oh, my gosh, this is an adult,'' and I became very uncomfortable. I knew that he was an adult. I knew he was older. But over the Internet you buildup so much fantasy that reality does not have to be accepted. That was one of the things that I liked about the Internet, was that nobody judged me on it because they did not have reality right there. He invited me into the room, and I felt uncomfortable. He was trying to do anything he could to make me feel at ease. He started to talk about his flight. He missed his connection, and then he took me to the bathroom to show me that there was no soap dish. Then he tried to compliment things about my physical appearance like my hair, anything he could do to make physical contact. He sat me down. And it had been about a half and hour, and I thought, ``Well, okay. I should say goodbye and, you know, maybe we will meet tomorrow.'' So I sat down on the sofa, was ready to say goodbye, and then he wanted to read my palm and tried to drag things out. I allowed him to read my palm; he told me I was going to have a rich and successful life. And then he looked away and he said, ``Katie, I have been thinking about you all day and I have been thinking about doing this.'' He leaned over; he kissed me, groped me, and essentially I was molested. I always thought that if I would be in a situation where I was receiving unwanted sexual advances that I would transform into Wonder Woman or I would, you know, be this strong person, especially because I come from a family of very strong women. Watching the DARE videos in my class at school, I thought those girls are so stupid. They should just fight back. But I realized in that moment you become so confused. I became completely numb and passive. I thought, ``Do I owe this to him? Of course, he did not come all the way from California just to have a talk.'' I was very disappointed in myself and overwhelmingly I felt very dirty for what was happening. I felt that I had lost most of my innocence in those 10 minutes or so. There was a knock on the door, and I knew it was my mother. It was one of those things. Of course, I did not tell my mother about this relationship, but it was my gut telling me it was her. And it was her. She had gathered hotel police and security and come up and gotten me. My friend, who I was staying with, had told my mother. I felt very embarrassed and disappointed. And while I did feel relieved that I was saved, the feelings of disappointment and embarrassment dominated. I was taken upstairs and I was interviewed by the police. I wanted this all to go away. I did not want police interviewing me and whatnot. So I knew that if I denied that anything sexual had happened, this would go away. So I said that I had met him over the Internet. We had met there, but nothing had happened. Then they came back and said, ``We have been talking to him for about 10 minutes and his name is not Mark, but it is really Frank Kufrovich. And he is not 23, but 41.'' They told me he was from California and that he was actually a wealthy financial advisor from the area. I thought to myself, ``Who in the hell had I been talking to for all this time?'' And yet the feelings that I had for Mark and this friendship that had progressed, I did not want to admit to myself that he had been lying to me all this time. And I felt very saddened by the fact that I was not going to be able to talk to him anymore. I went home. And the hardest part to all of this was going home. Everyone thinks that it would probably be those 10 minutes in the hotel room, but no. I come from a community where something like this would probably be hidden. You probably would not talk about this; it would probably be one of those skeletons in the closet. But because this happened with my swim team there, it was all known, and girls wanted to share these rumors. So it went around my school that I was pregnant with his child and that I had given myself an abortion with a coat hanger in the bathroom, just horrible, horrible rumors. I was at the top of the class and now to be labeled as a slut or, you know, promiscuous, this was very difficult. I did not talk about it. I lost all of my friends. Parents in the town thought, ``Well, you know, she went to go meet him. Of course she is asking for it.'' And parents were afraid that Frank would fly up from California and hurt their children. So I became like the Lolita of the town. I lost all my friends. It was a very alone and empty period. Ironically, I had lost my best friend already, who was Mark, and then I lost all my other friends. On top of that, I had parents who were trying to regularly shuffle me to psychologists because they thought, ``Well, if she is going to meet somebody off the Internet, then she must be crazy.'' And you know, it kind of placated some of the parents in town. Well, you know, they are sending her for help. You know, let's hope that she is not crazy. It became so bad, in fact, that I went away to boarding school. I had to leave. I had to get a clean slate. And we began the judicial process. We learned that we could try Frank under the 1996 Communications Decency Act, but it was the first case and it required a lot of time. While most kids remember their adolescence making themselves up to get ready to go to dances or preparing for dates or going to the movies with friends, I remember cleaning the house getting ready for the FBI to come. I remember taking a polygraph test. I remember testifying for a grand jury. I do not remember getting ready to go to the dance. It took 2 years to finally prosecute Mark and in that time, he first pled not guilty and then eventually did. The FBI uncovered that he had actually done this to several other girls, some using the Internet. Some he had hired locals in his community that worked with him at his office. And he had even done this to a boy. He had downloaded images regularly of child pornography that they traced through the Images Project. It was very hard for me to admit that this person that I knew could do this. I still longed for Mark, and I had to admit that this was really Frank. So I felt a lot of guilt. I felt that I was sending my friend to jail. Jail was a spot on the Monopoly board that you could pay fifty bucks to get out of. We could not do that with Frank. I knew where he was going and I felt very, very guilty. In fact, that guilt consumed me so much that one time I found myself in the shower with all my clothes on. I did not even know how I had gotten there. I then went to a psychologist and a psychiatrist. I was prescribed Buspar, which is an anti-anxiety prescription, and I was throwing up all the time, almost daily. I had blood vessels popping on my skin. And I was diagnosed with clinical depression. And I share this not to gross anyone out, but to share that it was a really difficult time in my life and that it does go on for quite some time. Frank eventually pled guilty and was sentenced to 18 months in jail. He has since been released. And I knew that that really was not the answer when he was sentenced. I did not feel that this was the end of it. Immediately after his sentencing, I came home and I began writing. I do believe that if it could happen to me, it could happen to any one. And I wanted to share my story with other girls across the country, which is why I wrote Katie.com. Hopefully they can read my story and see, well, if it could happen to Katie, it could happen to anyone. Everyone wants to know what is different about me. What is so special about me that I could have been a victim of the Internet? Why me? And they might want to blame the fact that my parents are divorced so that I would be one of those alone and isolated cases. Or they could think, ``Well, she was promiscuous. Maybe she was looking for a boyfriend.'' I mean, we have to classify victims of sexual assault in some way, it seems, as our society says. But the real fact is that I was 13 and I was vulnerable. And pedophiles know this and they prey upon it. So I do think that there needs to be some kind of measure or monitoring of the Internet because parents cannot be everywhere. While some computers do have filtering software, that is not on every computer. As I travel the country, everyone thinks, ``Well, this is never going to happen to my kid.'' and they will tell me how intelligent they are, how special they are. I could say the same, that I thought I was never going to be a victim. I believe that if there were some type of monitoring system in place and if there was more education back in 1995, I do not think that I would have been a victim. I do not think that I have anything to add because there are so many experts from this field, and the best thing that I could offer is my own story. So at this point I will close and I thank you. [The prepared statement of Katherine Tarbox follows:] Prepared Statement of Katherine Tarbox I was thirteen years old when I first started using the Internet. My parents received a disk in the mail offering my family free hours of America Online. This was 1995 and we didn't completely know what the Internet would bring into our home. The news focused on how this would help our lives; we could buy airplane tickets and my sister would be able to do a complete college search. We didn't think there were any potential dangers to having our computer plugged in with millions of others. We were wrong. I had used America Online once before at school with a project we were working on through CNN and thousands of others schools to help save the Everglades. We used the chat rooms to learn what other schools had done. We only went into chat rooms, and I didn't know that the Internet was meant to be resource tool and a communication tool. From the beginning of my Internet use, I thought of it as a place to meet people. I think I thought of the Internet the way an adult goes to a bar, they go there to meet people. When I first started using America Online in my house, I only went into teen chat rooms. I found some to be overly sexual, but for the most part I found people who I thought were teenagers. We would talk about our common interests, which could be swimming, popular bands, or movies. I didn't use it excessively, but found myself logging on about an hour a day. This is far less than the average child spends online today. It was a September Sunday morning when I met a guy in a teen chat room named Mark. I asked if anyone wanted to talk to a thirteen-year- old girl from Connecticut, and he replied. I immediately found out that he was twenty-three years old and from California. I sat there and stared at my computer questioning if it was all right for me to talk to a twenty-three year old man. At first, I said no; however, I then said to myself ``this is only on the Internet, it can't hurt.'' I honestly didn't think I would have much in common with an older man, nor could I understand why he would have interest in talking to me. All this intrigued and persuaded me to continue. Mark asked what my favorite bands were. I answered, and then he also said he liked them too. Not only did he like those bands, but also he had been to concerts and could name his favorite songs. He then asked me where I shopped. Ironically, he also shopped there. He could also tell me styles that he had purchased there and products he frequently bought. We then talked about places we had both traveled to, and movies we had both seen. While the FBI may call this process grooming, in my thirteen-year old mind this was fate. At that age I didn't even know what a pedophile was. And though I didn't know what a pedophile was, I instinctively knew that I couldn't be a victim of one. I was a high-honors student, a national swimmer, a very accomplished musician, and I came from a loving family. Our society has labeled victims of sexual assault as being alone and isolated, or promiscuous. I wasn't those things, and so I never thought I could be talking to a pedophile. More importantly, the D.A.R.E. classes that I had in school taught me that rapists are usually uneducated and scary people. Mark was a very intelligent and caring person. This translated for me that Mark couldn't be a pedophile. We developed a friendship over a period of six months. It was platonic, and I can't emphasize that enough. It wasn't sexual. We would talk about politics, world issues, and a lot of pop culture. I could tell him my concerns about school, friends and family. This led me to believe that my friendship with Mark was beneficial in my life. I believed he was a positive influence in my life. Mark told me the things that I needed to hear at that age. He told me I was intelligent, beautiful and mature. At thirteen, while trying to develop a sense of identity, my confidence level is very low. There was continuous pressure from Mark to have an in person encounter. I wanted this, but didn't see how logistically it would work out. He was from California and I was from Connecticut. I knew I wouldn't go to California, and I didn't think it would be ok to have him over to my house. I hadn't told my parents about this relationship, because I didn't think they would understand the nature of it. I thought they would dismiss it as something sexual, when it wasn't, and force me to end it. Mark kept on suggesting times that we could meet, and I told him that I couldn't because I was going to Texas for a national swim meet. Mark said he would come along with, and before I could say no, I said yes. It was one week before the actual visit, and I was always in the honeymoon excitement period of finally meeting him. This excitement prevented me from rationalizing that I was going to meet an older man from the Internet. I traveled to Texas with my swim team and my mother. I stayed with one of my close friends, and my mother was down the hall. The friend that I was staying with was the only person I had told about my relationship. As I suspected, she passed it off as a sexual relationship. This reaffirmed that I was a little more mature than the rest of my friends, and could handle this friendship with Mark. At 9:30 Mark called my room and said he wanted to see me. I immediately headed for the door. My friend, Kerry, insisted that I didn't go and held herself against the door. I pushed her to the side, told her the room number of Mark's hotel room and headed to the elevator. I know the scariest part in all of this is that I never thought I was putting myself in a dangerous situation. I never thought I could be raped, or killed. I never thought Mark would be any other person than who he said he was. I knocked on the door and he opened it. We had exchanged pictures, but his was taken from so far away that I couldn't make out any distinguishing features. Standing at the door, I realized that this was an adult. I knew he was an adult, but on the Internet a lot of fantasy gets built up and you don't have to acknowledge reality. I felt very uncomfortable to be with Mark. He sensed this and began talking about the airport, soap dishes, my shoes, and other random subjects. He bounced around on topics, hoping to put me at ease. While there, I didn't know what was going to happen and I thought we would continue to have conversations like we had had over the phone. I had been there about thirty minutes, when Mark leaned over and said, ``Katie, I have been thinking about you all day and thinking about doing this.'' I knew what this was. He leaned in, kissed me, then groped me, and touched other parts of my body. Essentially, in those short fifteen minutes, I was molested. I always thought that if I were in a position where I was receiving unwanted sexual advances that I would be strong. Instead, in the moment, I became passive. I was confused. I thought, ``Do I owe to Mark? Of course he didn't come from California just to talk.'' I was disappointed in myself and felt very dirty as a result of him touching me. There was a knock on the door, and my gut could tell it was my mother. I knew how disappointed she was going to be, though I felt relieved that I was going to be saved. I know if she didn't come, I would have been raped that night. My friend had told my mother where I had gone. My mom gathered hotel security and police and came to the door. The police questioned me and I told them briefly what had happened, carefully leaving out what Mark had done physically. They came back and said, ``Miss, we have been talking to him for ten minutes and you say you have been talking to him for six months. His name is not Mark, but it is really Frank Kufrovich. He is not twenty-three, but actually forty-one. He is also a financial advisor from Los Angeles.'' As they told me this, I thought, ``Who the hell had I been talking to?'' I realized that Frank could be doing this to anyone. At the same time, I didn't want to admit that Frank had lied to me. It was very hard for me to admit that Mark was a made up person, and that Frank was sick pedophile. I came forward and my family pressed charges, because I knew deep down it was the right thing to do. It was hard though, and I felt like I was betraying a friend. It took two years to prosecute him. In that time I lost all my friends at school because parents and my classmates blamed this on me. I eventually had to go away to a boarding school so that I could have a clean slate. Frank hired private investigators, who came and interviewed people in my town. I suffered from tremendous guilt, and I was diagnosed as being clinically depressed. I was taking a very high dose of Buspar, an anti-anxiety medication, which made me vomit almost daily. I had blood vessels popping on my skin making a rash. I even found myself in a shower with all my clothes on, not knowing how I had gotten there. I remember my adolescence by the times I went to the FBI for a polygraph test, or going to the psychologist. I don't remember putting on make-up preparing for the school dance. I think about that time as living hell. Frank eventually pleaded guilty. He was charged under the 1996 Communications Decency Act with traveling interstate with the intent to have sex with a minor and using interstate communication to persuade a minor to have sex. Frank was sentenced to a mere eighteen months in Federal prison. He was released in October of 1999, and will be off probation by the end of this summer. The FBI found that Frank had raped several girls, and even a boy. He also married a girl that he began sleeping with when she was just thirteen years old. I wrote about my experience in my book, Katie.com, because I wanted girls to be empowered. While traveling around the country, speaking about my experience with the Internet, the most common question I get is ``What do you think was different about you that would make you a victim?'' I am sure they want to blame the fact that my parents were divorced, or use the excuse that my mother is a work-a-holic. These are not the reasons why I became a victim. The answer is that I was thirteen. Thirteen is a very vulnerable age, and it happened that I met someone who told me the things that I needed to hear at that age. This is especially true in today's society, where girls are told to live up to very unrealistic expectations. Every person is thirteen at some point, and every thirteen year old is vulnerable. Though their parents may think they are safe while on the Internet, they are not. There needs to be some type of regulation to control chat rooms on the Internet. Unfortunately there are too many pedophiles out there, and at the same time, there are many vulnerable teenagers using the Internet. Some of them may not give out their address, or their real name, but they give out other personal information, like their number on the field hockey team and their school. This is enough for a person to find them. Children don't realize the consequences to Internet relationships. I know this because I have communicated with thousands of girls through my website. If they don't know the consequences they will learn them, unfortunately, probably the same way I did. We need to step up and protect children while they surf the Internet. The Internet is an incredible tool, and should be used by all; however, it should be safe. Mr. Upton. Thank you very much, Katie. It is a nightmare that no family wants to experience, and we certainly appreciate you sharing your experiences with us today. Thank you. Our next witness is John Karraker. John, welcome. STATEMENT OF JOHN KARRAKER Mr. Karraker. Thank you. Chairman Upton and Congressman Bass, thank you for the opportunity to testify today at this hearing entitled ``Chatting On-line: A Dangerous Proposition for Children.'' Katie, your compelling story makes me realize how lucky I am and how lucky my family was. I appear today before you as a private citizen representing myself and, more importantly, as a father. My oldest daughter was nearly a victim of a sexual predator. I allowed her to engage in chat room conversations and utilize the Internet when I was not home. I found a phone message from somebody who sounded much older than my 13 year old daughter asking her to call him. When I questioned her about it, she denied having any knowledge of who this person was. Shortly afterwards, my ex-wife took a phone call in which the subject mistook her for my daughter. When he refused to answer her questions, she hung up on him. My daughter, at this point, still refused to provide details, but did admit to a long period of chatting with this person on the Internet and how he had eventually asked her for her number, which she did provide. I checked the computer for information, but this was not useful. She had deleted any information on identities from her Instant Messenger after being confronted on the first phone call. I believe now that she was trying to protect him, and if I had not disabled the Internet when I was not home and taken its use away except for monitored homework, it would have continued. The experience my daughter had fortunately did not have a tragic outcome, but I have to admit that it was more by luck than by parental intervention. We tried to instill in my daughter the possible dangers of meeting people on the Internet. We tried to tell her about sexual predators who were out there, people who would say anything to her to try to establish trust with her. Unfortunately, I then relied on the judgment of a young girl to make appropriate decisions. The computer was in its own room and I did not physically oversee its use. Parents must educate themselves and their children with the dangers of the Internet world. Monitoring must consist of more than just reviewing histories on the Internet. Children quickly learn how to delete histories and they will do it. Reliance on for-profit ISPs will be useless. When I contacted AOL, their attitude was they could care less. I tried to ask them for assistance and they told me that there nothing they could do. Law enforcement was also of no use at that time. Neither Federal nor local agencies would intervene as there was no crime committed. Even as a police officer who knew some of the type of individuals that exist in our society, I was lax. I thought that I had done my job by warning her. I have to admit that I also felt very frustrated that as a police officer, I could not make the system work for me and get somebody to take action. I would just like to express my opinion on several things that could and should happen. First of all, parents must educate themselves and their children and monitor activity. This is probably the most important piece. ISPs must be held accountable for what happens on their service. Laws must be enacted that allow law enforcement agencies to pursue potential predators. Finally, law enforcement agencies must be provided funding for equipment, training, and manpower. I can tell you as a police officer on the street that we do not have the knowledge that we need to have to take enforcement action or to recognize what the problem is. This problem is not going to go away, but it is only going to become larger. Thank you for your opportunity to address you. [The prepared statement of John Karraker follows:] Prepared Statement of John Karraker Congressman Upton and other Members of the Subcommittee, thank you for the opportunity to testify today at this hearing entitled: Chatting On-line: A Dangerous Proposition for Children. I appear before you as a private citizen representing myself and, more importantly, as a father. My oldest daughter was nearly the victim of a sexual predator. I allowed her to engage in chat room conversations and utilize the Internet when I was not home. I found a phone message from somebody that sounded much older than my 13 year-old daughter asking her to call him. When I questioned her about it she denied having any knowledge of who the person was. Shortly afterwards my ex-wife took a phone call in which he mistook her for my daughter. When he refused to answer her questions she hung up. My daughter as this point still refused to provide details but did admit to a long period of chatting with this person on the Internet and how he'd eventually asked for her number, which she provided. Checking the computer for information was not useful, as she'd deleted any information on identities from her instant messenger after being confronted on the first phone call. I believe now that she was trying to protect him and if I'd not disabled the Internet when I wasn't home and taken it's use away except for monitored homework, it would of continued. The experience my daughter experienced fortunately did not have a tragic outcome, but that was more by luck than parental intervention. We tried to instill the possible dangers of meeting people on the Internet with my daughter. We tried to warn her of sexual predators who would say anything to lure her into meeting them. I told her they would try to establish bonds with her to make her trust them. Unfortunately I then relied on the judgment of a young girl to make appropriate decisions. The computer was in it's own room and I did not physically oversee its use. Parents must educate themselves and than their children with the dangers in the Internet world. Monitoring must consist of more than just reviewing histories of Internet use. Children quickly learn how to delete histories and will do it. Reliance on for profit ISPs will also be useless. When I contacted AOL their attitude was they could care less. Law enforcement was also of no use. At that time neither local nor federal agencies would intervene when no crime had yet happened. Even as a police officer who knew of some of the types of individuals that exist in our society I was lax. I thought I'd done my job in warning her. I also felt very frustrated that even as a police officer, I could not get anybody to take action. In my opinion several things must happen:Parents must educate themselves and their children and monitor activity. ISPs must be held accountable for what happens on their service. Laws must be enacted that allows law enforcement agencies to pursue potential predators. Law enforcement agencies must be provided funding for equipment, training and manpower. This problem is not going to go away but only become larger. Mr. Upton. Thank you very much, John. Our next witness is a prosecutor in Kalamazoo County, Jim Gregart. STATEMENT OF JIM GREGART Mr. Gregart. Mr. Chairman, Congressman Bass, my name is Jim Gregart. Believe it or not, I am the ``Ponytail Prosecutor'' for Kalamazoo County. I have been in criminal justice for over 40 years. At the beginning of my career, I would have thought this day of me testifying about computers and something called the Internet would have been as much lunacy as thinking of putting a man on the moon, but my, don't things move quickly? When first asked if I had anything to add to this hearing, I told Congressman Upton and staff, ``Well, sure. We have cases in Kalamazoo. There are not as many as large metropolitan areas, but we have some.'' And then I asked my staff to bring together all the closed and open files and found out that we had more than I had thought. In a variety of different ways, the computer and technology have become part of America's criminal justice system. So in order to get an average fact pattern, I went through the cases we had. And then last Thursday at exactly 4:45 p.m., one more walked into my office. One of my team leaders said, ``I understand you are going to testify next week.'' And then he handed me the charges he had just authorized against Kalamazoo's latest cyber predator. This kind of crime emanating, having its origins in chat rooms is not a widely reported phenomena, and yet it is occurring much more than we would like to admit, I believe, in America, somewhat like the status of domestic violence many years ago. There was a proliferation of it, but our polite society kept it below the genteel surface of public acknowledgement. Today there are many, many, many, many children being subjected to sexual assaults emanating originally from a contact made in an Internet chat room. Most of those instances are not being reported to the authorities for a variety of reasons, many of those articulated well by Katie. By the way, not only are you a survivor. You are a winner. You do not have to worry about your future. You are going to do exceptionally well. But here is the latest one from Kalamazoo. A 34 year old Kalamazoo County resident posing in an Internet chat room as a 17 year old high school student begins a relationship with a 14 year old high school freshman from another county in Western Michigan. Over a period of time, it results in a meeting, a personal meeting, and ultimately a sexual relationship of a 34 year old adult male with a 14 year old female. That particular defendant now faces up to 35 years in a Michigan prison upon conviction. And we intend to convict the defendant. I grew up with the parental admonition of ``do not talk to strangers.'' Most of us did. Do not talk to strangers, and yet everyday in this Nation, in this state, and in this Middle American, quasi-agrarian community of Southwest Michigan, we have parents who repeatedly let their children talk to strangers. As John indicated, and I reinforce and validate, parents have to learn technology. I am a dinosaur. I am not hard-wired like young people today. I tried to stave off the tsunami of computer technology beyond my professional career. And then 1 day I was just swamped. Technology came over the gunnels of my personal ship. So I had to learn technology. I have and I am now an information junkie on the Internet. Wow, it is a sad day when somebody like me starts learning about technology. Nevertheless, a lot of parents today intentionally remain removed. They will buy a computer. They will sign up for Internet service, and they will trust that their children will only use it for legitimate, educational purposes. Perhaps they, too, as I once thought, think that they are too old to learn about technology. Well, not taking the time to learn about technology is to do the equivalent of putting their children untrained, immature, behind the wheel of an automobile because that is the potential harm that can result. Nobody today in their right mind would think about letting their child without any kind of training, without any kind of experience, without any kind of guidelines, at the age of 12 or 13 get behind the wheel of a car and just take off wherever. Well, that is what happens when you get on the Internet. It is a cyber-playground; you can go anywhere in the world. You are a mouse-click from Europe. You are a key stroke from the Pacific Rim countries or you are a nanosecond from an adult pedophile predator. And they are lurking out there, believe me. Who would think that this is not Silicon Valley? This is not a big major metropolitan are. This is Kalamazoo; this is Southwest Michigan. But they are here. They are here, and they are not all down the street opening a car door and saying, ``Hey, little girl, want to see a puppy?'' or ``hey, want some candy?'' That is old kind of traditional view of someone who is trying to snare a child into his lair. Instead, they are not in cars on our streets. They are not walking around our playgrounds. Instead, they are in your own child's bedroom, if that is where you happen to keep a personal computer, or they are in your family room or they are in your den because they come to you almost close enough to touch your child via the Internet. I remember how proud I was in the early 1990's taking my two children to a seminar about the Internet because in the early 1990's it was truly an emerging technology. After we got our PC and we signed up with AOL, I remember them sitting at the table and saying, ``Guess who I talked to last night? Somebody in South Africa, somebody in Japan, somebody in countries all over the world.'' I thought, ``This is terrific. What a cultural opportunity and education.'' And like a dolt, John, you and I share. I guess this is True Confessions time. I never thought in the early 1990's about what could happen. There are hundreds and thousands of parents today, who have not yet realized the potential risk that their children are at. Katie's folks know; John knows; I know. Hopefully the majority of people in this room know. But yet there are hundreds and thousands of parents who still today let their kids get behind the wheel of a Ferrari at the age of 13 or let them talk to the stranger who opens the Internet door in the chat room and become inveigled. Kids at 13 and 14 are vulnerable. Let's admit it. Katie, you well articulated the vulnerabilities of an average youngster in America today. Are there lessons to be learned? Yep, from the old, grained prosecutor in Kalamazoo. No. 1, parents/custodians have to learn at least a modicum about technology, computers, and the Internet. You cannot blindly and blithely raise children without having some awareness of the benefits and the harms that are out there. Children, themselves, ought to be given some sort of training as to the appropriate use of the Internet and chat rooms. Third, a matter of sensitivity, and that is called monitoring. There are a variety of ways to monitor a child's use of chat rooms. Some of them are rather explicit and express. And then there are others that are more shall we say I will choose the word ``secretive,'' clandestine? In one recent case in Kalamazoo County, I have here the instant messaging printouts that a parent took off of his child's computer. This relates to a charge of sexual assault against an adult male preying upon a young juvenile. But there are software programs available where parents can not just monitor keyboard strokes and track that, but even instant messaging now. So if I can say one thing to parents, ``do not let your children talk to strangers, not just in the playground or out on the street, but in your own home.'' Thank you. [The prepared statement of Jim Gregart follows:] Prepared Statement of Jim Gregart, Kalamazoo County Prosecuting Attorney I'm Jim Gregart, the elected Kalamazoo County Prosecuting Attorney. Don't let my ponytail fool you. I'm a law & order former police officer from Detroit and have been a prosecutor in Kalamazoo for the past 32 years. I first began my career in criminal justice just two years after the Detroit Lions last won an NFL championship. That fact alone gives you some idea of my professional longevity and the vast changes I've experienced in the nature of crime in America. As a criminal justice college student in the 1950's, the idea of me someday testifying before a Congressional Subcommittee on something called ``Internet Computer Crime'' would have been equally screwy as putting a man on the moon. Nevertheless, today my job requires that I both regularly use and understand a complicated technology that was only ``science fiction'' a mere 15 years ago. When Congressman Upton asked me to testify at today's hearing, I had my staff pull our closed and pending files on computer crimes. To be honest, there weren't that many. You see, . . . the Prosecutor or District Attorney usually sees a criminal case only when the police first have a crime reported to them and then only when they're able to uncover sufficient admissible evidence to support a provable offense. The lack of victim reporting is the first impediment to the successful prosecution of adults who use Internet chat-rooms to prey upon children. All reasonable people acknowledge that this type of crime occurs in America. But, the reporting of it to law enforcement officials can be likened to an iceberg, i.e. we only see a small portion of a much larger mass which lurks beneath the genteel surface of millions of legitimate Internet communications. Untold numbers of chat-room initiated sexual assaults of children are not reported to the police because either (1) the actual child victim chooses not to disclose the offense, or (2) parents or guardians are unaware that the offense occurred, or (3) the Constitutional right of a criminal defendant to confront and cross-examine their accuser in a public trial sometimes acts as a subtle deterrent to reporting the crime. It takes genuine courage for a victim and their family to do what's right; even though it may be difficult and personally embarrassing. I'm aware of cases in my jurisdiction where victims and their families have chosen not to cooperate with law enforcement investigators. Thus, their alleged assailants have never been brought to justice. However, that was not the decision made by one West Michigan child and her family only last week. This 14 year old high school student and her family are cooperating with local law enforcement officials. Because of their cooperation, this child's 34 year old Kalamazoo sexual assailant now stands charged with a violation of Michigan's law prohibiting the Use of Internet Communications to Commit a Crime and two (2) additional Counts of Criminal Sexual Assault. Upon conviction, this pedophilic cyber-predator will face up to 35 years in a Michigan prison. To some folks, Southwest Michigan may seem far removed from the threat posed to children by adult Internet chat room predators. However, nothing could be further from the reality of today's technologically shrinking world. Anyone sitting at a computer in Kalamazoo is merely a mouse-click away from anywhere in the world. Any child could be merely a keystroke and nanosecond removed from the chat room babble of a masquerading adult bent on predatory sexual assault. In my community, we've had adults travel from other states to sexually assault local children whom they've first encountered and deceptively cajoled via Internet chat rooms. Last week's case, however, is uniquely Michigan. The defendant lives in Kalamazoo county while the 14 year old victim resides in another West Michigan community. Late last year, the chat-room phenomena brought them together in cyberspace. This 34 year old adult identified himself to the victim as a 17 year old high school senior. The victim, however, readily identified herself to the defendant as only being a 14 year old high school freshman. Over a period of time, their keyboard communications transmuted into a personal meeting and, ultimately, repeated acts of sexual assault. Fortunately, this young girl has the personal courage and strong support of her family. They evidence a determination to pursue justice. Since this criminal prosecution is currently pending in our local courts, I'm not at liberty to publically provide details of the offense. That would be prejudicial to the defendant's Constitutional right to a fair trial. However, I can tell you that, with a court ordered Search Warrant, we've seized the defendant's computer and allied records. The police now have a list of approximately 20 additional female names that they've starting checking. Right now, we have no idea of the ages of these females. But, we will soon find out. Are there lessons to be learned from this most recent and other similar cases in ``middle America''? Yes, . . . and, the first one is to recognize and acknowledge that crimes like this can and are happening everywhere in this Nation; even in a quasi-agrarian area like Southwest Michigan. Secondly, parents and guardians can no longer blithely ignore the tidal wave of technology which has engulfed our society. Not too long ago, I honestly thought I could stave-off learning about computers until my life expectancy and net worth simultaneously arrived at ``zero''. Boy, was I ever wrong! And today, any person responsible for the well-being of a child would also be wrong to not educate themselves about both the promise and perils of computers and the Internet. When the automobile was first invented, it changed the world much for the better. However, when driven recklessly by young people, that same automobile can become an instrument of peril and death. Most adults would not place their child behind the wheel of this potentially dangerous machine without first providing adequate education, training and constant monitoring of their child's driving performance. Well, computers and the Internet hold the same promise for both positive and negative outcomes for children. When used properly, the Internet and chat rooms can be a wonderful experience for children. But, without adequate preliminary education, safeguards and monitoring, they can become the equivalent of putting an untrained youngster behind the wheel of a Ferrari and hoping for the best. In today's world, the technological speed of a computer chip almost seems to be rivaling that of a Ferrari. The reckless use of a motor vehicle can hurt a child. That same reckless and uncontrolled use of the Internet and chat rooms can likewise place children at risk of physical and emotional harm. When I was a child, I remember my parents repeatedly telling me, ``Don't talk to strangers''. That was good advice back then and I gave my own children that same constant admonishment. My kids are now in their mid-twenties. But, as I look back to their teen-age years, I'm chagrined to admit that I knowingly permitted them to violate my own warnings. As a matter of fact, back then, I was ignorantly pleased when they told me about their new young cyber-friends in far away countries who they met via Internet chat rooms. Fortunately for everyone, my children benefitted immensely from their early exposure to foreign kids and cultures. For them, it was a meaningful educational experience. However, ten years ago, it was also a risk of harm that I didn't fully comprehend or appreciate. Today in America, parents continue to warn their children about the dangers of ``talking to strangers''. What many parents don't yet fully understand is that those same ``strangers'' are not just on public streets or parks. Today, the ``strangers'' to be feared may also lurk in your own family room or child's bedroom. They live behind the innocent facade of a computer screen and talk to your children in chat rooms on the Internet. In an earlier time, they were the same ``strangers'' who parents feared would lure their child into their grasp with promises of candy or a puppy. Now, those very same ``strangers'' use the anonymous cover of an alias Internet identity to disguise themselves as children. They now use a keyboard to probe for the emotional vulnerabilities of unsuspecting youth. They're the same predators of yesteryear who now use Internet chat rooms in lieu of an open car door and an offer of candy or a lost puppy. The challenge for today's parents is to insure that children ``don't talk to strangers'' both outside and inside their own homes via unfettered, unmonitored Internet and chat room access. Thank you. Mr. Upton. Thank you very much, Jim. Ruben Rodriguez, thank you so much for coming out from Washington today. STATEMENT OF RUBEN D. RODRIGUEZ Mr. Rodriguez. It was my pleasure, Mr. Chairman, Mr. Bass. I have written out a bunch of the things that I wanted to talk about. But listening to Katie's story, I have had the pleasure of appearing with Katie before, and I echo the earlier comments that she is a very brave young lady and we hope to work with her in the future, absolutely. Let me tell you a little bit about the National Center. The National Center has been in creation since 1984. While everybody knew for many, many years that the center was the clearinghouse for missing children, nobody really knew about the other resources and the other issues that we have dealt with, and that obviously was the issue of the exploitation of children. Before coming to the National Center 12 years ago, I spent 20 years in law enforcement in Washington, DC, working with traditional crimes. And only when I started at the National Center did I really ever work on children-related issues, more so in 1997 when I took over the unit, and I started seeing the problems that are out there on the Internet. When I was in law enforcement back in the 1970's and 1980's--I am dating myself now--there was no such thing as the Internet and computers. We were still using typewriters and word processors for computers, and most people did not even know to spell the Internet, other than use it, and that was in law enforcement. And I thought that we were cutting-edge in Washington. Since I was able to work on data bases, it was very helpful. But then the Internet was another world that we knew nothing about. When I started at the Center, still the Internet was not an issue. The National Center's Web site did not go into production until 1995 anyway or 1996. In 1997 we developed the Exploited Child Unit. And in 1998 we developed the Cyber Tipline to allow the public to report incidents of child sexual exploitation. In the first year of operations, we had over 17,000 reports. Today we have over 71,000 reports; 1600 of those have to do with chat. Now, it does not seem like a large number when you say 1600 compared to 71,000, but when you look at the history of these individuals in these cases, most of these cases go unreported because parents, like John said, become aware of it and they say, ``Well, we have stopped it. So we can take care of it. It is not a problem. We have already reported it to the on-line service provider. We have, you know, put in software to stop access to the Internet and block access to the Internet. The problem is solved.'' Of course, not knowing the predator or the sexual molester or cyber pedophile, whatever you want to call it, these individuals do not do this once. They have been out there for years. They have been sitting there doing this via mail, on the playgrounds, and now they have this medium, this anonymous medium, to communicate among themselves and also go into predicated areas to find children. I use the analogy of if you want to go to buy meat, you go to a meat market. When you want to go find children on the Internet, you go to areas where children congregate. These individuals are experts in the seduction of children. They spend hours and days sitting on the computer. Katie mentioned that this individual knew everything about music groups, songs, name albums. And this is what they do for a living. If I am looking for a 15 year old child on the Internet, I am going to learn what are the interests of these individuals. What is the interest? How can I get to them? How can I get close to them? They will spend days and hours. What most people do not realize about chat is that it is a one dominion environment. You can have simultaneous conversations with dozens of people at the same time, different levels of seduction. They do not mind spending months, weeks, and years going after kids because there are so many of them out there that they do not mind investing the time and the effort. All they have to do is hit one and they have dealt with their fantasies. They have taken it beyond that. Mechanism of chat is made to order for these individuals. Direct text communications: you have a captive audience. A child is looking at a computer screen and so you have their full-time attention. And you can manipulate, build trust relationships, as Katie mentioned. They want to be your friends because the ultimate conclusion for them is sexual motivation. They want to go meet this child. Most individuals enjoy just the fantasy of it. Unfortunately, there is an all-too-large group that want to go beyond that and actually meet the children. The numbers are growing. Federal law enforcement officers, State and local law enforcement agencies are getting funding to do these programs. It is not enough. Not so much for the Federal entities, but the State and local law enforcement officers, as he mentioned earlier. Your victim is local. Your law enforcement agencies are local. You have over 17,000 law enforcement agencies in the United States. You have three major law enforcement agencies: the FBI, U.S. Customs, and the U.S. Postal Inspection that work child pornography related issues, traveler cases, whatever. But it is your State and local law enforcement agencies that have the areas where the suspect lives and where the child resides. So I would obviously encourage the use of Federal funding to go into those initiatives. I am privileged to belong to the Internet Crimes Against Children Task Force's Board of Directors. Thirty regional sites throughout the United States are working this issue. Michigan has an I-Tec task force that is very proactive. I would like to see many of those throughout the United States to help State and local law enforcement agencies, to train them. It is not really investigation they are involved in. They are also involved in outreach to the community. There are several programs that work effectively throughout the United States. And I would like to see more funding going into those initiatives. I can sit here and spit out numbers, and it does make some sense when you are looking at the totality of the problem. But we are just touching the tip of the iceberg. The problem is much bigger than most of us realize. There was a study done by the FBI in North Carolina at a rehabilitation hospital, where they talked to offenders who had molested children. And the first time they talked to the offenders, they admitted to doing 4 or 5 children. They were talking to, I think, 30 offenders. When the study was over, they averaged that each one of these offenders were doing at least 300 children before they were apprehended. So the problem is getting bigger. As the Internet fueled this, it has allowed access. These individuals used to go to the playgrounds, used to look at children, follow them, stalk them. Now they have a medium where they can do it without any risk to themselves. The risk is when they actually go to meet the child. In many cases, as I mentioned earlier, fantasy is sufficient for them. Unfortunately, there are those who take the fantasy beyond that. They use child pornography to lower inhibitions of the child. It is not so bad. The child is smiling. Different levels of undress. All of that is used by chat. You can append images and add information, URL information. It is a community where kids are curious. They go out there and put themselves in harm's way unfortunately, and because of their curiosity, they are very trusting, as Katie mentioned. They are somewhat flattered when an individual pays attention to them, when they tell them, ``Yeah, I am just a little bit older than you. I am 18, 19, 23,'' when unfortunately the gentleman is 45 or 50 years old. We see it all too often. At the National Center we see this information coming on in avalanches now. I say the first time that we started this, we had 17,000 reports. In less than 4 years, we have 71,000, and we are just touching the tip of the iceberg. The ISPs have come to the table because they were forwarding information to us on not only child pornography, but also on unsolicited E-mails and chat complaints which is great for us. Of course, it is making my work load much higher and hard, but, again, that is our job. I could go on and on, but I just wanted to agree with many of the things that were said here before me: effective prosecution, funding for law enforcement, and outreach programs for children and parents. The first line of defense is the home. The analogy again is when you want to teach a child how to drive, you do not throw them a set of keys and say, ``Have at it.'' You sit with them, teach them the rules of the road. You praise them when they do well and correct them when do wrong. People do not think of the Internet and the computer as the same. It is. You turn on the computer and you let the world into your home. Thank you. [The prepared statement of Ruben D. Rodriguez follows:] Prepared Statement of Ruben D. Rodriguez Jr., Director, Exploited Child Unit, National Center for Missing and Exploited Children SUMMARY Mr. Chairman and members of the Committee, I am pleased to appear before this subcommittee today to express my views on the potential dangers of unsupervised online chatting by our nation's youth. As a way of introduction, I have been involved with the National Center for Missing and Exploited Children and the issue of missing and exploited children since my retirement from the Metropolitan Police Department of Washington, D.C. in 1990. In 1997 I was made the Director of the Exploited Child Unit. One of the mandates of this unit was the creation and development of an online reporting mechanism for the public to report incidents of child sexual exploitation. To date we have received over 71,000 reports, 1,600 of those reports are attributed to the use of chat to entice, seduce and exploit children. While this medium has offered great opportunities for children and adults alike to conduct research, communicate, meet and chat with new friends throughout the world, unfortunately in certain instances it has also become a vehicle for those who prey on the unsuspecting. Oftentimes, criminals misuse new technology before law enforcement acquires the tools and expertise to counter such uses. The 2000 Census reports that 9 out of 10 school age children, ages 6-17 years of age have access to a computer. In addition, 4 in 5 households with access to the Internet had one or more members using the Internet (44 million households). Recent figures put the current number of children online to an estimated 10.5 million. The usage time by teens between 16-17 years old illustrates that 32% of these youth spend 5 or more hours online per week. We at the National Center's Exploited Child Unit are aware of serious incidents where children who communicate in web-based Chat Rooms, IRC or Instant Messaging with individuals who they believe are peers or friends, who eventually turn out to be individuals who are not who they say they are. All too frequently, we see children traveling or meeting these individuals and find out all too late that they have put themselves in harm's way. I have been asked on numerous occasions by the media and parents, ``what can one do to safeguard our children?'' and I have always believed that it starts in the home. Law enforcement and organizations like the National Center's CyberTipline only get involved when it is too late. We believe that a comprehensive education program should be instituted in the home to address these issues. In this respect the National Center has created NetSmartz, which is the Center's proactive, educational approach to fighting online predators. The materials developed by the NetSmartz Workshop are designed to be a proactive, educational approach to helping children build self-confidence in order to better handle and protect themselves in all types of situations. THE DANGERS TO CHILDREN ONLINE Many parents have a false sense of security regarding the risks to their children in cyberspace. They feel that their children are at home, often in their own rooms, doing something positive and useful for their future. Many parents have little knowledge about computers and what their children are doing online, and feel that there is little risk. Similarly, many children view cyberspace as a variation on their computer or video games. As a result, they may not view encounters with people online with the sense of caution or skepticism that they apply to meeting strangers in the ``real'' world. Further, chat is one of the most popular pastimes of children online. Numbers are hard to come by, however on American Online, over 100,000 people chat simultaneously in over 20,000 chat rooms.1 Teenagers, especially, enjoy the anonymity and experimentation chat rooms provide. This, combined with a lack of guidance by parents and the grooming and seduction by a sexual predator, may lead to a child's victimization online. Just as teenagers enjoy the anonymity offered to them through chat, pedophiles also use this avenue to their advantage. Pedophiles organizations were one of the first criminal groups to exploit Internet technology. The computer has provided pedophiles with ``an ideal means of filling [their] needs for validation, organization, and pornography [as well as] finding potential new victims.'' 2 3 Types of Risks to Children in IRC Online Enticement of Children for Sexual Acts: By the year 2002, more than 45 million children will be online.3 For sexual predators, this makes the Internet the largest existing playground and the fastest way to meet potential victims. Beginning with the ``harmless exchange'' of personal information, sexual predators empathize with the child's frustrations with puberty and parents and engage him or her in sexually explicit conversations. The predator may send adult and child pornography to lower the child's inhibitions and eventually arrange a face-to-face meeting for sexual purposes. Therefore, chat rooms often become distorted playgrounds for these predators. They can pose as someone else, approach children with seductive offers, and eventually violate a child's privacy and security. As of May 1999, the National Center for Missing and Exploited Children (NCMEC) has been involved in approximately 599 ``traveler'' cases in which a child left home or was targeted by an adult to leave home via the Internet. As of May 2002 the National Center received of over 1,600 cases involving Chat and Chat Rooms. Distribution of Child Pornography and Pedophile Materials: The number of pedophiles and child molesters using the Internet is unknown, but the IRC, in particular, is an ideal medium for numerous pedophile activities: Distribution of Child Pornography: According to some police estimates, as many as 80,000 child pornography files are traded online every week.4 Pedowatch also reports that approximately 1,500 people join the preteen erotica trading channels on IRC's Undernet everyday.5 The IRC provides a fast, easy, effective and discrete method to trade images of child pornography. Exchange of Pedophile Materials: The IRC provides pedophiles the opportunity to engage in discussions regarding their sexual deviance and exchange pedophile information in a relatively anonymous forum. This only serves to assist them to validate and rationalize their behavior. Also, it has been hypothesized (although not scientifically proven) that the easy access to child pornography images and increased ability to locate those individuals who have similar interests in children may contribute to an individual with latent tendencies to act out and sexually victimize a child. How does the IRC facilitate the victimization of children? Lack of monitoring: Operators of IRC servers do not maintain any type of logs of what occurs on the channels of their servers. Unless turned on by users through their client software, whatever is said in a channel is lost after an individual logs off of the server. Channels can be easily created: Channels can be instantly created and can be invite only requiring a password to enter. Since there is no governing body of the IRC, it is easy to establish private chat channels for the exchange of images, pedophile materials and private one-on-one conversations. Nicknames can be easily changed: Once in IRC, it is extremely easy to create a channel. Unlike chat rooms through online service providers (which have unique and traceable screen names assigned to them), an IRC user can instantaneously change their nickname and re-enter the chat room as someone else. This makes identifying and tracking IRC users more difficult. Jurisdictional Questions: The IRC is a global medium with no governing body. This, coupled with the ability for a user to download free client software, makes it extremely difficult to regulate. However, individuals within a channel can be held accountable for criminal actions. Direct Client-to-Client Connection: One of the most useful features of IRC for pedophiles is the ability to send and receive files outside the IRC network. This feature, called Direct Client to Client (DCC), is the most secure form of communication available on IRC. Messages and files sent via DCC are sent by a direct connection (not part of the IRC network) between two individuals; therefore, they are difficult to track unless you are one of the recipients of the message or file. Law Enforcement Response to Date The IRC presents unique challenges to law enforcement to protect children from sexual predators. Although it is possible to trace the identities of those using IRC for illegal purposes, evaporation of electronic audit trails, the use of encryption and steganography, and the ease with which predators can avoid detection through fake cyber identities and other computer tricks are challenges law enforcement face every day. In addition, most law enforcement is ill prepared to address computer-related crimes due to lack of training and necessary equipment (e.g., an Internet connection). In most countries, law enforcement is playing catch up to an exploding epidemic of computer crime. Recognizing the need for resources to combat Internet crimes against children, the United States government has taken an active role in assisting federal and local law enforcement. In 1995, the Federal Bureau of Investigations (FBI) created the Innocent Images Task Force to conduct and coordinate online undercover investigations on cases in which individuals use computers to lure children into illicit sexual relationships, and to investigate those individuals who produce, manufacture and distribute child pornography. Through March 31, 2002 Innocent Images has opened 7,067 cases, has filed 1,811 Information/ Indictments, and has 1,850 convictions. The United States Customs Service also plays a crucial role in investigating child pornography trafficking and pedophile organization cases. They were the first federal law enforcement agency to initiate a comprehensive computer child pornography case. During fiscal years of 1998 through 2001, the United States Customs Service investigations produced 874 convictions. In 1998, the United States Congress provided the Department of Justice's Office of Juvenile Justice and Delinquency Prevention over two million dollars to create ten Internet Crimes Against Children Task Forces on the local or state level. The ICAC Task Force Program ``encourages communities to develop regional multi-disciplinary, multi- jurisdictional task forces to prevent, interdict, and investigate sexual exploitation offenses against children by offenders using online technology.'' 6 The ICAC Task Force Project has a current financial commitment of over $7,000,000. The Project currently includes 30 Regional Task Forces and over 45 satellite programs, throughout the United States. What Can Hotlines Do? Hotlines can play a vital role in protecting children in cyberspace through a strategy of prevention/awareness resources, training and technical assistance to law enforcement and working closely with the online industry. To provide a reporting mechanism for the public to report incidents of child sexual exploitation: On March 9, 1998, key public and private sector leaders joined with NCMEC to launch the new CyberTipline, www.cybertipline.com. The Tipline was created for parents to report incidents of suspicious or illegal Internet activity, including the distribution of child pornography online or situations involving the online enticement of children for sexual exploitation. Seven days per week, 24 hours per day, NCMEC is fully staffed to handle leads, and then distribute those leads to the appropriate law enforcement agencies. Effective that day, the FBI's Innocent Images Task Force, the Crimes Against Children Unit at FBI Headquarters, the US Customs Service CyberSmuggling Unit, and the US Postal Inspection Service have immediate access to all data received on the CyberTipline via the web. Thus, these primary federal law enforcement agencies are immediately able to receive, access and review all CyberTipline leads. The CyberTipline is also uniquely positioned to gather important data on these types of Internet crimes against children. It is the hope of NCMEC to be able to conduct in-depth analysis of trends and patterns in these types of cases in the near future. To prevent child victimization in cyberspace through aggressive prevention/education and outreach programs directed toward parents and children: NCMEC is seeking to reach into millions of homes and classrooms with positive, common sense rules for Internet safety. Through two publications, Child Safety on the Information Highway and Teen Safety on the Information Highway, NCMEC's message for parents focuses upon strong parental involvement in their children's lives, increasing parental knowledge and awareness about computers and the Internet, and the importance of parent-child communication. Likewise, NCMEC is reaching out to children with basic rules for safety on the information highway, including cautions not to give out personal information online, and not to meet someone they encounter online. A cornerstone of this effort is the National Center's ``NetSmartz'' initiative. The program goals are to: enhance a child's ability to avoid victimization, reduce the feelings of guilt and blame that are often associated with victimization, encourage children to report victimization to a trusted adult, support and enhance community education efforts and to increase communications between adults and children about online safety. To advocate help for parents through the development of technology tools and access controls: NCMEC supports efforts to provide help for parents through blocking software and access control tools like SurfWatch, Net Nanny, and similar products, enabling parents to limit areas of the Internet to which their children have access. While such tools should not be viewed as substitutes for basic parenting, nor do they prevent adult predators from going to where the children are on the Internet to seek their victims, nonetheless they are useful tools for parents to provide an extra layer of protection for their children. To target and educate those who are most at risk: Parents and teachers are often surprised to learn that young children are not the most common victims of abduction and sexual assault. In fact, twelve to seventeen year old teenagers (especially girls) are the most victimized segment of the United States population.7 A review of NCMEC data also shows that in 72% of the missing child cases involving the Internet, the victim was 15 years of age or older. In 83% of these cases, the victim has been female. As a result, the Know the Rules Campaign was launched in March 1998 as a national public service campaign targeted to girls ages 11-17. The educational messages in this campaign convey strength and are designed to leave girls with a sense of empowerment. To promote a national campaign of aggressive enforcement: NCMEC feels that the most important element of its Cyberspace Strategy is aggressive enforcement by federal, state and local law enforcement, directed against those who misuse the Internet for criminal purposes. Oftentimes, criminals misuse new technology before law enforcement acquires the tools and expertise to counter such uses. To assist law enforcement, NCMEC is involved in the two courses specifically targeting Internet crimes against children. Protecting Children Online Investigator's Course: This 4\1/2\ day course is held monthly across the United States, and was designed to enhance law enforcement's ability to investigate Internet crimes against children. Topics covered include: recognizing and identifying computer crimes against children, orientation to computer technology, conducting the investigation, legal issues, case preparation and follow-up, and resources and prevention. Protecting Children Online Unit Commander's Course: This 2\1/ 2\ day course is held monthly at NCMEC headquarters in Arlington, VA. The purpose of this training program is to provide law enforcement unit commanders with an understanding of the key management issues for the effective investigation, prosecution, intervention, and prevention of computer crimes against children. To establish relationships and work closely with the online industry: One of the exciting elements of this initiative is that the online industry is a strong partner. Leading companies including America Online, Microsoft, CompuServe, AT&T, NetCom, the Interactive Services Association, and others are providing financial support and have committed to promote the CyberTipline through their subscribers and supporters. The following are examples of some of the public/private initiatives involving NCMEC: On February 10, 1998 NCMEC joined with SurfWatch, maker of the first Internet filtering product, in a partnership to provide leads to NCMEC and its CyberTipline. SurfWatch is creating an online capability on its website for its users and customers to report child pornography or child exploitation directly to NCMEC and its CyberTipline. We are hopeful that other companies will follow this example, helping NCMEC promote the CyberTipline and provide the most direct linkage for users, so that when they encounter inappropriate or questionable material, they can easily and immediately link with NCMEC's CyberTipline and provide their information. America Online began a program with NCMEC called ``Kid Patrol,'' through which NCMEC can take images and breaking information directly to AOL users. It is our vision that this effort will become a kind of two-way communication vehicle using cyberspace. Similarly, Lycos, the search engine, has joined with NCMEC to leverage the Internet for child safety, taking images and information to Lycos' users, and making it easier for users to get to NCMEC. Thank you for the opportunity to express on concerns. As always, I hope you will view NCMEC as a resource. We stand ready to assist in any possible way. Endnotes \1\ L. Gibbons Paul, Family PC, February 16, 1999, www.zdnet.com \2\ K. Lanning, Use of Computers in the Sexual Exploitation of Children, 1999. \3\ BIND/VP's Emerging Technologies Research Group and Grunwald Associates \4\ ZDNet, 11/19/97 \5\ Pedowatch, Pedophilia on the Internet, pedowatch.org \6\ Federal Register: May 7, 1999 (Volume 64, Number 88), Page 24855-24860 \7\ Bureau of Justice Statistics Sourcebook of Criminal Justice Statistics--1996. Washington, D.C.: Office of Justice Programs, U. S. Department of Justice, pages 210-11. WHAT IS CHAT? Chat refers to an Internet application that allows two or more people to carry on a text ``conversation.'' Chat is available through: Commercial Internet service; IRC (Internet Relay Chat); and Web-based Chat Service, i.e. Yahoo Chat, etc. Internet Relay Chat: Internet ``chat'' function that enables two or more people to carry on a text ``conversation.'' IRC networks are comprised of servers around the world linked to each other. User needs IRC software on their computer to use IRC. User selects a network, server and channel. A ``real-time'' chat screen opens, allowing typed conversation between people on the same channel. Instant Messaging or IM: Software is installed on you computer. When you run the software and connect to the Internet you are ``logged on'' to the service. This gives the service the ability to notify others you are online. You are given the ability to see when selected people are online. You can then exchange real-time, or ``instant'' messages. Instant Messaging Software and Users: ICQ--73 Million Users; AOL-- 65.5 Million Users; MSN--2.8 Million Users; Tribal Voice Pow Wow--10 Million Users; Yahoo Messenger--Undisclosed; Prodigy Instant Messaging--Undisclosed (PC Week 10/11/99) Mr. Upton. Thank you, Ruben. Ms. Curtin has also come out from Washington today. Thank you. STATEMENT OF CAROLINE CURTIN Ms. Curtin. Thank you, Chairman Upton and Congressman Bass, for having me here today to testify on issues relating to child safety in the on-line environment. I just wanted to take a minute to thank Katie, in particular, for sharing your experience and your courage and your hope. It gives me a renewed vigor and effort in going back to AOL. I will certainly share your story with my colleagues, the people that work on these issues day in and day out. We know how important they are, but hearing your story renews that and reemphasizes it. So thank you. As Director of Children's Policy for AOL, I am responsible for coordinating child safety and privacy protections across the AOL properties, as well as educating parents about on-line safety and the importance of parental involvement. I am pleased to have the opportunity to describe AOL's efforts to educate our members about on-line safety, the tools and resources that we provide for our members, such as our easy-to-use parental controls, as well as our ongoing partnership with law enforcement and other stakeholders to help keep the on-line environment safe for children. AOL has played a significant role in the development of the on-line media, and we have always shared a special appreciation of its enormous potential to benefit society, especially children. Learning how to explore and understand the on-line world is an essential skill for our children in today's wired world, but we all agree that kids need and deserve special protection in this new medium. AOL recognizes that parents must have the ability to ensure to that their children can enjoy a rewarding and safe interactive experience on line. It has, therefore, been our challenge to craft rules of the road for children's on-line safety, enabling parents to protect their children while at the same time helping them to take advantage of the wonders of the on-line environment. By promoting major public education campaigns and closely cooperating with elected officials and government agencies on outreach and enforcement efforts, we have tried to offer strong, proactive leadership in every area of children's safety on line. Clearly no wall, no technology, no corporate initiative can ever take the place of an educated and involved parent. We have heard that from earlier testimony and I cannot emphasize it enough. This is why we have dedicated significant energy to providing AOL parents with the most useful information, content tools, and safety tips to help protect their kids, as well as a list of resources available for both families on AOL and the rest of the Internet. By doing so, we have tried to empower parents so they can ensure that their children's on-line experiences are the best they can be. AOL has been a leader in organizing industry efforts to educate consumers about on-line safety and is committed to continuing this leadership role. Among these efforts, AOL was a leading corporate host of the America Links Up national public education campaign, designed to give parents information to help their children have a safe, educational, and rewarding experience on line. In addition, AOL created and distributed a special video for kids called Safe Surfin' that features on-line safety tips that are presented by some of the younger generation's favorite celebrities. The video was developed in partnership with the National School Boards Association and has been introduced into schools across the country. AOL was also a key partner in forming a GetNetWise.org Web site, a resource designed to provide consumers with comprehensive on-line safety information that includes guidance from some of the major industry leaders. Finally, AOL works closely with the National Center for Missing and Exploited Children to support its mission of recovering missing children and to combat on-line exploitation of children. Since July 1997, AOL and NCMEC have maintained an on line program called ``Kid Patrol'' which helps locate abducted and missing children. AOL also helped to launch NCMEC's Cyber Tipline. In addition, AOL has developed a training video and a nationwide service of hands-on training seminars for law enforcement officers to teach their agencies how best to adapt traditional investigation and enforcement techniques to the on- line environment in order to effectively pursue and prevent cyber crime. We believe this type of cooperation with law enforcement and investigative organizations is critical to supporting AOL's on-line safety mission. In addition to our leadership in industry efforts to educate families about on-line safety, AOL devotes significant time, energy, and resources to developing tools for parents to protect their kids on line. AOL's parental controls are the foundation of our child protection package and a key offering of our subscription service. While providing kids with entertaining and educational experiences has always been an important mission for AOL, we strongly feel that it also our responsibility to help parents manage their children's on-line experiences. AOL's parental controls put the power in the hands of parents, enabling them to make informed decisions about their kids' on-line activities by selecting the appropriate level of participation for each child. Parents also have the ability to customize additional features, such as chat, E-mail, instant messaging, based on their children's on-line savvy, age, and maturity level. AOL's parental controls are server-based technology. This delivery mechanism means that the controls follow the child's screen names or E-mail address. So no matter where a child signs onto America Online, their parental controls will stay with them. In 1998, we changed our registration process on AOL to require parents when creating a screen name to actually select one of four parental controls categories. The four choices are kids only, young teen, mature teen, or general access. Only master screen names can actually create a new screen name. That is the first screen name that signs up with the AOL service. When creating a separate screen name for their child, parents can make the decision of what is right for their particular child. A kids only setting, which we recommend for children 12 and under, and there you will see actually those are the four choices that a parent is given just after creating a screen name. If you select a kids only setting, this will limit access on line to the kids only channel, which has been specially created for children 12 and under. This child will receive a customized welcome screen when they sign on to AOL and it will have content that is specifically created for kids, both by AOL and by our kids' partners such as Nickelodeon. A child using a kids only screen name can only access age- appropriate content on AOL and the rest of the Web. They interact in kids' chat rooms and message boards that are fully monitored by background-checked employees, who have been specially trained to work in these chat rooms and on the message boards. In addition, by default, kids only screen names cannot instant message or visit any Web site that has not been approved as age appropriate. A parent could decide to turn instant messaging on if they so decided. A young teen category, which is recommended for ages 13 to 15, provides more freedom than a kids only screen name, but does not provide full access to mature content and interactive features. Young teen screen names can access most AOL content and can visit Web sites that have been approved as age appropriate as well. Young teens may communicate with others through E-mail and in a range of message board and chat areas, including our Teen Channel Chats and message boards, which again are monitored by background-checked and trained employees. A mature teen setting, which is recommended for teens 16 to 17, allows older teens more freedom, but still a protected experience. Each of these category settings has a pre-selected defaults for different features such as chat, E-mail, instant messaging, and Internet access. A parent, however, can choose to customize any of these defaults within a category to ensure the experience best matches his or her child. So, for example, you could put your child on a kids only screen name, but you could choose a mature teen Web experience or you could decide that you do not want your child to chat at all, even though you selected kids only. You could decide to block all AOL chat rooms even if they were monitored. We continue to evolve our parental controls to meet consumer needs for safe, easy-to-use tools. In response to consumer request, we introduced our latest feature, the Online Timer, in the spring of 2000. This feature actually allows parents to determine how long and when their children can be on line and was among our most highly requested features. We have found that education of our members is an ongoing process. As new consumers come on line every day and as our existing customers' lives evolve, their parental controls needs may change as well. AOL members spend an average of 76 minutes on line per usage per day; so we have ample opportunity to remind parents about their choices and about on-line safety. We believe that every family should periodically review this new information, check their child's parental control settings, make sure they know their children's on-line friends, and update this information as appropriate as their child grows older and more mature. We reach our members through several key vehicles on line. We have an area called Neighborhood Watch and parental controls, of course. These are our two on-line safety information areas. These areas are always available and they are promoted at a very high level to the members. In fact, the welcome screen has a button for parental controls. We use keywords on AOL. We try to make them logical, such ``child safety,'' ``parental controls,'' ``Note to Parents,'' and ``help.'' These areas have lots of information and FAQs about how to make sure the child's experience is safe on line. In our kids areas, our Kids Only Channel, and our Teens Channel, we have on-line safety tips designed for kids and teens. They are integrated into the experience. In fact, both children and teens must pass through these safety reminders before they may enter into a chat or a message board area. Every time they go in, they see the safety tips. We also ask that our monitors in these areas remind kids if they see a child or a teen giving out personal information. The monitors have the tool to hide that in the chat. They also have the ability to gag a child or a teen or someone who is acting out in a chat room so that they are silenced or that they are actually evicted from the chat room. In the kids help area we have on-line safety tips, and we remind kids day in and day out not to give out their home address, not to give out their telephone number, or any other identifying information. We also have a special button called ``Tell AOL'' that is in the chat rooms. With one click a child or teen can notify us if they have a problem. Even though these chats and message boards are monitored, if they are in an instant message conversation, they can just go to keyword ``Tell AOL.'' These reports now go into a special queue so that the member services representatives at AOL know that it is coming from a kids area or they know it is coming from a teens area and they can respond hopefully even quicker than they would in an ordinary circumstance. To briefly summarize, AOL's commitment to families and child safety includes three elements: educating consumers about on-line safety; providing great age-appropriate content for young audiences; and offering parents easy-to-use, flexible tools to customize their child's on-line experience. Finally, it bears repeating that at the end of the day, there is no substitute for parental involvement. Raising consumer awareness about parental controls, choices, and on- line safety is a collaborative effort. AOL believes that the industry and we have made great strides in this arena and are on the right path and continue to do so. We look forward to working closely with you on this important issue. Thank you again for this opportunity and I would be happy to answer any questions later. [The prepared statement of Caroline Curtin follows:] Prepared Statement of Caroline Curtin, Director, Children's Policy, America Online, Inc. Chairman Upton and Members of the Subcommittee, thank you for inviting me to testify before you today on issues relating to child safety in the online environment. As Director of Children's Policy for AOL, I am responsible for coordinating child safety and privacy protections across the AOL Inc. properties, as well as educating parents about online safety and the importance of parental involvement. I am pleased to have the opportunity to describe AOL's efforts to educate our members about online safety, the tools and resources we provide for our members--such as our easy-to-use, powerful Parental Controls--as well as our ongoing partnership with law enforcement and other stakeholders to help keep the online environment safe for children. AOL has played a significant role in the development of the online medium and we have always shared a special appreciation of its enormous potential to benefit society especially children. Learning how to explore and understand the online world is an essential skill for our children in today's wired world, but we all agree that kids need and deserve special protection in this new medium. AOL recognizes that parents must have the ability to ensure that their children can enjoy a rewarding and safe interactive experience online. It has therefore been our challenge to craft rules of the road for children's online safety, enabling parents to protect their children while at the same time helping them take advantage of the wonders of the online environment. By promoting major public education campaigns and closely cooperating with elected officials and government agencies on outreach and enforcement efforts, we have tried to offer strong proactive leadership in every area of children's safety online. In some ways even more important than those efforts, however, has been our commitment to providing our member families with the resources and tools they need to make informed decisions. No law, no technology, no corporate initiative can ever take the place of an educated and involved parent when it comes to their children's online safety. That's why we've dedicated significant energy to providing AOL parents with the most useful information, content, tools and safety tips to help protect their children, as well as a list of the resources available for families both on AOL and the Internet. By doing so, we've tried to empower parents so they can ensure that their children's online experience is the best it can be. INDUSTRY EFFORTS TO EDUCATE THE PUBLIC We have always believed that the industry must lead the charge in giving parents the tools they need to protect their children online. AOL has been a leader in organizing industry efforts to educate consumers about online safety and is committed to continuing this leadership role. Among those efforts, AOL was a leading corporate host of the America Links Up national public education campaign, designed to give parents information to help their children have a safe, educational and rewarding experience online. In addition, AOL created and distributed a special video for kids-- called Safe Surfin'--that features online safety tips presented by some of the younger generation's favorite celebrities. This video was developed in partnership with the National School Boards Association and has been introduced into schools across the country. Furthermore, AOL, in conjunction with the American Library Association, launched the Internet Driver's Ed program. This program is a traveling Internet education and safety class for children and parents, hosted in children's museums and other prominent venues in major cities nationwide. AOL was also a key partner in forming the GetNetWise.org website--a resource designed to provide consumers with comprehensive online safety information that includes guidance from some of the major industry leaders, such as AOL.com, the AOL subscription service, and Netscape. Finally, AOL works closely with the National Center for Missing and Exploited Children (NCMEC) to support its mission of recovering missing children and to combat online exploitation of children. Since July 1997, AOL and NCMEC have maintained an online program called ``Kid Patrol'' which helps locate abducted and missing children. AOL also helped to launch NCMEC's Cyber Tipline and has participated in an ongoing partnership to operate this service. In addition, AOL has helped develop a training video and a nationwide service of hands-on training seminars for law enforcement officers to teach their agencies how best to adapt traditional investigation and enforcement techniques to the online environment in order to effectively pursue and prevent cybercrime. We believe this type of cooperation with law enforcement and investigative organizations is critical to supporting AOL's online safety mission. TOOLS AND RESOURCES FOR AOL MEMBERS In addition to our leadership in industry efforts to educate families about online safety, AOL devotes significant resources to developing tools and resources for our own members to protect their children in the online environment. a. AOL's Parental Controls AOL's Parental Controls are the foundation of our child protection package and a key offering of our subscription service. While providing kids with entertaining and educational experiences has always been an important mission for AOL, we strongly feel that it is also our responsibility to help parents manage their child's online experiences. AOL's Parental Controls put the power in the hands of parents, enabling them to make informed decisions about their kids' online activities by selecting the appropriate level of participation for each child. Parents also have the ability to customize additional features such as chat, e-mail and Internet access based on their children's online savvy and maturity. AOL's Parental Controls are a serverbased technology. This delivery mechanism allows us to provide the most secure experience to our members because the Parental Controls settings are actually attached to the child's individual screen name. No matter where that child signs online from home, school or a friend's house, the Parental Controls follow with the child's screen name. In 1998, we changed our registration process to require parents to set Parental Controls for each screen name upon screen name creation. When we integrated Parental Controls into the Create A Screen Name process; we saw a dramatic increase in adoption as a result. There are up to 7 screen names available on one AOL account, enabling even larger families to give each child in the household his or her own screen name with customized Parental Control settings. Only ``Master'' screen names controlled by the parents can create a new screen name or set or change Parental Control settings. When creating a separate screen name for their child, parents are given the opportunity to choose one of three different standard age ``category'' settings: Kids Only, Young Teens, or Mature Teens. A Kids Only setting (recommended for 12 and under) restricts children to the Kids Only Channel, which has been specially created and programmed for children 12 and under. The child also receives a customized Welcome Screen. A child using a Kids Only screen name can access ageappropriate content on AOL and the Web and interact with others online through email and in special supervised kids' message boards and chat areas, but is blocked from taking part in general audience chat rooms and message boards on AOL, sending or receiving Instant Messages and visiting any Web site that has not been approved as ageappropriate. A Young Teen (recommended for ages 13 15) category provides more freedom than a Kids Only screen name, but does not provide full access to more mature content and interactive features. The Teens also receive a customized Welcome Screen. Young Teen screen names can access most AOL content, and can visit Web sites that have been approved as age appropriate. They may communicate with others online through email and in a range of message board and chat areas, Including Teen chats and message boards that are monitored by background employees. Teens are restricted, however, from accessing newsgroups, visiting inappropriate Web sites, or taking part in private chat rooms. A Mature Teen (recommended for ages 1617) setting allows older teens the most freedom of any of the Parental Controls categories. Mature Teen screen names can access all content on AOL and the Web except sites that have been classified for an adult (18 plus) audience. They can locate others and communicate online through Instant Messaging, all chat areas, email, private messaging and AOL's Member Directory. Each of these category settings has a preselected set of ``defaults'' for different features such as chat, email, Instant Messages and Internet access. A parent can choose to customize any of these defaults within a category to ensure the experience best matches his or her child so even on a Kids Only screen name (our most conservative), a parent may choose to further limit access to email to an ``approved'' list, or, alternately, may decide that the child is mature enough to participate in Instant Message conversations. A parent may choose to modify their child's access to content (Web, newsgroups, file downloads) or way to communicate with others online (e-mail, Instant messages, chat). For example, if you don't want your child to chat, you can customize Parental Controls and block all AOL Chat or you can choose only monitored AOL Chat. We continue to evolve our Parental Controls to meet consumer needs for safe, easy-to-use tools. In response to consumer request, we introduced our latest feature, the Online Timer, in the spring of 2000. This feature allows parents to determine how long and when their children can be online, and was among our most highly requested features. b. Educational Tools and Member Outreach We have found that education of our members is an ongoing process. As new consumers come online every day and as our existing customers' lives evolve, their parental controls needs may change as well. AOL members spend an average of 76 minutes online per usage day (Source: Media Metrix March 2002) so we have ample opportunity to remind parents about their choices, and about online safety. This is important not only for new members to our service, but for existing parents as well. We believe that every family should periodically review new information, check their child's Parental Controls settings and update them as appropriate for that child's age and maturity. Also important, we have worked to quickly and effectively notify our members of significant news and developments in the area of children's safety, like the Children's Online Privacy Protection Act or new Parental Controls offerings that may impact their family's online safety decisions. We reach our members through several key vehicles online. Neighborhood Watch and Parental Controls are our central ``online safety'' information areas. These areas are always available online to our members through easy-to-find mechanisms including: 1. Keywords: We use logical ``keywords'' such as ``child safety,'' ``Parental Controls,'' ``safety,'' ``Note to Parents,'' and ``help'' to lead our members to online education areas about child safety and privacy. Online safety for kids is a topic in our AOL Help AZ area. And we educate our newer members about keyword use early on, through Welcome Screen promotion of our Member Benefits Area. 2. Prominent Placement: Parental Controls is an icon on the Welcome Screen of our service which every member passes through each and every time they sign online. Additionally, Parental Controls are integrated into our Create A Screen Name process. 3. Kids Only & Teens Channels Reminders: Both our Kids Only Channel, directed to children 12 and under, and our Teens Channel, created for younger teens 13 to 15, have online safety tips integrated into the experience. In fact, kids and teens must pass through these safety reminders before entering interactive chat and message board areas. In the ``Kids Help'' area, AOL's ``Online Safety Tips'' remind children not to give out their home address or other identifying information to anyone online and to notify AOL and their parents if they encounter anybody that make that makes them feel uncomfortable or unsafe. There is a special ``Tell AOL'' feature that children can use to alert AOL of any such concerns. An essential part of AOL's commitment to families, of course, is to provide great content for children. The AOL Service reaches over 3 million children ages 211 (Source: Media Metrics, March 2002). For almost 10 years now, AOL's Kids Only Channel has been delivering fun, engaging and educational programming to children 12 and under. In addition, all Kids Only chat rooms and message boards are monitored by background checked and specially trained AOL employees. And Yahoo! Internet Life Magazine's 2001 awarded the Kids Only Channel the ``Best Kids Community'' for ``kid-friendly games, chat and homework helpers.'' CONCLUSION To briefly summarize, AOL's commitment to families and child safety includes three key elements: Educating consumers about online child safety, including our collaborative efforts with other companies in the industry; providing great age appropriate content for young audiences; and offering parents easy-to-use, flexible tools to customize their children's online experience. We are constantly enhancing our offerings to families and work closely with others in the industry to finetune our technological tools so that they are the most up to date and effective. Filtering, rating and labeling technologies are essential parts of the toolkit that can be used to protect children on the Internet. Finally, it bears repeating that there is no substitute for parental involvement online. Raising consumer awareness about parental controls, choices and child online safety is a collaborative effort. AOL believes that the industry and we have made great strides in this arena and are on the right path to continue doing so. We look forward to working closely with you on this important issue. Thank you again for this opportunity; I would be happy to answer any questions that you may have. Mr. Upton. Thank you very much. Kathleen Tucker. STATEMENT OF KATHLEEN TUCKER Ms. Tucker. Thank you. Good afternoon. My name is Kathleen Tucker. Thank you, Chairman Upton, for inviting me to testify today on behalf of I-SAFE America, a nonprofit Internet safety education foundation, and on behalf of our children who are at risk of predation upon on the Internet. Predatory acts against children are among the most heinous of crimes that are perpetrated within our society today. With the technological advancement in Web tools that allow even the youngest of our children access to the Internet, a universal paradigm shift has occurred in the methods and means that are available to child predators as they stalk their prey. And as such, we need a universal paradigm shift to occur in the preventative tactics that we employ in an effort to keep our children safe. I have had the opportunity to listen today to all of the other people who have testified before me, and I believe that the testimony that I offer will be complementary to that. I agree that parental supervision is key. I agree that law enforcement and the judicial process is key. We also must be able to bring education as a tool, as a method of empowerment to those kids much in the same way that, as you spoke before, you do not just hand them the keys to the car and tell them to go drive. We do not hand them the keys to the information and access on the Internet. Parents provide education and also we send them to school, where they are provided with education on driver's ed. or on gun safety, and then they are handed the tools with which to pursue those interests. Chat rooms are among one of those technological advancements. Chat rooms, in and of themselves, are not inherently good or evil. They are electronically enabled methods for communication. Unfortunately, one participant may use that method of communication to gain information about another participant for purposes of exploitation or entrapment. There is no one solution for protecting our children. We need a well-balanced approach that attacks the child predation problem from a multiplicity of angles: education, economics, legal, and technical. With respect to the value of education within this equation, I refer to a recently published study by the National Research Council and the committee to study tools on protecting kids against pornography and other inappropriate Internet content. This study noted that an essential element for protecting children from inappropriate material on the Internet, and one largely ignored in this present debate, is the promotion of social and educational strategies that teach children--excuse me for just a moment. Mr. Upton. Thank you, again, to the Mattawon folks for coming. Thank you. Ms. Tucker. Thank you, Chairman Upton, for that short break. Mr. Upton. They have got buses to catch. Ms. Tucker. I understand. Mr. Upton. It is great that they could be here. Ms. Tucker. I thought I would give us all just a moment to let them file out and then I can continue. Thank you again. With respect to the value of education within this equation, I refer to this study. An essential element of protecting children from inappropriate material on the Internet and one largely ignored in the present debate are social and educational strategies that teach children to make wise choices and to take control of their on-line experience: who they meet, to whom they talk, where they go, what they do, and what they do. Children need to acquire skills that will allow them to evaluate independently the information and images that they are viewing. By improving children's information and media literacy, they are better able to critically analyze those messages and images that they see and to be able to interpret underlying messages. Children should be educated in Internet safety much as they are taught about their physical safety. This might include teaching them how sexual predators and hate group recruiters approach these young people on line. They need to be able to recognize jargon that signals inappropriate material and whether to provide personal information. To guide parents, public service announcements and media campaigns can help educate them about the nature and the extent of the dangers of the Internet and the need for safety measures. Many of our parents, many of the children's parents are not technically informed. They also need to be educated. Just as our previous witnesses before have stated that they provide education with AOL on line, our parent here who has come forward to say that parents should be involved with their children, absolutely, and we need to get those educational messages out to the parents as well. In conclusion, the value of empowering our children with the knowledge and critical thinking skills that they need to be able to independently assess the everyday situations that they will encounter while on line alone, without parents' supervision, they must have these through education. The children themselves must be able to effectively protect themselves against cyber predators. They must be able to recognize potentially harmful and inappropriate actions, to actively disengage from negative behaviors and compromising situations, and to seek help when they are threatened. These lessons are learned. Education and empowerment are key. Chairman Upton and Congressman Bass and other Members of Congress, you face a daunting task in initiating protective measures for our children, and you are to be applauded in this effort. In I-SAFE America, we do offer our education programs and our outreach campaigns as one tool to be used with the many other tools that are available as you craft your solution. Thank you for your concern, and thank you for your attention. [The prepared statement of Kathleen Tucker follows:] Prepared Statement of Kathleen Tucker, Director, Curriculum Development & Implementation, I-Safe America, Inc. Thank you, Chairman Upton, for inviting me to testify before the House Subcommittee on Telecommunications and the Internet at the hearing entitled Chatting On-Line: A Dangerous Proposition for Children. As you requested, my testimony will focus on the dangers of Internet chat rooms to children and ways to educate parents and children about how to avoid such dangers. Predatory acts against our children are among the most heinous of crimes perpetrated within our society. Historically, communities as a collective take deliberate and specific actions to protect their children in an effort to prevent these heinous acts. These protective actions include: education--teaching children to be wary of strangers, to recognize and avoid dangerous situations, to cry for help when they feel threatened; parental supervision--participation by parents in children's activities and the monitoring of the child's friends; preventative tactics--adult supervision at events when children are away from home; physical barriers--locking the doors at home, barring uninvited persons from access to schools and special events, keeping objectionable (pornographic) material in physical locations out of the reach of children; and, law enforcement intervention--prevention programs for students and the determent, apprehension, detention, and incarceration of persons known to prey upon our children. With the technological advancements in web tools that allow even the youngest of children access to the Internet, a universal, paradigm shift has occurred in the methods and means available to child predators in pursuit of their prey; and, as such, a universal, paradigm shift must occur in the preventative tactics that we employ in our efforts to protect our children against these predators. The content of my testimony today will address the ramifications of this universal shift, the dangers faced by our children as they explore the wonders of the Internet and as they interact in online Chat Rooms, the role of education and the need to empower our children in order to minimize the number of predatory acts predicated against them, and the criticality of a well-balanced approach that attacks the child- predation problem from a multiplicity of angles: education (children, parents, & the community), law enforcement, legal, and technical. Let me begin by addressing specific examples of how dramatically the protective actions that have been employed historically have been impacted by this technologically-enabled, Internet-driven, paradigm shift. 1) Education. Parents teach children to be wary of strangers on the street, in public places, and at the front door; but now, the strangers that these children meet--are not on the street--they are in cyberspace. And, to the detriment of the parents, many of their children are more ``Net'' savvy than either parent. This inequality of knowledge hinders parents in their abilities to address cyber safety issues and to properly instruct their children about the dangers of meeting strangers online. Historically, when parents taught their children to recognize and avoid dangerous situations, those situations were based on tangible, physical elements within their community. Now, danger lies in an amorphous cyber-world cloaked in the allusion of anonymity. 2) Parental Supervision. Many of our children's activities have dramatically shifted from participatory activities (easily supervised by a parent and often enjoyable to watch) to solitary activities-- engaged through the computer keyboard or joystick--that do not lend themselves to easy supervision nor enjoyment by a non-participant (such as a parent). Children may spend hours playing solitary games online, or they may play in tandem with their cyber friends, or they may even play with total strangers they connect with online in an Internet gaming community. The Internet--and more specifically the advent of the Chat Room-- has broadened a child's ability to meet other people and acquire ``friends.'' Historically, children made friends at school, through family acquaintances, and from participating in community organizations. A child is no longer confined to the local community from which to socialize and gain friends; literally, cyberspace eliminates all geographical barriers and frees a child to roam the world in search of that one, special ``friend.'' Predators are also free to roam. The degree of difficulty for parents to monitor--or to simply meet--their child's friends has increased tremendously. 3) Preventative Tactics. A commonly employed tactic for protecting our children is to provide an adult chaperone as our children explore outside of their community. Now, children explore the wonders of the world by transporting themselves through cyberspace. They can travel to the brightest, most intellectual domains of the universe and, conversely, they may travel to the darkest, most detestable realms of the human imagination; and, they travel this world alone, without the care and protection of a chaperone. 4) Physical Barriers. Historically, parents routinely lock their doors at home each night to keep intruders out; schools monitor persons who enter the campus; and objectionable (pornographic) material is distributed from adult-only sections in local businesses. Presently, parents continue to lock their doors, but, their children inadvertently invite the pedophile into their bedrooms through a chat room conversation or via email. Gone are the days when predators have to search for unlocked doors or open windows. Gone to are the days with the child predator had to troll the schools or neighborhood playground to find a child that is isolated, or lonely, or bored; all the predator has to do now is to troll the Internet. There are innumerable, vulnerable children who are isolated, and lonely, and bored who constantly search the Internet for other children with whom they can make friends and chat. As these children search the web for friends so too the predator searches the web for prey. The predator will find the child, the child will find a ``friend,' and the outcome will be devastating. The effectiveness of currently employed physical barriers has been severely compromised. Predators lure and seduce their victims from within the privacy of the victim's own home. Pornography intrudes into a person's private email and appears on the screen when a child inadvertently selects a pornographic website while conducting research for a homework assignment. Predators, pornographers, pedophiles, operate in a world that is no longer constrained by physical limitations or geographical barriers; they stalk their prey through cyberspace and routinely visit their prey as invited, virtual guests into the home of their next victim. 5) Law Enforcement Intervention. As Internet use continues to grow, so will the number of cyber criminals. These criminals are sexual predators, pornographers, hackers, and thieves. They target and then victimize innocent people--especially our youth and our elderly--via this electronic highway. Crimes vary from theft of credit card information or personal identities to solicitation of sexual acts, stalking, hacking, and trafficking in child pornography. Many of the crimes are new (computer hacking for example) while other crimes, such as child predation, have haunted law enforcement officers for centuries. Regardless of the nature of the crime, the criminal's method of attack--via the Internet--is relatively new; the Internet has changed the rules of the game. Given that the methods and means employed by predators in their victimization of our children have changed, so must the tools and techniques employed by law enforcement in the pursuit and apprehension of these predators. Law enforcement must be allowed to leverage the same technological advances that the criminal element uses. Without these advanced tools--law enforcement is handicapped. And, given that the methods and means employed by predators have changed, new community prevention programs that are taught by law enforcement must be developed to inform and advise our citizenry of new protective measures. The ramifications of this universal, paradigm shift are staggering. If taken as a whole they can be overwhelming, perhaps paralyzing; but-- if ignored--the ramifications will be devastating to our youth. To approach any entity of this magnitude and to effect change it is advisable to search for a common element, theme, or component against which a focused solution may be enjoined. One common and persistent theme, that has tentacles into every aspect of the aforementioned points, is the chat room. Today, I will focus on the dangers that unsuspecting children and youth may face while engaged within a chat room and the subsequent dangers they may face as a result of their activities in a chat room. This focus, this perspective, is for the purpose of this testimony only and is not intended to discount any of the benefits that may be gained through dialog among participants within a chat room nor is it intended to discount the benefits that can be gained through the healthy exchange of ideas and information. Chat rooms are not inherently good or evil; they are electronically-enabled methods of communication that, unfortunately, can be used by one participant to gain information about another participant for purposes of exploitation or entrapment. As defined in The American Heritage' Dictionary of the English Language, Fourth Edition, Copyright 2000 by Houghton Mifflin Company, a chat room is: ``A site on a computer network where online conversations are held in real time by a number of users.'' How does this seemingly innocuous entity, a chat room, play a major, insidious role in the entrapment and exploitation of our youth? Let's explore the answer to this question by overlaying the influence of the chat room on our new cyber paradigm. A chat room is a smorgasbord; it is: a town centre--a meeting place for debate; a coffee shop--a place for chat and banter; a celebrity hangout--where people can chat with their favorite musician or star; a club--where like- minded persons discuss common interests; a playground--where kids hang out with their friends; and, an unprecedented opportunity--where persons from anywhere in the world can gravitate to meet new ``friends,'' exchange ideas, and communicate. Children participate in chat rooms every day so that they exchange ideas and information, they can hang out with their ``friends'' and they can actively search for new friends. Last week, as I taught an Internet Safety class to a group of 6th graders, I posed the question: ``Do any of you have a cyber friend that you met online that you never knew before?'' Several of the students raised their hands. I asked one young girl to tell the class about her ``friend.'' She said that she was bored and lonely so she went online into several chat rooms specifically looking to find a friend. She said that she found one and they quickly discovered that they had a lot in common. I asked her what they chat about. She replied: ``Everything.'' She said they talk about family, sisters, brothers, parents, pets, school, where they live . . . Literally, the hairs on the back of my neck were standing on end. I asked her how she could trust a stranger with so much information. She said that she doesn't feel like this is a stranger, this is her friend, and she ``knows'' that her friend is a child--not an adult--because her friend ``knows too much about things my age--and there's no way that my friend is an adult pretending to be a kid--it's just not possible.'' This child is a cyber-savvy pedophile's dream-come-true. The paradigm and the chat room: 1) Education. Parents teach their children to be wary of strangers; but, children don't view their online ``friends'' in the same way as they view a stranger on the street. They haven't made the tangible association between their physical world and the cyber world. In their own mind they envision what they believe their friend ``looks'' like, and no child is going to envision their cyber friend as old or threatening. 2) Education. Children are taught to recognize and avoid dangerous situations. They recognize places within their physical community as potentially dangerous but have not learned to recognize the potential for danger within the chat room. 3) Parental Supervision & Preventative Tactics. Children rarely ``travel'' with their parents or a chaperone to many of the chat rooms where they hang out. Without education to raise their awareness and to empower them to recognize the danger of being alone in a room full of strangers, these children are at risk for exploitation. In July 2000, The Journal of the American Medical Association, in cooperation with a survey that was conducted by the University of New Hampshire's Crimes Against Children Research Center, published a ``Call to Action Report'' in which it reported that girls, older teens, troubled youth, frequent Internet users, chat room participants and those who communicate with strangers online are at the greatest risk. The study also confirmed that children often don't understand the risks associated with talking to strangers online (David Finkelhor, Director of the University of New Hampshire's Crimes Against Children Research Center). 4) Physical Barriers. Chat rooms eliminate the physical and geographical barriers that used to provide a modicum of protection to our children from the predatory elements of our society. Pedophiles now roam the world, without limitations, in pursuit of their next victim. A case in point is the recent seduction of a 13 year-old girl in Katy, Texas who was lured from her home by a 34 year-old pedophile--who she met in a chat room--to his apartment in Tacoma, Washington. This sexual predator allegedly exchanged pornography with his victim over the Internet, arranged transportation to take her from Katy, TX to Tacoma, WA, and raped her over a five day period of time. 5) Law Enforcement Intervention. Chat rooms pose special challenges for law enforcement as well. These hunting grounds for child predators are now the patrol beats for specialized officers in pursuit of these criminals. Technology has wrought dramatic change for both the offender and the officer. Up to this point in my testimony, I have provided insight into the incredible, paradigm shift that has occurred in our society and how this new paradigm directly affects the safety of our children. To exemplify the critical points, I mapped the ramifications of this paradigm shift to a common element in cyberspace: the chat room. The remainder of my testimony will focus on potential solutions that we as a society may embrace in an effort to combat the clear and present dangers that our children face as they explore the farthest reaches of cyberspace, as they interact, virtually, with persons throughout the world, and as they evolve as ``Net'' citizens. As Judith F. Krug, Director of the American Library Association's Office for Intellectual Freedom, stated in her testimony before the COPA Commission on August 3, 2000: ``The children of today will be Net citizens for the rest of their lives. They need to be taught the skills to cope in the virtual world just as they are taught skills to cope in the physical world. Children should be educated in appropriate increments and appropriate settings on how to avoid inappropriate Internet content, to report illegal or unsafe behavior and to engage in safe interaction online. Children who are not taught these skills are not only in danger as children in a virtual world, they also will grow into young adults, college students and an American workforce who are not capable of avoiding online fraud, Internet addictions and online stalking.'' Our children now live in two diverse worlds: their physical world and the world of cyberspace. As such, they essentially live in two cultures that often conflict. To date, many of the lessons learned in the physical world don't seem relevant in cyberspace as these children reach out to strangers as friends. This paradigm shift demands new, innovative educational programs for our children, their parents, and the community. It is essential that children, as they travel their world of cyberspace alone, be provided with the knowledge they need: to independently recognize and avoid dangerous situations online; to actively engage learned, proactive techniques to more safely interact with strangers online; to critically appraise situations in which they find themselves; and, to react appropriately when they find themselves in uncomfortable, compromising, or threatening situations. According to a press release on May 2, 2002 published by the NATIONAL RESEARCH COUNCIL, Division on Engineering and Physical Sciences Computer Science and Telecommunications Board and the INSTITUTE OF MEDICINE, Board on Children, Youth, and Families regarding the findings of the Committee to Study Tools and Strategies for Protecting Kids from Pornography and Their Applicability to Other Inappropriate Internet Content (chaired by Richard Thornburgh): An essential element of protecting children from inappropriate material on the Internet--and one largely ignored in the present debate--is the promotion of social and educational strategies that teach children to make wise choices about using the Internet and to take control of their online experiences: where they go, what they see, to whom they talk, and what they do. Children also need to acquire skills that will allow them to evaluate independently the information and images they are viewing. By improving children's ``information and media literacy,'' they are better able to critically assess material, recognize underlying messages, and locate the information they seek. Children should be educated in Internet safety much as they are taught about their physical safety, the report says. This might include teaching them how sexual predators and hate-group recruiters typically approach young people online, how to recognize jargon that signals inappropriate material, and whether to provide personal information. To guide adults, public service announcements and media campaigns could help educate them about the nature and extent of dangers on the Internet and the need for safety measures. Education is a critical and essential component in combating the threat of child predation via the Internet; but, it is only one element of the solution. To stem the online predation of our children, it is essential that a multiplicity of elements be collectively engaged as part of an overarching solution: education (children, parents, & the community), law enforcement, legal, and technical. According to the National Academies' National Research Council report noted previously (this report is available in its entirety online at www.nap.edu/books/0309082749/html): No single approach-- technical, legal, economic, or educational--will be sufficient to protect children from online pornography. I believe this statement can be extended to include all aspects of predatory acts perpetrated against children online. The report goes on to describe the need for social and educational strategies, technology-based tools, and legal and regulatory approaches that can be mixed and adapted to fit different communities' circumstances. There are many technology-based tools that are currently employed in an effort to protect children from exposure to offensive or pornographic material online. These tools include filtering and the blocking of websites that may potentially contain offensive materials. A heated debate surrounds the use of filtering and the constitutionality of these and other similar tools. With respect to my testimony and the use of technology to provide increased safety, I will recognize that filtering is one of a set of tools available and I will focus my testimony on a different technology-based tool that may potentially prove to be a powerful enabler to the managers of chat rooms for attaining ``best effort'' policies and procedures for protecting children who frequent their chat rooms: digital certificates. Currently, both businesses and governmental agencies have begun to embrace digital certificate technology as an electronic means for identifying participants in transactions that occur online. They leverage this technology as a method for verifying and authenticating a person's electronic identity. The simplest way to view a digital certificate is as an electronic ID card. However, digital certificate technology is far from simple; but, given that the intent of this testimony is to identify and express how technology can be used, rather than to define the intricacies of the technology, I will refer to digital certificate technology in the simplest terms possible for the reader to understand. For anyone interested in garnering a more in- depth view of digital certificates and digital signatures you may want to visit the American Bar Association, Section of Science and Technology, Information Security Committee website to review the document Digital Signature Guidelines Tutorial (www.abanet.org/scitech/ ec/isc/dsg-tutorial.html). Digital certificates are issued by a certification authority. A certification authority can issue various levels of digital certificates that are dependent upon the amount of authentication that is required to ensure that the person who is applying for the digital certificate is in fact the person that he or she claims to be. In other words, to obtain a digital certificate a person must present proof of identity and the ``level'' of the certificate obtained depends upon the amount of proof required. Example: Acme Certification Authority Level 1 certificate--any photo ID required Level 2 certificate--government issued photo ID required Level 3 certificate--government issued photo ID required plus passport or birth certificate Level 4 certificate--all requirements of Level 3 plus a background check Level 5 certificate--DNA How could digital certificate technology increase the safety of children who frequent a particular chat room? A public- or private-sector chat room provider could engage digital certificate technology as a means for permitting or denying access to any given chat room. Conceivably, a chat room provider could institute a policy that only children under the age of 13 are allowed to participate in a particular chat room. The intent of this policy is to provide a safer online environment by making their ``best effort'' at excluding adults and potential pedophiles from the chat room. To enforce the ``under the age of 13'' policy, the chat provider would require all participants to login using a Level 3 digital certificate. Through the use of the digital certificate and the chat provider's policy of restricting access, the children participating in this chat room have a lessened degree of risk than those children that participate in unrestricted chat rooms. This technology exists. We currently use it to execute online financial transactions. Businesses use this technology to protect their monetary assets; perhaps, we should explore how it can be used to protect our most precious asset: our children. Protecting our children is at the very heart of this hearing. Thank you, Chairman Upton, for inviting me to testify before the Subcommittee on Telecommunications and the Internet. In my testimony, today, I addressed the paradigm shift that has occurred within our society due the advancements in web technologies and the advent of chat rooms; exposed the dangers our children face online and the difficulties faced by parents in protecting our children; touched upon one technological approach for increasing the abilities of chat room providers to create safer chat room environments; and, most importantly addressed the importance of education in protecting our children from falling victim to online predators. In conclusion, there is no one solution for protecting our children. However, the value of empowering our children--through education--with the knowledge and critical-thinking skills that they need to be able to independently assess the every-day situations they will encounter while online cannot be overstressed. Children must be able to effectively protect themselves from cyber predators, to recognize potentially harmful or inappropriate actions, to actively disengage from negative behaviors or compromising situations, and to seek help when threatened. These lessons are learned. Education and empowerment are key. Mr. Upton. Thank you all. I know Charlie and I have a number of questions, and as I said before we started, I want to make this more of a dialog than a formal give-and-take, courtroom type scene. You know, as I think about this, obviously I think first as a dad. I have got a 10 year old and a 14 year old. I also serve on the Education Committee, and like Charlie, I probably visit schools virtually every week, all different levels, from college like here at KBCC to elementary school. And one of the things that I have been doing over the last 6, 8 months, particularly as my role as chairman of the Telecommunications and Internet Subcommittee, has been focusing on elementary school students, knowing that I have got one that is ten, and just looking at the changes in technology that he has gone through versus where my daughter was 4 years ago. And it is just an incredible change. I know two devices connected to the Internet today, talking about the explosive growth. One hundred and fifty million devices today are connected to the Internet. By 2006, it will be a billion devices worldwide connected to the Internet. So they will be in our cars, on our wrists, in our offices, our homes, you name it. And with that comes that double edged sword, and with the growth of technology, the dangers, the nightmares that are out there: Katie's story, John's story, Jim's story about what is happening here in Kalamazoo. But when you tie that to what Ruben indicated, usually perhaps as many as 30, 100 children before you get a conviction? Three hundred children per molester is about the average. I mean, I think of this gentleman this week that you are going to be pressing charges against, a 34 year old. And just think how many families. Mr. Gregart. We have 20 additional names of females that were seized from his computer that we are following up on now. Mr. Upton. That is just a pretty scary feeling. Charlie. Mr. Bass. We have heard some interesting stories and some possible solutions. As a Member of Congress, I would like to know exactly what recommendations you have or suggestions for action that we might take on the policy level. I have not heard anybody discuss that. Mr. Upton. I have just one idea first, and then I want to hear the response. You know, I wear two hats, sit both on the Education Committee, as well as on the Energy and Commerce Committee. As we look at education legislation, you know, my brother is a teacher, and we visit schools. It is so hard often to get parents involved to oversee exactly what is happening. You cannot legislate parental involvement. I know that, but I wonder what incentives we might be able to do working with our school boards, our schools at every level to make sure that parents, in fact, get a daily dose of the dangers that are out there to try and make sure that they're engaged, looking over their kids' shoulders. Do you have AOL? Mr. Bass. Me? No. Ms. Curtin. We can provide you with a disk. Mr. Upton. Yes. I think you can get them at the A&P. Ms. Curtin. That is reassuring. Mr. Bass. Again, Mr. Chairman, if I can reiterate though, we make policy, and this is a very serious and interesting problem, but precisely what suggestions do people have for us, policymakers? If you were to draft a bill, what would it say? Mr. Gregart. If Congress were to recognize that this is a public safety issue similar to automobile collisions and the mandate for airbags and crash worthy vehicles, the issue is: how far does the Federal Government want to put its hand into technology and manufacturing? But I probably would have found it helpful if there were a CD not just offering AOL for the first 1,000 hours when I bought my new computer, but a CD that was clearly marked as educational material prefatory to allowing children access to the Internet or bundle it with the software for the different programs that come with a new computer. What do I have now, AOL 7.0? Is it 7.0? Well, it started off with AOL 0, I think. And every time AOL has upgraded, I have gotten the next version. So I probably miss a lot of the new things, but when you open a new computer, if you had just a singular CD, which costs how much to burn? Not excessive, but it was clearly marked as a condition precedent for you signing onto AOL or any other ISP, just like airbags in automobiles. Ms. Tarbox. I like to tell this story because it does not take too long and because I think it relates well. I personally never thought I was going to be a victim of AIDS, and I had a speaker come to my school, and she was from the town next to me, and she was with her boyfriend, and he was cheating on her, and he gave her AIDS. She goes to Harvard, and I could see myself, and I could relate. And through that story I realized I am just as much a victim. I mean I could be just as much at risk as any other person. I think the problem is that people think if they start chatting with somebody on the Internet that their case is different. They are not the case like they just heard from mine. And people need to realize the dangers. And I think the best way to do that is to go out and educate. And I know that the government is mandating when the government provides funding for computers for schools. They should provide funding for education. Children need not to be told statistics that are going to go in one ear and out the other. They need to be told stories that they can relate to. And I think education is so key because the education is going to go with that child wherever they go, and while I think it is important that we do monitor chat rooms and whatnot, that is only going to be limited to that computer. If we give them education and the tools to be empowered on the Internet, that is going to go with them everywhere. So I think there needs to be funding for or laws that require if you are going to give them a computer in the school, then they need to know how to use it. And those dangers are out there, and there are consequences to them. Mr. Upton. Before we jump over here, let me just say, too, as I talk to my kids and students at school, peer-to-peer discussions are the very best in terms of trying to influence or trying to get your message across. And that is why, Katie, I think your story relates so well, you know, to everybody in this community, and that is why I wanted a public hearing here to help identify problems and, you know, get those stories across so that everyone here can hear exactly that. And perhaps from this there will be a lot of families that will sit down here tonight when they watch the news or read the paper or listen to the radio, conversations from the students who were here a little bit earlier, and they will just say, ``Boy, did you hear what I learned today?'' And that will open up a whole new chapter in that family's house and neighborhood and help try to spread that message. Ms. Tucker. In the education formats that we found most effective are when we do present real life stories much like Katie's, and what is important is that the children are not just frightened. You know, you do not just give them horror stories, but you give them examples, and you allow them to be able to work with those examples in peer groups in the room and come back with ways that they can empower themselves to protect themselves or to recognize what those dangers were. I listened to a young girl the other day, which scared me to death. I was teaching in a sixth grade class, and I asked all of the kids if they were involved in chat rooms, and most of all of the hands go up. And I said, ``Have you ever met a cyber friend that you never knew before?'' And this little sixth grade girl raises her hand, and I call on her, and I said, ``Well, what do you talk about?'' And she says, ``Well, everything.'' And I said, ``Well, why did you meet this friend in the first place?'' She said, ``Because I was lonely.'' And I said, ``Now, when you talk about everything, what does that mean?'' She says, ``Oh, my family, my school, my sisters, my brothers, our pets, where we live, what we do, what we like.'' And I said, ``And you trust this person?'' And she says, ``Oh, yes, I trust this person. I know it is not an adult because this person knows too much about what a sixth grader likes. No adult could ever know that.'' So what we do in these classrooms, of course, is provide examples, you know, like Katie's of how they do know or this gentleman who testified today about his daughter, you know, trusting this person. And we let them realize what a true friend is, what trust should be, and then we provide these examples so they can understand the difference and make critical decisions because they are going to make those decisions in lieu of parental supervision also. And I do not discount parental supervision whatsoever. I agree that there are many tactics that we need, and that is one of them. Mr. Upton. Caroline, before you answer, I would like you just to comment on the steps. You talked about you are able to monitor somebody's chat. Describe exactly how that works and some of the things that you have found in addition to responding to the same topic. Ms. Curtin. Oh, certainly. Well, basically in our kids only area on AOL, it is literally impossible to open a kids' chat room or go into a kids' chat room unless a host or a monitor has officially opened the chat room. The chat rooms are not open 24-seven. They are on a schedule. There is always a monitor who is identified as the monitor in the chat room, and he or she is not only there to help insure that it is a safe interaction, but also that the conversation remains relatively age appropriate. One thing that we did a year ago or so because the chat room dialogs were getting a little bit rambunctious, to keep it PG so to speak, was we instituted a stop sign before the interactive areas. I mean it is literally a red stop sign, and we say to kids and teens, you know, ``Keep it clean. Do not give out your person information. We want everybody to have a great experience, and just FYI, if you do not, we will be sending a letter or an E-mail to your parent.'' That worked really well, and what happens is if three E- mails go to the parent, we literally scramble the parent's password on AOL so that they cannot sign onto AOL without first calling in and speaking to a member services representative of AOL about what has transpired, about our guidelines in our kids and teens areas and the importance of on-line safety. So that as proven to be very effective, but I think what we are hearing over and over again is kind of a three-pronged approach, a simple equation, so to speak, for on-line safety: one being empowerment both for parents having the resources and the tools and the education, and for kids to know what to do, what to look out for. Two, education, baking it into the curriculum of the school that has Internet access; really reaching out to the kids, telling them real life stories. I would agree. I was at a middle school a few weeks ago, and I made the mistake of having a quiz, and I handed out AOL tee shirts, you know, if the kids answered the quiz correctly, and they went crazy, and I could barely get them back. I could barely get their attention back, but what stopped them was a real life story of a man that worked for a computer associate firm, and it was an on-line stalking case, and the room went silent. And that is what caught their attention, and then their hands went up, and they really wanted to know what to do to stay safe. And then the third is enforcement. And we fully support greater resources, greater education, stiffer penalties for pedophiles. So I think it really is those three Es in a nutshell. Mr. Upton. Kathleen. Ms. Tucker. I had a question along the lines of your chat rooms. Can you guarantee that a participant in a chat room is a child? Ms. Curtin. No, we cannot. There is no way for us to know that definitively without asking for someone to come and meet us in a brick and mortar setting really. But that is why we have the monitors there. That is why they are trained. They are trained to look for people that might be acting as if they are children, asking inappropriate questions. We do say that the kids and teens chat rooms are attended for kids and teens. In addition, if a parent wants to use our tools, they can really fine tune the chat experience. They can also block instant messaging entirely. They can block E-mail. If they do not want to do that, they can create an allow list of kids' friends, family members that they do feel comfortable with their children talking to and limit it that way. Mr. Upton. If you do an allow list and Johnny down the street is on there, but Johnny has got another friend, is he able to pull in somebody else or not? Ms. Curtin. He is not. Mr. Upton. It will just be a strict one. Ms. Curtin. It is a strict allowance, yes. And we also have instant messaging controls for kids or any user on AOL so that if someone is bothering them, they do not want to talk to someone anymore, they can put that person on their black list. They can also make themselves invisible so that the other person cannot have them on their buddy list and see that they are on line. Ms. Tucker. And the reason that I ask those questions, have you considered digital certificates? Ms. Curtin. We have looked at digital certificates. I think there have been great advancements in technology across the board, but we have not seen digital certificates take off to the point where we have reached critical mass so that they will really be effective, but we are hoping that they get there. Ms. Tucker. We are going to pose this just as a thought for you as you move forward. One other technical possibility for a solution is the use of digital certificates, and for those who are not familiar with digital certificates, I am going to say it very simply. They are electronic ID cards, and you get these by going to a certification authority who has different levels, but allows you to perhaps show a photo ID or even a birth certificate. If we think out of the box a little bit and we were to think about in the future issuing digital certificates for children who were at school because those certificates would be guaranteed and the fact that a child attending a school has presented a birth certificate, you know, is identifiable, and perhaps we were to use those digital certificates within chat rooms, perhaps your dot-kids domain, it may be able to help to protect the area from predators. Mr. Upton. John had a comment. Mr. Karraker. We are talking a lot about AOL. We need to recognize there are hundreds of Internet service providers, and we are not addressing the industry as a whole. It sounds like AOL has changed a lot of what they do since I last dealt with them, but I really think there should be some industry standards of what should be done by the industry on the Internet as far as monitoring chat rooms and what have you. But we also need to look at I do not hear a lot of conversation about instant messaging that says AOL's, IM, Microsoft, Yahoo. All of the rules are downloadable, free, instant messages services that nobody monitors. A child can come home to an empty computer, go on line with whatever service you may be using, download AOL as an example, have all of the IM they want to do while I am not home. Before I get home they can delete that whole thing, and I never even know they have been on the computer. I am not the technical expert to talk about it, but really it needs to be addressed within the industry with oversight to develop some type of controls on this type of stuff. We can talk all about chat room controls, but we are only addressing a small part of the problem. Mr. Upton. But, you know, as Charlie asked the question of what can we do as legislators to help, we work with the Department of Commerce and other different agencies. I wonder if there might be some code that could be established, Good Housekeeping Seal type of thing, that Internet service providers if they follow that course would be able to achieve that particular distinction as a help, whether looking first at the industry, trying to establish a code that has got some teeth in it. We both worked very hard to establish dot-kids with ICANN, you know, like we have dot-org and dot-com; have a dot-kids. The national folks, you know, a day late, a dollar short, too late. And that is why we went to a different little version of that so that it is actually dot-kids-dot-U.S., under the auspices of the Department of Commerce set up through the private sector. And my sense is that that will take off, particularly as parents learn about those sites and tell their 10 or 11 or 12 year old that they are welcome to get on the Internet, but it had darn well better be a dot-kids site and a lot of different groups then funnel in as part of that exercise. Ruben, did you want to comment on that? Mr. Rodriguez. And I agree with John that we have been talking about the industry in general, but one of the things we have not talked about is the IRC, very unregulated, global medium. You access it through your ISP on the Internet. Thousands and thousands of chat room and channels are open for communications. Many of these cases that do occur do not occur in the environment of AOL. Some of the cases we have talked about here did, but the majority of cases are happening on IRC where you do not have monitoring. You have no controls. Somebody creates a channel. Communications are done. If you got into IRC right now and you type in ``sex,'' you will probably get about 1,100 conversations going on right now in different chat rooms going in communications. That is where the pedophiles are. That is where the kids are going to look because the controls are not there. You are also talking about what can Congress do. Well, Congress has been doing a lot. I mean, give yourselves some credit here. You funded initiatives like the school resource officers training program that is similar to the DARE program, where you are empowering and educating law enforcement officers to go into the schools and talk about this. And as they did with drugs with the DARE program, now they are talking about Internet safety issues. I do agree with you that when you talk to the focus groups about kids, who will kids listen to? They will listen to their peers. We are currently doing a program called Net Smart, a proactive interaction between our Web site, chat rooms, and whatever, with kids. Kids will listen to kids. We ask them, you know, if we were going to sell this idea to you, who would you listen to. Would you listen to the Michael Jordans of the world or anybody else? They said, no, because they are getting paid, and we know they are making high dollars, but we will listen to kids, not demeaning Katie, but kids that have done this, that it has happened to them. Katie is probably one of the older people now in this group, but I mean people that have experienced it. War stories. And I do agree. The public can relate it to war stories, as policemen used to call it. Tell us a story and that way it will relate it to us. Do not give us the technical jargon or whatever, but tell us, you know, how will it affect us. What will it do to us or whatever? So Congress has been putting laws into effect to help this, and they have been empowering law enforcement officers' educational programs. I made the mistake about a year ago going to a PTR seminar where in the State of Virginia I did a presentation. And after the presentation, I had 33 invitations within about 2 weeks to go present in these schools, and there is no way one individual can do that. Educating those that are at the local level, as I said it before, and I might sound like a broken record; educating those resources that you have at the local level, your law enforcement resources, your continued relations law enforcement resources to outreach to the public, to go into the schools. At one time we thought about educating teachers, but in defense of teachers, they have so many responsibilities they have to deal with now. You have to bring people from the outside to be able to talk about these things, and I think the people that are there doing the outreach, the education are the law enforcement officers going into the schools at the local level. That I think are where the resources need to be Ms. Curtin. Just to respond to the comment about instant messaging programs and there being certain other ISPs besides AOL, we agree. We do not want to be alone in this. You know, it needs to be an industry-wide effort clearly, and there has to be strong collaboration. I mean no one person, no one company can do it on its own, and with respect to AIM, that is our free instant messaging service. We do not recommend that for children. We, in fact, have an age screening mechanism on AIM so that birth date and year is required. It is not allowed for children 12 and under. That is not foolproof if a child decides to fudge his or her age. Mr. Upton. Foolproof in my house. Ms. Curtin. Good. There are ways to get around it, of course, as there are anything. I do not think that we are ever going to, you know, be able to block or shut down all of the instant messaging programs. I think it gets back to education, again, and how kids and teens can be equipped when they are using these mechanisms because the fact is that is how kids and teens communicate these days, and that is just the reality of it. So we do have tools on AIM even for blocking people, for actually notifying us if there is a problem. You can warn someone on AIM, and if you are communicating with them, you can actually see how many warnings does this person have, which is an early indication that maybe it is not such a good person to be talking to. We also have something that we call a knock-knock feature on AIM. So if you are on AOL and someone instant messages you from AIM, a box comes up and says, ``Would you like to accept this instant message?'' It is not just all of a sudden you are talking to Horselover at AOL. So there are protections in place, but it is also a free service. So we do not have as much leverage as we do on the subscription service, where we know who the subscriber is and we have their address and we have their credit card number. If we get a report, we can really do something about it. Mr. Upton. Katie. Ms. Tarbox. Just to get back to the documents because I think that is probably a large reason why we are here today, I agree with all that we have been talking about. I do not feel that there is one solution. But when I first heard about the dot-kids bill, I was kind of hesitant because I thought, you know, this is not the answer. They need to do something more. But then as I started to think about it, and I am lucky enough to be able to take courses at the Edinburgh Public Policy Center at the University of Pennsylvania in Philadelphia, and anyone who knows media communication, these are probably some of the leading professors and researchers. And speaking with my professor, who is a specialist actually in the Internet safety for kids and other Internet related issues, and I think that it is important that this legislation outlines that the content on these Web sites, specifically dot-kids, is going to be appropriate because this will be most children's introduction to the Internet. Most parents will probably put on their Internet filtering software and allow it to be just in the dot-kids area, and so, therefore, I think it is important that the legislation clearly lays out, you know, what kind of Web sites are going to be allowed and so that kids learn that the Internet is for information, for doing homework, for communicating with people that they already know, and looking at it like that, and not having the introduction like I had where it is like a bar. You go to meet people. Mr. Upton. That is exactly what the intent is on the dot- kids, to do exactly what you just described, and it is going to be the introduction, and they will learn a whole number of skills, and as they mature, they can still stay on it. They will obviously be able to select other sites as well. I want to come back, Caroline, just to ask: how hard is it for folks to somehow disengage? My 10 year old is very responsible, a proud dad. He is not going to do that. Or he will lose a lot of privileges. But how hard is it for someone to go around and, in essence, hack into the sites that you have otherwise thought you have blocked off from your son or daughter? Ms. Curtin. On AOL it is very difficult, and that is because it is a server based technology. So that as I referenced earlier literally the screen name for your child is attached to the parental controls. So as we do see more and more devices, palms, and blackberries and AOL TV and all of these different ways that you can access the medium from home or away from home, no matter where you are, if you as a parent have applied parental controls to that screen name, they will always be in effect. But no system is perfect. Let me say that. No system is 100 percent infallible 100 percent of the time, but these are pretty close. Mr. Upton. Jim? Mr. Gregart. By lack of fallibility, do you mean that if I were to buy a new account as an adult with a credit card and then sign up my fictitious children with parental controls attached to them, then that you would not know that if I went in under one of the names of my disguised, alias, fictitious children that, in fact, I was not a 60 year old? Ms. Curtin. We would not know that. When a parent or anyone creates a screen name, we do not ask how old is the person you are creating this screen name for Mr. Gregart. So you would know what age level I had set it at. So there would be sort of a predisposition that, you know, Goofy Jimmy or whatever my key name is---- Ms. Curtin. Actually we would know on the back end, but let's say that you went into one of our kids only chat rooms or the teens chat rooms and you had a parentally controlled screen name. We would not know that just on the surface of things, and no one else would either. And one of the things that we have tried to do is really make sure that in our kids environment, our kids channel and our teens channel, it does not matter if you are on a parentally controlled screen name or not. We have the same policies for safety and content in place because not every parent is going to choose to apply parental controls. Mr. Upton. But if somehow you went to the digital ID and then it got some universal acceptance, then, in fact, Crazy Jimmy would not be able to get his password, right? Ms. Curtin. That is correct. Mr. Bass. You can prosecute under Michigan law, and this is technically within the jurisdiction of this subcommittee, but are there any Federal initiatives that you think ought to be undertaken in the area of criminal justice? Mr. Upton. And as you answer that question, you 34 year old that you are going to proceed with charges from last week, I think you indicated that assuming that he is convicted, he is eligible for up to 35 years. Katie's story, interstate, I mean, all of these different things, 18 months. I mean, did the laws change? Did they just have bad prosecutors? What is the deal? Mr. Gregart. Well, Michigan's law is rather new. It provides 20 years for using the Internet to commit a felony, and that can be consecutive to the underlying felony, which in our case would be 15 years. So you get in Michigan what is called stat time or consecutive. In other words, you do the 15, and then it is up to the judge's discretion to put 20 on top of that. That is pretty severe, and I support it. Ms. Tarbox. In my case he was sentenced in 1998. So there were no precedents about other sentencings. It was a Federal law, and part of the problem is, as I have spoken to other district attorneys or U.S. attorneys, in Frank's case, he was a very wealthy, put together man, and if you meet him, if he came in here, he is very charismatic, and a lot of judges look at these people and think he cannot be that bad, and they have given rather light sentencing, especially because there is a stereotype to what they think pedophiles should be. I am not a law expert, but you know, from what I have spoken to and other sentencings that I have seen, I mean, somebody got a longer sentencing for not returning library books in Florida than, you know, Frank did for what he has done. So it is a little crazy, and I think the answer is not, you know--Frank could have been sentenced up to 20 years. The judge did not choose to do so. It is not the legislation's fault. It is the judge's fault. So we need to communicate that this is really a serious crime, and I Do not think that we have made that step. We need to let people know how detrimental it is. I know victims of sexual assaults who have had this happen, you know, 5 years ago and are still dealing with it. I feel like I am in a very lucky position. I had parents who could afford the best counseling for me, you know, taking me to the best specialists. This is not the case for every victim, and so I think a lot of things need to be stepped up, but unfortunately I do not think it is related to this. Mr. Upton. Go ahead, Kathy. Ms. Tucker. Along the same lines of laws, and so I will direct this to those of you who are currently in law enforcement, when children are first approached on line and you see that contact beginning, such as in the case, and I do apologize. I cannot pronounce your last name. Mr. Gregart. Me? Ms. Tucker. No. Mr. Karraker. Karraker. Ms. Tucker. Thank you. Mr. Karraker. John. Mr. Upton. John. Ms. Tucker. Oh, John? I an deal with that. In John's case, where he notified, you know, law enforcement that this was going on and there was not anything to be done because there was not a crime, should we not as a Nation look at the total picture and try to put into place some policies that could prevent these acts before they occur rather than always having to deal with after the fact? Mr. Upton. And how do these tips ever get passed along to the police authorities when they are able to identify, John? Mr. Karraker. Part of what I was trying to stress with mine, there was no crime that had occurred, but there was the possibility that if law enforcement would have been trained and would have been equipped to deal with it, they could have been notified of the incident. They could have run that case to the point where if he would have committed a crime, that he could have been arrested for it. And that is the type of education that needs to occur with law enforcement, and also the funding has to be made available to law enforcement. Mr. Upton. Ruben? Mr. Rodriguez. Mr. Chairman, I mentioned that earlier. In John's case, for the law enforcement officer to say there is nothing we can do about it because a crime did not occur, we have heard that all too often. These cases start out somewhere. Law enforcement officers, if they did not have the resources locally for John or whatever, law enforcement will work these cases. That is how it starts, you know. Answering your question where did these tips go, when they come to us, we do a lot of validation on the Internet. We have 14 analysts that look at this stuff, peruse the stuff, build probable cause, if you would, to send that information on to law enforcement agencies. In John's case, I mean, we get these kind of complaints all the time. My child received this. I intercepted that, or whatever. We give it to law enforcement. They proactively go out there to work undercover operations, assume the child's identity and say, ``Okay. I am now 13 year old little Johnny,'' and you know, start talking. This individual starts sending him child pornography, gets into the grooming process, and you know, he comes to visit her, and he meets this 250 pound burly police officer waiting for him when he gets off of the bus. So it is being worked. John is perfectly correct. There is a handful of law enforcement officers throughout the United States that work these kind of cases. As I mentioned, the Internet task forces right now, that is 30 independent law enforcement agencies or task forces throughout the country. We need more of those individuals. We do training for law enforcement out there. The National Center funds these programs to do protecting children on line. AOL is involved in it from the ISP, educating law enforcement officers, how to conduct these investigations. We have a unit commander course. We bring in the lieutenants and sergeants who work these cases to tell them, you know, these are the issues you are going to have to be dealing with, you know, the policies, the procedures, or the laws or whatever. And we want to do more and more of those nationwide. We have standing room only in these courses that we do, but we are not touching as many as we need to talk. I mean, I think the last count was over 800,000 law enforcement officers in the United States. You are talking several hundred individuals who can do these kind of cases. So there are resources out there. They just have to be expanded. Mr. Upton. Well, I want to thank all of you. I want to particularly thank staff. It is never easy, I know, for those of you who came long ways from both ends of the country. Your testimony has been particularly helpful. This is an issue for not only every state, but certainly every community, every neighborhood, every family, and as we see the great positives of the Internet continue to grow, we have got to be ever so cognizant of some folks wanting to take advantage of a system for their own evil means. Jim? Mr. Gregart. Congressman, I think we would be remiss if we only focused on children in this area. Just for all of the adults in the room, I would like to urge you not to respond to the former Nigerian Finance Minister who has E-mailed you asking you for your personal savings and checking account number so that he can transfer $17 million into that account, a classic example, and we have adults across this Nation who are providing their life savings to people they do not know. So you can imagine the problem we have with impressionable children. Mr. Upton. That is exactly right. Okay. I want to thank all of you. It has been terrific, and I just want to say, too, for the press that is here, we will do a little press availability down here for any specific questions you have for the next 15 or 20 minutes. If everyone assembles down here, we will make sure everybody is available for whatever questions you might pose. Thank you. The hearing is adjourned. [Whereupon, at 2:57 p.m., the subcommittee was adjourned.]