[House Hearing, 110 Congress] [From the U.S. Government Publishing Office] THE TRUTH IN CALLER ID ACT ======================================================================= HEARING BEFORE THE SUBCOMMITTEE ON TELECOMMUNICATIONS AND THE INTERNET OF THE COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION ON H.R. 503 __________ FEBRUARY 28, 2007 __________ Serial No. 110-8 Printed for the use of the Committee on Energy and Commerce energycommerce.house.gov U.S. GOVERNMENT PRINTING OFFICE 35-342 PDF WASHINGTON : 2007 --------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202)512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON ENERGY AND COMMERCE JOHN D. DINGELL, Michigan, Chairman HENRY A. WAXMAN, California JOE BARTON, Texas EDWARD J. MARKEY, Massachusetts Ranking Minority Member RICK BOUCHER, Virginia RALPH M. HALL, Texas EDOLPHUS TOWNS, New York J. DENNIS HASTERT, Illinois FRANK PALLONE, Jr., New Jersey FRED UPTON, Michigan BART GORDON, Tennessee CLIFF STEARNS, Florida BOBBY L. RUSH, Illinois NATHAN DEAL, Georgia ANNA G. ESHOO, California ED WHITFIELD, Kentucky BART STUPAK, Michigan BARBARA CUBIN, Wyoming ELIOT L. ENGEL, New York JOHN SHIMKUS, Illinois ALBERT R. WYNN, Maryland HEATHER WILSON, New Mexico GENE GREEN, Texas JOHN B. SHADEGG, Arizona DIANA DeGETTE, Colorado CHARLES W. ``CHIP'' PICKERING, Vice Chairman Mississippi LOIS CAPPS, California VITO FOSSELLA, New York MIKE DOYLE, Pennsylvania STEVE BUYER, Indiana JANE HARMAN, California GEORGE RADANOVICH, California TOM ALLEN, Maine JOSEPH R. PITTS, Pennsylvania JAN SCHAKOWSKY, Illinois MARY BONO, California HILDA L. SOLIS, California GREG WALDEN, Oregon CHARLES A. GONZALEZ, Texas LEE TERRY, Nebraska JAY INSLEE, Washington MIKE FERGUSON, New Jersey TAMMY BALDWIN, Wisconsin MIKE ROGERS, Michigan MIKE ROSS, Arkansas SUE WILKINS MYRICK, North Carolina DARLENE HOOLEY, Oregon JOHN SULLIVAN, Oklahoma ANTHONY D. WEINER, New York TIM MURPHY, Pennsylvania JIM MATHESON, Utah MICHAEL C. BURGESS, Texas G.K. BUTTERFIELD, North Carolina MARSHA BLACKBURN, Tennessee CHARLIE MELANCON, Louisiana JOHN BARROW, Georgia BARON P. HILL, Indiana Professional Staff Dennis B. Fitzgibbons, Chief of Staff Gregg A. Rothschild, Chief Counsel Sharon E. Davis, Chief Clerk Bud Albright, Minority Staff Director Subcommittee on Telecommunications and the Internet EDWARD J. MARKEY, Massachusetts, Chairman MIKE DOYLE, Pennsylvania FRED UPTON, Michigan JANE HARMAN, California Ranking Minority Member CHARLES A. GONZALEZ, Texas J. DENNIS HASTERT, Illinois JAY INSLEE, Washington CLIFF STEARNS, Florida BARON P. HILL, Indiana NATHAN DEAL, Georgia RICK BOUCHER, Virginia BARBARA CUBIN, Wyoming EDOLPHUS TOWNS, New York JOHN SHIMKUS, Illinois FRANK PALLONE, Jr, New Jersey HEATHER WILSON, New Mexico BART GORDON, Tennessee CHARLES W. ``CHIP'' PICKERING, BOBBY L. RUSH, Illinois Mississippi ANNA G. ESHOO, California VITO FOSELLA, New York BART STUPAK, Michigan GEORGE RADANOVICH, California ELIOT L. ENGEL, New York MARY BONO, California GENE GREEN, Texas GREG WALDEN, Oregon LOIS CAPPS, California LEE TERRY, Nebraska HILDA L. SOLIS, California MIKE FERGUSON, New Jersey (ii) C O N T E N T S ---------- Page H.R. 251, To amend the Communications Act of 1934 to prohibit manipulation of caller identification information, and for other purposes................................................. 17 Engel, Hon. Eliot, a Representative in Congress from the State of New York, prepared statement................................... 4 Markey, Hon. Edward J., a Representative in Congress from the Commonwealth of Massachusetts, opening statement............... 1 Upton, Hon. Fred, a Representative in Congress from the State of Michigan, opening statement.................................... 2 Witnesses Knight, Allison, staff counsel, Electronic Privacy Information Center......................................................... 5 Prepared statement........................................... 21 Monteith, Kris, Chief, Enforcement Bureau, Federal Communications Commission..................................................... 9 Prepared statement........................................... 28 Pies, Staci, vice president, PointOne, president, Voice on the Net Coalition.................................................. 7 Prepared statement........................................... 29 THE TRUTH IN CALLER ID ACT ---------- WEDNESDAY, FEBRUARY 28, 2007 House of Representatives, Committee on Energy and Commerce, Subcommittee on Telecommunications, and the Internet, Washington, DC. The subcommittee met, pursuant to call, at 2:40 p.m., in room 2322 of the Rayburn House Office Building, Hon. Edward J. Markey (chairman of the subcommittee) presiding. Members present: Representatives Doyle, Engel, Green, Solis, Upton, Shimkus, Walden, and Terry. OPENING STATEMENT OF HON. EDWARD J. MARKEY, A REPRESENTATIVE IN CONGRESS FROM THE COMMONWEALTH OF MASSACHUSETTS Mr. Markey. Good afternoon. I want to welcome everyone to this panel's first hearing. We have a very active agenda planned for the subcommittee, and I am pleased to be sitting next to my good friend, Fred Upton, as we begin this process. We will try to retain the same level of comedy that existed when he was chairman. I believe that is the way the telecommunications issues should be conducted. Today we begin with legislation that was unanimously approved by the committee and the House in the last Congress when it was sponsored by former Chairman Joe Barton and my committee colleague Congressman Eliot Engel from New York. They have teamed up again this year and reintroduced the bill, and today we hope to gather updated testimony and approve the bill through the subcommittee. This legislation addresses caller ID spoofing. Spoofing is when a caller masks or changes the caller ID information on their call in a way that disguises the true origination number of the caller. In many instances, a call recipient may be subject to pretexting through spoofing, which can lead to fraud, personal ID theft, harassment, or otherwise put the safety of the call recipient in danger. It is important that we explore and analyze the use of spoofing to commit crimes and otherwise harm the public interest. On the other hand, lest we think that spoofing always has nefarious aims, we must recognize that there may be circumstances when a person's safety may be put in danger if their true and accurate call origination information is disclosed as well. What we see seek in caller ID policy is balance. This has been the case since we held hearings in the early 1990's on caller ID when this committee sought to take into account emerging caller ID technology in a way that also allowed callers to block their origination number on a per call or per line basis. Technology also allowed call recipients to refuse to receive calls by anyone who is blocking their caller ID information from going through. Last year we adjusted the legislation to ensure adequately achieved historic balance so that we look at consumer privacy and security. For instance, Members of Congress often have direct lines in their offices. In order to ensure that such lines do not become generally public and therefore remain useful to us, it may be necessary to keep such direct numbers confidential and have the outgoing caller ID information indicate a different number at which our offices can be reached to return calls. That gives the recipient a legitimate phone number to call back but keeps confidential lines private. There are many doctors, psychiatrists, lawyer, and other professionals who would similarly like to keep direct, confidential lines private in this way who have no intention of misleading anyone. In addition, there may be instances, for example, when a woman at a shelter seeks to reach her children at home when spoofing is important to safeguard someone's safety. Moreover, informants to law enforcement tip lines or whistle blowers have additional reasons for why their calling information should remain private. We should not outlaw any of these practices, and if the legislation that we are now considering needed clarification, we have now put that clarification in so that spoofing is put into context that would address those areas where the intent is to actually defraud or harass a called party. That is the goal of the legislation. Again I want to commend my colleagues, Joe Barton and Eliot Engel, for their great work, and I now turn to recognize my good friend, the gentleman from Michigan, Mr. Upton. OPENING STATEMENT OF HON. FRED UPTON, A REPRESENTATIVE IN CONGRESS FROM THE STATE OF MICHIGAN Mr. Upton. I thank the chairman, and I too look forward to working with you over the next 2 years before we get to get that gavel back over here, but take care of it. You can see that we did. In the last 12 years, a lot of chips in this thing as well worn. But I appreciate certainly your leadership and efforts to convene today's hearing and then markup a little bit later when this hearing is over. I am going to ask that my full statement be put into the record, and I am not going to give a definition of spoofing. You did a very good job. This is a bipartisan bill, and I will remind my colleagues that it passed by voice last year in the House on the House floor. Sadly, the Senate did not take it up; otherwise, it would have been a public law. And I commend Mr. Barton again and certainly my good friend, Mr. Engel, for their continued leadership on this very important issue. Let me just convey a couple of different instances where spoofing was used, which clearly shows the need for this legislation. AARP alerted its members to a prevalence scam where spoofers get the local courthouse phone number to appear on folks' caller ID screens, and then they tell the recipients of the calls that they are judicial officials in order to get that victim's personal information, whether it be a Social Security number, driver's license, et cetera. Other reported case involving a swat team that surrounded an apartment building after police received a call from a woman who said she was being held hostage in one of those apartments. As it turned out, it was a false alarm. Caller ID was spoofed to make it look like it was coming from that apartment, someone's idea of a bad prank. In other instances, criminals are stealing credit card numbers, getting the phone number of the actual card holder, and then using those credit cards to get unauthorized wire transfers, PIN numbers, a whole host of things that damage that individual's personal information, a real violation. And, of course, many of us are familiar with our own credit card companies which may ask us to call from home phones to authenticate and then activate that new card. And if the cards are stolen out of the mail, then criminals may be able to spoof our home phone numbers and authenticate and activate that new card from the convenience from their home or motel room or from whatever rock they might crawl under. Unfortunately, spoofing does appear to be growing, and there is no law that protects the American public from it. This legislation, the Truth in Caller ID Act, would make it illegal. More specifically, it would make it unlawful for any person to cause any caller identification service to transmit misleading or inaccurate caller identification information with the intent to defraud or cause harm. The unfortunate reality is that our age of information has resulted in an explosion of identify theft. And while new technologies have provided us with tremendous advancements and benefits, technology has also provided greater opportunities to criminals as well. I look forward to hearing from our witnesses today and for the markup, and I would like to think that we could move this to the House floor soon with the leadership of the gentleman from Massachusetts . I yield back my time. Mr. Markey. I thank the gentleman. The gentleman from Pittsburgh. Mr. Doyle. Thank you, Mr. Chairman. I think this bill has been well introduced, so in my first official action as vice chairman of your subcommittee, I will---- Mr. Markey. By the way, I would like to make that public announcement to all the members, that the gentleman from Pennsylvania, Mr. Doyle, is going to serve as a supremely competent and knowledgeable vice-chairman of this committee. Mr. Doyle. Well said, Mr. Chairman. Mr. Markey. Thank you. Mr. Doyle. I am going to follow your lead from earlier this morning, Mr. Chairman, and waive my opening statement so we can get to our speakers. Mr. Markey. Thank you. Let me then recognize the gentleman from New York, the author of this legislation, Mr. Engel. Mr. Engel. Well, thank you, Mr. Chairman, and I will submit my statement to the record, but I just want to make a couple of comments. First, thank you. I am truly honored that you are taking this bill at our first hearing and markup, and I really appreciate it. When it became clear to me about the problems of spoofing, I went over to then Chairman Barton and asked him if we could do this bill. And so we submitted the bill in the last Congress as the Barton-Engel bill, but due to the changes, I like the way it is submitted in this Congress as the Engel- Barton bill. And I thank my good friend for cosponsoring it again this year as well as Chairman Upton for supporting it. We held hearings on this bill last year, and the statement that you made, Mr. Chairman, and Mr. Upton's statements really capsulize what the hearings told us. The fact that there are instances where we may not want the real number to show and that there are many horror stories that we know and it can go, on and on in terms of political campaigns and trickery where people from one campaign can pretend they are calling from the opposition's campaign and do all kinds of things to get voters angry at the opposition. So this is truly a bill whose time has come, and I am very grateful that we have tremendous consensus. And I am going to submit this, and I look forward to hearing the testimony and doing the markup with you. Thank you. [The prepared statement of Mr. Engel follows:] Prepared Statement of Hon. Eliot Engel, a Representative in Congress from the State of New York Mr. Chairman, I want to thank you for quickly scheduling this hearing. The bill before us today is a good bill and one that I was happy to re-introduce in this Congress with my friend and ranking member, Mr. Barton. For years now, I have been working with my colleagues on issues of privacy and identity theft. Each and every time we plug one hole, crafty criminals come up with another way to commit fraud. Currently, it is easy, cheap, and legal to spoof caller ID. These services can be used for many malicious purposes. A criminal can make a call that appears to be originating from the recipient's neighborhood bank, his credit card company, or the Social Security Administration. I've read news reports that criminals are using these technologies to get people to give out private information they would never give out except that they think they are receiving a legitimate call from their bank or even local court house. I also have read about some of our colleagues being victims in their capacity as Members of the House. At that point, it became apparent to me there are people who seek to use these technologies to strike at the heart of our democracy. Leaving fake messages that are insulting or incendiary on a person's voicemail that identifies the caller as an elected official or candidate for public office threatens the very nature of our electoral process. The Truth in Caller ID Act will give us another tool to combat identity theft and even election fraud. I thank the chairman for his attention to this matter, look forward to hearing from the witnesses, and yield back. Mr. Markey. Thank you. And, yes, this is the 20th anniversary, this month, of my becoming chairman of this subcommittee 20 years ago. So it is an honor for me to have this bill be the first bill on the 20th anniversary that we will be processing. The gentleman from Illinois. Mr. Shimkus. Thank you, Mr. Chairman. Congratulations, and I am glad you brought up that there are some beneficial uses. I kind of forgot about when people call us on our cell phones, member to member, it is a different number that pops up on our cell phones, even in this system. So we all want to go after the bad actors, but there are some credible positive uses, and we want to maintain that balance. I think you will try to do that. I appreciate your efforts, and I yield back my time. Mr. Markey. The gentle lady from California. Ms. Solis. Thank you, and congratulations to you, Mr. Chairman, and also for bringing this very timely piece of legislation forward. I want to tell you that, as a longtime advocate on domestic violence issues, I am pleased to see that the legislation helps to clarify that law to protect those victims. So thank you very much, and I will submit my statement for the record. Mr. Markey. The gentleman from Oregon. Mr. Walden. Thank you, Mr. Chairman. I actually thought when I saw something about spoofing on our list today that it had more to do with the full committee chairman's comment about DTB yesterday and maybe changing the date. But since it is on this, I really don't have an opening statement. I supported this bill last time, and I will look forward to supporting it again. Mr. Markey. The gentleman from Nebraska. Mr. Terry. I will waive. Happy anniversary, by the way. Mr. Markey. Thank you so much. I was a young man once ago. So let us now turn to our incredibly impressive panel of witnesses. That would be Ms. Allison Knight, staff attorney from the Electronic Privacy Information Center. She is staff counsel at that organization, a graduate of the University of Western Ontario. She has written extensively on this subject, and we appreciate very much her being here. We have Ms. Staci Pies, who is vice-president and Point One president, testifying on behalf of the VON Coalition. She has 15 years of experience in communications, legal and regulatory experience, and she also served at the FCC as deputy division chief in a network services division, and senior attorney in the FCC's common carrier bureau. And Ms. Kris Monteith, chief of the FCC enforcement bureau. She is the chief of that bureau. She has held numerous jobs in the FCC including overseeing the commission's interaction with local, state, and tribal governments. She has also served as the chief of policy for the wireless telecommunications bureau and deputy chief of the Farmer Common Carrier Bureau's competitive pricing division. So I think what we will do is we will recognize the witnesses in the order that I introduced them, and then we will finish up with the FCC giving us their summary view of this issue. So, Ms. Knight, you have 5 minutes. Please begin. STATEMENT OF ALLISON KNIGHT, STAFF COUNSEL AND DIRECTOR OF PRIVACY AND HUMAN RIGHTS PROJECT AT THE ELECTRONIC PRIVACY INFORMATION CENTER Ms. Knight. Good afternoon. Chairman Markey, Ranking Member Upton, and members of the subcommittee, thank you for the opportunity to testify today on caller ID spoofing and H.R.251, The Truth in Caller ID Act of 2007. My name is Allison Knight, and I am staff counsel and director of privacy and human rights project at the Electronic Privacy Information Center. EPIC is a nonpartisan research organization based on Washington that seeks to focus public attention on the emerging civil liberties issues and to protect privacy, the First Amendment, and constitutional values. I would like to discuss two separate and important privacy interests related to the issue of caller ID spoofing. The first is the right of callers to limit the disclosure of their phone numbers in order to protect their privacy and, in some cases, their safety. The second is the right for call recipients to be free from pretexting and other fraud that can lead to the loss of their privacy and the threats of stalking, identify theft, and harassment. Before caller ID services were offered, telephone customers generally had the ability to control the circumstances under which their phone numbers were disclosed to others. Many individuals have legitimate reasons to report a different number than the one presented on caller ID, as was remarked in the opening comments. For example, a person may wish to keep their direct line private when making phone calls from within an organization. And in some circumstances, disclosure of a person's telephone number may also put his or her safety at risk. Domestic violence survivors, shelters, and other safe homes need to preserve their confidentiality of their phone numbers. They may need to contact abusers without exposing their location in order to arrange custody or other legitimate matters. They also may need to contact other third parties, such as businesses, that may have very permissive privacy policies and would then share collected telephone numbers with lists or data brokers. In all of these situations, preserving anonymity is necessary for their safety. Caller ID blocking may seem like a viable means for allowing callers to protect their anonymity while not misleading recipients. However, caller ID blocking is not a complete solution. A caller can be identified through other means, such as the automatic number identification system, and some recipients prevent receiving blocked calls. And indications are that numbers of individuals who are doing this is growing. In the case of a domestic violence survivor, attempting to safely reach a required phone number, an individual would have to use spoofing for the innocent purpose of preserving the confidentiality of his or her number. We also can't ignore the privacy interest of those who decline to accept calls from unknown numbers. If an individual has habitually received harassment calls from a caller ID blocked number, we should not permit the harasser to use spoofing as a means to circumvent the individual's screening. Caller ID spoofing can also create privacy risks. Last year, EPIC brought to Congress's attention the problem of pretexting consumers' phone records. Pretexting is a technique by which a bad actor can obtain an individual's personal information by impersonating a trusted entity. For these reasons, the practice of spoofing for the purpose of fraud or harm should be curtailed. Preventing spoofing for harmful reasons will also hold illegitimate spoofers accountable. Spoofing caller ID numbers can create a real risk to individuals who might be defrauded or harmed by illegitimate uses of the technology. At the same time, it is important not to punish those who have a legitimate reason to conceal their actual telephone numbers. EPIC supports H.R.251 as currently drafted because including an intent requirement, The Truth in Caller ID Act of 2007 distinguishes between appropriate and inappropriate caller ID spoofing and also preserves legitimate law enforcement techniques. Finally, we would also like to call the subcommittee's attention to our ongoing concern about the revelation that the National Security Agency may have constructed a massive database of telephone records of American consumers. We again ask members to support EPIC's recommendation that the FCC undertake an investigation of the possibly improper disclosure telephone records by telephone companies that are subject to the privacy obligations contained in the Communications Act. Thank you. [The prepared statement of Ms. Knight appears at the conclusion of the hearing.] Mr. Markey. Thank you. Ms. Pies. STATEMENT OF STACI PIES, VICE PRESIDENT, POINT ONE, AND PRESIDENT, THE VOICE ON THE NET COALITION Ms. Pies. Thank you, Chairman Markey, Vice Chair Doyle, Ranking Member Upton, and members of the subcommittee. My name is Staci Pies. I am vice president of Point One, a VoIP provider, and president of the Voice on the Net or VON Coalition, the voice for the VoIP industry. Misleading people through the misuse of caller ID, whether for a prank, a scam, or worse, is unacceptable. And on behalf of the VON Coalition, I thank the committee for its leadership in addressing this issue. VoIP is burgeoning in popularity with businesses and consumers because it can do so much more than plain old telephone service. VoIP allows consumers to take control over the communications experience, to manage how they use those services, and to decide when and where they receive calls. Lower costs coupled with a seemingly endless list of new possibilities are making VoIP one of the hottest Internet and broadband technologies today. Today's VoIP services are simply a means to have a conversation. They are portals to a world of information that enriches the communications experience and adds new dimensions to the idea of a conversation. Studies have shown that with the right policy framework and continued advancement, VoIP-driven competition has the potential to save consumers more than $100 billion over the next 5 years. For businesses, VoIP is lowering costs, increasing mobility, enabling collaboration, integrating voice and data in entirely new ways, boosting productivity, and giving companies and competitive advantage, and the best is yet ahead. Many of the great benefits of VoIP to consumers and business users depends on accurate and non-misleading identification of the calling party. If I program my VoIP service to ensure that calls from my son's school are simultaneously rung on all of my phones, I don't want to answer it and find out that some telemarketer has spoofed the number to fool me into believing it is a priority call. To protect the usefulness of their services, VoIP providers have a strong interest in having caller ID be accurate and non- misleading. The VON Coalition has been at the forefront of promoting best practices to enable consumers to protect their personal data, moving early to adopt and post consumer guidelines for protecting billing records. Since then, businesses that control personal data, consumers, and the IP industry have taken significant steps to self-police fraudulent access to personal data. The VON Coalition agrees with previously presented congressional testimony that caller ID fraud perpetrators must be penalized. Law enforcement should have the tools to protect U.S. citizens from individuals that fraudulently manipulate phone numbers to commit a crime against a person or a crime against property. Spoofing to defraud or harass or for unlawful commercial gain cannot and should not ever be condoned or tolerated. Congress is right to focus its attention on those who would do so. As this committee addresses deceptive spoofing, we urge you to continue to carefully balance to goal of thwarting criminal behavior with the public interest imperative to ensure that innovation flourishes and that applications and services delivered over broadband are available to all Americans. As Chairman Markey so eloquently described in his opening statement, the ability to consumers to control various aspects of their communication experience presents exciting opportunities for the disabled, offers unsurpassed privacy protection, and enables businesses and consumers to communicate in increasingly efficient and powerful ways. The Truth in Caller ID Act, with the focus on the intent to commit fraud or other crimes, effectively balances these two important objectives by facilitating prosecution while not thwarting or prohibiting innovative tools that have legitimate consumer empowering benefits. The bill recognizes that caller identification information may be modified for telemarketers to comply with the TCPA. This is not the only legitimate need to change caller ID. I would like to share five examples. First VoIP services offer tremendous potential for persons with disabilities to communicate more effectively. One recent Web application permits users to call any phone number in the U.S. or Canada, and the service reads to the called party the message that the originating user inputs into a Web-based form. Users of the application who are speech impaired can now send voice messages. Similarly, blind users can now take advantage of instant messaging services, where previously they would have been precluded from doing so because of sight limitations. Second, one of the benefits of VoIP is to help consumers better protect their own privacy. For instance, Web sites that allow consumers to post solicitations for lawful commercial purposes may also permit consumers to provide a temporary callback number that is different from their assigned number. One service explains the application in this way. The desire to communicate cannot be crippled by privacy. The application unleashes the true potential of the global community by making it a safer place. Third, as recognized by Chairman Markey and Ms. Knight, there are some situations in which caller ID information can actually endanger individual safety. The classic situation is the battered spouse. In some instances, blocking the delivery of caller ID information might be sufficient; however, because technological innovations also facilitate the unblocking of caller ID, any legislation should be careful about presuming that blocking will always be adequate protection. Four, certain new communication services do not organically generate or transmit caller ID, but in order to connect to the public telephone network, the service may need to insert something that looks like a traditional phone number. Many of these innovative services, which offer tremendous ways to communicate, do not utilize the same numbering and labeling practices as yesterday's phone services and should not be deemed illegitimate because of this. A final exciting new application is the ability for consumers to make click-to-dial calls while viewing broadband- based content. Utilizing such an application, a viewer can click a single button on her standard remote and pull up a menu that offers a variety of products and services, including contacting her local member of Congress. The constituent can locate the contact information for the member's office and then click on a button that enables her to reach the office through a VoIP connection. [The prepared statement of Ms. Pies appears at the conclusion of the hearing.] Mr. Markey. Excellent job. Thank you. I appreciate it. I wanted you to get through all five of those. Ms. Monteith. STATEMENT OF KRIS MONTIETH, CHIEF, ENFORCEMENT BUREAU, FEDERAL COMMUNICATIONS COMMISSION Ms. Monteith. Good afternoon, Chairman Markey, Ranking Member Upton, and members of the subcommittee. Thank you for the opportunity to speak with you about the problem of caller identification spoofing. As you know, caller ID services let customers identify who is calling them by displaying the caller's telephone number or other information on the customer's equipment before the customer picks up the phone. Caller ID spoofing refers to a practice in which the caller ID information transmitted with the telephone call is manipulated in a manner that misleads the call recipient about the identity of the caller. The commission is deeply concerned about reports that caller ID information is being manipulated for fraudulent or other deceptive purposes, and the impact of those practices on the public trust and confidence in the telecommunications industry. We are particularly concerned about how this practice may affect consumers as well as public safety and law enforcement communities. As a technical matter, caller ID spoofing happens by manipulating the data elements that travel with the phone call. Phone calls on the public switch telephone network, or the PSTN, are routed to their destinations by means of a specialized protocol called the signaling system seven, or SS7. SS7 conveys information associated with a call, such as the telephone number of the caller. The SS7 information for a call is provided by the carrier that the caller uses to place the call. Caller ID then displays that caller's number to the called party. Caller ID spoofing is accomplished by manipulating the SS7 information associated with the call. The commission addressed caller ID on the PSTN in 1995 with rule 64.1601, which generally requires all carriers using SS7 to transmit the calling party number associated with an interstate call to interconnecting carriers. The same commission rule also requires telemarketers to transmit accurate caller ID information. The development of Internet and IP technologies has made caller ID spoofing easier than it used to be. Now, entities using IP technology can generate false calling party information and pass it into the PSTN via SS7. Caller ID spoofing can potentially threaten our public safety. For example, spoofers can fabricate emergency calls and call as local law enforcement and public safety agencies to deploy their resources needlessly. Caller ID spoofing also can potentially threaten consumers. Spoofing can be used, for example, by the unscrupulous to defraud consumers by making calls appear as if they are from legitimate businesses or government offices. The commission's enforcement bureau has been actively investigating the issue of caller ID spoofing since the summer of 2005, when information regarding junk fax spoofing came to our attention. To date, the bureau has initiated investigations of 12 companies engaged in the marketing and selling of caller ID spoofing services to customers. One investigation resulted in a citation against a telemarketer, Intelligent Alternatives, for rule violations, including violations of the caller ID rules under section 64.1601. We have sent formal letters of inquiry to the other companies and at the same time, served most of them with subpoenas to compel them to respond to our inquiries. In some cases, we have issued subsequent letters of inquiry to uncover additional evidence of possible violations of the Communications Act. Our inquiry letter seek information about the company's alleged spoofing methods, including detailed technical explanations and the types of technologies utilized, the identities of other companies that assist in providing the spoofing services, the purposes for the services, and information about subscribers, and whether the offered services can be used to spoof emergency services information or otherwise affect those critical first responders. We continue to seek relevant information to assist us in fully understanding these issues and whether violations of the Communications Act or our rules have occurred. But our enforcement options may be limited by some of these entities who are not directly regulated by the commission. At the same time, we have held meetings with numerous industry representatives, including wire line, wireless, and voiceover Internet protocol based companies to determine the impact of caller ID spoofing on their consumers and networks. In addition, we have coordinated closely with state agencies, the Federal Trade Commission, and other interested organizations, such as the National Emergency Number Association, regarding their efforts to address and identify solutions to this problem. The enforcement bureau is committed to continuing to gather and analyze information about these companies' practices, their networks, their businesses, their customers, and other germane information. In conclusion, the intentional manipulation of caller ID information, especially for the purpose of fraud or deception, is a troubling development in the telecommunications industry. The commission looks forward to working with Congress, this committee, to ensure that the public maintains its confidence in the telecommunications industry. Thank you for the opportunity to testify. [The prepared statement of Ms. Montieth appears at the conclusion of the hearing.] Mr. Markey. Thank you. We thank each of the witnesses. That now concludes the time for testimony by our witnesses, and now the chair will recognize himself for a question of the witnesses. Ms. Knight, do you feel that the changes that have been made in the legislation take into account the context of the call so that now the bill goes after the bad actors without hindering legitimate uses of technology? Ms. Knight. Yes, the intent either to defraud or to cause harm adequately and rightly covers the illegitimate uses and still protects the legitimate uses of caller ID spoofing. Mr. Markey. OK, great. I have no other questions. Mr. Upton. Mr. Upton. Do you think it addresses everything that we should in this bill? Ms. Monteith. Yes, I think what would be important with respect to intent is that Congress and the committee provide as much in the way of legislative history as possible to inform the commission of the applicable standard under the intent standard. Mr. Upton. I have no further questions. Thank you. Mr. Markey. The gentleman from New York, Mr. Engel. Mr. Engel. Thank you very much, Mr. Chairman. Ms. Monteith, in your testimony, you mentioned that the commission has coordinated with state agencies regarding the efforts of the state agencies to identify solutions to this problem. Can you give some examples of what the states are doing to solve the problem? Ms. Monteith. I know we have worked closely with the Florida attorney general's office and I believe with members of the Nayrook. I don't have any specific examples. We do participate with the Nayrook members on a monthly call that is aimed at addressing consumer protection types of issues. But I would be happy to get specific details to respond to your question. Mr. Engel. Thank you. I appreciate that. Ms. Pies, you gave a line of good examples of the new technology, the VoIP providers. It is really exciting, and obviously many people use these things. My kids can tell you more about them than I can, but there is no standard, is that true, for VoIP providers when it comes to caller ID? Ms. Pies. If I understand the question, you are asking whether there is an industry-wide accepted technical standard for transmission of caller ID. Mr. Engel. Yes. Ms. Pies. There are several different protocols that are used to provide VoIP services. Really depends on the type of service that is being provided, the type of network, whether or not it is connecting to the PSTN. And there are practices that some providers use. As Kris explained in her testimony, if you are connecting with the PSTN, there are different requirements in order to be able to pass. If you are utilizing SS7 base signaling, there is different information that has to be passed. Some providers where calls originate IP, rather than originating on the PSTN, as I described in my testimony, the networks do not organically generate caller ID that is what we think of in the traditional plain old telephone service world. So they may, for instance, insert a number such as 0001234 in order to allow the call to connect, but that call does not have a traditional phone number associated with it. Mr. Engel. Do most programs let someone manually enter any caller ID info they want? Ms. Pies. I can't answer whether most do or do not. What VoIP does that is so empowering for businesses and consumers is it essentially moves functionality that used to be in the hands of the large companies. So, for instance, setting up a PBX system. I can now download software and set up a PBX system from my home, and I can serve a small business straight from my home. I do not have to contract through Verizon. So the ability to do that also enables me to control some of the functionalities that the phone company would have controlled in the past, such as establishing the caller ID. I know that there are a number of consumer residential VoIP services that ask the consumer to select a phone number and fix that selection from the get-go, and the caller does not have the ability to manipulate it as they go on. Mr. Engel. Is the industry working towards any standard that you know on how to handle things so that things would be uniform? Ms. Pies. The industry is, as far as I know, and there are technical organizations and engineers that may be working on issues that I am not aware of. Establishing a caller ID so that calls look like plain old telephone service is probably not high on the priority list. Most of the industry standards that are being worked on allow the old network to communicate with the next generation network. And sort of making up a caller ID parameter so that it looks like an old phone call does not serve any beneficial purpose when the networks can talk to each other without that. Mr. Engel. OK, thank you. Thank you, Mr. Chairman. Mr. Markey. The gentleman from Illinois, Mr. Shimkus. Mr. Shimkus. Thank you, Mr. Chairman. I just want to follow up on this range. There is always unintended consequences when we move legislation, and it has struck me that we have defined that there is legitimate reasons to spoof for protection. We have been involved a lot with the 911 issue and enhanced 911 and identification of location. Is there a concern, especially VoIP, which is we are not totally deployed. We are still having issues with how someone uses the VoIP service. And they call 911. How do we know where they are at? And we are trying to push that out. Let us take someone who is spoofing legitimately to protect their location. What if they then try to make an emergency service call? Are they in the system, or are they not? Can they be identified, or can they not be identified either using traditional land line, cellular or VoIP? Is this something we need to talk through, or am I not technologically knowledgeable enough to say it is not an issue? Ms. Pies. I would like to answer. Mr. Markey. Yes. Ms. Pies. That is a very good question, and actually the way that a VoIP caller or a cellular caller contacts the right PSAP, the correct PSAP for the location where the person is located, is there is a system called PANI or Pseudo Automatic Number Identification. And that number is input into a database or a server so that when my calls go in, for instance, I have a 202 number in my office in Maryland. My call will go into the 911 system, and because we have a very old 911 system that actually does not work very particularly efficiently, you have to fool the system to letting it believe that the call is coming from the right geographic location. So there is a Pseudo ANI that is associated then with my call that tells the PSAP that I am in Maryland as opposed to DC. So in fact, that is a legitimate spoofing capability that needs to be protected to enable the 911 call to go to the right PSAP. It is not something that needs to be prevented because both mobile calls or VoIP calls, any type of service that can be used from a different location from what a traditional phone service would be used, needs to have that sort of pseudo phone number to be able to tell the PSAP where to go and which PSAP to answer. Mr. Shimkus. So no matter what number you change it to or the identification of the Pseudo ANI number will direct you to the location? Ms. Pies. Correct. Mr. Shimkus. Great. That is all I have, Mr. Chairman. I yield back. Mr. Markey. The gentleman from Pennsylvania. Mr. Doyle. Thank you, Mr. Chairman. Ms. Monteith, first of all, it looks like this bill we have here in the subcommittee is a slam-dunk, and we appreciate your help in the process. I just thought while we have you here, I would like to have you tell us how an enforcement action happens. Walk us through it. And do you start it? Does the chairman's office start it? Tell us how it works. Ms. Monteith. Sure. An enforcement action can be initiated through a number of different procedures. One may be that we would investigate an issue that comes to our attention that is troubling and may be a violation of the Communications Act. Secondly, we certainly could be asked by the chairman, other commissioners, to help to investigate issues. And thirdly, we are very often complaint-driven. A complaint is filed with the commission alleging a violation of the Communications Act, and we investigate to ensure that there is not or to determine that there is. Once we initiate an investigation, our general fact finding process is to send letters of inquiry to the subject of our investigation, asking them to provide us with information concerning the underlying issues. They are compelled to respond. If they are a non-regulated entity, we sometimes serve a subpoena as well as issuing the formal letter of inquiry to ensure that they will respond to our inquiry. From there, if our investigation reveals that there has been a violation of the Communications Act, our general process with respect to a regulated entity is to issue what we call a notice of apparent liability. That is a finding that we believe there has been a violation, and we propose, in many instances, a forfeiture along with that finding. The entity then has an opportunity to respond to us and indicate to us that either factually or legally we do not understand the case or the facts before us, the law before us. From there, we go to a forfeiture order that may be--if we are dealing with a non-regulated entity or a entity that does not have an application or an application or a license or a permit from the commission, before we can go to the notice of apparent liability stage, we are required by statute to issue a citation. And before we could then go to the notice of apparent liability stage and impose a forfeiture or a fine, we would have to find a repeat violation by that same entity of the same underlying Communications Act provision or our rules. So that is in essence the process. Mr. Doyle. When would the chairman or other commissioners get involved in an enforcement action, or do they ever? Ms. Monteith. Involved with respect to asking us to investigate or involved in the investigation? Mr. Doyle. In the investigation. Ms. Monteith. The bureau, of course, would coordinate with the chairman's office and with the commissioners to share information about our investigations. And depending upon whether the investigation is something that the bureau could handle on delegated authority or whether we had to present the item for the commission's full consideration, the commissioners may be more or less involved in the investigation. Certainly if it is an item that is being presented to the commission for vote, the bureau would be responding to the commissioners and the chairman and the kinds of questions that they may have to assure themselves that they are, and they fully understand the facts and the laws surrounding the investigation. Mr. Doyle. Thank you very much. Mr. Chairman, I yield back. Mr. Markey. The gentleman from Oregon. Mr. Walden. Thank you, Mr. Chairman. I really don't have any questions. I think they have been well addressed and look forward to moving into the markup. Mr. Markey. The gentleman from Nebraska. Mr. Terry. Thank you, Mr. Chairman. I only have one question. It is the same one that I asked last time, and I think we made sure that this appropriate use was protected, and that is within our teleservices industry. Two of the top three of which are headquartered in my district. So I just want to ask Kris if you could verify that from your reading that a teleservices company that uses their client's name and number as the caller ID number is an accepted practice and is not one that would be considered defrauding or harming. Ms. Monteith. Yes, I believe that is correct under our rules. Mr. Terry. That would be our intent. Thank you. Mr. Markey. With the gentleman yielding back, the time for questions by the members of the subcommittee has expired. That concludes the hearing. All members have 10 days, if they wish, to submit questions to the witnesses, and the committee clerk will notify the members as to how that process works. And without objection, this subcommittee is now adjourned. And we will now have the meeting once again. OK, so all the witnesses, if you would like, we thank you so much for your excellent testimony. And we will take a 1-minute break. We will recognize the gentleman from Texas, Mr. Green. Mr. Green. Thank you, Mr. Chairman, for your courtesy. Again, I apologize. I was just down the hall. I am actually trying to work with the Ecuador ambassador with an energy company, so you understand that, Mr. Chairman. But I just have some questions for Ms. Monteith. Commercial telemarketers are required to transmit accurate caller ID information that applies whether the calls are made in person or whether they are using automated calls. Is that correct? Ms. Monteith. Yes, I believe so. Mr. Green. OK, if a nonprofit, such as a political action committee or a political party or a 571 organization makes automated calls to voters, does the current FCC rules prohibit them from using inaccurate caller ID info if it is nonprofits or political campaigns? Ms. Monteith. I don't believe exempt organizations are covered under our rules. Mr. Green. OK, the committee memo agrees with that and says that there is no broad mandate however to the correct caller ID information be transmitted for non-commercial calls. That is the only thing. The draft bill we have today prohibits the sending of inaccurate caller ID info with the intent to defraud or cause harm. Does this language prohibit automated political calls with inaccurate caller ID info? Does that definition of with intent to defraud or cause harm, would that apply to non- profits or political campaigns? Ms. Monteith. I would prefer to, if you don't mind, with all due respect, look at the question before I answer. Mr. Green. OK, we will be glad to submit that. Ms. Monteith. Thank you. I appreciate that. Mr. Chairman, generally intent to defraud is relatively clear for a standard, but when you add to it intent to cause harm, it is less clear. And I would hope that the FCC would interpret that standard, which causes harm, how much intent is needed to qualify? And so that is an open-ended, but we will submit that to you. And I know we have a markup set for this bill, and I have an amendment that will address it. But I will hold to the full committee, but I think there is some concern about that. And I want to make sure we don't have a loophole that can be done by non-profits or even political campaigns because our constituents can get mad when that caller ID is false. And whether it is me calling them or the Democratic Party or some non-profit group. And your organization has been very helpful in identifying some justified reasons for allowing callers to withhold and hide caller ID info, such as people making anonymous tips to newspapers and legitimate investigations, and also women's shelters, for example. We now have an intent standard in the bill, and I am concerned that organizations making deceptive political calls using fake caller ID information would not be covered. Is it your understanding this bill would include non-profit or political organizations? Ms. Monteith. Well, I think that the standard deception is different than either fraud or to cause harm, and I think that the standard that has been articulated in the bill does clearly delineate between legitimate and illegitimate uses of spoofing. Mr. Green. OK, can you think of any legitimate reason someone or some group that is making hundreds or even thousands of calls on an automated system would use a false caller ID? And this is open to anyone. I guess because I think the bill is a great bill. In fact, I know it has been both my colleague counsel Eliot and ranking member Barton, I just worry that we are leaving maybe a loophole here that we are not going to address. And we will have to come back at some future time. Ms. Monteith. Well, again I think that the focus rightly is on the intent. Mr. Green. OK, and not the causes harm? Ms. Monteith. Well, either the intent to defraud or to cause harm. Mr. Green. OK, so the intent to defraud would be the primary, and then to cause harm is actually in addition to it. You don't have to meet both tests. Ms. Monteith. Right, the wording of the bill has an or. I would see to defraud as being more traditional fraud where there would be a calculable monetary damage that would be associated with it, whereas harm, I think, would be more along the lines of a physical harm to deal with some of the issues that I have read about in terms of safety. Mr. Green. OK. Well, I guess the fraud issue, because if again for example, the Democratic Party is only calling Republican primary voters, what would you think that would be? Would that be intent to defraud with their caller ID not showing it is the Democratic Party? Ms. Monteith. Well, again, I think that deception and fraud are two different standards. I won't try to make any kind of judgment on how the bill will eventually be interpreted; however. Mr. Green. We don't want anybody to interpret it. We want to put it in the language so they don't have to. Ms. Monteith. I mean I need further details on this. Mr. Green. OK. Ms. Monteith. At a later date, if you would like. Again, I would like to restate that EPIC does support the language either intent to defraud or to cause harm. We think that adequately makes a distinction between different uses. Mr. Green. But again someone could still be using local calls just to deceive, and because defraud they are not, I mean except for maybe selling them an idea instead of a product---- Ms. Monteith. Well, again if that doesn't meet the language either to defraud or to cause harm, then it wouldn't be caught within the bill. And it would therefore be a legitimate use. Ms. Green. OK, thank you, Mr. Chairman. Thank you again. Mr. Markey. OK, and we look forward to working with the gentleman from Texas between the subcommittee and the full committee on his concerns. With that, the gentleman's time has expired. And again all time for questions by members of the subcommittee has expired, and this portion of the hearing has concluded. And we once again thank the witnesses for their excellent testimony, and we will recess for a minute while the witnesses clear the table. And our staff counsel can move into place so that we can begin a markup of this legislation. [Whereupon, at 3:28 p.m., the subcommittee proceeded to other business.] [Material submitted for inclusion in the record follows:] [GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT] Statement of Kris Anne Monteith Good morning, Chairman Markey, Ranking Member Upton, and members of the Subcommittee. Thank you for the opportunity to speak about the problem of caller identification (caller ID) spoofing. As you know, caller ID services let customers identify who is calling them before they answer a call by displaying the caller's telephone number or other information--such as a name or business name--on the customer's equipment before the customer picks up the phone. ``Caller ID spoofing'' refers to a practice in which the caller ID information transmitted with a telephone call is manipulated in a manner that misleads the call recipient about the identity of the caller. The use of Internet technology to make phone calls has apparently made caller ID spoofing even easier. The Commission is deeply concerned about reports that caller ID information is being manipulated for fraudulent or other deceptive purposes and the impact of those practices on the public trust and confidence in the telecommunications industry. We are particularly concerned about how this practice may affect consumers as well as public safety and law enforcement communities. In my testimony, I will first provide a brief technical background on caller ID spoofing. Then, I will describe the Commission's rules addressing caller ID services and the steps the Commission is taking to make sure that providers are fully meeting their obligations under the Communications Act and the Commission's rules and orders. As a technical matter, caller ID spoofing happens by manipulating the data elements that travel with a phone call. Phone calls on the public switched telephone network, or PSTN, are routed to their destinations by means of a specialized protocol called the Signaling System 7, or SS7. SS7 conveys information associated with a call such as the telephone number of the caller. The SS7 information for a call is provided by the carrier that the caller uses to place the call. Caller ID then displays that caller's number to the called party. Caller ID spoofing is accomplished by manipulating the SS7 information associated with the call. The Commission addressed caller ID on the PSTN in 1995 with rule 64.1601, which generally requires all carriers using SS7 to transmit the calling party number associated with an interstate call to interconnecting carriers. The same Commission rule also requires telemarketers to transmit accurate caller ID information. The development of Internet and IP technologies has made caller ID spoofing easier than it used to be. Now, entities using IP technology can generate false calling party information and pass it into the PSTN via SS7. Caller ID spoofing can potentially threaten our public safety. For example, spoofers can fabricate emergency calls and cause local law enforcement and public safety agencies to deploy their resources needlessly. Caller ID spoofing can potentially threaten consumers. For example, spoofing can be used by the unscrupulous to defraud consumers by making calls appear as if they are from legitimate businesses or government offices. The Commission's Enforcement Bureau (Bureau) has been actively investigating the issue of caller ID spoofing since the summer of 2005 when information regarding junk fax spoofing came to our attention. To date, the Bureau has initiated investigations of twelve companies engaged in the marketing and selling of caller ID spoofing services to customers. One investigation resulted in a citation against a telemarketer, Intelligent Alternatives, for rule violations, including violations of the caller ID rules under section 64.1601. We have sent formal letters of inquiry to the other companies and, at the same time, served most of them subpoenas to compel them to respond to our inquiries. In some cases, we have issued subsequent letters of inquiry to uncover additional evidence of possible violations of the Communications Act. Our inquiry letters seek information about the companies' alleged spoofing methods, including detailed technical explanations and the types of technology utilized, the identity of other companies that assist in providing the spoofing services, the purpose for the services and information about subscribers, and whether the offered services can be used to spoof emergency services information or otherwise affect those critical first responders. We continue to seek relevant information to assist us in fully understanding these issues and whether violations of the Communications Act or our rules have occurred, but our enforcement options may be limited as some of these entities are not directly regulated by the Commission. At the same time, we have held meetings with numerous industry representatives, including wireline, wireless, and voice over Internet protocol (VoIP)-based companies, to determine the impact of caller ID spoofing on their consumers and networks. In addition, we have coordinately closely with state agencies, the Federal Trade Commission and other interested organizations, such as the National Emergency Number Association, regarding their efforts to address and identify solutions to this problem. The Enforcement Bureau is committed to continuing to gather and analyze information about these companies' practices, their networks, their businesses, their customers, and other germane information. In addition, as the Commission indicated to some members of this Committee last year, the Commission may not have sufficient authority to fully address this issue. Thus, legislation that clarified the Commission's authority in this area would be helpful. In conclusion, the intentional manipulation of caller ID information, especially for the purpose of fraud or deception, is a troubling development in the telecommunications industry. The Commission looks forward to working with this Committee, and other Members of Congress, to ensure the public maintains its confidence in the telecommunications industry. Thank you for the opportunity to speak with you today. ---------- Statement of Staci L. Pies Thank you, Chairman Markey, Vice Chair Doyle, Ranking Member Upton, and members of the subcommittee. My name is Staci Pies. I am Vice President, Governmental and Regulatory Affairs of Point One, a VoIP provider, and President of the Voice on The Net or VON Coalition--the voice for the VoIP industry. On behalf of the VON Coalition, I thank the Subcommittee for the opportunity to testify about this important issue. Misleading people through the misuse of caller ID, whether for a prank, a scam, or worse, is unacceptable, and we thank the Committee for its leadership in addressing the issue. VoIP is burgeoning in popularity with consumers because it can do so much more than Plain Old Telephone Service. VoIP allows consumers to take control over their communications experience, to manage how they use those services and to decide when and where they want to receive calls. Lower costs, coupled with a seemingly endless list of new possibilities are making VoIP one of the hottest Internet and broadband technologies today. Internet voice communications is changing the way we communicate, stay connected to our friends, family and colleagues, and how we live. Today's VoIP services aren't simply a means to have a conversation; they're portals to a world of information that enriches the communications experience and adds new dimensions to the idea of ``conversation.'' Studies have shown that with the right policy framework and continued advancement, VoIP driven competition has the potential to save consumers more than $100 billion over the next 5 years. Families are gaining unprecedented independence as well as new flexibility and features not possible in yesterday's telephone network. Features such as choosing your area code, and the ability to use a VoIP service through any broadband connection are just some of the ways that consumers are benefiting. At the same time, connectivity, quality and reliability have improved to equal if not surpass that of the legacy phone network. For businesses, VoIP is lowering costs, increasing mobility, enabling collaboration, integrating voice and data in entirely new ways, boosting productivity by as much as 15 percent, and giving companies a competitive advantage. And the best is yet ahead. The next wave of VoIP driven benefits promises to facilitate revolutionary improvements in the way we communicate. Soon a voice component can be added to any type of device, application or service that uses a microprocessor or touches the Internet. Already, making a call can be just a click away. Consumers can pay less, but get more. Communication is no longer tethered to a specific device or location. Workers can take their work phone home to spend more time with loved ones. Our armed forces can video conference with families back home--no longer having to choose between serving their families or serving their country. Free downloadable software keeps far-flung families connected, and enables children to learn a foreign language and doctors the latest medical procedures from experts around the globe. By disconnecting voice from the underlying infrastructure, voice innovation can now take place at Internet speed. Many of the great benefits of VoIP to consumers and business users depend on accurate and non-misleading identification of the calling party. If I program my VoIP service to ensure that calls from my son's school are simultaneously rung on all of my phones, I don't want to answer it and find out that some telemarketer has spoofed the number to fool me into believing it is a priority call. And businesses that use caller ID to call up a customer's account record so that it is immediately available to the customer service representative won't find the record very useful if it is the wrong record because the caller ID has been spoofed. To protect the usefulness of their services, VoIP providers have a strong interest in having caller ID be accurate and nonmisleading. The VON Coalition has been at the forefront of promoting best practices to enable consumers to protect their personal data. For instance, the Coalition moved early to adopt and post consumer guidelines for protecting billing records. Since then, businesses that control personal data, consumers, and the IP industry have taken significant steps to self police fraudulent access to personal data. The VON Coalition agrees with previously presented Congressional testimony that callerID fraud perpetrators must be penalized. Strong action must be taken against those that intentionally spoof caller ID with the intent to commit fraud, deceive, harass or otherwise create threats to life and limb. Law enforcement should have the tools to protect U.S. citizens from criminals fraudulently manipulating phone numbers to engage in identity theft to commit financial crimes. Similarly, criminals that modify caller ID to commit other crimes, such as harassing or stalking victims, should be prosecuted swiftly and effectively. Spoofing to defraud or harass, or for unlawful commercial gain cannot and should not ever be condoned or tolerated. Congress is right to focus its attention on those who would do so. As Congress addresses deceptive spoofing, we urge you to keep in mind that the ability to change caller ID information-- where the purpose is not to fraudulently mislead or deceive-- has the potential to offer consumers a transformative communications experience. Policy makers must carefully balance the goal of thwarting harmful behavior with the public interest imperative to ensure that innovation flourishes and applications and services delivered over broadband are available to all Americans. The ability of consumers to control various aspects of their communications experience presents exciting opportunities for the disabled, offers unsurpassed privacy protection, and enables businesses and consumers to communicate in increasingly efficient and powerful ways. The ``Truth in Caller ID Act of 2007'' as written, effectively balances these two important objectives-- by facilitating prosecution of the fraud, while not thwarting or prohibiting innovative tools that have legitimate consumer empowering benefits. The bill recognizes, for example, that law enforcement may need to mask the true identity of an originating telephone number. This is not the only legitimate need to change caller ID information. I'd like to share five examples:First, VoIP services offer tremendous potential for persons with disabilities to communicate more effectively. VoIP integrates the phone, voice mail, audio conferencing, e- mail, instant messaging, and Web applications on one secure, seamless network. Workers can use their PC, laptop, or handheld as a VoIP phone from virtually anywhere, with the same phone number, which benefits telecommuters, including those whose mobility is impaired and must work from home. One recent Web- based application permits users to call any phone number in the US or Canada and the service reads to the called party the message that the originating user inputs into the Web-based form. Users of the application who are speech impaired can now send voice messages simply by providing a phone number to dial and their own caller ID. Similarly, blind users can now take advantage of instant messaging services where previously they would have been precluded from doing so because of sight limitations. Importantly, the user can input her home, mobile, or office phone number, regardless of where the user is located (or where the call originates) when she sends the message, something that would be prohibited by legislation that criminalizes any change in caller ID without a reference to intent. Second, one of the benefits of VoIP is that it can help a consumer better protect his own privacy and manage which of his personal information he presents to the world, irrespective of which communications device he utilizes to initiate a call. Consumers may want to direct return calls to a home or business landline, rather than a wireless number, for example. Calls for different purposes (personal versus business) may merit different telephonic return addresses, as one might do with ordinary mail. For instance, Web sites that allow consumers to post solicitations for lawful commercial purposes may also permit consumers to provide a temporary call back number that is different from their assigned caller ID. This beneficial privacy service may require a legitimate change in caller ID. One service explains the application in this way: ``The desire to communicate can not be crippled by concerns about privacy. [This application] unleashes the true potential of a global community by making it a safer place.'' While these applications manipulate caller ID, they do so for privacy protection and security. The VON Coalition does not sanction masquerading as another for fraudulent or deceitful purposes. Third, there are some situations in which caller ID information can endanger individual safety. The classic situation is the battered spouse. In some instances, blocking the delivery of caller ID information might be sufficient. However, because technological innovations permit users to ``unblock'' caller ID, any legislation, as well as law enforcement authorities, should be careful about presuming that blocking will always be adequate. Fourth, certain new communication services do not organically generate or transmit a traditional caller ID, but in order to connect to the public telephone network, the service may need to insert something that looks like a traditional phone number. Many of these innovative services, which offer tremendous new ways to communicate, do not utilize the same numbering and labeling practices as yesterday's phone services and should not be deemed illegitimate simply because the technology permits the caller ID to be changed. Users without traditional telephone numbers, users with several numbers, users wanting to move numbers to their calling device and network of choice--these users are all potentially affected by technology that decouples devices from the caller ID that effectively used to be the address of the phone, and such users do not intend to defraud or cause harm. H.R. 251 appropriately focuses on the right class of services. A final, exciting application that I will share with you today is the ability for consumers to make click to dial calls while viewing broadband-based content such as IP-TV. Utilizing such an application, a viewer can click a single button on his standard TV remote control and pull up a menu that offers a variety of products and services--ranging from news, games, fantasy sports scores, traffic, shopping, and entertainment, to billing applications. From there, the viewer can locate a business of interest in the area and can then click on a button that enables the viewer to speak to the local business through a VoIP connection. Although the call technically originates through the VoIP service provider, the viewer can input his own caller ID for call-back purposes. Such innovative and rich communications experiences should not be eliminated through overly broad legislation or regulation. I'd like to close with three additional thoughts. First, spoofing of caller ID is not new. Tools have been widely available for years to spoof caller ID on traditional networks. One method, sometimes referred to as Orangeboxing, offers the ability to spoof caller ID using a downloadable sound and a common tape recorder. Moreover, many large businesses operating a PBX system have, for quite some time, ``spoofed'' caller ID so that it appears as if all calls originating on the PBX come from the same central number. Second, fighting fraudulent and deceptive changes in caller ID is only part of the solution. Companies handling sensitive customer information must also make sure they are handling that information with care. While caller ID can help a business retrieve a customer's account record, as long as caller ID can technically be spoofed (which will be the case even with new legislation) the business needs to handle disclosure of those records with the utmost care-- making consumer privacy their top priority. One security expert explained the technology is not to blame for the fraudulent use. Society is. Society has grown far too reliant on caller ID as a form of identification. Both individuals and corporate America use caller ID to decide whom to trust. Unfortunately, too many individuals have suffered because of this misplaced trust. As Chairman Dingell and Ranking Member Barton recognized in introducing ``The Prevention of Fraudulent Access to Phone Records Act'' to prohibit pretexting of phone records and to enhance security requirements for customer proprietary network information, it is incumbent upon companies that are entrusted with personal information to do more to protect the privacy and security of their customers. Third, misleading people through the misuse of caller ID, whether for a prank, a scam, or worse, is unacceptable. This committee is right to focus on those who intend to mislead. At the same time, though, legislation should not impose liability on traditional carriers and VoIP services providers who merely transmit what may turn out to be fraudulently altered caller ID information. Policy makers should not be mislead into believing that technology innovators are to blame for criminal behavior. Networks and network service providers may be unable and should not be required to become ``content police'' or to discern legitimate and illegitimate uses of network services. Instead, service providers are best able to assist in the efforts to fight spoofing by keeping accurate records and making those records available, as appropriate, to proper authorities. In focusing on those few people who would abuse caller ID technology, Congress can address the very real problem of deceptive spoofing effectively, in a cost-efficient manner that protects the proper use of this technology, and enables competitive and transformative innovation. VoIP service providers, who have made real strides in leveraging the power of the Internet and caller ID to provide robust services to consumers, fully support measures to protect the integrity of caller ID functionality. Together with this Committee's efforts, the proliferation of VoIP services will create unsurpassed opportunities for consumers and even greater growth in broadband services. The VON Coalition believes that VoIP is positioned to help make communicating more affordable, businesses more productive, jobs more plentiful, the Internet more valuable, and Americans more safe and secure. Thank you very much. I am happy to answer any questions.