[House Hearing, 109 Congress] [From the U.S. Government Publishing Office] HEARINGS BEFORE THE SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS OF THE COMMITTEE ON ENERGY AND COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION APRIL 4, APRIL 6, AND MAY 3, 2006 Serial No. 109-126 Printed for the use of the Committee on Energy and Commerce Available via the World Wide Web:http://www.access.gpo.gov/congress/house U.S. GOVERNMENT PRINTING OFFICE WASHINGTON : 2006 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 COMMITTEE ON ENERGY AND COMMERCE Joe Barton, Texas, Chairman Ralph M. Hall, Texas John D. Dingell, Michigan Michael Bilirakis, Florida Ranking Member Vice Chairman Henry A. Waxman, California Fred Upton, Michigan Edward J. Markey, Massachusetts Cliff Stearns, Florida Rick Boucher, Virginia Paul E. Gillmor, Ohio Edolphus Towns, New York Nathan Deal, Georgia Frank Pallone, Jr., New Jersey Ed Whitfield, Kentucky Sherrod Brown, Ohio Charlie Norwood, Georgia Bart Gordon, Tennessee Barbara Cubin, Wyoming Bobby L. Rush, Illinois John Shimkus, Illinois Anna G. Eshoo, California Heather Wilson, New Mexico Bart Stupak, Michigan John B. Shadegg, Arizona Eliot L. Engel, New York Charles W. "Chip" Pickering, Mississippi Albert R. Wynn, Maryland Vice Chairman Gene Green, Texas Vito Fossella, New York Ted Strickland, Ohio Roy Blunt, Missouri Diana DeGette, Colorado Steve Buyer, Indiana Lois Capps, California George Radanovich, California Mike Doyle, Pennsylvania Charles F. Bass, New Hampshire Tom Allen, Maine Joseph R. Pitts, Pennsylvania Jim Davis, Florida Mary Bono, California Jan Schakowsky, Illinois Greg Walden, Oregon Hilda L. Solis, California Lee Terry, Nebraska Charles A. Gonzalez, Texas Mike Ferguson, New Jersey Jay Inslee, Washington Mike Rogers, Michigan Tammy Baldwin, Wisconsin C.L. "Butch" Otter, Idaho Mike Ross, Arkansas Sue Myrick, North Carolina John Sullivan, Oklahoma Tim Murphy, Pennsylvania Michael C. Burgess, Texas Marsha Blackburn, Tennessee Bud Albright, Staff Director David Cavicke, General Counsel Reid P. F. Stuntz, Minority Staff Director and Chief Counsel __________ SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS Ed Whitfield, Kentucky, Chairman Cliff Stearns, Florida Bart Stupak, Michigan Charles W. "Chip" Pickering, Mississippi Ranking Member Charles F. Bass, New Hampshire Diana DeGette, Colorado Greg Walden, Oregon Jan Schakowsky, Illinois Mike Ferguson, New Jersey Jay Inslee, Washington Michael C. Burgess, Texas Tammy Baldwin, Wisconsin Marsha Blackburn, Tennessee Henry A. Waxman, California Joe Barton, Texas John D. Dingell, Michigan (Ex Officio) (Ex Officio) CONTENTS Page Hearings held: April 4, 2006................................................. 1 April 6, 2006................................................. 238 May 3, 2006................................................... 423 Testimony of: Cooper, Sharon W., Developmental and Forensic Pediatrics, PA, Department of Pediatrics, University of North Carolina Chapel Hill................................................ 17 Berry, Justin................................................. 75 Eichenwald, Kurt, Reporter, The New York Times................ 85 Allen, Ernie, President and Chief Executive Officer, National Center for Missing and Exploited Children.................... 126 Aftab, Parry, Executive Director, WiredSafety................. 144 Schroeder, Teri L., President/Program Director, i-SAFE America 187 Sullivan, Shannon, Teen Angel, WiredSafety.................... 201 Mercer, William W., United States Attorney for the District of Montana; Principal Associate Deputy Attorney General, United States Department of Justice.......................... 256 Swecker, Chris, Acting Assistant Executive Director, Federal Bureau of Investigation, United States Department of Justice...................................................... 268 Kardasz, Dr. Frank, Sergeant, Phoenix Police Department; Project Director, Arizona Internet Crimes Against Children Task Force, United States Department of Justice 275 Waters, Flint, Lead Special Agent, Wyoming Division of Criminal Investigation, Internet Crimes Against Children Task Force Technology Center, United States Department of Justice................................................... 285 Clark, John P., Deputy Assistant Secretary, United States Immigration and Customs Enforcement, United States Department of Homeland Security......................................... 290 Kezer, William E., Deputy Chief Inspector, United States Postal Inspection Service........................................... 295 Weeks, Grier, Executive Director, National Association to Protect Children............................................. 347 Allen, Masha.................................................. 444 Grace, Nancy, CNN Nancy Grace................................. 449 Fisher, Hon. Alice S., Assistant Attorney General, Criminal Division, United States Department of Justice................ 470 Roldan, Raul, Section Chief, Cyber Crime Section, Cyber Division, Federal Bureau of Investigation, United States Department of Justice........................................ 487 Additional material submitted for the record: Kezer, William E., Deputy Chief Inspector, United States Postal Inspection Service, response for the record........... 409 Waters, Flint, Lead Special Agent, Wyoming Division of Criminal Investigation, Internet Crimes Against Children Task Force Technology Center, United States Department of Justice, response for the record..................................... 411 Swecker, Chris, Acting Assistant Executive Director, Federal Bureau of Investigation, United States Department of Justice, response for the record...................................... 412 Kardasz, Dr. Frank, Sergeant, Phoenix Police Department; Project Director, Arizona Internet Crimes Against Children Task Force, United States Department of Justice, response for the record................................................... 417 Plitt, James, Director, Cyber Crimes Center, Office of Investigations, United States Immigration and Customs Enforcement, United States Department of Homeland Security, response for the record...................................... 421 Weeks, Grier, Executive Director, National Association to Protect Children, response for the record.................... 422 Fisher, Hon. Alice S., Assistant Attorney General, Criminal Division, United States Department of Justice, response for the record................................................... 582 Marsh, James R., Esq., response for the record................ 585 Allen, Faith, response for the record......................... 616 Roldan, Raul, Section Chief, Cyber Crime Section, Cyber Division, Federal Bureau of Investigation, United States Department of Justice, response for the record............... 618 SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET: WHAT PARENTS, KIDS AND CONGRESS NEED TO KNOW ABOUT CHILD PREDATORS TUESDAY, APRIL 4, 2006 House of Representatives, Committee on Energy and Commerce, Subcommittee on Oversight and Investigations, Washington, DC. The committee met, pursuant to notice, at 10:06 a.m., in Room 2123 of the Rayburn House Office Building, Hon. Ed Whitfield (Chairman) presiding. Members present: Representatives Walden, Ferguson, Burgess, Blackburn, Barton (ex officio), Whitfield, and Stupak. Staff present: Mark Paoletta, Chief Counsel for Oversight and Investigations; Alan Slobodin, Deputy Chief Counsel for Oversight and Investigations; Kelli Andrews, Counsel; Karen Christian, Counsel; Michael Abraham, Legislative Clerk; Edith Holleman, Minority Counsel; and David Nelson, Minority Investigator/ Economist. Mr. Whitfield. I would like to call this hearing to order. Today�s subject of our hearing is "Sexual Exploitation of Children Over the Internet: What Parents, Kids and Congress Need to Know About Child Predators." Today, we are going to have five panels of witnesses on this very important subject matter. The first panel which we will introduce a little bit later, will be Sharon Cooper who is with the Developmental and Forensic Pediatrics for the Department of Pediatrics at the University of North Carolina Chapel Hill. I welcome all of you here today and this will be the first of several hearings on issues relating to the sexual exploitation of children over the Internet. Today�s hearing aims to protect our children�s--if you will excuse me one minute. May I have a glass of water? Today�s hearing aims to protect our Nation�s children by putting a spotlight on how parents and children can better In the early 1990s, before the advent of the Internet, it seemed in the United States that commercial child pornography was on the decline. This was due to several factors, especially several U.S. Supreme Court decisions that removed any first amendment protection for the possession or distribution of child pornography. These decisions were coupled with aggressive law enforcement efforts primarily targeting the U.S. mail system, which was the means of transporting these images. Unfortunately, the Internet reversed this trend. With the growing use of the Internet, the number of child predators who seek to make, distribute, and view images of children being sexually abused continues to skyrocket. This is due to the anonymity, accessibility, and ease with which child predators can operate on the Internet. The extent of the problem is staggering. Some examples of statistics that our witnesses today at the hearing will discuss more fully include: one in five children report being sexually solicited over the Internet and only 25 percent of those children that are sexually solicited online tell their parents; 3.5 million images of child sexual exploitation over the Internet have been identified in the United States alone. The commercial enterprise of online child pornography is estimated in 2005 to be approximately $20 billion, and it is an industry on the rise. The National Center for Missing and Exploited Children receives approximately 1,500 tips a week on its cyber tip line about suspected online child pornography. Child predators that are found in possession of child pornography typically have thousands of images of sexual abuse of children on their computers. In my own State of Kentucky, a man was arrested last month and, according to a press release, agents from the immigration and customs enforcement reportedly discovered over 400,000 images of child pornography on his computers. Thinking about the number of children that were abused in order to create all of those images is sickening and intolerable. We must do everything possible to stop it. I want to particularly thank all of our witnesses today for appearing before the subcommittee. We appreciate your taking the time to speak to us about an important issue concerning our most vulnerable citizens, and that is our children. You will hear today from a young man named Justin Berry and he will tell a story about his experience in this horrible world of online child exploitation. He will also talk to us about how he received a free webcam and was preyed upon and exploited by child predators. I believe Mr. Berry is brave to come forward and speak publicly to this subcommittee about matters that are very personal to him and painful for him to even talk about. Justin, we appreciate your willingness to share your experiences with us, as well as, with parents and children around the country who may learn some valuable lessons from your story. We will also hear from Mr. Kurt Eichenwald, who as a New York Times reporter exposed this world that captures children like Justin. Mr. Eichenwald feels so strongly about the dangers he has uncovered that he has taken the extraordinary step to come to testify about how readily available this material is over the Internet. He will provide a firsthand account of how predators lure and manipulate children over the Internet. In addition, I would like to thank Dr. Sharon Cooper who as I said, is on the first panel. She altered her travel plans for a trip to Germany in order to be here and testify today. I believe your testimony will be invaluable in helping us understand what happens to children like Justin who fall victim to these predators and what the modus operandi of these predators are so parents and children can keep a watchful eye. We appreciate you making a special effort to be here. Today we will also here testimony from Mr. Ernie Allen from the National Center for Missing and Exploited Children. Mr. Allen and his staff at the center have done a phenomenal job of working to keep children safe. We look forward to hearing about the Center�s role as a clearinghouse for tips regarding child pornography over the Internet by way of their cyber tip line, as well as future plans they have to help stem the tide of child sexual exploitation over the Internet. I believe the one valuable lesson that can come out of this hearing is that parents, children, and of course Members of Congress become well versed in what the cyber tip line is and how and when to use it. On our last panel, I am very happy to say, we have representatives from WiredSafety and i-SAFE America to tell us more about how they promote safety over the Internet for children. We are also interested in hearing first hand from your teenage witness, who is a Teen Angel from WiredSafety and an I Mentor for i-SAFE America, on how they communicate Internet safety to their peers. I must note that we also have today a witness who was subpoenaed by the full committee to appear to testify. His name is Ken Gourlay from Michigan. We will hear more about why Mr. Gourlay is here through Justin�s testimony. I have been advised that Mr. Gourlay intends to invoke his Fifth Amendment privilege against self-incrimination and will decline to answer the subcommittee�s questions, but we are hopeful maybe he will decide to speak, because it is critical that we confront his explanation for his actions. At Thursday�s hearing, we are going to be focusing on the U.S. law enforcement�s efforts devoted to eradicating the sexual exploitation of children over the Internet and learn more about the challenges facing law enforcement in this area. [The prepared statement of Hon. Ed Whitfield follows:] Prepared Statement of the Hon. Ed Whitfield, Chairman, Subcommittee on Oversight and Investigations GOOD MORNING. TODAY THE SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS HOLDS THE FIRST OF SEVERAL HEARINGS ON ISSUES RELATING TO THE SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET. TODAY�S HEARING AIMS TO PROTECT OUR NATION�S CHILDREN BY PUTTING A SPOTLIGHT ON HOW PARENTS AND CHILDREN CAN BETTER EDUCATE THEMSELVES ABOUT THE DANGERS OF CHILD PREDATORS ON THE INTERNET. IN SO DOING, WE WILL HEAR THE STORY ABOUT ONE CHILD�S EXPERIENCE IN THIS HORRIBLE WORLD OF ON-LINE CHILD EXPLOITATION. AND, WE WILL LEARN HOW THE INTERNET HAS FUELED THE HIGHLY LUCRATIVE BUSINESS OF SELLING SEXUALLY ABUSIVE IMAGES OF CHILDREN AROUND THE WORLD. IN THE EARLY 1990�S, BEFORE THE ADVENT OF THE INTERNET, IT SEEMED IN THE UNITED STATES, COMMERCIAL CHILD PORNOGRAPHY WAS ON THE DECLINE. THIS WAS DUE TO SEVERAL FACTORS-ESPECIALLY SEVERAL U.S. SUPREME COURT DECISIONS THAT REMOVED ANY FIRST AMENDMENT PROTECTION FOR THE POSSESSION OR DISTRIBUTION OF CHILD PORNOGRAPHY. THESE DECISIONS WERE COUPLED WITH AGGRESSIVE LAW ENFORCEMENT EFFORTS PRIMARILY TARGETING THE U.S. MAIL SYSTEM, WHICH WAS THE MEANS OF TRANSPORTING THESE IMAGES. UNFORTUNATELY, THE INTERNET REVERSED THIS TREND. WITH THE GROWING USE OF THE INTERNET, THE NUMBER OF CHILD PREDATORS WHO SEEK TO MAKE, DISTRIBUTE AND VIEW IMAGES OF CHILDREN BEING SEXUALLY ABUSED CONTINUES TO SKYROCKET. THIS IS PRIMARILY DUE TO THE ANONYMITY, ACCESSIBILITY AND EASE WITH WHICH THESE CHILD PREDATORS CAN OPERATE ON THE INTERNET. THE EXTENT OF THE PROBLEM IS STAGGERING. HERE ARE SOME EXAMPLES OF STATISTICS THAT OUR WITNESSES AT THE HEARING WILL DISCUSS MORE FULLY: 1 IN 5 CHILDREN REPORT BEING SEXUALLY SOLICITED OVER THE INTERNET. AND ONLY 25% OF THOSE CHILDREN THAT ARE SEXUALLY SOLICITED ON-LINE TELL THEIR PARENTS. 3.5 MILLION IMAGES OF CHILD SEXUAL EXPLOITATION OVER THE INTERNET HAVE BEEN IDENTIFIED_IN THE UNITED STATES ALONE. THE COMMERCIAL ENTERPRISE OF ON-LINE CHILD PORNOGRAPHY IS ESTIMATED, IN 2005, TO BE APPROXIMATLEY $20 BILLION U.S. DOLLARS. IT IS AN INDUSTRY ON THE RISE. THE NATIONAL CENTER FOR MISSING AND EXPLOITED CHILDREN GETS APPROXIMATELY 1,500 TIPS A WEEK ON ITS CYBERTIPLINE ABOUT SUSPECTED ON-LINE CHILD PORNOGRAPHY. CHILD PREDATORS THAT ARE FOUND IN POSSESSION OF CHILD PORNOGRAPHY TYPICALLY HAVE THOUSANDS OF IMAGES OF SEXUAL ABUSE OF CHILDREN ON THEIR COMPUTERS. IN MY HOME STATE OF KENTUCKY, A MAN WAS ARRESTED LAST MONTH AND, ACCORDING TO A PRESS RELEASE, AGENTS FROM THE IMMIGRATION AND CUSTOMS ENFORCEMENT REPORTEDLY DISCOVERED OVER 400 THOUSAND IMAGES OF CHILD PORNOGRAPHY IN HIS COMPUTERS. THINKING ABOUT THE NUMBER OF CHILDREN THAT WERE ABUSED IN ORDER TO CREATE ALL OF THOSE IMAGES IS SICKENING AND INTOLERABLE. THIS MUST BE STOPPED. TODAY WE WILL HEAR FROM SEVERAL PANELS OF WITNESSES WHO WILL HELP US CONFRONT THESE UNSETTLING FACTS AND PROVIDE INFORMATION ABOUT WHAT WE CAN DO ABOUT IT. I WANT TO THANK ALL OF THE WITNESSES APPEARING BEFORE THE SUBCOMMITTEE TODAY. WE APPRECIATE YOUR TAKING THE TIME TO SPEAK TO US ABOUT SUCH AN IMPORTANT ISSUE CONCERNING OUR MOST VULNERABLE CITIZENS-OUR CHILDREN. WE WILL HEAR TODAY FROM MR. JUSTIN BERRY. MR. BERRY WILL TELL US HIS ALARMING STORY ABOUT HOW A 13 YEAR OLD GETS A FREE WEBCAM AND IS PREYED UPON AND EXPLOITED BY CHILD PREDATORS. I BELIEVE MR. BERRY IS EXTREMELY BRAVE TO COME FORWARD AND SPEAK PUBLICLY TO THIS SUBCOMMITTEE ABOUT MATTERS THAT ARE VERY PERSONAL TO HIM AND PAINFUL FOR HIM TO TALK ABOUT. WE APPRECIATE YOUR WILLINGNESS, JUSTIN, TO SHARE YOUR EXPERIENCE WITH US-AS WELL AS WITH PARENTS AND KIDS AROUND THE COUNTRY WHO MAY LEARN SOME LESSONS FROM YOUR STORY. WE WILL ALSO HEAR FROM MR. KURT EICHENWALD, WHO, AS A NEW YORK TIMES REPORTER, EXPOSED THIS WORLD THAT CAPTURES CHILDREN LIKE JUSTIN. MR. EICHENWALD FEELS SO STRONGLY ABOUT THE DANGERS HE HAS UNCOVERED THAT HE HAS TAKEN THE EXTRAORDINARY STEP TO COME TO TESTIFY ABOUT HOW READILY AVAILABLE THIS DISGUSTING MATERIAL IS OVER THE INTERNET. HE WILL PROVIDE A FIRST HAND ACCOUNT OF HOW THESE PREDATORS LURE AND MANIPULATE CHILDREN OVER THE INTERNET. IN ADDITION, I WOULD LIKE TO THANK DR. SHARON COOPER, WHO WILL APPEAR ON THE FIRST PANEL, FOR ALTERING HER TRAVEL PLANS TO GERMANY IN ORDER TO BE ABLE TO TESTIFY TODAY. I BELIEVE YOUR TESTIMONY WILL BE INVALUABLE IN HELPING US UNDERSTAND WHAT HAPPENS TO CHILDREN LIKE JUSTIN WHO FALL VICTIM TO THESE PREDATORS AND WHAT THE MODUS OPERANDI OF THESE PREDATORS ARE-SO PARENTS AND KIDS CAN KEEP A WATCHFUL EYE. TODAY WE WILL ALSO HEAR TESTIMONY FROM MR. ERNIE ALLEN, FROM THE NATIONAL CENTER FOR MISSING AND EXPLOITED CHILDREN. MR. ALLEN AND HIS STAFF AT THE CENTER HAVE DONE A PHENOMENAL JOB WORKING TO KEEP OUR CHILDREN SAFE. THE CENTER HAS BEEN ENORMOUSLY HELPFUL TO COMMITTEE STAFF ON MANY ISSUES RELATED TO THIS INVESTIGATION AND WE CAN�T THANK THEM ENOUGH. I LOOK FORWARD TO HEARING ABOUT THE CENTER�S ROLE AS A CLEARINGHOUSE FOR TIPS REGARDING CHILD PORNOGRAPHY OVER THE INTERNET VIA THEIR CYBERTIPLINE -- AS WELL AS FUTURE PLANS THEY HAVE TO HELP STEM THE TIDE OF CHILD SEXUAL EXPLOITATION OVER THE INTERNET. I BELIEVE ONE VALUABLE LESSON THAT CAN COME OUT OF THIS HEARING IS THAT PARENTS, KIDS AND OF COURSE MEMBERS OF CONGRESS BECOME WELL VERSED IN WHAT THE CYBERTIPLINE IS - AND HOW AND WHEN TO USE IT. ON OUR LAST PANEL, I AM VERY GLAD TO HAVE REPRESENTATIVES FROM WIRED SAFETY AND I SAFE AMERICA TO TELL US MORE ABOUT HOW THEY PROMOTE SAFETY OVER THE INTERNET FOR CHILDREN. WE ARE ALSO INTERESTED IN HEARING FIRST HAND FROM YOUR TEENAGE WITNESSES "A TEEN ANGEL FROM WIRED SAFETY AND AN I-MENTOR FROM I SAFE AMERICA" ON HOW THEY COMMUNICATE INTERNET SAFETY TO THEIR PEERS. I MUST NOTE THAT WE ALSO HAVE TODAY A WITNESS WHO WAS SUBPOENED BY THE FULL COMMITTEE TO APPEAR TO TESTIFY. HIS NAME IS KEN GOURLAY FROM MICHIGAN. WE WILL HEAR MORE ABOUT WHY MR. GOURLAY IS HERE THROUGH JUSTIN�S TESTIMONY. I HAVE BEEN ADVISED THAT MR. GOURLAY INTENDS TO INVOKE HIS FIFTH AMENDMENT PRIVILEGE AGAINST SELF-INCRIMINATION AND WILL DECLINE TO ANSWER THE SUBCOMMITTEE�S QUESTIONS. YET I AM HOPEFUL HE WILL DECIDE TO SPEAK, BECAUSE IT IS CRITICAL THAT WE CONFRONT HIS EXPLANATION FOR HIS ACTIONS. WE HAVE A LOT OF GROUND TO COVER. LET ME KNOTE THAT, AT THURSDAY�S HEARING, WE WILL FOCUS ON THE U.S. LAW ENFORCEMENT EFFORTS DEVOTED TO ERADICATING THE SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET AND LEARN MORE ABOUT THE CHALLENGES FACING OUR LAW ENFORCEMENT EFFORT IN THIS AREA. I NOW TURN TO THE RANKING MEMBER, MR. STUPAK FOR HIS OPENING STATEMENT. Mr. Whitfield. I now turn to the Ranking Member of the subcommittee, Mr. Stupak of Michigan, for his opening statement. Mr. Stupak. Thank you, Mr. Chairman and thank you for holding this hearing. This investigation is certainly among the most important conducted by the Oversight and Investigations Subcommittee. I feel most Americans have no idea of the dimension of the problem. Because of the anonymity provided by the Internet and because of the marketing potential of the Internet, children that are being exploited, manipulated, and violated and whose lives and images of the predatory practice are digitized, displayed, and transmitted instantly around the world in astonishing numbers. The statistics as you said, Mr. Chairman, are shocking. One in five children report receiving a sexual solicitation over the Internet. Today there are over 3.5 pornographic images of American children in circulation on the Internet. The sale of these images over the Internet brought in $20 billion to traffickers in 2004. To compare, music sales over the same period were just $3 billion. This $20 billion was spent to view photographs and videos of children being raped and tortured. Since 2004, the child exploitation industry has only grown. The images have become more graphic as video capabilities have expanded and the content of those videos have become more heinous. Who are these children that are solicited and abused? It is the little children who make up the vast majority of the victims of child pornography. Over 90 percent of arrested children pornographers possess images of children under age 12. Forty percent have pictures or videos of children under the age of six, and almost 20 percent possess images of children less than three years of age. A couple of weeks ago, the Attorney General announced a Customs bust that involved among other crimes the portrayal of a rape of an 18 month old girl. Who produced this most sickening material? The National Center for Missing and Exploited Children will tell us that 80 percent of all child pornography is produced by parents, other relatives, or family members. Every American parent should know what we will hear today. Parents need to learn and teach their children tools to protect themselves against these predators. Hopefully, today�s hearing will reduce the unmonitored use of web cameras, picture phones, and other equipment that enable these people to prey on and abuse our children. Today we will also hear the tragic story of Justin Berry. It is a story of the seduction and sexual abuse of a 13-year-old boy who was led on a pornographic exploitation, multiple molestations, and drug use, all of which were a constant reality in his life for 5 years. We will learn how adults, as well as Justin himself made money from Justin�s online performances. One of the accused molesters is under subpoena to appear before us today and he will I understand he will evoke his Fifth Amendment right not to testify. Justin Berry could have a very different life had there been no Internet connection in his room. The chat rooms which are a magnet where these twisted minds can congregate and exploit our children. Unfortunately, just as the Internet has changed just about every aspect of our lives, it has also virtually eliminated the barriers that once discouraged child pornography. The National Center for Missing and Exploited Children and similar crime operations at the International Customs Enforcement and the FBI do wonderful work with a handful of agents and tech specialists. We will hear about their efforts at a hearing we have scheduled for Thursday. Still our law enforcement can do better. Justin believes that there has been an ineffective response by the Justice Department to prosecute the persons who paid to watch his websites. Questions have been raised about the low number of prosecutions in the United States. For example, in one of the larger busts involving effective work for law enforcement in the U.S., Australia, and other countries, there is confirmed information that 21,000 Americans had paid to subscribe to websites that saved images of the sexual exploitation of children. Nine hundred Australians were similarly identified. As of the end of this past year, some 338 convictions have been obtained in the U.S. while some 500 arrests or convictions or expected convictions have been made in Australia, a country with a legal system as protective of individual rights as ours. I want to know why we conduct less than 2 percent of these voyeurs of child sexual violence while the Australian authorities can put away 55 percent. What I do know is that the lack of prosecution threatens all of our children to have over 20,000 of these criminals walking free amongst us with the knowledge that even when police identify them they are unlikely to be prosecuted only encourages further actions of exploitation. I also know that as we reorganize our telecom industry which transmits images and messages so efficiently over the Internet, we should also hold those that make billions of dollars from the data of image transmission accountable to eliminate those images of sexually violated children; take the profit and communications away and the problem will shrink proportionately. The bottom line is that the darkest side of the Internet can invade any American home. Given the shortage of resources for law enforcement to adequately protect our children and the lack of will by Internet providers to police themselves, parents and children must be vigilant. With that, Mr. Chairman, I would yield back the balance of my time. Mr. Whitfield. Thank you, Mr. Stupak. At this time, I recognize the Chairman of the Full Committee, Mr. Barton of Texas, for his opening statement. Chairman Barton. Thank you, Chairman Whitfield, for holding this hearing. I have three grown children, two teenage stepchildren, three grandchildren, and an infant son who is seven months old. Of all the hearings that we have done in all the years that I have been on this committee and this subcommittee, which is over 20 years, I have never been more revolted in preparing for a hearing than in reading the materials I have had to read for this one. My mind simply cannot conceive of a parent exploiting their own children for profit for sexual purposes and I cannot conceive of anyone in this universe wanting to perform, or watch performed, sexual acts on an infant. I simply cannot comprehend that. Yet that is what we are here today to investigate. Child pornography is apparently a multi-billion--my staff analysis says $20 billion a year business. In spite of all the rhetoric, I will not say we are doing nothing, as that is not fair to our law enforcement agencies and all the groups here that are trying to help, but we are doing very little to counteract it and everyone agrees that it is a growing problem. What kind of society do we have if we cannot protect infants from sexual exploitation? One of the agency�s material shows that almost half of the incidents of sexual exploitation of children are by family members. What kind of family is that? I just cannot understand it. So, I believe this is one that you can expect the subcommittee and the full committee, if we need to, to do everything possible, and I mean everything. Not just hold hearings, but if we need legislation, if we need to go to our Federal law enforcement agencies that have tended to not treat this as seriously as they should; whatever we need to do on a bipartisan basis, we are going to do. I think I am a tolerant person and I am appalled, I mean absolutely appalled at what is happening on the Internet with regards to sexual exploitation of the children of the United States, and the children of the world. So I am very appreciative of the staff�s work on both sides of the aisle, and very appreciative of Mr. Stupak and Mr. Whitfield�s personal involvement. I am very, very supportive of doing whatever we can to really turn the tide on this. And with that, Mr. Chairman, I ask that my formal statement be considered in the record and I yield back. [The prepared statement of Hon. Joe Barton follows:] Prepared Statement of the Hon. Joe Barton, Chairman, Committee on Energy and Commerce Thank you, Chairman Whitfield for holding this hearing on the sexual exploitation of children over the Internet. As Justice Brandeis wrote, "sunlight is said to be the best disinfectant." If there was ever a case for sunlight and disinfecting, it is the toxic world of online child pornography. Child porn is a $20 billion a year business, and it is growing daily on the Internet. The more you know about it, the more revolted you become. There are accounts of children "some as young as eighteen months old" being raped on camera for profit. Less than a month ago, based on an investigation by agents from United States Immigration and Custom Enforcement and international law enforcement, 27 people in the United States and abroad were charged with trafficking in pornography. Among their alleged crimes were the production of live, pay-per-view molestations of children which were carried over the Internet by streaming video. These are actions so repugnant that they are difficult for the mind to even acknowledge, much less grasp and consider. With the ability to post and trade images anonymously over the Internet, current estimates indicate that there are three million images of child pornography on the Internet today. While law enforcement is working to tackle this epidemic of abuse, their resources are taxed as an endless supply of child pornography is pumped into the Internet by individuals around the globe. No one wants to believe that predator�s abuse and torture children and sell or swap the pictures of that abuse. We do not like to think that even though our children have been warned by about strangers, children are still logging onto the Internet and meeting strangers child predators and pedophiles. But according to one estimate, one in five children report that they have received a sexual solicitation over the Internet. It is because this problem is so horrific that we need to know more about it. Our nation�s parents, children, and educators need to know exactly what dangers are lurking on the Internet. They need to appreciate how serious this problem is so that they can prepare their children for what "or who" is waiting for them online. One of our witnesses today, Justin Berry, will speak personally to the horrors of child sexual exploitation on the Internet and its impact on its victims. Justin�s life is a terrible lesson to every parent and child in America. It began when Justin went online to meet and communicate with other children his age. Instead, he was greeted almost immediately by child predators who, by pretending to be his friends, convinced him to engage in sexual acts. First it was through a webcam, and then it was in person. Again, at the encouragement of these predators, Justin turned these performances into an online pornography business. Justin, I want to thank you for appearing here today to tell your story. I know it must be painful to talk about your involvement in the pornography industry and the abuse you suffered. I hope that your story might prevent others from following your path or convince a victim to seek help. With Justin today is New York Times Reporter Kurt Eichenwald, who, when researching an story on cyber fraud, found Justin�s websites and eventually persuaded Justin to seek help. Justin credits Mr. Eichenwald as being the person who rescued him from the world of child pornography. Today�s testimony will shine a bright light on a business that has flourished in the dark corners of the Internet. I hope that what the public learns today will help children to recognize a child predator if they meet one online. Finally, by speaking frankly about the impact of child pornography on its victims, this hearing will make plain that parents, educators, law enforcement, and lawmakers must make every effort to protect our children and put an end to an industry that profits from the abuse and degradation of children. I look forward to hearing from the witnesses and yield back the balance of my time. Mr. Whitfield. Thank you very much, Mr. Chairman. We appreciate your being here and the leadership you continue to provide on this issue and all of the opening statements will be a part of the record without objection. At this time, I would recognize Dr. Burgess for his opening statement. Mr. Burgess. Thank you, Mr. Chairman. I too will thank you and Chairman Barton for having this hearing. I will submit my formal remarks for the record. I do not know that I have much to add to what has already been spoken, but a newspaper, not from my district but from a county just west of my district, Wise County, the Wise County Messenger, has in its March 26 edition a story about yet another case, a brother and sister linked in a child porn case and apparently the data is in the process of being collected by the Forth Worth Branch that investigates this type of crime. It just underscores how it is pervasive in every community. This is a very rural area that is being described here in this newspaper article and it is as Chairman Barton points out just absolutely unconscionable that this activity is taking place literally right within our own communities. And I also want to thank Mr. Chairman for bringing to light some of the tools that are available for parents who do want to be proactive and protect their children and I think that is an invaluable part of the hearing and this service that we provide today. So with that, I will yield back. Thank you, Mr. Chairman. Mr. Whitfield. Thank you, Dr. Burgess. At this time, I recognize Mr. Walden for his opening statement. Mr. Walden. Thank you very much, Mr. Chairman. I concur with the comments of my colleagues about how disturbing this information is and about what is going on the Internet. As a father of a 15-year-old, soon to be 16, I think I share the concern that most parents across America indeed the world probably have about how awful this is. And I appreciate, Justin, your being here today and coming forward not only before this committee but also for your diligence in trying to work with the Department of Justice and all the frustration that you expressed in your testimony in that process. And I think for me as a member of this committee, how important it is to get this information on our record. I want to know what is going on at the Child Exploitation and Obscenity Section. And why they conducted themselves the way they did as certainly it has been alleged in your testimony and that of others. I was just reading some remarks that Mr. Eichenwald gave at Marquette University just a few days ago and his detailed description about COS handled this case is extraordinarily disturbing. And for me as a member of this oversight committee, as Vice Chairman, I am going to be asking some tough questions later in the week when we have the Justice Department here. It strikes me as absolutely perverse in the justice system that in effect the victim who comes forward to not only identify a problem but help round up those who are perpetrating this disgusting and terrible crime against humanity that somehow the victim is treated as the perpetrator and the fact that there are lots of other kids out there you are trying to save from this problem on the Internet. They seem to be lost in time. And for me COS has a lot of explaining to do and our Department of Justice has a lot of explaining to do. And I again, appreciate your courage in coming forward along with the others and Dr. Cooper, thank you for rearranging your schedule to be here, we are really looking forward to your comments. Thank you, Mr. Chairman. Mr. Whitfield. Mr. Walden, I am delighted that you focused your opening statement on that point because all of us are a little bit puzzled by what is going on over at the Child Exploitive and Obscenity Section of the Justice Department. That is something that we hope to get into today and certainly on Thursday as well. At this time, I recognize the gentlelady from Tennessee, Mrs. Blackburn, for her opening statement. Mrs. Blackburn. Thank you, Mr. Chairman. I also want to join my colleagues in thanking you for holding the hearing today. I want to thank our witnesses also for making the effort to be here. And I also want to thank our staffs and the committee staff for their diligence and their work on this issue. This is not an easy issue and it is a very unpleasant issue digging through, reading the material, and we thank you all for your cooperation in submitting that. Online child pornography is something that is increasingly used as an avenue by those that are child predators and that seek to do our children harm and exploit innocent, precious, precious children. Just the fact that there are millions of images that are transmitted daily, videos that are transmitted daily, on these acts that are being done to these children and transmitted over the Internet. And as our Chairman said, the fee for that is a $20 billion a year industry. That is sickening to my soul, absolutely sickening. And parents and children do need to be aware of the dangers that exist on the Internet and they do need to be aware of the mechanisms that they can use to report these instances where adults may be trying to seduce children and to move these precious vulnerable children into dangerous situations. And I do hope, Mr. Chairman, that we are able to correct some of the problems and look at some of the avenues of getting information to parents. Law enforcement also has got to be diligent and they have got to be prepared to shut down this despicable industry because there is no justifiable reason for this repulsive action of child pornography. It is horrible. It is a detestable mark on our society. And it is with sadness that we have to admit there are such sick and revolting people that walk on the face of this earth that they would want to watch, to copy, and to sell this type information to others. I am looking forward to what we are going to hear today. Again, I thank you all for taking your time to be here and to work with us and work with families to be certain that law enforcement and us, each of us that we are doing what we need to do to address the issue. Thank you, Mr. Chairman. I yield back. Mr. Whitfield. Thank you, Mrs. Blackburn. At this time, I recognize the gentleman from New Jersey, Mr. Ferguson. Mr. Ferguson. Thank you, Mr. Chairman. I want to echo your comments and that of Mr. Stupak and our other colleagues up here. I particularly want to echo the comments of Chairman Barton in his expressions just of being mystified and revolted in our preparation for this hearing. The questions that many of us ask and all of us probably ask of ourselves is what does it say about those who have been involved in this--as we are hearing this morning--industry? What does it say about those who would exploit children, young kids for these purposes? And I have, my wife and I are blessed to have four little ones in our house. But I think that an important question would be to ask ourselves this morning is what does it say about us in this Congress if we do not act, if we do not conduct these hearings, if we do not take our responsibility seriously to ensure that these types of exploitations and problems and challenges do not happen again? It is our responsibility, certainly part of our responsibility to act. I also want to thank our witnesses for being here today. Justin, in particular, I appreciate you being here today. I applaud the courage of those who are coming forth to educate members of this subcommittee about this topic. It is not an easy topic to deal with, it is graphic and it is gruesome, and more often than not it is hard to hear about, but it is a topic that cannot be ignored. Last year in New Jersey, in my home State, police arrested 39 people across the State in connection with a child Internet pornography ring that in one of the more horrifying videos depicted the rape of a 5-year-old girl. Today�s technology holds tremendous potential to enhance our lives; however, this advancement of technology is opening the door to a whole new generation of criminals, the child predator who takes advantage of children in the worst way by using this technology to prey upon children in the safety and the confines of their own home. There is no question in anybody�s mind that we must pay serious attention to this horrific industry and take steps to stop it. We must let the children and the parents of this country know that we will not allow this practice to continue. We will not allow them to be exploited or harmed or taken advantage of. People who are engaging in this type of activity must face serious consequences and it is our responsibility, as I said earlier, to let our children know that we will protect them at all costs. And I think of our formative ones in our house and am well aware of the dangers facing them and all of our children in the world today. It is the responsibility of parents to stop at nothing to protect our children from those who prey upon their innocence by taking advantage of them in ways that frankly many of us thought was simply unimaginable. Luckily, this industry is beginning to be brought into the limelight. There are now groups and law enforcement organizations that have made finding and punishing these criminals a priority, but they cannot do it alone. We must give them the tools to find these predators and bring them to justice and we must let our children know that they are not alone. Organizations like i-SAFE have made it their mission to educate children about how to use the Internet safely and what warning signs to look out for. This group has educated over 43,000 students on Internet safety and implemented 20 parent education organizations in New Jersey alone. I commend them for their programs and I sincerely hope that they and others continue this type of activity in the future. I hope that this hearing serves to draw further attention to this terrible industry and I would like to thank you, Mr. Chairman and Mr. Stupak, for holding this hearing and I look forward to hearing from our witnesses both today and later in this week. I yield back. Mr. Whitfield. Thank you very much, Mr. Ferguson. I guess that concludes the opening statements. Mr. Stupak. Mr. Chairman, if I may? Mr. Whitfield. Yes, sir. Mr. Stupak. Mr. Chairman, I would like to submit the statement of the Honorable John Dingell, the Ranking Member of the Energy and Commerce Committee, his opening statement for the record, please. Mr. Whitfield. Without objection, so ordered. [The prepared statement of Hon. John D. Dingell follows:] Prepared Statement of the Hon. John D. Dingell, a Representative in Congress from the State of Michigan Mr. Chairman, thank you for opening this important investigation and convening the first hearing today. This hearing will examine one of the most disturbing topics affecting the safety and health of our youngest citizenry. Those who have found the Internet a most expedient venue for peddling the worse kind of smut, not only profit from some of the most heinous crimes imaginable, but also encourage its creation around the world. Let us be clear about this. This is not about pornographic images of adults. What we are investigating today is the purveyance of live and videotaped broadcasts, as well as photographs, of sexual and other physical assaults on children -- many prepubescent but some as young as toddlers and infants -- for the purpose of producing images for sale or trade over the Internet. The Internet has regrettably provided the medium for the exponential growth in these deplorable crimes. The uses of the Internet by tech-savvy pedophiles are many. Among their most common uses are pay-to-view Web sites and peer-to-peer chat rooms. Some of these chat rooms provide opportunity to trade images. Unfortunately, the price of admission is often new material; hence, the ease of contact via the Internet has contributed to the incentives and growth of the horrendous abuse endured by these young victims, usually within their own home. Other chat rooms contain the candid thoughts of millions of adolescent and even preteen subscribers. Molesters, often initially posing as an adolescent themselves, use these chat rooms to seduce unsuspecting children into meetings for their heinous pleasure and/or profit. I suspect we will learn more about the ways and means of the Intern et perverts today and at future hearings. What is certain is that this global problem has deep and dirty tentacles right here in the United States. Taking away the profit and anonymity from these criminals may not put an end to these crimes. Reducing the convenience and incentives for the depraved individuals who use the Internet for such activities, however, will be an important start. As this Committee works on increasing broadband competition and Internet use across the country, we must also work toward eliminating the scourge of child pornography from the Internet. Mr. Stupak. Thank you. Mr. Whitfield. Thank you. At this time, we will call our fist witness, Dr. Sharon Cooper. And as I had mentioned in my opening statement, Dr. Cooper was scheduled to be in Germany today and postponed that trip, so we generally appreciate that, Dr. Cooper, and if you would come forward and sit here in the center would be great. Now, Dr. Cooper is not only a physician, but she is involved in forensic pediatrics. As I said, she is the head of the Development and Forensic Pediatrics, I guess within the Department of Pediatrics at the University of North Carolina at Chapel Hill. We welcome you today and we look forward to your testimony. As you may understand, this is a hearing of the Oversight and Investigations Subcommittee and we generally take testimony under oath. I would ask you; do you have any objection to testifying under oath today? Dr. Cooper. No, I do not. Mr. Whitfield. The rules of the House and rules of the committee, you are entitled to be advised by counsel about your constitutional rights. Do you desire to be advised by legal counsel today? Dr. Cooper. No, I do not. [Witness sworn] Mr. Whitfield. Thank you, Dr. Cooper, you are now sworn in and you will be recognized for five minutes for your opening statement. TESTIMONY OF SHARON W. COOPER, M.D., FAAP, DEVELOPMENTAL AND FORENSIC PEDIATRICS, PA, DEPARTMENT OF PEDIATRICS, UNIVERSITY OF NORTH CAROLINA CHAPEL HILL Dr. Cooper. Thank you, sir. My name is Sharon Cooper and I am an Adjunct Professor of Pediatrics at the University of North Carolina at Chapel Hill. I have worked as a pediatrician for 30 years and in the area of forensic pediatrics since 1980. As a doctor who works with maltreated children, a forensic pediatrician has advanced understanding of the nexus of medicine and the law and focuses on assuring that children will have the correct diagnosis if they are victims of child maltreatment. Serving as a multidisciplinary child abuse team member for 27 years, I have examined thousands of children who have been the victims of child sexual abuse, as well as other forms of child maltreatment. I have lectured throughout the United States and internationally providing more than 200 trainings in the areas of child sexual exploitation, physical abuse, child neglect, and child homicide. I spent 21 years as an active duty Army officer providing general pediatric developmental and behavioral pediatric, and forensic pediatric care for members of the armed services. I continue as an instructor for the Department of the Army Medical Education Center and School at Fort Sam Houston, Texas, which provides the multidisciplinary training to family advocacy program members in branches of the services. Since my retirement from the Army, with the rank of colonel 9 years ago, I focused my area of expertise on child sexual exploitation, child and youth development, behavior, and all aspects of child maltreatment. I have been an instructor for the National Center for Missing and Exploited Children in Alexandria, Virginia for nearly 6 years and have been provided training on victim impact on children depicted in child sexual abuse images and exploited through prostitution. In addition, I teach prosecutors, law enforcement officers, judges, and healthcare providers on how to medically analyze these pornography images and facilitate the evaluations of such images with the children�s agents. I have worked with the Child Victim Identification Program and the National Center. I have taught at the International Center for Missing and Exploited Children and the Microsoft Corporation providing similar training to law enforcement officers in the U.S., Canada, Europe, Russia, Southeast Asia, and the Middle East. As a forensic pediatrician, I have also provided medical care directly to children who have been sexually abused and pornographically photographed or videotaped. These clinical evaluations have included family and investigator interviews, review of the pornographic images, victim medical interviews, full medical examination, and case conferences. I have also evaluated children who have been exploited through prostitution both from within their families, as well as by acquaintances and intimate partners. In addition to having to evaluate children and youth victimized in this manner, I have also analyzed thousands of images of child pornography. These images were stored as computer files, videotapes, DVDs, Polaroid�s, and other images. Child sexual exploitation is the most underreported form of child abuse. Child pornography on the Internet, in particular, has untold impact upon victims. The possession and distribution of these images which are in fact digital crime scenes, promote the need for more and more plentiful and more graphic images. The two most commonly cited reasons that individuals collect these images are for sexual gratification through masturbation and as a plan for action. Many criminology studies have been done to show the motivation of individuals who would collect these images and this research has revealed that there is a one and three chance to as high as three out of four chances that an individual with such images has already sexually abused a child. Child pornography constitutes insult to injury to a victim. The injury is child sexual abuse. The insult is the memorialization of that child sexual abuse from time untold. It is very important for us to recognize that child pornography is a phenomenon which we must pay close attention to and seek to eradicate. I am very pleased to be here before the committee today and look forward to answering any questions that you may have. [The prepared statement of Sharon W. Cooper, M.D., follows:] Prepared Statement of Sharon W. Cooper, M.D., FAAP, Developmental and Forensic Pediatrics, PA, Department of Pediatrics, University of North Carolina Chapel Hill SUMMARY Child sexual exploitation is the most underreported form of child abuse today. Boosted by the Internet, these sexual abuse images constitute a digital crime scene, and a significant percent of such images online are of children less than 5 years of age. Driven by a offender pool which has anywhere from a one in three chance to a three out of four chance of having already sexually abused a minor, the supply and demand for this multibillion dollar industry continues to grow. Initially, the National Center and Missing and Exploited Children� monitored a database of 100,000 images. Today, this number of images has ballooned to more than 3 million. Children are often sexually abused and pornographically photographed by family members and familiar acquaintances. The presence of extremely graphic sadistic images of very young toddlers reinforces the skill of offenders who choose the most vulnerable of victims who are not only often preverbal, but who are also most likely to have trouble qualifying as a competent witness at a criminal trial. The link of pornography to the other four types of sexual exploitation: prostitution of children and youths, cyber-enticement, child sex tourism and human trafficking is well described. Professionals in the child abuse multidisciplinary teams must work ardently to become educated regarding this form of abuse. Recognizing the impact of child sexual abuse images on the Internet and predator dynamics is essential to reversing this exploding and extremely dangerous crime in America today. My name is Sharon Cooper and I am an adjunct professor of Pediatrics at the University of North Carolina at Chapel Hill, School of Medicine. I have worked as a Pediatrician for 30 years and in the area of Forensic Pediatrics since 1980. As a doctor who works with maltreated children, a Forensic Pediatrician has an advanced understanding of the nexus of medicine and the law, and focuses on assuring that children will be correctly diagnosed as victims of child maltreatment when that diagnosis is considered. Serving as a multidisciplinary child abuse team member for 27 years, I have examined thousands of children who have been the victims of child sexual abuse as well as other forms of child maltreatment. I have lectured throughout the United States and internationally, providing more than 200 trainings in the areas of child sexual exploitation, child sexual abuse, physical abuse, neglect and child homicide. I spent 21 years as an active duty Army officer providing general Pediatric, Developmental and Behavioral Pediatric and Forensic Pediatric care for children of members of all branches of the armed forces. I continue as an instructor for the Army Medical Education Department Center and School at Fort Sam Houston, Texas which provides multidisciplinary team training to Family Advocacy Program members in all branches of the services. Since my retirement with the rank of colonel from the United States Army 9 years ago, I have focused my areas of expertise on child sexual exploitation, child and youth development and behavior, and all aspects of child maltreatment. I have been an instructor at the National Center for Missing and Exploited Children in Alexandria, Virginia for nearly six years, and have provided training on the victim impact on children depicted in child sexual abuse images and exploited through prostitution. In addition, I teach prosecutors, law enforcement officers, judges and health care providers how to medically analyze child pornography images. I have provided even more in depth training regarding the determination of probable victim ages to the analysts of the Child Victim Identification Program of the National Center for Missing and Exploited Children as well as similar professionals of the Canadian Cybertipline. Working with the International Center for Missing and Exploited Children and the Microsoft Corporation, I have provided similar training to law enforcement officers in the US, Canada, Europe, Russia, Southeast Asia and the Middle East. As a Forensic Pediatrician I have provided direct patient care to several children who have been sexually abused and pornographically photographed or videotaped. These clinical evaluations have included family and investigator interviews, review of the pornographic images, victim medical interviews, behavioral analyses, and full medical examinations as well as case conferences after the medical assessment. I have also evaluated children who have been exploited through prostitution both from within their families as well as by acquaintances and intimate partners. In addition to having evaluated children and youths victimized in this manner, I have also analyzed thousands of images of child pornography. These images were stored as computer files, videotapes, DVDs, Polaroid pictures, and published images in trade magazines. The overwhelming majority of this contraband was computer stored images and videotapes, confiscated during investigations by Internet Crimes against Children (ICAC) teams and almost all federal criminal investigative agencies. I have published in this area to include an article with Attorney Damon King of the Child Sexual Exploitation and Obscenity Section. of the Department of Justice. I have served as an expert witness in family court and criminal prosecutions involving child pornography in state, federal and court martial proceedings. I have recently completed a textbook on the subject of child sexual exploitation in 2005 which has been endorsed by the National District Attorney�s Association. The text, entitled Medical, Legal, and Social Science Aspects of Child Sexual Exploitation: A Comprehensive Review of Pornography, Prostitution, and Internet Crimes has four other co-authors: Richard Estes, DSW, ACSW, Angelo P. Giardino, MD, PhD, FAAP, Nancy D. Kellogg, MD, and Victor I. Vieth, JD. This compendiu of nearly 60 contributors from 8 different countries provides a thorough background of the five types of child sexual exploitation: child pornography, prostitution of children and youths, cyber-enticement, child sex tourism, and the human trafficking of children and youths, both domestically and internationally. The text has a supplemental CD-ROM which includes further information in this area with case reports, training modules, selected readings and in particular an emphasis on the medical care of victims of these forms of child abuse. Child sexual exploitation is cited to be the most underreported form of child abuse. Child pornography on the Internet in particular has as yet untold impact upon victims. The possession and distribution of these images, which are in fact, digital crime scenes, promotes a need for newer, more plentiful and more graphic images. The two most commonly cited reasons that individuals collect these images are for sexual gratification through masturbation and as a plan for action. Criminology studies to date from the US Postal Inspection Service, the Toronto Child Sexual Exploitation Unit and the Federal Bureau of Prisons here in the US reveal that those who possess these images have a 1 in 3 chance to as high as 3 out of 4 chance of having already sexually abused a child. Further research from the National Juvenile Online Victimization (N-JOV) Study (Wolak, Mitchell & Finkelhor, 2003) has revealed that from 2000-2001, offenders primarily collected child pornography of children between the ages of 6 and 12 years. It is important to know, though those offenders are often diverse in the content of their child pornography collections and during that same period, nearly 50% of collected images were of children less than 5 years old. Such young victims are prime targets for sex offenders because of their preverbal nature and the fact that they often unable to be made competent on a witness stand in criminal proceedings. Child pornography constitutes insult to injury for a victim: the injury is child sexual abuse in all of its methods of victimization. The insult is the memorialization of that exploitation for an untold amount of time. Many of the images which I see on a regular basis show severe vaginal and anal assault against toddlers, bondage of these children with gags in their mouths, ligatures around their necks, and on occasion, physical beatings in conjunction with video clips of brutal oral, vaginal and anal penetration. In addition, recent research has shown that 88% of girls who have been sexually abused do not make a disclosure during childhood (Hansen, 1999). Numerous case examples of victims of child sexual abuse and pornography production, denial of the existence of photos or videotapes etc. is also very common, even though children do acknowledge the sexual abuse. Training for interviewing and treating such children and youths as well as those who have been groomed into compliant victimization is both essential and an immediate priority. Programs such as Finding Words and other forensic interviewing curricula must include the evaluation of these types of victims. It is very important to understand that child pornography is a common thread in all forms of child sexual exploitation: prostituted children and youths, cyber-enticement, child sex tourism and human trafficking of children. The bottom line is that children have become a commodity for a practice that seeks to normalize sexual harm. Preferential sex offenders who produce these images have been reported to be responding to special requests from like minded online offenders, or strictly as a means of financial gain. Infant and toddler sexual abuse is a frightening and sobering reality particularly in light of the National Institute of Justice report in 1994 which cited that victims of child sexual abuse were twenty-eight times more likely to be arrested in their lives for prostitution, than children who had never been sexually abused. Recent high profile multiple victim and multiple offender sex rings have alerted those of us who work in this area to the fact that immense technology exists in support of these types of heinous crimes against our most important national treasure, our country�s future, our children. I urge you to read the attached document, "Unto the Third Generation" written by one of our co-authors, Attorney Victor Vieth, Director of the American Prosecutor�s Research Institute�s National Child Protection Training Center. I look forward to providing whatever information that I can to the members of this committee and express my appreciation for the opportunity to answer any of your questions. Mr. Whitfield. Dr. Cooper, thank you. Thanks so much for your testimony. Did you read the December 19, 2005 story in the New York Times about Justin Berry? Dr. Cooper. Yes, I did. Mr. Whitfield. Well, could you explain how an online predator is able to actually convince a child to do some of the things that Justin did, like perform sexual acts on a webcam for money? How can they actually do that? Dr. Cooper. I think that the important phenomenon for us to understand is that online predators befriend adolescents. They become closer to them than many times their family members are. They are frequently in touch with them several times a day. In addition to giving them numerous awards and rewards for their discussion online, they become their closest friends. And because of that, and because of the adolescent�s mind which is very much in the sexually explorative phase in child development, it is not unusual for sexual exploration to be part of that relationship. So we find that many adolescents who become exhibitionistic on the Internet are doing so partly because of sexual exploration and sexual development, and also because of a normalization of sexual harm that is very prevalent in our society today. Sexualized images are everywhere to be found on the television, in their music, in music videos, in magazines, it is very, very common and so consequently it is easy for me to understand how an adolescent who is reaching out for some type of companionship online could fall prey and become a compliant victim. Mr. Whitfield. So these so-called predators, they actually form a close friendship with the child by way of the Internet initially and then maybe start talking to them on the phone or meet them somewhere. Dr. Cooper. That is correct, sir. I have taken care of several adolescent victims who have had their first relationships via an online partnership. And first of all, it is odd that we would think this is hard for teenagers because adults do the same thing. We have lots of online dating today. Lots of Internet chat rooms between adults and kids are very much the same way. I think what is more important is that predators recognize the vulnerability of children and they frequently will be there at all times of the night, frequently contacting the children after their parents have gone to bed, giving them cell phones so that they can have direct contact and the parents will not know. And this secrecy, as well as attention that is provided to teenagers is very, very convincing to young children. Mr. Whitfield. Now, we all know what the word predator means, but looking at that term as it relates to sexual exploitation of children on the Internet, how would you actually define the term predator? Dr. Cooper. I would say that a person who is a predator on the Internet is a person who commodifies children. They do not see children as beings, but as a commodity and what purpose and function do they serve for that person�s sexual gratification or monetary benefits. So they are a predator from the standpoint of certainly presenting themselves as harmful to a child, but the most important thing is that they will look upon this child as a checkmark if you will among the whole group of children that they are seeking to exploit in this manner. Mr. Whitfield. And so it starts out as a friendship that eventually ends up with the predator providing gifts and/or money or some other inducement. Is that correct? Dr. Cooper. That is correct. Mr. Whitfield. Now, could you explain from your professional experience how say Justin�s experiences, what kind of impact does that have on a child over time? Dr. Cooper. If I were to use an example such as the case of Mr. Berry, I would have to say that this is a life changing event. Child sexual abuse in and of itself is the beginning of this process for him. And much of the research tells us that 86 percent of children who are sexually abused, whether that occurs in early childhood or in adolescent years, will have long-term consequences. Typically the most common problems that we will see are going to be depression, anxiety, and post-traumatic stress disorder. But we also think that kids who are exploited online have an additional phenomenon and that is the paranoia that other people will be able to know what has happened to them and the fact that other people may discover those images at any time in the future. This causes a degree of computer absorption, a paranoia regarding peer groups that children who have been sexually abused and others do not know or may be able to hide better. Mr. Whitfield. Now I have read Justin�s testimony and I have also read stories about other young people who have been solicited over the Internet. One of the things that is kind of puzzling about this is once they actually meet the predator and they are sexually exploited or molested, there seems to be a tendency to continue to meet with the predator even after that. How does that happen and why does that happen? Dr. Cooper. What frequently occurs is that that initial meeting on the part of the child and the predator is one of explanation. Initially the child sees themselves as an equal to that predator. What they do not recognize and as time goes on, they are not in control of that relationship. They would like to be in control of that relationship, but this other person continues to, I would say, digitally stalk them, to being in touch with them all the time, to encourage them to continue to meet, that they cannot live without them. This type of attention and inducement is very difficult for anybody, including an adolescent to resist. It causes them to feel better about themselves initially, until they discover that they are being exploited and it is not their choice to continue in those relationships. Mr. Whitfield. Now, in your testimony, you described child pornography as a digital crime scene. Dr. Cooper. That is correct. Mr. Whitfield. When you said those three words, would you elaborate on that just for a few minutes? Dr. Cooper. Yes, I would be happy to. For a long time, healthcare professionals and others in the field of child abuse had a hard time acknowledging that child pornography was real. They thought perhaps these images were morphed and thought that these were not truly children, they were adults made to look like children. It took a lot for individuals to finally come to recognize that these are actually children. What we are seeing is very similar to a video camera in a convenience store. You are seeing the actual real time sexual abuse of a child. When we see online images or if we see videotapes that have been made of children, by sex tourists who have gone outside the country and made their own videotapes, we are looking at a crime scene. The fact that it is online makes it a digital crime scene. And it is very important for us to recognize that in the United States, we call this child pornography, but in Europe, in many of the other countries outside of this country, these are referred to as child sexual abuse images. So that the public will not be confused if this is a voluntary modeling, it is not voluntary modeling, it is in fact a crime. Mr. Whitfield. Now, in your professional capacity have you had the opportunity to interview or study or meet with the so-called predators at all? Dr. Cooper. I have had the opportunity to testify in court cases in fact of individuals who have exploited children through either pornography and many times pornography and prostitution together because that is a very common connection. Mr. Whitfield. And that motivates a predator? Dr. Cooper. I would say that there are three common reasons, although the researchers, the best researchers for this have been in Ireland who have gone into the prison system and interviewed collectors of child pornography. The three most common reasons that are cited are, number one for sexual gratification. These individuals will look at images in order to fantasize about their own relationship with that child. A second reason that they will collect images or seek to make images is because it is a plan for action. That is the most important one that I think we will need to be aware of. When an individual is looking at child pornography online, many of these individuals are planning how they are going to commit a contact offense with another child. They are using what they are seeing online, both to normalize and justify their behaviors. Particularly if they see hundreds and hundreds of images online, they come to the belief that this is common, everyone is doing it, and so, therefore, I am going to do it too. They will use what they see as a plan for action. The third reason is because it allows them to be a collector, in fact and with their likeminded friends, they can speak of the fact that they have numerous images within their collection. Mr. Whitfield. Now, would you say that, and I know it is difficult to generalize, but predators who are engaged in this activity, I am assuming most of them have full-time jobs. They may be a professional, they may come from any walk of life. Is that correct? Dr. Cooper. There is a very interesting phenomenon about child pornography, that is correct, that they do come from all walks of life. There may very well be small town individuals who have very minimal resources, who still are downloading child pornography. In one particular case that I am familiar with in my State, an individual was marketing his seven-year-old daughter by sending pictures of her on the Internet and he did not even have his own computer, he was using the county library computer to do this. So you can have individuals who are not wealthy well-to-do individuals, are still very much involved in this practice. Mr. Whitfield. It would not be unusual for them to send over the Internet, a webcam of them actually molesting the child on, I mean, televised while they are doing it, right? Dr. Cooper. They would have live webcam situations. You have almost all of those, a receiver of that information so you usually have at least two individuals who are intentionally communicating with images. As you are aware, the most recent and high profile case that occurred two weeks ago is associated with 27 individuals who were live web casting to each other and talking so that they could ask for certain sexual acts to be performed on a given child so that they would have the opportunity to watch this. Mr. Whitfield. Well thanks, Dr. Cooper, my time is expired and I recognize Mr. Stupak. Mr. Stupak. Well thank you. Thank you, Dr. Cooper, for rearranging your travel schedule to be with us here today on this important issue. Dr. Cooper. Thank you. Mr. Stupak. You mentioned a small town and actually my staff being well prepared went to the Michigan site for a public sex offender registry and this was just from my small town, I come from a very small town but it is seven pages, there are 39 people there. And I will quite tell you as I just thumbed through it here quickly I was quite surprised. These public sex offender registries we hear a lot about, are they any kind of a deterrent? It seems they catch a lot of attention but is it some kind of deterrent to a kind of sexual abuse we are seeing on the Internet? Dr. Cooper. Sir, I would say that the presence of being a registered sex offender may deter a person from having a contact offense with a child in their neighborhood; however, I believe that it does contribute to individuals going online more, because unless their sex offense results in a parole or a probation, or that they cannot access or use a computer, individuals are more likely to go online to access images of children for the purpose of sexual gratification through masturbation because they are fearful to actually have contact offenses. What we also know is that sex offender registries have a higher association of spawning child sex tourists. Americans are the most common child sex tourists and one of the main reasons they leave the United States to travel to third tier countries in order to have sex with children is because they are registered sex offenders. And so it sort of switches or transitions the victims from American children to foreign national children. Mr. Stupak. I see. In this and I just read that, I was just looking at again just very quickly. Are you surprised that the number of people registered here who are only 20, 21, 22. Is there any kind of, in your research or studies, is there any kind of profile of the person who is trying to obtain this information over the Internet? I mean, I got all ages on this list and I do not know what the offenses are for but is there any kind of profile that has developed through your work? Dr. Cooper. We know that the majority of individuals who are seeking either to contact children or who are collecting images are male, almost 99 percent are male. They tend to be non-Hispanic white males. We also know that they have the highest incidents of committing this crime between the ages of 26 and 35. That is your most common age, however, we are beginning to see younger and younger offenders if you will, to include youth offenders because of the availability of child pornography on the Internet. I believe that we are in a bit of a quandary to decide what to do about teenagers, for example, who are downloading images because we are not sure if the images titled 13-year-old daughter, for example, and a 15-year-old is accessing that image, we would be a little confused as to whether or not that actually would constitute child abuse or sexual exploration. So you can see that while we have the young offenders, they are breaking a low but we are not positive about the positive there. On the other hand, we have definitely older people who are clearly accessing images of very young children. There is no doubt that they are doing that with informed consent so to speak. Mr. Stupak. Let me ask you this in your research and I see you have a couple of your books there. One part was, in your research is about the law but just the public sex offender registry, each State has them, would those convictions for a sexual possession of pornography, children, would that necessarily be on these offenders if the list teaches things a little different as to what offenses make up to find yourself on a public sex offender registry? It is my understanding some States even if you are convicted of the crimes we are talking about today you do not appear on the sexual offender list. Dr. Cooper. That is correct, sir. It really depends upon the State and the judge, how that final sentencing is going to be. Our goal is to educate prosecutors, juries, and judges that if you are going to not have any type of incarceration as the sentence for this kind of crime, the least that should happen is that a person should become a registered sex offender. Mr. Stupak. So that would be one area where Congress probably would have an opportunity to act on since the Internet is interstate commerce and no doubt about that. Do you think child pornography is becoming more acceptable in our society? You mentioned that if I am convicted here in the United States, then I will just go elsewhere to get around the limitations that may be placed upon me here in the United States. Dr. Cooper. I believe that child pornography in our society, no, I do not think it is becoming more acceptable, although it is becoming more common. What I do believe is that people who are sexually abusing their children are changing. They are becoming more exhibitionistic with respect to how they sexually abuse their children. Ten years ago, before we had public access to the Internet so readily, parents were sexually abusing their children but they were not taking videotapes and making pictures and putting them on the Internet. Now that is what we are beginning to see, which means that they see their children not only as their victims but as a commodity for money to the public and those who are likeminded and would like to have access to their children in that sense. So I see the commodification of children as a bigger problem in our society and the fact that we fail to see them as individuals who will be highly harmed by knowing that their images are on the Internet. Mr. Stupak. You indicated in your answer that while it is not more acceptable, it is more common in children in the ways they become more of a commodity, a commercial enterprise. Dr. Cooper. This is correct. Mr. Stupak. Because of the growing use of the Internet, are consumers then often required not only to purchase images but also to provide their own unique picture, I do not want to say unique but provide something which will not only be it for purchase for the personal satisfaction but also then are they required then to provide pictures or to put the pressure upon them to access? Dr. Cooper. Yeah, absolutely, correct. There are several episodes of discussions on the Internet between individuals who want new images. They may want, for example, the reset of a known series that they have. A series may have 30 or 40 images, and they only have 15 so they want the rest. The key thing though, is that they will usually be required to provide their own images in order to, as a trading in order to do that. There are certain situations where they are asked to provide new images that have never been on the Internet before, and this is what encourages individuals to sexually abuse their own children in order to make those images available. Those have a higher desirability because more people already have many of the hundreds of thousands of images that are already on the Internet. Mr. Stupak. Let me ask you this. And I do not mean this in any way a reflection upon baseball. What I am going to say is are they trading them--like when I was growing up we traded baseball card and certain things, certain cards you wanted, certain stars. Is it like that on the Internet? Dr. Cooper. Very much it is that way, particularly when you have collectors who want to complete their series, or if you have individuals who have a certain fetish. For example, one case that I worked in, the individual had a child smoking fetish and he wanted pornographic images of children, all of whom were smoking. So they work very hard to find other people who have those kind of images and frequently those are homemade images. Mr. Stupak. Let me ask this question because I mentioned in my opening and in my research and someone mentioned, our staffs have really done a good job in helping us prepare for this but in our research in everything we have done here, it appears that about 60 percent of these victims are under the age of 12. So did you and you mentioned it earlier, could you explain what you mean by grooming children into compliant victimization? Dr. Cooper. Yes, I will. And if I could make a comment-- Mr. Stupak. Sure. Dr. Cooper. --of the 60 percent who are under 12, the reason that 60 percent are under 12, is because it is easier to charge when children are pre-pubescent appearing. You will have plenty of adolescent victims whose images are also on the Internet. But because they are adolescents, it is more difficult to tell that they are less than 18, which is the standard of the law. You will have adolescent victims and they would be marketed under gold banners, and others with still underage minors, but it is much easier to charge and successfully prosecute children who do not appear to have any sexual maturation which classically is children under 12. Now in answer to your question regarding complaint victimization, when children see or are shown images of other children who are being sexually abused and this is a common behavior of cyber enticers who will send pornographic images to children in order to help them understand that everybody does this, it is okay. When that happens, children will come to believe that this is something that lots of other kids do so maybe it is not that bad and they become a compliant victim in that situation and can actually recruit other victims. Mr. Stupak. Now then what happens to the very young victim after they are rescued from their abusers after years of grooming and being used in child pornography images? What kind of a child is left us? Dr. Cooper. A very damaged child. The National Institute of Justice tells us that they are 28 times more likely to be arrested for prostitution in their lives than other children. Mr. Stupak. It looks like my time has expired. Thank you, Mr. Chairman and thank you again for your testimony and being here today. Dr. Cooper. Thank you. Mr. Whitfield. Thank you. At this time, I will recognize the Chairman for his 10 minutes of questions. Chairman Barton. Thank you, Mr. Chairman. I have been in my office watching the hearing on television. Dr. Cooper, let us set aside the tragedy of this for a moment; what is the societal poison or wrong that happens as a result of child pornography? What happens to us as a society because of this? Dr. Cooper. Sir, I would say that our society responds as it did to violence on television. We become tolerant to the presence of really significant violence and we fail to recognize after a while that it is indeed violence. The same is true with child pornography. If we do not respond with an absolute zero tolerance type of response, we will begin to accept the form of child abuse. I think the other important point is that because this is a technology driven type of crime, many people fail to recognize that we are talking about child sexual abuse. In fact, I sit on several committees, national committees, that have had a hard time grasping that we are really talking about child sexual abuse with the digital moralization. So we have had a tough time getting our child protection services workers to the table for example because it has been hard for them to understand that this is not a victimless crime. Five years ago, that was the most common statement, this is a victimless crime. Chairman Barton. Well do the children that are molested, as adults, do they manifest any social behavioral problems, law enforcement run-ins on a higher level of incidents than children that are not exploited as children sexually? Dr. Cooper. Yes, they do, sir. When they have been exploited especially visually, you are much more likely to accept yourself that way. To become a marketer or to be easily marketed by others is the next that follow to this type of exploitation so many that prostitution has a much higher occurrence in individuals who are exploited in this manner. And in fact, Dr. Richard Estes research from the University of Pennsylvania, revealed when he went to codify the cities he went out of State to juvenile detention centers talking to kids who had been arrested for prostitution. There was an overwhelmingly large number of these children who had been already prostituted and pornographically photographed from within their families before they ran away and ultimately were being prostituted on the streets. Chairman Barton. And when you talk about, excuse me, digital molestation what is the minimum standard that would be considered to be sexually exploitive? Dr. Cooper. In the United States, images revealed new lascivious, if you will, visualization of the genitals of a child. The child may be dressed but their clothes, their position, the way that the individual closeness from inside of camera is focusing typically on the genital area. That is the beginning of an exploitive image for the U.S. Chairman Barton. Now is that under current law, is that illegal? Dr. Cooper. That is illegal under the Protect Acts; however, many images of nude children who are then shown in various sexually explicit poses without any evidence of actual sexual assault are considered erotica in the United States, although they are considered pornography in Canada just across the border. Chairman Barton. So if a parent were to take his or her child and pose them without their clothes on and send that over the Internet that would be illegal today? Dr. Cooper. It would depend upon how they are posed. And let me give you an example. One of my patient�s in my child abuse clinic stepfather posed her, 11-year-old, posed her at a table with her breasts lying on grass and put little bunny ears above her breasts and took pictures of this. This is not considered to be pornographic because it was not genital. The effect on the child as you can imagine was significant. The Walgreen Department Store that made these pictures out of the film called law enforcement right away because they thought this was child pornography but it did not meet the letter of the law under that circumstance because it was not genital exposure. Chairman Barton. Is there any indication that because of the Internet, parents that exploit their children is growing as a percent of the population? Dr. Cooper. I think so because I have been seeing child sexual abuse cases since 1980 and I cannot recall seeing as many parents who have taken pictures of their children like they are now and beginning to put them on the Internet, to exchange them with each other. This is very much a concerning trend. Chairman Barton. Now under current law, a parent that does that, if caught and convicted, does the parent lose custody of the child? Dr. Cooper. Almost always that would be the case, yes. Chairman Barton. What about the amounts of money? We were briefed that in one of the cases they were taking in several million dollars a month. Dr. Cooper. That is correct. The Avalanche case is a good example. Chairman Barton. Under current law, does that, can that money be forfeited like in a drug case or does it stay in the account of the exploiter and they do their time and it is their money? Dr. Cooper. Recently, sir, in Kentucky, I testified in a deposition for that purpose so that money that was obtained by in this particular case from an individual who was making child pornography, and as a Federal employee had his own money from his retirement. That particular U.S. Attorney made the appropriate motions to have his retirement pay closed in a fund for the child victims for their mental health services for several years to come. So that degree of restorative justice is definitely available and it is something that I have only seen once, but would really like to see happen more. Chairman Barton. Well, is that something that we need to look at, at the Federal level, a special statute of enforcement and penalties for parental molestation and asset forfeiture is that something that would be helpful? Dr. Cooper. Definitely, sir. This was a stepfather to this child. There were several victims, but the primary victim was this child. I think that would be a very good idea. Chairman Barton. Is most of the money that changes hands done by credit card? Dr. Cooper. And PayPal accounts, yes, usually through credit accounts and PayPal. Chairman Barton. Is that something that we need to look at? Are there any under current law, penalties towards a credit card company that knowingly and willfully accepts funds, transfers funds of a child pornographic nature? Dr. Cooper. I definitely believe that is something that the Congress should consider, sir, because we are doing the best we can do from the victim level, but when we have this much money driving the train, it is very hard to interrupt that kind of process without some type of very high level regulation or mandatory perusal. Chairman Barton. Okay. I think, Mr. Chairman, that is enough questions for this witness. Thank you for your work in this effort area and thank you for testifying today. Dr. Cooper. Thank you, sir. Mr. Whitfield. Thank you, Mr. Chairman. I might mention that on Thursday we are going to have another hearing on this issue relating to law enforcement and we are going to get into more detail about the methods of payment. And at this time, I recognize Dr. Burgess for his 10 minutes. Mr. Burgess. Thank you, Mr. Chairman. Thank you, Dr. Cooper for being here and being so generous with your time this morning. Dr. Cooper. Yes, sir. Mr. Burgess. You probably already answered this but let me ask it again just so I am sure that I understand it. I get the impression that of course child exploitation and child sexual abuse has been with us for a long, long time unfortunately. Dr. Cooper. That is correct. Mr. Burgess. But get the impression that the Internet has caused a change in this. Is that a correct assumption? Dr. Cooper. That is true. I would agree. The Internet has made it all different. There are five different types of child sexual exploitation, but the Internet facilitates every single one of those types of child sexual exploitation. Mr. Burgess. And you alluded a minute ago to somebody who took their pictures to Walgreen�s to be developed and the developers obviously alerted someone if there was a problem or there may be a problem here, but the Internet and digital photography is where they cut out the middleman in many respects so that now the availability of creating images is can be done within the privacy of one�s own home without involving a third party such as Walgreen�s. Do you think that has had an effect? Dr. Cooper. Very much so, sir. I think the ability for collectors to be anonymous and for producers to be anonymous has made this a much more difficult crime for all of us to be able to attack. The greatest individuals who suffer are the victims, because we see the images but we do not know who these children are. It is very challenging to try to track down where these images may have come from and who these children might be. It has been very challenging to do that. Mr. Burgess. You used a word that I guess didn�t even know was a verb but the word commodification of children and I guess just coming from a perspective where we have to be protective with the most vulnerable members of society, the fact that we are turning them into a commodity is a disturbing, a very disturbing concept for most of us up here. But, and the Chairman has asked this, but are there ways, other specific steps that you think we could take or that could be taken by legislative bodies to make it more difficult to commodify our children and to provide more protection to the most vulnerable members? Dr. Cooper. Yes, sir, I think that there are some steps that can be taken. One of the most important is to try to go back to our media the value of children, and to not allow children to be depicted in the media as a commodity, as we are beginning to see very, very commonly. This is one of the things that really contributes. In my discussions with outreach programs in various parts of the United States, this is one of the phenomena that is contributing to the compliant victim. When children see other kids on TV, especially teenagers on TV who are being treated in very sexually exploitive ways either through music videos, on videogames, et cetera, it causes children to believe themselves to be available in that manner. And that is the entertainment media and it is very challenging. I think we all have to pay attention to the huge messages that are being promoted every day, with respect to the whole commodification of children in the media. There is one thing, this is not obscenity per say, but it certainly is a message that all parents need to be more aware of when they see music videos with young teenagers who are being presented as if they were being prostituted, or as if they were being exploited and this is 24 hours a day on cable TV. It is really easy to see how kids will think this is okay for them. Mr. Burgess. Or in fact during the presentation of the Oscars but let us-- Dr. Cooper. Exactly right. Mr. Burgess. Let us stay on this for a minute because this too predates the Internet. And I guess the question I would have is is the Internet a causer and effect here or is it merely a facilitator and now changes this behavior to one that can be accomplished at warp speed if you will? Dr. Cooper. It really does, sir. In fact, you can usually see some imagery on television and the next day it will be on the Internet and it will be the same imagery which will be on the Internet for the next 6 weeks. It may not be on TV anymore, but it will be on the Internet for the next six weeks and children can finally download that information or they can just look at it on their computers in their home and then as they get their cell phones with cameras and start to take pictures and transmit to each other. You can really understand how this would not be seen as terribly abnormal because they see it on the Internet every day in their bedrooms. Mr. Burgess. So to some degree the Internet may be an accelerant for this fire and not in fact the cause of this? Dr. Cooper. That is correct. Mr. Burgess. That is what this Chairman has done but that is what is going to make it so difficult for us legislatively to deal with this and we feel it is important work that we do need to take on. But for people who are parents who are concerned about their children, is there a particular type of profile that the parents ought to be aware of or particular types of behavior that they have to be aware of in their children that should cause some alarm bells to go off? Dr. Cooper. Well the first thing that I think is important for parents to understand, there used to be like the i-SAFEty Program is one but there are several programs. The National Center has one called Net Smarts as well. Parents really need to be educated from the preschool time period about the risks for child pornography and child sexual abuse because, remember that we have very young children who have been sexually abused these days and it is important for parents to understand how that can happen, and how to protect their children. I think the hardest part is for us to help parents recognize that these children are being abused within their own homes. There is almost always a non-absenting parent in that home, so we need to empower parents. Healthcare providers need to be talking to parents when children are infants about the importance of protecting their children, not just from the normal constant safety that we speak of, but the issues of sexual exploitation, sexual abuse which many parents would never think would be relevant information for an infant who is less than 12 months of age. However, the Internet is showing us that this is an important phenomenon that we need to be discussing with parents across the board. The majority of offenders are indeed men. So it is important for us to help parents understand that. Mr. Burgess. What type of outreach program do you have for healthcare providers? Because that is, I have got to tell you as someone who just recently left the healthcare providing field, I do not know that this would have crossed my radar screen in dealing with a patient with a problem. Dr. Cooper. You are absolutely right. For those of us who work in child abuse, we are more tunnel-visioned with respect to child safety from abuse. General healthcare providers, family medicine, and pediatrics need to be much more aware of the fact that child pornography exists, that these are little children, they are not victimless and it is not a virtual crime, it is a real crime. We need to add to our ancillary guidance, in our well child checks, et cetera, sports physicals, questions to the children and also advice to parents about how to keep children safe but also how to make sure that they are not exposed every day to those mind changing media driven messages that can cause their pre-teens and teenagers to become compliant victims. Mr. Burgess. That is an enormous task of education, re-education of healthcare professionals. Do you have some programs currently that are ongoing to do that, to accomplish that? Dr. Cooper. There are some online programs but I am a member of the American Academy of Pediatrics and it is my goal to try to bring this into our well child checks. Mr. Burgess. Well, again, for parents who are watching this hearing today and I hope that some are, what are some of the things that they can themselves do to increase their involvement in their children�s lives to put another barrier between their child and the potential for abuse? Dr. Cooper. The most important thing that I think parents should do is first of all communicate with their children from the time they are very young. Do not wait until they are 13 and 14 to start talking to them. The second point is to be aware of social networking sites such sites as MySpace, the FaceBook, Zanga.com, where children are beginning to do online diaries and put their own pictures of themselves which is a risk. That is a bit of a risk in particular because many children when they are 13 and 14 years of age will be a little exhibitionistic. That is just a part of being an adolescent but it is a little dangerous to be that way online as we have seen from the case of Justin Berry. He was only 13 and all he had to do was take his shirt off and all of a sudden men were responding to him in that situation. So I think talking to children from the very beginning, from the time they are very young, helping them to recognize and helping parents to recognize that the majority of offenders are not strangers. That is the other important point. Many parents speak to their children about being aware of strangers but the majority of sex offenders are acquaintances and/or relatives. The third point is to be careful not to let children have Internet access in their bedroom. They can have a computer in their bedroom, but not Internet access in their bedroom. That should be where parents can monitor their usage. Mr. Burgess. Thanks again, Dr. Cooper. You have been very generous of your time and we really appreciate your rearranging your schedule to be with us today. Dr. Cooper. Thank you. Mr. Burgess. Mr. Chairman, I will yield back. Mr. Whitfield. Thank you, Dr. Burgess. And I recognize Mr. Walden for 10 minutes. Mr. Walden. Thank you, Mr. Chairman. I do not know that I have got that many additional questions. You have done a marvelous job and my colleagues have asked all the questions I was thinking of as well. Dr. Cooper. Thank you, sir. Mr. Walden. As I listened to Dr. Burgess the things what can parents do, you certainly addressed those issues and enlightened us about how severe this problem is, so I appreciate your testimony today and the questions and unless you have anything else to add. Dr. Cooper. I remember that Mr. Barton had asked how could have individual have an interest in an 18-month-old and I wanted to respond to that question. Mr. Walden. Sure. Dr. Cooper. What we do know about individuals who sexually abuse infants and toddlers is that their sexual abuse is not really sexually driven from the standpoint of sexual desire for such a young child as a sexual partner, but the more common driving force with that young of a victim is the power and control motivation. And in fact interviews with convicted predators who have sexually abused children as young as 18 months have spoken of that fact. The cognitive distortion that we see in sex offenders is that their power and control is for the purpose of making that toddler a perfect sexual partner by the time they become an adolescent. So it is very important for us to recognize that cognitive distortions clearly already exist in sex offenders and the Internet can promote more of those cognitive distortions. Mr. Walden. Let me just ask one question as I have read through the testimony and heard about how the Federal agencies have responded in this case and we will hear more directly from them. What is your experience in terms of agency response--State, local, and Federal in these cases? Dr. Cooper. And that is a very good question. I will tell you that I began my work in child sexual exploitation with the U.S. Postal Inspection Service who has been incredibly excellent with respect to their recognition of child pornography as it is ordered online and delivered through the mail. They are very, very proactive and very hardworking group of people. The Internet Crimes Against Children�s Task Forces which are present in almost every State now usually will have a local law enforcement officer representative. For example, in my county in North Carolina, we have one person in our sheriff�s department who sits on that team and then we have a State-level investigator who sits on that team, and then a fellow FBI-type investigator and then a customs individual. So I interact pretty regularly with each one of these individuals in a team standpoint whenever there is a new case. My role is to analyze the images and to make sure that they meet the definition of the law. I would say that they work very well together but they are not enough, clearly not enough individuals. Law enforcement training needs to be a continuously funded phenomenon. I speak in probably 10, at least 10 to 12 trainings a year in the United States that are all law enforcement trainings all about sexual exploitation online predators. So I think that funding for that continued education is going to be very important. Mr. Walden. All right, thank you very much. I would yield back. We again appreciate your rescheduling and your testimony and the good work you do around the country. Dr. Cooper. Thank you, sir. Mr. Whitfield. Thank you, Mr. Walden. And I will recognize the gentleman from New Jersey for 10 minutes. Mr. Ferguson. Mr. Ferguson. Thank you, Mr. Chairman. Dr. Cooper is there a link between being in possession of child pornography and actually assaulting a child? Dr. Cooper. Yes, sir, there is. That has been studied now in three different venues. The U.S. Postal Inspection Service first looked at that and found that in 35 percent of the cases that they had investigated there was also evidence of a contact offense having already occurred. The Toronto Child Sexual Exploitation Police Unit also looked at this question and nearly one out of two, 35 percent of their cases were also minimum contact offenses. Then of course the Federal Bureau of Prisons has looked at it from a different perspective. These are already incarcerated child pornographers who are in sexual treatment programs. In that particular situation where individuals are in therapy and will acknowledge under that umbrella whether or not they have or have not sexually abused children. Close to 76 percent of those individuals acknowledged that they had already sexually abused children at the time, by the time they were collecting child pornography. So we feel that there is definitely a link between collecting child pornography and offending against children. Sadly for me as a forensic pediatrician, now that I see younger children in my clinic, I am beginning to see children who are telling me about their victimization and I have seen what they are telling me on the Internet. So I know that the aspect of a plan of action, the Internet providing a plan of action for offenders is clearly becoming evident. Mr. Ferguson. So the evidence suggests that there is a link. Do we have an idea of that causality? Dr. Cooper. Yes. That we believe and what the research out of Ireland showed when the applied psychologist went into the prison system and this would be Taylor and Quail who go in the prison system to talk to convicted pornographers. The most important causality is that seeing child pornography makes would be offenders believe that this is acceptable behavior, that it is normal and that normal people do it. So, therefore, the normalization of sexual harm is what encourages them to proceed. Mr. Ferguson. So with all of the images that are available online, with all of the material that is out there, I mean, are we creating child predators with the availability and the ease with which one can access child pornography, these exploitative images, this material? Are we, because that is so easily available, are we creating people who exploit and abuse children? Dr. Cooper. That is a very good question and I will tell you that there are reports of individuals who have nearly sexually offended against a child, who after beginning to see many of these images on the Internet, develop that kind of distortion that this is a common practice, and who may have fantasized, but never acted on a child and now are beginning to because of what the have seen on the Internet. Mr. Ferguson. Those are all the questions I have. Thank you, Dr. Cooper, I yield back. Dr. Cooper. Thank you. Mr. Whitfield. Thank you very much, Mr. Ferguson. And Dr. Cooper, we generally appreciate your being here today and as we said a couple times before rearranging your schedule, your testimony is certainly very important and your professional insights will be quite helpful to us. Dr. Cooper. Thank you. Mr. Whitfield. And we hope that we can stay in touch with you as we move forward on this issue. Dr. Cooper. And sir, if I may, I would like to be sure to leave a copy of our textbook and our CD-ROM with you for your use if it can be of any benefit. Mr. Whitfield. Thank you very much and we appreciate your being here. At this time, I would like to call the second panel of witnesses. First, we have Mr. Justin Berry who is with us today. He was the topic of a number of articles in the New York Times about how a 13-year-old young man becomes involved in this sordid online world. Justin, if you would have a seat. And then also we have Mr. Kurt Eichenwald who is a reporter with the New York Times. I am going to ask unanimous consent that we enter into the record five articles in the New York Times that Mr. Eichenwald wrote on this subject, as well as a speech that he gave at Marquette University. The title of the first article is "Through His Webcam a Boy Joins a Sordid Online World." The second one was "Where the Credit Card Trail leads." The third, "A Shadowy Trade Migrates Through the Web." Fourth, "Documenting a Crime That Thrives on Anonymity." Fifth, "Making a Connection with Justin," and then the speech at Marquette University. [The information follows:] Mr. Whitfield. I might also add that in my opening statement, I talked about Mr. Eichenwald being so disturbed and interested in this issue that he came to testify, but I would like to set the record straight that we did subpoena Mr. Eichenwald because he is a reporter and so we appreciate him complying with our subpoena and being here in response to that. We also have Mr. Steve Ryan with us today who is an attorney with Manatt, Phelps & Phillips, and it is my understanding, Mr. Berry, that he, Mr. Ryan, is representing you and acting as your legal counsel. Is that correct? Mr. Berry. Yes, sir. Mr. Whitfield. Okay. And as you all know, this is an Oversight and Investigations hearing and we do take testimony under oath. Do either of you have any difficulty or object to testifying under oath? Now, Mr. Eichenwald, do you have legal counsel with you today? Mr. Eichenwald. I do, sir. Mr. Whitfield. And would you identify him? Mr. Eichenwald. He is David McCall, the gentleman behind me who is the counsel for the New York Times. Mr. Whitfield. Okay, and Mr. David McCall who is the legal counsel with the New York Times, we appreciate your being here, Mr. McCall. Now, I understand you are not going to be testifying. Mr. Ryan may actually testify depending on how the questions go. [Witnesses sworn] Mr. Whitfield. Thank you, all of you are sworn in now and I will recognize Mr. Justin Berry for his opening statement. And Justin, we do appreciate your being here today. We know it has been a difficult road for you and your being willing to testify can be a tremendous help to many young people throughout the country and also to the committee as we search for ways to deal with this issue so thank you. TESTIMONY OF JUSTIN BERRY, C/O STEPHEN M. RYAN, ESQ., MANATT, PHELPS & PHILLIPS LLP; AND KURT EICHENWALD, REPORTER, THE NEW YORK TIMES Mr. Berry. Thank you. Chairman Whitfield, Ranking Member Mr. Stupak, and other members of the committee, my name is Justin Berry and I am 19 years old. I am here to speak upon the danger facing this Nation�s children, one that threatens not only their emotional health, but their physical safety. This danger is Internet child pornography, particularly involving the use of inexpensive web cameras which are used by adult predators to exploit children. I speak from experience. For 5 years, beginning when I was 13 years old, I operated a pornographic website featuring images of myself fluttered on the Internet by webcams. I was paid by more than 1,000 men to strip naked, masturbate, and even have sex with female prostitutes while on camera. My business was assisted by adult criminals, including companies that process credit card payments. I am not proud of the things I have done nor will I personally attempt to avoid responsibility for those decisions. While I did not comprehend the magnitude of what was happening when I was 13, as I grew older, I progressively became corrupted and acted in shameful ways. Still, I repeatedly attempted to pull away from this sick business, but each time I fell back into this criminal world that had first seduced me and eventually controlled me. My experience is not as isolated as you may hope. This is not the story of a few bad kids whose parents paid no attention. There are hundreds of kids in the United States alone who are right now wrapped up in this horror. Within each of your congressional districts, I guarantee there are children who have used their webcams to appear naked online, and I guarantee you there are also children in your district on the Internet right now being contacted and seduced by online sexual predators. I was an honor student and I was class president. My mom had used all the latest child protective software. She checked what was happening in my room. She occasionally took away my computer keyboard but she was no match for the child predators who worked hard to make sure my child porn shows continued. In my personal opinion, the law enforcement effort is no match for them either. Until recently, I never understood why these child predators always laughed about the Government. Now, I know that the child predators are at least partially right. They have little to fear from law enforcement. Based on my case, efforts to prosecute these people are riddled with mistakes and bureaucracy. Unless something changes, hundreds or even thousands of children will be lost forever. I obtained a webcam at 13 after signing up for an account with earthlink.net. The company, as a promotion, sent me a free Logitech webcam. As a child drawn to computers, I was enthralled. I plugged the device into my computer and then followed the instructions on the software. Within minutes my webcam image was loaded onto a website called spotlife.com. Like many young teenagers, I hoped my webcam would improve my social life. I did not have a lot of friends and I was very lonely. I hoped the webcam would help me meet other teenagers online and hopefully a few girls my age. That never happened. No teenager out of the webcam pornography business ever contacted me but I did hear from my child predators. Within minutes of appearing on spotlife, I received an instant message from an adult male. This man I now know was a child predator. I did not understand at that time. More child predators followed. Looking back today, my thoughts seem foolish but at 13, I believed these people were my friends. They were kind. They complimented me. They wanted to know about my day, and they were endlessly patient in listening to me, and they were generous. In no time, one of these men told me he wanted to send me a gift. He showed me how to set up a wish list on Amazon.com which allowed everyone who knew my code name to send me a present without requiring me to disclose my address. Soon I was swamped with videos, CDs, and computer equipment including better webcams all free from my new friends. I always rushed back from school to scoop of the packages that were on my doorstep before my mother got home from work. My new friends were kinder and more generous to me than anyone I had ever known. I trusted them, and that is when everything changed. One afternoon, a few weeks after setting up my webcam, one of these men approached me online with a proposal. He would pay me $50 if I took off my shirt for a few minutes while sitting in front of my webcam. He explained to me how to set up an account on Paypal.com, an instant online money payment system. I was excited about the $50, an amount that struck me at the time was a huge sum of money. Taking off my shirt seemed harmless, I did it at the pool. The money arrived and I took off my shirt. My viewers complimented me and it felt good. The weeks that followed are a blur, but I now understand that by removing my shirt, I had signaled that I could be manipulated. More gifts and money arrived along with increasingly explicit requests. They wanted me to take off my pants, remove my underwear, and eventually masturbate on camera. The seduction was slow. Each request only went a bit further than the last and the horror of what was happening did not strike me at that time. I wish I could say I hated what was happening. Perhaps that would absolve some of my sense of guilt. But the truth is I did not. As more clothes came off, more people contacted me. The compliments were endless, the gifts and payments terrific. I thought I had achieved online what eluded me in real life. I was popular. Everyone wanted to know my thoughts. Everyone wanted to give me things. I was the king of my own universe. All I had to do in exchange was strip and masturbate while alone in my room. Men began to reach out to me. One man, Ken Gourlay approached me online to discuss my interest in computers. He operated his own web hosting company called Chain Communications. I was awed. Here was someone running a real Internet business, talking to me, a 13-year-old kid and treating me as an equal. In the months that followed, Ken raised the possibility of hiring me at Chain as an executive director of sales and marketing. It seemed like a dream come true. As I was working for him, Ken recommended that I attend elite computer camp at the University of Michigan where I could obtain advance certifications. My mother agreed to send me there that summer while I was still 13. At that time, I thought it was just luck that Ken and Chain were both based in Ann Arbor, Michigan. I now know that I had been set up. Ken picked me up at camp one day to show me Chain and he took me to his home where I was sexually molested by Ken for what proved to be first and many times by him and other adult men. With the help of my family and my psychologist, I know understand that my molestation by Ken was the turning point that sent me on a path to self-destruction. Afterwards, Ken apologized, promising me it would never happen again, but it did. By this time, I had formalized my webcam business. I had opened a site called justinscam.com, where child predators could come and watch, and offer me money and gifts to do what they wanted. After my first molestation, I began to act out sexually. I was reckless. Part of me wanted to die. And every day on camera, part of me did. The next stage emerged with the help once again of Ken Gourlay. I decided I should sell monthly memberships for a new site jfwy.com. Ken offered to set up the membership section and host the business at Chain. People could now, using the site programmed by Ken, pay me a monthly membership fee through Paypal and watch all they wanted. Another computer executive, Gilo Tunno, was one of my members. He had been an engineer at Intel and a principal designer of the Pentium 4 processor. I was so impressed. So when Gilo Tunno told me he wanted to hang out with me in Bakersfield, California where I lived and bring me presents, I agreed. I met him and we went to his hotel. At some point, he gave me a $1,500 projector and other gifts. We talked about Intel and computers. And then he molested me. I look back on those events with Gourlay and Tunno and feel ashamed. All of my explanations seem inadequate. How could I get myself into that situation? How could I not see it? But this is one of the issues I wish to stress. Webcams and instant messaging give predators power over children. The predators become part of that child�s life. Whatever warnings the child may have heard about meeting strangers, these people are no longer strangers. They have every advantage. It is the standard seduction of child predators multiplied on a geometric scale. I no longer cared about anything other than getting as much money as possible. When another teenager in my town found the videos from my website and distributed them to my classmates, I felt compelled to leave. My father lived in Mexico. I wanted to establish a relationship with him. My mother said I could visit him for a week. My week-long visit to Mexico was extended again and again. At one point, my father asked where all my money was coming from. I told him about my business and he offered in his words to help maximize the earning potential. I had already established a new site called mexicofriends.com which featured me engaging in sex with Mexican women. My father helped by hiring prostitutes for me to have sex with on camera. The number of members, of paid members skyrocketed. I was 16 years old. I became even more self-destructive. I abused marijuana terribly and consumed so much cocaine that I am amazed I survived. My life was a swirl of drugs, money, and sex. When a paying member of my site, Greg Mitchel, offered to come to Mexico and pay me gifts, I accepted. He, too, sexually molested me. But I no longer cared, I just wanted his money. I had become exactly what my members viewed me to be, what their degrading conversations convinced me I was: a piece of meat for sale to the highest bidder. Just after my 18th birthday I tried to leave the business. Money was still coming in from mexicofriends but I wanted nothing to do with it. I used it to purchase clothes and other items for homeless people in California. I rented a truck and delivered the materials myself. I was looking for my own redemption but I failed. I was still addicted to drugs and Greg Mitchel urged me to return to the business as his partner. Together, he said, we could set up a new website, justinsfriends.com. I resisted for months, but I could not find my way in the real world anymore. Depressed and high on drugs every day, I agreed to return to porn. The site was fully operational in June of 2005. That same month, I met Kurt Eichenwald, a New York Times reporter who was working on a story about webcam pornography. He urged me to quit drugs and get out of the business and I did. He asked for my help in exposing this world and I agreed. When I told him of the other children who were being exploited a nd molested by adult men, he convinced me it was important to tell law enforcement what I knew. I agreed even though I feared this meant that I could be sent to prison. I believed that the Government would protect the children being abused. I believed they would act quickly. I was wrong. My lawyer, Stephen Ryan of Manatt, Phelps & Phillips, a former Federal prosecutor, contacted prosecutors of the Department of Justice and was put in touch with the Child Exploitation and Obscenity Section on July 14, 2005. He informed them that the adults I had worked with suspected I was seeking out law enforcement. He told them my life was potentially in danger and that evidence was being destroyed. He provided the DOJ with a written proffer of my testimony and described the physical evidence of IP addresses, credit card information, and other proof I could make available. Mr. Ryan insisted that DOJ provide me with immunity for the testimony to protect me. He was confident they would respond promptly. Mr. Ryan was wrong also. Almost 2 weeks passed. Finally, we informed the Child Exploitation and Obscenity Section that I was flying to Washington, not at government expense, and would be available to meet with them for 2 days, July 25 and July 26. At almost the last minute, CEOS scheduled the meeting. In our meetings, I identified children who were currently being exploited and molested, as well as other men who were committing the crimes. I identified the adult child molesters such as Mr. Mitchel, Mr. Tunno, and others. I told of the Internet locations where evidence of these crimes could be found. I informed them that I had names, credit card numbers, IP addresses of approximately 1,500 people who paid to watch child pornography from my websites and identified the businessmen, the adult businessmen who facilitated the credit card payments necessary for these business. The FBI case agents I spoke with were very professional and of the highest integrity. I cannot say enough good things about them. The Child Exploitation and Obscenity Section did not make me confident. Weeks passed seemingly without progress. I cannot describe the agony of that time. Each night I wondered were the children I knew being molested that night? Were they being filmed? Why was no one stopping this? I understood it would take time to decide whether I should have immunity or not, but why couldn�t they rescue the children in danger? In late August, my lawyer informed CEOS in writing that if they did not act, he would take me elsewhere to get State law enforcement officials to begin the work on the matter. Mr. Ryan began discussions with the California Attorney General Lockyer, whose staff agreed to consider taking the case. Also at that time, I believe the New York Times was preparing a story about the Government�s failure to do anything about my case. I remember Kurt asking me what I would tell other cam kids who wanted to disclose their ring of predators to law enforcement. I told Kurt knowing my message would be heard by other kids that no one should ever step forward again. I got the distinct feeling that the CEOS prosecutors did not know what to do with me or my information. Then, everything changed. It was so sudden that I have come to believe the CEOS feared the New York Times was going to report the delay. Whatever the cause, I was granted immunity. My lawyer turned over the physical evidence. The following week on September 12, 2005, Greg Mitchel was arrested. I expected this to be the first of many prosecutions. Again, I was wrong. I wish I could say the prosecution story had a happy ending. It did not. At that time, I was concerned I would be killed by the adults who would be harmed by my testimony and were frantically searching for me. After the Mitchel arrest, a sensitive government document was deliberately unsealed from court records. It is my understanding that this was done by the U.S. Department of Justice. While the names were blacked out, the document clearly identified potential defendants under investigation, as well as the fact that I was a witness against them. Worse, it warned all the adult perpetrators across the country that I was cooperating with law enforcement. The local U.S. Attorney quoted in the newspapers based on the release of the document. All of it appeared on the Internet where the adult perpetrators looking for me could read it. I feared for my life. CEOS then offered me government protection which I need in part because CEOS or the U.S. Attorney�s office had deliberately stopped the release of the affidavit. I declined the offer. I did not trust CEOS to protect me. I feared the actions of CEOS from that day forward although not nearly as much as I feared the anger of the predators. Today, I have been off drugs for 9 months and just finished my first quarter at college. My grades are good and I have friends. Had I not met Kurt Eichenwald, I would have never had this chance at a new life. I will never be able to repay what he has done for me. In a profession which is taught to get the story, he did that, but he treated me with the compassion of a Good Samaritan. I have my life back. Every day, I have regrets, not just for the dreadful decisions I made in the past years but for failing to have the impact that I had hoped on this illegal trade. I have never been asked by law enforcement about any of the 1,500 names I provided them. Some of those who molested me, like Mr. Gourlay, and who made all of this possible, are continuing to live their lives, unaware or uncaring about any government inquiry. People like Mr. Brown who operate the credit card infrastructure of web cam child pornography have been permitted to continue their work, seemingly undisturbed by any law enforcement effort. I have watched as my former members go online to attack me, boldly proclaiming themselves as my former customers and having no fear that their self-disclosure could result in their arrest. Events have proved them right. Since I left the child pornography business last summer, I have risked everything to tell these facts to persons who care, like this committee. It is my hope that Congress will do everything it can to see to it that children are protected and that our law enforcement effort is competent to combat this evil. Thank you. [The prepared statement of Justin Berry follows:] Prepared Statement of Justin Berry, c/o Stephen M. Ryan, Esq., Manatt, Phelps & Phillips LLP Chairman Whitfield, Ranking Member Mr. Stupak, and other Members of the Committee. My name is Justin Berry and I am 19 years old. I am here to speak about a danger facing this nation�s children, one that threatens not only their emotional health, but their physical safety. This danger is internet child pornography, particularly involving the use of inexpensive web cameras which are used by adult predators to exploit children. I speak from experience. For five years, beginning when I was 13 years old, I operated a pornographic website, featuring images of myself loaded onto the internet by webcams. I was paid by more than 1,000 men to strip naked, masturbate and even have sex with female prostitutes while on camera. My business was assisted by adult criminals, including companies that process credit card payments. I am not proud of the things I have done. Nor will I personally attempt to avoid responsibility for those decisions. While I did not comprehend the magnitude of what was happening when I was 13, as I grew older, I progressively became corrupted and acted in shameful ways. Still, I repeatedly attempted to pull away from this sick business. But, each time, I fell back into this criminal world that had first seduced me, and eventually controlled me. My experience is not as isolated as you might hope. This is not the story of a few bad kids whose parents paid no attention. There are hundreds of kids in the United States alone who are right now wrapped up in this horror. Within each of your Congressional districts I guarantee there are children who have used their webcams to appear naked online, and I guarantee you there are also children in your district on the Internet right now being contacted and seduced online by sexual predators. I was an honor student, I was class president. My mom used all the latest child protective software. She checked what was happening in my room. She occasionally took away my computer keyboard. But she was no match for the child predators, who worked hard to make sure my child porn shows continued. In my personal opinion, the law enforcement effort is no match for them either. Until recently, I never understood why these child predators always laughed about the government. Now I know the child predators are at least partially right. They have little to fear from law enforcement. Based on my case, efforts to prosecute these people are riddled with mistakes and bureaucracy. Unless something changes, hundreds, or even thousands, of children will be lost forever. THE BEGINNING I obtained a webcam at 13 after signing up for an account with earthlink.net. The company, as a promotion, sent me a free Logitech webcam. As a child drawn to computers, I was enthralled. I plugged the device into my computer, and then followed the instructions in the software. Within minutes, my webcam image was loaded onto a website called spotlife.com. Like many young teenagers, I hoped my webcam would improve my social life. I didn�t have a lot of friends and I was very lonely. I hoped the webcam would help me meet other teenagers online, maybe even find a few girls my age. That never happened. No teenager outside of those in the webcam pornography business ever contacted me. But, I did hear from many child predators. Within minutes of appearing on spotlife, I received an instant message from an adult male. This man, I now know, was a child predator. I did not understand that at the time. More child predators followed. Looking back today, my thoughts seem foolish, but at 13, I believed these people were my friends. They were kind. They complimented me. They wanted to know about my day, and were endlessly patient in listening to me. And they were generous. In no time, one of these men told me he wanted to send a gift. He showed me how to set up a "wish-list" on Amazon.com, which allowed anyone who knew my codename to send me a present, without requiring me to disclose my address. Soon, I was swamped with videos, cd�s and computer equipment "including better webcams" all free from my new friends. I always rushed back from school to scoop up whatever package was on my doorstep, before my mother got home from work. My new friends were kinder and more generous to me than anyone I had ever known. I trusted them. And that was when everything changed. One afternoon, a few weeks after setting up my webcam, one of these men approached me online with a proposal. He would pay me $50 if I took off my shirt for a few minutes while sitting in front of my webcam. He explained how to set up an account on Paypal.com "an instant online money payment system. I was excited about the $50" an amount that struck me at the time as a huge sum of money. Taking off my shirt seemed harmless; I did it at the pool. The money arrived, and I took off my shirt. My viewers complimented me, and it felt good. BECOMING A PLAYER IN THE WEBCAM PORN INDUSTRY The weeks that followed are a blur, but I now understand that, by removing my shirt, I had signaled that I could be manipulated. More gifts and money arrived, along with increasingly explicit requests. They wanted me to take off my pants, remove my underwear, and eventually masturbate on camera. The seduction was slow; each new request went only a bit further than the last, and the horror of what was happening did not strike me at the time. I wish I could say that I hated what was happening. Perhaps that would absolve some of my sense of guilt. But the truth is, I did not. As more clothes came off, more people contacted me. The compliments were endless, the gifts and payments terrific. I thought I had achieved online what eluded me in real life: I was popular. Everyone wanted to know my thoughts. Everyone wanted to give me things. I was the king of my own universe. All I had to do in exchange was strip, and masturbate, while alone in my room. Men began to reach out to me. One man, Ken Gourlay, approached me online to discuss my interest in computers. He operated his own web hosting company, called Chain Communications, and I was awed. Here was someone, running a real Internet business, talking to me, a 13-year-old kid, and treating me as an equal. And, in the months that followed, Ken raised the possibility of hiring me at Chain, as executive director of sales and marketing. It seemed like a dream come true. As I was working for him, Ken recommended that I attend an elite computer camp at the University of Michigan, where I could obtain advanced certifications. My mother agreed to send me there that summer, while I was still 13. At the time, I thought it was just luck that Ken and Chain were based in Ann Arbor. I now know I had been set up. Ken picked me up at camp one day, to show me Chain. He took me to his home. There, I was sexually molested by Ken, for what would prove to be the first of many times by Ken, and other adult men. With the help of my family and my psychologist, I now understand that my molestation by Ken was a turning point that sent me on a path to self-destruction. Afterwards, Ken apologized, promising me it would never happen again. But it did. By this time, I had formalized my webcam business. I had opened up a site called justinscam.com, where child predators could come and watch, and offer me money and gifts to do what they wanted. After my first molestation, I began to act out sexually. I was reckless. Part of me wanted to die. And every day on camera, part of me did. MEMBERSHIP SITES The next stage emerged with the help, once again, of Ken Gourlay. I decided that I should sell monthly memberships for a new site, jfwy.com. Ken offered to set up the membership section and host the business at Chain. People could now, using the site programmed by Ken, pay me a monthly fee through Paypal, and watch all they wanted. Another computer executive, Gilo Tunno, was one of my members. He told me he had been an engineer at Intel and a principal designer of the Pentium 4 processor. I was so impressed. So when Gilo Tunno told me he wanted to hang out with me in Bakersfield, California "where I lived" and bring me presents, I agreed. I met him and we went to his hotel. At some point he gave me a $1,500 projector and other gifts. We talked about Intel and computers. And then he molested me. I look back on those events with Gourlay and Tunno and feel ashamed. All my explanations seem inadequate. How could I get myself into that situation? How could I not see it? But this is one issue I wish to stress. Webcams and instant messaging give predators power over children. The predators become part of the child�s life. Whatever warnings the child may have heard about meeting strangers, these people are no longer strangers. They have every advantage. It is the standard seduction of child predators, multiplied on a geometric scale. I no longer cared about anything other than getting as much money as possible. But when another teenager in my town found videos from my website and distributed them to my classmates, I felt compelled to leave. My father lived in Mexico. I wanted to establish a relationship with him. My mother said I could visit him for a week. MEXICO My week long visit to Mexico was extended and extended again. At one point, my father asked where my money came from. I told him about my business. And he offered, in his words, to help "maximize the earnings potential." I had already established a new site, called mexicofriends.com, which featured me engaging in sex with Mexican women. My father helped by hiring prostitutes for me to have sex with on camera. The number of paid members skyrocketed. I was 16 years old. I became even more self-destructive. I abused marijuana terribly, and consumed so much cocaine that I am amazed I survived. My life was a swirl of drugs, money and sex. When a paying member of my site, Greg Mitchel, offered to come to Mexico and bring me gifts, I accepted. He, too, sexually molested me. But I no longer cared. I just wanted his money. I had become exactly what my members viewed me to be, what their degrading conversations convinced me I was: a piece of meat, for sale to the highest bidder. Just after my 18th birthday, I tried to leave the business. Money was still coming in from mexicofriends, but I wanted nothing to do with it. I used it to purchase clothes and other items for homeless people in California. I rented a truck and delivered the materials myself. I was looking for my own redemption. But I failed. I was still addicted to drugs, and Greg Mitchel urged me to return to the business as his partner. Together, he said, we could set up a new website, justinsfriends.com. I resisted for months, but could not find my way anymore in the real world. Depressed and high on drugs every day, I agreed to return to porn. The site was fully operational in June, 2005. GETTING OUT That same month, I met Kurt Eichenwald, a New York Times reporter who was working on a story about webcam pornography. He urged me to quit drugs and get out of the business, and I did. He asked for my help in exposing this world, and I agreed. And when I told him of other children who were being exploited and molested by adult men, he convinced me it was important to tell law enforcement what I knew. I agreed, even though I feared this meant I could be sent to prison. I believed that the government would protect the children being abused. I believed they would act quickly. I was wrong. My lawyer, Stephen Ryan of Manatt, Phelps & Phillips, a former federal prosecutor, contacted prosecutors of the Department of Justice ("DOJ") and was put in touch with the Child Exploitation and Obscenity Section (known as "CEOS") on July 14, 2005. He informed them that the adults I had worked with suspected I was seeking out law enforcement. He told them my life was potentially in danger, and that evidence was being destroyed. He provided DOJ with a written proffer of my testimony, and described the physical evidence of IP addresses, credit card information, and other proof I could make available. Mr. Ryan insisted that DOJ provide me with immunity for my testimony to protect me. He was confident they would respond promptly. Mr. Ryan was wrong also. Almost two weeks passed. Finally, we informed the Child Exploitation and Obscenity Section that I was flying to Washington, not at government expense, and would be available to meet with them for two days, July 25 and July 26. At almost the last minute, CEOS scheduled the meeting. In our meetings, I identified children who were currently being exploited and molested, as well as the men who were committing the crimes. I identified the adult child molesters such as Mr. Mitchel, Mr. Tunno, and others. I told of the Internet locations where evidence of these crimes could be found. I informed them I had the names, credit card number and computer IP addresses of approximately 1,500 people who paid to watch child pornography from my sites, and identified the adult businessmen who facilitated the credit card payments necessary for these businesses. The FBI case agents I spoke with were professional and of the highest integrity. I cannot say enough good things about them. But the Child Exploitation and Obscenity Section did not make me confident. Weeks passed, seemingly without progress. I cannot describe the agony of that time. Each night I wondered, were the children I knew being molested that night? Were they being filmed? Why was no one stopping this? I understood it would take time to decide whether I should have immunity. But why couldn�t they rescue children still in danger? In late August, my lawyer informed CEOS, in writing, that if they did not act, he would take me elsewhere to get state law enforcement officials to begin work on the matter. Mr. Ryan began discussions with California Attorney General Lockyer, whose staff agreed to consider taking the case, Also, at that time, I believe the New York Times was preparing a story about the government�s failure to do anything about my case. I remember Kurt asking me what I would tell other camkids who wanted to disclose their ring of predators to law enforcement. I told Kurt, knowing my message would be heard by other kids, that no one should ever step forward again. I got the distinct feeling that the CEOS prosecutors did not know what to do with me or my information. Then, everything changed. It was so sudden that I have come to believe the CEOS feared that the New York Times was going to report the delay. But whatever the cause, I was granted immunity. My l awyer turned over the physical evidence. The following week, on September 12, 2005, Greg Mitchel was arrested. I expected this to be the first of many prosecutions. Again, I was wrong. I wish I could say the prosecution story had a happy ending. It did not. At that time, I was concerned I would be killed by the adults who would be harmed by my testimony and who were frantically searching for me. After the Mitchel arrest, a sensitive government document was deliberately unsealed from court records. It is my understanding this was done by the U.S. Department of Justice. While names were blacked out, the document clearly identified potential defendants under investigation, as well as the fact that I was the witness against them. Worse, it warned all the adult perpetrators across the country I was cooperating with law enforcement. The local U.S. Attorney was quoted in the newspapers, based on the release of the document. And all of it appeared on the Internet, where the adult perpetrators looking for me could read it. I feared for my life. CEOS then offered me government protection, which I needed, in part, because CEOS or the U.S. Attorney�s Office had deliberately sought the release of the Affidavit. I declined their offer. I do not trust CEOS to protect me. I feared the actions of CEOS from that day forward, although not nearly as much as I feared the anger of the predators. CONCLUSION Today, I�ve been off drugs for nine months, and just finished my first quarter at college. My grades are good, and I have friends. Had I not met Kurt Eichenwald, I would never have had this chance at a new life. I will never be able to repay what he has done for me. In a profession which is taught to "get the story," he did that, but he treated me with the compassion of the Good Samaritan. I have my life back. But every day, I have regrets, not just for the dreadful decisions I made in past years, but for failing to have the impact I had hoped on this illegal trade. I have never been asked by law enforcement about any of the 1,500 names I provided them. Some of those who molested me, like Mr. Gourlay, and who made all of this possible, are continuing to live their lives, unaware or uncaring about any government inquiry. People like Mr. Brown, who operate the credit card infrastructure of webcam child pornography, have been permitted to continue their work, seemingly undisturbed by any law enforcement effort. I have watched as my former members go online to attack me, boldly proclaiming themselves as my former customers, and having no fear that their self-disclosure could result in their arrest. And events have proved them right. Since I left the child pornography business last summer, I have risked everything to get to tell these facts to persons who care, like this Committee. It is my hope that the Congress will do everything it can to see to it that children are protected and that our law enforcement effort is competent to combat this evil. Thank you. Mr. Whitfield. Well, Justin, thank you very much for your testimony. It was quite revealing and we genuinely appreciate the information that you provided. Mr. Eichenwald, you are recognized for your opening statement. Mr. Eichenwald. Mr. Chairman and members of this committee, my name is Kurt Eichenwald and I am a senior writer with the New York Times. My appearance today is somewhat unusual. As a matter of policy, the Times instructs its reporters to decline requests to testify in judicial and legislative settings because it can serve to undermine our work if we are seen by the public as an extension of the Government. In this instance, the Times accepted a subpoena from the committee on my behalf after the committee agreed that I would be asked to provide only published or publicly disclosed information. To the extent that the committee seeks information about reporting processes, I will have to respectfully decline to answer. Nor do I believe it is my place to offer policy suggestions. Within that framework, I offer the following testimony which may assist the committee in its exploration of this important issue. On December 19, the New York Times published a front page article that was the culmination of my 6 month investigation into the world of webcam child pornography. This was an extraordinary project not only for me, not only for the Times, or for journalism in general. This was an instance in which the very reporting could by its very nature result in a crime committed by the reporter. There was a great deal of consultation with the lawyers, a great deal of consultation with the FBI to ensure that at no point did I violate a law. Through that care, we were able to lay bare a nightmarish Internet world that grew without attracting significant attention from law enforcement or child advocates. As a citizen, I was dumbfounded by what I found. As a father, I was terrified. Like most people, I gave little thought during my life to the scourge of child pornography, but I now know that we are fighting a losing battle. The predators are sophisticated in the use of computers and talented in their manipulation of children. They count on our willingness to avert our eyes from the unpleasant to succeed in their pursuit of illegal images of minors. And we have been far too willing to comply. That is part of why the child pornography business has exploded in the past decade. As many of you noted in your opening statements it is now a $20 billion a year industry. Webcam pornography has emerged in just the last few years but it is already a significant part of this elicit industry. I have submitted copies of my articles which explain facets of this business, as well as the events that led to my discovery of Justin, who served as my guide into this world, showing me the mechanisms used to seduce children into degrading and harmful behavior. Let me stress, this is not a problem involving just Justin Berry or a handful of bad kids. Hundreds of minors have been lost to the lure of performing in online pornography. I interviewed a number of them. They include children from every walk of life, wealthy and middle class, poor, honor students and those struggling with their grades, children of divorce and with intact families. The only shared characteristic I found was a loneliness that these minors feel is alleviated by meeting people online and in person through the webcam business. Entire infrastructures have emerged to sustain this business, including both witting and unwitting corporate participants. You have already heard how predators have turned the ingenuity of some of our greatest online companies against our children. Wish lists with companies like Amazon.com and American Eagle Outfitters, a wonderful convenience for gift giving, have become mechanisms for seducing children. Online payment systems such as Paypal.com have been used to facilitate transfers of cash. Communications programs from companies like AOL and Yahoo! are used both for direct conversations between predators and children, and for the transmission of illegal video images. We have heard a lot today about chat rooms. They are no longer necessary. A predator can reach each child individually though these communication systems. Many of these programs and services can be obtained by children in minutes without requiring accurate identification, or proof of your age on parental consent. In addition to the unsuspecting companies, there are businesses that know exactly what they are doing. In my reporting, I discovered credit card processors who provided support for webcam child pornography. I found web hosting companies that offered servers for the illegal businesses. I even found a company that provided streaming video to sites operated by minors on condition that the company president be allowed to watch the pornographic performances for free. I also located scores of marketing sites known as portals which were used to direct potential customers to the webcam child pornography sites. These portals, many of which temporarily shut down since publication of my article, underscore the scope and magnitude of this business. I have provided the committee with the listing maintained by a single portal of the almost 600 teenage webcam sites that it marketed. Perhaps most disturbing was that major American and international companies advertised on these marketing portals for child pornography. The advertisements, copies of which have also been provided to the committee appeared immediately above images used by boys and girls to market their pornographic sites. Apparently, these companies were attempting to win business both from customers and the teenage pornographers themselves as it offered services to help efficiently run for-pay sites. The advertisers included Logitech and Creative Webcam, both webcam manufacturers, as well as Verotel, an international credit card processing company. I might note that the advertisements I found on archive.org for some of these portals which you know the addresses for are as we speak being changed. I do not know how it is possible but ads that were there when I began my reporting are now disappearing. Fortunately, I maintained copies. But the for-pay sites of adolescents are only one level of this illicit business. I am told thousands of other children have become unknowing participants in the online pornography industry. These minors perform not for money or gifts, but because they have been tricked into stripping and masturbating online for what they believe is a single viewer. These performances are recorded and then posted on for-pay pornography sites without the knowledge or consent of the minors. In my reporting, I found websites dedicated to offering webcam videos of hundreds of girls and boys who had been duped into such performances. Surprisingly, a predator showed me a site he found so offensive involving hundreds and hundreds of boys who had been lured into, tricked into a single online performance. I note this because each one of those videos had an image of the child, a non-pornographic image that the potential customer could use to decide which video to watch. We talk about the safety of putting computers outside the children�s bedroom. I checked. Of the numbers I examined, about 40 to 50 to 60 percent of the single frame images advertising these pornographic videos were from computers in dining rooms, living rooms, offices, only the minority were in what appeared to be the child�s bedroom. That site boasted of being the largest such site in the world. It was shut down only after I called for a comment from its credit card processor, Verotel, the same company advertising its services on the portals. There is a business infrastructure for this part of the industry as well. There are people who make their living trolling the Internet for children with webcams, luring them into sexual performances, and selling the resulting pornographic videos. To aid such people and others in disguising their true identities, there is software available that allows anyone to make a recorded video appear to be a live webcam transmission. The result is that a middle age man can portray himself as a teenage boy or girl, complete with the video needed to convince any doubters. In my reporting, I discovered a group of predators who took bets among themselves about how many online approaches it would require to convince a girl with a webcam to take off her clothes with the resulting recorded video shared among the bettors. By the time I found this group, they had played their game dozens of times. They appear to have never failed to convince their target to strip. To aid in their hunt for adolescents, these adults again use legitimate businesses. Justin explained how predators used spotlife.com to find him. Numerous listings of children, including sites such as myspace.com and buddypick.com are now the favorite sites, the virtual Sears catalog for pedophiles. Using these sites in combination, predators can search for children by age, location, and sex. They can obtain enormous amounts of identifying data including whether a child operates a webcam. I have witnessed conversations among child predators online where they discussed the latest minor located from these sites. Often predators share information obtained from the minor, both from site posting and from direct conversations. Even social networking sites that boast of being safe engage in reckless behavior requiring personal data from minors before allowing access to their sites, reinforcing the children�s false view that providing such information is harmless. When I explained how predators used these systems to the producers for Oprah Winfrey, they asked me for a demonstration. We limited my search to minors within 20 miles of my location. Meaning if I was a pedophile, I could personally meet those minors within the hour. The producers timed me. It took only a minute and 30 seconds before I was in direct contact with a 16-year-old girl. By that time, I knew her name, address, school, plans for the evening, and other identifying information, including the younger sisters� names and ages. We repeated the test searching for a boy within the same distance, this time we wanted to make it harder, asked me to make sure the kid had a webcam. I was in contact with a 14-year-old in two and a half minutes. In both instances, I told these minors what I was doing and advised them not to speak with strangers online. Both replied contrary to the obvious that they never did. From what I have witnessed, it is difficult to protect a child once he or she has accepted the predators as allies. They assist children with strategy and money in outwitting their parents so that the shows could go on. That is exactly what happened in Justin Berry�s case. These predators are insidious. They advise the minors to make sure that they claim to be over 18, suggesting that otherwise the children might get in trouble. Then when the predators are caught, they claim they were deceived by the child�s often laughable claim to having been an adult, even the children who had not yet reached puberty. Of course, as you see in Justin�s story, there is the possibility and I would say the probability that a child performing online will be molested. After my story, a university professor emailed me and made postings about the Internet to complain that statistically few viewers of child pornography become molesters. As you have heard, his statistics are bogus, but his argument applied to this circumstance is ludicrous. These are not instances where pedophiles are obtaining images of children they cannot identify. Here, a single child is being set upon by hundreds of predators all in direct daily contact. The entreaties to meet begin quickly. Numerous minors told me of predators pleading for meetings, more than a few, I believe agreed to go. I have found oftentimes that adults react to these facts with incredulity. They cannot comprehend how a child could be so easily lured into pornography or speak so readily to a stranger. I think our first panel today gave quite a number of answers to those questions. You also have to understand the environment where the minors find themselves. They are not being approached by some stranger in the park. Rather, they are in their own homes feeling safe. They feel comfortable on the Internet in ways we may not recognize. Internet communication has all the elements of true social interaction, but remains shallow. So it is both socially fulfilling and emotionally non-threatening. There is no one else there, just a small solid device nearby. There is a level of unreality about it and on the part of the minors a simple lack of comprehension. There also appear to be few protections. You have heard that the predators often laugh at Federal law enforcement. They believe arrest is rare and prosecution followed by jail time even rarer. I was dumbfounded by the willingness of online pedophiles to identify themselves, to publicly discuss their crimes in non-protected publicly accessible sites and chat rooms. What became obvious as I disclosed in my article, is that our Federal law enforcement effort to combat this threat appears to be hobbled by fractured responsibilities, bureaucratic mindsets, and a simple inability to respond. In interviews with law enforcement personnel around the country, I repeatedly heard of frustrations about the Child Exploitation and Obscenity Section, or CEOS, serving as an impediment in the aggressive pursuit of criminal cases. For example, one law enforcement official told me that CEOS often makes arguments against bringing cases in child pornography cases that would embarrass a defense lawyer. I saw the reasons for this aggravation in Justin�s case. From the time that the Government was notified of Justin�s information to the point where the children in direct danger were saved, more than 50 days passed. As you heard, efforts by Justin�s lawyer to push the Government into action were met with silence. Requested subpoenas were not issued for weeks. Delays were imposed because bureaucratic approvals were sought from people on vacation. Important data offered to the Government by Justin has even at this late date not been collected. It has only been reviewed by me. As for the material the Government did collect, weeks passed before a forensic computer specialist could examine it, about average for the Justice Department. Some people identified as perpetrators literally could not get themselves arrested if they tried. As I reported in the Times, one of these potential defendants, Justin�s father, who at the time lived in Mexico, attempted, through his lawyer, to turn himself in at the American consulate in Mexico City. I personally witnessed a conversation where Justin was informed that CEOS had held that this potential defendant could not be prosecuted because even though he was playing a role in broadcasting child pornography into the United States, he did so from across the border. When the problem of Mr. Berry attempting to surrender himself to the Government presented itself, there was a great deal of discussion as I understand it among law enforcement personnel. They discussed until Mr. Berry changed his mind. He has since fled Mexico. These kind of problems spread throughout the Government; for example, agents of Immigration and Customs Enforcement, ICE, an excellent organization from what I have seen, have been months investigating a child rapist who had separately been identified to CEOS by Justin as one of his molesters. This is Mr. Tunno who Justin spoke about a few minutes ago. Indeed, Justin possessed video evidence of the crime that had been emailed to him by Mr. Tunno. These ICE agents at the time were unknowingly searching for Justin who they knew solely as a boy from Bakersfield that they suspected had been abused by this serial molester. Those agents heard 4 months after Justin�s meetings with CEOS that the boy they were searching for was already a Federal witness. That information was not passed on to them by CEOS, instead, they learned it from me, a newspaper reporter in the course of an interview. Justin Berry stepped forward at a time the Government did not know he existed. He is, to experts� knowledge, the first such teenage witness to ever turn over this kind of vast evidence to the Government. Given the way his case was handled, including the meager results and the longstanding threat that it would be Justin who would be prosecuted, it is hard to imagine other teenagers wrapped up in this world will risk their freedom or safety to follow in his footsteps. Each year, each week, each day, the predators are becoming more sophisticated with computers facilitating the growth and evolution of child pornography. It is why this business is exploding. My reporting has shown me that we are woefully behind. Thank you. [The prepared statement of Kurt Eichenwald follows:] Prepared Statement of Kurt Eichenwald, Reporter, The New York Times My name is Kurt Eichenwald and I am a senior writer with the New York Times. My appearance today is somewhat unusual. As a matter of policy, the Times instructs its reporters to decline requests to testify in judicial and legislative settings, because it can serve to undermine our work if we are seen by the public as an extension of the government. In this instance, the Times accepted a subpoena from the committee on my behalf after the committee agreed that I would be asked to provide only published or publicly disclosed information. To the extent that the committee seeks information about reporting processes, I will have to respectfully decline to answer. Nor do I believe it is my place to offer policy suggestions. But, within that framework, I offer the following testimony, which may assist the committee in its exploration of this important issue. On December 19, the Times published a front page article that was the culmination of my six month investigation into the world of webcam child pornography. The story laid bare a nightmarish Internet world that grew without attracting significant attention from law enforcement or child advocates. As a citizen, I was dumbfounded by what I found. As a father, I was terrified. Like most people, I gave little thought during my life to the scourge of child pornography. But, I now know we are fighting a losing battle. The predators are sophisticated in the use of computers and talented in their manipulation of children. They count on our willingness to avert our eyes from the unpleasant to succeed in their pursuit of illegal images of minors. And we have been far too willing to comply. That is part of why the child pornography business has exploded in the past decade, making it a multi-billion dollar industry. Webcam pornography has emerged in just the last few years, but is already a significant part of this illicit industry. I have submitted copies of my articles which explain facets of this business, as well as the events that led to my discovery of Justin Berry, who served as my guide into this world, showing me the mechanisms used to seduce children into degrading and harmful behavior. Let me stress: this is not a problem involving just Justin or a handful of bad kids. Hundreds of minors have been lost to the lure of performing in online pornography. I interviewed a number of them. They include children from every walk of life - wealthy and middle class, honor students and those struggling with their grades, children of divorce and with intact families. The only shared characteristic I found is a loneliness that these minors feel is alleviated by meeting people online "and in person" through their webcam business. Entire infrastructures have emerged to sustain this business, including both witting and unwitting corporate participants. You have already heard how predators have turned the ingenuity of some online companies against our children. Wish lists with companies like Amazon.com and American Eagle Outfitters "a wonderful convenience for gift giving" have become mechanisms for seducing children. Online payment systems, such as paypal.com, have been used to facilitate transfers of cash. Communications programs from companies like AOL and Yahoo are used both for direct conversations between predators and children, and for the transmission of illegal video images. Many of these programs and services can be obtained by children in minutes, without requiring accurate identification or proof of either age or parental consent. But, in addition to the unsuspecting companies, there are businesses that know exactly what they are doing. In my reporting, I discovered credit card processors who provided support for webcam child pornography. I found web hosting companies that offered servers for the illegal businesses. I even found a company that provided streaming video to sites operated by minors, on condition that its president be allowed to watch the pornographic performances for free. I also located scores of marketing sites, known as portals, which were used to direct potential customers to the webcam child pornography sites. These portals "many of which have temporarily shut down since publication of my article" underscore the scope and magnitude of this business. I have included as an exhibit to my remarks the internal listing maintained by a single portal of the almost 600 teenage webcam sites that it marketed. Perhaps most disturbing was that major American and international companies advertised on these portals. The advertisements appeared immediately above images used by boys and girls to market their pornographic sites. Apparently, these companies were attempting to win business both from customers and teenagers themselves, as they offered services to help efficiently run for-pay sites. The advertisers included Logitech and Creative Webcam, both webcam manufacturers, as well as Verotel, an international credit card processing company. But the for-pay sites of adolescents are only one level of this illicit business. Untold thousands of other children have become unknowing participants in the online pornography industry. These minors perform, not for money or gifts, but because they have been tricked into stripping and masturbating online for what they believe is a single viewer. Those performances are recorded and then posted on for-pay pornography sites, without the knowledge or consent of the minors. In my reporting, I found websites dedicated to offering webcam videos of hundreds of girls and boys who had been duped into such performances. One that boasted of being among the largest such sites in the world was shut down only after I called for a comment from its credit card processor, Verotel the same company advertising its services on the portals. There is a business infrastructure for this part of the industry as well. There are people who make their living trolling the internet for children with webcams, luring them into sexual performances and selling the resulting pornographic videos. To aid such people in disguising their true identities, there is software available that allows anyone to make a recorded video appear to be a live webcam transmission. The result is that a middle aged man can portray himself as a teenage boy or girl, complete with the video needed to convince any doubters. In my reporting, I discovered a group of predators who took bets among themselves about how many online approaches it would require to convince a girl with a webcam to take off her clothes, with the resulting recorded video shared among the bettors. By the time I located this group, they had played their game dozens of times; they never failed to convince the target to strip. To aid in their hunt for adolescents, these adults again use legitimate businesses. Justin explained how predators used spotlife.com to find him. Numerous listings of children including sites such as myspace.com and buddypic.com are now the favored sites, the virtual Sears catalogue for pedophiles. Using these sites in combination, predators can search for children by age, location and sex. They can obtain enormous amounts of identifying data, including whether a child operates a webcam. I have witnessed conversations among child predators online, where they discuss the latest minor located from these sites. Often, predators share information obtained from the minor both from site postings and from direct conversations. Even social networking sites that boast of being "safe" engage in reckless behavior, requiring personal data from minors before allowing access to their sites reinforcing the children�s false view that providing such information is harmless. When I explained how predators used these systems to producer s for Oprah Winfrey, they asked me for a demonstration. We limited my search to minors within 20 miles of my location meaning, if I was a pedophile, I could personally meet these minors within the hour. The producers timed me. It took only one minute and thirty seconds before I was in direct contact with a 16 year old girl. By that time, I knew her name, address, school, plans for the evening and other identifying information, including her younger sisters� names and ages. We repeated the test, searching for a boy with a webcam within the same distance. I was in contact with a 14 year old in two and a half minutes. In both instances, I told these minors what I was doing, and advised them not to speak with strangers online. Both replied, contrary to the obvious, that they never did. From what I have witnessed, it is difficult to protect a child once he or she has accepted the predators as allies. They assist children "with strategy and money" in outwitting their parents, so that the shows can go on. And these predators are insidious. They advise the minors to claim they are over 18, suggesting that otherwise, the children might get in trouble. Then, when the predators are caught, they claim they were deceived by the child�s often laughable claim to being an adult even with children not yet in puberty. Of course, as you see in Justin�s story, there is the possibility that a child performing online will be molested. After my story, a university professor emailed me to complain that statistically, few viewers of child pornography become molesters. His argument, applied to this circumstance, is ludicrous. These are not instances where pedophiles are obtaining images of children they cannot identify. Here, a single child is being set upon by hundreds of predators, all in direct, daily contact. The entreaties to meet begin quickly. Numerous minors told me of predators pleading for meetings; more than a few agreed to go. I have found oftentimes that adults react to these facts with incredulity. They cannot comprehend how a child could be so easily lured into pornography, or speak so readily to a stranger. The answer comes from an understanding of the environment where the minors find themselves. They are not being approached by a predator in the park. Rather, they are in their own homes, feeling safe. They feel comfortable on the internet, in ways we may not recognize. Internet communication has all of the elements of true social interaction, but remains shallow. So it is both socially fulfilling, and emotionally non-threatening. There is no one else there, just a small, silent device nearby. There is a level of unreality about it, a simple lack of comprehension. There also appear to be few protections. You have heard that the predators often laugh at federal law enforcement. They believe arrest is rare, and prosecution followed by jail time even rarer. I was dumbfounded by the willingness of online pedophiles to identify themselves, to publicly discuss their crimes. But what became obvious, as I disclosed in my article, is that our federal law enforcement effort to combat this threat appears to be hobbled by fractured responsibilities, bureaucratic mindsets, and a simple inability to respond. In interviews with law enforcement personnel around the country, I repeatedly heard of frustrations about CEOS serving as an impediment to the aggressive pursuit of criminal cases. For example, one prominent law enforcement official told me that CEOS often makes arguments against bringing cases in child pornography cases that would embarrass a defense lawyer. I saw the reasons for this aggravation in Justin�s case. From the time that the government was notified of Justin�s information to the point where the children in direct danger were saved, more than 50 days passed. Efforts by Justin�s lawyer to push the government into action were met with silence. Requested subpoenas were not issued for weeks, delays were imposed because bureaucratic approvals were being sought from people on vacation. Important data offered to the government by Justin has, even at this late date, not been collected and has only been reviewed by me. As for the material that the government did collect, weeks past before a forensic computer specialist could examine it -- about average for the Justice Department. Some people identified as perpetrators literally could not get themselves arrested if they tried: As I reported in the Times, one of these potential defendants, Justin�s father, who at the time lives in Mexico, attempted through his lawyer to turn himself in at American consulate in Mexico City. I personally witnessed a conversation where Justin was informed that CEOS had held that this potential defendant could not be prosecuted because, even though he was playing a role in broadcasting child pornography into the United States, he did so from across the border. The problems spread throughout the government. For example, agents with Immigration and Customs Enforcement (ICE) had for months been investigating a child rapist who had separately been identified to CEOS by Justin as one of his molesters; indeed, Justin possessed video evidence of the crime. These ICE agents at the time were unknowingly searching for Justin, whom they knew solely as a boy from Bakersfield who they suspected had been abused by this serial molester. Those agents heard four months after Justin�s meeting with CEOS that the boy they were searching for was already a federal witness. But that information was not passed to them by CEOS; instead, they learned it from me, a newspaper reporter, in the course of an interview. Justin Berry stepped forward at a time the government did not know he existed. He is, to experts� knowledge, the first such teenage witness to ever turn over this kind of vast evidence to the government. Given the way his case was handled -- including the meager results -- it is hard to imagine other teenagers wrapped up in this world will risk their freedom or safety to follow in his footsteps. Each year, each week, each day, predators are becoming more sophisticated with computers, facilitating the growth and evolution of online child pornography. My reporting has shown me, we are woefully behind. Thank you. Mr. Whitfield. Mr. Eichenwald, thank you for your testimony. I also want to thank you for the articles that you wrote in the New York Times which bring this matter to the attention of the entire country. We really appreciate your testimony. At this time, I am going to recognize the full committee Chairman, Mr. Barton of Texas, because he has a meeting down at the White House and he is so interested in this issue and wanted to ask some questions. Chairman Barton. Thank you, Mr. Chairman. I want to thank you and Mr. Stupak for allowing me to go out of order. I appreciate that. I do have an engagement at the White House in 15 minutes so I am going to have to leave after these questions. I have been listening in my office on the television to the testimony of both witnesses and I do want to thank each of you for appearing. It is a great credit to your courage, Mr. Berry, that you are here and it is a great credit to the journalism profession, Mr. Eichenwald, that you are here. I must remind my friend from the New York Times that when this committee does issue a subpoena it is outweighed. I mean, you seem to think you are doing us a favor by showing up and you are, but you would have showed up whether you wanted to or not if you had insisted not to be here. Having said that, we are very pleased that you are here, do not think this is any kind of an argumentative situation. My first question is to you, Mr. Berry. I cannot fathom how you could conduct the activities that you conducted in your home with a mother who appears to have been as concerned as you indicated she was. How did you get around her efforts to prevent you from doing what you did? Mr. Berry. To tell you the truth, that is probably the most asked question that I have recently encountered. My mother is great, she is wonderful, I love her a lot, and she cares for me more than I can imagine. Her efforts were no match for the pedophiles. They were no match for the predators. Whenever I needed to, whenever I felt that I needed some more space outside my home, one of the perpetrators came down to Bakersfield, California where I lived and rented me an apartment on the street. When I was-- Chairman Barton. So you did this outside your home? Mr. Berry. It started in my home, went to the apartment which this individual that I had-- Chairman Barton. Where did your mother think you were when you were at this apartment? Mr. Berry. I would tell her I was going to a friend�s house or something like that. Being as I was not 18, I could not rent the apartment myself so this individual signed the lease and after that, I had recently, I had graduated high school early at 16 and my mom told me I could not move out of the house until I graduated high school, so I took care of that. After a few months had passed, I had moved to Mexico with my father. Chairman Barton. Your father encouraged this apparently. He thought he could profit by it. Mr. Berry. Correct. I told my father about the business when he asked where all my money was coming from and he helped me. Chairman Barton. Well what did your mother think about where all this money, or did you hide your money from your mother? Mr. Berry. Living two separate lives and having to come home and be the Justin that I was for the family, and then living a different life in Mexico was very difficult. Chairman Barton. Now you indicated that you were an honor student and that you were president of your class. Is that right? Mr. Berry. Correct. Chairman Barton. But you also said you were very lonely. Can you reconcile that? I mean how can you be the president of the class and be lonely? Mr. Berry. For me, I am not sure on why I felt certain ways or why I did certain things. All I know is these people, I thought they were my friends. Chairman Barton. Did your friends at school, were they aware of what was going on or did you hide that from them, too? Mr. Berry. I hid this from everyone for years. I did not tell anyone until recently. Chairman Barton. So where you actually lived, your what we call traditional friends in school, in church, and the neighborhood thought you were just a normal teenager. Mr. Berry. That liked to sit on the computer a lot, yeah. Chairman Barton. Which is fairly normal for teenagers these days, that is what teenagers do. Mr. Eichenwald, what should we do about these credit card companies that knowingly or maybe even unknowingly foster this kind of activity? Are there some remedies that are not in current law that you would recommend? Mr. Eichenwald. Mr. Barton, in truth, I do not know. The danger of a reporter is that we come in and we know what we have reported, we know what we have found, and it gives us the view of an expert. I do not know the laws governing credit card companies. I do not know what standards are in place now which is why I was saying I do not think it is my place to offer policy pronouncements. I think anything I would say would be hardly uninformed. Chairman Barton. Do you care to, either one of you, foster an opinion about we are having a markup starting this evening and then beginning, and then continuing tomorrow on the new video services bill in which one of the big debating points right now is the concept of Internet neutrality and freedom of the Internet. Are their exceptions to total freedom of the Internet and if so is this one of them? Should there be some laws, explicitly Internet, concerning Internet behavior for child pornographic activities. Mr. Eichenwald. I have never understood why there was a difference between the Internet and the mails and walking down the street with a bag in your hand. Child pornography is illegal and those who facilitate child pornography are committing a crime. If a credit card company is involved in the business and it can be demonstrated that they are for example involved in multiple lines of child pornography, if I was a prosecutor, I would certainly like to have that case. The bottom line issue, I think sometimes we tend to think ourselves too much into a spiral. If someone is engaging in an act that is illegal, they should be prosecuted whether they are an individual, a company, or whatever other level of involvement there is here. I can tell you for however disturbing these issues have been and I deeply appreciate what I have heard from the members about how disturbing these things are, I can tell you that the reality of what I have witnessed over the last number of months is far worse than anything you can imagine. It is far worse than anything you would want to imagine. Chairman Barton. Right. Mr. Eichenwald. This working on the story resulted in many, many months of being unable to sleep. There were images I could not get out of my head when the lights went out. Ultimately, I have been, as a result of my reporting diagnosed with post traumatic stress disorder. Fortunately, the Times is making sure I am taking care of that. I say all that to underscore that if there are people involved in this business, whether they are on the Internet or not, this has nothing to do with freedom, this has to do with sexual abuse, and those people should be prosecuted. Chairman Barton. Mr. Berry, do you have a comment on that? Mr. Berry. No, sir, I do not. Chairman Barton. Okay. Last question. You ask topical questions. We have had a testy relationship with the Justice Department. We, being the committee in this investigation, although the Attorney General has been very cooperative and we are getting cooperation, could they have done more in your case, Mr. Berry to go after the perpetrators and if so, what should they have done that they have not done? Mr. Berry. When we came forth to the Department of Justice and told them, when I went and spoke with them and told them about the children who were being abused and molested and exploited by these adult perpetrators, sitting there and wondering every night, were these children that I knew being molested, why weren�t they safe, and having to wait there 50 plus days, almost 2 months knowing that these children are in the hands of these perpetrators, that ripped me apart. Chairman Barton. Mr. Ryan, would you want to comment on that? Mr. Ryan. I would, Mr. Chairman. Chairman Barton, let me give an example of a question that I think the Chairman might ask on Thursday of the Department. Given that we turned over approximately 1,500 IP addresses, matching credit card information, and other identification for people who are paying for child pornography, as a policy call, I am not sure you would want to prosecute all 1,500 of those cases. But I sure think that you would want law enforcement to get search warrants and go get the computers of those people and leave their wives and daughters and other people in their house asking that person why it was that the FBI or ICE or another, the Postal Service who do excellent work, had dropped by to seize it. I think the Department needs to explain whether its policy is to indict those people or to do something with them. I think-- Chairman Barton. Well we want them to do their investigation and we have every indication from staff interviews that they are conducting an active investigation. I do not want to come across as being too negative. My question is, is it a fair policy question that even given limited resources and all the various issues that you had to deal with at the Federal level in determining to go ahead and prosecute, is it a fair statement that Mr. Berry, and you as his attorney, feel like they could have been more aggressive with the information that you provided them? Mr. Ryan. Yes, sir. Chairman Barton. Mr. Eichenwald, do you have a comment on the generic ability to prosecute these types of cases? Mr. Eichenwald. I do. Also on the comment of an aggressive, they are aggressively investigating. I have written about law enforcement issues for almost 20 years. Normally, I am not in this field, I am dealing with corporate crime, the most complex area of criminal prosecution. There you are dealing with thousands of pieces of paper, sometimes millions of pieces of paper. You are dealing with multiple witnesses, many of whom have financial interests not to testify. I have never seen a case in my experience move slower than this one. There were identified again at the beginning, multiple levels of people. You had identified particular perpetrators who had access to specific children, children whose names we knew, children whose faces we could describe, we knew where they lived, who were being filmed and molested. I must admit, I, to this day, do not understand what was happening over those 55 days. I do sit in horror worrying about the day I hear that on day 35, something happened to one of those children that was preventable. I cannot explain what happened there. Then there is the next level. I mentioned in my opening comments, my opening remarks the credit card processor. Justin mentioned the credit card processor. I was there at the beginning when Mr. Ryan was speaking to CEOS on, I believe it was on July 26 and saying the centerpiece of this case is meova.net, the company that is processing the credit cards. Justin Berry is a spoke. Meova is processing credit cards for child pornography. They are the hub. Not only that, the individual who was the president of meova.net had previously been subject to a child pornography investigation which he had escaped by saying oh, he did not know there was child pornography involving what he was doing. Mr. Ryan strongly recommended that the way to maximize the impact of Mr. Berry�s information was to immediately go after meova.net and to immediately seize its information, arrest its president because you had direct evidence that he was processing credit cards for child pornography. Hopefully flip him or a member of his organization to make this case branch out in the many directions it seemed like it could go. To date, none of that has happened because meova.net is still around. The president of the company, we are now 9 months later, the president of the company is still wandering around. In the Enron case, which I covered, it took 6 months until you had a senior executive indicted. A month later you had another senior all the way up to the chief financial officer. We are 9 months down the line and we have two low-level people who were molesting children or filming children, and they were arrested 55 days after the information was provided to the Government. You then have the areas of people who were involved in the infrastructure of this business who were identified by Justin where their information was contained in the documents and files turned over by Justin. These people are not secret. I wrote about them in the New York Times. I had always believed that I would be able to name people in the paper by the time the story ran. It never occurred to me that there would be no action by the Government. I also want to recount a story that was probably the more horrific moment in terms of my interactions with Justin. Eventually, at a point when I really was wrestling with do we have to write a story about the Government�s failure to do anything here. Eventually, Justin was granted immunity. One individual who was endangering children was arrested, a few weeks later another individual who was endangering children was arrested. Justin kept coming back to me and saying what about the other men who molested me? What about what they did? Finally there was a day he said to me with tears in his eyes, why is it the Justice Department does not care about the men who molested me? To this date, none of those men have been prosecuted. None of those men have been arrested, except for Mr. Mitchel who had the distinction of being the sole person who was identified as endangering other children who also had molested Justin Berry. So, if you ask if this is an active investigation or what more could they have done, in truth, the better question is what less could they have done. Chairman Barton. Well, I have spoken directly with the Attorney General of the United States on this and am absolutely confident that he is personally committed to actively pursuing the specifics and the generic investigation. We will have the Justice Department here on Thursday. And again, they have an active criminal investigation underway so they are not going to be able to talk on the specifics, but the fact that you two here are testifying in an open hearing, and being as brave as each of you are, is going to help activate those investigations even more, I am very sure. But I appreciate your testimony and again, I want to thank Mr. Stupak and Mr. Whitfield for letting me go out of order. I appreciate that. Mr. Whitfield. Thank you. At this time, I recognize the gentleman from Michigan, Mr. Stupak. Mr. Stupak. Thank you. And before the Chairman leaves, Mr. Chairman, I hope we could if Justice is coming in Thursday, we could pin Justice down because as you were asking Mr. Eichenwald his comments just sitting here, I already knew Justice would say well it is an active investigation, therefore we cannot answer half of our questions. So I hope we would take Justice in closed session or something because if we let them off the hook, this is just going to drag on and on. We have seen it so many times in this committee so I would hope that-- Chairman Barton. We are not going to let anyone off the hook. Mr. Stupak. All right, very good. And since we are on the lines of law enforcement and having been there for a number of years myself, Mr. Ryan or Mr. Eichenwald if you care to comment on action by the Government. I see a number of things and tell me what I am missing or what else should be on this list. First, I am sure is their lack of financial resources. Next, the lack of cooperation I have heard between ICE and FBI and Justice, inadequate laws either updated or not caught up with the computer, or conflicting laws between State and Federal, and the credit card processing which I bring up again because we have seen it last year in this committee alone on the Internet pharmacy where people are buying drugs improperly, illegally to great harm. We also saw it in masking of drug testing and now we see it on child pornography. Credit card processing seems to be as you said the hub of the wheel if you will, and not just merely a spoke. And we have had MasterCard, Visa, and all the rest of them in here and they keep saying we will get back with you on how we can best crack down on this and yet to this day we have never heard that happen. When I look at the problems of law enforcement and the issues or excuses they use not to move forward on this, is there anything else missing? Financial resources, lack of coordination, inadequate laws, conflicting laws, or processing of credit cards, any other area we should explore if we are going to do true law enforcement, truly aggressive enforcement? Mr. Ryan. Congressman, I think there are very few impediments to prosecution in this area and frankly, there may be distractions in the post 9/11 world that have taken some of the squads that may have worked this area before, and that would be quite legitimate that there may have been an emphasis on counterterrorism and other issues. If I could be bold enough, I would recommend to the committee that you privately convene the credit card industry at a roundtable here with staff, the members coming in the late part of that meeting and ask them what they would like to do here, because I think the kind of credit card companies we are talking about here are not Visa and MasterCard or the standard companies. These are companies we believe are heavily involved in an illegal business knowingly. So the question then is how can we identify those companies and I believe there are ways of doing that and I think industry knows them as well. And I do believe that cooperation between the business community and the law enforcement community in the area of child pornography can be increased without violating personally identifiable information of normal citizens and I think that is the challenge for the Congress with regard to that. The challenge for law enforcement here I would rather have a horse that I had to say whoa to rather than one I�ve got to hit all the time and say giddy up. I think the question for this committee in a sense with Justice is not so much if a law is inadequate, as is the level of energy enough and is the ambition of the 26, 27-year-olds, which we all were at one point, prosecuting the Department of Justice being unleashed on these people. Mr. Stupak. Well, but the credit card processing if its MasterCard or Visa that are being embarrassed then what I am saying, wouldn�t they have a greater interest to try to see who is processing these credit cards and for what purpose. Mr. Ryan. I think the legitimate credit card industry could be uniquely helpful to the committee privately in helping the committee understand, and helping law enforcement understand, what it is that they may be able to do to help on this problem. Mr. Stupak. Sure. You brought up 9/11 and I do not want to necessarily tie this in here, but it seems like on 9/11 we did not have coordination or Justice talking to this agency or that agency, and it seems now when we are 5 years post we are still not cooperating or talking with each other from a law enforcement point of view. And the victims here are children around this country. Mr. Ryan. Well let me say something. As a prosecutor for the Department of Justice, and I treasure the time that I spent there, I think it is the responsibility of the lead prosecutor in these cases to marshal the agents and their energy. The 1811s are not responsible for these cases; the prosecutors are responsible for coordinating with them so that the good work that the agents do will result in prosecutions to tell them what element is still missing that they want them to go get. And I think that we have to ask the Department of Justice about its leadership role in this case. Mr. Stupak. Part of this, I do not know if it is inexperience or what, but why would you put Justin Berry, your witness here, disclose his identity as he testified to in the court case which actually threatened his life and had made him now a greater victim than what he may have been? Mr. Ryan. I have to say Mr. Berry is one of the bravest and frankly he is a very smart young man. He understands the danger that he undertook. He was at the height of danger last summer when these people were really looking for him and they are amateurs in a lot of ways, but amateurs can kill you just the same as professionals. Mr. Stupak. And certainly I would echo those comments but at the same time who left them out there? Law enforcement, if you will, Justice left him hanging. He is still out there. Mr. Eichenwald. I would interject--there was a point after the Justice Department unsealed the affidavit that revealed Justin�s role in this case, there was a lot of backpedaling and apologizing. And Justin was offered, I know this because it happened while I was sitting there, Justin was offered whatever levels of protection could be brought forward. At this point, we are 70 days into it and Justin truly had absolutely no faith in the Justice Department and he said to me if I ask for something, they will know my address and if they know my address, how do I know they are not going to open the document and unseal it somewhere. And there was a point where he was told that the Justice Department would do anything he asked to make him feel safe. And his response was telling. His response was tell them to stop being so stupid. Mr. Stupak. Well, Justin, thank you again for being here and for helping parents and young people across this Nation. Let me ask you this question and if you can answer it. Is there any reason why a 13-year-old needs a webcam? Mr. Berry. That is a very simple answer, no. Mr. Stupak. And they put this out as a promotion if you would sign up with their service? Mr. Berry. Correct. Mr. Stupak. Okay. And the spotlife.com was that pre-noted or anything or-- Mr. Berry. Spotlife.com, I do not believe it exists at the current date. There are other sites that are similar and just like it. That company is owned by Logitech which is the manufacturer of the webcams. So spotlife.com was a way that Logitech, I guess they envisioned that these webcams they can communicate through the Internet, meet new people. It was a site like that. Mr. Stupak. It just made it all so convenient. Mr. Berry. It just did. Mr. Stupak. Let me ask this. You mentioned that your mother had child protection programs, took away your keyboard, but the folks you were dealing with where sophisticated enough to work around that. Explain that for me, how did you get around it? Because I am sure that parents buy things and say we have this protection out here. Mr. Berry. You know, I am not a computer genius, I know a little bit, however, with the help of these people. Let us just say my mom takes away my keyboard. Mr. Stupak. Okay. Mr. Berry. And the next day I hop on the Internet and I say, okay, I need another keyboard, what am I going to do here? Let us say I am discussing this with these people, I could have ten keyboards FedEx�d to my house by same day delivery if I needed it. Mr. Stupak. Sure. Mr. Berry. These pedophiles are no match for any parent out there. Mr. Stupak. If you can answer this, maybe you cannot. What was the greater gift if you will that you received when you first started down this unfortunate road? Was it the physical presents that were left at your doorway or was it the compliments, the companionship, the popularity, or as you said the king of the universe. Was that the motivating force or was it the physical gifts? Mr. Berry. I really could not tell you exactly what I was thinking or what drove this. All I know is these people are the most manipulative and the most relentless people that I have ever encountered in my life. Mr. Eichenwald. If I could add, I have the unfortunate distinction of having read many of the conversations that Justin had with these predators. And when he says they are relentless, that is truly the correct word. They would act to remove any impediment to these shows. The moment depicted in the story was when Justin had a girlfriend and she found out what was going on and was basically begging him to stop. And this, every element of his life was repeated to these people and they begin telling Justin how terrible it is she is saying this, how terrible. She is willing to let you spend your money on her, but she does not want you to earn it. And the line that I quoted was from one person, "She may not love you, Justin, but your friends in this room do." That is the entire mindset. They will remove anybody. They will take care of any impediment. They are 1,500 people acting to subvert the actions of a single parent and they win. Mr. Stupak. Let me ask one more thing, if I may, Mr. Chairman. Mr. Whitfield. Yes, certainly. Mr. Stupak. We talked earlier with Dr. Cooper about the benefits of your personal gratification or else the commercialization if you will of this pornography. But you brought in a third element, the advertising that are on these sites. I mean, have we become as a society so accepting of it that we advertise on these sites? I mean, I was shocked to hear that. Could you explain that a little bit more? Mr. Eichenwald. The advertising is not taking place directly on the children�s sites. The minors or there have been sites that have been put up called portals which are basically--the advertising is not taking place directly on the children�s sites. If you are looking for webcam child pornography, it is hard to find. You have to know where to go. Well the portals solved that problem. The portals are a listing of webcam sites which a customer goes in and votes for their favorite site. The more outrageous the behavior of the child, the more votes the child gets. These votes become this self-reinforcement, this element of a kid feels good about herself or himself because they are getting more votes than other people and so they do things to get votes. I saw people who said I will let you watch me sleep. I saw, if you do this, I will do that. There were some very explicit offers of what would happen if people voted for them. Getting higher votes moves you higher up the list. Being higher up the list gets more customers. That little competition is going on right beneath an ad for Logitech or an ad for Verotel. The companies, I do not know if they simply do not look at what is going on in the places they advertise but the committee has some samples of a particularly well-known portal and what was there. And you have, you know, I am a 14-year-old, you watch me in my bed, I mean, they are not being subtle. They are not making a secret. And also you get down to what is it people think is being paid for? These are children in front of a camera charging money. What in the world does anyone imagine is going on there? And so I think what we have is not that we are just, we have fallen so far is that we fall to the level of well I can deny it. You know, I do not explicitly know what this is. Mr. Stupak. Sure. Mr. Eichenwald. But anybody who looked at it for 10 seconds would know exactly what it is. Mr. Stupak. Thank you again, Mr. Chairman. Thank you, witnesses. Mr. Whitfield. Justin, in your testimony, you talked about spotlife as and I believe that was the vehicle by which you were first introduced into this world. Is that correct? Mr. Berry. That is correct. Mr. Whitfield. And would you elaborate on that just a little bit about exactly what spotlife was. I know there are other similar vehicles today but would you elaborate on that just a little bit? Mr. Berry. What spotlife.com was was an Internet website similar in nature to what he, Kurt, spoke about, however this is a little bit different. What it does is it was a website which allowed viewers like yourself, the nice lady sitting next to you, whoever it might be to go on these websites, browse through a directory, and view the different web cameras that are hooked up through this software. Thereafter that the guests of the website if there was contact information on there, could contact that person with a camera and after that they would begin speaking. So it is basically an automobile to communicate with the webcam user themselves. Mr. Whitfield. And you had a webcam at that time. Correct? Mr. Berry. Yes, sir. Mr. Whitfield. And then you, I think in your testimony you, someone contacted you and said that if you would take your shirt off, they might give you $50? Mr. Berry. Yes, sir. Mr. Whitfield. And that was the first time that you had ever had an experience like that. Is that correct? Mr. Berry. Correct. Mr. Whitfield. And so it just kind of went on from there? Mr. Berry. From there it escalated. Mr. Whitfield. Okay. Now I read a lot of this testimony and I read the newspaper articles that you wrote, Mr. Eichenwald, and of course talked to Mr. Ryan some. I have not talked to the Attorney General, although the Chairman has, but I must say without hearing from their side, it does appear to me that the child exploitation and obscenity section of the Justice Department has a lot of explaining to do because you did give them 1,500 names with addresses, with credit card numbers and everything else, and I find it just unbelievable the different stories that I have heard about this investigation and it appears that this center, this section in the Justice Department is failing miserably on this issue. So I am looking forward to Thursday when they do come and testify. Hopefully, we can get some answers from law enforcement and follow up on this as well. But Mr. Eichenwald and Mr. Ryan, I know that when Greg Mitchel was, he was convicted I believe. Was he convicted? Mr. Ryan. Mr. Chairman, he was indicted, arrested, has plead guilty, and on April 12 he will be sentenced. Mr. Whitfield. Okay. But one of the reasons that he is going to be convicted and will be sentenced is because of the evidence that Justin provided. And what is the explanation for the Justice Department unsealing that information? Mr. Ryan. Mr. Chairman, I wrote a letter recently to the Department and I would ask that you put that letter and the Department�s response to me in the record. We summarize it as follows. The understanding that I have is that the unsealing of the affidavit that identified Mr. Berry not by name but for those who are looking for him, identified that he was cooperating. I believe the Department�s position is that it was a mistake that it was done. In my experience when a prosecutor makes a mistake, and we do make mistakes as lawyers, you try and put the milk back in the bottle. That is you reseal the affidavit. I am not aware that any effort was ever made to reseal the affidavit but that affidavit once it was released would have given notice to everyone in the business who had done facilitation of the business like the credit card business to dump the server box for example, drop it off a bridge, put it in a dump, erase the random access memory, you know, do various things. But I do believe, I take at face value the Department�s representation that they really had not intended to do that and that it was a mistake which is in the letter that I received last night about 5:00 in preparation for this hearing. Mr. Whitfield. Okay. So they basically said it was a mistake but that was a mistake some time ago and there has been no effort to reseal. Is that your understanding? Mr. Ryan. You know, traditionally, Mr. Chairman, these things do happen at a court. It could be the fault of the prosecutor, it could be the fault of a court official. Mr. Whitfield. Right. Mr. Ryan. What you simply do is reseal the information-- Mr. Whitfield. Right. Mr. Ryan. --and try and pull it off the Internet which you can do. Mr. Whitfield. Right. Ryan, at the time that you were negotiating with the Justice Department for immunity for Mr. Berry, there was valid reason for Justin to be concerned, right, about his life. I mean, did you feel at any time that his life was in danger? Mr. Ryan. Mr. Eichenwald and I both observed emails of people who were frantically looking for him at various points. One of those was--well there were these emails that reflected that. It was our judgment that it was best for him to be at a location that is not identified. We have never altered that practice. Mr. Eichenwald and I continue today to advise Justin to not describe for example here where he lives. And it is just best for him that way. And I have to say that law enforcement offered us their protection. But I took seriously the concern that some of these child molester perpetrators might hurt him if they knew where he was. I actually took it as a potential threat. Mr. Eichenwald. Mr. Chairman, I was a direct witness to the magnitude of the hunting that was going on. The most frightening day in all of this in an array of frightening days, Mr. Mitchel had somehow figured out that Justin had possession of his mother�s cell phone and was sending text messages to it. And Justin was very upset by this and basically gave me the cell phone which by the way is still in my possession. That cell phone, he would say, I have money for you. There was another child that Mr. Mitchel was filming. He would say, Justin this other child is very upset, he wants you to call him, please call, very manipulative acts. And then there was the day when the message arrived and I looked at it and it was my home telephone number and with no other explanation. And apparently, Mr. Mitchel in his efforts to find Justin had somehow obtained Justin�s cell phone records and found that he had called a number he did not recognize. I showed that message to Justin. I showed Justin all the messages that came in. And he panicked. He looked at it, I think rightfully as a potential threat to my family. And he devised what I thought was a fairly brilliant response. We were planning to go the next day to Bakersfield for me to examine some of the hard drives that contained the conversations I mentioned earlier and Justin contacted Mr. Mitchel and engaged in a rambling conversation which was basically all fake saying send me my money, wire it to me, send it to Bakersfield. The idea being he would pick it up in Bakersfield and then no one would ever come and look for anyone in my home where I have two children. Mr. Whitfield. Right. Mr. Eichenwald. That took place the evening before we left and by the time we arrived in Bakersfield the next morning, there were people hunting for Justin at the airport and they had already gone to his home the night before around, I believe it was around 10:00 at night thinking that he was with his mother. And from what we were told by his mother, there was a hotel by hotel search going on. We had hoped to go to Justin�s house to pick up these hard drives. We obviously could not and we ended up going to stay at the home of a friend of Justin�s mother and all of the equipment was brought over to us. But the speed with which we were talking, he was talking to somebody in Virginia and suddenly there are people hunting for him in California who I believed was a very strong suggestion of the level of potential danger that this young man was facing. Mr. Whitfield. Thank you. And in his testimony he talked about Ken Gourlay who actually is going to be testifying or appearing later. And that Ken Gourlay talked him into going to a computer camp up in Michigan and subsequently molested him there according to the testimony. Did Justin tell you that Ken Gourlay molested him? Mr. Eichenwald. Yes. And there has been nothing that has been more emotionally traumatic for Justin than in recounting the events involving Ken Gourlay. I was very surprised he was able to get through his testimony today. He has never been able to have a full presentation/discussion about what happened with Ken Gourlay without either becoming enraged or beginning to sob. And he also at one point showed me a video in which Mr. Gourlay, it was taken in Mexico in which Mr. Gourlay is in the video, walks behind the camera and begins operating the camera and the video becomes pornographic so I had no doubt that the things being described by Justin and Mr. Gourlay�s involvement were-- Mr. Whitfield. So there is no question in your mind from the evidence that you saw that Mr. Gourlay was involved in production of child pornography. Mr. Eichenwald. Not at all. Mr. Whitfield. Thank you. At this time, I would recognize the gentleman, Dr. Burgess from Texas. Mr. Burgess. Thank you again, Mr. Chairman. Mr. Eichenwald, do you, I think you spoke to it but there were times you were concerned for your own safety. Is that correct? Mr. Eichenwald. I was more concerned for my children. I know people who might feel my looking at people who do accounting fraud and I normally do not have to worry about are they going to come and balance my kids� checkbooks and there was a very large emotional element in this for me in terms of dealing with the reality of what was happening to other children, seeing my own children, realizing that Justin�s members in my hometown included a pediatrician, included teachers, included a lawyer who represents children and family issues. And I probably became more than a little paranoid about the safety of my own children but there were instances such as this situation with Mr. Mitchel where I was truly concerned for the safety of my kids. Mr. Burgess. And Justin, were you concerned about your mother�s safety during this time? Mr. Berry. Throughout all of this, I was very concerned. I was very concerned about the safety of me, the safety of my little sister. I just--these people are relentless. Mr. Burgess. And when you say there were people hunting for you at the airport in Bakersfield when you arrived, how does that occur? How does someone hunt for someone in an airport? Were you paged over the air, were there people that you recognized? Mr. Berry. Actually, when we got to the airport, Kurt and I, my mother was there to pick us up from the airport. Mr. Burgess. We have got five of those. Mr. Berry. All right. Mr. Burgess. Okay, go on, maybe six. Mr. Berry. All right. When my mother came to the airport to pick us up, she informed Kurt and I that my father had been looking for me and Kurt as well. Whenever we arrived, she said that staying at the house was not an option because an individual had come by that previous night asking if I was there as well, and let me know what was going on in that situation when I arrived. Mr. Eichenwald. When we arrived on our plane it was one of those situations, I failed to turn off my phone when I was in flight and as we landed, the message-- Mr. Burgess. I am shocked. Mr. Eichenwald. Yeah, I am sorry. We landed. I immediately had a message and my phone rang, his phone rang. His phone rang with a phone call. It was his mother who was fairly frightened who was saying there are people here. There were people who had come as well as people who were up from Mexico, including his father. They had come up the night before because they were involved in these activities and we were told that there were people at the airport who were looking for Justin. Mr. Burgess. Would you have been able to identify them? Mr. Eichenwald. I would not have been, I will say, no. Mr. Burgess. Justin, would you have been able to identify those people at the airport? Did you call law enforcement and say arrest these men? Mr. Berry. Well I never saw anyone with my own eyes, no. Mr. Eichenwald. And law enforcement as you can imagine when we were at, the Bakersfield circumstances were high pressure enough. It was immediately after these events that Justin contacted Mr. Ryan and solidified that relationship and Mr. Ryan immediately contacted the CEOS. That is why when I say it was July 14, the reason why is we were in Bakersfield on July 13. Mr. Burgess. Let me go back to something just for a minute if I could, Justin. I appreciate you being here and know this must be difficult but you said that someone rented an apartment on your behalf while you were still in high school or just graduated from high school? Mr. Berry. That is correct. Gilo Tunno who was originally of Portland, Oregon, at the time. I had been contacted by this individual over the Internet instant messaging and spoken with him. He offered to come to Bakersfield, California, and rent an apartment, sign the lease in his name because I was not 18 at the time. Mr. Burgess. But and so this was an apartment that someone rented that they allowed you to use. They did not rent you an apartment, did they? Mr. Berry. No, they rented it for me. Mr. Burgess. Now is it-- Mr. Eichenwald. When Mr. Tunno arrived in Bakersfield, I have the records from that apartment rental. He rented the apartment and then made sure there were two things in the apartment, Internet access and cameras. This was not Mr. Tunno�s apartment. This was Justin�s apartment that was rented for him by Mr. Tunno for the purpose of making sure that the shows continued. Justin�s mother was coming by his room too much and so that was going to be a problem. Once the apartment was rented, there was no problem anymore. Mr. Burgess. Now has this person been arrested? Mr. Eichenwald. That is the individual I mentioned who was arrested subsequently for raping an 8-year-old boy. That was the fellow who was being investigated by the Immigration and Customs Enforcement agents who were trying to figure out who the kid was in Bakersfield who they believed had been molested by Tunno. And again, that was information--they only learned that Justin-- they spent 4 months of their time trying to find somebody who was already a Federal witness and they learned that Justin was a Federal witness. They learned that this boy had come forward not only saying yes, he had been molested but that there is video evidence of it in the course of an interview with me. Mr. Burgess. Well Mr. Eichenwald, I mean you said it so eloquently, you are concerned about where are the arrests of the people that molested Justin and I guess I would ask the same question and what has been done to preserve evidence, what has been done to make certain that prosecution of these individuals is still possible? Mr. Eichenwald. I am not sure I understand. Mr. Ryan. Let me, I want to make sure that something is clear. This particular individual is a guest of the United States before Justin came forward to law enforcement. He was convicted based on other activities. Law enforcement did catch him, the ICE agent. We are cooperating with the case agents to help on additional work in that case. Mr. Burgess. I see. But Mr. Eichenwald, you had or gave us testimony that Justin had said to you when are they going to arrest the people who molested me. And I guess I would ask the same question. What is being done in that regard? What is being done to hold those individuals accountable, to present evidence, to preserve evidence? Mr. Eichenwald. I could not tell you. Again, some of the evidence regarding some of those individuals is contained on the laptop computer that Justin described to the Government back in July. No one has ever picked it up. I mean, that is why we talk about an active investigation when you say there are four hard drives, I believe it was four hard drives, it may have been six. The number of hard drives and there is a laptop computer all of which contain evidence. And they picked up the hard drives but they do not pick up the computer. I mean, it is sort of you are left scratching your head. I cannot tell you what is being done. I cannot tell you why things are the way they are. Mr. Burgess. Well if we can get some answers when the Department is in here on Thursday. Mr. Eichenwald, I just commend what you did. A good deal of likelihood that Justin would not be alive today had you not intervened. It certainly, I mean it is a fantastic story that you just literally stumbled upon one day. Is that correct? Mr. Eichenwald. One of the very strange things about the webcam pornography business is that if one, I mentioned the competition. If one site or one group of sites become successful, the competitors will start to launch very devious ways of attacking them. What happened for me is I came across one of these devious attempts to attack a site. I had just come back from a book tour on my last book about Enron and decided I wanted to do something international on the same area I deal with so I did a search for, a did a Google search for Interpol fraud alerts and in the course of looking through what popped up, I came across what purported to be a posting by a Tallahassee law firm about an Interpol investigation involving eight, I believe it was State Attorneys General who were looking at fraud, a fraud case involving a series of websites. Most of those websites were a credit process or many of those websites were credit card processors. The posting was detailed, I was delighted. This was a story that was wrapped up in a bow. I just had to figure a little bit out. I would call the law firm and I have something in the paper. As I went down looking at what each site was I came across a site called Mexicofriends. Given that it was a fraud case and it was called Mexicofriends, I thought money laundering, there was something good here. Mexicofriends at that point was a dead site so I stuck the word Mexicofriends into Google as a single word, and found a bunch of people talking about somebody named Justin who was obviously a porn star. I did not understand what, that had to do with fraud, but it sounded like it was getting to become a more interesting story on some level. And eventually once I had what I could get out of those listings, I went to something called archive.org which is a site that preserves images of old websites and in the course of looking at what are these things that I have not been able to find, I put in mexicofriends.com and up popped an image that it looked like something you would find in a seventh grade school book. It was not pornographic, it was a photograph of Justin at the age of 14. Now right now he is 19 and I think he looks about 16. When he was 14, he looked like he was about 12 or 11. And as I am looking at that, I very quickly came to realize that this image, this person I am looking at was Justin. Is the person who I had already knew was some sort of porn star. And the level of disconnect in my head was huge. I did not know what I was looking at, what I was dealing with. I do know that I was abjectly horrified. And I did not at that time think wow a news story. In fact, my thought was I have to figure out if this is real. And about that same time I found out that the original posting, the Tallahassee law firm I was going call, the Tallahassee law firm and say well what is this and what about this kid, it ended up that the original posting was a fake. It had been posted, I believe by a competitor to a number of sites that use different credit card processors to say there is a criminal investigation so all the customers should not go there, they should come over here. I subsequently understood the bulletin board it was posted on was one used by webcam operators. So once I realized that was fake, now I just had a kid out there wrapped up in child porn but maybe that was false too because all I had was an image that could have been cropped out of any seventh grade school book and I began trying to figure out if it was real, not for the purpose of doing a story because truthfully I did not, it did not occur to me there would be a story there, not bother to get law enforcement. There was a posting for Justin�s instant message address. Actually, there were postings for his email which he never responded to any of them, apparently he did not use them anymore. And then there was a posting for his instant message address. I put that in my buddy list. He eventually signed on. I tried to contact him twice. Both times I was too aggressive in my questioning. I started off by saying something like how old are you and he immediately blocked me. But after that, I went onto a third screen name and tried a much slower approach and it was not until a number of days after that, I cannot tell you how long it was when I finally became convinced that he was a real person and that he was a real teenager because I was asking him what do you want to accomplish in your life? What is it you want to do? And he replied I want my mother and my grandmother to be proud of me. And at that moment, I knew I was dealing with an abused, sexually abused child. And subsequent to that, made a rapid arrangement to meet him in Los Angeles at which point I revealed, and at that point I began to realize there was a story here and I was in the problem of not having identified myself as a reporter. So when we met, I immediately identified myself as a reporter, explained who I am, what I do, and after about an hour of questions from him and then began asking him details about this webcam world. Mr. Burgess. Mr. Chairman, you have been very generous. I just would ask if I could ask a question to be answered in writing by Mr. Eichenwald. I know you must have thought about the issue of freedom of the press for a place like myspace and yet restriction of online predators and I actually would be very interested in the journalist take on freedom of the press versus controlling the abuse of the Internet for child pornography. So with that, I will yield back. Mr. Whitfield. At this time, I recognize the gentlelady from Tennessee, Mrs. Blackburn. Mrs. Blackburn. Thank you, Mr. Chairman. I appreciate that and I am going to be respectful of your time and of the committee member�s time today. We truly appreciate the time that you have given. Mr. Eichenwald, your series is riveting and having read through that it is well done. I am glad you did it. But you know, I think that reading it and listening to you and Justin today, it just shows us time and again the frustration that our constituents have and rightfully so many times in trying to deal with the Government, in trying to deal with government agencies, and trying to deal with the bureaucracy, whether it is with this issue or whether it is with other issues. And I thank you for what you did and for the accountability that you have called us into by placing some criticism and some questions and laying those on the table for us to consider. Addressing the moral security of this Nation, there is nothing greater that we do. And it is a responsibility that we take as being a very important responsibility and our constituents should be able to trust that we are mindful of the need to protect and address the moral security of this great Nation. Mr. Eichenwald, reading your articles and then looking through the testimony and I know you said that it is hard to get in here and kind of quantify the scope of online child pornography and you mentioned there are five, you had at least 585 sites that were created by teenagers. Is that correct? Mr. Eichenwald. That is an internal listing off a single portal. I have actually provided that listing to the committee. Mrs. Blackburn. And so that was one portal. Mr. Eichenwald. That was one portal. Mrs. Blackburn. Wow. Okay, and do we have any way of knowing when you are on the Internet, when you go through one of the servers how many sites there are that deal with child pornography? Do we have any idea of the scope of the number of those sites? Mr. Eichenwald. I have, I know that what I have read in the interviews with law enforcement and interviews with folks from the National Center for Missing and Exploited Children whatever number we were to pick today would not be true tomorrow because the number is growing and growing very, very quickly. I just saw last night in fact that there is an organization that basically does Internet security and spam, capturing spam and one of the interesting things they do is they analyze the spam that they capture. And just last night, I saw this, they have come out with a report that the fastest growing piece of spam they are getting now is for new child pornography sites. Mrs. Blackburn. Okay. Now do we know how many of those within this universe of new sites that continue to pop up on an ongoing basis, do we have any idea if most of those sites are housed on U.S. soil or offshore? Mr. Eichenwald. The best analysis actually comes out of Britain. Right now the British are from what I have read, the British identify two areas of the world as being the primary locations for the production of child pornography. Eastern Europe is number one and the United States is number two. Mrs. Blackburn. Okay, I thank you. Thank you very much. Justin, how long--and I never found this in your reading. How long did it take before you mom picked up that something was not right with all of this new equipment and your attraction to the Internet? How long did it take her to kind of chew into this? Mr. Berry. Up until recently here, when I told her. Mr. Eichenwald. And if I could add in, I mean, Justin�s mom, you know, he comes at--what happened when he was 13 and 14, he was a 13 and 14-year-old. I hear about it as a parent. His mom began to notice there were problems, that he was not acting quite the same way, that he was behind closed doors more often she tried to get him to come on out, open the door, she began to sense he was withdrawing. She took him to see a mental health counselor who diagnosed him at the time as having ADD which he does not have. In fact, at the time, from what I have heard the belief now is that he was already experiencing problems from trauma, from the trauma of what was happening to him. And in terms of the equipment, he did have his own website development company and he was actually designing websites through real companies and actually getting paid for it. And so it was not unusual for him to have money or equipment. You know he could hide the more outrageous sums and just make sure that anything that she caught onto he would just say well that is from my website development business. Mrs. Blackburn. Okay. Mr. Ryan, let us go to the cell phone records. I think that all three of you mentioned that one of the predators, Mr. Mitchel had purchased Justin�s cell phone records. Do you know what avenue he traveled to purchase those records? Mr. Eichenwald. I do not know if he purchased them or not. I just know that he-- Mrs. Blackburn. He had those. Mr. Eichenwald. He suddenly was instant messaging Justin; a phone that he believed reached Justin but it was actually reaching me. He instant messaged my home phone number. Mrs. Blackburn. Okay. Well the cell phone record issue is one that this committee is addressing and whether it is pedophiles or identity thieves or drug traffickers or those that would seek to do an individual harm getting access to those records. That is something that is of great concern to us. I want to again thank you all for your time and for being here. And Mr. Chairman, I will yield back my time so that we can move onto the other panels today but I thank you. We will have some other questions that we will submit to be answered in writing. Mr. Walden. [Presiding] Thank you. The gentlelady yields back her time. I want to thank all of you for being here today obviously. And Mr. Eichenwald, I read the comments that you gave in a speech to Marquette University where you were somewhat less than kind, but obviously truthful about your views regarding CEOS. And in those comments, you said it became obvious no matter how urgent the situation, no matter how many times CEOS was told that the witness�s life was in danger, no matter how many times they were told of other children in peril, no matter how many times they were told about evidence being destructed, they would not act with any exigency. Is it as bad as you say it is? Mr. Eichenwald. I can only speak to this circumstance. Mr. Walden. Right. Mr. Eichenwald. And in this circumstance it was as bad as I say it is. It was very hard to understand. And I need to take a step back and let you recognize the strangeness of this situation. There has been a wide belief that the New York Times made the decision to persuade Justin Berry to become a Federal witness because we were offended by the fact that there were people who paid him for pornography. That is completely untrue. I would have been delighted to simply write the story and expose this but when Justin began to reveal that there were real children that he knew of who were being harmed and exploited and abused by real adults that he knew of and proceeded to show me evidence of this or certainly things that were suggestive that this was happening, I went to the executive editor and said we cannot just sit here and work on a story while children are being molested and raped. And so I was authorized to go back and tell Justin you need to become a Federal witness. The whole idea that there would be some huge delay when someone is coming in and saying this is what is happening, I have personal knowledge of it, I being Justin. I mean there is one of the individuals, probably the individual he was most worried about I know from a filing in Mr. Mitchel�s case that the Government obtained a videotape of this boy on July 26, the second day that Justin Berry was speaking to them. And so they were-- Mr. Walden. That was a result of that discussion? Mr. Eichenwald. As a result of that discussion they were aware that this existed. They knew that Justin specifically knew this kid. And they knew that he had said a man who molested me was in the room when that video was taken and other videos are being filmed. There was where Justin had a very difficult day when a video of that kid was posted that had been filmed obviously in a hotel room. And it was a question of how bad is this going to get. And so during that whole period of time, the difficulty for me was not having enough to write. Not having--I cannot prove anything yet. Mr. Walden. Right. Mr. Eichenwald. My reporting was not sufficient, but knowing in my gut and in my heart what is going on and also knowing that ll anybody had to do was go serve a search warrant and they would have all that they needed. Mr. Walden. And 1,500 names and credit card information data points that were given to the Justice Department and all the other information that you brought forward, do you know if the Department of Justice has arrested any of those people? Justin, do you want to-- Mr. Berry. I know that Mr. Mitchel has been under arrest, Mr. Tunno has been previously arrested. He is working with that on a different case. Mr. Walden. Right. Mr. Berry. Mr. Richards is another individual who was endangering children and there are others that have molested me that have not been arrested. Mr. Walden. All right. Mr. Eichenwald. I would also mention that Mr. Tunno�s arrest had nothing to do with this case. Mr. Walden. Right, yeah, I understood that from the other testimony. Mr. Ryan, you were a Federal prosecutor. Correct? Mr. Ryan. Yes, sir. Mr. Walden. I am not an attorney but explain to me this affidavit process. When the affidavit was released and made public-- Mr. Ryan. Congressman, it is very traditional in law enforcement. There is a covert phase of your investigation and the covert phase is very, very important because during that covert phase, you can get ready, for example, to serve search warrants in Boston. Mr. Walden. Right. Mr. Ryan. And in Roanoke, and in Bakersfield all at the same time. And we are very good at that as a Justice Department. Mr. Walden. Right. Mr. Ryan. I mean as a youngster, I was taught the business by agents and older prosecutors. In this case, an affidavit that depended on Justin�s testimony was the basis for the arrest warrant and search of Mr. Mitchel�s residence. That was a very important case and I credit the Justice Department and CEOS for prioritizing that. Mr. Walden. Okay, but what about the release of that information and the exposure of Justin and the exposure of these other men. Mr. Ryan. That case it was unforgivable in my opinion. Mr. Walden. But has it been resealed today? Mr. Ryan. No. Mr. Walden. Should it have been resealed? Mr. Ryan. Yes. Mr. Walden. If you were the prosecutor in charge, what would have happened? Mr. Ryan. If I had been anywhere near this case, I would have just immediately filed a one page application with the court to reseal the affidavit. Mr. Walden. And have you asked the Justice Department to reseal this or was that your role? Mr. Ryan. I said unprintable things to the Department of Justice when this was released. I asked them why frankly they could screw up a one car funeral by-- Mr. Walden. What was the reaction to you about A, releasing this and B, did you make a request that it be resealed and what did they say if you did? Mr. Ryan. The conversations on that, I would have to--let me try and recall them as best I can for the record but the bottom line is nothing happened. And-- Mr. Walden. So you did ask them to reseal and they have not resealed? Mr. Ryan. You know, I do not recall asking them to reseal it. I do remember telling them at the time that it was an outrageous piece of malpractice-- Mr. Walden. Did they explain why they released the in formation-- Mr. Ryan. There is a letter that is the best department explanation that I received last night at 5:00. Mr. Walden. And what does that letter say and could you provide it for the committee? Mr. Ryan. I can. Mr. Walden. Mr. Ryan, it is intriguing to me. This happened in September, right, that the affidavit was released? Mr. Ryan. Yes. Mr. Walden. And you got the letter how many hours before our hearing? Mr. Ryan. Well I raised it in a different context. Mr. Berry was never contacted to participate and provide a victim witness statement in the sentencing of Mr. Mitchel and I thought that since the Department had relied on his information to obtain the arrest and search warrant that they would be interested in using him as the key victim because he had been abused by Mr. Mitchel and it was in that letter that I pointed out, I guess ironically, that the Department had released the affidavit, they might want to come back and ask us for the information so that the court would know about the abuse. Mr. Walden. All right. Mr. Berry, I just have less than 2 minutes and I have to ask you what may be a difficult question for you to answer. But you have testified that during a certain summer, Mr. Gourlay who I think is here in the audience, took you to his home and sexually molested you, you were 13 years of age. And he was what, in his 20�s at that time? Mr. Berry. I believe so, yes. Mr. Walden. And were you scared? Were you upset? Mr. Berry. Upset is not even the word. Mr. Walden. And he promised it would never happen again and yet it did? Mr. Berry. That is correct. He promised me it would never happen again and it did. Mr. Walden. And he took advantage of you again. The question, I think probably a lot of parents have is having been through what you have been through, having seen that happen and happen again, why were you not able to cut off contact with Mr. Gourlay? And this is not an attack on you, but what is it that allows somebody to grip you like that to the point that you were scared, you were upset, you were all these things and yet being in your life. Mr. Berry. As a 13-year-old being molested and abused, I do not know exactly what my thoughts were. All I know is that I buried those emotions until recently and right now it really hurts. Mr. Walden. What advice would you have for other young people who may be in a similar predicament? How could they break it off where at that age you were not able to? What would you tell them? Mr. Berry. Yeah, truthfully I am not too sure. I am really not. I do not know if I would listen myself. I was pretty stubborn as a kid as most teenagers are. Mr. Walden. I understand that. All right, well thank you for your courage and for being here today. My time has expired. The Chair recognizes the gentleman from New Jersey. Actually, Mr. Ferguson, we are going to recess for 5 minutes to take a bit of a break and give our witnesses a bit of a break. We forget that sometimes and the committee will resume its business in 5minutes. [Recess.] Mr. Whitfield. The hearing will reconvene and the Chair will recognize the gentleman from New Jersey, Mr. Ferguson, for his 10 minutes of questions. Mr. Eichenwald is coming back in so Mr. Ferguson you are recognized. Mr. Ferguson. Give Mr. Eichenwald a chance to take his seat. Mr. Eichenwald. My apologies. Mr. Ferguson. Get back settled, not at all. Mr. Eichenwald, in your testimony, you referred to sites like myspace.com and buddypick.com and you called them a virtual Sears catalog for pedophiles. Can you explain why that is the case and if you would, would you try and be concise? Why do you believe that is the case? Mr. Eichenwald. Kids put up the images. They put up their contact information, many times to attract attention to their site; they pose in provocative ways. There will be shirtless shots. There will be everything there to suggest which kid is comfortable with what. And whenever there is a kid who is found who is more explicit than the usual, not illegally explicit, just explicit, just sexualized, I have watched these conversations. Those kids begin to be discussed by the predators. There are postings about them and the links to their sites are posted. Mr. Ferguson. I know you said that you were not here to make public policy recommendations, I understand that. But what do you believe the ISPs should do with regard to these sites? Mr. Eichenwald. The ISPs have a responsibility. I truthfully do not know. I mean the reason I do not make public policy pronouncements is because I simply do not know the mechanics and mechanisms. And ultimately, I am not sure what an ISP is capable of doing or should be required to do. I think I would say Steven Ryan knows a lot about that. Mr. Ryan. Congressman, I think this is-- Mr. Ferguson. Just pull the microphone closer to you, please and turn it on. Mr. Ryan. My technological guru. Congressman, I think the legitimate ISPs do a lot in this area. The problem of course is they have to balance the rights of privacy of legitimate subscribers and also not invading communications. I think it would be very useful for the committee frankly to have a roundtable discussion without the press here, with staff, with the Members coming in at the end to find out what the ISP industry can do in this area. I really do think that industry could be an important partner with law enforcement. There is a center that has been established in Pittsburgh that is a cooperative center between State and Federal law enforcement and in my corporate capacity when I am representing corporations, we have established relationships with that Internet clearinghouse center for law enforcement and we do make referrals there. So I think there is important work that is being done by the private sector with the law enforcement community in this area. I think it would benefit the committee to know more about that. Mr. Ferguson. Okay, I appreciate that. Justin, Mr. Berry, your testimony, you mentioned that child predators over the Internet are laughing at law enforcement. What do you mean when you say that? Mr. Berry. When I was still in this business, I talked to or spoke with one of the child predators and told them I was going to turn them in to law enforcement. Their response to that was they laughed at me and they told me that I would be the one in trouble. And that I would be the one being prosecuted for child pornography. I wish I could say that would be true or would not be true. These people, the law enforcement efforts I do not know what is going on in all the cases. All I know is what is going on in this case and it seems that they are right. Mr. Ferguson. These folks are technologically savvy. Mr. Berry. Some are, some are not. Mr. Ferguson. I am talking about the folks that you described as the predators, the folks that are laughing at law enforcement. These are folks that are Internet savvy, they are technologically savvy. Mr. Berry. Like I said, some are, some are not. Mr. Ferguson. Why do you think it is difficult for law enforcement to find these folks, the folks that are making and distributing this material and buying these images of children? Mr. Berry. Maybe asking them would be a better question. I do not know if-- Mr. Ferguson. Well we will. I promise we will. I wondered if you maybe had any theory or any thoughts with regard to this. Mr. Berry. I have been heavily disappointed by what has happened in regards to this case. And I can see if that is a reflection on the United States and how they feel and how they prosecute child pornographers, well I can see why they would feel that way. Mr. Eichenwald. Congressman, there is one individual I would strongly recommend the committee speaking with. I will have to get you his name later. He is an art professor at a university who as an experiment in 2000, spent many months trafficking among the predators basically doing what I have been doing and watching their conversations. And actually it was from what I interviewed him in the course of my article and he is the first one who told me about how the predators truly laugh at the Federal enforcement effort. That they believe the only people who get caught are the ones who are just too dimwitted to figure out how to handle the situation. A lot of it does have to do with the technological capacity of the people who are the predators. They share information on how to avoid leaving footprints, how to avoid leaving any evidence that they have been to sites, any evidence of what they put on their computers. Mr. Tunno, who we have heard about a number of times, who is involved in this situation, actually had invented a computer that had no hard drive so when it was unplugged from the wall, the illegal images or whatever other evidence was on the computer would disappear. These are smart people. They are sophisticated people. They know that, if child pornography is what they want, they know how to get it, requires them to be technologically sophisticated and unfortunately they are ahead of the game. Mr. Ferguson. I am advised by staff that professor�s name is Philip Jenkins. Mr. Eichenwald. That is it, yes. Mr. Ferguson. He has been interviewed by the committee staff. That is the professor you were talking-- Mr. Eichenwald. He is a wonderful resource because he is a person who has been for many months and he wrote a fabulous book about this--for many months talking with these people and his information dates back to 2000. But from a historical basis in particular, it really underscores the obsessive nature of the online predator as well as the technological sophistication and their contempt for Federal law enforcement. Mr. Ferguson. Now Mr. Chairman, we are obviously continuing our investigation into this subject and I would imagine and I would hope frankly as we learn about whatever inadequacies there may be in the law, that as we look at legislation to correct and address problems in the law in terms of prosecution, information available to those clearinghouses and whatever else, I would respectfully suggest that we might name that legislation for Justin Berry. He has been through a lot and he has experienced a lot. He has done some difficult things and courageous things. By his own admission he has made mistakes and it has taken a lot for him to appear before the committee today. And I would hope that we would consider that. I have a couple of more questions for Mr. Berry. What do you think would be a fair sentence for the men that you say molested you? Mr. Berry. These people, these predators are not going to stop. If you arrest them, they are going to go back and find another kid and they are going to keep doing it until they are put away. I would hope they would get life. Mr. Ferguson. You testified, Mr. Berry, that you now see Ken Gourlay�s molestation of you as the beginning of your downturn, the beginning of this spiral that you entered into in your teenage years. Why do you think that? Mr. Berry. When I was molested by Ken, before that I was a happy kid. I went to school, I played in sports, I had a few friends. Afterwards, now that I look back in retrospect, my life from there on has changed dramatically. I would have never imagined I would have done the things that I have done and I am not proud of it. I cannot say exactly how it affected me, all I know is to this day right now I am seeing a psychologist and I am a pretty messed up kid. Mr. Ferguson. Thanks very much for being here today and we appreciate your testimony. Mr. Eichenwald, we appreciate your testimony as well the work that you have done in uncovering this situation. And I yield back, Mr. Chairman. Mr. Whitfield. Thanks, Mr. Ferguson and we appreciate your suggestion and I do think that we obviously are going to be looking at legislation to enforce the firewalls relating to this issue and it is a complex issue and we will need to work on that. Your suggestion in naming that after Justin Berry is something we definitely will consider and will follow. Mr. Walden? Mr. Walden. Mr. Chairman, if I might. Mr. Berry is there anybody in this room who you believe molested you? Mr. Berry. Yes, Ken Gourlay. Mr. Walden. Thank you. Mr. Whitfield. Are there any other questions of this panel? Okay, well I am going to thank the three of you very much for your time, for your testimony. Justin, we know that it was quite difficult for you and we look forward to staying in touch with you through our committee and wish you the very best in pursuit of your college degree. And Mr. Ryan, thank you very much for your testimony. And Mr. Eichenwald, we once again thank you for the articles you wrote in the New York Times to focus attention on this issue. And with that, we will release this panel and we will call up the next panel which will actually be the third panel. And that is one person and that is Mr. Ken Gourlay who is accompanied by his attorney. I believe his name is James Rasor with the Rasor Law Firm in Royal Oak, Michigan. And Mr. Gourlay, if you would have a seat at the table. Now Mr. Gourlay, you are aware, you have watched the other panels and you are aware that the committee is holding an investigative hearing and in doing so we have the practice of taking testimony under oath. Do you have any objection to testifying under oath today? Mr. Gourlay. No, sir. Mr. Whitfield. Under the rules of the House and the rules of the Energy and Commerce Committee, you are entitled to be advised by legal counsel about your constitutional rights. Do you desire to be advised by counsel during your testimony today? Mr. Gourlay. Yes, sir. Mr. Whitfield. And would you identify your counsel for the record, please? Mr. Gourlay. Mr. James Rasor. Mr. Whitfield. And you are Mr. Rasor? Mr. Rasor. Good afternoon, Mr. Chairman. Mr. Whitfield. Okay, thank you. Mr. Rasor. Jim Rasor of the Rasor Law Firm in Royal Oak. A pleasure to be before the committee today. Mr. Whitfield. Okay. Mr. Rasor. And I think this has raised some very interesting questions in testimony. Mr. Whitfield. Thank you. Now I want to make it aware that the legal counsel will not be testifying in this panel but will be here for the purpose of the advising Mr. Gourlay on his constitutional rights. [Witness sworn] Mr. Whitfield. You are now under oath, Mr. Gourlay and do you have an opening statement that you would like to make? Mr. Gourlay. No, sir. Mr. Whitfield. All right. Mr. Gourlay, you heard Justin Berry testify under oath that you initially contacted him online when you saw him on his webcam and then you continued to contact him through instant messaging regarding his interest in computers. He was a 13-year-old boy at the time and you were a man in your 20�s. According to Mr. Berry�s sworn testimony today you invited him to attend a computer camp near your home in Michigan and during that trip you sexually molested him, the 13-year-old boy, for the first of what would be many times. In addition, Mr. Berry testified that you and your company, Chain Communications or www.thechain.com, were involved in commercial enterprise which made money from the sexual exploitation of minor children over the Internet. Mr. Gourlay, did you ever have sexual contact with Justin Berry when he was under the age of 18 years old? Mr. Gourlay. I will decline to respond based on Fifth Amendment privilege. Mr. Whitfield. Are you refusing to answer any questions that we may ask you today based on the right against self-incrimination afforded to you under the Fifth Amendment of the U.S. Constitution? Mr. Gourlay. Yes, sir. Mr. Whitfield. And is it your intention to assert this right in response to all further questions from the subcommittee today? Mr. Gourlay. Yes, sir. Mr. Whitfield. Given that if there are no further questions from the members, I will dismiss you at this time subject to the right of the subcommittee to recall you if necessary. So at this time, you are excused. Okay, at this time, I would call up the fourth panel of witnesses and that is Mr. Ernie Allen who is the President and Chief Executive Officer for the National Center for Missing and Exploited Children and is located in Alexandria, Virginia. Mr. Allen, we appreciate your being here today. I have enjoyed our conversations with you prior to this hearing and the great work that your National Center for Missing and Exploited Children is performing and I would like to recognize you 5 minutes for your opening statement on this important subject matter. TESTIMONY OF ERNIE ALLEN, PRESIDENT AND CHIEF FINANCIAL OFFICER, NATIONAL CENTER FOR MISSING AND EXPLOITED CHILDREN Mr. Allen. Thank you, Mr. Chairman, members of the committee. I am delighted to be here as you discuss this important issue. I have submitted written testimony but per your request, I would like to do a brief summary focusing particularly on the scope of the problem of child pornography. You have heard from other witnesses this morning that this is an exploding problem not just in the United States but around the world. You have heard that the latest estimates are that commercial child pornography is a $20 billion industry and non-commercial child pornography is an even larger share of Internet child pornography. But I would like to make a couple of key points that I think are important to this Congress. One is that while this is a global phenomenon, we believe that the majority of the consumers are Americans. Secondly, we believe that the majority of the victims are Americans, and we also believe that the age of the victims being used and exploited in child pornography is becoming younger and younger and the images are becoming more graphic and more violent. What I would like to do briefly is direct your attention to the screen. You have asked for some visual information. As the committee knows, in 1998, the Congress asked our center to become the 911 for the Internet on these kinds of issues. We have created a Cyber TipLine that has handled 385,000 reports of child sexual exploitation; 350,000 of those reports are on child pornography alone. Mr. Whitfield. Excuse me, Mr. Allen, what was the year that you started this? Mr. Allen. In 1998. But just to give you an idea, the first year of the Cyber TipLine we handled 4,800 reports. In 2004, we handled 112,000 reports. So this is a growing phenomenon. One of the key issues we are tying to address is who these children are. In the aftermath of the Ashcroft Decision by the Supreme Court 3 years ago, increasingly defendants are now arguing these are not real kids. These are virtual images. So judges and prosecutors are asking that we try to figure out who these children are. We have been able to identify working with Federal law enforcement in the United States and law enforcement around the world, 660 children have been identified but we have reviewed 3.7 million images so this is a huge and growing phenomenon. One of the other points I would like to make to the committee is that overwhelmingly the perpetrators of these offenses are not strangers to the children. Almost half of the offenders have been members of the child�s family. Another 32 percent have been family friends and associates. The phenomenon that we talked about in Justin�s panel that preceded this, the sort of self-produced images, that covers 5 percent of the reports we have received but is a growing share of the problem with the advent of the webcam and other technology. The age of the children who we are identifying in these images, 73 percent of the victims had been pre-pubescent. And of the offenders that we have identified, 39 percent of the offenders have had images of children younger than 6 years old, 19 percent younger than 3 years old. Now a couple of quick examples. I talked about the importance and in each one of these cases obviously we have eliminated any possibility of identifying who the children are. In the recent case, ICE agents made a child pornography arrest involving an offender but there were six young girls in these images who we were not able to identify rapidly. What our center is trying to do is to place these children somewhere on planet Earth so we can identify the appropriate law enforcement agency. In this case, there was some evidence in the background, a television set with an advertisement that enabled us to narrow, identifying the company that produced this cup to narrow the focus to several Midwestern States; a grocery bag on a shelf that similarly helped us hone in on where these children were; an envelope on a desk that enabled us to reduce the focus to one city. And then in one of the images, it is very difficult to see but there is, the child had had--she was drugged and had her Brownie or Girl Scout uniform removed. Through enhancing this image, we were able to identify the last two digits of the scout troop. And through the other information and in localizing the information, we were able to identify the six children and the offender who is currently being prosecuted in that State. This is an ongoing challenge. I want to give you just a quick example of the kinds of sites that are out there. And we are currently working with law enforcement not only State and Federal but around the world to identify these sites and then use every legal means to shut them down. This is one example. This is--obviously we have removed images from the sites--but this is an active child pornography website. As you can see, you are encouraged to join. This is a fee-based commercial site, $150 a month and you are offered the opportunity to provide credit card information or other method of payment information. What is happening in so many of these cases is that the individuals are purchasing access to this illegal content, using credit cards and other methods of payment information and we are working very hard to end that. Credit card information--it is hard to see from here, it is on the bottom of the screen. One of the steps we have tried to take, I know in the earlier panel you talked about the difficulty of prosecution and law enforcement simply because the magnitude of the challenge is so great. What we have tried to do is to create a financial coalition. We brought together credit card industry leaders, banking leaders, Internet industry leaders with the premise that you cannot possibly prosecute everybody. And at a minimum, what we can do is following the money, stop the payments under existing terms of service agreements under existing law, and shut these sites down. If we take away the profitability, it is going to be very difficult for them to sustain themselves. And the process that we have developed just to show you quickly, we are going to use our Cyber TipLine to identify the reports, aggressively identify these sites. Once that is done, our analysts will visit the sites and confirm that it is illegal child pornography. Then what we will do is work with Federal law enforcement to perform test transactions. What the financial industry has told us is that credit card companies do not often know what the purchase is for. If we can identify the merchant bank for them in a timely way, they can use their legal leverage to stop the payments and use their licensure provisions to put the pressure on the banks to terminate these relationships. Once we have done that, the companies will provide us the details of that transaction, the credit card company will isolate the transaction and the location of the merchant. The credit card company will amend the information in the database and one of two things will happen. We are going to provide it to law enforcement for 3 days so that law enforcement can make a determination of whether it wants to initiate a criminal investigation. That will always be the first priority. But if it does not act within those 3 days, then we would provide that information to the appropriate financial institution, issue a cease and desist letter, and ask them to take administrative action to shut down the businesses. The last thing, Mr. Chairman, that I want to do is show you a highly edited photograph. We hear from people every day that well, child pornography, isn�t that just adult pornography? Aren�t these 20-year-olds in pigtails dressed to look like they are 15? This is a real image that flowed through our Cyber TipLine. The child was identified. The predator was identified, has been arrested, and prosecuted. The child is getting help. This little girl was 5 years old. As you will notice in the image, she had a dog collar around her neck. And in the second photo, the child was covering her face with her hands because she did not understand what was going on and was so traumatized and terrified by what was happening she would rather have been dead. This is an insidious problem, it is a growing problem, and America needs to wake up to it and do more. Thank you, Mr. Chairman. [The prepared statement of Ernie Allen follows:] Prepared Statement of Ernie Allen, President and Chief Executive Officer, National Center for Missing and Exploited Children Mr. Chairman and distinguished members of the Committee, I welcome this opportunity to appear before you to discuss how the Internet is used to commit crimes against children. Chairman Whitfield, you are a tireless advocate for child protection and I commend you and your colleagues for your leadership and initiative. The National Center for Missing & Exploited Children ("NCMEC") joins you in your concern for the safety of the most vulnerable members of our society and thanks you for bringing attention to this serious problem facing America�s communities. Let me first provide you with some background information about the National Center for Missing & Exploited Children (NCMEC). NCMEC is a not-for-profit corporation, mandated by Congress and working in partnership with the U.S. Department of Justice as the national resource center and clearinghouse on missing and exploited children. NCMEC is a true public-private partnership, funded in part by Congress and in part by the private sector. Our federal funding supports specific operational functions mandated by Congress, including a national 24-hour toll-free hotline; a distribution system for missing-child photos; a system of case management and technical assistance to law enforcement and families; training programs for federal, state and local law enforcement; and our programs designed to help stop the sexual exploitation of children. These programs include the CyberTipline, the "9-1-1 for the Internet," which serves as the national clearinghouse for investigative leads and tips regarding crimes against children on the Internet. The Internet has become a primary tool to victimize children today, due to its widespread use and the relative anonymity that it offers child predators. Our CyberTipline is operated in partnership with the Federal Bureau of Investigation ("FBI"), the Department of Homeland Security�s Bureau of Immigration and Customs Enforcement ("ICE"), the U.S. Postal Inspection Service, the U.S. Secret Service, the U.S. Department of Justice�s Child Exploitation and Obscenity Section and the Internet Crimes Against Children Task Forces, as well as state and local law enforcement. Leads are received in seven categories of crimes: possession, manufacture and distribution of child pornography; online enticement of children for sexual acts; child prostitution; child-sex tourism; child sexual molestation (not in the family); unsolicited obscene material sent to a child; and misleading domain names. This last category was added as a result of enactment of the PROTECT Act in 2003. These leads are reviewed by NCMEC analysts, who visit the reported sites, examine and evaluate the content, use search tools to try to identify perpetrators, and provide all lead information to the appropriate law enforcement agency. The FBI, ICE and Postal Inspection Service have "real time" access to the leads, and all three agencies assign agents and analysts to work directly out of NCMEC and review the reports. The results: in the 8 years since the CyberTipline began operation, NCMEC has received and processed more than 385,000 leads, resulting in hundreds of arrests and successful prosecutions. However, despite our progress the victimization of children continues and there is evidence that it is increasing. The number of reports of online enticement of children to the CyberTipline increased 400 percent since 1998. Our records show a significant and steady increase in these reports over the years. This upward trend is very disturbing and shows the seriousness of this issue. But this is not the only evidence. According to a recent study, one in five youth ages 10 to 17 who used the Internet regularly received a sexual solicitation over the Internet within the previous year. However, less than 10% of sexual solicitations were reported to authorities. These numbers are powerful testimony to the fact that children are at risk and that we must do more. Over the years as technology has evolved so, too, have the methods for victimizing children. The Internet has provided a veil of apparent anonymity, enabling predators to seek out children, win their confidence and then victimize them. As technology evolves, so does the creativity of the predator. Today, we are hearing a great deal about new innovations, including the use of webcams, social networking websites and Internet access on cell phones. These innovations are popular and are utilized by millions of Americans. Yet, as with every other new program or service, there are those who would use them inappropriately and for unlawful purposes. For example, there has been great attention to the social networking websites. While they are marketed to and primarily utilized by young adults, kids are attracted as well, and there have been instances in which offenders have taken advantage of the images and information displayed to target kids. Some of the social networking sites link defined communities of registered users, such as students attending a particular college or high school. Others are open to anyone over a certain age. These websites permit registered users to create an online profile, including photographs, with categories of interest such as music and sports, as well as an online journal. They are highly personalized and often extremely detailed. Children consider this to be an easy way to connect with friends, find new friends and share their thoughts and feelings. However, child predators consider these sites to be an easy way to find child victims. They can use the information posted by children to pretend to be someone with shared interests, then develop a �cyber-relationship� that can lead to that child being victimized. The number of reports involving online journals received by our CyberTipline has increased. In recent years, many kids were using their email profiles and chat rooms in a similar fashion to share their hobbies and interests and make "friends".� However, those forums didn�t have nearly the same implications as the social networking sites given the enormous universe of users. This recent phenomenon reinforces the importance of education messages where we engage teens to be a part of their own online safety. Today, NCMEC is working with leaders in many industries who are involved in the burgeoning field of social networking in order to explore improvements, new approaches and better ways to attack the problems. Further, we are also working on plans to bring together key business, law enforcement, child advocacy, governmental and other interests and leaders to explore ways to more effectively address these new issues and challenges. Webcams offer the exciting ability to see the person you�re communicating with over the Internet. While this has many benefits, such as allowing divorced parents to have "online visitation" with their children in distant states, it, too, can be used to exploit children. Many children are victimized inadvertently, by appearing on their webcams without clothes as a joke, or on a dare from friends, unaware that these images may end up in a global commercial child pornography enterprise. Other children are victims of blackmail, threatened with disclosure to friends and family if his or her �performance� before the webcam doesn�t become more sexually explicit. Too much technology and too much privacy, at a sexually curious age, can lead to disastrous consequences. The teenage years are a time of personal exploration. This is only natural. However, the new form of social interaction is over the Internet, exposing children to, literally, a world of potential danger. Finally, let me briefly report to you on the exploding problem of child pornography via the Internet. Child pornography has become a global crisis. A recent report by McKinsey Worldwide estimated that today commercial child pornography is a $20 billion industry worldwide, fueled by the Internet. Its victims are becoming younger. According to NCMEC data, 19% of identified offenders had images of children younger than 3 years old; 39% had images of children younger than 6 years old; and 83% had images of children younger than 12 years old. There is also strong evidence of increasing involvement by organized crime and extremist groups. Children have become a commodity in this insidious crime. We are particularly concerned about the linkages between child pornography and the financial system. In a recent case investigators identified 70,000 customers paying $29.95 per month and using their credit cards to access graphic images of small children being sexually assaulted. That is just not acceptable. As a result we have convened a Financial Coalition Against Child Pornography. At this point it includes as members 18 major financial and Internet companies, including MasterCard, Visa, American Express, Bank of America, Citibank, Microsoft, America Online, Yahoo and many others. We are bringing new financial institutions into this Coalition every day. Our goal: To eradicate commercial child pornography by 2008. How are we going to do that? We are going to follow the money. First, we will aggressively seek to identify illegal child pornography sites with method of payment information attached. Then we will work with the credit card industry to identify the merchant bank and stop the payment. Then we will shut down the sites. In each case we will work hand-in-hand with federal, state, local or international law enforcement, and the first priority will be criminal prosecution. However, our fundamental premise is that it is impossible to arrest and prosecute everybody. Thus, our goal is twofold: To increase the risk; and To eliminate the profitability. We have created working groups of industry leaders explore the best techniques for detection and eradication. In addition, these companies have asked NCMEC to serve as the global clearinghouse for this effort, sharing information and working together on this effort in a truly collaborative way. We need to do a better job as a nation of identifying and addressing the greatest risks to our children today. NCMEC urges lawmakers, law enforcement and the public to take a serious look at the dangers threatening our children today, and to move decisively to minimize the risks posed by those who exploit new technology and target our children. Now is the time to act. Thank you. Mr. Whitfield. Well, Mr. Allen, thank you, and once again we appreciate your being here and the great work that you are doing in this important area. I know you had showed us the images of this little 5-year-old girl prior to the hearing today and it is unbelievable that someone would exploit a child in that way. And I believe that you are telling me that the person who was indicted, convicted, and sent to prison in this case actually had a site that was generating in the neighborhood of $2 million a month in revenue. Is that correct? Mr. Allen. Well it was a different site but that is right. I mean one of the things that really awakened us to this problem, we thought the child pornography problem had been virtually eradicated because the Supreme Court of the United States in 1982 said it is not protected speech. Mr. Whitfield. Right. Mr. Allen. It is child abuse. Mr. Whitfield. Right. Mr. Allen. But what awakened us was one lead we received that led to an investigation of Federal law enforcement and local law enforcement of a mom and pop website. They decided they were not making enough money doing what they were doing so they set up a child pornography website. When that was shut down by local law enforcement, these people had 70,000 customers paying $29.95 a month and using their credit cards to purchase access to graphic images of young children being sexually assaulted. Mr. Whitfield. Unbelievable. And they were both convicted. Is that correct? Mr. Allen. They were both convicted. The husband is doing 60 years in prison and the wife is doing 20. They were making $2 million a month net. Mr. Whitfield. Okay. Mr. Allen. And I think, Mr. Chairman, one of the most frightening aspects of this problem is that it has reached beyond pure pedophilia and organized criminals and other entrepreneurs now suddenly recognize that children are a commodity. Mr. Whitfield. Right. Mr. Allen. And this is a way with relatively low risk and high profitability to make a lot of money. Mr. Whitfield. Yeah. Well you are the real experts in your organization in this field and I assuming that you would consider the $20 billion figure we hear per year on this type of activity is probably a conservative figure. Mr. Allen. I do not think there is any question about that and I sincerely believe that we really do not know how big the figure is. Mr. Whitfield. Right. Well tell us a little bit about Cyber TipLine. How would children and parents actually find this Cyber TipLine? Mr. Allen. Well Mr. Chairman, we are non-profit. We are not Proctor and Gamble. We cannot advertise in the media but what we try to do is use free media and promote it in every way possible. We for example, a number of Internet service providers provide links on their sites, companies like AOL, Microsoft, Yahoo!, AT&T, Cox Communications. And we try to promote it in every way we can. The goal is if people encounter this kind of content, we want them to report it. They can be anonymous but we really need to find out about these sites. Mr. Whitfield. All right. You may have heard Chairman Barton today talking about the fact that we are getting ready to mark up a telecommunications bill that is going to change the way the telecom business does business. Would you have any thoughts or suggestions on using that bill as a vehicle of some small steps that we might take to make it easier to put these websites out of business or to prosecute? Mr. Allen. Well, Mr. Chairman, I think there are a couple of things. One is I believe it is imperative that these companies report suspected content like this. As you know, the Congress in 1998 also passed legislation called the Protection of Children from Sexual Predators Act that mandates electronic service providers to report child pornography on their systems to law enforcement through the National Center for Missing and Exploited Children. Now today, 215 ISPs including the major ISPs, are doing that. In addition, we are in discussions with the wireless industry and two of the major wireless companies, Verizon and Sprint Nextel, are currently reporting voluntarily. But there are still thousands of ISPs who are not reporting. This is an issue that is moving into the wireless world. And I think a requirement that these companies when they encounter this kind of content report it, is imperative. Identification is the first step to eradication. Mr. Whitfield. All right. Well that is a good suggestion and I know our committee does look forward to continue working with you to explore additional options as we consider legislation on this in the near future. You had mentioned the Department of Justice. Do you find yourself working closely with the Department of Justice and specifically the Child Exploitation and Obscenity Section? Mr. Allen. We do. We work very closely with Federal law enforcement generally and our Cyber TipLine. The FBI�s Innocent Images national initiative is connected online to all the leads we receive. CEOS is connected online. The Homeland Security�s Immigration and Customs Enforcement plus the FBI, ICE, and the United States Postal Inspection Service all assign agents, inspectors, and analysts to work out of our center in Alexandria. So we are not law enforcement. We are a non-profit mandated by Congress working in partnership with the Department of Justice. What we are trying to do is build the cases for the appropriate law enforcement agencies. We also work very closely with the Justice Department-funded Internet Crimes Against Children Task Forces, 46 of them around the country who are making hundreds of arrests and prosecution. So we are working with every agency that has some role in this issue. Mr. Whitfield. Now I know that the Department of Justice provides some funding for you through their-- Mr. Allen. Yes, sir. Mr. Whitfield. --Congressional appropriation process but--and I am not even going to ask you to comment but if you heard all the testimony today, you know that we have some real concerns about the effectiveness and the enthusiasm with which the Child Exploitation and Obscenity Section appeared not to operate in the Justin Berry case and that is something that we are going to look at more closely. You testified in your opening that the goal was to eradicate child pornography as a commercial enterprise by 2008. Do you think that is a reachable goal? Mr. Allen. I have been accused of being naive in the creation of that goal but yes, sir, I do. I think this is a challenge of mobilizing these financial companies with law enforcement. I firmly believe that the vast majority of this commercial enterprise is accounted for by relatively few organizations and people. And I believe that it is like taking, tracking down terrorist financing, and anything else. I think you follow the money. You use the kinds of tools and resources you have and you shut it off. I think that that is not going to eradicate child pornography, but I think if we can get it back to where it was and, in fact, I and the FBI and others testified before Congress a decade ago that if there were no pedophiles there would be no child pornography. I am skeptical that all 70,000 of those people accessing that one website in Texas were pedophiles. So something else is going on here. Mr. Whitfield. Yeah. Mr. Allen. There was research in 2002 by ETPAD International and the Bangkok Post that estimated that there were 100,000 child pornography websites. That was 2002. But frankly, I think this is an issue where law enforcement has come relatively recently to this process. Once again, law enforcement has not been at the forefront of getting and being able to utilize the new technology. Mr. Whitfield. Right. Mr. Allen. And instant images is only 10 years old. And so I think that is realistic. I think we can do that. Mr. Whitfield. And did you also tell me that there is now developing a tourism business in which pedophiles go on trips to foreign countries and young children are brought to their rooms. Is that correct? Mr. Allen. Yes, sir. It is a global enterprise. And this Congress had the wisdom in the Protect Act in 2003 for the first time to provide legislation that enables the prosecution of U.S. citizens who go abroad for that purpose and there have been many charges brought just in the couple of years since then. Mr. Whitfield. Well, Mr. Allen, my time has expired. I recognize the gentleman from Michigan, Mr. Stupak. Mr. Stupak. Mr. Allen, I appreciate your enthusiasm in trying to get it wrapped up by �08 but how is that possible when you get your ISPs you say there are 250 and reporting more, but there are thousands more out there plus wireless providers. How are you going to get the rest of them if you got 250 right now? Mr. Allen. Well I think two responses to that, Mr. Stupak. One is we need not just to wait for people to report it, we need to aggressively go out and find it and we are trying to do that. And secondly-- Mr. Stupak. Who is we? Mr. Allen. Well Federal law enforcement and the National Center. We have been using spidering technology to go out and proactively search out illegal sites and we are going to continue to do that. Secondly, I believe that the key to this is the financial industry. And the good news is to this point we have been able to encourage and persuade 18 major companies to join in a financial coalition against child pornography including MasterCard, Visa, American Express, Discover. Mr. Stupak. How many of these 18, did you ever check them against Justin Berry�s list to see how many of the 18 were on his list of 1,500 names and transactions? Mr. Allen. Well now these and I am talking about, I mean, when you spiral the web and look for active child pornography websites, the major sites that you find or the major methods of payment that you find today are the third party payment sites like Egold which is a part of this coalition and the credit card companies. Now a lot of those are bogus. But MasterCard, Visa, American Express have all said to us we do not want to make any money on this. Mr. Stupak. But what are they doing? Mr. Allen. Well they told us the same thing. Mr. Stupak. Yeah. Mr. Allen. They have agreed to participate in this process in which-- Mr. Stupak. What does that mean, participate in this process? What can they really do? Mr. Allen. Well what they are going to do is take the information that we generate, they are going to share it within this network of companies. They are going to, once we have identified with them the merchant bank and law enforcement has said we are not going to investigate or prosecute on this one, they are going to take steps under their agreements. I mean credit card companies are just associations of banks to hold the banks responsible because when a bank operates an illegal account and submits payment, it is not only a violation of the law, it is a violation of their-- Mr. Stupak. Has any of that been done yet? Mr. Allen. Just begun. We just started this 2 weeks ago. Hold us accountable, we are going to do that. Mr. Stupak. Well what about this meova.net, the third party that we heard so much about in the last panel? Mr. Allen. We have no contact with them. Mr. Stupak. Okay. Mr. Allen. But we welcome everybody�s involvement and welcome the committee�s help in bringing other financial institutions into this process. Mr. Stupak. But isn�t that the name that in Justin Berry�s case, why these were paid was this meova group and not the big credit card companies? So how do you get them to participate? Mr. Allen. Well we do it one at a time. We basically leverage the relationships we are building with the credit card companies and the banks and we--I mean I am not suggesting Mr. Stupak that there is a quick, easy solution to this. Mr. Stupak. No, there is not and that is what I am trying to drive at. Mr. Allen. Yeah. Mr. Stupak. How do we get it done? Even if we put something in legislation tomorrow, I am not too sure it is going to either. I think we have to have a more comprehensive approach. Two years ago, you testified before this committee about the use of peer-to-peer clipboards by child pornographers and pedophiles as a way to share files without being identified. This is often the system that child pornographers and the customers use to share files and individuals from all the world can use these networks. Could you describe how this works and whether there have been any advances? Have you been in control of these networks, these file sharing networks? Mr. Allen. Well the way it works is that this it basically does not require an ISP, this basically linked the files shared through networks like Kazaa and other mechanism. What is happening is there has been aggressive effort by Federal law enforcement and the Internet Crimes Against Children Task Forces to make cases. The case that the Attorney General and ICE announced a couple of weeks ago was in essence a peer-to-peer network, child pornography on demand. You know, it remains a challenge because it is harder to identify. It is harder to capture that image at the moment that it is distributed than it is if it is distributed through an ISP. Mr. Stupak. Well part of my concern is the music company shut down Napster for illegal file sharing of copyrighted material. Why can�t law enforcement be more aggressive in shutting down these sites? Mr. Allen. Well frankly, I think the largest challenge is again, I think law enforcement is overwhelmed by the magnitude of the problem. We would welcome, I mean, I do not speak for the FBI or Homeland Security or anybody else, but I think this is a problem that is going to require more resources, more personnel. Innocent Images needs to get bigger. The Cyber Crime Center at ICE needs to get bigger. Mr. Stupak. Throughout your testimony today and even the earlier the testimony, everyone talked about the Federal law enforcement, Justice, things like this, Department of Justice. Can you or do you work with State and local law enforcement? Mr. Allen. Yes, sir, we do actively. And I think a very important point that needs to be made is that Federal law enforcement cannot possibly do all of this. What we have emphasized very strongly is building State and local capacity because in every one of these cases, just like Justin in Bakersfield, there was a local victim. The only thing that is different about this is the medium that is being used to transmit the image. Mr. Stupak. Have you had any access to the information that Mr. Berry provided Justice? Have they worked with you at all, Justice like I-- Mr. Allen. I do not think we have seen that information. Mr. Stupak. You also testified that a 1999 law that requires Internet service providers to report child pornography on their sites or face substantial fines and that was back in 1999 that law was passed. Five years later in 2004, the reporting mechanism had not yet been formalized. Has any been formalized? I mean, why should it take 5 years? If we knew it was a problem in �99 and we passed a law, it is 5 years. Has it been formalized or has it not? What has happened? Has anybody been fined or anything ever happened with that? Mr. Allen. No, sir it has not been formalized. What we have been advised by the Justice Department is that there was a flaw in the statute that in essence it is a civil statute with a criminal penalty and so we have met with many. The good news is that the majority ISPs are complying. We have developed our own system with them. We work with the U.S. ISP Association but anything this committee can do to make every electronic service provider in America have to report, I think it is a good thing. One of the real challenges quickly, Mr. Stupak is that a lot of these companies are saying to us that absent some safe harbor provision, their concern is that when they transmit these images to us they in fact may be violating the law. So I know the Justice Department is taking another look at that. We welcome whatever resolution can happen. Mr. Stupak. Well I know Mr. Chairman, and I think members of this committee should be--we passed the law in �99 and this is the first we have heard that there is a problem with it. I would think after 7 years someone would step forward and say hey, we cannot do what you intended, to go after this Internet pornography especially with children, because there is a flaw in the law. So thank you for that, we will note it for those questions on Thursday. Since controlling peer-to-peer networks seems so difficult, do you think the new financial coalition, the one you have listed here against this child pornography to follow the many, will eradicate child pornography? What percentage of the child pornography is shared without payment? I think we have had a lot of that where you had to produce a payment, plus you had produced pictures, nude pictures, or fill in the blanks or I call them trading cards if you will pornography. Is that here today? Mr. Allen. In our judgment, we think that the largest share of child pornography is distributed and shared without payment. Even though the commercial site of this problem is a billion dollar problem, we think the non-commercial side is larger. Mr. Stupak. I think you mentioned it earlier, but if you could take a moment and expand upon it. I think you said law enforcement lacks the resources. What area do they lack the resources? I thought you indicated they could come to your shop and do some work there but what are the resources that are lacking? Is it just training in what is going on? Is it the empire or what is it? Mr. Allen. Well there has been an aggressive effort to train. We have been training unit commanders and investigators in computer facilitated crimes against children for some time. Ten years ago, I was aware of one specialized unit in a local police department; the San Jose Police Department had a kind of an early cyber crimes unit. The good news today is that most major police departments now have specialized units. The good news today is that there are 46 Internet Crimes Against Children Task Forces funded by Congress around the country that are State and local with Federal involvement. But I just think the sheer scale of this problem requires greater investment, more people, more technology, more advanced technology, because it continues to evolve. Mr. Stupak. Let me ask you one more clarification. I had asked you earlier if your center has been provided any of the names or the information on the Justin Berry case. It is my understanding that the FBI has an agreement to provide all the images to your center. Mr. Allen. That is right. Mr. Stupak. So if your center--have you received those images, and if not and that means CEOS has not given you the images, then the FBI--you have not seen them yet, have you? Mr. Allen. Candidly not to my knowledge, no. Mr. Stupak. So you cannot give me comparisons then either without the images. Mr. Allen. That is true. Now I will confirm that. I do not know that absolutely, but to the best of my recollection, I do not believe we have received those images. Mr. Stupak. Any reason why not? Not names but just images so you could do you work? Mr. Allen. Not to my knowledge. Mr. Stupak. Okay. Thank you. Thank you, Mr. Chairman. Mr. Whitfield. Thank you, Mr. Stupak. Mr. Allen, let me just ask one concluding question here. Around the world, do most countries have laws against child pornography and child molestation? Mr. Allen. The answer unfortunately, Mr. Chairman is no. Through our international center, we just did an analysis, we have done a report that we are releasing on Thursday of the 184 member nations of Interpol. Ninety-five of those countries have no law on child pornography at all. About 135 or 140 including some of those that do have some law do not criminalize the possession of child pornography. The good news is we reviewed this law based on five categories of statute. The good news is five countries including the United States have enacted laws in each one of those five areas. Mr. Whitfield. Okay. Mr. Allen. And another 22 have enacted laws in all areas except ISP reporting. Mr. Whitfield. Okay. Mr. Allen. But there is a lot of work that needs to be done around the world as well. Mr. Whitfield. Mr. Allen, I thank you very much. Ms. Blackburn, did you have any questions for Mr. Allen? Mrs. Blackburn. Mr. Chairman, thank you. I do have a couple. I do not know if--and I apologize I have got constituents that were in and I had to jump out--and I think you have maybe answered these but let me just go back. In your very opening statement, you said something about looking at how much of the industry is in the U.S. and how much is offshore and that was one of the questions that I had posed earlier to Mr. Eichenwald. Mr. Allen. Right. Mrs. Blackburn. And the follow-up I have for you on that would be, are you all doing the research so that we can begin to quantify this and kind of get our arms around it? Mr. Allen. We are trying, but it is very difficult to do because there is no real database to measure. It is all sort of estimated. The other thing that is clearly happening is, for example, there was a case in January of 2005 in which the business, the server, was Delarosa. The financial support for the child pornography system was in the Caribbean, was offshore. But the vast majority of the customers were Americans and the vast majority of the victims, the child victims were Americans. Mrs. Blackburn. You know, Mr. Allen, to me listening to all of this testimony today, it seems that the business of the child pornography which is just so sickening when you hear about this that it is labeled in some ways to identity theft, the pirating, the different types of theft or subversive type activity that we see over the Internet and there seems to be some common things that are developing and running through these businesses. Mr. Allen. Well Congresswoman, we have heard from a number of experts that there are five basic factors in play for the reason why this has become not just an insidious crime but big business. One is that children are plentiful and easily accessed. Secondly that the production of the material has become very inexpensive. You do not need massive studios anymore. Thirdly, that there is enormous consumer market for the content. Fourth, therefore it is incredibly lucrative, incredibly profitable. And five, at least comparatively there is virtually no risk, particularly compared to drugs and guns and tobacco and other kinds of commodities. So what our focus has been strategically working with law enforcement agencies around the world is we have got to dramatically increase the risk and we have got to dramatically reduce the profitability. Mrs. Blackburn. Because at this time it is the lowest risk, highest profit area of the what we would call subversive or-- Mr. Allen. Right. And that is why I wanted to add one other thought to the Chairman�s question earlier about is the goal of eradicating commercial child pornography by 2008 realistic. Well our basic premise is if you can eliminate the use of the credit card, we can take the credit card out of this process. If you can eliminate the use of the third party payment mechanism and we are working with the Egold�s and PayPal�s and those kind of companies, it is going to become more and more difficult to sustain the enterprise. The payment mechanism is going to have become a lot more sophisticated and farther reaching. Kurt talked this morning about the six steps removed. We just have to make it ten steps and then 14 steps. If you have to pay cash, access to a child pornography website, the profitability compared to the investment drops dramatically. And I think at that point, these are entrepreneurs. These are organized criminals. They are going to look for some other way to make money. Mrs. Blackburn. Well I thank you. I thank you very much for your patience with us today. I thank you for the work that you all are doing and I thank you for being accessible to us and allowing us to have some time to visit with you on the issue. Mr. Allen. Thank you very much. Mrs. Blackburn. I yield back. Mr. Whitfield. Thank you, Mrs. Blackburn. And Mr. Allen, thank you so much for being with us today. We look forward to continuing working with you on this issue and thank you for the great job that you do at the center. Mr. Allen. Thank you, sir. Mr. Whitfield. I would call the fifth panel of witnesses, please. We have Ms. Parry Aftab who is the Executive Director of WiredSafety from Irvington-on-Hudson, New York. We have Shannon Sullivan who is a Teen Angel with WiredSafety from Irvington-on-Hudson, New York. We have Ms. Teri Schroeder who is President and Program Director of i-SAFE America from Carlsbad, California. And then we have Moni Sallam who is a mentor at i-SAFE America from Carlsbad, California. I want to welcome all of you today. We genuinely appreciate your patience. We similarly look forward to your testimony because we know that you are doing some great work to assist our young people and others as we try to eradicate this problem. And as you know, this is an oversight investigation hearing and we normally do take testimony, in fact, we always take testimony under oath. Do any of you have any difficulty in testifying under oath today? And do any of you have legal counsel with you today? [Witnesses sworn] Mr. Whitfield. Thank you. You are now sworn in and Ms. Aftab, we will ask you to give your opening statement first so you are recognized for five minutes. TESTIMONY OF PARRY AFTAB, EXECUTIVE DIRECTOR, WIREDSAFETY; TERI L. SCHROEDER, PRESIDENT/PROGRAM DIRECTOR, I-SAFE AMERICA; SHANNON SULLIVAN, TEEN ANGEL, WIREDSAFETY; AND MONI SALLAM, I-MENTOR, I-SAFE AMERICA Ms. Aftab. Thank you very much, Mr. Chairman. My name is Parry Aftab. I am an Internet privacy and security lawyer or at least I used to be. A number of years ago, I used to represent corporations in cyberspace protecting them until one day someone sent me an email telling me shut down the website, to put the people in jail. I know a great deal about child pornography and I testified before this House. Mr. Whitfield. Maybe you could just turn off the sound on your computer, Teri, it might make it easier. Thank you. Ms. Aftab. I have testified before the House of Commons and the House of Lords, Parliament. I advised the Singapore Government. I do this all over the world so I knew a lot about child pornography. But when I went to this site, up came 150 names of images, just names. I clicked on one of them and up came a picture of a little three and half year old being raped. She had her eyes closed in the way that those of who are parents remember our children. Mommy, you cannot see me, can you? And we all pretend that our children are invisible. No, where did you go? Oh, my goodness, you did, where you, you are gone, you are invisible. And then giggle and we tickle our children and we laugh about it. This little girl was being graphically raped and had her eyes closed hoping that she too would be invisible. She was violated not only by the sexual molestation but by the fact that they expected her to pose for the cameras. I cried for an hour, I vomited for two, and I realized that the reputation I had earned over the years as one of the first Internet lawyers in the world could be used to do perhaps greater good. The companies I represented I thought would follow me and the law enforcement that I had advised would as well. And we created the world�s largest Internet safety and help group. It is called WiredSafety. We have 11,000 volunteers in 76 countries around the world. Not one of us is paid a dime. We have no offices, we operate from our homes and offices and cell phones. If you dial the telephone number on our websites, my cell phone will ring. I sold my house, a very expensive one in New Jersey, and emptied my bank accounts and this is what we do. It started out in the early days where we were dealing with a child�s sexual exploitation. We also do a tremendous amount of work in identity theft. We protect everybody of all ages in cyberspace and on wireless devices and interactive cell phones and gaming devices, on anything that can go wrong, from cyber terrorism to ID theft to fraud but my heart is with the children. For years, I looked for this little girl. I never found her but instead we found many others. We have and this has never been a public statement of ours before, we have been working very closely with the National Crime Service in the UK for the last 7 years. Together, we infiltrated some of the leading sex trafficking groups in the world and hundreds of people have gone to jail because of our work. The person who did that with the National Crime Service is another one of my unpaid volunteers. I have been doing this for a long time. It is what I am supposed to be doing. A number of years ago, I met a young woman. Her name was Kitty Tarbucks. Kitty was 13 from Connecticut when she met someone online she thought was Mark. She thought he was 23. She was a little bit heavy. She was a member of the swim team. She was not as popular because she was brighter than a lot of the other kids in the room. She met him online. She thought what the heck, he was in California, she was in Connecticut, she is never going to meet him in real life. So she chatted with him and she talked on the phone with him and she shared pictures with him and became friends. She talked about politics. And he thought she was wonderful and pretty and bright and smart. Six months into the relationship, she shared that she was going to a swim meet in Dallas, Texas. He said, you know what, I will come out and I will meet you. I will fly out from California to your swim meet and he did. She made arrangement with her roommate that she was going to walk down the hall to meet him in real life. She really wanted to and she will admit that to this day. She found what room he was in and he was waiting for her. She walked down the hall, pushed the button the elevator and went upstairs. She knocked on the door and it was answered. Her first thought was oh, my gosh, he was an adult. And he has got the ugliest white shoes I have ever seen in my life. He opened the door, she walked in and sat down on the sofa. He shut the door behind her. He sat down and he said, you know, Kitty, it took so long to get the luggage in the airport and she said yes. And the food at this hotel is not very good is it? And she said no. I love your watch, he said, and starting touching it. And your hair is so beautiful and ran his fingers through it. I have been thinking about doing this for a long time he said. He reached out, kissed her, started to grope her, and began to molest her. Luckily, her roommate had told her mom who was a chaperone on the trip and her mom and the police and security were at the door pounding until he opened. They whisked him away and Kitty sat there in tears while she tried to reassemble her clothing. The police came to her a few minutes later and they said you talked to this man for 6 months? We talked to him for 5 minutes, he is a 41-year-old investment banker and his name is Frank Cusovich, not Mark. What are you thinking? Years later she put him in jail for about two and a half years under the Communications Decency Act, a section that was actually maintained as constitutional, and she wrote a book that was later renamed A Girl�s Life Online about her story. But we do this all over the world. And I was working with a young family in the UK and little Georgiana was 13 and she had met Johnny who was 16 from about 200 miles away. And they were talking on the phone. Her parents knew and he said he wanted to meet her and she said great, my mom will bring me and he said no, you bring your mom, I am not coming. So she said to her mom, I do not know what to do, I have to lie to one of you, I am going to lie to him. She said to her mom but when you drop me off, pull the car up about a half a block. You will be able to see me but I do not want him to know you are there and if everything is okay, disappear, come back later, we are going to the movies. She stood there alone in front of the movie theater when a 46-year-old approached. She wondered why Johnny had sent his dad. He said, Georgie, I am Johnny. Her first thought was oh my gosh, he is an adult and he has got the ugliest brown shoes I have ever seen in my life. Now I am a lawyer so I hear this, I talk to a lot of kid victims. I immediately think about that I am from New Jersey. We have this very ugly shoe store that sells only very ugly shoes in New Jersey. And I said what you need to do is stake out places like this because obviously the Internet sexual predators wear ugly shoes. And the child psychologists who donate their time with us and the forensic psychologist turned and they said, describe my shoes, Parry. Okay, no, no, look at me and describe my shoes. Well how can I describe your shoes if I am looking you in the eye and they said exactly. When our children fall in love with a person they meet online who they think is now a perfect soul mate for them and they meet them in real life and find out who they are, they all become experts in men�s shoes. They walk through it. They got through with the molestation. They do things they ordinarily would not have done because they are embarrassed. They just think they led him on because of something else. Well if you went to Myspace about a month ago and you clicked on safety tips, you would have learned all about us. For the last year and a half we have been working on the inside with Myspace and with Facebook, and with Febo, and all of the others. We have done a great deal of work in cyber stalking, cyber bullying, and sexual predators and we deal with these issues and provide this information to these sites. One of the problems we are finding on social networking is that there are some benefits like we never thought there were. It would have been much easier if I could find social networking and say, you now, that it is terrible, let us shut them down. But we are finding kids who are raising money for charities and expressing themselves and writing music so a kid from Connecticut or California can write the words to it. So we now have to do the hard thing. We have to find a way of making them safer, so we worked with Myspace in the west in developing safety tips and links to my volunteers to help with these issues. Not too long ago, I was in L.A. having lunch with a girlfriend and who walked in but Nick Lachey. If you do not have any young kids at home, he is the one who is getting divorced from Jessica Simpson. He is on the cover of Teen People and everything else. So my girlfriend was there and she said look that is Nick Lachey and I said I will be right back. And she said, we are from California, we do not approach celebrities. I said I am from New York, we do not admit they are celebrities. And I walked up to his table, I handed him my card, and I said Internet sexual predators Nick, are using your name to lure kids. If they find out, the kids have posted something that they are fan of Nick�s, the predator becomes a close personal friend of his. I am a close personal friend of Nick Lachey�s and if you send me a picture, I will get it to him. He really likes that picture. Do you have a sexier one, something in a bikini? Anything else? He turned white as a ghost. He said would any money--I should have said yes, but we run a charity that is all volunteers. I should have said, yes, but I said no, just give me a public service announcement. Two weeks later he had Googled me. He got Tom Patters who owns Polaroid and everything else to write a $2 million check to create a safer social networking site for teens called YFly. When kids are bothered by people posing as a teen they can click report the creep. I then reached out trying to find spokespeople. I used to represent a lot of them in the olden days and so many of them now are getting arrested on drunk driving and everything else, I was standing on a stage in Singapore and who popped through a screen behind me but Spiderman. And as part of our exhibits today, you will see the first of a series of Internet safety comics written by Marvel for us using all 4,000 of their characters that they donated to us on a worldwide license. We do a lot of this work and it is going to take all of us. There is far too much backbiting and knifing of MGAs in the back. Unfortunately, there are enough children being hurt, there is enough work to go around and each of us has our own specialties. What I suggest we do is look at some of the models that we have used around the word. UNESCO named me to head up their efforts on these things for the United States. And we do not have in this country a national task force that is put together with the leading experts in the world on Internet safety. Instead, I am on a home office task force in the UK and I advise the EU. We need one here and that is easy and that is cheap. You get good at doing that when you run a non-profit that is unfunded. In addition, there are lots of questions about the statistic s. Ernie, who I respect incredibly well, cannot give you the statistics on how many kids have been victimized in what way because they do not exist. Because on a crime reporting form there is no check, or no box you can check, saying that the Internet was involved in some crime. That is an easy fix to help us start tracking growth. We need to know that if we are going to address it to see if we are making a difference. We need to get a lot of players together and work together. And one of the things I learned a number of years ago is if we are going to reach the kids, we have to do it in their own language in their own ways. So I founded a group that is called Teenangels and it is part of our group. And they train for a very long time. It usually takes about a year to train a Teen Angel. They are trained by law enforcement, AOL, and Disney, and Oracle, and everybody else I know and the FTC and they learn what everybody needs to know about privacy policies, predators, piracy, illegal inappropriate use, and responsible technologies. And when they are done, they go out and create their own programs and they are now advising all of those companies. They have got a new cell phone that Disney launches tomorrow that is a little safer because parents can control who can text message or call their kids. And that came out of some of the thinking of the Teenangels. And Disney and AOL and the CTIA when you look at the Telecommunications Act that you are reviewing, the CTIA has turned to my Teenangels and to us for advise on how they can use our skills and things we know to make things safer. So I would like to thank you so much for giving us the time today. And I would like to introduce one of my very special Teenangels who in addition to Nick Lachey and with Teen People that is out on the stands right now was selected by Teen People as one of the top 20 mover and shaker teens in the country. Shannon is 14 and here to talk about her experiences as a Teen Angel. [The prepared statement of Parry Aftab follows:] Prepared Statement of Parry Aftab, Executive Director, WiredSafety SUMMARY Our children are online. They do their homework, entertain themselves, communicate with each other and us, research things, buy and compare prices online. They need the Internet for their education, their careers and for their future. Of all the risks our children face online, only one is certain. If we deny our children access to these technologies, we have guarantees that they are hurt. All other risks are avoidable through a combination of awareness, supervision and parental control and other technologies. More and more children being lured and stalked by online predators who gather information about them from chatrooms, instant messaging, e-mails, websites and the like and use this information to become close to them. With our children walking around with Internet access in their backpacks and pocketbooks, we can no longer rely on parents watching whatever they do from a central location computer. Our children need to learn to use the "filter between their ears" and "ThinkB4TheyClick." This requires that we get them involved in framing solutions and educating each other. It also requires that we find new ways of building good cyber-citizenship and helping the kids and parents spot risks in new technologies and protect themselves online. But we also need to recognize that in most cases our children are putting themselves in harm�s way. They are intentionally sharing risky information online in profiles, blogs and on websites. They post their cell numbers on their public away messages when using IM technologies. And even when they are careful about protecting their own privacy, their close friends may expose personal information about them by posting photos and information on their profiles. They are also, in greater and greater numbers meeting people offline that they met online. Family PC Magazine reported that 24% of the teen girls they polled and 16% of the teen boys they polled admitted to meeting Internet strangers in real life. Our children go willingly to offline meetings with these people. They may think they are meeting a cute fourteen year old boy, but find that they are meeting a 47- year old child molester instead. This has to stop. Smart kids are sharing sexual images online with people they don�t know, or e-mailing them to others they have a crush on and hope to entice. And with the newer video-chats and technologies, the predators have moved to luring our kids into posing and engaging in sexually explicit activities. Yet, the actual statistics are lacking. Everything we know is largely anecdotal. In 1999, the FBI�s Innocent Images (charged with investigating crimes against children online) opened 1500 new cases of suspects who were attempting to lure a child into an offline meeting for the purposes of sex. Based upon my estimates, about the same number of cases were opened by state and local law enforcement agencies that year. The same year, approximately 25 million minors used the Internet in the U.S., Now, with more than 75 million young Internet users in the U.S. we don�t know if the number of instances have increased, decreased or remain flat, given the growth. The crime reporting forms don�t collect information about the use of the Internet is child sexual exploitation crimes, or any other crimes. That has to change. We also need to recognize the real risks and what is hype. Notwithstanding media reports to the contrary, to my knowledge, law enforcement is not aware of anyone who is using the information children provide online to seek them out offline, by hiding behind a bush or grabbing them on their way home from school. They currently agree to meetings (even if they don�t admit it to the police when things go wrong.) But it�s only a matter of time before this happens, since universal access to the Internet means that even violent sexual offenders who are online can use it for their own horrible purposes. OPENING STATEMENT Thank you for inviting me to testify here today about ways we can keep our young people safer online. This is a very important topic and one to which I have devoted my life over the last ten years. My name is Parry Aftab. I am an Internet privacy and security lawyer and run the world�s largest Internet safety and help group, WiredSafety.org. We are an all-volunteer group and a charity formed in the United States. We have approximately 11,000 volunteer from 76 countries around the world, all devoted to helping create a safer interactive technology experience for users of all ages. SNAPSHOT OF U.S. MINORS ONLINE AND HOW PREDATORS REACH THEM It is estimated that approximately 75 million minors in the Unites States access the Internet either from home, schools, community centers and libraries or from some newer Internet-capable device. This is up more than ten-fold since 1996, when only 6 million U.S. minors were online. Now our children are using cell phones with Internet and text-capability, interactive gaming devices (such as X-Box Live and Sony Playstation Network) with voice over Internet and live chat features, handheld devices with Bluetooth and other remote-communication technology (such as PSP gaming devices and mobile phones) and social networking profiles (such as MySpace, Facebook, Bebo, YFly and others) where they can advertise their favorite things, where they live and pictures of themselves and their friends to anyone who wants to see them. Ten years ago, when I first wrote my safety tips telling parents to put the computer in a central location, that made sense. It was a central point, where parents could get involved and supervise their children�s interactive communications and surfing activities. Now, where they take their communication technologies with them in their pockets, backpacks, and purses, it is not longer as relevant as it once was. Now, instead of expecting parents to watch everything their children are doing online from the comfort of their familyrooms, or kitchen counter, we have to do more. Now, we have to teach our children to use the "filter between their ears" and exercise good judgment and care when using any interactive device. While teaching parents how to supervise their children online was a challenge (I have written the leading books, worldwide, for parents on Internet safety), teaching children to "ThinkB4uClick" is much harder. When I was growing up (in the days before electricity and indoor plumbing, when we had to walk up hill, both ways!, in blizzards to get to school ), parents used to blame us for not behaving. We were disciplinary problems. Now pediatric neuro-psychologists tell us that preteens and young teens are hardwired, through immature brain development, to be unable to control their impulses at this age. Either way, we recognize that preteens and teens take risks, don�t appreciate the consequences of their actions and act before they think. When their audience was their school friends, family and neighbors, the risks were containable. When they act out where 700 million Internet users can see, it takes on a much deeper significance. Putting Their Heads into the Lion�s Mouth Now, I will share something very controversial. While educators and child psychologists understand this, most parents will be shocked at the suggestion that their preteens and teens are in control of their safety online and putting themselves at risk, often intentionally. But unless we accept this, and direct our attentions at solutions aimed at this reality, we are all wasting our time. We will focus on the much smaller segments of preteens and teens who are being victimized through not fault of their own - those who are targeted at random. All others need to change their online behaviors. And that�s where we need to devote all our attentions. For this to happen, you need to understand the truth. For years we have told parents and minors not to share too much personal information online. "You can be tracked down in real life," we told them. But, notwithstanding anything to the contrary reported in the media and by some local law enforcement officers, to my knowledge, to this date, no preteen or teen has been sexually-exploited by someone who tracked them down from information they posted online. In each and every case, to my knowledge, to teens and preteens have gone willingly to meet their molester. They may have thought they were meeting someone other than the 46 year old who is posing as a teen, but they knew they didn�t know this person in real life. They are willingly agreeing to meet strangers offline. What does this mean? It means we can do something about this. It means we can educate teens and preteens about the realities of meeting people in real life they only know in cyberspace. It means we can create solutions. It means that this is, at least for the time being, 100% preventable. It means that what we do today will have an immediate impact on the safety of our youth. It means we have to join together and work on things that are effective and abandon those that are not. But we have to act quickly. When I testified before the U.S. House Of Representatives, Committee On Commerce, Subcommittee On Telecommunications, Trade, And Consumer Protection on October 11, 2000, I cautioned: Law enforcement is not aware of anyone who is using the information children provide online to seek them out offline, by hiding behind a bush or grabbing them on their way home from school. But it�s only a matter of time before this happens, since universal access to the Internet means that even violent sexual offenders who are online can use it for their own horrible purposes. (See Testimony of Parry Aftab, Esq. U.S. House Of Representatives, Committee On Commerce, Subcommittee On Telecommunications, Trade, And Consumer Protection on October 11, 2000.) Luckily, while our young people are sharing much more information online than ever before, to my knowledge, predators aren�t using it to hunt down our children offline. They are like vampires. They need to be invited in. Sadly, our teens and preteens are too often doing just that. They are inviting them to offline meetings, phone calls and videochats. But, as an expert in cyberrisk management, I can tell you that this is good news. Because we have a single point of risk - our children, preteens and teens. If we stop their risky and unsafe behaviors, and teach them when to reach out for help, we can manage this risk. We can keep our children safe. Our children are mainly at risk because of their own actions. Some are intentional. Others are inadvertent. They may willingly engage in communications with people they don�t know in real life "RL," agree to meet them offline or send them sexually-provocative images or perform sex acts on webcams they share with people they encounter online. They cyberbully each other by advertising their victims for sexual services, posting real or manufactured sexually explicit images of them online or by passing online rumors able their sexual preferences or activities. Preteens and Teens at Risk: Most of the high risk preteens and teens fall into three categories: those who are naive and looking for love and affection (typically the "loners" and "shy" preteens and teens), those who already engage in other high risks activities, such as drug and alcohol abuse, driving too fast or doing risky things for the thrill of it (often the student leaders, athletes, cheerleaders and very competitive teens, the risks takers and thrill seekers looking to let off steam or impress their peers) and those who don�t realize that what they do online is real, the ones who are looking to appear older, cooler, more fun and more popular (most of the teens and especially preteens fall into this category at least once). Sadly, most of our preteens and teens fit one of these categories. Sadder still is the fact that in recent years we have learned that most preteens and teens are potential victims. Naive, loners and socially-shy preteens and teens: Some believe that they are communicating with a cute 14 year old boy, who they later discover isn�t cute, isn�t fourteen and isn�t a boy. Most of the reported cases fall into this category, and until the death of Christina Long four years ago this May, experts all believed that all victims fell into this category. They are conned, and easy to spot online. Predators can seek them out, and find their vulnerabilities. They are groomed with care, and often fall in love with their molesters. Sadly, when the molestation finally occurs, not only are their bodies broken, their hearts and trust are too. They need to understand how the predators work online. Too often they tell me that they can "tell" how old someone is online. They can�t. No one can. Many predators spend years cultivating the right tone and language to look like a fellow teen online. These preteens and teens are sitting ducks. While they may have learned not to fall for the "help me find my puppy" ploy offline, they need to learn how that same ploy (appeal for assistance) works online. They need to know how to spot the risks and the predators, when online everyone can look like a cute 14 year old boy. They need to learn that romance shouldn�t occur only in cyberspace, and that parents can get involved to help them meet their soul-mate, assuming they really are. So, if they aren�t, and turn out to be a 46 year old child molester, they can come home safely and help put that molester behind bars where they deserve. Risk-takers, Thrill-seeking preteens and teens: Some preteens and teens (mainly teens) are looking for the thrills and challenge of engaging in a relationship (or at least prolonged communication) with an adult. They "play games" with the adult, and are intentionally extra sexually-provocative. They think they are smart enough to do this without getting hurt. They see this as a game, without realizing the consequences of their actions. And crossing the sexual line isn�t as frightening online as it would be in real life. The problem is that the consequences are not as apparent, the realities not as immediate. They take risks. And they think they can handle them. (They don�t often understand the consequences, though.) They often willingly engage in sexual communications with men they know are adults. That�s part of the thrill. They are also often willing to engage in sexual activities with the adult, but don�t realize what that can mean when things go very wrong. We rarely hear about these kinds of victims, because they never report it when things go wrong. They feel as though they "asked for it," or are to blame. When we hear of these cases, it�s because they are killed or kidnapped. (Christina Long was in this category. She was the first confirmed murder victim of an Internet sexual predator in the U.S. and died four years ago this May.) Friends are the answer here. If we can get friends too help watch out for each other, it is less likely that they will meet adults in real life, or if they do, got alone. Also, finding cool spokespeople, like Nick Lachey, to explain that it isn�t cool to be stupid and campaigns such as our "Don�t Be Stupid" help. So do real life stories from victims themselves about how they got caught and advice from the trenches. Kateisplace.org has sections specifically directed at this type of victim. And Teen People is an important partner of ours in spreading the word. Not really a drunken slut, just playing one online: We�ve all been reading about this new trend in the news (often with me as the expert). Good, respectful, otherwise well-mannered preteens and teens acting out in cyberspace. In profiles, blogs, on social networking sites and their away messages on IM, on their websites and interactive gaming bios, they act out. They pose in their bras, or worse. They simulate sexual activities (and in some cases post images of actual sexual activities). They pretend to be someone or something other than what they really are. And this alter-ego may be a sexually promiscuous teen "up for anything." They don�t think it is cool to tell others they were home coloring with their five year old niece last weekend. Instead they claim to have snuck out after everyone was asleep to get drunk at a wild party. To them it isn�t real. They lie. They pose. They do thing online they would never dream of doing in RL. They aren�t really drunken sluts - they are just playing one online. (Shannon, one of our award-winning Teenangels, will share insight into why teens and preteens are doing this, during her testimony today.) The Anatomy of a Cyberpredator: There have been many cases recently where pedophiles and other adults have lured children into offline meetings and molested them. Luckily, there are even more cases when such attempts to lure a child have brought about the attention of law-enforcement groups. I debated whether I should discuss any of these cases, because I did not want to sensationalize them. But if explaining the methods used by offenders might make parents more aware, and their children safer, it�s worth it. Cyberpredators, just like their offline counterparts, usually aren�t the scary, hairy monsters in trench coats we imagine standing on a dark street corner. Many are the kind of person you would be inviting to your home as a guest, and often have. They are pediatricians, teachers, lawyers, clergy, vice cops, welfare workers, journalists, Boy Scout leaders, baseball coaches, scientists, etc. They are almost always men. (Sometimes women are accomplices, but rarely are women the molesters.) They are often articulate and well-educated. They come in all shapes, sizes, and colors, and they can be very rich or out of work. But they have one thing in common: they want your child. Most of us are sickened at the thought of an adult having sexual relations with a child, but to be able to protect our children, we must get into the mind of the predator. First of all, predators often don�t see themselves as predators. They see themselves as loving partners with the children they molest. To them this isn�t rape, it�s a seduction. And, as with any seduction, it�s a slow and painstaking process. (Predators have been known to wait more than two years, collecting data on a particular child, before striking.) That�s what makes them hard to detect. They don�t appear to your child to be dangerous. An FBI agent who shared a panel with me recently said it best: "Before the Internet, these people had to get physically close to your children. They had to lurk near schoolyards, or playgrounds. Kids would see them. Adults would see them. It was a dangerous situation to be in for them, because everyone would notice an adult male lurking around children. They often had to take jobs and volunteer positions that allowed them to work with children in a position of trust in order to reach their victims. Now, however, the personal risks the pedophiles had to expose themselves to in order to be around children are gone. Now they can be �one of the kids� and hang out with your kids online without exposing themselves. As long as they don�t say or do something in the public room that makes them stand out, they can stay there forever, taking notes. And, many of them do. They have been known to create large databases on children. They track the children�s likes and dislikes. They track information such as whose parents are divorced, who doesn�t like their father�s new girlfriend or their mother�s boyfriend, or who likes computer games or a particular rock group. Kids often share personal information about their lives in chatrooms or on profiles. This is one reason why they shouldn�t. The more the predator knows about your child, the more easily they can "groom" them or appear to be their soulmate. Some cyberpredators (known as "travelers" to law enforcement) seek out the good kids, the smart ones, the ones who are not street-smart and are from sheltered suburban or rural families. Many of our children match that profile perfectly. Others, however, target (or are targeted by) popular, super achiever, risk preferring teens. It took the death of a young teen from Connecticut, Christina Long, before we realized that many of the incidents involved teens who did not fit the loner profile. What we learned was that these kids never report any attacks or exploitation. The only time we hear of these cases is when the teen is kidnapped or killed. So who is a typical victim of an Internet sexual predator? Anyone between 11-1/2 and 15. All are vulnerable. It Doesn�t Take Torture for Them to Spill Their Guts Here�s a mock chatroom discussion that my law-enforcement friends and I agree is pretty realistic. Imagine a predatorial pedophile sitting and taking notes on this child, and using this information to lure them later. Would your child fall for this? Most, unfortunately, would. This one is more typical of a boy victim and predator communication than a girl victim communication. Child: I hate my mom! I know it�s her fault that my parents are getting divorced. Predator: I know. My parents are getting divorced, too. Child: We never have any money anymore, either. Every time I need something, she says the same thing: "We can�t afford it." When my parents were together, I could buy things. Now I can�t. Predator: Me too. I hate that! Child: I waited for six months for the new computer game to come out. My mom promised to buy it for me when it came out. She promised! Now it�s out. Can I buy it? Nope. "We don�t have enough money!" I hate my mom! Predator: Oh! I�m so sorry! I got it! I have this really kewl uncle who buys me things all the time. He�s really rich. Child: You�re sooooo lucky. I wish I had a rich and kewl uncle. Predator: Hey! I got an idea! I�ll ask my uncle if he�ll buy you one too....I told you he�s really kewl. I bet he�d say yes. Child: Really!? Thanks!! Predator: BRB [cybertalk for "be right back"]... I�ll go and call him. � � � Predator: Guess what? He said okay. He�s gonna buy you the game! Child: Wow, really? Thanks. I can�t believe it!!! Predator: Where do you live? Child: I live in NJ. What about you? Predator: I live in New York. So does my uncle. New Jersey isn�t far. Child: Great! Predator: Is there a mall near you? We can meet there. Child: Okay. I live near the GSP Mall. Predator: I�ve heard of that. No prob. What about Saturday? Child: Kewl. Predator: We can go to McDonald�s too if you want. We�ll meet you there at noon. Child: Okay. Where? Predator: In front of the computer game store. Oh! My uncle�s name is George. He�s really kewl. Child: Great... thanks, I really appreciate it. You�re so lucky to have a rich and kewl uncle. Saturday arrives, and the child goes to the mall and meets an adult outside the computer game store. He identifies himself as "Uncle George" and explains that his nephew is already at the McDonald�s waiting for them. The child is uncomfortable, but the uncle walks into the store and buys the $100 game. He comes out and hands it to the child, who is immediately neutralized and delighted. Stranger-danger warnings are not applicable. This isn�t a stranger--he�s "Uncle George,"and if any proof was needed, the computer game is it. He gets into Uncle George�s car without hesitation to meet his friend at McDonald�s. The rest is reported on the 6 o�clock news. It�s disgusting. It makes us sick to our stomachs, but it happens. Not very often, but often enough that you need to be forewarned. (Several thousand cyberpredator cases are opened each year by law enforcement agents in the United States.) But no matter how often it happens, even once is too often. Knowing how they operate and the tricks of the trade will help us teach our child how to avoid being victimized. Each case differs, but the predators tend to use the same general tactics. Aside from the "bait and switch" scam discussed above, they often attempt to seduce a child. They want the child to "want" them. The Script--How They Operate Online They begin by striking up a conversation with the child, trying to create a relationship of trust and friendship. They often masquerade as another child or teenager, typically of the opposite sex, unless the child has indicated homosexual interests. (The child may or may not know the "seducer�s" real age by the time they meet face-to-face.) Phone calls usually start at this point. Sometimes gifts are sent to the child as well, which may include a Polaroid camera and film. Once they have broken down barriers of caution, they begin introducing sexual topics gradually, often with the use of child pornography to give the child the impression that other children are regularly involved in sexual activities. Then they begin to approach the child�s own sexuality and curiosity, by asking questions and giving them "assignments," like wearing special underwear, sending sexually suggestive photos of themselves to the pedophile, or performing certain sexual acts. These assignments eventually broaden to the exchange of sexually explicit photographs (using the Polaroid, cell phone camera or digital camera) or videos of the child. Finally, the pedophile attempts to arrange a face-to-face meeting. (He may also have divulged his true age or an age closer to his actual age at this point.) Why It Works All the lectures we have given our children from the time they are very young about not talking to strangers aren�t applicable online, where everyone is a stranger. A large part of the fun online is talking to people you�ve never met. In addition, our children�s stranger-danger defenses are not triggered when other kids are involved. The warnings apply only to adult strangers, not to other children. If any of us walked up to a child in a playground and tried to strike up a conversation, they would ignore us and probably run away. But if an unknown eleven-year-old came up to another eleven-year-old in the same playground, they�d be playing in ten seconds flat! That�s how the pedophiles get in under our kids� stranger-danger radar'they pretend to be other kids. And children often believe what they read and hear. They "know" things about the predator because they believe what he told them. They also believe what they read about him in his "staged" profile, which supports what he told them. So it�s not just true, it�s confirmed. There are many stages at which the pedophile can be thwarted by an observant parent. In addition, children with healthy friendships and a strong, open, and trusting relationship with their parents are less likely to fall victim to pedophiles online. Pedophiles typically prey on a child�s loneliness. They feed the child�s complaints about her home life-creating an "us-versus-them" atmosphere. "Your mom is so mean to you! I don�t know why she won�t let you _____." (Fill in the blank with whatever we try and limit: makeup, malls, concerts, etc.) This atmosphere does two things: It creates a distance between the child and her parents, at the same time bringing the child into a special secret alliance with the pedophile. (You should know that boys are almost as often the victims of Internet sexual exploitation as girls are, but they report it less frequently.) I have followed many cases over the last few years. In my role as WiredSafety executive director, I�ve also been responsible for reporting several of these to law enforcement and for helping many families through the pain of prosecution. Sometimes we just help the families survive what the molestation has done to them. (The child isn�t the only victim-entire families are torn apart in the aftermath of a molestation.) Parents feel guilty for not having protected their child, siblings don�t know how to treat their fellow sibling--the pain can continue for a lifetime, and even more. And, in addition to being hurt physically, the young victim�s heart is broken by the betrayal of trust. Anatomy of a Real and Early Case One case I reviewed many years ago involved a New Jersey teenager and an Ohio adult predator. It was one of the earliest reported cases of cyber-predatorial conduct, discovered in 1996. Luckily, the liaison was discovered before the girl met the man face-to-face. But it had gone on for a year and a half before being discovered by the girl�s mother. As you read the details, think about what could have been done to discover the situation earlier and how you can use these precautions to protect your children. Paul Brown, Jr., an Ohio resident, was forty-six years old. He was also unemployed, weighed over four hundred pounds, and lived in a basement. He had accounts with several ISPs. Mary (a hypothetical name for the young girl involved) was twelve when her mother, a schoolteacher, bought her a computer, reportedly because Mary was having problems making friends. When she got online, Mary posted a message on an online service, in the spring of 1995, looking for a pen pal. In her message she described herself as a teenage girl. Paul Brown, Jr,. responded to the message, using his real name (something they often do, surprisingly) but identifying himself as a fifteen-year-old boy. Brown and Mary maintained an e-mail and telephone relationship for several months. As the relationship became more involved, they began writing letters, and Mary sent Brown a photograph. He told her that he was living at home with his mother and was hoping to find a girlfriend. In early August, Brown asked Mary for a "favor." "If I sent you a roll of film, could you get one of your friends to take pictures of you in different outfits and maybe hairstyles? Makeup if you use any, and different poses. Some sexy, if possible. Please. Baby for me. Thanx. You�re the best. Love Ya." Mary complied. For the next eight months, they continued to converse and correspond, and Mary sent additional photos. Brown encouraged her with juvenile antics, such as using stickers in his letters to her saying things like "Getting better all the time!" In May 1996, Brown sent Mary a special love note. "Saying I love you... seems to be an understatement. At the age of 14 you have captured my heart and made it sing... I love everything about you." Shortly thereafter, Brown confessed to being in his twenties. He also suggested that Mary videotape herself in sexually provocative poses. She did. After Brown had reviewed her videotape, he returned it to her with instructions to redo the tape and include views of her genitalia and breasts. He later admitted to being divorced and in his thirties. He reportedly also sent her small gifts from time to time. A few months later, in response to Brown�s promise to pass copies of the tape to four members of a rock band Mary admired, she sent additional videotapes to Brown. (Brown told Mary that he knew the band members very well.) Each tape sent to Brown was designated for a different member of the band and contained sexually explicit conduct. Brown apparently had also sent her his size 48 underwear. When her mother discovered the underwear, the authorities were notified. Tracing Brown through phone records, special agents of the FBI in Cleveland seized the videotapes and photos of Mary and of more than ten other teenage girls from across the country. Mary was fourteen when this was all discovered. Brown pled guilty to enticing a minor to produce sexually explicit photos and videos and was sentenced to a little less than five years in prison (the maximum penalty for a first offense). In a written statement to Brown following all of this, Mary said, "I trusted you. I thought you were my friend." There are several things that stand out in this case. One, interstate phone calls were made by Mary. Parents should always be reviewing long-distance bills for suspicious calls. Two, Mary was lonely. These kinds of children are often the most vulnerable; a parent should be involved in their online friendships, and monitor their online lives. And, three, as hard as it is to know what our kids are doing when we�re not around, especially if you are a single parent, a year and a half is a long time for a relationship to be going on undiscovered. You should spend time learning who your children�s friends are, online and off. But Monday-morning quarterbacking is always easier than playing the game in real time. We may look at the situation and say that could never happen to one of our kids. However, there but for the grace of God go all of us.... Knowing your child is lonely and has problems making friends is the first sign that the child may fall prey to a pedophile or cyber- predator. Predators can spot lonely children. They can also spot kids who are new online and may not yet know all the rules. Most teens, when surveyed, admit to having been propositioned online. But what may be obvious to a cyberstreetsmart kid may not be so obvious to a child not yet familiar with cyberspace. Pedophiles befriend these kids and patiently build trust and a relationship--looking toward the day when they can meet face-to-face. Encourage your children to make online friends, but learning about their online friends is an important way to avoid these secret relationships. Education is important in avoiding this danger, too. (Had Mary been forewarned about how pedophiles operate online, she may have been more attentive to how old Brown sounded on the phone, and been more aware of his classic tactics.) So is control over incoming and outgoing information when younger children are involved, using technology blockers, monitors, and filters. These kinds of situations can be avoided if you plan ahead, educate and communicate with your children, and keep your eyes open. Getting in Under Your Radar: Even when parents are watching, bad things can happen. I included the Paul Brown case in my first book, A Parents� Guide to the Internet. (He was sentenced in 1997, when I wrote the book.) I included it because it was a good example of how cyberpredators typically operate, and suggested that if the mother had been a bit more attentive, it might have been discovered earlier. I was right about how cyberpredators operate. I was wrong about how being attentive might have avoided the sexual exploitation. It takes more. It takes both an attentive parent and a teenager who has been taught how these pedophiles operate online. In November 1998, I met a mother who did everything right. She was attentive and inquisitive about her daughter�s online relationships. She asked the right questions. She had a good relationship with her daughter, and yet Charles Hatch, a child molester from Utah, got in under everyone�s radar and sexually exploited her thirteen-year-old daughter. Jennifer (not her real name) was eleven and a half when she first met "Charlie" online. She thought he was a few years older, and was intrigued about befriending a slightly older teenage boy. Jennifer was an honors student and had already been taking advanced college courses while still in middle school. She lived in a loving and warm household with her mother and father. She also had siblings and half siblings from her father�s previous marriage. They were all close. Jennifer�s mother, Sharry (also not her real name), talked to Jennifer about her online friend, Charlie. She insisted on talking to Charlie himself, by phone, once he and Jennifer had started calling each other. He passed the phone call test, and Sharry was convinced that he really was the teenage boy he professed to be. Either he had manipulated his voice to sound younger or he had a younger person make the call. Charlie even called and spoke to Jennifer�s brothers, talking about when he would be their brother-in-law someday, after he and Jennifer were married. He pleaded with Jennifer to come and visit him in Utah. Sharry invited him to visit them instead. But Charlie always had a reason he couldn�t come. As things progressed, Sharry insisted on talking to Charlie�s mother. He first avoided it by saying she was sick, later that her sickness had become cancer, and that eventually she died from the cancer. The family fell for this, hook, line, and sinker. Most caring families would. Although the "relationship" progressed for almost two years, it remained relatively tame. Charlie was romantic rather than predatorial, and he sent her expensive gifts, including a Polaroid camera. (Remember the Polaroid camera Paul Brown sent?) Jennifer was inexperienced with boys and dating, and Charlie seemed to know not to push her too fast. But about a year and a half after they met online, Charlie sent her sexually explicit photos of himself from the neck down. She became very uncomfortable and pulled back. But several tragedies occurred around the same time, which made Jennifer easier prey. Her father was hospitalized with a serious illness, and her sixteen-year-old half brother died of a brain hemorrhage. Charlie, like all good predators, knew when to strike. He told Jennifer that she owed him sexually explicit photos of herself, since he had sent those of himself. When she refused, he told her that she would be left alone, since her family was dying or would die--and he threatened to leave her. Reluctantly, after fighting against it as hard as she could, she acquiesced and sent him sexually explicit photos of herself. When Sharry was cleaning Jennifer�s room, she discovered a letter in which Charlie had set forth the sexual poses he wanted Jennifer to photograph. Sharry sent him a letter, confronting him. She said that he didn�t sound like a teenager in the letter. She told him that if he ever contacted her daughter again, she would inform the police. He never replied, and Jennifer was not permitted to use the Internet for months. One day, just when Jennifer and Sharry thought that the whole episode was past them, the phone rang. It was a detective from Utah, who informed Sharry that Jennifer�s photos had been discovered in Hatch�s day planner by a coworker. He wasn�t sixteen--he was thirty-six. He was a former teacher who had been dismissed by the school after having been accused by a student of sexual abuse. (The school hadn�t taken any other action.) He was currently employed by the welfare office in Utah, and was married with children and step-children. Six months later, Charles Hatch was convicted of sexual exploitation in a Utah federal court. He began his six-and-a-half year sentence in early June 1999. As a condition of his plea, he will not be permitted to use the Internet. This mother has become a dear friend of mine, after seeking WiredSafety� help in getting through this. She was the first parent to speak out publicly about her child being targeted by a sexual predator online. Unfortunately, the predators are willing to try many different ploys until one finally works. Using Celebrity�s Names I was having lunch in Los Angeles with one of my girlfriends when Nick Lachey walked into the restaurant. She pointed him out to me and I immediately grabbed my business card and approached his table (to the utter embarrassment of my friend). I introduced myself and told him I needed his help. I explained that predators were using his name and the name of other celebrities to lure kids into meetings and unsafe activities. They find teens who post their favorite celebrities on their profiles, websites or other online communications. Then they create a profile claiming to be a close personal friend of that celebrity. They offer to forward a pic of the teen to the celebrity, and seek sexier and sexier pics as time goes on, ultimately ending with an offer to introduce the teen to their favorite celebrity in real life. Years ago, Justin Timberlake was the most popular of these celebrity lures. Nick is now. He listened intently and turned white when he realized people where using his name to hurt his young fans. He offered his help. When I left his table, he has agreed to do a public service announcement to help teens understand that is anyone claims to be a close personal friend of a celebrity, they aren�t. Or won�t be for long. I was very excited, but not as excited as I was two weeks later when someone from Nick�s office called asking me to help them create a safer teen-only social networking site called YFly.com. I agreed and YFly.com became a reality with the financial assistance of Tom Petters (and the Petters Group), and the creativity and energy of its founders, Drew Levin and Daniel Perkins. I joined the team to set up a safer network and create the most advanced educational and awareness content online, just for teen users. The young users can click on "Report the Creep" if they suspect someone is an adult posing as a teen. It�s a beginning. Finding safer technologies and services is part of the solution. So is awareness using teenspeak. Shannon, one of our Teenangels is 14 years old. She was selected by Teen People as one of the twenty teens who will make a difference. She has gone them one better...she is already making a difference. It is with pride that I introduce Shannon Sullivan, one of my Teenangels. Common Internet Sexual Predator Ploys...How it works online WiredSafety has done a substantial amount of research on how predators operate offline and online. Working with missing children organizations internationally, Internet providers, law enforcement and victims and their families, we have developed a substantial knowledge base about how teens and preteens are lured into offline meetings and online sexual exploitation. From the young victims of sexual predators and online sexual exploitation, we have learned the typical [ploys and how they unfold. By handling online one-to-one help for victims of cybercrime and cyberabuse, we have learned what parents and teens need and how to get them assistance quickly. WiredSafety has stood on the front line against Internet criminals and abusers since 1995. There are certain tactics that sexual predators use offline to prey on children offline, whether they are strangers or someone known to the child. Interestingly, these same ploys are often used online, by Internet sexual predators, with some "virtual" modifications. Only a few ploys, which are aided by the anonymity of cyberspace, are unique to cyberpredators. Until our recent work, no one has pulled together a list of common predator ploys used by offline sexual predators and compared them with the ploys used by online sexual predators. Our researchers are developing additional materials and studies to expand what we have already learned. This new research is crucial to keeping our teens and preteens safer. Protecting young people from Internet sexual exploitation is much easier if the young people are aware of the kinds of tricks and ploys used by the predators. If they are alert to possible "ploys" they are less likely to be caught off-guard.� Many of these ploys are used over and over again by perpetrators and taught to others within their child molester communities. They include: asking you child for assistance (this is the help me find my puppy ploy, when used offline), the love and affection, confidence and trust ploy (where the child is groomed to fall in love with their online soul mate), the curiosity ploy, the fear tactic, the games and fun, the fun and job offers and the modeling, talent scout or beauty contest ploys. "Don�t talk to strangers" is probably the most common warning parents give their children in an attempt to prevent abduction or exploitation. Unfortunately, these warnings don�t work in cyberspace, where one of its greatest benefits (and the most fun for teens) is being able to communicate with strangers. In addition, unlike the perception of a "stranger" as the raincoat clad, dirty, bearded man who lurks on street corners or in playground, Internet "strangers" quickly become Internet "friends" and the stranger danger radar is no longer working. The kids, tweens and teens are no longer treating them with care, and have let them into their inner-circle. That�s where the real dangers begin. These child molesters can get in under your and our children�s stranger danger radar. Sometimes this happens because they believe their net friend is another young person. And a "stranger" is never another young person. Unlike the offline counterpart ploys, a 47 year old can easily masquerade as a 13 year old online. Or someone can be three or four different people at the same time online, engaging in conversations with themselves in a public setting, allowing young by-standers to think they are trustworthy, or famous or otherwise worth talking to. Online our children are in the dark, literally. With the number of young sexual predator victims growing, and the amount of contact information young people are sharing online in blogs, profiles and away messages putting them at greater risk, awareness and prevention in these areas is crucial. Partnerships with Internet service providers, media and entertainment companies and learning from and sharing what we know with each other is what needs to be done. And, it is worth the effort. Our children are entitled to sleep more safely at night, and enjoy the wonders of the Internet...without fear of being preyed upon or hurt. Parents are the Beginning From the time I published my first book for parents on Internet safety in 1997 (A Parents Guide to the Internet) we have been educating parents on how they can stay ahead (or at least on par :-)) with their children and teens online. Our quick guide - Parenting Online, is available online without charge and has been copied and distributed by hundreds of groups and schools around the United States. It includes a parent/child contract, a quick guide to parental control technologies and our very popular "Common Sense to Cybersense." (A copy of this guide is attached as part of the Parenting Online Guide.) Now, many parents want something quick. They are happy that expert groups such as WiredSafety.org understand all the issues and that they can turn to us. But they are being pulled in so many directions just by virtue of their parenthood, that they want "Just the Facts...Madam." Our new programs, called Internet Safety 1-2-3 make it easy for parents to spot the risks by age, and also by technology. Our new automated Family Internet Safety Plan works using this new approach (patent pending) to help parents understand what works for them and what things they need to do to keep their family safer, given the technologies they use, the ages of their children and their value system. (A quick example of the kinds of things covered is attached as an Appendix 3 in our "Cheatsheet on Risks by Age".) Our children are worth it, and so is the Internet. Too often blamed for everything from the Black Plague to the sinking of the Titanic, the Internet is a wonderful tool for learning, communication and entertainment. It levels the playing field between the haves and the have-nots. All children look alike online. No one is classified by their race, ethnic origin, religion, accent or physical ability. Online they are all just children. And like it or not, the Internet is here to stay. We�re all in this together. Let�s work together to make the Internet fun, safe, private and educational for children. And let�s work together to make sure that the children�s Internet industry, which has so much to offer our children, flourishes! For the children. I remain willing to help, and provide input and expertise in any way this Subcommittee can use my help and expertise. I wish to thank the Subcommittee, its chairman and all its members for inviting me to present this testimony on such an important subject. Parry Aftab, Esq. Mr. Whitfield. Thank you, Ms. Aftab. And we want to hear from Ms. Sullivan in just 1 minute but right now I want to recognize Mrs. Schroeder for her 5 minute opening statement. Ms. Schroeder. Thank you very much. I wanted to thank you, Chairman, for inviting me here to testify today. And what I would like to do is talk about what i-SAFE has been doing for the past 6 years. We have been in Congressional Appropriations for the past 6 years. We are in all 50 States and we are in 15 countries. Predatory acts against our children are the most heinous acts that we have ever seen. We have heard it today from Justin and we have seen it time and time again with many, many children. And we look at this in terms of, and we ask ourselves how can this be, you know, in terms of families, we are here to protect children. Our Nation now is being faced with a new technological challenge which is these kids know a lot more about technology than parents. They know a lot more about technology than their teachers. This is their world. In my day, when I would come home from school, I would pick up the telephone and we would be talking to one another. Today, what the kids do is they go home, they fire up their laptops, and they get on the buddy list and that is their friends. And we have heard testimony today in terms of how do you define a friend, how somebody tries to make a friend online, and how that is all done under the guise of anonymity. If you would look at the screen that I have here on the Internet landscape and as you see here, 90 percent of the kids and this is an assessment that we did with over 200,000 students in the schools and they have Internet access. If you look at the fact that 25 percent of those kids and we really do believe that this is a low number, they spend at least 5 hours a week online. If you look at also too the way the Internet is is that the kids like to be by themselves. We heard this with Justin in his room. This is where he was comfortable in terms of he needed to talk to people. And as you can see here with the statistics that we have with them, the numbers are quite high when you start looking at the fact of in fifth grade 40 percent. That is small. In fifth grade, we are still chaperoning our kids but yet they feel so comfortable on the Internet in terms of being alone. Also here, if you look at the statistics that we have and there is no right or wrong answer from these kids. I mean they--we did pre, post, and delayed assessments, but 33 percent of them said that they fee freer in cyberspace. And I actually have had the opportunity to do site visits in these schools and some of the questions that we asked them is why do you feel freer in cyberspace. And it is just one of those that they feel that they know these people. We heard from Justin and how he was enticed and he did things that in real life you would think that is something that nobody would ever do. But also, too what we looked at was the fact that the students and we went ahead and did a survey of 30,000 students with 30,000 parents and we asked them, do you tell your parents what you are doing online? And what was interesting after this survey was the fact that the kids said no but the parents said yes. And actually this was published by the Justice Department when we were through with it, and what we found out with the conclusion of this that this is the digital divide. We went ahead and asked the kids in terms of would your parents approve of what you did on the Internet? Many of the kids said no and the parents said that well of course I would, I trust my kids in terms of what they do on the Internet. We look at the risky online behavior of students. As kids grow older, they take risks and that is inherent within them. That is how they learn to be able to do things in terms of they take risks riding bikes, they take risks in everything that they do in life and one would hope as they grow and they become much more mature, that those risks are much more calculated and they do not become risks but more so it is one model of appropriate behavior. We went ahead and in the school districts we asked the students in terms of how many of them gave out personal information and what we found out from these kids was the fact that many of them said well I do not tell people my name. And one of the activities in the classroom is the fact that they will have to go and actually tell what is their screen name and they had discussed is that identifiable information? How much of your screen name does that say about you? And what we found out was the fact if you look here, there is a very high percentage of kids that what they do is they will put a screen name down and then describe maybe their age, their location, what they like, what they do. We found out, too that after education, NIJ gave a $3 million grant to an entity in Virginia to study us for 2 years. We were selected on an efficacy study and we presented that study to you in November. And what they told me when they presented it was is that they saw that this is probably the fastest crime prevention in terms of preventativeness that really made a difference. And one of the questions I asked was why? Why did they see that of all the crime prevention that they had ever looked at before? And you know it was a real easy answer, which is this is their world. This is their cyberspace. They know all about it. And after the curriculum, what we found out here was that 84 percent of the students they were a lot more careful in terms of the information that they gave out. They also were a lot more careful in terms of what they were sharing information because now they are a lot more knowledgeable about I understand now in terms of what that information can do and where it can go. Also in actual property. Many of the students did not understand what is that? Isn�t everything free out there? They did not really grab the concept of this is actually stealing. We look at the fact of meeting face to face and you can see here many of the students there is not any student that you would talk to that said yes, I do want to meet a pedophile online. There is just, I mean, that is just not going to happen to them. And we have talked to millions of kids. But the fact is while they are looking at that saying that they are a lot more careful in terms of being a willing participant. When they start giving gifts, they start thinking this is not normal. One of the activities in the fourth grade class was the fact that the kids turn around and they have something and they are to give it to their best friend. And if it contains a value, let us just say $50, you do not want to give that away. Well then why would you think that somebody that you do not know would send you money in the mail? Up here is a chart and it is a map of the United States. This year, i-SAFE will have educated 1.8 million students. And those are audited figures. Those are classroom instructions that we get from the school. We have cooperative agreements with the schools. And so as you can see here that, those are pretty significant numbers in terms of the desktops, the numbers of kids that we actually touch their lives every single day. And one of the big things that we have found is is that the peer-to-peer, you are hearing it, peer-to-peer from the kids and I have with me one of our I Mentors and he is from the State of Maryland. And what I wanted to actually show today and I have here in terms of we use Kentucky as a model. Kentucky was one of our original States that we actually implemented in and it was a State that just took off with a vengeance, particularly with those mentors. It was amazing to see what they did in their State, in that particular State. When you look at the model of Kentucky, we formed the partnership with the Department of Education, with law enforcement, with the Attorney Generals, with the parent organizations, with the school organizations. We did 120 man professional developments in that State, 88 parent programs. And as you can see in that State alone there are over 112,000 students that have received the curriculum. Also looking in terms of the educators on a national perspective, we have done almost 2,000 professional developments nationwide and we do train the trainers so we form a strategic development, a partnership with the Department of Education and it�s institutionalized within their school day. And you do not want to forget the parents because the fact is that parents they are trying to catch up with what their kids are doing. I was on the last two Dateline segments with Chris Hansen on how to catch a predator. And the big one that was just on television a few months ago, I addressed the issue of parents. And it is not the fact that parents do not care, it is just that many parents and including myself grew up in the television age, so you cannot grab the concept of can that computer really do that? Or, you know, if the computer is upstairs in their bedroom, many parents today are thinking, I am really glad that my son or daughter is at home, it is 10:30 at night, but the question is who are they up there with? Mr. Whitfield. If you could summarize, Ms. Schroeder. Ms. Schroeder. Yes. What we have looked at today is the fact that kids are having two way communication. We did a project with VeriSign and we gave kids their first digital ID and it was called the i-STIK Project. Kentucky participated in that as well. So they see what kids are doing with social networking, they are in school, they are doing their homework online. And on this particular project what we did there are the kids actually had a digital ID, they went to a local area and right now what we are working with is YAHOO. We had Myspace contact as well regarding, because of the problem that they are having, Microsoft, and looking at the fact of being able to give these kids their own digital ID so it would authenticate them. So what happens is is that you are in a green space where there is other kids. What I would like to do is just show you brief video on the mentor in Kentucky. [Video] Thank you very much. [The prepared statement of Teri L. Schroeder follows:] Prepared Statement of Teri L. Schroeder, President/Program Director, i-SAFE America, Inc. Thank you, Chairman Whitfield and Ranking Member Stupak for inviting me to testify before the House Subcommittee on Oversight and Investigations at the hearing entitled "Sexual Exploitation of Children over the Internet: What Parents, Kids and Congress Need to Know about Child Predators." Predatory acts against our children are among the most heinous of crimes perpetrated within our society. Historically, communities as a collective take deliberate and specific actions to protect their children in an effort to prevent these heinous acts. These protective actions include: education -- teaching children to be wary of strangers, to recognize and avoid dangerous situations, to cry for help when they feel threatened. Our nation is now faced with technological advancements that allow even the youngest of children to have access to the Internet. Students today explore the wonders of the world by transporting themselves through cyberspace. They can travel to the brightest most intellectual domains of the universe and conversely, they may travel to the darkest most detestable realms of the human imagination; and they travel this world alone. A universal paradigm shift has occurred in the methods and means available to child predators in pursuit of their prey; and as such a universal paradigm shift has occurred on the preventative tactics that we employ in our efforts to protect our nation�s youth against these predators. The content of my testimony today will address the ramifications of this universal shift as our nation�s youth explore the wonders of the Internet. We truly are a global economy and as such our nation�s youth are cyber citizens engaging in online activities. Those activities include socialization (two way communication whether that be through email, chat or instant messaging), games, shopping, entertainment and education. I will be addressing the role of education and youth empowerment and the need to empower our nations youth with the appropriate tools to minimize the number of predatory acts predicated against them. It is imperative that a proactive well-balanced approach be deployed to support the challenge of embracing the activities of our nation�s youth online. i-SAFE America is dedicated to: 1) implementing a standardized Internet safety education program throughout the nation that provides kids and teens with essential tools to reduce the risk of their being victimized while engaged in activities via the Internet; and 2) launching an Outreach Campaign that empowers students to take control of their online experiences and make educated, informed, and knowledgeable decisions as they actively engage in cyber activities. From September 2005 through March 2006 i-SAFE educated over 1.3 million students nationwide. That number continues to increase monthly as the i-SAFE program is expanded throughout school districts. The i-SAFE Internet safety curriculum is a teaching and learning experience, which incorporates best practices as they are defined by the latest educational research, and correlates them to accepted educational standards. This is accomplished by providing a broad range of materials and formats which meet a variety of teaching and learning needs for students and educators in grades Kindergarten through 12. Topics are centered on up-to-date information pertinent to safety issues, which confront today�s youth through continuing advances in Internet technology. The curriculum creates a successful learning environment through a model of integrated critical thinking activities and guided opportunities for youth empowerment. Active participation in i-SAFE student activities promotes acquisition of knowledge, analysis of online behaviors, construction of solutions to Internet safety problems and issues, and involvement in the spread of Internet safety concepts to others through peer-to-peer. Through this process, students enhance and enrich their own lives, the lives of other students, and the community at large as they engage in creating a safer cyber community. Our children now live in two diverse worlds: their physical world and the world of cyberspace. As such, they essentially live in two cultures that often conflict. Previously, many of the lessons learned in the physical world don�t seem relevant in cyberspace as these children reach out to strangers as friends. This paradigm shift demands new innovative educational programs, and tools, for our children; their parents and the community. It is essential that children, as they travel their world of cyberspace alone, be provided with the knowledge and tools they need to independently recognize and avoid dangerous situations online; to actively engage learned proactive techniques to more safely interact with strangers online; to critically appraise situations in which they find themselves; and to react appropriately when they find themselves in uncomfortable, compromising, or threatening situations. Students today will be global citizens for the rest of their lives. Students view the Internet in a much different way than adults. I would now like to address the "Parents Internet Assumptions" and the "Youth Perceptions/Behavior regarding the Internet." At the time of this report approximately 100,000 students had participated in the survey process; students participating in our US program by grade level were: 15,000 K - 2 students 22,200 grades 3 & 4 62,800 grades 5 - 12 The i-SAFE assessment results show that in most cases there is a noticeable difference in a student�s participation in risky behavior from grade to grade. Older students are more likely to take risks and/or feel safe in the Cyber world. This finding reinforces the need to introduce and educate our youth in the early grades. For example: When asked if they had visited an "inappropriate" website; 15.5% of 5th graders said yes vs. 36% for 10th graders. Relative to gender; males are more prone to visit an inappropriate place on the Internet than females (31.3% vs. 18.7%) and are likewise greater risk takers when asked if they were willing to meet someone from the Internet "face to face" (19.2% vs. 11.2%). Males were more likely to play games as their primary online activity while females were more likely to chat or use email. Also, based on pre assessment results; it is evident that once a youth enters cyberspace there are no significant differences in behavior between ethnic groups. Therefore, the Internet has become the great equalizer. 90.4% of students� in grades 5-12 and 84% of students� in grades 3 & 4 have Internet access. And on an average 37% of all 3rd & 4th graders use some form of Internet communication; that figure rises to the 80-90% level in the upper grades. Interestingly, about 45% of students in grades 8-10 stated that online communications were their main method in keeping in contact with friends. In addition students in grades 5-12 stated that: 23% are online for more than 5 hours a week (86% are online at least 3 hour a week). 8% have been asked to keep their Internet friendship a secret. 12% have been upset by something that was said by a stranger they met on the Internet. 32% have the skills needed to get past filtering software and 20% have actually used those skills to get past filtering software. Digital Divide Between Parents & Youth There is a gap between what parents say they know and what youth claim they share with their parents. In an i-SAFE survey with over 2,000 parents, the vast majority (94%) of parents stated they had a pretty good idea about their child�s online behavior. In contrast, only 54% of the students said they share where they go and what they do on the Internet with parents. Our results also show that these differences between parents and students generally increase with increasing age. EMBED Excel.Chart.8 Of the parents surveyed, 93% felt that they had set ground rules for their child�s online activities. However, the percentage of students acknowledging that their parents had established rules for their Internet use drops to 63.7% (see chart below). EMBED Excel.Chart.8 In addition, 21% of the students stated that their parents complained about the amount of time they spent on the Internet but 29% also felt that their parents really had no idea how much time they were actually spending online. 62% of the parents polled indicated that they were NOT concerned about the amount of time their child spends online. Interestingly, on average, 25% of the students stated that their parents, on some level, would disapprove of their online activities and 13.8% actually keep their Internet activities secret from their friends and family. The gap between what youth believes to be their parent�s level of awareness regarding their online behavior and what parents have stated is significant and merits continued attention. At Risk Behaviors There are other individual statistics that underscore the need for constant Internet safety education. For example, the Internet has become a focus for youth to find entertainment, make new friends and make purchases. On an average 29% of the students have shared such information when going online. That figure goes up in the 50% in the higher grades. EMBED Excel.Chart.8 Two other factors compound this issue. More than half of all students prefer to be alone when accessing the Internet (see graph below). Combine that desire with a student having their own computer in their room (22% overall stated that the computer they use is in their bedroom); and students feel empowered or freer to do what they want on the Internet than they do in the real world (33%). EMBED Excel.Chart.8 It should be pointed out that even in the very early grades our youth are being exposed to the cyber world. It is folly to suggest, as some have stated, that "kids that are young are not Internet savvy." The vast majority of K-2 teachers (54%) stated that at least 50% of their students have used a computer at home and 16% of the teachers indicated that at least 50% of their students have used email. A significant number had also gone into chat rooms. The age demographics of these students consist of 5, 6, & 7 years olds. 28% of all students in grades 5-12 (43-52% in the upper grades) have downloaded music or movies from the Internet. On an average, 65% were against any type of fee being charged for the service. EMBED Excel.Chart.8 In real life Kids/Teens spend twice as much time with peers as with parents or other adults. However, through the guise of anonymity the Internet provides a medium which allows a student to believe that the communication they are having online is a respective peer when in many instances it is an adult. Even though students may be aware of the dangers inherent in communicating with someone online, we continue to see they make decisions about engaging in a behavior as if it were a one-time thing. Risk taking is a natural part of kids/teens lives. They take risks in order to grow, trying new activities, generating new ideas, experimenting with new roles. However, they can also find themselves in trouble with their risk taking. Concern over such risk behaviors have led to the creation of many types of intervention. Some of these interventions have attempted to manipulate kids/teens beliefs, values and behaviors hoping to get them to act more cautiously. Other interventions have attempted to improve their stability to make sensible decisions, hoping to get them to make wise choices on their own. Having general decision-making skills enable kids/teens to protect themselves in many situations. Education Makes A Difference The good news is that in-classroom education and outreach efforts do make a difference. Students taking i-SAFE post assessments, immediately after completion of the i-SAFE curriculum, demonstrated a significant rise in their Internet dispositions. 84% of students stated an intention to be more careful about where they go and what they do on the Internet. 89% indicated that they would be more careful about the email attachments that they open. 88% will be more careful about sharing personal information with those they meet in chat rooms and other places on the Internet. On an average, 80% of the students polled after completing the i-SAFE program were going to be more careful about downloading music from the Internet. However, older students were more inclined to download and less concerned about being careful. EMBED Excel.Chart.8 An area that attracts quite a bit of attention is child predation. Our pre assessment data shows that on an average about 15% of the youth were willing to meet someone new from the Internet "face to face". After the i-SAFE program 82% of all students stated that they would be less likely to meet someone face to face. EMBED Excel.Chart.8 Though individual statistics can be interesting and in some cases alarming, the real power of the data lies in the overall trends that reveal the impact of emerging cultural and social changes brought about by the Internet. The increasing amount of time spent in the Cyber world, the ability to remain "anonymous", the perceived lack of rules, the ease of access; all contribute to a revolution in the way our youth interact with each another, the way they make friends, and the social skills they develop. It is widely recognized and accepted that the main activity of kids/teens, as cyber citizens, is online two-way communication. That communication consists of chat, email and instant messaging. The nucleus of the Internet affords the opportunity of two-way communications and inherently the computer does not know whether the users communicating are that of a child or an adult. This means of communication allows users, regardless of age, gender or socioeconomic status to openly and freely exchange ideas and information. Our nation�s youth has now coined a new term for "hanging out with my friends" and actively searching for new friends is done through a click of a mouse. Kids/teens rarely "travel" with their parents or a chaperone to many of the online areas. Buddy lists and instant messaging has replaced the traditional "telephone and phone book." Without education and the appropriate tools to raise their awareness and to empower them to recognize the danger of being alone in a room full of strangers, our nations youth will continue to be at risk for exploitation. Let me begin by addressing specific examples of how dramatically the protective actions that have been employed historically have been impacted by this technologically-enabled, Internet-driven, paradigm shift. Education: Parents teach children to be wary of strangers on the street, in public places, and at the front door; but now, the strangers that these children meet -- are not on the street--they are in cyberspace. And, to the detriment of the parents, many of their children are more "Net" savvy than either parent. This inequality of knowledge hinders parents in their abilities to address cyber safety issues and to properly instruct their children about the dangers of meeting strangers online. Historically, when parents taught their children to recognize and avoid dangerous situations, those situations were based on tangible, physical elements within their community. Now, danger lies in an amorphous cyber-world cloaked in the allusion of anonymity. Parental Supervision: Many of our children�s activities have dramatically shifted from participatory activities (easily supervised by a parent and often enjoyable to watch) to solitary activities - engaged through the computer keyboard or joystick - that do not lend themselves to easy supervision nor enjoyment by a non-participant (such as a parent). Children may spend hours playing solitary games online, or they may play in tandem with their cyber friends, or they may even play with total strangers they connect with online in an Internet gaming community. The Internet has broadened a child�s ability to meet other people and acquire "friends." Historically, children made friends at school, through family acquaintances, and from participating in community organizations. A child is no longer confined to the local community from which to socialize and gain friends; literally, cyberspace eliminates all geographical barriers and frees a child to roam the world in search of that one, special "friend." Predators are also free to roam. The degree of difficulty for parents to monitor, or to simply meet, their child�s friends has increased tremendously. Preventative Tactics: A commonly employed tactic for protecting our children is to provide an adult chaperone as our children explore outside of their community. Now, children explore the wonders of the world by transporting themselves through cyberspace and they travel this world alone, without the care and protection of a chaperone. Physical Barriers. Historically, parents routinely lock their doors at home each night to keep intruders out; schools monitor persons who enter the campus. There are innumerable, vulnerable children who are isolated, lonely, and bored who constantly search the Internet for other children with whom they can make friends and chat. As these children search the web for friends so too the predator searches the web for prey. The predator will find the child, the child will find a "friend," and the outcome will be devastating. The effectiveness of currently employed physical barriers has been severely compromised. Predators lure and seduce their victims from within the privacy of the victim�s own home and operate in a world that is no longer constrained by physical limitations or geographical barriers. They stalk their prey through cyberspace and the ramifications of this universal, paradigm shift are staggering. When taken as a whole they can be overwhelming, perhaps paralyzing; but - if ignored - the ramifications will be devastating to our youth. To approach any entity of this magnitude and to effect change it is advisable to search for a common element, theme; or component against which a focused solution may be enjoined. Up to this point in my testimony, I have provided insight into the incredible paradigm shift that has occurred in our society and how this new paradigm directly affects the safety of our children. To illustrate the critical points, I mapped the ramifications of this paradigm shift to a common element in cyberspace: two-way communication (ie. chat room, instant messaging and email) The remainder of my testimony will focus on potential solutions that we as a society may embrace as our children extend into the farthest reach of cyberspace; as they interact virtually with persons throughout the world and as they evolve as "Net" citizens. As Judith F. Krug, Director of the American Library Association�s Office for Intellectual Freedom, stated in her testimony before the COPPA Commission on August 3, 2000: "The children of today will be Net citizens for the rest of their lives. They need to be taught the skills to cope in the virtual world just as they are taught skills to cope in the physical world. Children should be educated in appropriate increments and appropriate settings on how to avoid inappropriate Internet content, to report illegal or unsafe behavior and to engage in safe interaction online. Children who are not taught these skills are not only in danger as children in a virtual world, they also will grow into young adults, college students and an American workforce who are not capable of avoiding online fraud, Internet addictions and online stalking." It is imperative that any domain that engages in the attraction of kids/teens recognize how children actually use the Internet. It is equally important to promote the online social activities within the domain to support the academic strategies that teach children to make safe and wise choices about using the Internet and to take control of their online experiences: where they go, what they see, to whom they talk, and what they do. Our nations youth need to be given the tools to assist them in the acquisition of skills that will allow them to evaluate independently the information they are acquiring and exchanging online. By improving their "information and media literacy," they will become safe and responsible cyber citizens thus vitiating the "digital divide" that exists today between Youths Perception/Behavior regarding the Internet and those of their Parents. Currently, both businesses and governmental agencies have begun to embrace digital certificate technology as an electronic means for identifying participants in transactions that occur online. They leverage this technology as a method for verifying and authenticating a person�s electronic identity. The simplest way to view a digital certificate is as an electronic ID card. However, digital certificate technology is far from simple. Given that the intent of this testimony is to identify and express how technology can be used, rather than to define the intricacies of the technology, I will refer to digital certificate technology in the simplest terms possible for the reader to understand. A certification authority issues digital certificates. A certification authority can issue various levels of digital certificates that are dependent upon the amount of authentication that is required to ensure that the person who is applying for the digital certificate is in fact the person that he or she claims to be. In other words, to obtain a digital certificate a person must present proof of identity and the "level" of the certificate obtained depends upon the amount of proof required. Example: Level 1 certificate - any photo ID required Level 2 certificate - government issued photo ID required Level 3 certificate - government issued photo ID required plus passport or birth certificate Level 4 certificate - all requirements of Level 3 plus a background check Level 5 certificate - DNA How could digital certificate technology increase the safety of children who frequent a particular chat room or deploy two-way communications on the World Wide Web? A public- or private-sector chat room provider could engage digital certificate technology as a means for permitting or denying access to any given chat room or online area that allows two way communication. Conceivably, a chat room provider could institute a policy that only children under the age of 13 are allowed to participate in a particular chat room. The intent of this policy is to provide a safer online environment by making their "best effort" at excluding adults and potential pedophiles from the chat room. To enforce the "under the age of 13" policy, the chat provider would require all participants to login using a Level 3 digital certificate. Through the use of the digital certificate and the chat provider�s policy of restricting access, the children participating in this chat room have a lessened degree of risk than those children that participate in unrestricted chat rooms. This technology exists and i-SAFE, through the empowerment of our partnership with Verisign, has launched the first tool for our nation�s youth, using digital certification. The unprecedented Digital Credential program, "i-STIK" works to reduce the vulnerability of America�s students in all grades, K-12, with a unique digital credential that helps protect students as they engage in two way communications online. The Digital Credential is in the form of s small USB Token, which can be carried on a key chain and used at school, home; or on any computer with a USB port. The Digital Credential allows the kids and teens to enter an age centered chat room, or conduct two way communication, with confidence that everyone logged in will be who they say they are -- chatters actual ages and genders can be confirmed from the digital credential token. The digital credential helps to safeguard the integrity of the child�s online experience. The digital credential is distributed through the i-SAFE Safe School Program at the time of enrollment (with parental consent) helping confirm to parents that this program is offered through a trustworthy source. The schools database, which remains with the school, provides all the necessary information contained on the digital credential and validation is provided to assure that the token is valid at the time of usage. Neither i-SAFE or Verisign has access to this information. The identity of the student is never disclosed, just the students age and gender. The program allows for easy revocation of the credential when the student transfers, graduates or is not longer enrolled in the schools. I am showing you screen shots of how this new tool will be deployed and the interaction between the user and technology. We currently use digital certificates to execute online financial transactions. Businesses use this technology to protect their monetary assets. In September of 2005 there was a deployment of a pilot project that allowed parents to opt in to have their son/daughter be issued their first digital certificated which is being deployed nationwide as the " i-STIK.". Protecting our children is at the very heart of this hearing. Thank you Chairman Whitfield and Ranking Member Stupak for inviting me to testify before the Subcommittee on Oversight and Investigations. In my testimony, today, I addressed the paradigm shift that has occurred within our society due the advancements in web technologies and the advent of two way communications that could be deployed to facilitate the establishment of an enjoyable environment for our nations youth. I have touched upon one technological approach that i-SAFE is launching to empower our nations youth with a "tool" to help protect our children from falling victim to online predators. In conclusion, there is no single solution for protecting our children. However, the value of empowering our children - through "education" -- with the knowledge and critical-thinking skills that they need to be able to independently assess the every-day situations they will encounter, while online, cannot be overstressed. Children must be able to effectively protect themselves from cyber predators, to recognize potentially harmful or inappropriate actions, to actively disengage from negative behaviors or compromising situations, and to seek help when threatened. These lessons are learned. Education and empowerment are key. References: NTIA and Economics and Statistics Administration. A Nation Online: "How Americans Are Expanding Their Use of the Internet" published by the National Telecommunications and Information Administration, U.S. Department of Commerce, Economics, and Statistics Administration (02/02) www.ntia.doc.gov/ntiahome/dn/html/anationonline2.htm i-SAFE America student assessment data, 2005 Mr. Whitfield. Thank you, Ms. Schroeder, very much. And Ms. Sullivan you are testifying also. Is that correct? Ms. Sullivan. Yes. Mr. Whitfield. Well you are recognized for 5 minutes, Shannon Sullivan who is a Teen Angel with WiredSafety. Ms. Sullivan. Thank you, Mr. Chairman. I am Shannon Sullivan. I am 14 and I live in New Jersey. About a year and a half ago, my mom found me posting personal information on a social networking site. My photos, address, the school I attended was all up on myspace.com for 7 billion people to see. I was oblivious at the time that it was not just my friends looking at my page, it was anyone who wanted to. So we got into contact with Parry and she came to my school and she did a presentation on Teenangels and Internet safety and immediately my friends and I wanted to help. We realized that what we were doing was unsafe and was not going to help us in the long run. So we wanted to reach out and prevent other kids from doing what we did. So we went through a long training session. It takes about a year to become a Teen Angel and we are now Teenangels. We graduated after we became Teenangels. And now we go out to our high school and we form other chapters of the Teen Angel Program. And our main goal is to spread Teenangels to as many places as we can because the more people we have protecting kids, teens, and teaching parents and adults about the dangers of Internet, the safer the Internet will be. The Internet is everything nowadays. It is like your car. You know, you can go anyplace you want on the Internet and when it is used improperly, it can be a very scary place. So I saw that there was a big problem with Myspace.com so my friends and I wrote a guide, a Teenangels guide to Myspace and it is all in chat lingo. You probably did not understand it, but it helped a lot of kids because it is a lot easier for teens to understand what you are saying when a teen is saying it to you. You know you do not want to listen to your parents, you know, oh, do not go with that, do not go on the Internet after 10:00. But if your friend is telling you how to be safe on the Internet, you will listen a lot more. I really wanted to become a Teen Angel because I thought it was very important for me to reach out to those teens who are oblivious as I once was. A lot of teens I see are posting very explicit pictures of themselves on the Internet and they do not realize how that can hurt them when they make goals or when they apply for college. Something they did when they were 12 can come back and bite them. And it is very scary so if we reach out to them now, then things will be different in the future. It is amazing how much Teenangels has impacted my life and other people�s lives. As Parry said, I was nominated and honored by Teen People as one of the top 20 teens who change the world. And when I met the other teens who had changed the world, it was an amazing experience because I realized that things I do just to help one person be safer on the Internet can help a lot more people. YFly is a safe social networking site. I do have a Yfly. It is basically like any other social networking site except it is only for 13 through 18-year-olds. It is a step closer to preventing kids from getting in trouble on the Internet. As Teenangels, we work with many corporations such as AOL, Disney, Marvel Comics, Microsoft, Yahoo!, and Google, and we help them make the Internet and other interactive games and cell phones, make them safer. We are all unpaid volunteers and we do this from the bottom of our heart. We want to help other teens. We are not just teens who want to make a difference, we are teens who make a difference. Thank you. [The prepared statement of Shannon Sullivan follows:] Prepared Statement of Shannon Sullivan, Teen Angel, WiredSafety Opening Statement: Thank you for inviting me here today to share information about Teenangels, WiredSafety.org and how we can protect everyone online. My name is Shannon Sullivan, and I am 14 years old from New Jersey. I have been a Teenangel for one year. I became one after my mother found out I had a MySpace. I have recently been honored by Teen People Magazine as a representative of Teenangels for our role in helping change the world. That is a big challenge. But it is one that teens can live up to. Teenangels are more than teens who learn how to use the Internet and other interactive technologies more safely. They are experts who advise many leading corporations. They have become well-known for their special insight into technology from a teen�s perspective. Teenangels now advise major corporations on Internet and technology uses, including Disney, the CTIA, Microsoft, AOL, Yahoo!, Marvel and others. They assist law enforcement agencies in designing more effective undercover investigation methods. They work with large industry groups, such as the Motion Picture Association of America, in building educational programs and public service messages. They have helped create safer interactive gaming technologies, safer cell phone features and more secure social networking programs. They have hosted briefings at the House of Parliament, conducted training for law enforcement agencies and written articles for leading magazines. They do presentations within their community for parents, students and senior citizens on safe use of the Internet and new interactive technologies. They spend a great deal of time on Internet sexual predators issues, anti-piracy and cyberbullying. We teach good cybercitizenship and responsible technology use, not only safety and privacy. Teenangels are 13-18 year olds who train in all aspects of Internet and interactive technology safety, security and responsible use. (Tweenangels is the younger and lighter version of Teenangels, comprised of 9 to 12 year olds.) Once we are trained by Parry Aftab, leading law enforcement agencies and industry leaders around the world, these special teen experts create their own programs to teach safe and responsible technology use. Some Teenangels are technological experts, creating animations, Flash applications, videos and computer games that help deliver their messages. Others concentrate on law and policy. Many have good public speaking, research or writing skills. The best thing about Teenangels is that it helps young people develop their own talents and help others at the same time. We challenge teens and preteens, "Think you know more than most adults about the Internet? Share what you know, and learn more from the experts. Be part of the solution. Be a Teenangel!" It is important that we teach young people that being safe isn�t lame. That it�s not cool to pretend you were out drinking all weekend, or to pose in your bra online. Many teens and preteens are lying about their ages to use social networking websites. And when they are there, they are often doing high risk things. But, it�s important that parents understand that most teens and preteens are using the technology safely and responsibly. We just need to address them in our own language. Recently, Teenangels began working with Nick Lachey. When Parry wasn�t able to attend a luncheon with Teen People introducing me (she was in Spain launching her new book), Nick came instead. He learned that Internet sexual predators were using his name to lure teens into sending sexual pics online. Since he first met Parry he has donated his time to helping us keep kids safer. He is even helping us with public service announcements and a fun new animated educational series we are producing using Teenangels to teach safer and more responsible technology use. Teenangels is now working with Nick�s new site, YFly.com, to help create a safer teen social networking site. We helped create Don�t Be Stupid to teach teens that engaging in reckless behavior online is stupid, not cool. As Teenangels, we have the mission of helping make the Internet safer. We need your help to do that. First I would like to thank you for helping us by providing funding. We just received an earmark from Congress, through the Department of Justice, for $50,000. Since Teenangels hold bake sales and wash cars to raise money for our programs, this will change our world. We cannot thank you enough! Next, I would like to share our wish list and thoughts about what we can all do to help keep young people safer online..... Thank you for your time and caring enough to hold this hearing. And thank you for taking the time to listen to teens. It�s nice to be included. And I will remember this day forever. On behalf of all my fellow Teenangels and Tweenangels, thank you. Shannon Sullivan, age 14 Teenangels.org Appendixes Appendix A: (from Teenangels.org) Safety Tips From the Mouths of Teenangels ������������������� ������������������� (The Real Experts)... While we have more extensive safety tip lists in Parry�s book, here is a summarized version of the tips we thought were most important! As Teenangels, safety is our biggest concern. So here are some tips and ideas that we and others have to share. Some of the best suggestions come from TEENS, just like you! If you have a safety tip or story of something that has happened to you and how you handled it, please send it to us. We would love to hear from you! Email�Teenangels. Thoughts for Parents, Teens & Kids from the Teenangels Parents... Don�t be afraid of the Internet. It�s an extremely useful tool & can�t be dismissed because it is new & sometimes confusing. The Internet can be an excellent way for you & your children to bond & share a common interest. Be open with your kids & get involved. Most of all, learn all that you can about being safe, keeping your child safe, & taking advantage of the Internet�s myriad uses. Tell your children not to be afraid to come to you with problems of any kind. Teenagers...Although the Internet is a great way to meet new people, do research, and chat with friends, there are dangers. Be aware of these dangers. Always use common sense. Although you may think that bad things won�t happen to you, they most certainly can. Be open with your parents about what you do online. Don�t meet people offline that you met online! Make sure a site is secure and trustworthy before giving in your personal information. Obey the law and don�t steal music, motion pictures and software! Balance the time you spend online and offline. Remember your friends in real life and don�t take them for granted. Go outside & enjoy life beyond cyberspace. Kids... While it�s great to chat with people in kid-safe chat rooms online, you should spend time with friends in real life. School, family, & friends should always come before the Internet. Always tell your parents about what you do online. Let them sit with you, & teach them about the Internet. When they do sit with you, don�t get mad at them. Just know they care about you & don�t want to see you hurt in any way. Always remember that people online don�t always tell the truth. Don�t give out a lot of information about yourself. If anything bad ever happens to you on the Internet, always tell your parents or someone you trust. Always remember that it�s never your fault. Appendix B: Don�t Be Stupid! For Teens: Don�t Be Stupid! What you need to know about cyberdating and staying safe The Downers: You never really know who someone is online. They may sound hot and their pic may be even hotter, but they could be someone you don�t expect. They could be your little brother�s snotty 12-year old friends having fun at your expense. Or three 15-year old mean girls posing as a heart throb to set you up for humiliation. Or they could be some 47 year old pervert. Either way, who needs it? And even if it is a cute 16-year old guy or girl, there is no guarantee that when things are over, that sexy pic you shared with them won�t end up on some website or profile somewhere. Or they could use the password you shared with them to change your profile, pose as you and harass your friends or even lock you out of your own account. Or they could cyberbully, flame, cyber-harass or cyberstalk you or your friends-When you breakup, all bets are off! The Buck Stops Here...You Need to Protect Yourself Online Smart teens have been fooled by slimy adults posing as teens. There is no safe way to meet someone you only know online, (with maybe from a few phone calls to help), in RL. If you�re thinking about meeting someone, think again. Talk to your friends. Check out Katiesplace.org and learn about how others have been hurt by adults posing as teens. Smart teens like you. Don�t do it! We can�t emphasize this enough! But, we also know that if you are convinced that this is a cute 16 year old boy or girl is the love of your life and destined for you from birth, you may ignore this advice and plan on meeting them in RL. If you are intent on taking this risk, do what you can to minimize it. Make sure you follow these Don�t Be Stupid tips: 1. Don�t disclose too much personal info. Start by assuming that the person on the other end is a predator. That means no full names, street addresses, RL schedules or telephone numbers that can be reverse searched (check it out online or where you work, or similar info about your friends that can be used to find you offline. It�s always a good idea to use a disposable e-mail address or IM account, something you set up just for this and that you can drop if things start going downhill (like yahoo, hotmail or MSN.) Make sure that this new screen name doesn�t give away any information about who you are in RL either (Tiff1991@[fill in the blank]). 2. Play detective. Photos can give away more information than you ever intended. Things in the background of the photo, like the license plate on your car, your house, the store where you work, the school or camp sweatshirt you�re wearing or a pic with you in front of your school can be risky. So can photos posted by your friends. While you may be very careful about what you are sharing online, they may not be as careful. If you link to their profile and haven�t told anyone where you live, but they post their best friends (including you), everyone can now figure out what town you live in and where you go to school. They just need to cross-reference a bit. The same thing happens with everything you or your friends post. Look over your profile and the profile of your friends. If you were a detective for Law & Order, could you find yourself in RL? If so, change whatever is giving too many clues away. Password protect it and guard your password, and ask your friends to do the same. Start a rule - never post info about a friend or their pic without asking first. 3. Say Cheese! There are three issues about pics online - posting something you�ll regret, shooting a lame pic or posting a pic that can be abused or misused by others. Sometimes to get attention, teens pose in provocative ways or snap a pic when they are doing things their parents would not want to see. Unfortunately, parents do see them. And so do principals and predators (and shortly college admission staff). We all know that lame "MySpace" pose - bad lighting, cheeks sucked in, lips pursed, head tilted up, with a flash in the mirror. :-) Is that really how you want to be remembered? Putting your best foot forward and using a good pic or a fun one is much better than doing the "I am so hot I can�t stand it" pose. Boys posing shirtless and trying to make their pecs look bigger by crossing their arms underneath them, or girls posing in a bikini top (or worse) or very low cut pants will get you attention. But not the attention you may want. And cyberharassment where an innocent G-rated pic is manipulated and used to make you look bad or to morph your head on someone else�s naked body is commonplace. You can avoid that by using photo-editing software to pixilate or blur the image, turn it into a sketch or cartoon, sepia or black and white. This makes your photos harder to abuse and less attractive to the harasser or a predator. Our new Best Food Forward (BFF) tips teach you how to make the impression you want to make, without being lame or stupid. You can read about them at Teenangels.org or at our Don�t Be Stupid tips at YFly.com. These will help you come across the way you want to online. 4. Look for the red flags. Beware of others online who: ask too many questions post things that don�t make sense move too fast promise you ridiculous things (if it seems too good to be true, it�s not true!) like everything that you like, exactly the way you like it know too much about you engage in cybersex just don�t feel right or make you uncomfortable are evasive can�t keep their story straight initiate sexual conversation or innuendo don�t know the things most teens know (just know the experienced predators make it their business to know these things) pressure you to send sexy pics or meet in RL give you the creeps 5. ThinkB4UClick. It�s so easy to do things online that you would never do in RL. You don�t have to look the other person in the eye. No one else is there to tell you to cool it. You are stronger, smarter, more empowered and braver online. You may not like your coach, principal or former best friend or boy or girl friend. You take their pic and morph it onto someone else�s naked body. You post sex ads using their name and contact info. Maybe you take a pic of them with your cell phone in a locker room, bathroom, at a slumber party or in the changing room at the Gap. You build a profile telling everyone what a slut they are, or post these pics online anonymously. Or you send sexual images of yourself to someone you like, thinking they will want to go out with you if they see how sexy you are. They don�t, but share the pic with their fifty nearest and dearest friends - who show it to their friends and so on and so forth.... You think no one can find you, trace you or figure out who you are (you�re wrong!). There is nothing between your impulse and your click...no time to think about it, no time to calm down. No time to use the "filter between your ears." You are also typing fast and aren�t proofreading your text-messages, IM or posts, and often send it to the wrong person on your buddy list or misspell their screen name. You may forget to type in "jk" or the word "not." You may find yourself in trouble without knowing why. Think R-E-S-P-E-C-T! (Now do it like Aretha, with lots of style!) Taking that extra second to make sure you send it to the right person, aren�t misunderstood and are willing to be accountable for what you are doing and saying online is crucial. It will save you lots of grief later! Appendix C For Teens: Finding Love in all the Cyberplaces...Don�t Be Stupid!If you decide to meet someone in-person, and ignore everything we taught you -- at least follow these tips and trust your gut. If something feels wrong, get out of there and report it. And remember that about 30% of the victims are boys. They just don�t report it. So be careful!1. Go public. Find out what they will be wearing and arrange for a place to meet. Then get there early and stake things out. The idea is to spot them before they spot you. Make sure that you meet in a well-lighted public place. It should be big and public enough so you can he help if you needed it, but not so big, crowded and noisy that you wouldn�t be heard or couldn�t get help. Don�t meet in an amusement park, where screaming is part of the scenery. A mall is a good choice, but sit back and watch and see who shows up. If they are not what was promised, run...do not walk...home, to the security office or to the local police department. Make sure someone calls the police. Never meet at your place or theirs. Never get in a car with them. Go with lots of friends (preferably Sumo wrestlers). Ignoring these tips could cost you your life. Really. Several smart teens have been killed in the US over the last four years by people they met online. Don�t become a victim.2. Bring backup. If you are going to meet, bring a lots of friends (preferably big ones :-)), and someone where you are going. Leave information about the person you are meeting. The bad guys will try and get you to erase the e-mails or bring your laptop or hard drive with you, so they can destroy the evidence. Best case scenario, trust your parents or another adult family member. This has saved more than one teen from being kidnapped, raped or killed. 3. Find your own ride. Don�t accept a ride from them or offer a ride to them...even if they appear to be cute and cuddly. Stay in control of where you go and how you are going to get there and back. Bring a cell phone and make sure it�s charged. Have others check in on you too. 4. Take it slow. Even if that�s not your style, make it your style for any cyberdating situations. Just because they have told you their favorite bands, movies and food doesn�t mean you have any idea who they really are. Treat it like a first date. It will feel weird at first. You feel closer than you would on a first date. They will know lots of things about you that you have shared. Often very personal things. But start from scratch. Don�t move faster than you are comfortable doing and don�t feel pressured. Keep others around for awhile as you get to know each other and trust your instincts. 5. Rat on the Creep! Your parents will kill you if they found out you met someone from the Internet in RL. But if you don�t report it to someone, this creep may kill some teen in reality! Most of the time when police arrest an Internet sexual predator, they find lots of e-mails on their computer threatening to call the police if they bothered the teen one more time. Had someone actually called the police, another teen might have been saved. Even if you won�t tell your parents, find a way to report the creep. Check out Katiesplace.org for ways you can do that and more safety tips and real stories about real teens. copyright 2006, Parry Aftab, all rights reserved. For permission to reprint this, contact Parry at [email protected]. Appendix D For Teens: Finding a Better Faith A fictional account I thought I had met my dream guy. I really did. Now, I see where my mistake was, sure. It was in believing what I saw in the movies and on television. Believing what I read in magazines about true love and soul mates. I believed in the Madison Avenue picture of love, romance and happily ever after, and glossy views of happiness and popularity. I was taught these things my whole life by my everyone I knew and from books, movies, and songs. I was told that if I were good enough, thin enough, charming enough, pretty enough, and exciting enough my life would be fulfilling, happy and exciting. But no one ever tells you how dangerous this blind belief can be. When I was a freshman in high school, I was miserable. I lived in one of those towns where the same kids are in your grade all the way through school, so everyone gets to know each other pretty well. They knew me in middle school when I had acne and bad clothing and was shy and self-conscious. And then I grew out of that, but no one much noticed. I know I was pretty in the year or two before I died because people started noticing me -- people who didn�t go to my school, who didn�t remember how I used to be awkward. And it felt good. I felt different and happy and hopeful. I thought to myself that maybe now I would have a boyfriend. Maybe he just couldn�t find me before because I was shy and awkward, and it�ll definitely happen now that I�m in high school and all the older boys can see how pretty I had become in the last few years. But it didn�t. No one looked at me any differently than they ever had and I got depressed. I thought to myself that high school might just be middle school again "that maybe nothing would be different and I would have to go through three more years of being lonely and waiting until something better happened. For a while, I got resigned myself to this fate and then something changed and I got up one morning and said no. I think I said it out loud, actually, it�s kind of funny to think of now. I decided that I would say no to this fate" that I wouldn�t be alone and I wouldn�t be miserable -- not anymore. I decided that I would meet someone and I would have a boyfriend within a month or two "do or die" that I would take my life into my own hands. And that I did. I started going online and searching for people to talk to people who would be more mature and would understand me. I sorted through people�s profiles on Friendster and Xanga.com and set up my own. And then I met someone, and it was just as easy as I ever dreamed it could be. We IMed for hours, about everything and I felt, for the first time, that someone really understood me. Sounds pretty silly now. We talked about our families, our dreams, books that had changed us everything. I thought I was falling in love. I knew I had found "the one." I was the lucky one, and had found my soul mate early. When he asked me if I wanted to meet, at first I said no, that I didn�t know him well enough. He didn�t push it, and instead, we started talking on the phone. He had a very deep voice, which didn�t surprise me because he said he was 18, but it probably should have. Anyway, a month later he said he had to meet me. He said he couldn�t� stand it anymore "that he loved me" and said that if I wouldn�t meet him he would come find me because if he didn�t see me he�d die. In the end, it didn�t quite work that way, though. I realized that my parents would kill me if a random guy showed up at the house looking for me. I couldn�t have that happen, so I agreed to meet him. It was stupid, I know, but I was told more time than one that it�s okay to do stupid things when you�re in love. I met him at the mall, in the food court. He was 37, not 18. I started crying and told him that he lied to me and I never wanted to see him again. I felt betrayed, and confused. He handed me the rose he had brought and a book of poems. I just stared at them, having problems separating the 18 year old I knew so well, form this man standing in front of me with tears rolling down his cheeks. While he cried quietly, he told me that he loved me so much -- that he knew I would never date him if I knew how old he was, which is true. I worked up the courage to leave. But he started making a big scene -- pleading with me not to leave him. Telling me how much he loved and appreciated me, when no one else did. I was afraid someone I knew or who my family knew might see so I agreed -- his last request -- to go outside to talk. He said he had a present for me in his car, and could he just give it to me. I said ok, probably the stupidest thing anyone�s ever done. He clamped his hand over my mouth so no one could hear the screams. Then he pushed me in his car, throwing a blanket over me and holding me down so no one could see. He poured some smelly chemical over the blanket near my face. At first I held my breath, but finally had to take a breath. I knew I was in trouble, and felt dizzy immediately. I must have passed out. I don�t know how long it was before I woke up, and realized this wasn�t a horrible dream. It was real. He took me someplace in the woods, dragged me from the car and tied me up. He beat me, while he raped me, crying and telling me he loved me the whole time. I felt like my insides were being ripped out. That was how I lost my virginity. And my innocence. And more. I still feel like its all my fault. Why did I believe him? Why did I believe that anybody normal could be that into me? Even after all this time, the only answer I can come up with is that I had believed in make-believe. If I hadn�t wanted to fall in love so badly, if I hadn�t needed someone wanting me to validate how I felt about myself, I wouldn�t have let my judgment get clouded. I would probably be alone in my room, depressed, but I�d be better off than I am now. So believe in happily ever after, but reality too. It�s okay to be hopeful because life would be too hard without it. But don�t let it cloud your better judgment. Have faith in yourself and don�t waste it on people who may or may not love you or save you or complete you. And don�t trust people � at least for a while, at least till you know who they really are and what they are capable of. And never just because you talk with them online and on the phone and think you know them. Love and loneliness don�t excuse stupid behavior, and they certainly don�t buy you another chance to fix it. I will never know what could have happened in my life � who I could have met or what I might have done, because he killed me before leaving my body for some hikers to find weeks later. I was almost unrecognizable. My parents had to identify me, and the hair, clothes and complexion I worked so hard to make perfect weren�t even identifiable anymore. I was ashamed that I had done this to my parents, and my little sister, and most of all to myself. My friends didn�t envy my "kewl" new life. They, instead, mourned me, and even my dearest friends talked about how "stupid" I was. My little sister couldn�t stop sobbing. She held my hand, and clung to the casket when they tried to take it out of the church. I tried to hold her hand back, but nothing happened. I wanted to reach out and comfort her. But from now on, she wouldn�t have a big sister to do that anymore. She couldn�t climb into my bed and tell me about her kitten and why she wanted to be "just like me" when she grew up. I hope she wouldn�t be just like me. I hope she is smarter than I was, and not as trusting. Not as naive I wish I had a second chance. I wish I could warn others about this kind of thing. But I can�t. I�m dead. This "love of my life", my "soul mate" didn�t only rob me of my innocence and any chance at happiness -- I�ll never know if I could have made it. I never got a fair shot. If you�re in the same situation I was in, I can�t say if it�ll ever get better, or if you�ll ever be successful, or rich, or pretty, or lose the weight, or get the guy, but I can say you better hang around and try, because I�d do just about anything for the second chance. A chance to find someone real. A chance to know if I could have been happy. Appendix E About Teenangels from a school technology director in Wisconsin: About 5 years ago, I got a phone call from one of the parents in our school district asking that her daughter�s Internet and email privileges be revoked. She decided that her daughter would no longer be allowed to be part of the "Cyber World." When I spoke more with this parent, I learned that the daughter had been harassed online. She had given out personal information and was now receiving inappropriate emails and phone calls at her home. I immediately looked for resources online to help this family. The Internet is such an incredible resource -- wanted to find a way to convince the family that education regarding Internet use was a better solution than instituting a complete ban for their high school daughter. As a result of my searches, I happened on information about Parry -- I contacted her and she agreed to speak at a school assembly with a parent information meeting to follow. After Parry�s talk, I literally had a line of students in my office -- these students wanted to help other teens to be safe online. From that group, our TeenAngel chapter was started. The Teens devoted an entire Spring Break to intensive training and the rest is history. Our TeenAngel chapter works to educate Teens (and parents) about online safety. We have a "Tech" division that works on programming and helps community members with problems ranging from P.C. trouble to instructions on virus removal. Our teens are highly motivated and highly technologically savvy. Among other things, our group has attended the Wired Kids Summit in Washington D.C. working with legislators and corporate executives to help make the Internet a safer place for kids. One of our teens was featured on "The John Walsh Show" in their "Hometown Hero" segment. Locally, our teens have presented to numerous school, church, and parent groups as well as presented at state conferences focusing on issues relevant to Teens. This is a great program. In our high school, it has become a place and program for our "Tech" guys to devote their energy and talent. Appendix F From Katiesplace.org, written by one of our Teenangels who wants to teach others how to avoid being victimized in the way she had been. When Your Mentor Becomes Your Tormentor - Alicia�s Story You never notice yourself growing. It�s so gradual, so smooth a process that the daily or even monthly changes are simply undetectable. Mirrors don�t help -- its only in comparing photographs, in seeing yourself at different stages, that one can notice the differences. My relationship online with Mac grew just that slowly. When we were first introduced online, he was courteous and interested and subtle, none of those childish IMs which are so common, among young teens, flaunting their new-found sexuality like so many new toys. He didn�t try to have cyber sex with me, didn�t make crude comments or ask me to go on the webcam. It doesn�t work like that. He was thoughtful and gentle and nice, and, of course, entirely deceptive, and so we became friends. Just friends. And it was all very innocent - for a time. It was in the slowest, least noticeable way that he eased me into a more intimate relationship online. He was an expert, but, of course, I didn�t know that at the time. The way the conversation moved into more personal territory never felt threatening because it moved so slowly. We would talk for a few minutes more each day, about something a little more personal each day, and some days we could talk about nothing personal at all. He never pushed, never insisted and so convinced me that I wanted to tell him personal things, or �parrot� those things that he so wanted to hear from me. And I did. So we talked about everything -- not just the sexual stuff. He was interested in me, as a person -- my thoughts, my goals, my relationships with friends and family members. He gave me adult advice and always took my side. He was my advocate, unconditionally, at a time in my early teenage life where that was just what I needed. School was: well it was school, mean girls and nasty boys and everyone trying to be all that they�re not- And my family and I, were very close, but we didn�t always see eye-to eye about everything, sometimes they just seemed to think that I was still a child. But there was always Mac, and I could count on him to see things my way Always online. Always ready to talk. Always on my side. It was the most comforting thing imaginable. Soon enough, he wasn�t just someone that I could trust, he became the someone I needed � I began to believe that he was the only one I could depend on to understand the real me, which is exactly what he wanted, of course. Somehow, in this process, this grooming of me, he had changed me, had destroyed my ability to reason. Imagine, I walked out the door, right out of my own front door into the darkest iciest winter night, with no money and no coat, to meet a madman who I thought was my best friend. Was I crazy? No. Was I duped? Entirely. When I review it all, comparing my mental photographs of our relationship at different times, I think, how could it have happened? How could my sanity, my reason, my mental state have decayed like that -- how did he make me shrink away to nothing? How could I have gone from being a smart, sane girl having casual conversations with an online friend to doing something I would have sworn I could never do "who" shy timid little me?--never!!!!- meeting a total stranger in the dark, cold night -- leaving home in the middle of a happy, loving, family holiday meal? My only answer is that I wasn�t crazy - I was just under the spell of an incredibly skillful manipulator who knew that slow and steady wins the race -- or at least the hearts of young girls. He took me apart and put me back together and bit by bit, day by day, byte by byte, he became the focus of my life and the one who understood me best. Why wouldn�t I want to meet someone like that IRL? It felt right. And yet it was so wrong. The moment he persuaded me into the car, I immediately knew that I was in trouble. I knew. I had this terrible sinking feeling in the pit of my stomach as we drove down my street, out of my neighborhood, and then, onto the turnpike. Trapped "Quiet" he said. "Let�s keep the trunk empty." I kept my eyes cast down, stealing quick furtive glances up at him from the corners of my eyes. Somehow, I instinctively knew that he was like a savage beast, and that I had only to make full eye contact to engage his anger, to force him to attack. I stared down at his shoes as we drove. At his pants, his socks, I studied them, eyes cast down. I could describe it all to you today -- that image, that feeling, trapped -- t will haunt me forever. Those hours sitting there, the waiting. What terrible fate awaited me when we arrived at his home? I never envisioned anything as terrible as the reality. When we arrived at his home it was -- worse than even I had imagined it could be. It was way worse than a bad after-school movie. It was Friday the 13th and Texas- Chainsaw-Massacre! And he had it planned -- days before, maybe months before, maybe the first time we ever spoke. I was stripped, tortured, beaten. --. Raped. Those words still stick to the roof of my mouth and are glued thickly to my tongue. I listened through the windows to cars passing by, to the voices of neighboring families going out for lunch and to the mall and coming home again at night, yet there I remained, collar around my neck, chained to a post, naked. This was me at age 13. Waiting for death. How would he do it? Would he stab me, would I bleed to death, my blood adding yet another stain to the filthy carpet-- Would he beat me to death with whips and fists, chained helpless, unable to defend myself? Into this morbid fantasy, unbidden, a fairy tale that my mother had read to me while tucked warm and safe into my silken little �blankie� kept flashing into my mind. The one of an Arabian slave girl held captive by her master. The tale unfolds that at the moment her stories ceased to entertain him, to amuse him - then he would kill her, with this in mind, the helpless slave fought for her life with the only weapon she had - her mind... And she became my inspiration. I would persevere, I would not die. My captor would not win this battle. I knew that my family loved me, that they would move heaven and earth to find me. But I had to stay alive until they did. So I struggled, silently, determined to win back the life I had left behind. My life that somehow had seemed to become so empty, so sad� why? I understood now, in those cold hours alone, waiting for the monster�s return, it all began to come clear. I wanted my life back! I wanted to feel my mom�s gentle kisses good-night and my dad�s crushing hugs, I wanted to run outside into the sun, to add my voice to the other happy children�s, far, far away from the dark coldness of his dungeon. I wanted to experience anything-- anything - except what was happening to me. I desperately wanted to live! So I waited it out. I prayed. It might not seem, to you, like the most courageous thing to do -- I didn�t fight him, didn�t engage his anger. But, somehow, I knew that he would kill me, throw me away like trash in some cold shallow grave if I resisted anymore. He enjoyed my pain. So, I just wasn�t there I left -- mentally anyway. This wasn�t happening to me. I escaped into my head and tried desperately to hang on to my sanity. It took my whole being to merely breathe. One breath at a time I waited for my death. I knew that one wrong move would cost me my life and so I simply waited, telling myself "today, yeah today they�ll find me "rescue me," convincing myself that this would not be how it all ends, that my parents would not find their only daughter�s dead and battered body in this evil man�s filthy house. I couldn�t, I wouldn�t, let it end that way. So I resolved to live. Breath by breath. Moment by moment. And I did. I made it through, a miracle of survival, when so many other girls have been less fortunate. And I can�t say if it was faith, or luck, or personal resolve that saved me. And it doesn�t really matter. I truly feel that something greater than myself has directed me. I am alive. I was given the second chance that so many others had been denied. I promised myself in those dark and painful days and endless nights that if I were spared, if I were given a second chance at life, I would share my horror, to teach others - maybe you - how to avoid becoming his next victim. I would help them understand that the mentor you thought you found online might become the tormenter who steals your heart, your innocence and your faith in mankind. And ultimately, your life".. Mac failed. While the emotional and physical scars may last a lifetime, he didn�t shake my faith in myself or in mankind. He may have stolen days, weeks, months, he may have taken my childhood, but the rest of my life is mine. And I have reclaimed it. I will not allow him to torment me anymore. Only I have the power to control my future. I refuse to be defined by his betrayal of my trust, by his cruel sadistic acts or by those dark days, however devastating they may have been. I have a mission and an important role to play. I want to inspire others to move on, past their exploitation, to find their own life mission. I was spared and given a second chance. And I don�t intend to waste it. I will continue to speak to young people and dedicate my life to helping catch criminals, like Mac. I am also helping, here, to build KatiesPlace.org and as a volunteer with WiredSafety.org and others. So, please don�t remember me as the girl who was torn, twisted, confused, lured abducted and abused. Remember me for what I will accomplish. Please don�t let this tragedy define me. I am so much more than that. And so are you. Join me in this mission. Together we can change the world, one child, and one life at a time. You can read about miraculous rescues and the dedicated and courageous men and woman responsible for bringing victimized children to safety here at KatiesPlace.org. And you can e-mail me through this site. Please, be safe "be aware" Mr. Whitfield. Well thank you very much Ms. Sullivan, we appreciate your testimony and look forward to asking you some questions later on. Mr. Sallam, you are recognized for 5 minutes for your opening statement and thanks for being with us today. Mr. Sallam. Thank you, sir. As you know, my name is Moni Sallam. I am a ninth grader at Riverdale High School in Howard County. The Internet has opened up a new world of opportunity and dangers for kids today. On the plus side, we have instant access to any information, music, cultures, and opportunities that probably would have taken you months to access if at all when you were a kid. On the negative side, kids can talk to anyone they know or do not know at any time of the day or night. Kids are contacted on a daily basis by people they do not know. School bullies do not just find you at recess, they taunt you at any time of the day or night and they get others to join in too. The major problem is that due to a lack of education, kids make bad decisions while online. Kids give out their personal information, they share pictures of themselves with people they do not know, and they download music illegally. That is the reality of kids today. Online predators know this and use the Internet to lure kids to danger. It is all about education. Just like other safety issues like bike and water safety, education is the only way to help kids behave responsibly online. A perfect example is if you ask kids or teens if they would ever get into a car with a stranger, probably 100 percent of them would say no. The reason is that we are told from the time we are old enough to play outside never to talk to strangers, never to get near a car with strangers. Kids know to look both ways before crossing the street. They know to wear helmets when riding a bike because we are taught these things from an early age. On the other hand, if you ask kids or teens if they would ever meet a stranger in person who they met online, an alarming number of them would say they saw nothing wrong with it. Although informed people know that the Internet is a new way predators lure kids to danger and there are plenty of examples of tragedies that have happened to kids who met predators online. In my county alone, predators have been arrested for pretending to meet kids and trying to lure other kids to meet them. This is happening across the Nation. Internet safety education from an early age is required to change attitudes and behavior. Internet safety education is key to changing if you are going to be online. That is why i-SAFE is doing an amazing job. i-SAFE empowers kids like me with the decision tools we need to keep us safe and act responsibly online. Thank you. Mr. Whitfield. Thank you, Mr. Sallam. How old are you by the way? Mr. Sallam. I am 14. Mr. Whitfield. Oh, yeah. And Ms. Sullivan, you have graduated from high school or-- Ms. Sullivan. No, from grammar school. I am 14 also. Mr. Whitfield. You are 14. So having-- Ms. Aftab. Very articulate. Mr. Whitfield. Yeah, I almost felt guilty asking them how old they were after our subject matter here today, but how did you two come in contact with WiredSafety and i-SAFE? Ms. Sullivan, how did you become aware of WireSafety? Ms. Sullivan. Well my mom is a computer teacher at the grammar school I attended and she got in contact with Parry and Parry came to my school to do a presentation on Internet safety because a lot of my friends were posting personal information on the Internet using Myspace.com. So once she came, she told us very frightening stories about kids who listed personal information, who talked to strangers on the Internet, and she made us aware of the dangers that we were putting ourselves in. Mr. Whitfield. So were you shocked from what she said? Ms. Sullivan. I was sitting on the edge of my seat. Mr. Whitfield. Were you? Ms. Sullivan. Yes. Mr. Whitfield. Do you feel like or do you or some of your friends maybe had been contacted by predators but you had not really proceeded with them or-- Ms. Sullivan. None of my friends have but I have many stories of people who have so I think that is why it is our job to aware these teens of what they are doing and how to keep themselves safe. Mr. Whitfield. And did you make contact on the Internet with people you really did not know or-- Ms. Sullivan. No, I only used the Internet to talk to my friends. Mr. Whitfield. Okay. Mr. Sallam, what about you? How did you become aware of i-SAFE? Mr. Sallam. I first became aware of i-SAFE when I was in seventh grade. I was watching TV actually and I happened to come across an i-SAFE professional development program just like Ms. Schroeder talked about in her presentation. And I watched it and I just realized that this is a huge problem and it could affect people that I know. And I was actually first worried about how my sister would be reacted by this big issue. Mr. Whitfield. Do you think that any of your friends or classmates have viewed child pornography online? Mr. Sallam. No, sir, I do not think. Mr. Whitfield. You do not. Ms. Schroeder, I know that you all have been quite successful in Kentucky with these programs that you have talked about and it is my--is it--am I correct that you are teaching this program now in every school district in Kentucky or is that right? Ms. Schroeder. Yes. Mr. Whitfield. Now how were you able to accomplish that and how many other States do you teach in every school district in the State? Ms. Schroeder. What we did this past year was Microsoft actually provided funding for us and we took our professional development online so we created I-learnonline and they provided funding for the professional development for educators, as well as the youth for the mentor side and they are just now providing funding for the parents, as well as for 50 plus. So what happens is, the way that we are able to do this now is that educators on their own can actually go in and review our module. And when they are through completing the module, they get professional development credit and then a gateway opens up and they have access to all the curriculum and the activities, the workbooks for the kids electronically. Mr. Whitfield. Well we thank you for the great job you are doing in Kentucky and elsewhere and how old is i-SAFE? How old is it? Ms. Schroeder. We were formed in 1998. Mr. Whitfield. Ninety-eight, okay. And Ms. Aftab, how do you identify students to be Teenangels? How do you go about that? Ms. Aftab. The Teenangels identify themselves. Mr. Whitfield. Okay. Ms. Aftab. They share a belief that every child has something to offer. And when they see me on television, if I do Dateline or Good Morning America, or something often the kids will see that. We are in magazines. I do eight interviews a day sometimes. And so when kids see us or they see us in person or they want to make a difference, they will reach out to us. The program is free along with everything else we do. We who run it are also unpaid volunteers. I have one of them from Stone Ridge School here in Bethesda, Maryland, who is sitting back there with one of her Teenangels. The training is we email it out to them and help them do it and the kids come to us. And what we find is some kids are really great at public speaking. Others may be shy but they are terrific at research. And part of Teenangels, Teenangels is a little different from I-Mentor in that the kids who are Teenangels have to undergo extensive training and independent research. They have actually developed new product. They have to go out and research new interactive devices. They developed safer cell phone settings that are now being adopted by Disney. They have come up with safer interactive gaming for X-Box Live. So when they learn and we have all of the experts teaching them about everything they need to know, they develop things. The Motion Picture Association of America honored one of my Teenangels who came up with a 30 second PSA--he is 15--called use it and lose it. It�s about bringing your video camera into a movie theater and what is going to happen. This 15-year-old had social anxiety disorder and his mother came to me and asked if he could be a Teenangel. And I said well we work in chapters generally but she asked me if would make an exception and he has done extraordinary things. And a young girl from Pittsburgh who is 13 who had met an Internet sexual predator in their live, who was rescued 4 days later by the FBI where she was found chained to the floor, came to us and she wanted to be a Teenangel too. So the kids who come to us and want to make a difference, we give them a way to do it. Mr. Whitfield. All right. Ms. Schroeder would you or Mr. Sallam explain the mentor program at i-SAFE? Ms. Schroeder. What happens with the mentor program is they actually go through a training. We have our own mentoring network. And so what the kids actually learn to do is they become a little bit different than what the cyber angels do because this is-- Ms. Aftab. Teenangels. Ms. Schroeder. I am sorry, Teenangels. This is in school. So for instance as you saw with the Kentucky kids, high school kids, they will actually get service learning credits. We have service learning curriculum and they actually decide to adopt a class and they will actually go in and train that class and/or they may go into a lower division school and then they work the kids for the younger kids say K, first, or second grade and they may go in and do learning with them because we have a literacy curriculum as well. So there are various things that the kids can do from peer-to-peer in terms of being able to help promote Internet safety. We also have school assemblies so the kids actually participate in the school assemblies. Mr. Whitfield. And how many mentors are there around the country? Ms. Schroeder. Right now we have 156,000 I think that are actual certified mentors. Mr. Whitfield. One hundred fifty-six thousand? Ms. Schroeder. One hundred fifty-six thousand that are certified mentors. Now those are, the certified mentors, are the ones that actually conduct the training. Mr. Whitfield. I see. Ms. Schroeder. So every single student that goes through the curriculum, they actually become mentors because it is part of the curriculum that they do in the classroom. Mr. Whitfield. And how many Teenangels, Ms. Sullivan or Ms. Aftab? Ms. Aftab. We are a different program. Ours is a train-the- trainers program so the Teenangels reach out and train others. Mr. Whitfield. Okay. Ms. Aftab. We have 450 certified Teenangels who are the right age right now, a lot of them have grown up. And we have about 3,400 in the pipeline. Until recently, I had actually hand-trained all of my Teenangels. It was the most fun I have had. Now their training is put onto CDs so that anywhere we are not, the Teenangels can. And we are working with the scouts and with other organizations. In fact, we have got a new Teenangels chapter that is starting with Camp Fire Girls and Boys in Anchorage, Alaska. Mr. Whitfield. Really? Ms. Aftab. Yeah. Mr. Whitfield. Do you operate in other countries as well? Ms. Aftab. Seventy-six countries around the world. Mr. Whitfield. And what about i-SAFEty? Ms. Schroeder. Fifteen countries and schools. Mr. Whitfield. Okay. And how many Teenangels are back here in the corner this morning? Ms. Schroeder. One and one want to be. Mr. Whitfield. One and one want to be, okay. Well-- Ms. Aftab. They have to miss school to do this. But they are now. The interesting thing is they are doing hard consulting for big corporations. They are working on the inside with Myspace and Facebook and with Yahoo! and Google and Disney and Microsoft where they are helping advise on new product and ways that they can be misused and used by kids. Mr. Whitfield. So all of our mentors and Teenangels, they are all quite proficient and we know they will do well in whatever they decide to pursue. Ms. Aftab. And we are lucky to have them. Mr. Whitfield. Yeah, absolutely. I want to thank you all for the great job that you are doing for these programs and the good work that you are doing. And particularly want to thank the Teenangels and the mentor and mentors for their assistance you are doing with other students. And at this time, I recognize Mr. Stupak. Mr. Stupak. Thank you. Ms. Sullivan or Mr. Sallam, what do you feel these sites--Myspace and there is another one we saw today Spotlife and Buddypicks-- now what do you think of those as a general rule? Are they useful or helpful? Ms. Sullivan. They are a good way to keep in touch with your friends. Many teens are enticed by social networking sites because you can make it all about you. Sites like Myspace, you can change the background to whatever you want, whatever font you want, you can put funny pictures, you can put pictures of yourselves and your friends, you can comment on your friends� pages. It is very teen orientated. So they really enjoy it. It can be useful because it is different than just IM you friends it is more like staying in touch with your friends, more extensive, but they can be misused. You can post personal information. Mr. Stupak. Well, do you think the benefits outweigh the risk? Ms. Sullivan. Excuse me? Mr. Stupak. Do you think the benefits of these sites outweigh the risk? Ms. Sullivan. No, I do not. There is too many risks because many-- Mr. Stupak. Then why have them? Ms. Sullivan. Because-- Mr. Stupak. I mean you are the experts. I mean I have never been on the Internet and I could not tell you from the bottom, but I guess I am just trying to get your own feelings on it because it has been a tragic story what we have heard about today and unfortunately it is being repeated time and time and time again in this country and more offshore and everything else. So I just want to learn the value of these sites and if we cannot monitor them or police them better than what we are doing. Ms. Aftab. And how can you use them safely I guess. Ms. Sullivan. Yeah. It depends how the teen or the child is using it. Mr. Stupak. Sure. Ms. Sullivan. If someone has their profile set on private for only their friends to see and they are not talking to strangers or people they do not know, then it is safe. It is a good place for them to be. But otherwise if they are letting anyone who has a myspace or commenting, people they have never met, and people they never will meet, then it can be dangerous. So it depends on how you look at it. If you see that your child or teen is being safe on it and they are using it to contact their friends then it can be safe and it does have benefits. But otherwise, if they are posting too much personal information and they are talking to people they do not know, then it is dangerous. Mr. Stupak. So I bet you a month does not go by here where there is an embarrassing email that came out of some office here. The issue is not when the sender sent that email to the other office probably thought it would go no further but somehow inadvertently, however, it gets sent all over and suddenly my privacy is everybody�s public knowledge and not only is it embarrassing for the office that originated the email but it just, I think sort of reminds us that what we may think and what we believe and sitting behind that desk and doing your emails or going to your myspace, while we think it is private, it is really not and that is why I think we are all vulnerable and not just young people and us too with our emails. So I was just wondering about that. Mr. Sallam, let me ask you this, the Chairman asked you and you sort of said no but these porn sites, there has been gregarious talk about sitting home or you are surfing the net. Do you have discussions with your friends about the fact porn sites are out there? As you surf you may hit them, things like that? Mr. Sallam. That is a tough question. Mr. Stupak. Yeah, I mean what I wanted to get at is-- Mr. Sallam. When you are surfing the Internet, the fact that stuff is out there and we do like stumble upon it and it is especially with myspace like some people post pornographic images on their myspace so it is sort of people who have myspace, it is sort of easy to stumble upon something like that. Mr. Stupak. Do you talk about it with your friends? Mr. Sallam. Not really. Mr. Stupak. Couldn�t that be a deterrent in the programs you are doing? I mean, we all know they are out there, acknowledge they are out there and discuss it, why you are not to go there and the dangers involved in it? Mr. Sallam. Yeah, of course there is always a bad aspect of looking at these pornographic images, the factor of getting a virus, but it does not really come up in discussion with my peers. Mr. Stupak. Okay. Ms. Schroeder, would you submit the FCACY study on the i-SAFE Program? I would be interested in learning a little bit more about that. And you said it has been around since about 1998. Has there been some studies as to the effectiveness of the program? Ms. Schroeder. Yes. MIJ did a 2 year study on i-SAFE and they presented it to me about 2 months ago so, absolutely, I will request that study. Mr. Stupak. The 2 year program you said or 2 year study, I am sorry, has there been anything else who have measured the effectiveness of i-SAFE? Ms. Schroeder. Well we do pre-polls and delayed assessments and actually we have our national assessment center so we are providing assessment data. We even provide it to the FBI because we do trainings for them as well and I would be happy to provide that to you. Mr. Stupak. You mentioned the FBI, do you work with local law enforcement and things like-- Ms. Schroeder. Yes, we do. We have-- Mr. Stupak. There is at least one more. Maybe three more. It looks like a new agenda, three more. Okay. Ms. Schroeder. We have our i-SAFE Task Force and our i-SAFE Task Force actually is a partnership with local law enforcement, FBI, the Attorney General�s office. School resource officers from around the country actually are trained and they participate, as well as FBI and their outreach department, so they are actually teaching the classes, as well as in schools. Mr. Stupak. In your testimony, I think you mentioned something about 30 minutes once a week for 5 weeks. Do you have any follow-up with that because I would think there may be more to this? Ms. Schroeder. Yes, we do. Mr. Stupak. Well what is that? What does that consist of follow up? Ms. Schroeder. What happens is is that the classroom curriculum actually is comprised of a 30 minute segment because you have to fit it into a class day. So once it is implemented into a school district and/or a classroom, it really is up to that teacher in terms of that. We create and we have five core modules and then we have supplemental modules. So what the teachers usually do is they always do the five core modules and then after that they go and they do the supplemental modules. The way that we follow up with them is the fact that we are always supplementing the information. For instance when cyber bullying came out, we created a cyber bullying curriculum. So they go online, they request that curriculum. It has its own life within that school district in terms of its being taught all the time. And then students too as well, they have their school assemblies that they are doing as well and then that involves, they will bring local law enforcement in and we have our parent nights. Mr. Stupak. Okay. You just mentioned cyber bullying again. Explain that for us for the record so we know what is cyber bullying. Ms. Schroeder. Yes. What that is is you know you would be bullied on the school grounds? Well now what kids have done is they have taken it online. So for instance if I am a student and I have something to say about you I will blog it or I will go and maybe post different pictures about you, crop them, then I will go and call attention to them. So for instance for me as a student when I come back to school the next day everybody knows about it not just a few kids that on a school ground it would just be one on one. One situation that was such a tragedy was a student in Vermont and actually his father was an IBM executive and they contacted us. IBM did and said this is what is happening to one of our executives and that is when we really looked into this. In this particular situation, this boy was bullied at his school, it then went on and on and he ended up taking his own life. Ms. Teen New Jersey who is a spokesperson for us, her parents moved her three States when she was bullied online as well. Mr. Stupak. Okay. You are also promoting the digital certificate technology for children. Ms. Schroeder. Correct. Mr. Stupak. And one of the requirements to obtain such a certificate is they have a government-issued photo ID, do I understand it? Do many students have such a photo ID? I do not usually think that the school IDs are accepted as a government ID cards or government-issued ID cards. Where would students use them? Ms. Schroeder. The way that this technology works is it is called the i-STIK. Mr. Stupak. Okay. Ms. Schroeder. On the first day of school when parents actually sign the acceptable use policy, they will say yes my son or daughter can have an i-STIK. So next to biometrics it is actually authenticated there at the school. Mr. Stupak. I see. Ms. Schroeder. So we did a study with ten States and most kids took their i-STIK and went to the school administrator, they had their ID there, they knew that that was Susie Brown and Susie Brown was issued that i-STIK and so that, it is just very simple. It is actually like an ATM card. It can be used anywhere on the Internet. Right now it is empowered by VeriSign and also eBay; Yahoo! was actually participating in this study as well. And we are looking at this being a place where if you are a student, you would be able to go to these areas online and it would be able to authenticate you so it only knows in terms of male, female, age range, and demographics in terms of West Coast, East Coast. Mr. Stupak. And that is a pretty safe, secure site so no one can access this information? Ms. Schroeder. Well, the goal is that you are educated so when you are actually getting into an area if I am going to go chat or communicate, then it will only allow other people within those parameters to chat or communicate with me. So it really empowers the students quite a bit because now they choose where they want to go. Mr. Stupak. Thank you, Mr. Chairman. Mr. Whitfield. Thank you, Mr. Stupak. I am going to just ask one other question of Ms. Aftab and then we will conclude the hearing. But and you had a lot of experience with this. You were a lawyer prior to getting involved in WiredSafety. And do you find that parents� perceptions of what their children are doing online differ significantly from the reality of what their children are doing online? Ms. Aftab. Yes, and Mr. Chairman, I have actually written all of the leading books for parents on Internet safety in the United States and around the world. And WiredSafety, the volunteers before me have been doing this for 11 years so it was a long track record here. Parents are clueless, totally clueless. And even the parents who use the Internet are clueless. And it is interesting, we have been talking about this for years and I will go out and I address 1,000 parents a month and 5,000 students myself in person and every single month, and when I go out to them, the parents keep saying not my kid. And I say your kids are communicating with strangers, no. Twenty-four percent of the teens that were polled by family PC magazine, teen girls admitted to meeting strangers off line that they met online, 24 percent. And 60 percent of the survey that we did with the University of Southern Florida in 1999, 60 percent of the teen girls, 11,000 teen girls between the ages of 13 and 16 engaged in cyber sex, admitted to it. One of the girls said that she would not, she had cyber sex but she did not go all the way. I always joke, that means she did not use punctuation. But these kids are doing this because they can and the parents have always said not my kid. And then myspace became popular. And myspace has put fear in the hearts of parents everywhere and I think it is seriously overblown. They have the most liberal law enforcement, pro-law enforcement policy on the Internet today. So they get it but the parents do not. So now the parents are saying not my kid, my cherubic 13-year-old, 14-year-old would never do those things and they go onto their site and they see them posing in their bra, or licking their lips and arching their back and they are thinking oh my goodness. And a lot of these kids who are home coloring with their 5-year-old niece over the weekend are pretending that they were out drinking last weekend. So they are not really a drunken slut, they are just playing one on myspace. And their parents have no idea. And so what we now need to do is awaken parents, get them to open their eyes at the same time they do not throw out the Internet which all of our children need. We have hearings about the dangers online and the terrible things that can happen to children but the greatest single risk our children face in connection with the Internet today is being denied access. We have got a solution for everything else. Mr. Whitfield. Ms. Aftab, I thank you very much. And Ms. Schroeder for the good work that you are doing. And Ms. Sullivan and Mr. Sallam, we really appreciate your being here and the great leadership that you are providing. Before concluding, I would ask unanimous consent that we enter into the record the letter from the Department of Justice from Mr. Ryan regarding Justin Berry�s--both letters to and from. And oh, yes, Ms. Schroeder, we would like to put your overheads in the record as well. Do you have problem with that? [The information follows:] Ms. Schroeder. Not at all. Mr. Whitfield. Okay. Ms. Schroeder. Thank you. Mr. Whitfield. With that, the record will remain open for 30 days and I think Dr. Burgess may have some additional questions and if he does we will get them to you all. But that concludes today�s hearing and thank you very much for your patience. [Whereupon, at 3:36 p.m., the subcommittee was adjourned.] SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET: WHAT PARENTS, KIDS AND CONGRESS NEED TO KNOW ABOUT CHILD PREDATORS THURSDAY, APRIL 6, 2006 House of Representatives, Committee on Energy and Commerce, Subcommittee on Oversight and Investigations, Washington, DC. The subcommittee met, pursuant to notice, at 10:00 a.m., in Room 2322 of the Rayburn House Office Building, Hon. Ed Whitfield (Chairman) presiding. Members present: Representatives Bass, Walden, Ferguson, Burgess, Blackburn, Barton (ex officio), Stupak, DeGette, Inslee, and Whitfield. Staff Present: Mark Paoletta, Chief Counsel for Oversight and Investigations; Alan Slobodin, Deputy Chief Counsel for Oversight and Investigations; Kelli Andrews, Counsel; Karen Christian, Counsel; Michael Abraham, Legislative Clerk; Edith Holleman, Minority Counsel; and David Nelson, Minority Investigator/Economist. Mr. Whitfield. This hearing will come to order, and today marks the second day of hearings that the Oversight and Investigations Subcommittee is having on child pornography and sexual exploitation of children over the Internet. Today, as I said, this is our second day of hearings on the sexual exploitation of children over the Internet. Today, we hope to gain a better understanding of how U.S. law enforcement is working to combat the horrifying and growing commercial business of sexually exploiting children over the Internet, and what is being done to put those online child predators behind bars. The testimony we heard on Tuesday was disturbing. For example, in this $20 billion a year business of commercially exploiting children, the images of child victims are increasingly younger and increasingly more violent. I cannot fathom who these people are that seek to view these images of children being sexually abused and, frequently, being abused on demand. As one witness on Tuesday described it, these images are digital crime scenes, and it sickens both our heart and soul. Some of the most disturbing testimony at Tuesday�s hearing came from Justin Berry, a victim of online predators. Justin�s testimony about the Department of Justice�s handling of his case was particularly troubling. Justin testified that he himself has no faith in the Department of Justice�s Child Exploitation and Obscenity Section. This is a section of prosecutors in the Department that are supposedly experts in handling cases like Justin�s. When a victim witness has no faith in the people that are supposed to be his advocates, there is clearly something wrong with the process. While I am sympathetic to the Department�s concern over discussing ongoing investigations, the allegations raised by Justin Berry�s testimony on Tuesday raise important process questions that need to be addressed by the Department. We have some specific questions for the Department of Justice at today�s hearing. These questions include: why has it taken so long for the Department to act and rescue children in imminent danger of being molested; why Justin�s father, Knute Berry, a man who allegedly profited off of the sexual exploitation of his son, has not been charged or arrested; why there have been no arrests from the over 1,500 names of subscribers to Justin�s website, that featured images of children being sexually abused, and which he supplied to the Department of Justice; why Aaron Brown, the person who ran a credit card processing company called Neova.net, that processed the orders for sexually exploitive images of children, has not been arrested and charged in connection with Justin�s case; why Ken Gourlay has not been charged or arrested in connection with the alleged money he made hosting Justin�s own website, nor for his alleged sexual abuse of Justin while Justin was still a minor; and finally, why the Department of Justice allowed an affidavit to be unsealed and remain unsealed for 6 months, and still is unsealed today, in a criminal case that had the effect of putting Justin Berry�s life in danger? We do not want these disturbing details about the handling of Justin�s case to go unanswered by the Department, and hope that some insight will be gained through this hearing today, and that is one of our clear intents. I would like now to briefly turn to the other witnesses that we will hear from today. Law enforcement has a very difficult task ahead, and is fighting an immense criminal enterprise of online child predators. We need to give law enforcement the necessary resources to save our children from online predators. I look forward to hearing from the various law enforcement witnesses today about their successes in the field, as well as concerns and problems they face. Child predators on the Internet are using all technological means available to avoid law enforcement efforts, and law enforcement must respond in an effective way. Finally, it is critical that we have an understanding of what is going on in the various State legal systems. About 70 percent of all prosecutions involving child pornography are handled at the State and local level. Therefore, the State laws regarding the illegality of possession, manufacturing, distribution, and enticing of minors in child pornography need to be as strong as the Federal laws. My home State of Kentucky, as an example, recently passed legislation that will make possession of child pornography a felony instead of a misdemeanor. I look forward to hearing from witnesses, including Mr. Weeks from PROTECT, about sentencing issues surrounding these cases involving the sexual exploitation of children over the Internet. And at this time, I will recognize Mr. Stupak of Michigan for his opening statement. [The prepared statement of Hon. Ed Whitfield follows:] Prepared Statement of the Hon. Ed. Whitfield, Chairman, Subcommittee on Oversight and Investigations GOOD MORNING. TODAY THE SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS BEGINS ITS SECOND DAY OF HEARINGS ABOUT SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET. TODAY WE HOPE TO GAIN A BETTER UNDERSTANDING OF HOW U.S. LAW ENFORCEMENT IS WORKING TO COMBAT THE HORRIFYING AND GROWING COMMERCIAL BUSINESS OF SEXUALLY EXPLOITING CHILDREN OVER THE INTERNET AND WHAT IS BEING DONE TO PUT THESE ON-LINE CHILD PREDATORS BEHIND BARS. THE TESTIMONY WE HEARD ON TUESDAY WAS DISTURBING. FOR EXAMPLE, IN THIS 20 BILLION DOLLAR A YEAR BUSINESS OF COMMERCIALLY EXPLOITING CHILDREN--THE IMAGES OF CHILD VICTIMS ARE INCREASINGLY YOUNGER AND INCREASINGLY MORE VIOLENT. I CANNOT FATHOM WHO THESE PEOPLE ARE THAT SEEK TO VIEW THESE IMAGES OF CHILDREN BEING SEXUALLY ABUSED AND IN MANY INSTANCES-- ON DEMAND. AS ONE WITNESS ON TUESDAY DESCRIBED IT--THESE IMAGES ARE "DIGITAL CRIME SCENES". IT SICKENS MY HEART AND MY SOUL. SOME OF THE MOST DISTURBING TESTIMONY AT TUESDAY�S HEARING CAME FROM JUSTIN BERRY--A VICTIM OF ON-LINE PREDATORS. JUSTIN�S TESTIMONY ABOUT THE DEPARTMENT OF JUSTICE�S HANDLING OF HIS CASE WAS PARTICULARLY TROUBLING. JUSTIN TESTIFIED THAT HE HAS NO FAITH IN THE DEPARTMENT OF JUSTICE�S CHILD EXPLOITATION AND OBSCENITY SECTION. THIS IS A SECTION OF PROSECUTORS IN THE DEPARTMENT THAT ARE SUPPOSEDLY EXPERTS IN HANDLING CASES LIKE JUSTIN�S. WHEN A VICTIM WITNESS HAS NO FAITH IN THE PEOPLE THAT ARE SUPPOSED TO BE HIS ADVOCATES--THERE IS SOMETHING CLEARLY WRONG WITH THE PROCESS. WHILE I AM SYMPATHETIC TO THE DEPARTMENT�S CONCERN OVER DISCUSSING ON-GOING INVESTIGATIONS, THE ALLEGATIONS RAISED BY JUSTIN BERRY�S TESTIMONY ON TUESDAY RAISE IMPORTANT PROCESS QUESTIONS THAT NEED TO BE ADDRESSED BY THE DEPARTMENT. WE HAVE SOME SPECIFIC QUESTIONS FOR THE DEPARTMENT OF JUSTICE AT TODAY�S HEARING. THESE QUESTIONS INCLUDE-- WHY HAS IT TAKEN SO LONG FOR THE DEPARTMENT TO ACT AND RESCUE CHILDREN IN IMMINENT DANGER OF BEING MOLESTED? WHY JUSTIN�S FATHER-KNUTE BERRY-A MAN WHO ALLEGEDLY PROFITED OFF OF THE SEXUAL EXPLOITATION OF HIS SON HAS NOT BEEN CHARGED OR ARRESTED? WHY THERE HAVE BEEN NO ARRESTS FROM THE OVER 1500 NAMES OF SUBSCRIBERS TO JUSTIN�S WEBSITE THAT FEATURED IMAGES OF CHILDREN BEING SEXUALLY ABUSED? WHY AARON BROWN, THE PERSON WHO RAN A CREDIT CARD PROCESSING COMPANY -- CALLED NEOVA.NET-THAT PROCESSED THE ORDERS FOR SEXUALLY EXPLOITATIVE IMAGES OF CHILDREN, HAS NOT BEEN ARRESTED AND CHARGED IN CONNECTION WITH JUSTIN�S CASE? WHY KEN GOURLAY HAS NOT BEEN CHARGED OR ARRESTED IN CONNECTION WITH THE ALLEGED MONEY HE MADE HOSTING JUSTIN�S WEBSITE AND FOR HIS ALLEGED SEXUAL ABUSE OF JUSTIN WHEN JUSTIN WAS STILL A MINOR? AND FINALLY-WHY THE DEPARTMENT OF JUSTICE ALLOWED AN AFFIDAVIT TO BE UNSEALED---AND REMAIN UNSEALED FOR OVER SIX MONTHS-- IN A CRIMINAL CASE THAT HAD THE EFFECT OF PUTTING JUSTIN�S LIFE IN DANGER? WE DO NOT WANT THESE DISTRUBING DETAILS ABOUT THE HANDLING OF JUSTIN�S CASE TO GO UNANSWERED BY THE DEPARTMENT AND HOPE THAT SOME INSIGHT WILL BE GAINED THROUGH THIS HEARING. I WOULD LIKE NOW TO BRIEFLY TURN TO THE OTHER WITNESSES THAT WE WILL HEAR FROM TODAY. LAW ENFORCEMENT HAS A VERY DIFFICULT TASK AHEAD AND IS FIGHTING AN IMMENSE CRIMINAL ENTERPRISE OF ON-LINE CHILD PREDATORS. WE NEED TO GIVE LAW ENFORCEMENT THE NECESSARY RESOURCES TO SAVE OUR CHILDREN FROM ON-LINE PREDATORS. I LOOK FORWARD TO HEARING FROM THE VARIOUS LAW ENFORCEMENT WITNESSES TODAY ABOUT THEIR SUCCESSES IN THE FIELD, AS WELL AS, CONCERNS OR PROBLEMS THEY SEE IN INVESTIGATION AND PROSECUTING THESE CASES. CHILD PREDATORS ON THE INTERNET ARE CLEARLY USING ALL TECHNOLOGICAL MEANS AVAILABLE TO AVOID LAW ENFORCEMENT EFFORTS AND LAW ENFORCEMENT MUST RESPOND. FINALLY, IT IS CRITICAL THAT WE HAVE AN UNDERSTANDING OF WHAT IS GOING ON IN THE VARIOUS STATE LEGAL SYSTEMS. ABOUT 70% OF ALL PROSECUTIONS INVOLVING CHILD PORNOGRAPHY ARE HANDLED AT THE STATE AND LOCAL LEVEL. THEREFORE, THE STATE LAWS REGARDING THE ILLEGALITY OF POSSESSION, MANUFACTURING, DISTRIBUTION AND ENTICING OF MINORS IN CHILD PORNOGRAPHY NEED TO BE AS STRONG AS THE FEDERAL LAWS. MY HOME STATE OF KENTUCKY RECENTLY PASSED LEGISLATION THAT WILL MAKE POSSESSION OF CHILD PORNOGRAPHY A FELONY INSTEAD OF A MISDEMEANOR. I LOOK FORWARD TO HEARING FROM WITNESSES, INCLUDING MR. WEEKS, FROM PROTECT, ABOUT SENTENCING ISSUES SURROUNDING THESE CASES INVOLVING THE SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET. THANK YOU. Mr. Stupak. Thank you, Mr. Chairman. April is Child Abuse Awareness Month, and so, it is appropriate we are holding these hearings. As we learned Tuesday, this problem has many sordid faces: commercial websites, predator seduction over peer-to-peer networks, pedophile groups that demand and trade new materials as the price of admission to complete their set of pornographic photos, and sex tourism, which are trips organized by American men to foreign countries for the purpose of sexually molesting and filming sex acts with young people. We learned other disturbing facts too numerous to list here, but a few that are noteworthy. Victims of this disgusting trade are 28 times more likely to become prostitutes 86 percent of the victims develop serious, long term mental illness. Eighty percent of these predators have material depicting victims under the age of 12, 40 percent under the age of 6, and 20 percent under the age of 3. Unfortunately, yesterday�s news revealed that a Deputy Press Secretary at the Department of Homeland Security had been arrested by authorities who were posing as a 14-year-old girl. The arrest occurred as the officer portraying herself as a 14-year-old girl was to pose nude for him on a webcam. As Mr. Justin Berry testified, there is no reason for a 13 or 14-year-old to have a webcam. Mr. Chairman, the committee staff has spent many hours interviewing key Federal officials who investigate child pornography every day. Unfortunately, they are not here to testify today. Today, we will hear from a few frontline law enforcement officers, and some witnesses purporting to represent the frontline prosecutors and the Federal law enforcement officers. I say purportedly, because I don�t believe that the most experienced witnesses are here today. On Tuesday, we heard a withering indictment of the Child Exploitation and Obscenity Section at the Department of Justice, CEOS. CEOS are the prosecutors responsible for coordinating these horrible cases nationwide. Unfortunately, the head of CEOS is not here. Instead, Justice sent us a U.S. Attorney from the State of Montana to present its testimony. I hope this individual has some knowledge in this area he will be talking about today. The Department of Justice is not the only agency that did not provide its most knowledgeable staff as a witness today. Both the Federal Bureau of Investigation and the Bureau of Immigration and Customs Enforcement, ICE, have incredible, underfunded cybercrime operations with great expertise in working these cases nationally and internationally. These critical law enforcement agencies have two of the most articulate and committed special agents working on child exploitation. These talented and dedicated supervisors, Arnold Bell of the FBI�s Innocent Images Unit, and Claude Davenport of the Child Exploitation Section of the ICE Cybercrime Center, have not been permitted to give testimony today. Instead, the individuals who will appear here have job titles bestowed upon them by bureaucratic politicians. Again, I suspect that they have little recent law enforcement experience in the dirty world of Internet child pornography and sexual exploitation. That makes our job extremely difficult, for us here in Congress to do oversight work when agencies do not send the witnesses we request. I will be pressing for answers as to why those that labor so hard to protect our children from the worst of all crimes are denied adequate personnel and critical technical resources. The agents that actually work these cases need much more recognition and support in what they receive from their superiors. These men and women are overwhelmed by the size of the problem, and handicapped by timid prosecutions, at least on the Federal level. The FBI, ICE, and the Inspectors of the U.S. Postal Service have brought down networks involving tens of thousands of criminals that have, or likely will physically molest children, yet despite their efforts, the Federal prosecution of these perpetrators is rare. On the State and local level, the story is different but widely variable. We are aware of a county district attorney in New Hampshire that averages one prosecution every 10 days of these predators. He says he could do one a day if he had more attorneys on staff. He does have the assistance of the ICAC, coordinated Federal and State local computer crime specialists, assisting him in developing the necessary cases and evidence, but he still needs the manpower to present the cases in court. I find the ICAC�s testimony about the Internet service providers being a major obstacle to the investigation of child exploitation over the Web particularly troubling. I can�t help but believe that the credit card companies and PayPal accounts also have responsibility to police their clients who are accessing these child pornography sites. Yesterday, I was pleased that our colleagues unanimously accepted my amendment in the Telecommunications markup to crack down on Internet child pornography. My amendment orders the Federal Communications Commission to devise regulations that require both cable service and phone companies offering cable service and technologies to prevent child pornography from being conveyed over Internet networks. This will serve as a good start at curtailing child pornography on the Internet, but we also need stepped up law enforcement at all levels, Federal, State, and local. Mr. Chairman, the Federal prosecution effort is far less vigorous than that found on the State and local level. As I noted Tuesday, in a major case where 20,000 verified American child sex offenders are out still walking our streets, prosecutors have been able to convict less than 2 percent of the identified perpetrators, while law enforcement in Australia obtained convictions of over 55 percent of their countrymen identified in the same international bust. If Australia can do 55 percent, I am sure we can do better than 2 percent here in this country. We, Congress, have a long way to go to assist law enforcement to help in this fight. I hope that we don�t stop with this hearing today. As a former law enforcement officer, I will use every opportunity to crack down on illegal Internet activity, bank card transactions, and inadequate Federal statutes that tie law enforcement hands when pursuing child pornography perpetrators. With that, Mr. Chairman, I yield back, and I thank you for having this hearing. Mr. Whitfield. Mr. Stupak, thank you, and I want to also thank you for raising this issue of the witness from the Justice Department today. Of course, we are glad to have Mr. Mercer here. He is a U.S. Attorney from Montana, and I know he has experience in these child pornography cases, but we specifically asked for Raul Roldan, who is the FBI�s cybercrimes expert, and we also asked for Drew Oosterbaan, who is the Director of CEOS, and neither one of them is here, but I did notice that Raul Roldan was on CNN today on the Today Show, so he had time to go on television, but he didn�t have time to be here with us. At this point, I would like to recognize the gentleman from New Jersey, Mr. Ferguson, for his opening statement. Mr. Ferguson. Thank you, Mr. Chairman, and thank you for holding this second hearing. Mr. Chairman, I, too, think it is outrageous that we have law enforcement agencies that are willing to, and perfectly happy, to send some of their most knowledgeable representatives to do interviews on national media, but they can�t come before a subcommittee in the Congress to share their expertise and their thoughts and strategies with the Congress and the American people. I think it is outrageous. I certainly appreciate the witnesses for being here today. I appreciate the expertise and the insights that they will lend to these hearings. But I think it is a very, very serious issue, and I hope that we will follow up on that. I want to thank you, Mr. Chairman, and Mr. Stupak, for your leadership on this issue. I am happy to see that as parents and as Members of Congress who are serving on this committee, that we are making a concerted effort to get to the bottom of an industry which so horribly affects many children in our country. I also want to thank the witnesses for testifying and helping us get to the real causes of this problem, and why it is so pervasive in our society. I am sure that it is safe to say this past Tuesday�s hearing touched and shocked every one of us who was there in that room, or who got to watch it on television. Although we have been aware of this problem, many of us have been aware of this problem, I think it is doubtful that prior to Tuesday, that any of us genuinely knew the details of this sordid world that so many children find themselves victims of. The question running through everybody�s minds and my mind is how, how could this happen to so many children? How could it be so easy for a sexual predator in today�s world of advanced crime fighting and investigative techniques? And how is it that we, as a society, seem to be incapable of putting a stop to it? I can�t thank enough organizations like WiredSafety and i-SAFE, people like Kurt Eichenwald from the New York Times, who is here again today, who have brought national attention to this issue. We must recognize that it is our job as Members of Congress to give these organizations and our law enforcement officials the tools they need to fight this unbelievable crime. With yesterday�s revelations about a high ranking DHS official being charged with online seduction, and yesterday�s announcement of 27 people being charged in an international child pornography ring, it is clear that we are just beginning to scratch the surface of this industry, and we have a long, long way to go. Recently, the National Center for Missing and Exploited Children reported that 39 percent of people who are caught with images of child sexual abuse had images of children younger than 6 years old. We have a 6-year-old daughter. Nineteen percent of people who have been caught with these images, one in five, were caught with images of children under three years old. We also have a 3-year-old daughter. This evil is beyond our comprehension. As proven by these hearings, my colleagues and I have made a commitment to do everything in our power to fight this problem, and to punish offenders to the fullest extent of the law. These people are not normal criminals. Their offences go above and beyond typical crimes. They steal the innocence of a child, and leave in their wake emotional and physical scars that will affect these young victims for their entire lives. After hearing Justin�s heart-wrenching testimony on Tuesday, it became apparent that it is a problem within our justice system that allows this industry to continue and remain profitable. Justin told us that these predators laugh at law enforcement, but an estimated $20 billion industry that makes it profits by violating children is absolutely nothing to laugh at. I am anxious to hear the testimony of our witnesses, and to have an opportunity to question them regarding what needs to be done by lawmakers and parents and teachers and law enforcement officers, to put an end to this industry, and to find out how we have fallen so sadly short of our goals so far. Thank you again, Mr. Chairman, and thank you, Mr. Stupak, for your commitment, and I look forward to hearing from the witnesses. Mr. Whitfield. Thank you, Mr. Ferguson. At this time, I will recognize the gentlelady from Colorado, Ms. DeGette, for her opening statement. Ms. DeGette. Thank you very much, Mr. Chairman. Mr. Chairman, this is a little unusual for this committee, because having jurisdiction over telecommunications and the Internet, we are usually always jumping at the chance to talk about the wonders of the Web. And the Internet has been one of the most incredible creations of the last century. At the beginning of the new millennium, we look forward to a future of untold promise and new innovation that we can�t even imagine today, and I think what we are seeing this week, sadly, is sometimes this innovation can move in ways that are horrific to us. The Internet has changed the way we do business, conduct research, play, and communicate with each other, and it has made many day-to-day activities like shopping so much easier. Those of us who have teenage children know that young people often are the ones who figure out the ways to use the Internet in new and different, but that is the problem is the activities that have been made easier by the Internet are being used now to commit crimes against humanity in a much more facile way, and that is the sexual exploitation of children. That is what we are faced with when we conduct these hearings today. Our technological pride and joy has been hijacked. It has enabled a plague of proportions that none of us here today every imagined. Cloaked in anonymity, and enabled by technological innovation, this blight has been growing to extreme conditions under our very noses. How do we preserve the things that we value about the Internet? Can we find the right balance between privacy and freedom, in eradicating this heinous epidemic? I don�t think we have the answers today, but that is what we are here to determine, and I would say we have a very difficult job ahead of us. We can�t stand idly by and let our young people be devoured by this terrible use of technology. One thing that is clear to me, after hearing Justin�s testimony and reading the newspaper articles and other materials, is that these terrible predators are working a lot faster than we are, and government, for a change, needs to thing about working faster than the people who are taking advantage of our kids. All of us agree that these hearings have been a horrific eye opener. Mr. Ferguson talked about his young children, 3 and 6. Well, I have two girls, who are age 12 and 16, and I don�t think any of us realized how pervasive this child exploitation over the Internet is. I will tell you this, I certainly intend to go home and talk to my two daughters about this problem, and what they can do, when I go home tomorrow. We have learned that it is now an industry that now nets a profit close to the gross product of some small countries, and so I, too, am glad, Mr. Chairman, that you and Mr. Stupak are holding these hearings, because it is an issue that would be easy for us to try to sweep under the rug. But I think it is too important for that, and so, I think every member of this subcommittee needs to make a commitment right now to accomplish three things as the result of these hearings: first, to identify the problems with the Federal response to this crisis; second, to figure out how we are going to address this scourge; and third, to pledge that by the end of the 109th Congress, which is about 15 weeks away, we will have made an impact on this. What we should not do is have these hearings, make ourselves feel better, go home and talk to our kids ourselves, and then breathe a sigh of relief that we fixed the problem, because that is not going to fix the problem. This scourge is just a mouse click away from directly impacting us, our families, and our communities, and so, I would say we have a moral imperative to take action. I share the disappointment that everyone else has, that the witnesses that were requested from the FBI and the other agencies are not here today. If there was ever an issue that the executive branch should work with the legislative branch on, it was this issue. This is an investigative hearing, and with all due respect, we need facts, not generalized policy statements. And so I just want to say, Mr. Chairman, as Americans, we should be disgusted that our country is the number one consumer of child pornography. How did we get here, and how are we letting this happen to our children? We cannot let this issue go away. We can�t be a do nothing Congress, and if we can make an impact on this issue, Mr. Chairman, I would suggest that everybody on both sides of this committee can go home and hold our heads up very proudly. So, I think let us commit together to get to work. Thank you very much. Mr. Whitfield. Well, thank you, Ms. DeGette, and you raise some penetrating questions, and we hope to get those answers. Ever since Kurt Eichenwald wrote the first articles in the New York Times about this issue, our committee has been focused on it, and no one has been more focused on it than our full committee Chairman of Energy and Commerce, Joe Barton of Texas, and at this time, I would like to recognize Mr. Barton for his opening statement. Chairman Barton. Thank you, Chairman Whitfield. I do have a formal opening statement, but I have to get something off my chest. We have been working on this subcommittee, and Mr. Dingell and I, the full committee on this issue for 6 months or so, maybe longer, and we keep trying to cooperate with the Justice Department and the FBI, and you folks seem bound and determined to be as uncooperative as possible. This is the opening statement time, so I am not going to ask any questions, but I want you to know, Mr. Mercer, that I am going to call the Attorney General one more time, and we had better get the people we want to testify. Not that you are not a credible witness, but I didn�t hear of all of Ms. DeGette�s statement, but my guess is, having scanned your testimony, that she has scanned it too, we don�t need to know specifics of case investigations. That shouldn�t be public. But on behalf of the people of the United States of America who we represent, as the most closely elected officials to the people, we do deserve to get the witnesses that they are supposedly hands on, trying to solve these problems, and we are not doing it. You are not giving them to us. Your Department is not giving them to us, and the FBI is not giving them to us. Now, I am told half the room are FBI agents, and when the second panel comes, I am going to have some pretty straight questions for the FBI. But we are going to get the facts one way or the other. This is just too important an issue to let bureaucratic, I am trying to think of the right word, turf wars impede it. And when you have a Republican majority in the Congress and a Republican President, we ought to be able to work on a bi-branch basis, if that is the right term, to get the facts out, and that is not happening. So, Mr. Chairman, I am going to ask that my entire statement, formal statement, be put into the record. But this is probably the most important investigation. We have got all the investigations going on in all the other bodies and other committees, but child pornography is the most pernicious thing that is affecting our society at its very roots, and we need to root it out, and we need to put an end to this Internet child pornography system that is growing like a weed on our society, and one way or the other, we are going to get our executive branch officials to cooperate with us and testify. That is just going to happen. So with that, Mr. Chairman, I am going to yield back. But I want to thank you and Mr. Stupak for your perseverance on this issue. [The prepared statement of Hon. Joe Barton follows:] Prepared Statement of the Hon. Joe Barton, Chairman, Committee on Energy and Commerce Thank you, Chairman Whitfield, for holding this second day of hearings on sexual exploitation of children over the Internet. Just two days ago, we heard testimony from witnesses who described the sickening world of Internet child pornography. As repulsive as Tuesday�s testimony was regarding the magnitude of the child pornography problem, I was just as troubled by the opinion shared by some of the witnesses that the fight against child pornography in the United States is, if not a losing battle, one that is not being won. Only one conclusion could be drawn from the witnesses� testimony: the sexual exploitation and abuse of children over the Internet has reached a crisis point. Today, we are here to learn about what is being done to find, prosecute, and convict these child predators. I look forward to learning whether the witnesses from the Federal Bureau of Investigation, United States Immigration and Customs Enforcement, and the United States Postal Inspection Service share this opinion and what they believe must be done to bring child predators to justice. In particular, I hope to hear more about the role of Internet Service Providers and credit card companies in these investigations, and whether more should be required of them with respect to retaining data and conducting due diligence of those who use their servers and financial networks to distribute child pornography. I also look forward to learning more about state efforts to prosecute those who commit crimes related to the sexual exploitation of children. While the federal government is actively pursuing investigations of child predators, the vast majority of investigations and prosecutions of these crimes are being conducted at the state and local level. Unfortunately, penalties for child sex crimes in some states are the equivalent of a slap on the wrist. It is inconceivable to me that some who possess, create, or distribute child pornography go home on probation. Their victims don�t get off so easily. They suffer for the rest of their lives. Finally, I believe this hearing should address some of the concerns raised by Justin Berry at Tuesday�s hearing. Justin, Kurt Eichenwald, the New York Times reporter who investigated and reported Justin�s story, and Justin�s lawyer, Stephen Ryan, all testified that the Justice Department has failed to adequately pursue investigations against the men who molested Justin and the customers who sexually exploited him over the Internet. I have personally talked to Attorney General Alberto Gonzales about these concerns, and he has assured me that his department is serious and is actively pursuing this investigation. I don�t doubt his word, but I do hope the testimony offered today by the Department of Justice will provide further information about the status of the investigation. In closing, I want to commend the law enforcement agents who are here today as well as their colleagues in the field. I believe all my colleagues join me today in saying that we are prepared to do everything possible to help you put an end to the child pornography industry and bring child predators to justice. I look forward to hearing from the witnesses and yield back the balance of my time. Mr. Whitfield. Well, thank you, Mr. Chairman, and we look forward to continue working with you as we attempt to get the key witnesses before the committee. However, your opening statements in their entirety will be placed in the record without objection. And at this time, I will recognize Dr. Burgess of Texas for--oh, I am sorry-- recognize Mr. Inslee for his opening statement. Mr. Inslee. I just want to follow on Chairman Barton�s statement that this country really is enraged, and is demanding answers, and ultimately, we will obtain them, and we hope that the message that is delivered is that we need to move forward together quickly. The country is not going to wait any longer. Thank you. Mr. Whitfield. Thank you, Mr. Inslee. At this time, we recognize Dr. Burgess of Texas. Mr. Burgess. Thank you, Mr. Chairman. In the interests of time, too, I am going to submit a statement for the record, because we do have a full day ahead of us, but I just can�t help but observe that the one piece that I took away from Tuesday�s lengthy hearing was the comment that the perpetrators were laughing at law enforcement, and law enforcement is in this room today. They are laughing at you on the Internet about this problem, and I want you to take that very, very seriously. I wanted to also take a moment of personal privilege, and once again, recognize don�t tell anyone home in my district, but I want to recognize the New York Times reporter for doing the right thing, and I think if he had not stopped and picked up the person at the side of the road, they might not be with us today. So Mr. Eichenwald, again, I want to congratulate you, and thank you for doing the right thing when you were faced with a situation that you probably didn�t completely understand right at the beginning. I, myself, have to wonder why it has gotten to this point. I mean, we are a society that puts warning labels on airplanes that says danger, you may die if this crashes. Why don�t we put a warning label on a webcam, not age appropriate for those under 18 years of age to use by themselves in their bedrooms for longer than 12 hours at a time. I wonder about America�s legal system. We have heard testimony in this committee on multiple occasions about the abuses of the class action system. Where are the lawsuits against the payment companies that allow this to happen? Why have they not stepped up to protect America�s children, but mostly, I am embarrassed by the Federal agencies, and by the fact that we haven�t taken definitive action in Congress. I know it is going to be difficult. I want all of us in the Federal government, those in Federal agencies and those in Congress, to muster the institutional courage to do the right thing. With that, Mr. Chairman, I will yield back. Mr. Whitfield. Thank you, Dr. Burgess. And at this time, I will recognize the gentlelady from Tennessee, Mrs. Blackburn. Mrs. Blackburn. Thank you, Mr. Chairman. I thank you for the work that you and the staff have done on this hearing, and the series of hearings, and I thank you also, say thank you to our witnesses for continuing to work with us, to be here and work with us on the issue, as we seek to crack down on child pornography and sexual exploitation and abuse. This past Tuesday, the subcommittee did hear testimony from Justin Berry on the pervasiveness of child predators on the Internet. He described to us how the predators help to lure teenagers, to setting up the websites, the webcam situation, as Dr. Burgess just mentioned, and then, gradually lure them into sexual acts for money. He also told this committee that the Department of Justice�s CEOS has failed to act on information he provided to them at the risk of his own life, to find over 1,500 child predators and distributors of child pornography. And I am looking forward to hearing from the Department of Justice on why this happened. It is incomprehensible to me that there are people who are employed by the Federal government of this Nation who will hide, arrogantly hide behind bureaucracy, stonewall behind bureaucracy, and allow this to happen. That is inexcusable. It is absolutely inexcusable. The Federal budget should reflect our main priority, to defend the citizens of our country. To protect our children from those who would abuse them clearly falls into this area. I look forward to hearing from law enforcement on their efforts to shut down this industry, and send a message to these despicable, despicable people that this country will not tolerate those who knowingly, who willingly, who seek to abuse our children. Chairman Whitfield, I yield back my time. I thank you for looking into this delicate issue, and I hope to see some positive results from the hearing. Thank you, sir. Mr. Whitfield. And thank you, Mrs. Blackburn. At this time, I recognize the gentleman from Oregon, Mr. Walden, for his opening statement. Mr. Walden. Thank you very much, Mr. Chairman. I have read through the testimony from our witnesses today, last night, and I will tell you, after sitting through the hearing last week, or earlier this week, I guess, and listening to what occurred there, I have got to tell you, my confidence is pretty shaken in the Justice Department, and I hope we will hear today that something is happening, more than what Mr. Berry indicated, and his attorney. I want to know about the affidavit, why it was unsealed, why wasn�t it resealed. I think this case, to me, would send certainly, a chill across the land, that if you are caught up in one of these things, coming forward may not produce the results that you think it may. I mean, when Justin Berry sits here and says he wouldn�t necessarily recommend that others bring their cases forward, something is broken, and I realize you have got an open case, you may not be able to get into all the details of the case. My concern is looking at the system, and to figure out if it is working, how is it working that we don�t understand, and if it is not, how do we fix it? And I hope we hear that today. Thank you, Mr. Chairman. Mr. Whitfield. Thank you. I think that concludes all the opening statements, so the first panel consists of one witness, and that is Mr. William Mercer, who is the Principal Associate Deputy Attorney General, and also, U.S. Attorney for the District of Montana, of the U.S. Department of Justice, and we do welcome you, Mr. Mercer, and I guess it is clear to everyone now, you are not our first choice, but we know that you are a prominent prosecutor, and we do look forward to your testimony. You are aware that the committee is holding an investigative hearing, and when doing so, we have the practice of taking testimony under oath. Do you have any objection to testifying under oath this morning? Mr. Mercer. No, Mr. Chairman. Mr. Whitfield. Under the rules of the House and rules of the committee, you are entitled to legal counsel, but I am assuming that you don�t need legal counsel. Is that correct? Mr. Mercer. That is correct. Mr. Whitfield. Okay. If you would, then, raise your right hand. [Witness sworn.] Mr. Whitfield. Thank you very much. You are now under oath, and you may proceed with 5 minutes for your opening statement. STATEMENT OF WILLIAM M. MERCER, UNITED STATES ATTORNEY FOR THE DISTRICT OF MONTANA, PRINCIPAL ASSOCIATE DEPUTY ATTORNEY GENERAL, UNITED STATES DEPARTMENT OF JUSTICE Mr. Mercer. Mr. Chairman, Ranking Member Stupak, and distinguished members of the subcommittee, thank you for inviting me to testify before you today about the Department of Justice�s efforts to protect children from sexual exploitation on the Internet. Unfortunately, the Internet can be used to facilitate the sexual exploitation of children. Accordingly, the Department of Justice is unequivocally committed to enforcing Federal laws in these areas, and particularly, the possession, production, and distribution of child pornography, and the use of the Internet to coerce and entice minors to-- Mr. Stupak. Mr. Chairman, I am not sure his microphone is on. Mr. Mercer. Oh, I am sorry. I don�t have--now I do. Let me turn to child pornography. Unfortunately, the very term we commonly use to describe these awful images, child pornography, does not adequately convey the horrors these images depict. A more accurate term would be images of child sexual abuse, because the production of these images involves the sexual abuse of a child. These images are, thus, permanent visual records of child sexual abuse. In the past several years, the children we have seen in these images have been younger and younger, and very regrettably, the abuse depicted has been increasingly more severe, and is often sadistic. As if the images themselves were not harmful enough, the sexual abuse inherent in child pornography is increasingly exacerbated by pedophiles who choose to disseminate these images to millions of people over the Internet with a few clicks of a computer mouse. Once on the Internet, the images are passed endlessly from offender to offender, and perhaps used to whet the appetite of another pedophile to act out the deviant fantasies of the image on yet another child, thereby continuing the cycle of abuse. The Department of Justice is absolutely committed to obliterating this intolerable evil. We are equally concerned about the number of online predators who lurk in chat rooms in search of kids who they hope to meet in person, for the purpose of engaging in sexual activity. I would like to focus on what the Department of Justice has done to address this problem in the last 5 years. Prosecutors in the Criminal Division�s Child Exploitation and Obscenity Section, in conjunction with Assistant U.S. Attorneys and FBI agents with our Federal partners in the Bureau of Immigration and Customs Enforcement, the United States Postal Inspection Service, and the Secret Service, and our partners in State and local law enforcement, work continuously to identify the vulnerabilities of the child pornography industry, and to attack them at every angle, both domestically and overseas. We are focusing our efforts on everyone, from the consumer to the website operator to the facilitators, including those who provide credit card processing and the subscription services. For agents and Assistant U.S. Attorneys assigned to these cases, and for the prosecutors in the Child Exploitation and Obscenity Section who do this work every day, we do not take lightly the fact that their work revolves around review of the most troubling and graphic material, depicting children of all ages engaged in illegal sexual acts. They are engaged in this effort because they know, from their professional experience and a number of studies, that their efforts are essential to the prevention of future sexual abuse of children. The leaders in the Department of Justice are truly grateful for their efforts. A concrete reflection of our intensified efforts is the fact that the Child Exploitation and Obscenity Section within the Department�s Criminal Division has generated a more than 445 percent increase in its caseload, including child pornography cases and investigations, over the past 4 years. In addition to increasing the sheer number of investigations and prosecutions brought by the Department�s prosecutors, the quality and import of the cases have increased substantially, with a focus on the producers, commercial distributors, and other high impact offenders. The Department�s prosecutors in the 94 United States Attorney�s offices are critical to the efforts to enforce Federal laws prohibiting crimes against children. According to the Executive Office of the U.S. Attorneys, total Federal prosecutions of child pornography and abuse cases rose from 344 cases in fiscal year 1995 to 1,576 cases in fiscal year 2005, a 358 percent increase during that time period. The number of Federal investigations of crimes against children continues to increase at an exponential rate. Since the late 1990s, through the Department of Justice�s Office of Juvenile Justice and Delinquency Prevention, Congress has funded Internet Crimes Against Children Task Forces. The ICACs have played a critical role in law enforcement�s efforts to stop Internet criminal activity which poses harm to children. In just the first 6 months of calendar year 2005, ICAC investigations resulted in 3,423 State charges and 563 Federal charges. Moreover, the Attorney General has made very clear his and the Department�s commitment to protecting children from sexual exploitation over the Internet. On March 15, he announced a new Department initiative, Project Safe Childhood, aimed at combating the growing threat of children being exploited online through child pornography and enticement offenses. As this initiative is implemented in the coming months, it will provide for even better coordination by law enforcement at all levels in investigating and prosecuting child exploitation cases. It will enable us to bring even more Federal prosecutions in the area. It will make more training available for officers and prosecutors, and will further ongoing community education and awareness efforts. Through this comprehensive initiative, the Attorney General has made clear that this is an important priority for the Department. Project Safe Childhood is a true partnership. It involves the key entities in this battle, Federal law enforcement agencies and prosecutors, the ICACs, our other partners in State and local law enforcement, the National Center for Missing and Exploited Children, and other nonprofit organizations dedicated to the protection of children. As part of our strategy to focus on the most pervasive and detrimental forms of child pornography distribution, CEOS is currently coordinating 16 multidistrict operations involving child pornography offenders. These investigations of national impact have the potential for maximum deterrent effect on offenders. Nearly each one of the 16 investigations involve hundreds or thousands, and in a few cases, tens of thousands of offenders. It is our hope and desire to use the Project Safe Childhood initiative to ensure that the number of leads created from these major investigations are coordinated, pursued, and prosecuted in State or Federal courts. The Department of Justice is also working to identify and rescue victims depicted in child pornography. Seven of these previously unknown adult subjects appearing in child pornography images have been profiled by America�s Most Wanted and with the assistance of tips from viewers, six have been identified. More importantly, 35 victims so far, in Indiana, Montana, Texas, Colorado, and Canada, have been identified as a result of this initiative. All of the victims had been sexually abused over a period of years, some since infancy. The Department will continue to ensure that this program is utilized to its maximum potential. Finally, at the end of successful prosecutions, it is essential that the purposes of punishment established by the Congress in the Sentencing Reform Act are met. Sentences in child pornography cases, and coercion and enticement of minors for sexual purposes cases, must deter others from committing these crimes. They must also protect the public, promote respect for the law, and incapacitate. Early last year, the Supreme Court issued a decision in United States v. Booker, which altered Federal sentencing law. Before Booker, Federal judges were required to sentence pursuant to the sentencing guidelines. The guidelines are now merely advisory. Recently, I testified before the House Judiciary Committee on this subject, and noted the importance of making the guidelines binding again. In this area, child pornography and coercion and enticement, the Sentencing Commission reports the year after the Booker decision, Federal courts imposed sentences below the applicable guideline range in 26.3 percent of the cases involving possession of child pornography, and in 19.1 percent of the cases involving trafficking in child pornography. We believe that these non-guideline sentences jeopardize the purposes of punishment established by the Congress. I appreciate the opportunity to be here today. As you noted, Mr. Chairman, I have worn the hat of a U.S. Attorney for 5 years. I have been the Chief Deputy to the Deputy Attorney General of the United States now for about 10 months. I have been very involved in the development of the Project Safe Childhood initiative, both during my time as Chairman of the Attorney General�s Advisory Committee, and now, as the Principal Associate Deputy Attorney General, and I am confident that I can be helpful to this committee, in terms of understanding what the Department has done, the tremendous efforts made on behalf of CEOS, and by a number of line prosecutors and agents, and certainly want to help the committee in its essential oversight function. I thank you for the opportunity to be here. [The prepared statement of William W. Mercer follows:] Prepared Statement of William W. Mercer, United States Attorney for the District of Montana, Principal Associate Deputy Attorney General, United States Department of Justice Mr. Chairman, Ranking Member Stupak, and distinguished Members of the Subcommittee, thank you for inviting me to testify before you today about the Department of Justice�s efforts to protect children from sexual exploitation on the Internet. While we recognize that the Internet can deeply enrich our lives by greatly increasing our access to all types of information, we also know that it can be exploited for criminal activity and can cause grave harm, including by facilitating the sexual exploitation of children. Accordingly, the Department of Justice is unequivocally committed to enforcing federal laws in these areas. The Attorney General himself has made very clear his and the Department�s commitment to protecting children from sexual exploitation over the Internet. On February 15th, he announced a new Department initiative, "Project Safe Childhood," aimed at combating the growing threat of children being exploited online through child pornography and enticement offenses. As this initiative begins to be implemented in the coming months, it will provide for even better coordination by law enforcement at all levels in investigating and prosecuting child exploitation cases; it will enable us to bring even more federal prosecutions in this area; it will make more training available for officers and prosecutors; and it will further ongoing community education and awareness efforts. Through this comprehensive initiative, the Attorney General has made clear that this is a priority for the epartment. Federal law, codified at Chapters 1 10 and 11 7 of Title 18, United States Code, prohibits all aspects of the child pornography trade, including its production, receipt, transportation, distribution, advertising, and possession, as well as the enticement of children to engage in unlawful sexual activity. Unfortunately, the very term we commonly use to describe these awful images - child pornography -does not adequately convey the horrors these images depict. A more accurate term would be "images of child sexual abuse," because the production of these images involves the sexual abuse of a child. These images are thus permanent visual records of child sexual abuse. In the past several years, the children we have seen in these images have been younger and younger, and, very regrettably, the abuse depicted has been increasingly more severe and is often sadistic. As if the images themselves were not harmful enough, the sexual abuse inherent in child pornography is increasingly exacerbated by pedophiles who choose to disseminate these images to millions of people over the Internet with a few clicks of a computer mouse. Once on the Internet, the images are passed endlessly from offender to offender and perhaps used to whet the appetite of another pedophile to act out the deviant fantasies of the image on yet another child, thereby continuing the cycle of abuse. The Department of Justice is absolutely committed to obliterating this intolerable evil. The Department of Justice works continuously to identify the vulnerabilities of the child pornography industry and to attack them at every angle, both domestically and overseas. We are focusing our efforts on everyone, from the customer, to the website operator, to the facilitators - including those who provide credit card processing and subscription services. A concrete reflection of our intensified efforts is the fact that the Child Exploitation and Obscenity Section (CEOS) within the Department�s Criminal Division has generated a more than 445% increase in its caseload, including child pornography cases and investigations, handled in the past four years. In addition to increasing the sheer number of investigations and prosecutions brought by the Department�s prosecutors, the quality and import of the cases has increased substantially, with a focus on the producers, commercial distributors, and other high-impact offenders. The Department�s prosecutors in the 94 U.S. Attorney�s Offices are critical to the efforts to enforce federal laws prohibiting crimes against children. According to the Executive Office for United States Attorneys, total federal prosecutions of child pornography and abuse cases rose from 344 cases in FY 1995 to 1,576 cases in I?Y 2005, a 358% increase. The number of federal investigations of crimes against children continues to increase at an exponential rate. Because child pornographers continue to find ways to employ the everevolving technology of the Internet and computers to commit their deviant crimes, we in law enforcement must respond to these technological advances in order effectively to combat these crimes. In order to ensure our ability to do so, the Criminal Division created the High Tech Investigative Unit (HTIU) within CEOS in August 2002. The HTIU consists of computer forensic specialists who team with expert prosecutors to ensure the Department of Justice�s capacity and capability to prosecute the most complex and advanced offenses against children committed online. HTIU computer forensic specialists render expert forensic assistance and testimony in districts across the country in the most complex child pornography prosecutions conducted by the Department. Additionally, the HTIU regularly receives and reviews tips from citizens and non-governmental organizations, such as the National Center for Missing and Exploited Children, and initiates investigations from these tips. It is important to know that the Department�s specialized expertise in this area housed at CEOS and its HTIU is disseminated nationwide, greatly enhancing federal law enforcement�s fight against child pornography. CEOS conducts advanced training seminars on the investigation and prosecution of child exploitation cases attended by Assistant United States Attorneys and federal law enforcement agents from all over the country. CEOS also provides critical expert assistance to the field in a variety of other ways. CEOS attorneys are on call to answer questions from prosecutors in the field about how best to investigate or prosecute their cases. CEOS also keeps field agents and prosecutors abreast of current legal and technological developments through such mechanisms as its quarterly newsletter. Most importantly, CEOS� expert resources are widely employed by the United States Attorncys� Offices to resolve the most difficult issues presented in child exploitation cases and to ensure a successful prosecution. Child pornography is distributed over the Internet in a variety of ways, including: online groups or communities, file servers, Internet Relay Chat, e-mail, peer-to-peer networks, and commercial websites. The Department of Justice investigates and prosecutes offenses involving each of these technologies. Sophisticated investigative techniques, often involving undercover operations, are required to hold these offenders accountable for their crimes. For example, an investigation of a commercial child pornography website requires us not only to determine where the servers hosting the website are located and who are the persons responsible for operating the website, but also to follow the path of the financial transactions offenders use to purchase the child pornography, whether by credit card or other means. Such cases require detailed information about all aspects of the transaction in order to determine the identity and location of the offenders. Additionally, many of these cases require coordination with law enforcement from other countries. It is essential that these complex cases be handled by law enforcement agents and prosecutors with the necessary specialized expertise. To defeat the misuse of these various technologies, however, the Department must demonstrate equal innovation to that being shown by the online offenders. For example, CEOS� HTIU has developed a file server investigative protocol and software programs designed to identify quickly and locate individuals distributing pornography using automated file-server technology and Internet Relay Chat. Because file servers, or "f-serves," provide a highly effective means to obtain and distribute enormous amounts of child pornography files, 24 hours a day and 365 days a year, with complete automation and no human interaction, this trafficking mechanism is a premier tool for the most egregious child pornography offenders. The protocol recommends standards for identifying targets, gathering forensic evidence, drafting search warrants, and making charging decisions. It is designed for both agents and prosecutors to ensure that all aspects of these relatively complex investigations are understood by all members of the law enforcement team. The software program written by the HTIU automates the process of stripping from the computers used as file-servers all of the information necessary to make prosecutions against all of the individuals sharing child pornography with the file-server computer. In addition, law enforcement has launched several national enforcement initiatives against the use of peer-to-peer networks to commit child pornography offenses. These initiatives encompass operations by the FBI, the Department of Homeland Security, Immigration and Customs Enforcement (ICE), and state and local Internet Crimes Against Children Task Forces, which are funded through the Department�s Office of Justice Programs. To give you a sense of the scope and impact of federal law enforcement�s operations, FBI�s "Operation Peer Pressure," as of January 2006, has resulted in over 300 searches, 69 indictments, 63 arrests; and over 40 convictions. In addition, in recognition of the growing threat to children posed by the Internet, as part of the fiscal year 1998 Justice Appropriations Act (Pub. L. No. 105-1 19), the Department�s Office of Juvenile Justice and Delinquency Prevention (OJJDP) created a national network of state and local law enforcement cyber units to investigate cases of Internet crimes against children. The result is the Internet Crimes Against Children (ICAC) Task Forces. The ICAC Task Force program helps state and local law enforcement agencies develop an effective response to cyber enticement and child pornography cases. The help consists of forensic and investigative components, training and technical assistance, victim services, and community education. Forty-six task forces have been established throughout the nation. The ICAC program was developed to address the increasing number of children and teenagers using the Internet, the proliferation of child pornography, and heightened online activity by predators searching for unsupervised contact with underage victims. ICACs have played a critical role in law enforcement�s efforts to stop Internet criminal activity which poses harm to children. In FY 2003, ICACs received 3,741 reports of Internet crimes against children, including but not limited to traveler. enticement and child pornography complaints. In FY 2004, that number rose to 24,138. I n FY 2005, ICACs received 198,883 complaints of Internet crimes against children. The largest number of complaints (1 54,545) were reports of child pornography distribution, and the second largest number (34,062) were complaints of child pornography manufacturing. The dramatic increase from FY 2004 to FY 2005 in the number of child pornography manufacturing and distribution complaints is linked to ICAC undercover operations in Internet based file sharing applications (i.e., peer-to-peer networks). ICAC Task Forces efforts are resulting in the prosecution of many cases. For example, in the first six months of calendar year 2005, ICAC investigations resulted in 3,423 state charges and 563 federal charges. Also, as part of our strategy to focus on the most pervasive and detrimental forms of child pornography distribution, CEOS is currently coordinating 16 multidistrict operations involving child pornography offenders. These investigations of national impact have the potential for maximum deterrent effect on offenders. Nearly each one of the sixteen investigations involves hundreds or thousands, and in a few cases tens of thousands, of offenders. The coordination of these operations is complex, but the results can be tremendous. By way of example, the FBI is currently investigating the distribution of child pornography on various Yahoo! Groups, which are "member-only" online bulletin boards. As of January 2006, the FBI indicated that the investigation has yielded over 180 search warrants, 89 arrests, 162 indictments, and over 100 convictions. The Department of Justice is also working to identify and rescue victims depicted in images of child pornography. One method for achieving this goal is already underway. The FBI Endangered Child Alert Program (ECAP) was launched on February 21, 2004, by the FBI�s Innocent Images Unit, and is conducted in partnership with CEOS. The purpose of ECAP is proactively to identify unknown offenders depicted in images of child pornography engaging in the sexual exploitation of children. Since ECAP�s inception, seven of these "John Doe" subjects have been profiled by America�s Most Wanted, and with the assistance of tips from viewers, six have been identified. More importantly, 35 victims (so far) in Indiana, Montana, Texas, Colorado, and Canada have been identified as a result of this initiative. All of the victims had been sexually abused over a period of years, some since infancy. The Department will continue to ensure that this program is utilized to its maximum potential. The Department recently has had significant success in destroying several major child pornography operations. Three examples are an operation announced by Attorney General Gonzales on March 15, 2006, in which 27 individuals in four countries have been charged with child pornography offenses, the case of United States v. Mariscal (S.D. Fla.), and the Regpay case, which was followed by Operation Falcon (D.N.J.). In the recent operation announced by the Attorney General, a private Internet chat room was used by offenders worldwide to facilitate the trading of thousands of images of child pornography - including streaming videos of live molestations. The chat room was known as "Kiddypics & Kiddyvids," and was hosted on the Internet through the WinMX software program that also allowed users to engage in peer-to-peer file sharing. The chat room was infiltrated in an undercover investigation, resulting in charges against 27 individuals to date in the United States, Canada, Australia, and Great Britain (13 of these 27 have been charged in the United States). One of the 27 charged defendants is a fugitive. Seven child victims of sexual molestation have been identified as a result of the investigation, and four lleged molesters are among the 27 defendants charged to date in the continuing investigation. This investigation underscores the tremendous scope of many child pornography offenses and the necessity of an international law enforcement response. Demonstrating our ability to work together effectively to fight these crimes, the Department of Justice, the U.S. Immigration and Customs Enforcement, state and local authorities, Internet Crimes Against Children Task Forces, and international law enforcement agencies have cooperated successfully in this investigation. In the Mariscal case, Angel Mariscal received a 100-year prison sentence on September 30. 2004 in the Southern District of Florida, after he was convicted on seven charges including conspiracy to produce, importation, distribution, advertising, and possession with intent to sell child pornography. Mariscal traveled repeatedly over a seven-year period to Cuba and Ecuador, where he produced and manufactured child pornography, including videotapes of Mariscal sexually abusing minors, some under the age of 12. As a result of Mariscal�s arrest, his customers across the country were targeted in Operation Lost Innocence, which was coordinated by the U.S. Postal Inspection Service and CEOS. To date, Operation Lost Innocence has resulted in 107 searches, 55 arrests/indictments, and 44 convictions. The Regpay (D.N.J.) case, which led to Operation Falcon, is an example of how one child pornography investigation into the activities of individuals involved in a commercial website operation can lead to the apprehension of thousands of other offenders. Regpay was a Belarus- based company that provided credit card processing services to hundreds of commercial child pornography websites. Regpay contracted with a Florida company, Connections USA, to access a merchant bank in the United States. In February 2005, several Regpay defendants pled guilty to various conspiracy, child pornography, and money laundering offenses in the District of New Jersey. Connections USA and several of its employees also pled guilty in connection with this case. The Regpay investigation spawned the U.S. Immigration and Customs Enforcement�s "Operation Falcon," an international child pornography trafficking investigation that, as of February 2006, has resulted in 372 open investigations, 579 search warrants, 341 domestic and approximately 703 foreign arrests, and 254 indictments, generating 241 convictions. In addition to these efforts to protect children from online sexual exploitation, the Department is also involved in two key efforts to protect children from commercial sexual exploitation. The first of these is the "Innocence Lost Initiative," which combats domestic child prostitution. The Innocence Lost Initiative is conducted by CEOS in partnership with the Violent Crimes and Major Offenders Section of FBI Headquarters and the National Center for Missing and Exploited Children, and has so far resulted in at least 139 open investigations, 505 arrests, 60 complaints, 70 indictments, and 67 convictions. The second is our initiative to protect children from child sex tourism. Since the passage of the PROTECT Act in April 2003, which facilitated the prosecution of these cases, there have been approximately 50 sex tourism indictments or complaints and at least 29 convictions. While investigations of these types of cases are harder to track, we believe the number of active sex tourism investigations is roughly 60. Conclusion In these brief comments, I hope to have given you a sense of the Department of Justice�s efforts to protect children from sexual exploitation on the Internet. We consider this a critically important task and will continue to do our utmost to protect children as well as society at large by enforcing these statutes. Mr. Chairman. I again thank you and the Subcommittee for the opportunity to speak to you today, and I would be pleased to answer any questions the Subcommittee might have. Mr. Whitfield. Well, thank you for your testimony. Mr. Mercer, I want to get a better understanding of the layers of organizational supervision over the CEOS section in decision-making at the Department, and it is my understanding that Drew Oosterbaan is the head of the section. Is that correct? Mr. Mercer. He is the head of CEOS, yes. Mr. Whitfield. Okay. And that section is part of the Criminal Division. Is that correct? Mr. Mercer. That is correct. Mr. Whitfield. And Mr. Oosterbaan reports to the Deputy Assistant Attorney General for the Criminal Division. Mr. Mercer. That is also correct. Mr. Whitfield. And her name is Laura Parksy. Mr. Mercer. That is correct. Mr. Whitfield. And Mrs. Parsky reports to the Assistant Attorney General for the Criminal Division, who is Alice Fisher, is that correct? Mr. Mercer. That is correct. Mr. Whitfield. And Alice Fisher reports to Paul McNulty, the Deputy Attorney General. Mr. Mercer. That is correct, and that is who I work for. Mr. Whitfield. And you work for McNulty. Mr. Mercer. Correct. Mr. Whitfield. And McNulty reports to the Attorney General, Mr. Gonzalez. Mr. Mercer. That is correct. Mr. Whitfield. Okay. And that is the line of review for any decisions made by the Chief of the CEOS section? Mr. Mercer. That is an accurate description of the hierarchy that the Department of Justice has for that section. That is correct. Mr. Whitfield. Now, could you explain what your role is as Principal Associate Deputy Attorney General, as it relates to the decision-making at CEOS, the Child Exploitation and Obscenity Section? Mr. Mercer. Yeah, and in fact, if I can give a little additional context, obviously, the Deputy Attorney General has general, as sort of a chief operating official for the Department of Justice. The Federal Bureau of Investigation is part of the Department of Justice. Many other components are part of the Department of Justice. There are occasions where the Office of the Deputy Attorney General is asked to referee various conflicts, and in this area, our office would get involved, to the extent that there were different issues that needed to be resolved, where say, an Assistant U.S. Attorney, or a U.S. Attorney challenged the way a case was being worked, to the extent that there was a conflict with another section of the Department. So, it is important, I think, for the committee to understand that CEOS plays a crucial role in coordinating cases, in leading these multi-jurisdictional investigations, providing advice, training, and counsel, but you also have within the United States, 93 U.S. Attorneys and 94 districts, and you have a number of Assistant U.S. Attorneys around the country that are also responsible for prosecuting these cases. As is reflected in my statement, that is how we have been able to charge such a large number of cases. We have charged 1,500 cases involving child pornography and coercion and enticement just in fiscal year 2005. Mr. Whitfield. Okay. Mr. Mercer. So, that is the role that we play, and I mentioned this Project Safe Childhood initiative. The Deputy Attorney General has worked very closely with the Attorney General in shaping that initiative, which we believe is going to lead to even greater production in this area the committee is so interested in. Mr. Whitfield. Well, today, one of the focuses of this hearing relates to information that came out of Justin Berry�s testimony, and that, particularly, relates to CEOS and their decisions, because he provided them with a lot of information regarding 1,500 people that were using his website, credit card numbers, whatever whatever. And so, I would like to ask you, do you have any decision-making authority over CEOS yourself? Mr. Mercer. No. CEOS reports to the Assistant Attorney General for the Criminal Division, but I think, given my role as a U.S. Attorney, what I have seen in the country, what I have seen in my work in the Deputy Attorney General�s Office, I can be helpful to the committee, not in terms of talking about this specific investigation, which the Department wouldn�t do. Mr. Whitfield. Yeah. Mr. Mercer. If the committee had said we want to ask about why a person was charged, why a case was declined, why an investigation was pursued this way, that isn�t something we are going to do during the pendency of a case, but I think I can be helpful, in terms of understanding how these cases are made, and it would be of value to the committee. Mr. Whitfield. Well, I do hope that you will report back to them that, since you don�t have any decision-making over CEOS at all, and you do have a broad background in criminal justice and prosecution, but we were specifically interested in the CEOS decision-making as it relates to this case, and I hope you would convey our disappointment about that. Now, did you have any involvement in Justin Berry�s immunity agreement? Mr. Mercer. No. Mr. Whitfield. All right. Mr. Mercer. But again, Mr. Chairman, it wouldn�t matter who the Department�s witness was. The Department doesn�t participate in ongoing discussions when we have a case that is pending. That is something that certainly would not advance the purpose-- Chairman Barton. Would the Chairman yield on that point? Mr. Whitfield. Yes, sir. Chairman Barton. What is the appropriate title that I should call you, Mr. Deputy, or Mr. Attorney General, or Mr. Associate Principal Deputy? I mean, I am a little confused here. Mr. Mercer. I wear two hats. I am the U.S. Attorney in the District of Montana, and I am also the Principal Associate Deputy Attorney General, so-- Chairman Barton. What do you want me to call you? Mr. Mercer. Mr. Mercer is fine. Chairman Barton. Okay, Mr. Mercer. Have you ever actually led an investigation or prosecuted a case? Mr. Mercer. Oh, yeah. I was an Assistant U.S. Attorney for 7 years before I became a U.S. Attorney. Chairman Barton. All right. When you were leading this investigation or prosecuting this case, I assume that you wanted to talk to the witnesses, if possible, if you knew who they were, to the crimes that were committed. Is that true or not true? Mr. Mercer. Well, actually, the role of investigating cases is typically carried out by investigative agencies, so in the FBI-- Chairman Barton. Well, let us say the investigative agency that you were working with, you said this is the investigation. Here is who you need to go see. They went out and came back, said oh, those people don�t want to talk to us. But their best friends, or their boyfriend or their girlfriend, who they talked to the case about, will talk to us, how did you take that? Mr. Mercer. I am not sure I understand the question. Chairman Barton. Well, let me be clear. We didn�t ask for you. Okay? We have asked for Laura Parsky, who is in the direct line of chain of command. We didn�t get her. We have asked her for Alice Fisher. We didn�t get her. We have asked for Drew Oosterbaan. We didn�t get him. We got you. Now, you are a fine gentleman, but you are not even in the line of command. You are staff. You have no control over this. You probably had to be briefed to come testify. Now, let me be straight. I am calling the Attorney General, my friend from Texas, who I know personally. We are going to get the people we want, one way or the other. Do you understand that? Not that I am not impressed with your background, but when you are conducting your investigations, you don�t talk to secondary people. You talk to the people you want to talk to. When the FBI is conducting an investigation, they talk to the people they want to talk to. They don�t talk to, well, we can�t talk to you, but go see the neighbor down the street. Mr. Whitfield is much more polite than I am, but I am fed up with this. I had to call the Attorney General to get you here, and it is not that we are not impressed with you, don�t misunderstand me, but you are not the people that are doing this. We want to work with you, but in order to do that, we have got to get the people that are actually doing the work. We could have picked somebody at random in the audience, and gave them a 30-minute brief, and they could have testified to what you testified to. Mr. Mercer. Well, Mr. Chairman, I am confident that I can be helpful to the committee. Chairman Barton. Well, you had better start. Mr. Mercer. Not only because I have done this work as an Assistant U.S. Attorney, and then a U.S. Attorney, and then as Chair of the Attorney General�s Advisory Committee. Chairman Barton. Your credentials are not at risk. We are not questioning your credentials as an admirable citizen, but we are questioning the judgment of the Justice Department of the United States of America, who seems to think they can thumb its nose at the Congress of the United States. Mr. Mercer. Well, we-- Chairman Barton. And that will not happen. I am going to tell the Attorney General straight, but you go back and tell him for me, or report to the Deputy Attorney General, who will report to the Attorney General, that we are going to hold another hearing, and these people are going to be here. Now, if you want to sit out in the audience, that is fine. If you want to stand up beside him and hold their hand, that is fine. They are going to be here, and hopefully, the cameras will be here, and the committee will be here, and we will finally get this investigation going. I yield back to you, Mr. Chairman. Mr. Whitfield. Well, thank you, Mr. Chairman, and I think Mr. Mercer gets a clear understanding of how we feel about this issue, and there is a lot of cynicism about the Congress in a lot of different areas, but in this area of child pornography, when we do request certain people from the Justice Department, who are involved in the investigations, they can talk to us specifically about issues, and then they just thumb their nose and do not attend the hearing, it does upset all of us, and it particularly upsets us that in the Justin Berry case, when 1,500 names were given to the Justice Department, to the CEOS section, and individual names and pictures of young children being molested, in danger, given to the Department, and still no action has been taken, it is something that we find particularly upsetting And let us see, my time has expired as well now, so I will recognize the gentleman from Michigan, Mr. Stupak. Mr. Stupak. Mr. Chairman, in light of not having the witnesses we need, why don�t we just adjourn this hearing until we get the witnesses we need? We have subpoena power on this committee. I urge that we use our subpoena power. And we have next panel, one, two, three, four, five, six, seven people, that I don�t think are going to able to provide us any i nformation. I mentioned two other people in my opening statement I would like to see here. They are not here. You went through a list of people you requested. They are not here. I think on this side, on both sides of the aisle here, we are frustrated with not having the people who can answer questions. Chairman Barton. Will the gentleman yield? Mr. Stupak. Yes, sir. Chairman Barton. We may want to release Mr. Mercer, but some of the other witnesses that are here on the second panel, from the Postal Service and the Immigration Service have been working with the committee, and I think we need to give them a chance to testify. I am not at all opposed, if it is the will of the committee, to-- Mr. Stupak. Then I would move we let Mr. Mercer go until we get the people from Justice we need, and then, let us bring the other witnesses up and do their opening statements. We will have votes here in a few minutes, and let them do their openings, and let us go move on, because we don�t want to waste everyone�s time with a witness that can�t answer questions. Mr. Whitfield. Is there any objection to releasing Mr. Mercer? Well, then, Mr. Mercer, you are released, and thank you for being here today. At this time, I will call the second panel: Mr. William Kezer, who is the Deputy Chief Inspector for the U.S. Postal Inspection Service; Mr. Raymond C. Smith, Assistant Inspector in Charge for Child Pornography and Adult Obscenity, the U.S. Postal Inspection Service; Mr. John Clark, Deputy Assistant Secretary for U.S. Immigration and Customs Enforcement, U.S. Department of Homeland Security; Mr. James Plitt, Director, Cyber Crimes Center, Office of Investigations, U.S. Immigration and Customs Enforcement, at the Department of Homeland Security; Mr. Frank Kardasz, Sergeant, Phoenix Police Department, Project Director for the Arizona Internet Crimes Against Children Task Force; Mr. Flint Waters, Lead Special Agent of the Wyoming Division of Criminal Investigation, Internet Crimes Against Children Task Force; and Mr. Chris Swecker, who is the Acting Assistant Executive Director for the FBI, U.S. Department of Justice. I want to thank all of you gentlemen for being with us here today, and as you know, this is an Oversight and Investigations hearing, and it is our practice to take testimony under oath. Do any of you object to testifying under oath, and do any of you have a need for an attorney today? Then, if you would please stand, and I would like to swear you in. Raise your right hand. [Witnesses sworn.] Mr. Whitfield. Thank you very much. All of you are now under oath, and Mr. Swecker, you are recognized for 5 minutes for your opening statement. STATEMENTS OF CHRIS SWECKER, ACTING ASSISTANT EXECUTIVE DIRECTOR, FEDERAL BUREAU OF INVESTIGATION, UNITED STATES DEPARTMENT OF JUSTICE; JAMES PLITT, DIRECTOR, CYBER CRIMES CENTER, OFFICE OF INVESTIGATIONS, UNITED STATES IMMIGRATION AND CUSTOMS ENFORCEMENT, UNITED STATES DEPARTMENT OF HOMELAND SECURITY; DR. FRANK KARDASZ, SERGEANT, PHOENIX POLICE DEPARTMENT, PROJECT DIRECTOR, ARIZONA INTERNET CRIMES AGAINST CHILDREN TASK FORCE, UNITED STATES DEPARTMENT OF JUSTICE; FLINT WATERS, LEAD SPECIAL AGENT, WYOMING DIVISION OF CRIMINAL INVESTIGATION, INTERNET CRIMES AGAINST CHILDREN TASK FORCE TECHNOLOGY CENTER, UNITED STATES DEPARTMENT OF JUSTICE; JOHN P. CLARK, DEPUTY ASSISTANT SECRETARY, UNITED STATES IMMIGRATION AND CUSTOMS ENFORCEMENT, UNITED STATES DEPARTMENT OF HOMELAND SECURITY; WILLIAM E. KEZER, DEPUTY CHIEF INSPECTOR, UNITED STATES POSTAL INSPECTION SERVICE; AND RAYMOND C. SMITH, ASSISTANT INSPECTOR IN CHARGE, CHILD PORNOGRAPHY AND ADULT OBSCENITY, UNITED STATES POSTAL INSPECTION SERVICE Mr. Swecker. Good morning, Mr. Chairman, and I do appreciate the opportunity to come here today to talk to the committee. Let me talk a little bit about our Innocent Images Initiative, and define the scope of the problem, as you already know. As the National Center for Missing and Exploited Children has reported, one in five children will be solicited while online. Unfortunately, only 10 percent of these children will ever report it. In its 8 years of operation, the Cyber TipLine has generated over 385,000 leads, and reports of online enticement have increased by 400 percent. The FBI�s Innocent Images Initiative, formed in 1993, is comprised of 36 undercover operations nationwide. These operations involve FBI agents working online in an undercover capacity to seek child predators and individuals responsible for the production, dissemination, and possession of child abuse images. This is accomplished by using a variety of techniques, including purchasing child abuse images from commercial websites, creating online personas to chat in predicated chat rooms, and co-opting predators� email accounts. Our primary focus is addressing child pornography or documented child abuse websites, where predators are featured abusing children and profit from these terrible crimes. These investigations always span multiple jurisdictions, and usually expand beyond the borders of the United States. The FBI has taken a global approach in addressing this problem, by closely partnering with several countries, who work side by side with FBI agents in a task force setting. As I sit here today, officers from Norway, Thailand, the Philippines, and Belarus are working with our agents just a few miles from where we are here. Additionally, task force membership includes officers from 11 other countries and Europol. Other priorities include persons or groups who engage in production of child abuse images, as the production of this material signifies the violent rape or sexual abuse of a child. We also investigate sexual predators who travel from one jurisdiction to another to engage in sex with minors. These persons are particularly dangerous, as they have gone beyond merely looking at images, and have now engaged in activity to make contact with a child. However, these predators often find a cadre of agents and task force officers on the other end. Persons with large collections of child abuse images also represent a danger, as we find a large percentage of those we arrest for possession are also committing contact offenses with minors. Over the past 10 years, the Innocent Images program has grown exponentially. Between fiscal years 1995 and 2005, there has been a 2050 percent increase in cases opened, from 113 to 2,500. During this 10-year period, the program has recorded over 15,556 cases opened, over 4,700 criminals charged, over 6,100 subjects arrested, over 4,800 convictions obtained. These cases, which led to these statistics, were multi-jurisdictional with no geographical boundaries, and both national and international in scope. We have come a long way from the early electronic bulletin boards that predated the Internet. Today, an estimated 21 million teenagers use the Internet, with 50 percent online daily. As these children use the computer more and more, online predators take advantage of emerging technologies to facilitate their unimaginable criminal activities. Today, this program is an intelligence-driven, proactive, multi-agency initiative that pursues offenders who utilize websites, chat rooms, peer-to-peer networks, instant messaging programs, eGroups, newsgroups, fileservers, and other online services. To address all of our priorities, this program readily draws on the resources of State, local, and Federal, and now international law enforcement partners. While conducting these investigations, agents have found documented child abuse to be readily available using the most basic of search terms. As an example, child abuse images were easily available when innocuous search terms, such as "Britney Spears" or the word "young" were used. Through the use of covert techniques and administrative subpoenas, agents can determine which individual users possess and distribute these images over the Internet. Using search warrants, interviews, and computer forensic tools, our agents can strengthen their cases to eventually arrest and prosecute the criminals. As you may have noticed, I have not used the word "child pornography," because it does not adequately describe the type of crime that we are talking about today. To some people, pornography may imply adult models posing for the camera. "Child pornography" does not describe the reality of the crime problem we are facing today. This crime deals with the violent rape and sexual exploitation of young children, some as young as a few months old. Therefore, each image represents evidence of the criminal reality of a violent rape or sexual abuse. The FBI has partnered with the National Center for Missing and Exploited Children in a significant and meaningful way. Currently, there are two Special Agents and four FBI analysts assigned full time at the Center, and in March of 2005, we merged our database, the Child Victim Identification Program, with that housed at the Center. The merger has drastically increased the number of known victims in the database, and has made the data available to all other law enforcement agencies that investigate these violations. Ultimately, this partnership benefits both the FBI and the Center, but more importantly, it benefits the public and the children we serve. I am not sure about time here, sir. How much time do I have? Mr. Whitfield. You are about 10 seconds over. Mr. Swecker. Okay. All right. Well, I would just rest on the rest of the data in my opening statement. Mr. Whitfield. Okay. Mr. Swecker. And I would just say that I am, first and foremost, I am a Special Agent. I have come through the ranks. I have supervised investigations of this nature. I hope I can help you today. [The prepared statement of Chris Swecker follows:] Prepared Statement of Chris Swecker, Acting Assistant Executive Director, Federal Bureau of Investigation, United States Department of Justice Good Morning Chairman Whitfield, Ranking Member Stupak, and other members of the Subcommittee. On behalf of the FBI, I would like to thank you for this opportunity to address the FBI�s role in combating the sexual exploitation of children through the use of the Internet. As the National Center for Missing and Exploited Children (NCMEC) has reported, one in five children will be solicited while online. Unfortunately, only ten percent of these children will report it. In its eight years of operation, the Cyber tipline has generated over 385,000 leads and reports of online enticement have increased by four hundred percent. The FBI�s Innocent Images National Initiative is comprised of thirty six under-cover operations nationwide. These operations involve FBI Agents working on-line in an undercover capacity to seek child predators and individuals responsible for the production, dissemination, and possession of child abuse images. This is accomplished by using a variety of techniques, including purchasing child abuse images from commercial web sites, creating on-line personas to chat in predicated chat rooms, and co-opting predators� e-mail accounts. Our primary focus is addressing commercial child abuse image websites where predators are featured abusing children and which profit from their terrible crimes. These investigations always span multiple jurisdictions and usually expand beyond the borders of the United States. The FBI has taken a global approach in addressing this problem by closely partnering with several countries who work side by side with FBI agents in a task-force setting. As I sit before the Subcommittee today, officers from Norway, Thailand, the Philippines, and Belarus are working with our agents just a few miles from here. Additionally, task force membership includes officers from 11 other countries and Europol. Other priorities include persons or groups who engage in the production of child abuse images, as the production of this material signifies the violent rape or sexual abuse of a child. We also investigate sexual predators who travel from one jurisdiction to another to engage in sex with minors. These persons are particularly dangerous as they have gone beyond merely looking at images and have now engaged in activity to make contact with a child. However, these predators often find a cadre of FBI agents and task force officers on the other end of their travel. Persons with large collections of child abuse images also represent a danger as we find a large percentage of those we arrest for possession, are also committing contact offenses with minors. Over the past 10 years, the Innocent Images program has grown exponentially. Between fiscal year 1996 and 2005, there has been a 2050% increase in cases opened (113 to 2500). During this ten-year period, the program has recorded over 15,556 cases opened; 4,784 criminals being charged; 6,145 subjects being arrested; and 4,822 convictions obtained. The cases which led to these statistics were multi-jurisdictional with no geographical boundaries, and both national and international in scope. We have come a long way from the early electronic bulletin boards that pre-dated the Internet. Today an estimated 21 million teenagers use the Internet, with 51 percent online daily. As children use computers more and more, online child predators take advantage of emerging technologies to facilitate their unimaginable criminal activities. Today, this program is an intelligence-driven, proactive, multi-agency investigative effort, that pursues offenders who utilize websites, chat rooms, peer-to-peer networks, Instant Messaging programs, eGroups, NewsGroups, File Servers, and other online services to sexually exploit children. To address all of our priorities, this program readily draws on the resources of its federal, state, local, and now international law enforcement partners. While conducting these investigations, FBI agents have found child sexual abuse images to be readily available using the most basic of search terms. As an example, child abuse images were easily available when innocuous search terms were used, such as "Brittney Spears" or the word "young." Through the use of covert investigative techniques and administrative subpoenas, FBI agents can determine which individual users possess and distribute child abuse images over the Internet. Furthermore, utilizing search warrants, interviews, and computer forensic tools, our agents can strengthen their cases to eventually arrest and prosecute these dangerous criminals. As you may have noticed throughout my presentation, I have not used the phrase "child pornography," because it does not adequately describe the type of crime we are talking about today. To some people, pornography may imply adult models posing for the camera. Child pornography does not describe the reality of the crime problem we are facing today. This crime deals with the violent rape and sexual exploitation of young children, some as young as a few months old. Therefore, each image represents evidence of the criminal reality of a violent rape, or sexual abuse of a child. The FBI has partnered with NCMEC in a significant and meaningful way. Currently there are two FBI Special Agents and four FBI support personnel assigned full time at the Center. Further, in March of 2005, the FBI merged its Child Victim Identification Program (CVIP) Database with that housed at the National Center. This merger has drastically increased the number of known victims in the CVIP database and has made FBI data available to all other law enforcement agencies that investigate these violations. Ultimately this partnership benefits both the FBI and the National Center, but more importantly it benefits the children we serve. In June of 2003, the FBI, along with our partners in the Department of Justice, Child Exploitation and Obscenity Section, and NCMEC implemented the "Innocence Lost National Initiative" to address the growing problem of child prostitution. Initially, the FBI identified 14 field offices with a high incidence of child prostitution. In FY 2005 and through the first quarter of FY 2006, an additional ten field offices were identified as areas in which these criminal enterprises were operating. These criminal enterprises use the Internet to advertise the children they have forced or tricked into prostitution, often masquerading as escort services, which leads to further victimization of the children. These investigations are manpower intensive, intelligence driven and make use of sophisticated investigative techniques such as Title III wiretaps. To date, five FBI field offices have utilized Title III wiretaps in these investigations. As a result, since FY 2004, 166 cases were opened, 28 criminal enterprises disrupted, 16 enterprises dismantled, 101 individuals indicted, 75 subjects convicted and 80 seizures claimed. Since the inception of Innocence Lost, over 300 children have been recovered. According to NCMEC, in FY 2005 there were 7,000 reports of endangered runaways and 774 reports of children involved in or suspected of being involved in child prostitution. FBI personnel assigned to the NCMEC review these intake reports daily and disseminate the information to the appropriate FBI field office for investigation. Conclusion In closing, the FBI looks forward to working with other Law Enforcement agencies, private industry, and the Department of Justice�s prosecutors in continuing to combat this heinous crime problem. The protection of our children requires the combined efforts of all sectors of our society. I would like to express my appreciation to the Subcommittee for addressing this very serious problem, and I would also like to thank Chairman Whitfield, Ranking Member Stupak, and the Subcommittee for the privilege of appearing before you today. Mr. Whitfield. Thank you very much. And Mr. Plitt, you are recognized for your 5 minutes, and you are Director of the Cyber Crimes Center at the Homeland Security. Mr. Plitt. Yes, Mr. Chair. I appreciate the opportunity to present some additional information about the Cyber Crimes Center today, its responsibilities with respect to investigating child exploitation. Our Cyber Crime Center is C3, recognized nationally and internationally as a leader in the investigation of international criminal activities conducted or facilitated by the Internet. Created in 1997, C3 brings the full range of ICE�s technical services, such as digital media forensics, and cyber investigative services together in a single location to investigate the cyber aspects of violations of immigration and customs law. Contrary to general perceptions, C3 does not currently investigate what would be termed as more traditional cyber crimes, as hacking, denial of service, or phishing. In addition to trans-border child exploitation crime, C3 investigates other trans-border crimes, such as international money laundering, illegal cyber banking, illegal arms trafficking, derivative pharmaceuticals sold over the Internet, intellectual property rights violations. C3 essentially serves as the mission control for ICE�s Internet-related investigations by refining investigative leads generated by domestic and international sources, validating those leads, that constitute immigration and customs violations, and working in partnership with the ICE field offices to implement the various investigations through national training, best practices. Meeting with our foreign counterparts and more than 50 attach� locations, C3 builds strong international partnerships that are crucial to the trans-border category of investigations. ICE derives its trans-border child exploitation investigative authorities from its customs responsibility to prevent the smuggling of contraband, such as child pornography, and its immigration responsibility, to investigate and administratively remove foreign nationals guilty of crimes of moral turpitude. As a result, ICE limits its child exploitation investigations to two situations: one, when there is a reasonable nexus to the U.S. border; and when, as a second situation, when ICE�s assistance is specifically requested by international, Federal, State, or local law enforcement prosecutors. Currently, ICE participates in approximately 60 of the Internet Crimes Against Children Task Forces across the country, to assist their State and local law enforcement officers with the trans-border component of their investigations. Through this trans-border specialization, ICE is able to focus its resources to achieve better resource efficiency and develop investigative projects that maximize the international partnerships. C3�s Child Exploitation Section coordinates their responsibilities through Operation PREDATOR, the program that organizes trans-border child exploitation investigations, including those of criminal alien child predators, international child sex tourists, international smugglers and traffickers of children for sexual purposes, and Internet child pornographers. ICE, through the Crimes of Exploitation Section, has achieved notable operational efficiencies. For example, with less than 3 percent of ICE�s worldwide investigative resources, ICE manages more than 1,000 investigations annually, concerning international child sex tourism, and international Internet child pornography cases alone. Previous testimony from Mr. Clark is going to detail some of those accomplishments. C3�s Child Exploitation Section is also responsible for managing and implementing all phases of the systems development life cycle for the National Child Victim Identification System. Mr. Clark will go into more detail about that, as well. And C3 is responsible for maintaining partnerships with non-government organizations. Some of the non-government organizations would include the National Center for Missing and Exploited Children, ECPAT, i-SAFE, and World Vision. With respect to the Internet portion of ICE�s international child exploitation investigations, C3 supports the ICE offices, and upon request, foreign law enforcement operations, by providing training and investigative support. While prudence recommends that the details of C3�s technical investigative methods perhaps not be communicated in a public forum, some appropriate examples would include the development of undercover websites, making undercover purchases of websites, and communicating through undercover methods with investigative targets. C3 provides these services on investigations involving all Internet technologies, including commercial and noncommercial websites, peer-to-peer groups, newsgroups, and Internet Relay Chat channels. C3 will continue patrols on all these Internet environments for the trans-border aspect of individual illegal downloads, criminal conspiracies, and illegal commercial operations, through its presence in public areas and court-ordered intercepts. C3 draws on ICE�s renowned international money laundering prowess to trace associated financial transactions, including the new e-currency methods, and of course, to seize instrumentalities and proceeds. C3�s latest endeavor involves the development and implementation of systems, telecommunications, and operational processes that directly link to the international Internet child exploitation investigative organizations of other countries. The end result is innovative, collaborative project, maybe the implementation of the first non-investigation-specific virtual, worldwide law enforcement task force on trans-border child exploitation. In summary, ICE investigations focus on the trans-border aspect of child exploitation over the Internet. These investigations are organized under Operation PREDATOR, and coordinated by ICE C3. ICE is honored to work with any individual or organization that is interested in protecting children, making the Internet a safe and enjoyable place. ICE C3 knows that it cannot alone substantially impact the macro problem of Internet child safety. A coordinated, cooperative approach between all the aforementioned participants is vital, and the most important participants on these teams are parents. Parents are physically and emotionally closer to teach and guard the potential victims, the children. Parents, in addition to the children, are also the most impacted by the offline consequences of online behavior. Thank you. Mr. Whitfield. Thank you. Dr. Kardasz, you are recognized for 5 minutes, and you are Project Director of the Arizona Internet Crimes Against Children Task Force, and we welcome you. Mr. Kardasz. Thank you, Mr. Chairman, and distinguished members of the committee, thank you for permitting me to speak today. Arizona joined the ICAC, you will also hear it called ICAC, Task Force Program in the year 2000. We work cooperatively with our law enforcement colleagues from the FBI, ICE, Postal Inspection Service, and the Secret Service. Although the names of our agencies differ, we share the common goal of trying to keep children safe from Internet sexual predators and child pornographers. The Arizona ICAC Task Force has recorded over 2,000 investigations and over 200 arrests. Although Arizona has the toughest laws in the Nation against child pornography, this has not stopped the trafficking of unlawful images, and like all of our colleagues nationwide, we have many more solvable case files at the ready than we have personnel and resources to bring in the offenders. Sadly, while these cases await investigation, children and teens continue to suffer at the hands of Internet sex offenders. I have had the opportunity to speak with many citizen groups about Internet crime, and at the end of each presentation, there is often some senior individual in the group who raises his hand and says: "Why don�t they just shut that dang Internet thing off?" As if we have a control panel somewhere with a dial that we can turn, and it will regulate Internet misconduct. Your legislation is the closest thing we have to an Internet control dial, and although opponents of controls argue that regulations are costly, imperfect, and violations of Constitutional freedoms, I sometimes wonder what the framers of the Constitution would have thought if they had known what we know now about computers and the Internet. Would they have permitted the Internet crimes against children that we are witnessing today? I would like to talk about two things today, the threat from those predators who are using social networking sites, and the legal help we need regarding data retention by Internet service providers. The luring of minors for sexual exploitation remains a continuing threat to our youth. Beyond the chat rooms that predators have always frequented, social networking sites are now wildly popular, and there are dozens of such free sites, including MySpace, Xanga, Friendster, Facebook, and others. Curious young people visit the sites every day, and post images and personal information about themselves. They can browse and search for others, according to age, sexual preference, zip code, and school name. They can communicate with one another, and then arrange to meet in person, and as you might imagine, the sites are also popular among sexual predators. We received a phone call a few months ago from an Arizona woman who said that her young daughter, while using a social networking site, was contacted by a man from their neighborhood who she knew as a registered sex offender. We found the man�s webpage, where he described himself as a kindly lover of poetry, plants, and flowers, who was seeking female friendship for dating. Fourteen other young people were listed on his profile as friends, with whom he had networked through the site. There was no mention, of course, in his profile that he is a high risk registered sex offender in Arizona. Now, since that time, the original webpage is no longer available at the site, but there is nothing stopping him from re-subscribing to the same site, or one of the many other sites, under another assumed name. The use of the sites by sexual predators remains a serious threat to our safety and the safety of our children. Now, this problem will likely get worse before it gets better, as kids flock to the sites and more communities, schools, libraries, and businesses provide unrestricted Internet access through wireless access points that sometimes leave law enforcement investigations at a dead end. My written attachments contain some suggestions for improving the social networking site environment, but in the interest of time, I don�t want to review them all now. I would like to talk about an item of great importance to my investigative colleagues nationwide. Last week, I sent a survey to Internet crimes against children investigators at all of our nationwide affiliates throughout the United States. The survey asked one question: what law could be created or revised to assist investigators who work cases involving Internet crimes against children, and the most frequent response involved data storage by Internet service providers, and the retrieval of data from Internet service providers. What our people are telling us is that investigators need ISPs to retain subscriber and content information so that when legal process, in the form of a subpoena or search warrant, are served, there is data remaining with the ISP that the investigator can use to find the offender. Now, most ISP organizations are operated by conscientious and professional business people who are equally horrified, as are we all, by Internet crimes against children. Some ISPs have graciously extended themselves to help investigators. Some reluctant ISPs will only assist to the extent that the law mandates them to assist. Mandating that ISPs retain data is not a privacy violation. Law enforcement only needs the data preserved, but not disclosed to us, except in response to legal process. Internet industry professionals may cite the financial burden of data storage, but consider the potential cost of not retaining data. For example, when law enforcement is seeking a predator identifiable only by the information associated with a screen name, but the responsible ISP did not preserve the information, the investigation ends, while the predator roams free. Based on the requests of my colleagues, I respectfully ask for two improvements to the law: one, that Internet service providers be mandated to retain information about subscribers for at least 1 year, with penalties for noncompliance; and two, that Internet service providers be mandated to respond to subpoenas involving crimes against children investigations within 1 week of receiving a subpoena, and more quickly under exigent circumstances, where a child is missing. I will conclude by saying that investigators need your help in order to navigate those dark alleys of the Internet, where they work diligently to help protect children. I recognize that turning the Internet control dial comes with a cost, but failing to turn the dial carries a greater human cost to our young people. Thank you, sir. [The prepared statement of Dr. Frank Kardasz follows:] Prepared Statement of Dr. Frank Kardasz, Sergeant, Phoenix Police Department, Project Director, Arizona Internet Crimes Against Children Task Force, United States Department of Justice Congressman Stupak and distinguished members of the sub-committee, thank you for permitting me to speak today. Arizona joined the Internet Crimes Against Children (ICAC) Task Force Program in 2000. We work cooperatively with our law enforcement colleagues from the FBI, ICE, Postal Inspection Service and the Secret Service. Although the names of our agencies differ, we all share the common goal of trying to keep children safe from Internet sexual predators and child pornographers. The AZ ICAC Task Force has recorded over 2,000 investigations, with over 200 arrests. Although Arizona has the toughest laws in the nation against child pornography, this has not stopped the trafficking of unlawful images, and like all of our colleagues nationwide, we have many more solvable case files at the ready than we have personnel and resources to bring in the offenders. Sadly, while these cases await investigation, children and teens continue to suffer at the hands of sex offenders. I have had the opportunity to speak with many citizen groups about Internet crime, and at the end of each presentation there is often some senior individual in the group who raises a hand and asks: "Why don�t they just switch that whole dang Internet thing off!"...as if we have a control panel somewhere with a dial that we can turn and it will regulate Internet misconduct. Legislation is the closest thing we have to an Internet control dial. Although opponents of controls argue that regulations are costly, imperfect and violations of constitutional freedoms, I sometimes wonder what the framers of the Constitution would have thought if they had known what we now know about computers and the Internet. Would they have permitted the Internet crimes against children that we are witnessing today? I would like to talk about two things today: the threat from those predators who use social networking sites, and the legal help we need regarding data retention by Internet service providers. The luring of minors for sexual exploitation remains a continuing threat to our youth. Beyond the chat rooms that predators have always frequented, social networking sites are now wildly popular. There are dozens of such free sites, including MySpace, Xanga, Friendster, Facebook, and others. Curious young people visit the sites every day and post images and personal information about themselves. They can browse and search for others according to age, sexual preference, zip code or school name. They can communicate with one another and then arrange to meet in person. And as you might imagine, the sites are also popular among sexual predators. We received a phone call a few months ago from an Arizona woman who said that her young daughter, while using a social networking site, was contacted by a man from their neighborhood who was know to her as a registered sex offender. We found the mans web page where he described himself as a kindly lover of poetry, plants and flowers who was seeking female friendship for dating. Fourteen other young people were listed on his profile as friends with whom he had networked through the site. There was no mention on his profile that he is a high-risk registered sex offender in Arizona. Since that time the mans original web page is no longer available at the site, but there is nothing stopping him from re-subscribing to the same site or one of the many other sites under another assumed name. The use of the sites by sexual predators remains a serious threat to the safety of our children. The problem will likely get worse before it gets better as kids flock to the sites and more communities, schools, libraries and businesses provide unrestricted Internet access through wireless access points that sometimes leave law enforcement investigations at a dead end. My written attachments contain some suggestions for improving the social networking site environment, but in the interest of saving time I do not wish to review them all now. I would like to talk about an item of importance to my investigative colleagues nationwide. Last week I sent a survey to Internet crimes against children (ICAC) investigators at all of our nationwide affiliates throughout the United States. �The survey asked one question: What law could be created or revised to best assist the investigators who work cases involving Internet crimes against children? The most frequent response involved data storage by Internet service providers and the retrieval of data from Internet service providers. What our people are telling us is that investigators need ISP�s to retain subscriber and content information so that when legal process in the form of a subpoena or search warrant are served, there is data remaining with the ISP that will help the investigator find the offender. Most ISP organizations are operated by conscientious and professional business people who are horrified by Internet crimes against children. Some ISP�s have graciously extended themselves to help investigators. Some reluctant ISP�s will only assist to the extent that the law mandates them to assist. Mandating that ISP�s retain data is not a privacy violation. Law enforcement only needs the data preserved but not disclosed to us, except in response to legal process. Internet industry professionals may cite the financial burden of data storage, but consider the potential human cost of not retaining data.� For example, when law enforcement is seeking a predator identifiable only by the information associated with his screen name, but the responsible ISP did not preserve the information, the investigation ends while the predator roams free. Based on the requests of my colleagues I respectfully ask for two improvements to the law: That Internet service providers be mandated to retain information about subscribers for at least one year, with penalties for non-compliance. That Internet service providers be mandated to respond to subpoenas involving crimes against children investigations within one week of receiving a subpoena, and more quickly under exigent circumstances where a child is missing. I will conclude by saying that investigators need your help in order to navigate those dark alleys of the Internet where they work diligently to help protect children. I recognize that turning the Internet control dial comes with a cost, but failing to turn the dial carries a greater human cost to our young people. Thank you again. Supplemental Materials to the Testimony of Dr. Kardasz Internet Social Networking Sites� Recent disturbing incidents involving Internet crimes against children have been prominent in the media. In some incidents, the crimes have involved suspects and victims who met each other via Internet social networking sites. Social networking sites are places on the Internet where people can meet one another, communicate and interact.� Social networking and communication are normal parts of the human experience. The Internet has become an important venue for people to network and interact. Young people are naturally curious about themselves, about others, and about the world. The sites permit them to reach out to others from around the globe, sometimes with tragic results.� There are many social networking sites. Some of them are listed below: Myspace.com -Livejournal.com --Facebook.com -Friendsfusion.com -- Friendster.com -Intellectconnect.com --Dittytalk.com -Prisonpenpals.com --Cozydating.com --Zogo.com --Interracialsingles.net Why are the sites popular? Most of the social networking sites are free and supported by advertisers who hope users will buy products or services advertised on the sites. Young people who are curious and seeking relationships and new experiences visit the sites to find others.� How do the sites work? Any computer with Internet access can be used to permit someone to join a site. Some sites require only that the registrant provide an email address and often there is no verification process to check the truthfulness of any of the information that a registrant provides. Most sites require that users abide by conditions and terms of use meant to thwart improper conduct, but enforcement is often lax. Once a registrant becomes a member, he or she can post personal information, images or other information depending upon the features available at the site. Unless a user chooses to enable privacy options, all the information posted may be visible to all other users of a site.� What are the dangers? Those who misuse the sites may do so in many ways including: Luring / enticement -- Internet sexual predators and know sex offenders have used social networking sites to locate and lure victims. Identity theft -- Criminals steal the identities of those who post personal information. Cyberbullying / harassment Agitators post derogatory, hurtful or threatening information about others. Stalking -- Stalkers can use personal information posted to the sites to locate and pursue victims. Fraud schemes -- Criminals who wish to defraud others of money or property can�locate victims, gain their trust, and then take advantage of that trust for criminal purposes. Inappropriate sexual content -- Some users post sexually explicit information that is inappropriate for young computer users. Prevention What can you do to protect yourself from those who misuse social networking sites? Do�s and Don�ts Don�t - post personal images post your true full name post your home or cellular phone number post your true age or date of birth post your true home or business address post your school name or the grad that you are in post your calendar of upcoming events or information about your future whereabouts. Do discuss Internet risks with your child enter into a safe-computing contract with your child enable computer Internet filtering features if they are available from your Internet service consider installing monitoring software or keystroke capture devices on your family computer that will help monitor your child�s Internet activity know each of your child�s passwords, screen names and all account information put the computer in a family area of the household and do not permit private usage report all inappropriate non-criminal behavior to the site through their reporting procedures report criminal behavior to the appropriate law enforcement agency including the NCMEC Cybertip line or the Internet Fraud Complaint Center contact your legislators and request stronger laws against Internet crime contact the corporations who place advertisements on the sites and let them know that their advertising is helping to support inappropriate Internet behavior. Also, let the corporations know that you intend to boycott or discontinue using their product or services because of the behavior they are� supporting. visit the NCMEC Netsmartz Workshop at http://www.netsmartz.org for more information remember that every day is Halloween on the Internet. People on the Internet are not always as they first appear. Making Social Networking Sites Safer The following suggestions would make social networking sites safer for users and more law-enforcement friendly. On every social networking site web page, display a clearly visible hyperlink permitting users to easily report misconduct. For new users, make the default settings for viewing and sharing all account information �private�. This means that new accounts would be automatically set to exclude others and to not share information. The new subscriber would have to actively choose to share account information by checking the appropriate boxes in the account settings section. On every web page, display a link to the national sex offender registry. Proprietors of social networking sites should install filtering software to eliminate users from posting obscene words. Require that all new users enter verifiable credit card information when first subscribing. Require that all subscribers pay a nominal monthly fee. Include a provision in the social networking sites terms of use that notifies users that they have no expectation of privacy with regards to any of the content they post and that law enforcement may obtain any and all of their postings through the use of a subpoena only - without a search warrant. Retain profile information for deleted accounts for 90 days. Remove the browse and search functions that permit users to locate one another. On every social networking site page, display a link to the Internet Crime Complaint Center for incidents of theft or fraud. Their link is www.ic3.gov Include an admonition on social networking sites profile pages advising users that revealing personal information could lead to identity theft or victimization by offenders who are intent upon harassment, stalking, fraud or identity theft. Preserve changes to user�s pages and the Internet protocol address associated with the changes for 90 days. Selected ICAC Case Studies -- Arizona ICAC Task Force Milwaukee Boy Found in Phoenix Home of Sex OffenderFrom the Arizona Republic, Aug. 23, 2005, Reported by William Hermann Phoenix police say the experience of the 13-year-old Milwaukee boy they found Monday night in the company of a man they suspect of using the Internet to lure the child to town is one that parents need to take to heart. Phoenix Police Sergeant Kardasz said Milwaukee police on Aug. 17 had received a missing persons report from the boy�s mother. Investigators went into her son�s computer and found that he had been communicating regularly with a person using a Phoenix wireless Internet site. "We went to the address of the wireless user and pretty quickly found he was an innocent person whose wireless service was being used by someone else," Kardasz said. "Through investigative work my staff established who was using the wireless connection, we watched his house, and soon the man drove up with the boy in his car." At about 11:30 p.m. police arrested Vernon Monk, 31."The suspect had no ID and was using a false name and a fictitious license plate and pretending to be the boy�s father to people in the neighborhood," Kardasz said. Monk was arrested for custodial interference and booked into a Maricopa County Jail. Police also learned that there is an outstanding arrest warrant on Monk from Seminole County, Okla., for a sexual offense against a minor. The boy was taken to the county�s Juvenile Court Center to stay until his mother could arrange for his return home. Internet Sexual Predator / Traveler Arrested and ImprisonedOffender: David Jackson Donan, w/m, age 61 In September 2003, an investigation began involving an unidentified person using the Internet screen name "Brasshatter." Investigators learned that "Brasshatter" intended to travel via commercial aircraft from Austin, Texas to Phoenix, Arizona for the purpose of meeting a minor to engage in unlawful sexual intercourse. "Brasshatter" was later identified as David Jackson Donan, age 61, with residences in both California and Texas. On October 20, 2003 Donan boarded a commercial aircraft and traveled from Texas to Arizona. To groom and entice his intended victim, he brought several packages of the candy - Skittles. To aid in his intended unlawful sexual acts he brought nine sexual aide devices, KY Jelly, a male sexual enhancement drug, a prescription for Viagra, and a digital camera - all in his carry-on baggage. Donan was arrested without incident upon his arrival at Phoenix Sky Harbor Airport. He made no statements and was booked. Arizona ICAC investigators and FBI agents in Arizona, California, and Texas worked cooperatively in the subsequent investigation and search of Donan�s residences for evidence. They uncovered computer evidence, firearms and other sexual aid devices belonging to Donan. Later forensics examinations of his computer also revealed a collection of child pornography. Computer evidence indicated that Donan had bragged during Internet chat conversations about having victimized children while he had visited Thailand many years ago. Donan waived his right to trial plead guilty to one count of the Federal offense: Travel with intent to engage in a sexual act with a juvenile (Title 18, Part I, Chapter 117, 2423b). Donans� presentence report was not favorable with indications that he had prior "hands-on" offenses with as-yet unidentified victims. On September 29, 2004, he plead guilty in U.S. Federal District Court (Phoenix). Honorable Earl H. Carroll presided. Judge Carroll sentenced Donan to 7 years, 3 months prison, followed by one year residence in a transitional facility, $25,000 fine and lifetime supervised release. International Cooperation Leads to Child Pornography TraffickerOffender: Lee McCulloch, w/m, age 26, resident of Gwent, South Wales, U.K. Occupation: Factory worker, Marital status: singleArrest Location: Abertillery, Gwent - South Wales, United KingdomCharge: Distributing Indecent Photographs of Children (United Kingdom)Sentence: Eight months prison, Sex offender registration for five years.Agencies involved: Arizona ICAC Task Force, Phoenix P.D., Phoenix F.B.I., Heddlu Gwent P.D. South Wales, U.K. In April 2003, an investigator from the Arizona Internet Crimes Against Children Task Force / Phoenix P.D. initiated an investigation into an unidentified child pornography trafficker. the investigation led to an unknown suspect in the United Kingdom. Working with the FBI and the Heddlu Gwent (UK) Police Department, investigators assembled a case that led to the identification and arrest of 26 year old LeeMcCulloch in South Wales, UK. McCulloch, a factory worker, used computers at his home in the United Kingdom to collect and traffic images of child pornography with other nefarious Internet associates. McCulloch, who is unmarried, was arrested on November 28, 2003. Investigators in the UK developed further information leading to twenty (20) other suspects there with whom McCulloch traded unlawful images of child pornography. On August 26, 2004, McCulloch was sentenced to 8 months in prison in the UK and five years of sex offender registration status. David Mojica Santos -Internet Sexual PredatorArrest Date/Time: October 8, 2003, 1530 hours.Offense: Luring a Minor for Sexual Exploitation On October 8, 2003, David Mojica Santos, age 65, was arrested for luring a minor for sexual exploitation in northwest Phoenix. Santos first came to the attention of law enforcement in July 2003, when he used the Internet to solicit sexual conduct with a minor. Santos traveled from his residence in Mesa to a location in Northwest Phoenix where he intended to meet a minor for sex. He was arrested, booked, and subsequently released on bond. He later plead guilty to the court. SENTENCING HEARING -- STATEMENT OF SGT. KARDASZ (The recent trend among judges in Maricopa County is to sometimes sentence such offenders to probation only, with no jail time. Anticipating this, we prepared a detailed statement to the sentencing judge. Here is an excerpt): ...Your Honor, the innocent children we struggle to protect are unable to appear here today. They are children whose innocence was stolen by Internet sexual predators like this defendant. Most of those children will never come forward due to fear or a misplaced sense of guilt. A few of them, like 13 year old Kasie Woody of Arkansas, and 13 year old Christina Long of Connecticut, were forever silenced by Internet sexual predators. According to reports from the National Center for Missing and Exploited Children, one in five girls and one in ten boys will be sexually victimized before they reach adulthood, and less than 35% of these crimes will ever be reported. The Internet provides an unparalleled opportunity for criminals to unearth themselves and victimize unwary young people. Research indicates that of the estimated 24 million child Internet users, one in five received a unwanted sexual solicitation, but only one in four told a parent. Curious and innocent youngsters are flocking to the Internet seeking friendship and information but are instead finding sexual deviants and predators. My undercover investigators and I have witnessed no shortage of adults chatting on the Internet with the stated intention of sexually victimizing minors. � Over the past few years our caseload has skyrocketed while our resources have not. Our investigation of this defendant revealed that his Internet chat was not an isolated incident but part of a series of ongoing offenses occurring against multiple victims over an extended period of time. He was not the unfortunate victim of a "sting" caught at the wrong place at the wrong time. He is a practiced Internet sexual predator. Forensics analysis of his computer revealed that he did not spend his idle time enjoying normal retirement hobbies or mentoring his family or community . This former missionary spent his day prowling cyberspace in search of young sexual prey. We discovered Internet chat conversations he had with four as yet unidentified girls aged fifteen, fourteen and eleven. In each of the chats he quickly turned the conversation to sex and began to manipulate each girl towards meeting him for sex. I am going to read brief excerpts of the chat conversations the defendant had with various young girls he contacted on the Internet. Much of the language is so sexually graphic that I will not repeat it verbatim. "Do you like older guys?""Have you had sex yet?""Are you curious about having sex?""Do you think you would like to have sex sometime soon?""I wish I was next door to you....and then maybe not. I might rape you." "What city do you live in....I was just wondering if there is a large airport nearby." "You just don�t know how badly I want to (expletive deleted) you right now." And I will stop there your Honor because the conversations deteriorate graphically from there. Your Honor, I have watched defendants in similar circumstances appear in these courtrooms arguing that everything they did was fantasy role-playing and that they were the unfortunate victims of zealous police operations. That�s hogwash. Was it fantasy when this defendant drove over 20 miles from Mesa to Northeast Phoenix for the expressed purpose of meeting a minor for sex? Was it fantasy when the defendant brought condoms with him to the meeting? Condoms that he admitted that he does not use with his wife. Apologists for this defendant may look at his age and surmise that he has little capacity for future offenses - I disagree. This defendant had the physical capacity to proudly display on the Internet, graphic sexual images of himself, captured with a computer web camera and in a variety of poses. In similar cases my colleagues and I have watched defendants receive minimal sentencing by other courts, only to re-offend later. In one recent case the defendant mocked the court by continuing to solicit minors for sex while the defendant was out on bond only days after his original arrest. In another of our cases, the convicted defendant, while free on probation, immediately began producing, acting in, and trafficking child pornography, including images of himself sexually abusing three young children under shocking and horrifying circumstances. The Arizona law as it stands permits the court to exercise wide discretion in sentencing this offense. We trust that this court will act in the best interest of our community and send a strong message to this and all other Internet sexual predators. Finally your honor, we request that this court�s judgment provide a message of reassurance to the children unable to appear in your courtroom today that their rights are being defended at this, the highest level of County justice. SENTENCE -On June 18, 2004, Santos was sentenced before Judge Hotham of the Maricopa County Superior Court. He received ten months jail and lifetime probation. Contact: Dr. Frank Kardasz, Sergeant / Project Director Phoenix P.D. / Arizona ICAC Task Force 620 W. Washington Phoenix, AZ 85003 Desk: 602 256 3404 Email: [email protected] http://www.kardasz.org Mr. Whitfield. Thank you very much. Our next witness is the Lead Special Agent of the Wyoming Division of Criminal Investigation, and the Internet Crimes Against Children Task Force. Mr. Waters, you are recognized for 5 minutes. Mr. Waters. Thank you, Mr. Chairman, Congressman Stupak, and the distinguished members of the subcommittee. I welcome this opportunity to appear before you, and discuss how the Internet is being used to commit crimes against children, and how the Internet Crimes Against Children Task Force is responding to that threat. First, I would like to speak to the issue of child pornography. Now, in Wyoming, I am one of four investigators that are handling this. We are the cops on the beat doing this. This isn�t about a movie or a picture. This is ongoing sexual abuse of a child. This is not about pornography. These are not baby in the bathtub movies. These are not consenting adults. Let us be clear, these are images that are crime scenes depicting the sexual abuse of children, starting as young as infants. These are not innocent images. These are images depicting the complete destruction of innocence. I would like to provide you with a little background information about the Internet Crimes Against Children Task Force. The ICAC includes 46 regional task forces, State and local police officers, sheriff�s deputies, spending time at the computers, doing the chat, working the crime scenes. Through funding from the Office of the Department of Justice, Office of Juvenile Justice and Delinquency Prevention, we are able to bring these together with a common goal, and we are able to have contacts in each jurisdiction, as these investigations cross boundaries. We have a strong relationship with our Federal colleagues, and we collectively strive to bring to bear the strengths of each entity, in our mutual goal to protect children. In fact, in Wyoming, the ICAC that I represent, we have been active for 5 years. We work very closely under the authority of the Attorney General, and we present frequently to the United States Attorney for prosecution. I heard a citation earlier that 25 percent of these cases are being prosecuted federally, 75 percent of these cases were taken to our State prosecutors, our DAs, and we are getting some support. We are getting outstanding support, in fact. We work very closely with them to try and assure that we bring the best tools to bear. We are facing quite a few new challenges. The ICAC Task Force Program designed a methodology to investigate peer-to-peer file sharing environment. We were seeing a lot of these images showing up during our forensic examinations of computers, originating from peer-to-peer. Five years ago, we were working a lot of paid websites. Now, coming from the peer-to-peer, I started to write software to try and find out how bad this problem was, and we were amazed. In under 24 months, our investigators, there are about 400 around the world using this software, have identified over 4.4 million transactions involving the trafficking of movies and images depicting the sexual abuse of very young children. I focused on images 8 years old and younger when I designed the system. By country, Germany, 262,000 transactions; Canada, 294,000; the United Kingdom, 305,000; and the United States, 1.9 million transactions in under 24 months. Over a million IP addresses. These file sharing networks have created an efficiency level unprecedented in previous distribution technologies. In Wyoming, the smallest state by population, we have over 250 search warrants that we could request if manpower permitted. Our investigators are averaging over 70 hours a week very frequently working on these investigations. We are hitting as hard and as fast as we can. In addition to the ICAC investigative efforts in the peer-to-peer environment, we are proactively working to put ourselves between child predators and the children in our care. We sit in the chat rooms. We pose as little boys, little girls, maybe adults. These are my two youngest. In 2001, my wife sent this to me to work, to put on the wall. I was having a little bit of trouble dealing with some of the bad guys we were facing, and I kept this on the wall. This was our Christmas card, 2001. Next please. On December 31, while I was online posing as a 13-year-old girl, I was contacted by a man who requested to meet me at a nearby mall for sexual acts. He was very descript. I received this picture of him. Look at his eyes. Go back. It is the same man. A week after Christmas, we walked the mall, and watched this individual for two and a half hours, waiting for him, so that we could arrest him in a safe manner, and eventually, we placed him into custody. This is one of two times where my undercover operations have revealed an offender who had exposed contact to my own children. The investigators in Wyoming are in these rooms, were speaking to these individuals, and were pursuing arrests. Through our undercover chat operations and file trading investigations, the ICAC investigators are executing arrests and search warrants throughout the Nation. These investigations often lead us to homes where children are being physically and sexually abused, often starting at an early age. The most recent one in Wyoming, the abuse was an act of abuse of a four year old, and we had no other leads. The individual had no criminal history, no priors, no other indication until his trafficking of images on the peer-to-peer networks took us into his home, and fortunately, in that case, we were able to rescue the child. I would like to speak again briefly about the images that we are running into, and this speaks to what Dr. Kardasz spoke. During undercover operations, an ICAC investigator in Florida received a movie depicting the rape of a 2-year-old child. In accordance with our policy, the movie was sent to the National Center for Missing and Exploited Children. The abuse was so horrific it even shocked the seasoned analysts at the Center. The ICAC investigator received this movie in August of 2005. Drawing on our efforts on the peer-to-peer environment, we were able to look back and trace this movie to a computer in Colorado, where it had been made available for distribution in April of 2005, several months prior to any other known existence on the Internet. Just as the ICAC investigators thought they were getting close to the potential origin of this movie, all hope was destroyed. The Internet service provider responded to us that they did not maintain records related to this account. Efforts to find this child fell short, and there was nothing that we could do about it. The safety of our children cries out for each of us to take all steps necessary to eliminate this problem. Technology has allowed us to more accurately gauge the scope of the societal problem of child sexual abuse. The Internet is serving as the great connector for people who seek to harm children and take pleasure in watching children being sexually abused. Better cooperation from the Internet service providers would result in us being able to take more children out of the hands of the predators. Mr. Whitfield. Conclude, Mr. Waters. Your statement has been fascinating. Mr. Waters. Mr. Chairman, I thank you for the opportunity to speak, and I will be happy to answer any questions now, or in the future, later. [The prepared statement of Flint Waters follows:] Prepared Statement of Flint Waters, Lead Special Agent, Wyoming Division of Criminal Investigation, Internet Crimes Against Children Task Force Technology Center, United States Department of Justice Congressman Stupak and distinguished members of the sub-committee, I welcome this opportunity to appear before you to discuss how the Internet is used to commit crimes against children and how the Internet Crimes Against Children Task Force is responding to that threat. Congressman Stupak, you are clearly an advocate for child protection and I commend you and your colleagues for your leadership and initiative. � The Internet Crimes Against Children Task Force (ICAC) shares your concern for the safety of our children and we thank you for bringing attention to this issue. Child Pornography This isn�t about a movie or picture. This is about the ongoing sexual abuse of a child. This isn�t about pornography. These are not images of consenting adults. These are not "baby in the bathtub" movies. Let�s be clear, these images are crime scene photos depicting the sexual abuse of children starting as young as infants. These are not innocent images. These are images depicting the complete destruction of innocence. Who are these children? The majority of the children depicted in these pictures are sexually abused by someone they should be able to trust, such as a parent or another adult who has legitimate access to the child. And, contrary to popular belief, the majority of children identified in child pornography have been identified by the National Center for Missing and Exploited Children (NCMEC) as American children. Internet Crimes Against Children Task Force I would like to provide you with some background information about the Internet Crimes Against Children Task Force. �ICAC includes forty-six (46) regional Task Forces working in partnership with the U.S. Department of Justice, Office of Juvenile Justice and Delinquency Prevention. These Task Forces are composed of state and local law enforcement agencies throughout the United States focused on investigation, education and prevention related to the exploitation of children by means of the Internet. The National Task Force has a strong relationship with our federal colleagues and we collectively strive to bring to bear the strengths of each entity in our mutual goal to protect children. �The Wyoming ICAC, which I represent, has been an active participant in �the national Task Force program for five years. Our Task Force consists �of three state agents operating under the authority of the Attorney �General. In Wyoming, we have a close working relationship with the �United States Attorney and our Federal partners. We Are Facing New Challenges In the last three years we have witnessed a monumental change in the trafficking of material related to the sexual abuse of children. Three years ago our national efforts identified over 2600 transactions where people were trading images of child sexual abuse via peer-to-peer networks. At that time, the operation was one of the largest proactive Internet investigations ever. We thought we had made a significant impact in the networks used to trade this material. We were mistaken. Advances in Peer-to-peer file trading has generated a completely new barter system, encouraging people to move from using sexual abuse images to validate their own interests in harming children to spreading the material to as many other people as possible. The ICAC Task Force program has designed a methodology to investigate the Peer-to-Peer (P2P) file-sharing environment. In under 24 months, our efforts have identified over 4.4 million transactions involving the trafficking of movies and images depicting the sexual abuse of very young children. By Country Germany 262,000 Canada 294,000 United Kingdom 305,000 United States 1,900,000 These file-sharing networks have created an efficiency level unprecedented in previous distribution technologies. Utilizing high speed Internet access, millions of computers are linked together allowing fast and easy distribution of child pornography. It should not be surprising to us that child predators in the United States have found a way to leverage the technology to their benefit. In Wyoming, our small team has over 250 search warrants we could request if manpower were not an issue. Often our investigators average 70 hours a week working these investigations. In addition to the ICAC investigative efforts in the peer-to-peer environment, we are proactively working to put ourselves between child predators and the children in our care. Highly-trained ICAC investigators across the country are patrolling areas of the Internet where predators are known to lurk and children are vulnerable. Each week, ICAC investigators identify and apprehend criminals who solicit sexual acts with undercover officers posing as children. Through undercover chat operations and file trading investigations ICAC investigators are executing arrest and search warrants throughout the Nation. These investigations often lead ICAC investigators to homes where children are being physically and sexually abused. These efforts allow ICAC investigators to disrupt the pattern of abuse at an early stage, sometimes before the child is even old enough to reach out for help. Sadly, this is not always the case. During undercover operations an ICAC investigator in Florida was sent a movie depicting the rape of a two-year-old child. In accordance with ICAC policy the movie was sent to the National Center for Missing and Exploited children. The abuse was so horrific it even shocked the seasoned analysts at the center. The ICAC investigator received the movie in August 2005. Drawing on the previous coordinated efforts of the ICAC investigators we were able to trace the movie to a computer in Colorado where it had been made available for distribution as early as April 2005. This was several months prior to any other known existence on the Internet. Just as ICAC investigators thought they were getting close to the potential origin of the movie all hope was destroyed. The Internet service provider used to trade this movie did not maintain any records related to the use of the account. Efforts to find this child fell short and there was nothing law enforcement could do about it. The safety of our children cries out for each of us to take all steps necessary to eliminate this problem. Technology has allowed us to more accurately gauge the scope of the societal problem of child sexual abuse. The Internet is serving as the "great connector" for people who seek to harm children and take pleasure in watching children be sexually abused. Better cooperation from ISP�s would result in us being able to save more children from the hands of those who want to harm them. The ICAC experience shows us that technology can allow us to proactively protect our children and identify predators. The ICAC Task Force Program is critical to the overall efforts to protect children and we�ll continue to place ourselves between our nation�s children and Internet predators. We thank you for your continued support of the ICAC Task Force Program and appreciate your interest in this important issue. I will be happy to answer any questions related to this issue now or in the future. Mr. Whitfield. Thank you very much. Mr. Clark. Mr. Clark is the Deputy Assistant Secretary for U.S. Immigration and Customs, and you are recognized for 5 minutes. Mr. Clark. Thank you, Chairman Whitfield, Ranking Member Stupak, and distinguished members of the subcommittee. I had spent quite some time over the last few days writing up an oral statement off my written statement to sort of summarize some of the work and accomplishments ICE has done in the field of child predators Internet investigations. I wanted to talk about why U.S. Customs originally, and ICE now are involved in these investigations, starting with our traditional and long history working hand in hand with the U.S. Postal Service, when much of the foreign material came into the United States through the mail, how in the �90s we began working these cases through the Internet. I know I was an ASAC out in San Francisco when we did one of the first significant international child predator investigations, and back then, it involved a chat room in which individuals were sharing pictures, videos, and there was, at that time, on demand molestation among the members of the groups. Just in March of this year in Chicago, Attorney General Gonzalez and Assistant Secretary Myers from ICE conducted a press conference heralding the case we had taken down in Chicago. The technology had improved, but the situation is the same. It was on demand molestations of children by an international group, actually started with the Edmonton Police Service. Toronto Police Service had done some undercover work on it, turned it over to ICE to continue in an undercover capacity, and when all was said and done, we arrested individuals in the United States, Canada, Australia, and Great Britain. Same types of work, just more significant or sophisticated technology. I wanted to talk about how ICE is using its unique border authorities to actually attack this problem from a transnational, trans-border perspective. There are many good law enforcement agencies here in the United States working it domestically, the ICACs, who we work with very often, my colleagues on the board here, State, Federal, local, across the board, working it domestically, so in an effort to more efficiently use our limited expertise, resources, we focus on the transnational, trans-border violations, in which there are persons or materials in a foreign country coming across to those in the United States. I also wanted to recognize the excellent work by the non-governmental organizations. From the international perspective, World Vision, whom we work with often. Here, in the United States, the excellent work done by the National Center for Missing and Exploited Children, NCMEC, on which I am a board member, and who we have investigators assigned to their office to help coordinate a lot of the domestic investigations between the ICACs, state and local agencies, and the Federal agencies. I wanted to highlight that this is a global problem. It is not a U.S. problem. One of the things we are finding in ICE, in working with our foreign colleagues, is how widespread this is, and on a good note, how the attention and the interest of our foreign law enforcement colleagues is on the rise. We are developing better and better relationships with our 56 overseas offices in developing these investigations, and one in particular, Operation Falcon, that we took down a few years ago, but continues to follow up on a number of leads. While in the United States, we arrested 236 individuals, outside of the United States, over a thousand individuals were arrested based on leads from Operation Falcon, and I believe the government of Australia had its attention raised such that it is beginning to look at changes in its child protection laws as a result of that case. There were a number of other things about ICE I wanted to talk about, but I changed my oral testimony, because I think it needs to address very briefly the incident that just happened a couple of days ago, in which the Public Affairs Officer of the Department of Homeland Security was arrested, Brian Doyle. That case just happened. I can�t comment on the specifics of the incident, but I think it has bearing on this hearing today, and why we are here. The title of today�s hearing is "What Parents, Kids, and Congress Need to Know About Child Predators," and I think the allegations in that case are significant. I think what we need to know is that there is no profile, no profession, no size and shape, age, color, of an individual, no scarlet letter that they wear in public surroundings that indicate who child predators are. It is very unfortunate, teachers, clergymen, law enforcement. It doesn�t seem to matter. There is no profession that we could say if they are doing X, you can be assured that they are child predators, or if they are doing Y, you can be assured they won�t be child predators. It is an unfortunate situation. We have thousands of law enforcement officers here in the United States dedicated to these types of investigations, and thousands more internationally doing the same. I think it is important for the public to realize, though, that there will never be enough law enforcement officers to attack this successfully unless families, parents, communities, and the public at large weigh in, and start paying attention to our kids. We can only do so much in law enforcement to attack it from a criminal perspective, but the public and the families and the parents need to listen to their kids. They don�t have to tether their kids to their belts. They don�t have to follow them in mini-cams. They don�t have to lock them away in houses. They shouldn�t get paranoid, but they should listen to their children. They should pay attention to what they are doing. They should pay attention to where they are going, whether it is around the block, in the mall, or on the Internet. That is very, very significant, and that is a message that has to be out to the public. We can do a lot. We are doing more, but we can�t be everywhere, in terms of law enforcement, and the public, the families, the communities have to pay attention to this very, very significant problem. I will pass along on my time. I appreciate the opportunity to be here, and would be pleased to answer any questions. [The prepared statement of John P. Clark follows:] Prepared Statement of John P. Clark, Deputy Assistant Secretary, United States Immigration and Customs Enforcement, United States Department of Homeland Security INTRODUCTION Chairman Whitfield, Ranking Member Stupak and distinguished Members of the Energy and Commerce Oversight and Investigations Subcommittee, my name is John Clark and I am the Deputy Assistant Secretary of U.S. Immigration and Customs Enforcement (ICE). I appreciate the opportunity to share with you today how ICE is applying its expertise and authorities to protect our children from Internet sexual exploitation. I am joined here today by my colleague James Plitt, the head of the ICE Cyber Crimes Center. Jim�s unit leads our agency�s efforts to combat the sexual exploitation of children on the Internet. THE ICE MISSION Among the Department of Homeland Security law enforcement agencies, ICE has the most expansive investigative authorities and the largest number of investigators. ICE is the nation�s principal investigative agency for violations related to our borders. Our mission is to protect the American people by combating terrorists and other criminals who seek to cross our borders and threaten us here at home. The men and women of ICE accomplish this by investigating and enforcing the nation�s immigration and customs laws. Working overseas, along the nation�s borders and throughout the nation�s interior, ICE agents and officers are demonstrating that our unified immigration and customs authorities are a powerful tool for identifying, disrupting and dismantling criminal organizations that violate our Nation�s borders. Our agents and officers make it harder for potential terrorists and transnational criminal groups to move themselves, their supporters or their weapons across the Nation�s borders through traditional human, drug, contraband or financial smuggling networks, routes and methods. Since its creation in March 2003, ICE has employed our authorities and capabilities against threats to our border, homeland and national security within our broad jurisdiction, including the cross border Internet sexual exploitation of our children. PROTECTING CHILDREN By virtue of our robust authorities and capabilities for investigating crimes with a border nexus, ICE makes major contributions in the fight against the sexual exploitation of children worldwide, including over the Internet and the importation of physical or electronic representations of child pornography. We focus these ICE efforts under Operation PREDATOR. Launched by ICE on July 9, 2003, Operation PREDATOR is currently managed and administered by the Cyber Crimes Center, a headquarters unit of ICE�s Office of Investigations, which coordinates enforcement efforts against child sex offenders both nationally and internationally. To date, ICE has successfully arrested more than 7,500 child predators. Of these, more than 6,600 (88%) of the arrestees have been non-U.S. citizens, and of those, more than 3,900 (59%) have been deported from the United States. ICE�s Operation PREDATOR endeavors to apprehend and ultimately prosecute a variety of violators including individuals who: Engage in the receipt, transfer, distribution, trafficking, sale, facilitation, and production of child pornography in foreign commerce, including use of the Internet; Travel internationally for child sex tourism or who facilitate such travel; Engage in the human smuggling and trafficking of minors into the United States for illicit sexual purposes (sexual exploitation and/or prostitution) or worksite exploitation, and/or commit any crimes resulting in the harm, injury or death of a minor not including the smuggling of children by parents for family unity reasons; Are foreign nationals/aliens who have been convicted of local, state, or federal offenses against minors and are now eligible for removal from the United States; and Are criminal aliens who have been previously deported from the United States for such offenses but have re-entered the country illegally. These five enforcement objectives/goals are integral components of ICE�s border security responsibilities and mission, since these criminal activities involving child exploitation often transcend this country�s physical borders. The global Internet constitutes a powerful tool for those who prey upon children or profit from that predation. Far more child pornography is now being transmitted globally in an instant in electronic format than ever was distributed in physical form by couriers or packages arriving at international ports of entry or mail facilities. Operation PREDATOR is a critical element of ICE�s strategy for identifying and defeating threats to public safety that arise from our borders. These threats often include foreign nationals who enter or remain in this country illegally and become administrative fugitives or absconders and who may also be child sex offenders. Other threats include criminal business enterprises with business models based upon the smuggling of alien children into this country for sex exploitation or prostitution. Additional threats include U.S. citizens and/or lawful permanent resident aliens who travel to other countries with the intent to engage in "sex tourism" with children. In multiple cases we have seen these individuals actually return to the United States with trophy pictures and videos of their illicit exploits. To illustrate for the subcommittee our work, I would like to share with you some powerful examples from ICE case files. OPERATION FALCON ICE initiated Operation FALCON in response to the threat to public safety posed by REGPAY, a criminal businesses activity based in Minsk, Belarus which provided third-party billing and credit card aggregating services to Internet child pornography websites. A task force comprised of agents from ICE, IRS, FBI, Postal Inspection Service, and the U.S. Attorney�s Office in Newark, New Jersey, launched investigations into individuals and corporations involved in the production and distribution of child pornography via the Internet. Conducted under the auspices of Operation PREDATOR, this revolutionary investigation employed the latest technology to not only target the purchases, but also identify, track, and apprehend the producers and webmasters leading to the seizure of proceeds from this multi-million dollar criminal enterprise. Operation FALCON has yielded approximately 300 arrests in the United States and more than 1,000 arrests overseas. Operation FALCON is a continuing investigation. Another ICE investigation that illustrates the enormity of the threat to public safety that can be posed by a single individual involved in Internet child pornography is that of a Louisville resident. This individual was indicted by a federal grand jury in the Western District of Kentucky on February 22, 2006, for receiving and possessing child pornography on his computer. Previously, this individual was indicted by a federal grand jury in the Eastern District of Virginia in December 2001, for similar charges involving possession and transportation of child pornography. This prior indictment was based on an investigation conducted by the Naval Criminal Investigative Service (NCIS), and led to the issuance of an arrest warrant for the individual. He had remained a fugitive until January 31, 2006, when agents from our Resident Agent in Charge Office in Louisville, assisted by NCIS agents and U.S. Marshals, arrested him at his residence. At the time of his arrest, our agents executed a federal search warrant resulting in the seizure of 14 desktop computers, 4 laptop computers, numerous removable hard drives, and computer storage media. Subsequent forensic analysis of the seized items revealed numerous images of child pornography. This violator admitted that his collection of Internet child pornography, which he stored on his computers, approached more than 200,000 still images and hundreds of video files. He also stated that he was "addicted" to child pornography and had a sexual interest in children. COOPERATIVE EFFORTS Because the Internet allows for the instantaneous transmission of massive amounts of child pornography, including live video of real-time molestations, cooperation with our international partners is vital. ICE has received excellent cooperation from the Danish and Norwegian National Police agencies. Together, we identify and target suspects who receive and transmit child pornography via the Internet using "peer-to-peer" software applications that operate on worldwide file-sharing networks. Examples include the use of the "LimeWire" program on the GNEUTELLA network and the "KaZaA" program on the FASTTRACK network. ICE has a similar ongoing enforcement initiative with the German National Police, which also attempts to identify and target suspects who distribute child pornography on the Internet. Additionally, ICE works closely with INTERPOL and EUROPOL to identify, arrest, and prosecute international violators with a nexus to the United States, in an effort to combat the international distribution of child pornography and the use of the Internet to facilitate child sex tourism. ICE has partnered with the National Center for Missing and Exploited Children (NCMEC) to investigate tips received from the NCMEC Cybertipline. The Cybertipline receives leads from persons reporting the sexual exploitation of children. I am a member of the board of this unique organization, which has terrific outreach program for parents and their children on its "Netsmartz" Internet website. There, families can review numerous safety tips to help protect children from online child predators. In addition, ICE works closely with the DOJ-funded Internet Crimes Against Children (ICAC) Task Forces around the country on major child exploitation initiatives involving illicit computer-related child pornography. One of the major "high tech" tools we are using to assist us with the investigation of child pornography crimes via the Internet is known as the National Child Victim Identification System (NCVIS), which is a cooperative effort among federal, state, local, and foreign law enforcement agencies and civilian entities. The program is managed and administered by our Cyber Crimes Center in Fairfax, Virginia. The primary focus of NCVIS is to help all law enforcement agencies identify victims of child sexual exploitation and to track the transmission and circulation of digital images via Internet websites, Email, Instant Messenger, Newsgroups, and Chat Rooms. NCVIS is a secure computer-based initiative that was conceived as an investigative tool to assist in child exploitation investigations and allows us to analyze specific child pornography images, which have been seized as evidence or otherwise, to determine whether they match already identified child victims or actual child victims depicted in known child pornography magazines. To date, the ICE Cyber Crimes Center has analyzed more than 150,000 images utilizing NCVIS, resulting in the authentication of more than 2,065 images used to facilitate the criminal prosecutions and/or sentencing of child predators. In addition, since its creation, we have enrolled more than 110,000 images of child pornography into NCVIS of which more than 32,000 are of known child victims. It is also important to note that our Cyber Crimes Center provides extensive technical training in the areas of online investigations and computer forensic analysis to local, state, and other federal law enforcement agencies, as well as foreign police agencies. Due to the potentially harmful effects of viewing child pornography and, often times, dealing with its young victims, ICE has launched a proactive assessment program in an effort to prevent adverse emotional and psychological effects that may impact an ICE agent�s emotional health. INTERNET PORNOGRAPHY TRENDS No matter how successful our efforts are against these terrible crimes and those who commit them, the continuing advance of technology gives potential offenders new opportunities to prey upon children. In fact, these offenders often are at the forefront of technological efforts to trade, share and transmit illicit images in the hope of evading law enforcement detection and capture. Chief among these avenues are the lesser known peer-to-peer software applications and programs that operate on worldwide file-sharing networks that can be employed to support the transmission of child pornography images and videos. In fact, investigative efforts by ICE and Canadian authorities recently identified a peer-to-peer network that was developed and operated by an organized group of child predators to transmit alleged live video feed of children alleged to be as young as 18 months being sexually molested by members of the group. Other examples of technologies that have been misused by child predators include instant messaging and Internet Relay Chat programs, which facilitate real-time conversations and the exchange of child pornography. Predators can also use these programs to make real-time contact with unwitting child victims. In response to these threats to public safety, ICE has launched several undercover operations designed to identify and apprehend predators before they are able to make contact with our children. CONCLUSION As the Department of Homeland Security�s largest investigative agency with unique authorities to protect the American people from threats that arise from our borders, ICE is uniquely equipped to enforce our nation�s laws against the threats posed by child predators who employ the Internet as a tool to advance their crimes. While ICE is a new agency, with newly unified immigration and customs authorities, we continue to aggressively apply our investigative authorities and capabilities to identify and close vulnerabilities in our border and homeland security. At the same time, we are bringing to bear the best of our former agencies� expertise, cultures, and techniques, while building a new federal law enforcement agency that is more effective and efficient than the sum of its parts. In case after case, ICE Special Agents are putting into practice the powerful advantages that flow from our unified authorities, and are putting them to great use on behalf of the American people. The net result is a greater contribution to the Nation�s border security, which is a critical element of national security and public safety. My colleagues at ICE are grateful for the chance to serve the American people and, on their behalf, I thank this subcommittee, its� distinguished members and Congress for the continued support of ICE investigative endeavors. Mr. Whitfield. Thank you, Mr. Clark. Mr. William Kezer is the Deputy Chief Inspector, U.S. Postal Inspection Service, and we recognize you for 5 minutes. Mr. Kezer. Good morning. Excuse me. Good morning, Mr. Chairman, distinguished members of the subcommittee. On behalf of the United States Postal Inspection Service, I want to thank you for holding this hearing, and giving me the opportunity to discuss the subject of child sexual exploitation, and the important role postal inspectors play in combating it. As one of America�s oldest Federal law enforcement agencies, the Postal Inspection Service, founded by Benjamin Franklin, has a long, proud, and successful history of arresting criminals who attacked the Nation�s postal system. Approximately 1,900 postal inspectors are stationed throughout the United States, and enforce more than 200 Federal laws regarding crimes that involve the U.S. mail and the postal system. The Postal Inspection Service has a longstanding reputation as a true leader in the battle against child exploitation. Postal inspectors began investigating child pornography offenses in 1977, long before any other Federal agency addressed this problem. Thousands of offenders have been arrested and convicted under the new Federal laws. In fact, more than 4,800 child molesters and pornographers have been arrested by postal inspectors since the enactment of the Federal Child Protection Act of 1984. In 1997, the Postal Inspection Service began tracking the number of child molesters identified and children rescued in our investigations. Since 1997, of the more than 2,400 arrests made by postal inspectors, over 800 were child molesters. That is one out of three. Additionally, more than 1,000 children were rescued from further sexual abuse and exploitation. And I might add that 75 percent of our cases are prosecuted at the Federal level. In carrying out its objective to combat child exploitation, the Postal Inspection Service is fortunate to work closely with the U.S. Department of Justice, the Federal Bureau of Investigation, the Bureau of Immigration and Customs Enforcement, Interpol, the National Center for Missing and Exploited Children, where we have a postal inspector assigned, and the Federally-funded Internet Crimes Against Children Task Forces. postal inspectors play a significant role, not just through the investigations they perform, but in their efforts to raise public awareness about child sexual exploitation. In May of 2001, the Postal Inspection Service launched a national crime prevention initiative with the National Center for Missing and Exploited Children. The goal of this initiative was to raise public awareness of the online victimization of children. As part of this initiative, a Postal Inspection Service employee designed an eye-catching poster with a powerful message urging all citizens to report suspected child exploitation to the National Center for Missing and Exploited Children�s Cyber TipLine. This poster was displayed in 40,000 post offices nationwide, and was viewed by as many as eight million postal customers on any given day. This poster is displayed here today. Postal inspectors make presentations and conduct training on child pornography and child exploitation at local, national, and international conferences. Inspectors also make presentations to civic organizations and school associations on topics related to Internet safety. For a small Federal law enforcement agency, the Postal Inspection Service delivers a powerful punch when it comes to investigating those who produce, traffic, and possess child pornography, or otherwise sexually exploit children. For the past 7 years, postal inspectors were recipients of the National Missing and Exploited Children�s Award. The awards ceremony and Congressional breakfast was held right here on Capitol Hill. In 4 of the past 7 years, postal inspectors were awarded top honors by being named Officers of the Year. Mr. Chairman, as you can see, the Postal Inspection Service has been a law enforcement leader in the investigation of child sexual exploitation. The American public can count on our continued commitment to protect our most precious asset, our children. Again, thank you for bringing this important issue forward. [The prepared statement of William E. Kezer follows:] Prepared Statement of William E. Kezer, Deputy Chief Inspector, United States Postal Inspection Service Good morning, Mr. Chairman, members of the subcommittee. On behalf of the United States Postal Inspection Service, thank you for holding this hearing and giving me the opportunity to discuss the subject of child pornography on the Internet and the significant role Postal Inspectors play in combating it. � I�m William Kezer, Deputy Chief Inspector, for the U.S. Postal � Inspection Service. The sexual exploitation of children spans � all social and economic classes, and the perpetrators have no � regard for the enduring grief and trauma they bring to their � victims. The dangers of child pornography and other forms of � child sexual exploitation should never be minimized. Through � public awareness, vigorous investigations, certain prosecution, � and just sentencing, the incidence of this horrible crime can � be reduced. Lawmakers and law enforcers, as well as all members � of society, have an obligation to help protect children and � their families. � �The United States Postal Inspection Service (USPIS) As one of America�s oldest federal law enforcement agencies, the U.S. Postal Inspection Service founded by Benjamin Franklin, has a long, proud, and successful history of fighting criminals who attack the nation�s postal system and misuse it to defraud, endanger, or otherwise threaten the American public. As the primary law enforcement arm of the U.S. Postal Service, the USPIS is a specialized, professional organization performing investigative and security functions essential to a stable and sound postal system. As fact-finding and investigative agents, Postal Inspectors are federal law enforcement officers who carry firearms, make arrests, execute federal search warrants, and serve subpoenas. Postal Inspectors work closely with U.S. attorneys, other federal law enforcement agencies, state law enforcement agencies, and local prosecutors to investigate cases and prepare them for court. Approximately 1900 Postal Inspectors are stationed throughout the United States and enforce more than 200 federal laws regarding crimes that involve the U.S. Mail and postal system. Early Enforcement Efforts: Obscenity Investigations For more than a century, the USPIS has had specific responsibility for investigating the mailing of obscene matter. In the 1860s and 1870s, Special Agents (as Postal Inspectors were called then) had to contend with obscene material exported to the United Sates by European producers. Special Agent Anthony Comstock, or "Mad Anthony," as he was known, waged a relentless battle against anyone who used the U.S. Mail in an attempt to corrupt the morals of young people. In 1873 Congress passed the Comstock Act, a forerunner to the existing postal obscenity statute (18 USC Section 1461). In a letter dated June 11, 1875, now in the USPIS archives, Comstock wrote to his superior reporting on an investigation: I have the honor to report that yesterday in the city of New York I caused the arrest of one Zephir M. Caille, of 261 West 27th St., and doing business opposite 602 Broadway. He is charged with selling obscene pictures, and today waived examination at Tombs Police Court and was committed in default of $1,000-for trial in Special Sessions court. I seized about 175 pictures in his possession. I have found I had a good case in State court and therefore I took him there instead of waiting to work up a case in United States Court. He is a Frenchman, and I am informed owned a set of 37 different negatives for printing obscene photographs and supplied the trade throughout the country, although ostensibly keeping a stand on Broadway. I have the honor to be Very Respectfully Sir: Your Obedient Servant Anthony Comstock P.S. this fellow had a clasp knife sharpened as a dirk, but he did not get a chance to use it as I ironed him. Protecting Children From Sexual Exploitation: A National Priority Through the years, child pornography has been investigated along with obscenity matters; however, it was not until the late 1970s that Congress took action to create federal legislation protecting children from sexual exploitation. Prior to the late 1970s, most Americans were unaware of the proliferation and commercial distribution of magazines, films, and photographs depicting children in explicit sexual acts. Fortunately, we have begun to come to grips with the horrors of child pornography and to view it as it truly is, a manifestation of aberrant behavior resulting in the sexual abuse and victimization of children. In 1977 the Protection of Children Against Sexual Exploitation Act became law (18 USC Section 2251-2253). This was the first federal law specifically designed to protect children from commercialized sexual exploitation. It was the culmination of years of effort by Congress, the U.S. Department of Justice (DOJ), concerned members of the public, and the law enforcement community to take action against the pernicious effects of pornography and the sexual exploitation of children. Under this law, a child, or minor, was defined as a person younger than age 16. In the landmark 1982 U.S. Supreme Court case, New York v. Ferber (1982), the Court found that child pornography is "intrinsically related to the sexual abuse of children. First, the materials produced are a permanent record of circulation. Second, the distribution network for child pornography must be closed if the production of material which requires the sexual exploitation of children is to be effectively controlled. The Court ruled that the standards used to determine obscenity in adult pornography case are not applicable to child pornography, and child pornography is not protected under the First Amendment. On May 21, 1984, seven years after the first federal child pornography statutes were enacted, President Ronald Reagan signed into law the Child Protection Act of 1984. This act amended the original act and created some new statutes, making the federal laws against child pornography even more substantial. Postal Inspectors began investigating child pornography offenses in 1977, long before any other federal agency addressed the problem. Recognizing that child molesters and pornographers often seek to communicate with one another through what they perceive as the security and anonymity provided by the U.S. Mail, Postal Inspectors quickly established themselves as leaders in the battle against child pornography using "undercover operations" to flush out child pornography dealers who used the mail. Since that time, thousands of offenders have been arrested and convicted under the new federal laws. More than 4,800 child molesters and child pornographers have been arrested by Postal Inspectors since the enactment of the Federal Child Protection Act of 1984. Advent of the Internet Since the advent of publicly available Internet services, the opportunity for exchange and barter involving sexually explicit materials has dramatically increased the amount of child pornography available on line. Child molesters and pornographers frequently communicate in select online newsgroups and facilitate through technology video-graphic and still images of child sexual abuse, both from existing collections as well as in response to requests for new materials. The increase in the number of victims, as manifested by newer child pornographic images and bolder production techniques, has necessitated an equally innovative investigative response. The Postal Inspection Service has risen to this challenge and continues to ferret out, identify, and arrest offenders who traffick in child pornography videotapes and computer disks, or who otherwise sexually exploit children, through the U.S. Mail. Today, almost all of the child exploitation investigations conducted by Postal Inspectors have a common nexus with the Internet and the U.S. Mail. Postal Inspectors have established a nationwide network of intelligence incorporating a wide variety of undercover programs designed to identify suspects and develop prosecutable cases. These undercover operations recognize the clandestine nature of their targets and capitalize on the inherent need of offenders to validate their behavior through contact with individuals like themselves. The investigative techniques used in these operations include the placement of contact advertisements in sexually oriented publications; the infiltration of Internet newsgroups and chat rooms; and the use of confidential sources. The computer has proven itself to be an invaluable investigative tool in identifying individuals who are using the mail to traffick in child pornography or otherwise sexually exploit children. A technique employed by Postal Inspectors as part of conducting their undercover operations is to control the delivery of child pornography to the requestor�s address. Following its delivery, an anticipatory federal search warrant is immediately executed on the suspect�s property. The item just delivered, along with any other relevant evidence, is then seized. On March 21, 2006, in U.S. v. Grubbs, the Supreme Court reported its unanimous decision, ruling that anticipatory search warrants are lawful as long as sufficient probable cause exists when the warrant and supporting affidavit are presented to a magistrate. The Connection between Child Pornography and Child Molestation During fiscal year 1997, the USPIS began compiling statistical information on the number of child pornography suspects that were also child molesters. Additionally, the USPIS began to collect data on the number of child victims identified and rescued from further sexual abuse as a result of investigations conducted by Postal Inspectors. Since 1997, 802 child molesters were identified and stopped, and 1,048 victimized children were rescued. Of the 2,433 individuals arrested by Postal Inspectors since 1997 for using the U.S. Mail and the Internet to sexually exploit children, actual child molesters were identified in one out of three cases. Interagency Cooperation In carrying out its mission to combat child pornography, the USPIS works closely with the DOJ, particularly, DOJ�s Child Exploitation and Obscenity Section, the Federal Bureau of Investigation, the Bureau of Immigration and Customs Enforcement, INTERPOL, the National Center for Missing and Exploited Children, and other domestic and international law enforcement agencies. Postal Inspectors across the country have formed working partnerships with the federally funded Internet Crimes Against Children (ICAC) task forces. The USPIS is an active member of the Attorney General�s Federal Agency Task Force on Missing and Exploited Children. A Postal Inspector is assigned full time to the National Center for Missing and Exploited Children, also known as the NCMEC, in Alexandria, Virginia. The National Center�s Cyber Tipline reports are regularly reviewed and forwarded to USPIS child pornography specialists in the field for follow-up investigation or referral to another law enforcement agency, as appropriate. Raising Public Awareness and Other Outreach Initiatives Postal Inspectors play a special role not just through the investigations they perform, but in their efforts to raise public awareness about child sexual exploitation. In May 2001 the USPIS launched a national crime prevention initiative with the NCMEC to raise public awareness of the online victimization of children. As part of the initiative, a USPIS employee designed an eye-catching poster with a powerful message urging all citizens to report suspected child exploitation to the NCMEC�s Cyber Tip line. It was printed and displayed in 40,000 post offices nationwide where it was viewed by as many as 8 million postal customers on any given day. The USPIS has co-sponsored, exhibited, and presented at the National Symposium on Child Sexual Abuse, held in Huntsville, Alabama, home of the nation�s first Child Advocacy Center founded by U.S. Representative Bud Cramer. In addition, Postal Inspectors have made presentations and conducted training on child exploitation at local, national, and international conferences and through DOJ and NCMEC sponsored training programs. Postal Inspectors regularly make presentations to civic groups and school associations on topics related to Internet safety. Internationally, the USPIS has played an important role in INTERPOL�s Specialist Group on Crimes Against Children since the group�s founding in 1991. Postal Inspectors have made presentations and provided training on child exploitation to delegates from countries around the world. In August 1996 the USPIS delegate to the Specialist Group on Crimes Against Children conducted work shops for delegates from more than 120 countries at the first World Congress on the Commercial Exploitation of Children, held in Stockholm, Sweden. Postal Inspectors are so recognized for their expertise on the subject of child pornography and child exploitation that their views and experience have been published. Much of this testimony, in fact, derives from a treatment written by Postal Inspector Raymond Smith, in the soon to be published book Medical, Legal, & Social Science Aspects of Child Sexual Exploitation --- A Comprehensive Review of Pornography, Prostitution and Internet Crimes. Commercial Child Pornography Distributors The U.S. Postal Inspection Service was the first federal law enforcement agency to begin aggressively identifying, targeting, and arresting commercial child pornography distributors. Under the 1977 Protection of Children Against Sexual Exploitation Act, only the commercial distribution of child pornography was against the law. Operation Special Delivery In May 1996 the U.S. Postal Inspection Service announced the results of Operation Special Delivery, a highly successful, pro-active undercover operation. The operation shut down the largest known commercial child pornography business ever encountered by authorities in the United States up to that time. The ring-leader of the criminal enterprise, Troy Anthony Frank, doing business as Overseas Male, produced child pornography using young Mexican males, some as young as 7-years of age, in Mexico City and Acapulco, Mexico. The original videotapes were then smuggled into the United States and distributed by mail from San Diego, California, to customers throughout the country. Business records seized during the investigation revealed the company made as much as $500,000 per year. Before the investigation into the ring-leader Troy Frank concluded, he committed suicide. As a result of Operation Special Delivery, Postal Inspectors identified a large number of mail-order customers who knowingly purchased child pornography from Troy Frank. Over 130 searches in 36 states in the United States were conducted, leading to the identification of numerous child molesters, pornographers, and the rescue of child victims. Vast quantities of child pornography material were found and destroyed. One hundred offenders were ultimately arrested and prosecuted, among which were members of the clergy, youth leaders, school teachers, police officers, an attorney, a history professor, a medical doctor, and a school counselor. The Landslide Investigation and Operation Avalanche There has been no investigation in the history of child pornography comparable to the Landslide investigation and Operation Avalanche. This landmark case was conducted under the direction of the USPIS and illustrates the success that can be achieved when domestic and international law enforcement work together. In 1999 an alert Postal Inspector in St. Paul, Minnesota, discovered an advertisement on the Internet that had been placed by Landslide Productions, Inc. Further investigation revealed that Landslide Productions based in Ft. Worth, Texas, sold subscriptions to child pornography Web sites. The investigation was assigned to Postal Inspector Robert Adams, now retired, in the Ft Worth USPIS office. Inspector Adams teamed up with Detective Steven Nelson, also now retired, of the Dallas Police Department�s Internet Crimes Against Children (ICAC) Task Force, and they launched an undercover investigation into the activities of Landslide Productions. Their work was the beginning of an investigation of such unprecedented magnitude that, even early on in the case, Postal Inspector Adams reported to his higher-ups he "had a lion by the tail." Owned and operated by Thomas and Janice Reedy, Landslide Productions was a multi-million-dollar child pornography enterprise. Using the screen names of "Houdini" and "Money," the Reedys used their business to advertise and sell prepaid subscriptions to adult and child pornography Web sites to customers from around the world. Landslide Productions was, in fact, a gatekeeper for a number of international Web masters, advertising and marketing child pornography from countries such as Indonesia and Russia. Initially, the Reedys were bold in their online marketing, using banners such as "Child Porn-Click Here" and "CHILD R@PE." They eventually changed their advertisements to more covert suggestions of the content of the Web site. For $29.95, an individual could purchase a 1-month subscription to any number of graphic child pornography Web sites. Most customers used credit cards for their purchase; some customers mailed checks, cash, or money orders to Landslide�s post office box address in Ft. Worth. The cash flow for Landslide Productions was significant at times, amounting to as much as $1.4 million per month. Not surprisingly, the Reedys enjoyed the fruits of their labors, living in an upscale community in Fort Worth and driving top-end Mercedes Benzes. The Reedys were living a grand lifestyle at the expense of sexually abused and exploited children. In September 1999 the investigation conducted in concert with the U.S. Attorney�s office for the Northern District of Texas, the Child Exploitation and Obscenity Section (CEOS) of the DOJ, and USPIS National Headquarters, gathered sufficient probable cause to obtain federal search warrants. On September 8 six federal and state agencies executed a series of federal search warrants on the primary business location of Landslide Production, a secondary Landslide office in Dallas, Texas, and the Reedys� personal residence. The simultaneous raids, led by the USPIS, took more than 18 hours to complete. Under the direction of the USPIS�s Forensic and Technical Services Division, Digital Evidence Section, careful efforts were taken to seize, secure, and protect the numerous computer systems located within the properties searched. The data extracted from the computer servers would later be known as the "Holy Grail." Among the evidence seized under the scope of the warrants were financial records. One of the operation�s Web masters received more than $98,000 in one month alone for providing child pornography Web sites to its customers. Through Landslide Productions� network of computer systems and the World Wide Web, the Reedys provided child pornography to thousands of paying customers throughout the world. The success of their endeavor was based on supply and demand. Customer demand escalated, promoting further production as well as demands for newer and more novel material. Real children were sexually abused and their abuse photographed or videotaped to satisfy the needs of a specific clientele. In April 2000 the Reedys were charged in a Forth Worth U.S. District Court. A federal grand jury returned an 89-count indictment against them, charging conspiracy to advertise and distribute child pornography and possession of child pornography. Plea offers by the prosecutors were declined and the case went to trial. Defense attorneys argued that the Reedys were not aware of the actual content of the various Web sites they advertised; however, evidence obtained from the Reedys� computers revealed otherwise. During the trial, a detective from the United Kingdom�s National Crime Squad summarized the inescapable bottom line issue with regard to child pornography. The detective, by way of illustration, told the story of two children who are well known in the world of child pornography. Helen and Gavin are British children who were sexually abused and exploited by their stepfather. As the detective explained, the children are victimized again and again whenever their pictures are reproduced, sold and further disseminated. At the conclusion of the case, the jury found the defendants guilty as charged on all counts of the indictment. On August 6, 2001, Thomas Reedy was sentenced to 15 years in federal prison on each of the 89 counts charged. The judge ordered that each 15-year term run consecutive to the previous term for a total of 1335 years. Janice Reedy was sentenced to a 14-year term. On August 8 Attorney General John Ashcroft and the Chief Postal Inspector held a press event and publicly announced the investigation and results. The sentences were appealed to the U.S. Court of Appeals for the Fifth Circuit. On appeal, Thomas Reedy�s sentence was reduced to 180 years--in essence, a life sentence--and Janice�s remained the same. Using intelligence gained from the Landslide investigation, Postal Inspectors launched Operation Avalanche in collaboration with the federally funded ICAC Task Forces, resulting in the arrest of hundreds of offenders here in the United States. Internationally, Postal Inspectors worked with INTERPOL and other law enforcement agencies around the world tracking down more Landslide customers and suppliers. More than 8,000 search warrants to date have been carried out, making this the largest global operation ever undertaken. No single offender profile could be created for those individuals who purchased child pornography from Landslide�s criminal business. Occupations of the offenders included, but were not limited to, attorneys, physicians, firefighters, professional counselors for children, teachers, clergy, and law enforcement officers. Through Operation Avalanche, vast quantities of child pornography were seized, scores of individuals arrested, and many children rescued from further sexual abuse and exploitation. On October 23, 2002, President George W. Bush was personally briefed by representatives of the USPIS on the Landslide investigation and Operation Avalanche. Following the briefing, the President addressed a group of law enforcement personnel and child protection advocates gathered at the White House. In his statement, the President made a commitment to the American people: "Anyone who targets a child for harm will be a primary target of law enforcement. That�s our commitment. Anyone who takes the life or innocence of a child will be punished to the full extent of the law" (Bush, 2002). The President used Operation Avalanche and the work of the Postal Inspectors as an example of the government�s aggressive efforts to combat the sexual exploitation of children. Operation Lost Innocence In September 2002 Angel Mariscal, an Ecuadorian national was arrested by the Postal Inspection Service in Miami, Florida. He was charged with distributing child pornography by mail and indicted on conspiracy charges to produce and ship child pornography. The investigation that ensued revealed a horrifying case of sexual abuse, rape, and commercial exploitation of more than 150 child victims, unraveling an international child pornography ring of shocking proportions. � In 1989 Angel Mariscal began conducting a mail order child � pornography business. He produced the child pornography � outside of the United States, imported it into the United � States, and then mailed it to customers who had previously � placed orders in response to advertisements or catalogs. � The majority of the victims were Cuban and Ecuadorian � children between the ages of 9 and 16. The child � pornography was personally produced by Mariscal and his � accomplices, featuring Mariscal himself as the one who � raped and molested the children. When his business dissolved � in September 2002, the videotapes he produced sold for as � much as $975. It was later learned that Mariscal was HIV � positive. � In December 2002 Mariscal was indicted in the Southern District � of Florida on charges of Conspiracy to Produce Child Pornography, � Advertising Child Pornography, and Importation of Child � Pornography. Based on information provided by Postal Inspectors, � law enforcement authorities in Cuba and Ecuador arrested five � co-conspirators and identified a number of child victims. Postal � Inspectors participated in Mariscal�s arrest in Ecuador. He was � tried and convicted in April 2004 and sentenced to 100 years in � federal prison -- in essence, a life sentence. Although cases like these involving the commercial distribution of child pornography frequently get the most public attention, they are not as common as investigations into non-commercial traffickers. Non-commercial cases involve perpetrators who exchange child pornography with others -- unlawfully receiving, distributing, and possessing child pornography for their own personal use and sexual gratification. However, the investigation of non-commercial traffickers often leads Postal Inspectors to the very people who produce child pornography, and ultimately to the identification and recovery of children who have been victimized. Following are significant investigations conducted by Postal Inspectors into non-commercial traffickers of child pornography. Non-Commercial Traffickers Covington, Kentucky - In March 2006 Postal Inspectors were notified about a package in the mail that was believed to contain child pornography. The package was addressed to a Covington, Kentucky man. Working with the Covington Police, Postal Inspectors searched the intended recipient�s residence and uncovered hundreds of sexually explicit magazines, videos and DVDs of minor males. The man used the U.S. Mail to receive and distribute child pornography, including pictures taken by the subject himself. He was immediately arrested on state charges of disseminating child pornography. Efforts are underway to identify the children depicted in the photographs. Federal prosecution is pending. Slinger, Wisconsin - In February 2006 first-degree homicide charges were filed against a subject who, in a murder-for-hire scheme, conspired to have murdered his 16-year old stepdaughter, whom he allegedly sexually abused for ten years, as well as two others who had witnessed the abuse. The subject came to the attention of Postal Inspectors in June 2005 when he attempted to purchase child pornography from an undercover operation run by Postal Inspectors. His abuse of his stepdaughter came to light in the course of the investigation. The case was worked jointly with the Washington, Wisconsin County Sheriff�s Department and Wisconsin Department of Justice (ICAC). The subject faces 60 years imprisonment on each conspiracy charge if convicted. A cash bond of $500,000 was set. Meridian, Mississippi - In January 2006 a resident of Meridian, Mississippi, was arrested after he traveled to Birmingham, Alabama, intending to have sexual intercourse with what he believed to be an 11-year old girl. The "girl" was actually an undercover Birmingham, Alabama Police Officer working with Postal Inspectors and FBI Special Agents in an online sting operation. The subject corresponded with the undercover officers via the U.S. Mail, sending order forms and payment to the "escort service." The subject was interviewed and subsequently admitted to secretly videotaping children from his church where he was actively involved in youth programs. The children were filmed changing clothes. The investigation is continuing with federal prosecution pending in Alabama and Mississippi. � Memphis, Tennessee -- In May 2005 a suspect and his "on-line � girlfriend" were sentenced in federal court for using the mail � and Internet to distribute and receive child pornography. The � suspect was sentenced to 15 years in prison and five years� � supervised release; his girlfriend received five years in prison � and two years� supervised release. Postal Inspectors initiated � the investigation when the suspect�s wife discovered CDs � containing child pornography in their bedroom and a mailing � envelope bearing the suspect�s name and address. A search warrant � was executed on the residence and tens of thousands of child � pornography images were discovered on his computer. Several � pornographic images of his neighbor�s granddaughter were also � recovered. The suspect later pled guilty to producing the images � and to using the mail and the Internet to distribute and receive � child pornography. � Brimfield, Ohio -- In December 2005 a suspect pled guilty in � state court and was sentenced to life in prison for the rape of � a child. The suspect was arrested six months earlier on charges � of gross sexual imposition and felony rape following an � investigation conducted by Postal Inspectors. Evidence seized � during a search of the suspect�s residence revealed he had � received child pornography via the U.S. Mail. The suspect later � admitted to three separate instances of sexual conduct with � minors. Follow-up investigation led to the identification and � interview of one of the victims, a 14-year-old girl who was � only 8 years old at the time the molestation began, and the � daughter of one of the suspect�s co-workers. Kirkwood, Illinois - In January 2006 a Kirkwood, Illinois, man pleaded guilty to a 4-count federal indictment for production of child pornography and receipt of child pornography. The man came to the attention of Postal Inspectors during the course of an undercover investigation. Inspectors determined that the suspect, a 31-year-old, married, father of a pre-school aged son, regularly contacted young girls on the Internet and convinced them to meet him in local parks where they would engage in sexual activity. He also convinced the girls to take sexually explicit photographs of themselves and mail the pictures to him. Three child victims were identified through this investigation. The man is scheduled for sentencing in April 2006 � Redwood City, California - Postal Inspectors arrested a � 41-year-old man in July 2005 for violating federal child � pornography laws. The previous January, Customs and Border � Protection personnel assigned to the international mail � facility in Los Angeles intercepted a number of DVDs � containing child pornography that were addressed to the � suspect. The DVDs were coming from Thailand. Postal � Inspectors obtained and served a federal search warrant on � the suspect�s home, seizing additional evidence consisting � of CD-ROMs, ZIP disks, and his computer. Following a � comprehensive review of the evidence, it was determined � the suspect possessed in excess of 127,000 child � pornography pictures and videos. The National Center for � Missing and Exploited Children has positively identified � over 400 of the children depicted in the images. The � suspect is free on $100,000 bond pending trial. The Mighty Efforts of a Small Agency For a small federal law enforcement agency, the USPIS deals a mighty blow to those who would use the mail to produce, transmit, or possess child pornography, and who would otherwise sexually exploit children. The expertise of Postal Inspectors is demonstrated by the number of times prosecutors and other law enforcement agencies turn to the Postal Inspection Service for assistance with particularly difficult cases. In August 2000 a Postal Inspector in Tampa, Florida, was called upon by local law enforcement to assist in a missing child case when it was suspected the child may have been lured away from her home by an individual she met on the Internet. The parents found evidence of correspondence with the suspect in their daughter�s bedroom. A forensic examination of the child�s computer and other evidence obtained by Postal Inspectors resulted in the identification of the suspect who was believed to be living in Greece. Through coordination with the NCMEC, INTERPOL, the U.S. and Greek embassies, and with the assistance of the FBI in Greece, the suspect was arrested in Athens on February 1, 2001. The 14-year old girl, having been traumatically sexually abused by the suspect, was recovered and reunited with her family. Postal Inspector April Hindin, the lead agent, was recognized for her tremendous work in this case when she was presented the following year on Capitol Hill with the National Missing and Exploited Children�s Award. In addition to Postal Inspector April Hindin�s recognition, other Postal Inspectors have received the prestigious National Missing and Exploited Children�s Awards for the past seven consecutive years. The awards are given at a Congressional Breakfast and Awards Ceremony in cooperation with the NCMEC, here in Washington D.C. to investigators who have conducted outstanding investigations in the cases of missing and exploited children. Singled out in 1999, 2001, 2003, and 2004 Postal Inspectors were given top honors by being named Officers of the Year. No other agency has achieved such acclaim. More than any award or other recognition, however, there is no greater satisfaction for a Postal Inspector than the knowledge they have helped the very people in this world least able to defend themselves. For one Postal Inspector that moment came in 2003 when a former victim wrote: When I was a little girl, when I was being photographed and raped, I used to try and send messages with my eyes down the lens, in the hope that one day a "good person" might see and come and help us. It took years for me to realise (sic) that no one was looking at my face. You saw our face. We want you to know, that we know, how hard this must have been for you all and we thank you from the bottom of our hearts for your courage and fortitude. Your actions have changed our lives and changed the future lives of thousands of innocent children who were yet to come. Thank you Thank you Thank you. We have come a long way since the first federal child exploitation laws were enacted in 1977, but we still have much further to go. Only through our continuing efforts, both individually and collectively, at all levels of government and private enterprise, can we ensure that children are protected from this type of victimization, and if victimized, that they receive the services and assistance they need, and that their offenders are caught and prosecuted to the full extent of the law. Thank you for the opportunity to share with you the very special contribution that U.S. Postal Inspectors make in the fight against the sexual exploitation of children through the Internet. Mr. Whitfield. Thank you, Mr. Kezer, and our next witness is Raymond Smith, who is the Assistant Inspector in Charge for Child Pornography and Adult Obscenity, at the U.S. Postal Inspection Service, and you are recognized for 5 minutes. Mr. Smith. Thank you, Mr. Chairman. Good morning. And members of the subcommittee. I am very pleased to be here today on this particular topic, because I have devoted a great deal of my career to investigating these types of crimes. I investigated my first child pornography case in 1982, and now I am able to manage our programs at the national level. People unfamiliar with the work of the Postal Inspection Service often ask why are postal inspectors involved in these things that, today, seem to involve so much of the Internet? The answer is, because along with the Internet, the bad guys are still using the mail. In fact, 98 percent of the cases investigated by postal inspectors today involve the mail as well as the Internet. We have developed a great deal of expertise using the computer and the Internet as an investigative tool to ferret out and identify the offenders who are trafficking in child pornography videotapes, computer disks, or otherwise sexually exploiting children through the mail. We know how these offenders think, how they operate, and what their psychological needs are. The worst of these offenders exhibit highly compulsive and predictable patterns of behavior. They have a need to validate their behavior with like-minded individuals through communication, not only on the Internet, but also in the mail. Postal inspectors use a wide variety of proactive undercover operations to identify suspects, and develop strong cases for prosecution. In many cases, we employ the use of controlled deliveries by mail, something only postal inspectors can do. Following the controlled delivery, an anticipatory Federal search warrant is executed on the suspect�s property, and the child pornography that was just delivered under controlled circumstances is recovered, along with any other relevant evidence associated with the underlying criminal activity. Coincidentally, on March 21 of this year, in U.S. v. Grubbs, a Supreme Court case, it was also a Postal Inspection Service case, the Court came back unanimously upholding the lawfulness and use of anticipatory search warrants. Commercial child pornography dealers have long been targeted by postal inspectors. In 1996, Operation Special Delivery shut down the largest commercial distributor at that time, grossing upwards of $500,000 a year. After dismantling the business, postal inspectors took it over in an undercover capacity, and targeted their customers across the country, resulting in over 100 successful prosecutions. Many of these individuals had been sexually abusing children. Perhaps the most celebrated commercial child pornography business operating on the Internet was Landslide Productions, owned and operated by Thomas and Janice Reedy out of Fort Worth, Texas. This company took in upwards of $1.4 million a month. They were advertising and selling child pornography websites to subscribers around the world. Later to become known as Operation Avalanche, this landmark case was conducted under the direction of the U.S. Postal Inspection Service, in close cooperation with the U.S. Department of Justice Child Exploitation and Obscenity Section, along with the Dallas Texas Police Department Internet Crimes Against Children Task Force. In the end, Thomas Reedy received 180 years in Federal prison, in essence, a life sentence. His wife received 14 years. Postal inspectors then worked with the various Internet Crimes Against Children Task Forces across the country, and arrested hundreds of paying subscribers in the United States, then working through Interpol and with our international partners, over 8,000 searches were conducted around the world, making this the largest global operation ever undertaken. Huge amounts of child pornography were seized, scores of individuals were arrested, and many children were rescued from further sexual abuse. Although commercial cases like these get the most public attention, it is oftentimes the most typical noncommercial case that identifies child molesters, the producers of this material, and their child victims. Just a couple weeks ago, in Covington, Kentucky, postal inspectors working with Covington PD arrested a man after a package containing DVDs of nude minor males was delivered in error to the Cincinnati Reds ballpark. During a search of the man�s home, hundreds of vintage child pornography magazines, videotapes, and DVDs were discovered, along with packaging material for receiving and distributing child pornography through the mail, including pictures apparently taken by himself of kids. Efforts are underway to identify these children, and Federal prosecution has been authorized. In another case last week, a 15-year veteran of the Huntsville, Alabama Police Department was arrested by postal inspectors on a Federal charge of production of child pornography. This offender, discovered after he traveled to Titus, Texas, to sexually abuse a 14-year-old girl that he met on the Internet, continued to keep her in his confidence, and convinced this girl, after mailing her a package of a sexual aid and a digital camera, to take pictures of herself. The digital memory card from that camera was then mailed back to the police officer in Texas. Over 300 such images were produced by this young child. He is in custody. Deputy Chief Kezer mentioned the national awards received by postal inspectors, but I must tell you this, more than any other award or recognition, there is nothing greater than knowing that you have helped one of the many, very many people in this world least able to defend themselves. For me, one of those occasions came in 2003, when a former victim learned of our Operation Avalanche, and wrote to me. I would like to read one paragraph from her correspondence: "When I was a little girl, and when I was being photographed and raped, I used to try to send messages with my eyes down the lens, and hope that one day, a good person might see and come to help us. It took years for me to realize no one was looking at my face. You saw our face, and we want you to know that we know how hard this must have been for all of you, and we thank you from the bottom of our hearts for your courage and your fortitude. Your actions have changed the future lives of thousands of innocent children who are yet to come. Thank you, thank you, thank you. In closing, we have come a long way over the years, but we have still got much further to go. Only through our continuing efforts, both individually and collectively, at all levels of government service, and through private enterprise, can we help ensure that victims and their families get the services and assistance they need and deserve, and that their offenders will face the swift and righteous justice that we, as a society, demand. We all have the need here, and the obligation, to make this world a safer place for our kids. Thank you. Mr. Whitfield. Well, Mr. Smith, thank you, and thank all of you for your testimony. You have provided some tremendous suggestions for us to consider. You have provided some tremendous insights. We have two votes on the House floor right this minute, and so what we are going to do is we are going to recess this hearing until 12:15. So, if you all wouldn�t mind coming back in at 12:15, we have questions for you. Mr. Stupak. Mr. Chairman, if I may, let us see, the full chairman is here, Chairman Barton, I see that the Attorney General, Mr. Gonzalez, testified this morning 9:00. Chairman Barton. I have already been down there. Mr. Stupak. Okay. Good. Just wanted to make sure you are aware of it, because on page 6 and 7 of his testimony, he talks about child pornography on the Internet. It would be great if we could get him up here. Chairman Barton. I have already been down there, and I have a scout down there, so when he gets ready to leave, he has agreed to talk to me. We are going to have a little visit. Mr. Stupak. Thank you. Chairman Barton. We are ahead of you. Mr. Whitfield. We will recess until 12:15. [Recess.] Mr. Whitfield. The hearing will reconvene, and I apologize we are 5 minutes late, but thank you for your patience. Dr. Kardasz, in your testimony, you talked quite a bit about retaining data on subscriber and content information. You are the one that mentioned that, aren�t you? Mr. Kardasz. Yes, sir. Mr. Whitfield. As one of the possible solutions or helpful solutions, would you elaborate on that just a little bit more, and also, what would you anticipate would be the objections to doing that? Mr. Kardasz. Every computer connected to the Internet is identifiable by what is called an Internet Protocol address, and it is a series of numbers. It is similar to the numbers you have connected to your cell phone. You have got a cell phone number. So, through subpoena powers, we can start to trace that back, and in the cell phone industry, they keep those records for long periods of time, but that is not always the case in the Internet service provider industry. Some providers keep those records, so that we can chase back the offender for longer periods of time than others. So, as in a case that Special Agent Waters described, if we are trying to track back on an offender, and the subscriber information that is connected to that Internet Protocol address is not available, then we are at a dead end, and I think the objections would be the cost. Now, they are going to say, and I don�t disagree with it, that that is a lot of data that they are going to have to retain, and then, the subsequent searches they have to do in response to our subpoenas is going to cost them some manpower, so I think that is what an IP address, and that is the data storage that we need, and I think that is the issue, the cost. Mr. Whitfield. And what would be the suggestion on the length of time to retain the data? Mr. Kardasz. Well, when we get an investigation in, it is not like we always get it in the next day. Mr. Whitfield. Right. Mr. Kardasz. So, sometimes, there is a long period of time that passes before we get it in, it gets up to the investigator�s queue, and he is able to work it, and then he is able to get a subpoena out. Mr. Whitfield. Right. Mr. Kardasz. So, I have heard my colleagues bounce around 90 days would be nice, a year would be great, but the longer period of time that it has to be kept, then, the more data overall has to be stored by that Internet service provider, so the more storage capacity they need, the more that might cost them. Mr. Whitfield. Now, I assume the entire panel would agree that that would be an invaluable tool, and it would be a positive development. Is that true? So, no one would object to some statutory language, or action to that effect. What about applying this data retention to cell phone companies that are also providing the ability of a person to exchange images? Mr. Kardasz. I am not familiar enough with the data retention schedules that cell phone companies have now. I get the sense that they already retain some data, but it would be very applicable to them. Some of those cell phones now, as you know, can also capture pictures. We have had some child pornography cases attached to those folks that are running around with cell phones capturing child pornography on their cell phone cameras. Mr. Whitfield. Is there anyone on the panel that would want to make any comment about the cell phone? Okay. Mr. Waters, in your testimony, I know you showed the slide of the two children with the Santa Claus, and make sure I understand, those children were your children? Mr. Waters. That is correct, Mr. Chairman. My two youngest. Mr. Whitfield. And they went to a local mall, and he was the Santa Claus, and then, you set yourself in a sort of a sting operation, and this is the same fellow. Is that correct? Mr. Waters. That is correct, Mr. Chairman. My wife took them to the mall shortly after Thanksgiving, got the photos taken, and then, towards the end of December, I was online in a Wyoming chat room, just sitting around, and I was contacted by this same person. Mr. Whitfield. Was he convicted, or-- Mr. Waters. Yes, he was. Mr. Whitfield. Okay. Dr. Kardasz, you also mentioned something about responding to subpoenas within a certain period of time. Mr. Kardasz. Yes, sir. Mr. Whitfield. Would you elaborate on that? Mr. Kardasz. Well, Mr. Chairman, depending on which Internet service provider we are working with when we send a subpoena, they respond various lengths of time later. Ideally, we would like to get a response as soon as we can, particularly, in the case where we are working an active Internet sexual predator, for example, we are online, pretending to be a child. All we have is a screen name, so we do a little research on that screen name, and find out which Internet service provider sponsors that screen name. Now, we can subpoena that Internet service provider to say who is this person, Joe Smith at Yahoo!, at AOL, we can subpoena Yahoo! or AOL, and say who is this person? What is the background information behind that subscriber? So, then, depending on which Internet service provider is involved, it takes them different periods of time. If we could get that within--the quicker, the better, obviously, particularly if it is a missing child case that we are working. But if we can turn those subpoenas around within 2 weeks, that would be a beautiful thing. Mr. Whitfield. So, would all of you agree that one of the most difficult parts of your job is just trying to determine who the person is on the other line, right, or with the, as the website, or whatever. And so, the data retrieval would be important, the expedited response to subpoenas would be important. Do any of you have any other suggestions of some mechanisms that could be used to help you do your job better? Yes, sir. Mr. Smith. Mr. Chairman, we have no statutory authority or otherwise authority to get administrative subpoenas. When we enter into an investigation now, and we have an individual�s screen name, we must get a Federal grand jury subpoena to serve on that Internet service provider in order to get the account information. A number of years ago, under the last Administration, beginning with Attorney General Janet Reno and it was concluded by Attorney General Ashcroft, the FBI was delegated administrative subpoena authority by the Attorney General. The authority went to the Attorney General, it was delegated to each individual U.S. Attorney�s Office, and they in turn delegated it to the Bureau. Bureau agents can now write the administrative subpoena out quickly, get it out without going for a grand jury subpoena, and get that information back a lot quicker. The Immigration and Customs Enforcement, they use a tool which I believe is called a customs summons, which is not necessarily designed as an administrative subpoena, but it serves the same purpose lawfully, and they are able to get that information. Postal Inspection Service cannot. Mr. Whitfield. So, Postal Inspection is the only agency in law enforcement that would not have the administrative-- Mr. Smith. No, at the Federal level, and I am not sure about Secret Service. I can�t comment on that. Mr. Whitfield. Now, what is the difference in an administrative subpoena and-- Mr. Smith. It expedites things. Typically, we would have to go and make a phone call to an Assistant United States Attorney. Oftentimes, we get multiple, multiple names or screen names in an investigation. Give you an example. I am going to use the Justin Berry case, and I don�t know all the intimate details with that case, but if there were 1,500 names, you have 1,500 screen names that came forward, we might want to know who those people are. What does that screen name resolve back to on the actual account information? Who holds the account, where do they live, et cetera, et cetera. We could conceivably go to a U.S. Attorney�s Office, say I need 1,500 grand jury subpoenas, or maybe one, and list out 1,500 names. It just is cumbersome if we have to keep going back and bugging the U.S. Attorney�s Office every day of the week to get another grand jury subpoena. With the administrative subpoena, it is a tool that the investigative agency can use to serve. Of course, it is all tracked and recorded, and they have to account for that information to the Justice Department. Mr. Whitfield. Yeah. Well, Mr. Swecker would be available to the FBI, correct? Mr. Swecker. It is available at the supervisory level. It has been delegated down, and he is correct, it gives you the ability to move much faster, you are much more mobile and agile, because probable cause evaporates very quickly in these cases, and you really need to be able to move very quickly and able to get to either the customers or the abusers themselves, so this gives the ability to do that. Mr. Whitfield. Do you know if that tool was used in the Justin Berry case, or can you talk about it? Mr. Swecker. Sir, I would love to talk to you about the case, but I cannot. Mr. Whitfield. All right. How many FBI field agents are devoted full time to child pornography, or child molestation cases? Mr. Swecker. We are funded for 127. We actually have close to 250 agents working just Innocent Images, child abusers on the Internet. Mr. Whitfield. 250? Mr. Swecker. Yes, sir. Mr. Whitfield. Now, we are told that there are six FBI special agents working at the Innocent Images National Initiative, that in fact, two slots are not filled. Even with having eight special agents devoted to this work full-time, given the magnitude, do you think that--well, he said 250, but we are told that there are six FBI special agents working on the Innocent Images National Initiative. Mr. Swecker. There are six at NCMEC, at the National Center for Missing and Exploited Children. It is two agents, four analysts. Mr. Whitfield. Okay. But we are told that two slots are not filled. Is that correct? Mr. Swecker. They are in the process of being filled. There is normal rotation in and out. Mr. Whitfield. Okay. Okay. Now, do you all feel that the financial services industry could do more to assist law enforcement in these cases, and if so, how do you think they could be more effective in what they are doing? How could they assist you more? Mr. Swecker. Mr. Swecker. I watched Ernie Allen�s testimony yesterday, and I think those types of initiatives, where you get cooperation from these PayPals and credit card companies and financial clearinghouses that enable the payments, some of them, right now, it is voluntary cooperation, if there is some method of ensuring that they will be cooperative. Some are more cooperative than others. Mr. Whitfield. Yeah. Mr. Plitt, do you have any comment on that? Mr. Plitt. We agree. We assist with those cases, and of course, our concern is that much of the money flows overseas. We are looking at the trans-border side of it. So, any international cooperation from the credit card companies, financial services companies in other countries, is what we target, and we also invite. Mr. Whitfield. And what about digital currencies? Mr. Plitt. Digital currencies. In the past, I would say eighteen months, digital currencies have started to appear in these cases, and they are absolutely important. They allow the free, unmonitored movement of money between countries, and to various Internet services. The currency area is something we have been looking at for a while now, and they are occurring in these child exploitation cases. Mr. Whitfield. It seems to me the one impediment to effective prosecution in these cases is we have so many agencies across so many jurisdictions, and it must require a lot of coordination, and working with each other, and teamwork. You must all be frustrated by the complexity of prosecuting. Would that be accurate? Mr. Swecker. If I may. There is plenty of work for everybody. And I worked drugs for a good part of my career, saw a lot of overlap and duplication. We are not seeing that in this area. I think everybody recognizes the importance of it, and I think it is better to have a good number of agencies working it. The National Center has been a very good clearinghouse for this type of activity. NCMEC has been very effective in that area, because we all have analysts out there. We all have investigators out there. Mr. Whitfield. Well, I know that many law enforcement agencies have jurisdictional disputes, but hopefully, this is one area, as you said, where there can be more cooperation and less concern about jurisdictional protections. I am assuming that is the way you all feel about it. All right. My time has expired, so I will recognize Mr. Stupak. Mr. Stupak. Thank you, Mr. Chairman. Mr. Swecker, back in �99, Congress passed a law that required Internet service providers to report any knowledge the ISPs may have of child pornography to the Cyber TipLine, which is run by the National Center for Missing and Exploited Children, and then, they must forward that report to law enforcement agencies, and that is 42 USC � 13032, and we have fines in there for failing to report and all this. But this law did not require the service providers to monitor, to actively monitor their networks, but still, if they came across it, they were supposed to report it. Tuesday, we learned from Mr. Allen that this law has never been implemented, because the Justice Department said they refused to issue the guidelines, or take any steps to implement it. The guidelines were drafted, we understand, in late 2000 under the Clinton Administration. Attorney General Ashcroft, for some reason, did not want to implement it. Any reason why? Mr. Swecker. Sir, I am not sure. It would be a great tool. We see that success in the bank secrecy area, with the banks making referrals through the SAR process. This would certainly be a help to us. Mr. Stupak. Were you aware of the law? Mr. Swecker. I am aware of it, but I-- Mr. Stupak. Have you attempted to use it? Mr. Swecker. Well, we don�t have any guidelines or regs to implement it yet, so we haven�t been able to use it. Mr. Whitfield. If I may interrupt. Mr. Swecker, would you talk to the appropriate people at Justice, and ask them to give a formal response to Mr. Stupak�s question on that issue? Mr. Stupak. Because it has been almost 7 years? Mr. Swecker. Yes. Mr. Stupak. And I think you mentioned, Doctor, about the ISPs, how important they could be to Internet service providers to helping us, here is a law that Congress did in �99, it is not even implemented. Mr. Kardasz. Well, Congressman, one important thing that happened as a result of that law is that we got a flood of child pornography investigations that overwhelmed us, that came from some of the responsible ISPs that, when they were finding child pornography on their servers, they were reporting those to us, and we are still getting those investigations in today. So, part of that law is being implemented by those ISPs who have chosen to abide by it. Mr. Stupak. Sure. Mr. Swecker, you mentioned--oh, Mr. Smith, you had a comment? I am sorry. Mr. Smith. Just to follow up on that, with that law that requires ISPs to report violations to the National Center, that is the Cyber TipLine II part of the National Center, the I being the public. And as I understand it, the larger ISPs do, in fact, report the information, but hundreds and hundreds of small ones, if not thousands, do not, and then, there is no enforcement provision. There is no penalty associated with non-reporting. Mr. Stupak. Well, there is a civil penalty up to $100,000. Mr. Smith. Okay. I don�t know is it has ever been pursued. Mr. Stupak. Well, testimony is showing that there are like 215 of the ISPs voluntarily report this stuff, but there are thousands upon thousands of thousands out there, and that is not even counting the wireless that we are starting to see more and more of now. So, I mean, it has got to be a phenomenal problem, but we are trying to design laws that will help you out, but when they sit for 7 years, and no, the first we learned about it was Tuesday, that there was a problem with it, according to the Attorney General, so that is why the full Chairman and everyone else wanted someone here to answer his questions. Mr. Swecker, you mentioned the Justin Berry case. Is Justice in lead on that case? Who is the lead agency? Mr. Swecker. We are the investigators, and we are the lead investigative agency on that. Mr. Stupak. Who would be the lead person in charge of that? Mr. Swecker. Within our agency, there are case agents around the country. Arnold Bell coordinates the investigation from our headquarters. He is the Unit Chief of the Innocent Images Unit. Mr. Stupak. Right, Mr. Bell, who we asked for today. Mr. Swecker. I would say, sir, that we are trying very hard not to jeopardize any future prosecution. I think there is logic in not commenting. Mr. Stupak. And I don�t think this committee has ever jeopardized one of your investigations, but I know Justin Berry and everyone else would just like to know what the heck you are doing. You got a very big black eye here Tuesday, and it is getting bigger by the minute, but you just keep saying well, we can�t answer these questions. No one has asked any inappropriate questions, and I am sure if it was an inappropriate question which would jeopardize the investigation, the person, Mr. Bell or others, would say I can�t answer that. We will answer in closed session. So don�t give us that line. You indicated there were 250 agents that work on child pornography in Justice? Mr. Swecker. Within the FBI. Mr. Stupak. Within the FBI. So you have 250 agents assigned to doing child pornography, or do you just have agents who, from time to time, may work on child pornography. Mr. Swecker. That is actual agents working the system. Mr. Stupak. Which their main emphasis would be child pornography. Mr. Swecker. Sole emphasis. Mr. Stupak. Okay. Mr. Swecker, how about forfeiture statutes. I think ICE has used them. Has Justice ever used forfeiture statutes to get the assets of these individuals? Have you ever used that mechanism? Mr. Swecker. We have. I don�t have any numbers for you. Mr. Stupak. You are familiar with them with drug cases, then, right? Mr. Swecker. Absolutely, and white collar cases as well. Mr. Stupak. Any reason why they could not be used here? Is there anything we have to do to change the law to make sure you could use them in child pornography? Mr. Swecker. I think we have the forfeiture tools available to us. Mr. Stupak. Okay. Mr. Swecker. That was one of the things that came into being very early on. Mr. Stupak. Okay. Let me go back to the Berry case for a minute. If the FBI has an agreement, there is an understanding out there, it is my understanding, to provide all images to the National Center for Missing and Exploited Children, but Missing and Exploited Children said they have never received anything. So, CEOS, then, probably has nothing from the Berry case. And the Berry case has been sitting for over, I think, 71 days now, if I count. So, what is going with that, then? I mean, if National Center has not received the information, then CEOS wouldn�t have received the information. It seems like it is bottled up in Justice. Is that right? Mr. Swecker. Well, again, let me just talk generically, if I may. Mr. Stupak. Sure. Mr. Swecker. When we get this volume of images in any case, we have to review it, each one of them, and filter out regular pornography, as opposed to child pornography. What we forward over, it has to be viewed, and some agent has to get on the screen, or print it out, and look at the images, and then, it goes over. Mr. Stupak. Right. Mr. Swecker. That is as far as I can go with that response. Mr. Stupak. Okay. Well, if you have got 250 agents exclusively doing it, I think someone could get to it in 71 days, I would think. Seven months, I am sorry, 7 months. I said--can�t read my own writing--7 months. So, there is no reason for it. And I can understand why Mr. Berry is frustrated. In our testimony Tuesday, I think it was, the reporter from the New York Times indicated that credit cards are really the center of this, sort of money. Have you done anything to try to crack down on credit cards, transactions that are used in child pornography? Mr. Swecker. Well, we can only address these credit card cases in the context of a case. I mean, if we go beyond that, we are not regulators, as we know, but we do find quite, I mean, this is a chokepoint for these types of cases. It is a good place to get your leads, and it is good place to center, but I will say that we get thousands and thousands and thousands of these credit card companies. The volume is overwhelming. Mr. Stupak. Well, with credit cards, we see with the Internet pharmacy illegal sales. We see it with drug masking chemicals and devices for drug testing, and we see it with child pornography. Do you have any recommendations on what Congress should be doing to try to crack down on credit cards being used in an illegal manner like this? Mr. Swecker. Sir, I would have to defer to main Justice on any of those legislative solutions. Mr. Stupak. Mr. Plitt, if I may, you testified that ICE, your main areas are border, and then, of course, international, to help. Mr. Plitt. Yes, trans-border. Mr. Stupak. So, like on the Berry case, did you assist there, since there is a tie in to Mexico? Mr. Plitt. No, I believe that, if I recall correctly, the ICE link to the Berry case came through the back door, if you will. Another ICE arrest occurred, and the individual indicated that he had purchased, I believe, access to Mr. Berry�s site, so once that had occurred, we stepped back, because another agency was handling this case, the Bureau. There was one arrest, led to a second arrest. The second arrest was linked to Mr. Berry. Mr. Stupak. Okay. So, all right. Dr. Kardasz, if I can, this law we have been talking about a little bit, 13032, where Internet providers, have you tried to access or use that law much? The Federal law, the one I have been speaking 42 USC � 13032, which Internet providers are supposed to contact you? Mr. Kardasz. No. Mr. Stupak. I am sorry, they contact National Center. Mr. Kardasz. No, the way that that law has come to me is just that the images-- Mr. Stupak. Comes-- Mr. Kardasz. --that law have come back to me, and I don�t work to enforce that law in any way. Mr. Stupak. So, you are asking that these ISPs retain their information for 1 year? Mr. Kardasz. That would be ideal, sir. Mr. Stupak. Okay. And then, do you have anything like--in Arizona, is that where you are working, right? Mr. Kardasz. Yes, sir. Mr. Stupak. Do you have anything like an administrative subpoena that Mr. Smith spoke of, that allows you to move rapidly? Mr. Kardasz. We do. It is very helpful. Mr. Stupak. What do they call it out there? Mr. Kardasz. Administrative subpoena, I believe. But what it allows my investigators to do is to write up a subpoena at their desk. The county attorney has authorized them to phone him, or contact him by email, tell the county attorney that they have an ongoing felony investigation, give them a little bit of background on what is going on, and then the investigator can fax the subpoena off to the Internet service provider, receive the information back from the Internet service provider, which saves the investigator from having to go find a grand jury, or some other legal authority, to get the subpoena authorized. So, that is the manner in which it speeds up our work. Mr. Stupak. Well, I guess in the bill we are marking up, what we call a markup, I did an amendment to try to get the phone companies and cables and others to develop new technologies to try to prevent child pornography. Hopefully, that will help you in your work. Technology as a free market system can come up with, hopefully, that will assist you. And one more, if I may, Mr. Chairman. Mr. Plitt, you indicated that ICE was familiar with the Justin Berry case because of the arrest that was made. Did CEOS ask ICE about Justin Berry at all? Mr. Plitt. I don�t believe they did. Mr. Stupak. Okay. Thank you. Mr. Whitfield. Thank you, Mr. Stupak. At this time, we recognize the gentleman from Rhode Island, Mr. Bass. Mr. Bass. When Members of Congress from Kentucky look to the Northeast, they see New England as one State. I actually represent New Hampshire, but it is the same to you, sir. Mr. Whitfield. Thank you for reminding me. Mr. Bass. Mr. Waters, I was struck by your testimony, in which you said there were 4.4 million images worldwide, and 1.9 million images which appear to be domestic, and I am assuming that is because the source is a domestic address. Do you have a way of telling how many hits are occurring on these websites? And this isn�t a question just for you, but for anybody. Let us assume the data here is that you have two million images, in the United States. That is your testimony. I would appreciate comment from anybody here. Anybody have any idea how many hits there are on these--first of all, how many websites are there, and how many hits are there on them? So, what is the size of the community? Mr. Waters. Representative, the images that I spoke about, those are 1.9 million transactions, where people were offering to traffic in those images. Now, the 1.9 million, I can trace to IP addresses in the United States. Mr. Bass. So, the 1.9 million are the hits. Mr. Waters. That is correct. Mr. Bass. Okay. I am just trying to get--transaction means that you ask for something on the Internet, or receive something on the Internet, and so, there were 1.9 million individual requests or receipts for information involving a picture of some child on the Internet, or a message, or something, right? Mr. Waters. That is correct. This deals with, and this particular investigation, a very small set of movies depicting very young victims, very horrendous activity, when the investigator types in, using the software and searches for those, that is the number of download candidates that have been identified over that 24-month period. We have turned a corner somewhat in this area. It is now easier to download, and faster to download 20 minute, 30 minute movies depicting these activities from these file sharing networks than from the websites. Mr. Bass. Peer-to-peer you are talking about now. Mr. Waters. That is correct. Mr. Bass. And you have developed software to do what? Mr. Waters. The software allows the investigators to regionalize their efforts, while contributing to the global network. So, the way it is set up, an investigator types in a search term consistent with these hardcore movies. He receives a list of download candidates for those movies, seven or eight thousand at a time. By submitting that list to servers in Wyoming, ICAC servers, he is given back a list that says of those, these nine are in your State, and then, he can focus his investigative efforts on those nine. But in the background, all of those are submitted to the central server, so from every other State, the investigators, be it FBI, ICE, ICAC, can connect to that server and receive the list of who saw what where. Mr. Bass. Can you just review, how many sites are there, domestically, that provide Internet for child pornography, roughly? Do you know? Mr. Waters. Well, these move beyond the typical definition of a website. These are actually computers in people�s homes, and there are millions. We have identified in this case, just using that series, over a million, 1.4 million unique IP addresses. Mr. Bass. What do you mean series? You are talking about a specific movie or something like that? Mr. Waters. A subset of movies related to these victims. Mr. Bass. So, it doesn�t even start to address the whole breadth of all the pictures that may exist. This isn�t the whole scheme. This is just one program, so to speak. Mr. Waters. Correct. This is just a subset, where I picked very young and very typically violent images of young males and young females. Like I said, these are typically under 8 years old, just in that set. We started out with about two hundred images and movies. Mr. Bass. And you got 1.9 million individuals that accessed that. How many pornographic, child pornography websites are there domestically? Did you answer that question, or does anybody know? Nobody has any idea, do they? Mr. Waters. I don�t think we know, sir. One characteristic you will see is that oftentimes, these websites will come up very quickly, go down very quickly. The site managers tend to do that, simply because it hides the ownership of the site. So, it is oftentimes difficult to estimate exactly how many there are. Mr. Bass. That leads me to another question. Is there technology being developed on the other side of this to deter you? Is that a sophisticated, active industry in itself, to deter your investigation? Mr. Waters. It is. Of course, they seek to hide their identities. Mr. Bass. Nothing new there. Mr. Waters. Yeah. Right. And the technology that they are going to employ is technology that is already out there. They very probably don�t have any research and development activities to develop their own technology. They are using what is available. And peer-to-peer is a great example, because peer-to-peer is now more frequently used. It is easier to use, and of course, the users are becoming more sophisticated, as generations go on. Mr. Bass. How many rescues do you achieve in a given period? Mr. Plitt. Rescues are-- Mr. Bass. Use your mic, please. Your mic is off. Mr. Plitt. ICE tries to specialize in the trans-border cases. The rescues occur at the local level, so I would refer to the ICACs on those. Mr. Bass. You two gentlemen from the Postal Inspection Service, how many of your child pornography cases involve the Internet? Mr. Smith. Today, about 98 percent. Mr. Bass. Ninety eight percent? Give me an example-- Mr. Smith. One aspect of the Internet or the other. Let me give you an example. Mr. Bass. Okay. Mr. Smith. This case that I just referenced, where the child was victimized in Texas. That started on the Internet, because the bad guy, the police officer in Alabama, contacted the child in Texas over the Internet, traveled to Texas, sexually abused her, and then returned to Alabama. They then communicated through the mail after that. He mailed her a package, which the mother discovered. That is how this case came to light. In the package was a vibrator, a digital camera, and a seven page, handwritten letter giving her specific instructions what to do. That is a violation of Federal law. It is a 15-year felony, just the mailing of the camera, if you--any communication facility to induce, coerce, or entice a minor to engage in that type of behavior. It is a 15-year hit. That is one example. In chat rooms, targets hook up with the children, bad guys start talking to the kids, and then, they want to go to the telephone. They will mail the kids calling cards. Let us talk dirty on the telephone. Oftentimes, we will have a commercial site, which may distribute product through the mail. You have the newsgroups out there, where the bad guys all hook up with each other, or in the chat rooms, and then, they end up mailing disks, DVDs, things of that nature, back and forth, although the initial contact is on the Internet. Mr. Bass. So, it is safe to say that the Internet has changed the nature of your investigations dramatically. Mr. Smith. Dramatically. Mr. Bass. Yes, sir. Mr. Kezer. What you have to understand is the reason that percentage is so high is because those are the cases that we are targeting. Although we are working on the Internet, we are trying to identify cases that have the mail involved. That is our mission. Mr. Bass. One last question. Hypothetically, if there was one thing that Congress could do that is not financial, because we don�t have jurisdiction over financial services, it is not judicial, because we can�t deal with subpoenas here, but it had to do with interstate commerce and telecommunications, to assist you A, in conducting your, doing your job, or B, suppressing the problem, what would you suggest we do? Anybody can comment. And we have got 1 minute and 20 seconds, so there is no rush. Mr. Kezer. Sir. I don�t know who would be responsible for it, but someone had made the comment earlier that law enforcement can�t do it all. It is absolutely essential that a comprehensive public education prevention initiative be developed, long term, nationally, and if at all possible, internationally. It is absolutely essential to curb this tide. Mr. Bass. Anybody else? Mr. Plitt. Yeah, I would like to second that. We see so many good initiatives, NGOs, that are trying to do the right thing, it is just that it is difficult for the person at the center of the problem, the child of the parent, to know where to go. So, a coordinated effort, which is education, which is outreach, even victim assistance, would be absolutely fantastic. Mr. Bass. Well, education is also not within our jurisdiction. The only suggestion I have heard all morning has been mandating that ISPs store their addresses longer. Any other suggestions besides that? Because if this hearing is going to lead to anything, it is going to have to lead to some sort of, if there is a legislative initiative necessary, what role would the Internet and telecommunications play in that solution? Any of you gentlemen follow that? Mr. Waters. Well, I think one other area that might be valuable to us is if we can work more with industry, if there is some way that we can facilitate the corporations being able to come forward with solutions for us. There is a lot of-- Mr. Bass. Corporations--what do you mean by that? Mr. Waters. Like Microsoft, for example. As a good example, we have been working with them on tools to establish d e-confliction mechanisms, to allow us to share this information, and get data faster to other law enforcement agencies. We need a serious partnership with business, as well, if that helps. Mr. Bass. My time has expired, Mr. Chairman. Mr. Whitfield. Thank you, Mr. Bass. Mr. Smith, there is just one question, and we will go on to Ms. DeGette. In this Texas case, what was the age of the victim in that case? Mr. Smith. Fourteen years old. Mr. Whitfield. Fourteen, okay. Mr. Bass. One more thing, if I may, Mr. Chairman. Mr. Waters, the slide that you showed us, Santa Claus and all that, could you provide that for the record? Mr. Waters. I have, sir, yes. Mr. Bass. Okay, good. Mr. Whitfield. Ms. DeGette, you are recognized for 10 minutes. Ms. DeGette. Thank you, Mr. Chairman. I want to try to get a sense of the scope of this issue. As I understand it, the U.S. Postal Service has 35 agents working specifically on this issue. Is that correct? Mr. Kezer. Thirty-five. Ms. DeGette. And what about, Mr. Clark, what about ICE? How many agents are working from your agency? Mr. Clark. I would have to defer to Mr. Plitt, who runs our Cyber Center, and basically, coordinates our national program. Ms. DeGette. Mr. Plitt. Mr. Plitt. Yes, the total would be about 140. That is about 90 agents in the field. On top of that would be another, let us say 30 or so doing the actual technical forensics, on computers, who are not necessarily the case agents. And then, between 10 to 12 at Cyber Headquarters. Ms. DeGette. Okay. And Mr. Swecker, the FBI, I think, has about 250 agents working on this. Is that right? Mr. Swecker. That number fluctuates. It is 250 on the street working the cases. There is another group at headquarters in the Cyber Division, you might add 20 or 30 agents to that, and those that are at the Center. Ms. DeGette. And Dr. Kardasz, ICAC, how many agents from your agency are working on this issue? Mr. Kardasz. We have four in the Phoenix Police Department, but we are networked through memorandums of understanding with about 44, 45 other local, State, and county agencies throughout the State of Arizona. Ms. DeGette. So, you are mainly working with local law enforcement agencies. Mr. Kardasz. No--yes, ma�am, but we also work nationwide with the other 46 regional task forces throughout the United States. Ms. DeGette. Okay. Mr. Kardasz. Each of them has groups like mine. Ms. DeGette. Representatives from all these agencies, do you all think that you have enough people working on this issue? Mr. Kardasz. No, ma�am. Ms. DeGette. Do you, Mr. Swecker? Mr. Swecker. We can always use more. Ms. DeGette. Yeah. Mr. Plitt. Mr. Plitt. If we tripled our staff, we would still have significant leads. Ms. DeGette. Yeah. And Mr. Smith, or Mr. Kezer, whoever. Mr. Kezer. I don�t know if there is a law enforcement agency that doesn�t believe that they could use more resources. Ms. DeGette. Well, I mean, the reason I am asking the--I know my Denver Police Department, they want more agents, too. They always want me to get Federal money for them, but the thing is, in this situation with this type of cybercrime that is going on, it has exploded, it seems to me. No one would disagree, would you? So, we have got, I heard today, 4.4 million images, 1.4 million users, according to someone�s testimony. These other countries around the world have maybe 300,000 or something like that. If someone can tell me, how many pending Federal cases do we have right now, involving exploitation of kids on the Internet, sexual exploitation? Does anyone know? Mr. Swecker. Mr. Swecker. I know we have an inventory of about 2,500, and then you have heard of thousands of other investigations on the part of the Task Forces. Ms. DeGette. How many cases are pending? How many criminal investigations have been filed? Mr. Swecker. You would have to aggregate them all up with all the agencies-- Ms. DeGette. Thousands? Mr. Swecker. Thousands. Ms. DeGette. Okay. But we could potentially have many more thousands, if we had enough investigators, right? It seems to me that--I know this isn�t in the purview of our committee, and that has stymied you guys a little bit, but it seems to me, Mr. Chairman, we should really work with the appropriators and the agencies, just to try to get them more resources to fight this, because I started my life out as a criminal defense lawyer , and for crimes like this, and we saw it happen in this country, when child porn was going out through the mail. When you started enforcing it, child porn went down, right? I don�t know who can answer that. Mr. Swecker. Mr. Swecker. It did go down. Ms. DeGette. It did go down. These are the types of crimes, if you said to these perpetrators, you are going to go to jail for 15 years, it wouldn�t deter all of them. There are still criminals out there. But if they knew that they would be caught and prosecuted, it would sure help, wouldn�t it? Mr. Kezer. Certainly. Ms. DeGette. Yeah. I have a couple questions for Dr. Kardasz, and you testified, I thought, very helpfully about some actual proposed solutions. You said that the ISPs should retain the information on the subscribers for a year, and that they should have to respond to subpoenas within a week or faster, if it is an emergency, correct? Mr. Kardasz. Yes, ma�am. Ms. DeGette. Well, my question is what is happening right now? Can you give me some examples where failure to maintain data has hurt or killed investigations? Mr. Kardasz. Yes, and I think Flint Waters talked about-- Ms. DeGette. He did give an example. Mr. Kardasz. There are other cases like that out there, that because the particular Internet service provider didn�t retain the data, the investigation just dead ends. Ms. DeGette. How often would you say that happens? Mr. Kardasz. Well, it is hard to put a number on that, and I don�t want to give you a bad number. Ms. DeGette. No. Mr. Kardasz. Periodically. Ms. DeGette. Okay. And do you have an opinion why these ISPs fail to maintain this information? Mr. Kardasz. My sense is that it costs them money to do that. It is not that they are evil. It is not that they are trying to protect these folks. But data storage takes a box with storage capacity in it, and it starts to fill up, and that costs money. Retrieving that data takes somebody to go in, takes their time to go in and type in the information that they need, and return that information to law enforcement. So, it is a tie-up of their personnel and their resources. It is a cost issue for them, I think. Ms. DeGette. How often do we have these ISPs refusing to respond to subpoenas in a timely fashion? Mr. Kardasz. I can�t respond to well from Arizona, because it really hasn�t been an issue there with-- Ms. DeGette. Has it been-- Mr. Kardasz. --the ISPs that we have worked with. Ms. DeGette. Anyone else have an opinion on that? Yes, Mr. Waters. Mr. Waters. Yes, ma�am. In some jurisdictions, it is as high as 40 percent. Ms. DeGette. Wow. Mr. Waters. Where they either don�t respond, or they say they do not have the records. Ms. DeGette. And have there been efforts made to make these folks voluntarily comply? Mr. Waters. Yes, there have. We have met with ISPs. We have also had some meetings facilitated by the National Center for Missing and Exploited Children to help, and some ISPs are becoming very cooperative and helping us. Ms. DeGette. Can you tell me which ISPs are particularly uncooperative? Look, these people are enabling the raping of our children in this country. I don�t have any sympathy for them. Mr. Waters. The ISP that would not respond in the case in Colorado, where we were trying to track down that 2-year-old child was Comcast. Ms. DeGette. Comcast. Okay. And what about some other ones that are uncooperative? Mr. Waters. In Wyoming, we are actually having excellent support. I mean, Bresnan, AOL, they are all working very hard for us. So, that is the only one that comes to mind. Ms. DeGette. Anyone else have some particular offenders you want to identify? And if people would like to do this privately, we need to know, because we talk to these folks. Yeah, so if you could supplement the record on that, that would be swell. Let me ask all of you, just one last question. We have over 2 minutes, so we have more than ample time for even what Mr. Bass was asking. What can be done to improve cooperation on these issues between law enforcement agencies? Let us start with you, Mr. Swecker. Mr. Swecker. If you are talking about between law enforcement agencies. Ms. DeGette. Yes, sir. Mr. Swecker. I think there is good cooperation as it is. We have the State task forces, the ICACs. They are very well networked. We have the National Center, which is sort of a clearinghouse, and makes many referrals to the State and Federal task forces. I would go out on a limb, and say this is really a bright spot in law enforcement, in that I don�t think they are out there stepping on each other, and then, when they do, I think there is a recognition we need to come together and work them jointly. Ms. DeGette. Mr. Plitt. Mr. Plitt. Yeah, I think all the agencies certainly represented here work together, and I think that you also see that over the past several years, they have blossomed in their application of the resources that focus on this problem. It is almost time, perhaps, to think about some areas of specialization. ICE, for instance, tries to specialize in the trans-border area. The reason we do that is to effectively apply the limited resources that we have. Just a thought. Mr. Swecker. May I back up for one second? Ms. DeGette. Yes, sir. Mr. Swecker. One of the chokepoints is forensic examinations, and I would venture to say that each State ought to have at least a statewide forensic lab, if not regional labs, and because that is an area where you get a pretty good backlog. Ms. DeGette. What about prosecutions? Mr. Swecker. Well, you can�t get a prosecution until you get that evidence-- Ms. DeGette. Right. Mr. Swecker. --out of the computer, the ISP. Right. Ms. DeGette. So, that is part of--yeah. Okay. Dr. Kardasz. Mr. Kardasz. I am very happy with the interagency cooperation I have had with all my law enforcement brothers and sisters. I can�t throw anybody under the bus on that. Ms. DeGette. Mr. Waters. Mr. Waters. We have had excellent support. It is coordinated through our United States Attorney�s Office, and we don�t have any issue with folks not coming to the table. Ms. DeGette. Mr. Clark is nodding in agreement, it looks like. Mr. Clark. That is right. I am in agreement with Mr. Plitt, basically, on his answer. Ms. DeGette. Mr. Kezer. Mr. Kezer. I would have to concur. The investigation of these cases is a specialized field, and quite honestly, most of the investigators know each other, or are familiar. They go to training together. We couldn�t get the work done unless we were cooperating. So I would concur. It is very good. Ms. DeGette. And Mr. Smith, do you agree? Mr. Smith. I do agree, because we all bring, as a unique agency, each of us are different. We all have different jurisdiction and different authorities. We all bring something different to the table, and we all take different investigative approaches to identify the bad guys. Ms. DeGette. So, what it really sounds like to me, then, is the bottlenecks are the forensic labs, the numbers of investigators we have, and bottlenecks with the ISPs getting information to you in a timely fashion, so you can investigate and find these perpetrators. Thank you, Mr. Chairman. Mr. Whitfield. Thank you, Ms. DeGette, and at this time, we recognize Ms. Blackburn for 10 minutes. Mrs. Blackburn. Thank you, Mr. Chairman. And thank you all for your patience, for being here with us today, and for caring so deeply about the issue. It is evident that you all care about your work deeply. Mr. Waters and Dr. Kardasz, each of you mentioned the activity, talked a little bit about it by country, and I think Mr. Waters, your testimony, you give by country what you have identified, and of course, we see the transactions for the U.S. as a much higher number than Germany, Canada, or the UK. Mr. Waters. That is correct, ma�am. Mrs. Blackburn. Okay. Now, I would like to get inside that number just a little bit, and then, I think it maybe was Mr. Clark, with your testimony, you talked about ICE has successfully arrested more than 7,500 child predators. Of these, 6,600 or 88 percent of the arrestees have been non-U.S. citizens, and more than 59 percent of those have been deported from the U.S. So, my question to you is this. Why the U.S.? Are we a magnet for this? Is there something that we are doing, or not doing, that would be pulling people that are not citizens here, and finding them involved in this activity, the number of websites is there--you want to get inside those numbers a little bit for me, either of you? Mr. Clark. First of all, the numbers are in terms of the removals. That brings in our immigration capabilities to the fore. It is not our Internet investigations, per se, but it is resident aliens who have been here, would otherwise be legal, but have committed child exploitation crimes, which makes them an illegal, and it allows us to remove them from the United States. So, that is part of those statistics there. In terms of the U.S. versus elsewhere, I would say one is probably greater Internet capability, more common in the United States than elsewhere. I would say probably greater recognition in the United States, law enforcement and the public, and greater use of the Internet. But again, in my earlier statement, I do think that the international community is rapidly growing aware of the issue, and I would refer to the Australian government, in terms of following the Falcon arrests in that country, looking to see what they can do, in terms of their laws and regulations, in terms of child exploitation. So, I think it is probably just something we have paid more attention to, have more capability of looking at, unfortunately, bad people have more access to and can use. But I don�t think this is a cultural or a U.S. problem at all. I think it is a global problem. Mrs. Blackburn. Okay. Mr. Waters, anything to add to that? Mr. Waters. I would add the numbers that I represented are from an operation where we identified primarily movies, large movies, and they tend to traffic more over high speed Internet c onnectivity, and so, a high saturation of broadband Internet leads to more individuals being able to participate in that trafficking. But we have clearly identified a large number globally, and we have trained Interpol in how to use it, and they are now actively searching as well. Mrs. Blackburn. Okay. Mr. Clark, I wanted to come back to you. Tell me why 3,900 of the 6,600 non-U.S. citizens who were arrested were deported instead of prosecuted. Mr. Clark. I am not certain I would say they weren�t prosecuted. I would have to--I am not certain the numbers, 3,900. What would often happen is, in some cases, they have been prosecuted and released. We have gone back out, and taken them administratively, and removed them, based upon the fact that their resident status or legal status, under the immigration authority, is no longer there, so there might have been prior criminal arrests and sentences served. Mrs. Blackburn. Okay. If you would, then, look back at that number one more time in your testimony, and then, kind of clarify that for us, I think that would be great. I would appreciate that. Let us see, Mr. Waters, in your testimony, you talked about a situation where an agent witnessed the rape of a child taking place. I think that is your testimony, and what I want to ask you is, when you get information that there is something taking place, how often do you get that quickly enough to go in and act, and how often have you been able to remove children from those situations when you get the information timely? Mr. Waters. I think a two-part answer there. We typically react just as fast as possible. We have had several cases where, because-- Mrs. Blackburn. Well, is that hours, days? Mr. Waters. Sometimes, it is hours. Mrs. Blackburn. Hours. Mr. Waters. I have had cases where I have gotten on a plane and flown to Houston that day, and-- Mrs. Blackburn. Okay. Mr. Waters. And worked the case. We have had several where we respond immediately. Depending on the type of material that we are receiving, sometimes, the circumstances dictate that we wait until we get a response from a service provider, to tell us where this person is at. Sometimes, we have to wait to get records from there, tying to, to give us a physical address. So, occasionally, we are restrained by the logistics of the companies to tell us where these offenders are. But we typically get on them as fast as possible. Mrs. Blackburn. Any idea of the actual number of children that you all have pulled out and removed? Mr. Waters. I can speak just to the last couple of months. Maybe the last 6 months, we have had two out of Wyoming, we are a fairly small State. In our operation, we have had quite a few around the country. We just had one, one of these peer-to-peer cases led to an offender in San Diego who was working in a hospital, and was actively molesting four to five kids a week, coming into these wards, a respiratory therapist. And in that case, they were able to take him out of a situation where, of the 50 kids on the ward, quite a few of these he was being able to molest. Mrs. Blackburn. So, if the ISP providers, if they are going to give you the information, that is going to help you to respond quickly. Mr. Waters. Absolutely. Mrs. Blackburn. What I am hearing is, as Ms. DeGette was saying, many times that is your bottleneck. Mr. Waters. That is correct. Mrs. Blackburn. That is what slows you up. Mr. Waters. Yes, ma�am. Mrs. Blackburn. Okay. Now, out of the ones that you have been able to respond quickly to over the past couple of months, what number were you hampered from responding in a timely--could you have gotten in there and done your work? Mr. Waters. Well, it is difficult to say. Mrs. Blackburn. Okay. Mr. Waters. I would have to draw a conclusion based on information I didn�t get, so I don�t know how many of the records that failed to come back would have led us to a child in danger. But one is far too many. Mrs. Blackburn. Okay. In talking about your work with other agencies, are all of you satisfied with the interaction that you are getting from the Department of Justice? Mr. Waters. If I can speak to that, we are very satisfied with the support that we are getting. In Wyoming, the United States Attorneys call our office to see if we have any cases we need help with. If they don�t hear from us in a week or two, we get a call, and they want to know how we are doing. Mrs. Blackburn. Okay. Mr. Kardasz. May I respond to that? Mrs. Blackburn. Yes, you may. Mr. Kardasz. The OJJDP grants that we work under are very helpful, and the coordination that is done at the administrative level of the OJJDP really helps us locals to put our programs together, and then work with all the other Federal agencies. Mrs. Blackburn. Okay. All right. And I think, Mr. Chairman, I will yield back. Mr. Whitfield. Thank you, Mrs. Blackburn, and at this time, I will recognize Mr. Inslee for 10 minutes. Mr. Inslee. Thank you. Mr. Waters, you mentioned something like 1.9 million images through the peer-to-peer system, and did that, at least in your first review, did each one of those cases, at least on a prima facie basis, could constitute a crime in and of itself, the retention of, receipt of those images? Mr. Waters. Yes, sir. Mr. Inslee. So, we had 1.9 million potential crimes. How many of those have been prosecuted? Mr. Waters. I don�t know nationally how many. I can speak to those that have reported back to me. I know they did a sweep of about 40 in New Jersey, they did 70 in North Carolina. We have done 40 or 45 in Wyoming. I only know the ones that get back to me, and let me know how it has gone. Mr. Inslee. So, that is about 165 out of 1.9 million. The 1.9 million may not be separate individuals. There might be multiple same people. Mr. Waters. Yes. That is correct. Mr. Inslee. So, let us cut it in half, and say 800,000. So, out of the, say, 800,000, we have had 165 prosecutions, and my constituents are going to ask the obvious question, so I will ask it. Why so little with that enormous floodtide? Is it a resource issue, and if so, could you describe how we could help you in that regard? Mr. Waters. Well, it is absolutely a resource issue. We are hitting them as fast and as hard as we can. One of the biggest things that we run into, again, are delays or lack of records. So we have an IP address. We can identify that there is an offense, but we may not be able to identify an offender. But by sheer numbers, it is just, we have more than I have the man-hours to send guys out on. Mr. Inslee. What could you usefully use, as far as increased resources, what could you efficiently use to pursue these 1.9 million incidents, do you think? A doubling, a tripling of your resources? What do you think? Mr. Waters. Well, I think a tripling, we would still be falling behind. As it stands right now, I am bringing in about six, seven new leads in Wyoming a week. We are currently able to hit one search warrant every week or every 2 weeks, so even if we triple, we are still falling behind, as we are finding these leads. Mr. Inslee. So, I have this sense that if there were oh, bank robberies where you had 1.9 million bank robberies, but only 165 prosecutions, there would be a very large hue and cry to solve this problem, and that we would have resources to you to get that done. Do you kind of share that view? I get this sense that somehow, this has not received the priority that at least I think most of us here would believe that it should. Do you have any sense of that? Mr. Waters. I share that view, and I thank you for drawing attention to that, because we have been yelling at every rooftop we can get on. Mr. Inslee. So, let me ask some of the Federal personnel here, start with Mr. Swecker, for instance. I have a sense, I think you testified there was a 2,050 percent increase in images in one of these databases in the last 10 years. What increase in resources would you estimate there has been, if any, in the last 10 years, to this problem Federally from Federal agencies, all told, or at least from yours? Mr. Swecker. Well, we went from zero to 250. We actually have--that is a little lesser number than we had over the last couple of years, because we, truthfully, have had to divert some over to terrorism. But we had to borrow those 250, or reprogram those 250 from our Criminal Division. So, where all that goes, to say that there is always room for more resources, I agree. We could put a thousand FBI agents, and thousands more officers on it, and we wouldn�t put a dent in that number that you just gave. Mr. Inslee. And what does this year�s budget do to help in that regard? Do you have any idea? Mr. Swecker. We have no enhancements for this--well, we got 22, I think we got 12 agents and ten analysts. We got 22 positions. Mr. Inslee. So, in the current budget, passed by this Congress, we have 1.9 million potential crimes, and we have got no increase in resources to deal with that, even though we could, at least in one agency, triple it, and use it efficiently. That is a fair statement. Mr. Swecker. We have zero enhancements for �07. Mr. Inslee. Okay. I may note, that is not your gentlemen�s responsibility. It is ours at this table, just so the responsibility is in the right location here. Mr. Swecker. I would also go back to the forensic laboratories, too, because I think those are critical. Mr. Inslee. Mr. Waters, in the peer-to-peer situation, does the problem with ISP records exist in that context, or is that a different situation? Mr. Waters. It exists very much in that context. In fact, it is most exaggerated, I think, in the context where we are reliant on the IP address to find the offender. Mr. Inslee. Okay. I want to ask you about foreign prosecutions, where there is a person outside the United States, when they are sitting at a computer that is involved in this, what is our situation? The father of a victim who testified here last week was apparently, asserted was involved while in Mexico. What options exist for us, what handicaps do we have in that kind of context? And I will ask that to anyone in the panel who wants to take that on. Mr. Plitt. ICE was in that situation very frequently. We do have some remedies. We have quite a few countries that are, for lack of a better term, waking up, strengthening their laws, if they have older ones, they are adding laws, if they don�t have it. I think that in the next few days, a report will be released, out of NCMEC, I think, that will indicate that--and it will surprise the panel here--few countries actually have child exploitation laws on the books already, very few. Nevertheless, the governments that we work with, they want to help us in these cases as much as they can. They are concerned about children, of course. They are also concerned about their national reputations, and quite frequently, we will have the law enforcement agencies from those countries work to get us the evidence that we need, and in some cases, extradite. Mr. Inslee. But is your understanding that we--I mean, do we have jurisdiction in a case where a person is sitting in Mexico, and is abusing through the Internet inciting, exploiting a child, do we not have criminal jurisdiction to assert to extradite that person, assuming that we have the resources to do it, and the case to do it? Mr. Plitt. Assuming we have the resources, yes, we would. A very good example is the child sex tourism cases, where an individual is traveling out of the country to have sex with a child. If that individual is a U.S. citizen, that individual, upon return, or still in the country where the act occurred, is subject to U.S. prosecution. Mr. Inslee. Given the assertions by Mr. Berry, it is hard for us to understand, given that, why there hasn�t been a prosecution, in Mr. Berry�s case, of this individual who was in Mexico, allegedly exploiting him, I am having--understand who is his father, so it is not an identification issue. What possible reason for there not for, that to be at least started on the prosecutorial trail? Mr. Plitt. I don�t know. Again, that case wasn�t brought before ICE. ICE had a linkage to it, simply because it had arrested another individual that had dealt with Berry, and then that was moved to another agency, I believe the FBI. Mr. Inslee. Mr. Swecker, do you have any insights on that, on what possible reason there would be for not pursuing that? Mr. Swecker. Well, let me just resort to talking generically about the international investigations. It is really hit or miss on an international level. Eastern Europe is a problem, mainly from a training aspect, and the aspect of not necessarily having the laws to address it, and there is a need for some international training in this area. There is a need for some strengthening of the laws in these areas, and then, they will not render their own citizens. As a general rule, they won�t render their own citizens back to the U.S. Mr. Inslee. Well, let me just sort of interrupt you a second. I have only got a little bit of time, but if you have got an American citizen in Mexico, who is clearly identified as the father of the victim, who has these assertions, under American law, using American resources, using American tools, if you will, why could we not pursue that without necessarily depending on the investigatory resources of Mexico? Mr. Swecker. We could, if there were charges filed, there is--you have to have charges filed. You can put a Red Notice out through Interpol. Mr. Inslee. And I yield to Ms. DeGette. Ms. DeGette. Thank you. Well, from what we understand, the Department of Justice refused to take jurisdiction on the case. Is that correct, Mr. Swecker? Mr. Swecker. I have pretty strict instructions not to discuss that case. Ms. DeGette. Mr. Plitt. Mr. Plitt. Don�t know. We are not-- Ms. DeGette. Well, but jurisdiction has been declined. Why can�t you discuss it? It is not a case under investigation or prosecution. Mr. Swecker. Well, there is always the potential for prosecution in that case. Ms. DeGette. Who would know? When we bring the Attorney General in, will he know? Mr. Swecker. I would defer to main Justice. Mr. Stupak. Well, Mr. Berry is here in this room. Can any of you give him any reassurance that someone is honestly looking at his case? It has been 7 months, 1,500 names, websites, credit cards, everything he provided you guys. Ms. DeGette. Testimony. Mr. Stupak. Testimony. Mr. Swecker. This case is being aggressively investigated. Mr. Stupak. That doesn�t do anything for Mr. Berry or for any of us up here. Mr. Swecker. I would defer to them, as to whether they are satisfied. Mr. Inslee. I just want to speak. I am a former prosecutor, and feel very strongly about the integrity and success of prosecutorial efforts, and this has been a huge black eye for the country, and a lot of doubt created, so I think all of us have an obligation to get with the task at hand. Part of that includes cooperating with this panel, which I hope you will spread that message, to the extent you can convince people, to figure out how to solve these problems. I think that is very important. My time is up. Thank you. Mr. Whitfield. Thank you, Mr. Inslee. At this time, we recognize the Chairman of the full committee, Mr. Barton. Chairman Barton. Thank you, Mr. Chairman. I don�t think I am going to take 10 minutes. And if this ground has been plowed while I was gone, I apologize, but Mr. Swecker, where are you in the chain of command at the FBI? Mr. Swecker. I am the Acting Executive Assistant Director for Law Enforcement Services, which puts me directly over both Cyber and Criminal Divisions, directly in the chain of command on these violations. Chairman Barton. And who do you report to? Mr. Swecker. I report to the Deputy Director. Chairman Barton. Who reports to? Mr. Swecker. To the Director. Chairman Barton. Director. So, you are third down from the Director, and you are in the operational chain of command. You are not a staff assistant. Mr. Swecker. I am directly accountable for anything, all things cyber. Chairman Barton. Okay. Does the name, and if I am mispronounce it, I apologize, Raul Roldan mean anything to you? Mr. Swecker. Raul Roldan is one of our section chiefs. Chairman Barton. And he reports to you? Mr. Swecker. He reports to a Deputy Assistant Director, who reports to an Assistant Director, who reports to me. Chairman Barton. So, he is three down from you? Mr. Swecker. Yes. Chairman Barton. Now, why could he appear on CNN today, but he couldn�t appear before this subcommittee? Mr. Swecker. Well, I wasn�t involved in that decision, but my understanding is that he did not comment on this investigation whatsoever. He was talking generically about crimes against children on the Internet. Chairman Barton. I didn�t ask that question. My question is, we specifically asked for him. We are not upset that we have you. You are at least a line officer, which is an upgrade from the main Justice Department, but the specific person that we asked for, they flatly refused to have him testify. I want to know why. Mr. Swecker. I think there was concern that he would end up commenting on this case, and there were strict instructions not to comment on this case. Chairman Barton. Well, I want you to tell the Director, because I am going to tell him or ask him, if this gentleman doesn�t testify voluntarily, he will testify under subpoena. Mr. Swecker. Yes, sir. I will pass that on. Chairman Barton. And I mean, that is not a threat, that is a fact. So-- Mr. Swecker. I understand. Chairman Barton. I am fed up with being told by my friends, we have a taped message on the cell phone, or one of our committees, that the Justice Department wasn�t going to testify, period. We are going to change that. And I thank you for coming. I do have some general questions. For my first question, and I don�t know if I direct it to you, or our postal people, are the laws for transmission of Internet child pornography the same as transmission of pornography, child pornography through the mail? Is it the same law? Mr. Smith. There is a number of statutes, but it is primarily the same one, 18 USC � 2252, that is our bread and butter statute that we charge probably in 90 percent of the cases. That involves the unlawful receipt or distribution of any child abuse images, child pornography, that travels interstate, foreign commerce, over computers or via mail. Chairman Barton. But it is basically the same. Mr. Smith. Same statute covers them all. Chairman Barton. Do we need a special statute specifically for child pornography on the Internet, as opposed to through the physical mail? Would that be helpful, or is that unnecessary? Mr. Smith. No. I think we have adequate legislation there. Chairman Barton. Okay. Is it illegal for an adult in the United States to possess child pornography, the possession is illegal in itself? Okay. Mr. Waters, who is one of our undercover agents here, in order to prosecute a case, and I am talking generically, do you have to watch a perpetrator commit an act over the Internet as an eyewitness, or do you have to just have knowledge of it, from the child who was abused in the act? Mr. Waters. We do not typically have to watch it. Chairman Barton. You don�t. Mr. Waters. No, sir. Chairman Barton. So, what is the burden of proof? What is the standard of proof to prosecute? Mr. Waters. Well, depending on the type of act, we still have the same burden to prove beyond a reasonable doubt what occurred, but frequently, we get this information from the victims that were involved, from the forensic analysis of the computer. Some of these individuals even turn on their own webcam and film themselves while they are committing the crime. So, usually, it is a combination of testimonial and physical evidence that allows us to overcome that burden. Chairman Barton. And do you agree or disagree that we don�t need any strengthening of the laws in this area? Mr. Waters. I don�t know of any strengthening of the laws, federally, that-- Chairman Barton. You don�t think it is necessary. Mr. Waters. I believe we have adequate legislation. Chairman Barton. Okay. Okay. Well, Mr. Clark testified that law enforcement can�t do it alone, and I agree with that. We expect you folks to help us enforce it, but every one of us up here, I believe, is a parent, and in my case, a parent and a grandparent, and we have to be involved, too, and the community has to be involved. And I want to thank you, Mr. Waters, for your testimony, and some of the displays that you put up. How did you get picked to be here, since you are from Wyoming, just out of curiosity? Mr. Waters. I believe I got picked because I work on the technical side. I spent a few years as a systems programmer, and so, when the ICAC Task Force runs into a technical challenge, I co-chair the Technology Committee, so at the-- Chairman Barton. Are you in Wyoming or here? Mr. Waters. Cheyenne. Chairman Barton. So, you had to fly in from Wyoming to be here. Mr. Waters. Yes, sir. Chairman Barton. Did anybody in the agency pressure you not to testify? Did you volunteer to testify? I mean, I am glad you were here, because you are very credible and very committed, but it is just odd we can�t get them to come from four blocks away, and yet, they can fly you in from Wyoming. Mr. Waters. Well, no one pressured me not to testify. I am here because of the program and working with OJP, Office of Justice Programs. They helped fund a lot of the work that we are doing, and they asked, and I said I would be honored. Chairman Barton. Okay. And Mr. Swecker, I need to give you a chance to stand on your soapbox a little bit, since I have. Is there anything that the Congress is not doing, that we should be doing, to help the FBI prosecute these criminals? Mr. Swecker. Well, we think we have the laws that we need. I think I would resort back to Mr. Stupak�s point, or Congressman Stupak�s point, about mandatory referrals. We probably need to get that going. In the banking industry, we know that it has been tremendously successful in getting suspicious banking transactions referred to us. I would also, again, just beat the drum for the forensic laboratories, because again, that is a chokepoint when it comes to the forensic analysis. We have the laws, but we need the training. We need to export the training to the State and local level as a much faster pace, and get the resources out there to the State and local officers where they need it. Chairman Barton. I am not disputing what you just said, but I am confused a little bit. Child pornography is obvious. What is forensic about that? What kind of a laboratory do you need to dissect if you have a picture of a minor child engaged in a sexual act with an adult, that that is a crime? Mr. Swecker. It is getting to the picture. It is pulling it out of the hard drive, or identifying the ISP, identifying the specific addresses, of which there would be thousands, and pulling all that information out of the computer. That is what we are calling a forensic analysis. Chairman Barton. I see. Okay. Thank you. Thank you, Mr. Chairman. Mr. Whitfield. Thank you. I do want to reiterate, you all did indicate, though, that it would be helpful if we had the mandatory data storage for a period of time, and that, as you said, to clarify, the Internet service provider providing the tip to the Cyber TipLine, though those are two areas that we definitely could do something about within our jurisdiction. Ms. DeGette. Mr. Chairman, also responding to the subpoenas within-- Mr. Whitfield. And responding to the subpoenas. At this time, we recognize Mr. Walden for 10 minutes. Mr. Walden. Thank you, Mr. Chairman, and I want to follow up a bit on the Chairman�s comments. As I understand it, under 42 USC � 13032, ISPs are required to report all child pornography images to NCMEC, correct? Isn�t that--whoever is the certified expert here? I want to clarify that the position of law enforcement here, that you would like all ISPs to have to both register and report in known child pornography, to the Cyber Hotline, and it is my understanding there are only like 215 ISPs that are registered, and there must be thousands out there. Can any of you, or whoever feels comfortable, comment about that, and what progress needs to be made there, and what we could do to help along those lines? Okay. Somebody must have an answer here. There are only 215 registered, there are thousands out there. What enforcement capability do you have? Mr. Smith. The largest ISPs, I believe, are in compliance, from what I have learned in my conversations with Ernie Allen and John Rabin over at the National Center, but there are many, many smaller ISPs that either aren�t aware of the law, or they are ignoring the law, whatever the case may be. Mr. Walden. All right. Thank you. Mr. Swecker, you are in charge of all things cyber, you said. This must fall under your jurisdiction. Mr. Swecker. It does. I think there is some confusion on the part of the industry as to the content of what they are supposed to refer. Mr. Walden. Okay. Mr. Swecker. They are looking for a safe harbor, I think, that immunizes them against lawsuits for making the referral, plus I don�t think they know whether they are able to send the images across. Mr. Walden. Sure. Mr. Swecker. So, I think there needs to be some more specific-- Mr. Walden. Who comes up--you said, I think, that you don�t really need any new laws to work in this area, so whose responsibility is it to clarify this? Do you need clarifying language from the Congress? Do you issue directives and rulemakings? Mr. Swecker. That goes to the Legislative Affairs Offices of both Justice and the FBI, and I think they could, we could give you some more details on that. Mr. Walden. That would be helpful, because it just strikes me, if we have got the law in place, and you say it is, it is really functionally useless if it is not being enforced because there is confusion. And I know you all have your hands full, clearly, and probably literally, in some of these areas, and so, I guess the question is what do we do to help, and how do we get it clarified? If ISPs don�t know they are supposed to register, there should be a mechanism set up to help on that, and then, to clarify this issue. Because I know we had testimony from the gentleman from the New York Times that he had to work with an attorney, be very careful as he did his investigation, not to run afoul of the law by going to a site clicking the wrong time runs you afoul of the law. And Mr. Swecker, I want to go to you, because you work in this area. Tell me just generically, if you have a child victim of pornography, and some predator has abused some child, and it is going on, what sort of knowledge do you need as a prosecutor? Mr. Swecker. To elicit the evidence from the victim, or-- Mr. Walden. To elicit the evidence from the victim, to pursue the case, how urgently do you get involved? Mr. Swecker. It is very urgent. These have to be handled with a lot of care. Victim/witness specialists need to get involved very early on. Child interview specialists need to get involved. We need to find the website. We need to find the person that is actually abusing the child, and so that is what we are trying to elicit from the child. Mr. Walden. And so, you would bring the child in immediately, I would assume. You would interview them. You would set up--if they came in and said not only has this just happened to me, I know it is going on to somebody else at this moment. Tell me how the FBI responds. Mr. Swecker. We need to get as much information as we can out of the child, as to the identity and the location of the person that is doing the abuse. Mr. Walden. And so, once you do that, let us say you get IP addresses, then do you turn that over to some sector within the FBI? Mr. Swecker. Well, the first step is to get the website, you work on the Internet addresses that are accessing the website. Our focus really is on the abusers before we go to the customers. It is on the website administrators. It is on the financiers. To draw an analogy, would be we don�t necessarily go after the drug users. We immediately go after the abusers. Those would be analogous to a distributor. Mr. Walden. Okay. All right. Mr. Swecker. The person who is actually producing the pornographic material. That means a child is being abused. That is where you want to go first. Find the person who is actually abusing. Mr. Walden. And if you know of an abuse, if you are told there is an abuse going on. We have heard some testimony here and elsewhere, that literally, some of these perpetrators use the camera on themselves, in real time, you could watch on the Internet, abuse going on. Tell me what the FBI does, or the Department of Justice does, if I walked in today, and said I just was flipping through the Internet, and came across this. Here is the address. It is happening as we speak. Mr. Swecker. Well, in that instance, I mean, I don�t know if we could move quickly enough to get them while they were in the act. I mean, that has happened on occasion. You have been lucky enough, or you have been able to set up a situation where somebody was actually on the website, and actually either accessing or producing that type of material. Mr. Walden. But if a child presented himself or herself to one of your officers, if I came to you and said I just came from the credit union, and there is a guy with a gun in there in the face of the teller, tell me what happens. Mr. Swecker. Well, we could, as quickly as we could, we would intervene. Mr. Walden. If I come to you today, and say on the Internet right now, at this address, this is going on. Tell me what happens. Mr. Swecker. Probably the quickest way to get to it is to pose undercover, and try to attempt to get access while that person is on, and that may be one of the quickest ways, when you have a proactive situation like that, to get very quickly to the person. Mr. Walden. You are going to move proactively. Mr. Swecker. Right. Mr. Walden. Right away, even if it means sacrificing evidence, I would assume. Mr. Swecker. You still have to find the location where they are doing this from. Mr. Walden. Sure. Mr. Swecker. It could be a library. It could be an Internet cafe. Mr. Walden. Let us say the child presents herself, and says here is the IP address. This is the same person that molested me. Here is the name. Here is the address. It is going on now. Mr. Swecker. We would attempt to get a search warrant, and go out at that real time. And I will defer to these other investigators, who are actually on the street, to respond as well. Mr. Walden. If you knew Bad Santa was operating in the mall. Mr. Waters. I am going into his living room. If he is at home, and it is active. Mr. Walden. You are going right now, aren�t you? Mr. Waters. I am going right now. I am calling the ISP, finding out where it is at, and we are going to be in the door. Mr. Walden. All right. Mr. Waters. If we are not close enough, we will get ahold of the local PD, and they will be in the door. Mr. Walden. So, does that happen in a matter of weeks, days, hours, minutes? Mr. Waters. It varies based on the case. Mr. Walden. Sure. Mr. Waters. But if I have credible information right then, I have had cases where I call the ISP, and they give me an answer now. Mr. Walden. Is that right? Mr. Waters. We get an answer, there is an emergency clause that allows us to get that, and we go. Mr. Walden. And you go. Okay. Let me go to the issue of affidavits. Unlike some of my colleagues, I am neither an attorney nor have I ever been a prosecutor. And usually, in my town meetings, when I say I am not an attorney, there is a little ripple of applause. No offense to attorneys. Explain to me on affidavits in criminal cases, circumstances where victims� names are released. Explain for me affidavits, they get unsealed, victim�s names are put out in the public. Is that sort of normal operation? The court says keep this sealed, and then, it becomes unsealed. Mr. Swecker. Well, affidavits in this type of case are often sealed, but they can�t stay sealed forever. Eventually, particularly when you start the judicial process. Mr. Walden. You have a right to-- Mr. Swecker. They have a right to confront the witness against them. Mr. Walden. Sure. Mr. Swecker. And at some point, the affidavit is unsealed. I mean, you can get a search warrant on confidential information, to protect the identity. You don�t necessarily have to name the person. It depends on how much corroboration you have. Mr. Walden. If an affidavit is accidentally unsealed, which I assume occurs from time to time, clerical error, and the victim tries to get it, and asks for it to be sealed again, what obligation does the Government have to ensure that that victim�s identity or whatever, if it is allowed to be resealed, that the affidavit gets resealed? Mr. Swecker. I know what you are referring to, and I am trying-- I will try to answer your question without getting into-- Mr. Walden. You are trying to dodge it. I understand that. I haven�t named names. Mr. Swecker. --specific facts. But the first step would be to notify the person, and offer protection. That would be the first investigative step. The rest of it would be up to a prosecutor to reseal the affidavit. Mr. Walden. What should--if it is supposed to be resealed, what sort of timeline should a victim anticipate for that resealing to occur? Mr. Swecker. I would have to defer to the prosecutors on that, as to what a reasonable time-- Mr. Walden. Who is a prosecutor here who has ever been through one of these? Have you ever, sir, from the great State of Wyoming? You are an investigator. Mr. Waters. Strictly an investigator. Mr. Walden. Have you ever heard of this sort of circumstance? Mr. Waters. We work in a different model. We don�t typically put victims� names in our affidavits. Mr. Walden. Really? Mr. Whitfield. This is when we should have Mr. Mercer back. We released him this morning, but he is the U.S. Attorney for Montana. Mr. Walden. Yeah, but--well, Wyoming is near Montana. Which is are we getting closer to Washington? I don�t know. One final question, if I might, Mr. Chairman. There has some concern been expressed about extraterritorial application of the law, because in some cases, some of this child pornography is actually being put on the Internet in a foreign country, but it is received in this country because of the global nature of the Internet. Is that an area where the law needs to be changed, or can be changed? Is that an area that precludes your ability to engage in enforcement? Let us say if somebody were in, oh, Canada, or maybe Mexico, and transmitting this sort of pornography. Can you go after it? Mr. Clark. I would say our laws are satisfactory. Oftentimes, the foreign laws aren�t as satisfactory, but we do have relatively good cooperation on a number of fronts with foreign governments, as far as working those types of cases. Mr. Walden. One final question. Digital currency, this is sort of new to me. Can you explain? I understand that is sort of the new underground way to engage in payments without fingerprints, if you will. Digital currency. Is this an area we need to explore more? Mr. Plitt. Yes, it probably is. Digital currency is simply the situation where an individual put money on the Internet. You can do that through any brick and mortar location. I will give you an example in a second, but when the money is put on the Internet account, then the money can be used on the Internet to buy access to legitimate sites, to child exploitation sites, to buy items off of the Internet, regular merchandise. It can also be taken off the Internet through another brick and mortar location somewhere else in the world. Currently, it is not regulated. A simple example I would give is that we had one investigation where memberships were being purchased with e-currency, and a lot of the e-currency documents, if you will, were charged with money in Australia. Mr. Walden. Okay. Mr. Plitt. To the tune of approximately $30 million a year. Mr. Walden. So this could get completely around the Bank Secrecy, or whatever those--what is the law they have to follow in a bank? Mr. Plitt. Bank Secrecy Act. Mr. Walden. Yeah, if $10,000 in cash or more. So you just do it in a foreign country, put it in, pull it out somewhere else. Mr. Plitt. Yes, and to date, though, the services, the companies that provide the service, have been very, very cooperative with us to track that, yeah. Mr. Walden. All right. Well, if you have specific suggestions in this area, I would certainly like to work with you on it. Mr. Plitt. Very good. If I could, one other response. Mr. Walden. Sure. Mr. Plitt. Since I have the mic. You were asking about victim/witness issues. One to keep in mind is one that is very, very complex, and that is the child sex tourism cases, where the individual was traveling to another country to have sex with a child. The logistics of bringing the child back, if necessary to testify, parents, guardians, et cetera, is one that is coming up in these cases. Just another comment. Mr. Whitfield. Thank you, Mr. Walden. I think Mr. Walden�s line of questioning encapsulates the concerns of many members of this committee about the investigation we heard the testimony of on Tuesday, and that is why we do want to pursue further meetings with Justice, maybe in executive session, because I heard you speaking, Mr. Swecker, of victim/witness specialists, and I am assuming that that is a person who assists the victim, and in the testimony of our hearing on Tuesday, in our meetings with the victim, I never heard that any victim/witness specialist was assigned in that case. And then, we know that evidence was given of child victims, and they were being abused in a real time manner, and action was not taken, and so, we have walked away from these hearings quite puzzled, because it appears that in that instance, the victim of the crime was being treated more as a perpetrator of the crime, and so, I think that is really kind of underlying the sentiment of the committee, and that is something that we need to get into. But I want to thank all of you for your testimony. We appreciate your efforts to continue to bring these perpetrators to justice, and with that, this panel is dismissed. Now, at this time, we will call the third panel, which consists of one person, and that is Mr. Grier Weeks, who is the Executive Director of PROTECT, from Ashville, North Carolina. Mr. Weeks, thank you very much for being with us, for your patience. As you know, this is an Oversight and Investigations hearing. We take testimony under oath. Do you have any difficulty with testifying under oath? And I assume you do not need a lawyer with you. So, if you would stand, and raise your right hand. [Witness sworn.] Mr. Whitfield. You are sworn in now, and you are recognized for 5 minutes for your opening statement. Turn your microphone on. Mr. Weeks. Is that better? Mr. Whitfield. Yeah. STATEMENT OF GRIER WEEKS, EXECUTIVE DIRECTOR, NATIONAL ASSOCIATION TO PROTECT CHILDREN Mr. Weeks. Thank you. I am Grier Weeks, Executive Director of the National Association to Protect Children, also known as PROTECT. We are a national membership association dedicated to just one simple issue, which is child abuse, child protection. We have members now in 50 States and 10 countries. One of the things we do the most is go around the country to various State houses, and work on State legislation. And one of the greatest problems we see is a spectacular national failure to take these issues seriously at the State level. I will condense my remarks here, because I know you know at this point the nature of child pornography, and don�t need that characterized again. I would say that as you go back out among your colleagues, and hear this material referred to as kiddy porn, or trivialized in that way, you will be reminded of what we are up against. Two years ago, law enforcement agents in my home State of North Carolina, arrested a criminal, Brian Schellenberger, who was convicted of producing child pornography, and distributing the images over the Internet. Photos showed a 6-year-old girl was kept in a cage, beaten, sexually tortured, and urinated and defecated on. The criminal penalty for being an accomplice to that crime, for possessing those images in North Carolina, is a felony, is the exact same felony penalty you would get for operating a bingo game without a license or cockfighting. In California, the penalty is a misdemeanor, distributing it to others is a misdemeanor, using a child to distribute it to others is a misdemeanor. And under California law, even manufacturing such a despicable product is a minor felony with no minimum prison sentence. In Colorado, Oregon, North Dakota, possession of these brutal images of children being raped and humiliated is a misdemeanor. In Iowa, it is an aggravated misdemeanor, the equivalent of livestock abuse. If you compare the risk/gain ratio for trafficking in a product like this, to the risk/gain ratio for those who traffic in cocaine, you will instantly understand why our national weakness on this issue has attracted so many new predators. Nationwide, an estimated 96 percent of those arrested for child pornography possession are convicted, but fewer than 60 percent are ever incarcerated. Of those convicted solely of child pornography possession, fewer than one in three serves more than a year in jail. This is despite the fact that child pornography, like narcotics, is illegal contraband in and of itself, and easily prosecutable. Let me just add that in the State of Wisconsin, a WITI investigative reporter did a painstaking investigation of how child pornography possession cases were handled in his State, searched every single one of them down, and found that 75 percent of the perpetrators did no time in prison whatsoever. PROTECT�s first point is this. Unless and until the States are made to treat "simple possession" of child pornography as the egregious felony it is, and unless the funding is made available to aggressively investigate and prosecute possession of child pornography, Federal efforts will be hopelessly diluted. Let me give you some examples. Instead of Federal resources being a multiplier of State efforts, as you would hope they would be, the lack of appropriate legislation and resources is actually discouraging the States from prosecuting these cases. Until States get serious, U.S. prosecutors will continue to pick up the slack for local prosecutors, who have grown dependent upon the Federal government to prosecute their criminals for them. I think all of the prosecutors you talk to will attest to that. Internet Crimes Against Children Task Forces, the ICACs you have heard so much about, will continue to provide training and technical assistance to frontline law enforcement agents who are so unsupported by their own States that they often have backlogs of hard drives waiting to be analyzed, many of them containing evidence that could save a child immediately. And the mass, and this is the most important issue here, the mass of domestic criminal conspirators who create and feed the insatiable demand that you have heard about will remain at large as limited Federal resources are triaged and focused on chasing after the major cases of commercial manufacturers and distributors. PROTECT�s second point is that the Federal government also must get serious. We are losing this war, and I don�t think we have heard that enough today. We are drowning. I think it is obvious to everybody that was here that we are not supporting our troops on the frontlines. Recent estimates of the size of the exploding global criminal market in child pornography are in the multibillion-dollar range. You have heard $20 billion numerous times. Yet, there really is no objective measure whereby we can say we are serious about this. The FBI�s Innocent Images National Initiative is funded at a level of about $10 million a year. That is chump change. By comparison, HUD recently announced it was awarding more than that to build 86 new elderly apartment units in Connecticut. It is a wonderful thing, but this is to put it in perspective. They spent almost seven times the Innocent Images budget just on homelessness in Ohio. The Administration has proposed 20 times the entire Innocent Images budget for abstinence-only education programs. Another example, the Department of Justice�s Internet Crimes Against Children Task Force program received about $14.5 million in FY 2006. That is less than one-fifth the amount proposed for the new initiative to help prisoners reintegrate into society. Last year�s budget included $211 million for the Department of Interior to do high priority brush removal. That is compared to $14.5 million. The law enforcement officers that came here today, and that come here every year, to testify on this issue, can�t get up here and tell you that. You heard one say he wouldn�t, if he had his budget tripled, he would still be behind. But I honestly don�t know how we can look him in the eyes, asking them to do probably the most unthinkable job on the planet, and this is what we put into it. The radical increase in child pornography we see today is the direct result of failing to match our rhetoric about children with the resources needed to fight this war, and we will hear a lot of rhetoric this month. It is Child Abuse Prevention Month. Our third and final point is simply that you heard a lot of experts with a lot of expertise, and I think that after these hearings, they would be very eager to give you very specific policy proposals, hopefully more than you have heard today. But the expertise, really, that is needed here, is your expertise, and I mean that in a meaningful way. It is your expertise that is needed. How do we make this an urgent, serious issue, because nobody else you have heard from knows how to do that. Finally, I would like to just address a few loose ends that I heard mentioned, and I knew you were looking for policy proposals, and I would like to address a few of them. On the issue of Federal penalties, the Federal penalty for possession of child pornography is a minimum of a fine. So, I do think there is a problem there. The issue is not what is the maximum. The issue is what is the minimum. On forfeiture, I would strongly encourage you to look into that much more seriously. There is much more that could be done, and it is an extremely--has a lot of potential, because any time you can give law enforcement that much more motivation to get out there and do their jobs, and also, to benefit the efforts of law enforcement, it is very important. On telecommunications type of issues, we hear from the industry that although there is the issue of reporting child pornography, there is a separate issue, and that is the filtering, essentially, that they would do to detect it in the first place. And we got a comment the other day from one of the major industry leaders, saying that they essentially could turn up that filter, tighten it up, enhance it, and completely blow law enforcement out of the water. And I think there was a realization, all the way around, that you want referrals, we will give you referrals kind of thing. This is a huge problem. We need them to find more, but we also need to be ready to get it. There is also an issue, I would strongly urge you to talk to industry. What they can do that legislation may not be able to do, and certainly not law enforcement, is tell us what is next. This is truly staggering. The latest that I have heard is wireless Bluetooth technology being used to transfer child pornography where perpetrators gather in a park, and just while they are standing there, watching the pigeons, they are transferring child pornography to each other. My guess is at my age and my limited technological expertise, that is not even the beginning of it, and unless we are hearing from them about what is coming next, 10 years down the line, we are really losing. I would also mention to you another thing you may want to follow up on, that we are hearing from industry, and that is that many of these perpetrators are actually cataloging children. These images have a monetary value, but that value goes up tremendously when there is a name and address attached to it, and the latest thing that we are hearing is that people are actually putting those names, addresses, elementary schools, and identifying information with these photos, and selling them, and cataloging them. Finally, just to respond to one other thing. Well, let me talk about two other things. One is that one of the witnesses on this last panel mentioned that, if you find the abuser, that is where you want to go first. I would say to you that is where you want to go first, if you have extremely limited resources. And this is the problem. We cannot just focus on manufacturing. It would be like legalizing heroin, and saying we are going to go get them in Afghanistan where they are growing the poppies. If we do not get serious about the-- Ms. DeGette. Can I interrupt you for a minute? Mr. Weeks. Yes, ma�am. Ms. DeGette. Because I see Justin leaving, and I have been meaning to thank him, Mr. Chairman. I apologize to interrupt the witness, but I just want to thank you and your family, and everybody for coming to these hearings, and for bringing this to us. You do not know how much you have helped stop this practice, by coming to us. So, I just want to say thank you, and I hope you can come back to some of the other hearings that we will have. And I hope you can be there when we pass the legislation that will help put a stop to this. Mr. Whitfield. Thank you, Ms. DeGette, and we met with Justin earlier, and we all expressed our appreciation to him, and wish him the very best, and we will stay in touch with him. Sorry, Mr. Weeks. Mr. Weeks. No, I am glad you stopped. My final point is simply on international treaties. There was a press conference held this morning that talked about the fact that there were only five nations in the world that had serious laws. I have a little bit a problem with characterizing our laws as all that serious, but the point is a serious one, and that is that we need to recognize this as a human rights issue, and whenever human rights are discussed, the exploitation of children should be discussed, and I think you can advance the effort there. Thank you very much. [The prepared statement of Grier Weeks follows:] Prepared Statement of Grier Weeks, Executive Director, National Association to Protect Children Chairman Whitfield, Congressman Stupak and distinguished members of the Subcommittee, I am Grier Weeks, the Executive Director of the National Association to Protect Children, generally known as PROTECT. PROTECT is a grassroots membership organization focused exclusively on child protection issues. We have members in all 50 states, and we pride ourselves on being one of the most nonpartisan organizations in America. As PROTECT works in state legislatures, one of the greatest problems we see is our national failure to aggressively respond to child pornography and the use of the internet for both dissemination of such material and direct exploitation of individual children. People have argued for decades about what child pornography is, yet there has been virtually no attention paid to what it is not. It is our position that understanding what child pornography is not is the key to understanding--and actually doing something about--what it is. A 2005 study funded by Congress studied child pornography possession cases nationwide. In looking at the nature of the images being trafficked on the internet, the study revealed the following: 83 percent of possessors had images of children between ages 6 and 12 80 percent had images of sexual penetration of children--that is to say, child rape 21 percent had images showing "children who were gagged, bound, blindfolded or otherwise enduring sadistic sex. Only 1 percent were in possession solely of images that depicted simple nudity or what researchers termed "softcore" "pornography" So we begin with the understanding that child pornography is not a "free speech" issue, nor does it have anything to do with definitional arguments over whether a given image is "obscene." It is a human rights issue of catastrophic proportions. Two years ago, law enforcement agents in Canada and the U.S. arrested a criminal in my home state of North Carolina. Brian Schellenberger was convicted of producing child pornography and distributing the images over the internet. Photos showed that a six-year old girl was kept in a cage, beaten, sexually tortured and urinated and defecated on. The criminal penalty for being an accomplice to that crime, for possessing those images in North Carolina, is a felonythe exact same felony penalty you would get for operating a Bingo game without a license or Cockfighting. In California, the penalty is a misdemeanor. Distributing it to others is a misdemeanor. Using a child to distribute it is a misdemeanor. Under California law, even manufacturing such a despicable "product" is a minor felony, with no minimum prison sentence. In Colorado', Oregon and North Dakota, possession of brutal images of children being raped, sodomized and humiliated is a misdemeanor. In Iowa, it�s an "aggravated misdemeanor," the equivalent of Livestock Abuse. If you compare the risk-gain ratio for those who traffic in such a "product" to the risk-gain ratio for those who traffic in cocaine, you will instantly understand why our national weakness on this issue has attracted so many new predators. Nationwide, an estimated 96 percent of those arrested for child pornography possession are convicted. But fewer than 60 percent are ever incarcerated. Of those convicted solely of child pornography possession, fewer than one in three serves more than a year in jail. This is despite the fact that child pornography--like narcotics--is illegal contraband in and of itself, and is easily prosecutable. PROTECT�s first point is this: Unless and until the States are made to treat "simple possession" of child pornography as the egregious felony it truly is--and unless the funding is made available to aggressively investigate and prosecute possession of child pornography--federal efforts will be hopelessly diluted. Instead of federal resources acting as a multiplier of state law enforcement efforts, the lack of appropriate legislation and funding is actually discouraging the individual states from protecting our children. Until the states get serious, U.S. prosecutors will continue to pick up the slack for local prosecutors, who have grown dependent upon the federal government to prosecute their criminals for them. Internet Crimes Against Children task forces will continue to provide training and technical assistance to front-line law enforcement agents who are so unsupported by their own states that they often have long backlogs of hard drives waiting to be analyzed, many of them containing evidence that could save a child immediately. And the mass of domestic criminal conspirators who create and feed the insatiable demand for more and more children to be raped on camera will remain at large, as limited federal resources are triaged and focused on chasing after the "major cases" of commercial manufacturers and distributors. PROTECT�s second point is that the federal government also must get serious. We are losing this war, and we are not supporting our troops on the front lines. Recent estimates of the size of the exploding global criminal market in child pornography are in the multi-billion dollar range. Yet, by no objective measure can we claim to be serious or prepared as a nation about stopping what is being done to these children. The FBI�s Innocent Images National Initiative is funded at a level of about $10 million annually. By comparison, the Department of Housing and Urban Development just announced it was awarding more money than the entire Innocent Images budget to build 86 elderly apartment units in Connecticut and almost 7 times their budget just on the homeless in Ohio. The administration has proposed 20 times the entire Innocent Images budget for abstinence-only education programs through the Department of Health and Human Services. The Department of Justice�s Internet Crimes Against Children (ICAC) Task Force program received about $14.5 in FY 2006. That is less than one-fifth the amount proposed for a new initiative to help former prisoners reintegrate into society. Last year�s budget included $211 million for the Department of the Interior for "high-priority brush removal" and related projects. $14.5 million doesn�t clear much brush. The law enforcement officers on the front lines of this war won�t come here and tell you what they honestly think of these priorities. They will be grateful if you simply keep their budgets growing. And while we realize that your committee is not the one responsible for these spending priorities, I don�t know how any of us, as taxpayers, can look these men and women in the eyes. The radical increase in child pornography we see today is the direct result of failing to match our rhetoric about children with the resources needed to fight this war. Our third and final point is that while you have an incredible array of experts at your disposal--all of whom, including PROTECT, are eager to provide specific legislative and policy solutions--the expertise we need most now is the expertise you possess: political leadership. On behalf of our members and the millions of Americans who believe that nothing should be a higher priority than protecting children from predators, I ask you for that leadership and I thank you for the opportunity to testify in this important hearing. Mr. Whitfield. Mr. Weeks, thank you very much, and tell me, did you form PROTECT yourself, or-- Mr. Weeks. No, actually, several people did. There were a number of very prominent experts around the country, including Jay Howell, who started the National Center for Missing and Exploited Children, who said for the longest time, the only group in this country that didn�t seem to have a lobby is abused kids, and that is why we exist. Mr. Whitfield. And how old is it? Mr. Weeks. We are about 3 years old. We have changed the laws in about seven or eight States now, and worked with both Democrats and Republicans. Mr. Whitfield. And you are funded by just private donations? Mr. Weeks. Through our members. Mr. Whitfield. Yeah. Mr. Weeks. Right. Mr. Whitfield. Well, thank you for the great work that you are doing. Talking about the penalties for these crimes, and you mentioned in your testimony how there is this great disparity going from State to State, and you mentioned in Iowa, it is a misdemeanor similar to an animal abuse case. Of course, any of these crimes can be prosecuted under Federal law, I am assuming, and I guess it just gets down to a matter of whether or not interstate commerce is involved, and whatever. But I find it laudable that you are trying to increase the penalties at the State level, because we know that the largest percentages of the cases are prosecuted at the State level. And I was curious, when you lobby for tougher sentences in the State legislatures, what are some of the reasons that you are given for opposing what you are trying to do? Mr. Weeks. It is pretty awful. I mean, there is a widespread tolerance for this, especially for possession, so-called simple possession. You don�t hear that same excuse used for possession of heroin. I think we have heard it all, but we are now days away from getting a major bill introduced in California, which in California, as I failed to mention, there is also a statute for luring a child over the Internet, and for the longest time, there was a vigorous debate going on in committees about whether that should be an infraction or a misdemeanor. Mr. Whitfield. Really. And South Carolina, I understand, just recently passed some legislation that would make a person that was twice convicted of child molestation eligible for the death penalty. Is that correct? Mr. Weeks. Yes. Let me just say this about that. And we don�t have a position on whether someone should be put to death, or go for life, but we have a lot of these laws, often named after dead children, that doesn�t do much. Mr. Whitfield. Yeah. Mr. Weeks. South Carolina is my family�s home, and I feel entitled to say this, it is a little hard to take, given the fact that South Carolina has a law on the books called assault and battery of a high and aggravated nature, and the vast majority of child sexual abuse seems to be plea bargained down to that. Mr. Whitfield. Yeah. Mr. Weeks. So, you know, it is great to have tough laws on the books, but if you are only using them for that tiny fraction of stranger abusers that gets all the media attention, it doesn�t do a whole lot for kids. Mr. Whitfield. But I guess the bottom line of this is while you are trying to increase the penalties for possession of pornographic material involving children, most of these child molestation cases regarding children today appear to be more and more aggravated. There appears to be rape involved. There appears to be even torture involved. There appears to be, in some cases, I guess they are holding children against their will. Unfortunately, in some cases, you have parents involved in this. Mr. Weeks. In the majority of cases. Mr. Whitfield. Which is almost unbelievable, but those crimes, if they are being prosecuted on those crimes, I mean, those are quite severe. Would you agree with that? Mr. Weeks. No. Essentially our studies show that about 4 percent of cases nationwide, of all criminal cases, ever go to a jury. So, start off with the vast, vast majority of them being plea bargained. Mr. Whitfield. Okay. Mr. Weeks. Even a smaller percentage of child sexual abuse cases ever go before a trial. So, we are talking about how are cases plea bargained? They are plea bargained, and there is also charge bargaining that goes in. What is happening now, with a lot of these laws, like Jessica�s Law, is that you have these draconian sentences that sound great, but very few people will ever be charged with them, and in fact, these cases are trivialized to a great extent. Let me mention one thing related to that, though, and Chairman Barton brought this up. For decades, what we have heard is that we would love to prosecute these crimes against children, but they are tough. We have problems with young witnesses. We have problems with evidence. And it is very tough, and we have to plea bargain. This is the exception. We now have a type of crime where you have hard, cold evidence. And if we don�t put people away for that, shame on us. Mr. Whitfield. Absolutely. In your testimony, you talked about the case in North Carolina, I believe, and where, the gentleman was keeping a young girl in a cage. Was that his daughter, or-- Mr. Weeks. That was a complicated story. I hesitate to say, because I may be mixing it up with the second one. I am not sure. Mr. Whitfield. Do you know what penalty he received for-- Mr. Weeks. He did get, I think, 100 years under the Federal law. Mr. Whitfield. So, he was prosecuted by Federal officials. Mr. Weeks. Right. And again, I want to emphasize, there may be some resistance among ideological conservatives to telling the States what to do, and being heavy-handed about it. Mr. Whitfield. Right. Mr. Weeks. But the flipside of this is, they are using the Commerce Clause to essentially slough this off on the Feds. I mean, we have heard top criminal justice policy people in State legislatures essentially talk about these crimes as if they are a Federal problem, even to the extent where one of the most influential policymakers in a Sate capital told me, look, if you want us to be prosecuting these, then give us more money for Federal prisoners that we are taking care of. So, there is a real disconnect there, and this is, I would think that the staunchest conservative would be a heavy-handed Federalist on this. Mr. Whitfield. Well, I mean, I certainly don�t have any problem for ramping up and prosecuting more people at the Federal level on this, and I am sure the rest of us do not. So, thank you for mentioning that. One other comment I would just like to make. You had mentioned that industry told you that they could increase their filters and blow the law enforcement out of the water. Now, would you elaborate on that a little bit? Mr. Weeks. Well, yeah, I would love to, and let me say, I think it is fair to say that law enforcement is already blown out of the water. Mr. Whitfield. Well, okay. Mr. Weeks. By any definition. Mr. Whitfield. Right. Mr. Weeks. But essentially, what they were saying is look, we are reporting everything that we are detecting. Mr. Whitfield. Yeah. Mr. Weeks. But they could detect a lot more. Mr. Whitfield. Yeah. Mr. Weeks. And they are the ones that are going to be the most sophisticated at detecting it. Mr. Whitfield. Right. Mr. Weeks. But there is a realization that if they greatly increase their detection abilities overnight, that we won�t be able to keep up with them, and that is the problem. Mr. Whitfield. So, there are so many violations going on that it would just swamp everybody. Mr. Weeks. Right. Well, there were several questions today about the gentleman from Wyoming, who said there were over a million IP addresses, and I am not sure everybody got the real story there. The real issue, in my mind, is the number of IP addresses, not the number of images. Mr. Whitfield. Right. Mr. Weeks. We are talking about a million computers. Mr. Whitfield. Yeah, unbelievable. Yeah. Well, and you devote full time to this project? Mr. Weeks. Not just to child pornography, but to the work on child abuse legislation, yes. Mr. Whitfield. Yeah. Well, this is such an overwhelming problem, and it is so complex, that is difficult not to become discouraged about it, right? Mr. Weeks. Yeah, I think everybody, the ones that are looking at this every day are the ones that I worry about, but I think there is a common thread, which is if it doesn�t kill you, it just makes you feel like, you know, you are doing the Lord�s work, getting up every morning. Mr. Whitfield. Yeah. Well, thank you very much for being with us, and at this time, I will recognize Ms. DeGette for questions. Ms. DeGette. Thank you, Mr. Weeks. As I understand it, right now, the folks who testified earlier, the Federal prosecutions really take place involving cases where there is some use, there is either international trafficking, or there is some use of the U.S. mail. Is that correct? Mr. Weeks. I think that is fair to say, yeah. Ms. DeGette. Because of the way the Federal statutes are, to prosecute-- Mr. Weeks. They are looking at getting the best bang for their buck, and they are looking at interrupting commercial networks and things like that. Ms. DeGette. Right. Well, there is no Federal statute that makes it a crime to possess these materials unless there is some involvement of the Commerce Clause, correct? Mr. Weeks. Right. Ms. DeGette. So, it would have to be interstate. Mr. Weeks. And if the Internet is involved, of course, that is a given. Ms. DeGette. Well, I mean, yes and no. It would be, as someone who has been in, who has done criminal work before, I mean, if you have got a situation where you have got a case where someone was doing these horrible crimes within a State, and transferring it within a State, while technically, you have got the Commerce Clause involved, because it is the Internet, from a law enforcement standpoint, it is really going to be hard to prosecute that by Federal authorities, right? Mr. Weeks. Right. Right. Ms. DeGette. That is why we need tough State laws and Federal laws, right? Mr. Weeks. That is one reason. Ms. DeGette. Yeah. Mr. Weeks. Another, though, is simply that unless the Federal government wants to increase its force by, you know, by fifty, it is going to have to work with the States, and create incentives for the States to do their share. And a related issue, too, is that a study done, it was commissioned by Congress, came out last year on people that possess child pornography found that 40 percent of them were conclusively known to have also sexually abused children directly, and another 15 percent were known to have tried to lure. So, you have 55 percent, representing a much larger percent, no doubt, that had actually molested children. If we don�t have on the ground, local expertise and resources to fight this, what is going to happen is, every time that little 5-year-old-girl goes to school, and discloses that she is being molested at home, that guy may have child pornography. It is a very high likelihood that he has child pornography on his computer. Now, are we going to put together a case that involves dragging that girl through the wringer in court, and many prosecutors will just dismiss it out of hand, because she is too young, or are we going to actually go and get that hard drive, and that is the issue. We are losing the ability to protect children in our local communities every day. Ms. DeGette. Right. Well, and I am not trying to disagree with you in any way. I think we agree. What we need is tougher enforcement of Federal laws and State laws and resources at all levels, and coordination. And frankly, from listening to the second panel, I was a little encouraged in this hearing, that at least the levels of authorities seem to be coordinating. I mean, the problem is not, and the Chairman will tell you, we see a lot of situations where the agencies can�t even coordinate with each other. So, the good news is, at least they have the mechanisms to coordinate. Do you agree with that? Mr. Weeks. I have to take their word for that. Ms. DeGette. Yeah. And so, really, what we need is strong laws and resources, to help them carry out their charge, correct? You need to answer in words. Mr. Weeks. Yes, yes. Excuse me. Ms. DeGette. Thanks. Now, so, with that in mind, are there Federal statutes that you think we can strengthen, as well as the State laws? Mr. Weeks. I think that the penalties for possession need to be increased. Since Federal, since the guidelines were deemed advisory only, that is a loophole now. I think that most of the cases you hear about are not getting probation, because they are just essentially cherry picking at this point, but that is a loophole that is a serious issue. I think that forfeiture is another major issue that should be looked at. International treaties. I wish I was more of a telecommunications expert for you. Ms. DeGette. Yeah. Okay. Well, but you think we have the adequate laws on the books to prosecute, to federally prosecute cases, even when mail is not involved or international situations. Do you think we can prosecute these cases, simply because they are done on the Internet? Mr. Weeks. I think we can prosecute them all day long and all night, yeah. Ms. DeGette. All right. I was appalled to hear that Colorado is one of the States that just classifies this as a misdemeanor, and I would imagine that States like Colorado and other States that classify it like this have not really looked at their laws vis-a-vis the increase, as the Chairman said the increasing violence and depravity of these Internet communications and the horrible abuse for the children. Would that be your sense as well, working in these things? Mr. Weeks. I am conflicted about that, and I will tell you why. I have a real hard time believing there are as many people left in this country, especially in positions of leadership, who are that clueless about the nature of child pornography. I just don�t believe it. I think, it would be interesting to find out in your State, and other States like that, what has transpired in recent sessions, whether or not they have tried to increase the penalty. Often, what it is, is unfortunately, is prosecutors who just want so much discretion that they resist mandatory minimums and increased penalties. But there is also-- Ms. DeGette. Well, part of what happened, and I will tell you, I was in the State legislature in Colorado in the early to mid �90s. During those years, we basically tripled, sometimes quadrupled the sentences for the existing felonies in the State. And so, for example, where you had a crime where it might be an 8 year maximum penalty, it suddenly went up to 36 years, and then, you had the mandatory minimum sentences put in, and in many cases, those increases were warranted. Some of the maximum penalties for different felonies were too low. In other cases, there was no judgment. It was just a rush to increase the penalties. Well, then, what happened, of course, in the late 1990s, in the past few years, the prisons and the criminal justice systems have become completely overloaded in States like my State and other States. So, I think the legislatures have now been loath to increase the penalties of other crimes because they don�t have any place to put the perpetrators, which is a tragedy, because what is happening is the perpetrators for these horrible crimes that are affecting younger and younger children are going away with a slap on the wrist, while other people, who have committed crimes that are not crimes against people, economic crimes and other kinds of crimes, are sitting in prison for 38 years, and that just seems insane to me. Mr. Weeks. Yes. Ms. DeGette. And you agree. Mr. Weeks. I agree. Ms. DeGette. And so, I imagine that is part of the explanation of what has happened here. But I will tell you this. I intend to call up my Senate President and House Majority Leader, who are personal friends of mine, and see if they can�t get a late bill introduced next week to fix this in Colorado. Mr. Weeks. Please, and when you do, please make sure it is tougher than felony cockfighting, as it is in my State, because making it a felony in and of itself is not enough. But thank you. Ms. DeGette. Well, making it a felony, I mean, in a State like Colorado, and you have to look at the different States, in a State like Colorado, making it a felony helps, because of the penalty structure. Mr. Weeks. Absolutely. Ms. DeGette. And just one last question. I don�t know if you heard me ask the last panel, but for a crime like child pornography, maybe not for the hardcore perpetrators who, as you say, are rapists and child abusers, but for people who possess it, it would seem to me that tougher penalties at the State level and at the Federal level would begin to deter these crimes, because simple possession of it, if someone knew they were going to prison for a long time, that might make them think twice. For the people who are perpetrating these horrible crimes, they are a different story, and they need to be locked up for even longer, but wouldn�t you agree, just if someone knew that there was a certainty that they could be arrested and prosecuted and go to jail, that would really reduce the amount of possession. Mr. Weeks. I absolutely agree. I think to a large extent, it is the certainty of being caught and prosecuted that is the most important thing, and that is not there. Ms. DeGette. Right. Well, thank you very much, and thank you, Mr. Chairman. Mr. Weeks. Thank you. Mr. Whitfield. Thank you, Ms. DeGette, and that concludes today�s hearing, but before we adjourn, without objection, I want to ask that the slides shown during the hearing by Mr. Flint Waters be entered into the record. The slides from the Immigration and Customs Enforcement, the Regpay article from the Wall Street Journal, and then Chapter 26 from Dr. Cooper�s book, and then, the record will be open for 30 days for any additional information that may come in. [The information follows:] EMBED PowerPoint.Slide.8 EMBED PowerPoint.Slide.8 Mr. Whitfield. But Mr. Weeks, thank you for the great job you are doing. Mr. Weeks. Thank you. Mr. Whitfield. We really appreciate your willingness to come and help us out, and I look forward to working with you in the future. Mr. Weeks. Thank you, Mr. Chairman. Mr. Whitfield. And that adjourns today�s hearing. [Whereupon, at 2:20 p.m., the subcommittee was adjourned.] Response for the Record of William E. Kezer, Deputy Chief Inspector, United States Postal Inspection Service May 19, 2006 The Honorable Edward Whitfield Chairman Oversight and Investigations Subcommittee of the Energy and Commerce Committee U.S. House of Representatives Washington, DC 20515-0001 Dear Mr. Chairman: On April 6, 2006, the U.S. Postal Inspection Service was honored to testify before the Oversight and Investigations Subcommittee concerning its efforts to combat the increasingly, menacing crime of sexual exploitation against children. Despite the overwhelming use of the Internet to perpetuate crimes involving child exploitation, many offenders also utilize the U.S. Mail, in concert with the Internet, to traffic in child pornography or otherwise sexually exploit children. Numerous examples of recent cases investigated by Postal Inspectors with a common nexus to the Internet and the U.S. Mail were provided in our oral and written testimony. When the U.S. Mail is used in connection with crimes involving the sexual exploitation of children, Postal Inspectors work diligently to identify and track down those responsible for the commission of these heinous crimes. We work closely with the various United States Attorneys and other agencies, such as the National Center for Missing and Exploited Children in order to bring the alleged offenders before the federal judicial system. The Postal Service has and continues to be committed to fighting the war on crime against those individuals who prey on our nation�s children. Presently, we have a number of Postal Inspectors assigned full-time to these types of investigations. Testimony elicited by the Subcommittee revealed several areas in which Congress may aid law enforcement in these types of investigations. These include possible assistance within the jurisdiction of both the House Energy and Commerce and House Judiciary Committees. Assistance suggested by several of the law enforcement witnesses at the April 6th hearing included requiring Internet Service Providers (ISPs) to maintain subscriber data for a set time period (i.e., a minimum of 90 days) and to respond promptly to subpoenas seeking subscriber information; providing for additional investigator resources assigned to child exploitation investigations; providing for the means to reduce backlogs in the forensic examination of digital evidence; and, specific to the Postal Inspection Service, providing administrative subpoena authority in the area of child exploitation offenses. As a result of the hearing, the Postal Inspection Service, along with other agencies, were asked to provide further comment on the benefits of administrative subpoenas as a necessary law enforcement tool. The Postal Inspection Service was invited to formally request this type of investigative authority. It is our belief the ability to issue administrative subpoenas will greatly assist our efforts against child exploitation. The testimony of several witnesses at the April 6th hearing supported the fact administrative subpoenas help accelerate the process of identifying offenders who oftentimes hide behind screen names as well as websites operated by child abusers and pornographers. As you are aware, in 1998 Congress passed The Child Protection and Sexual Predator Punishment Act of 1998. Title III, Section 301 of the Act authorized the Attorney General to issue administrative subpoenas in child exploitation cases. This authority is presently codified at 18 U.S.C. �. 3486. (Exhibit A) This authority has been delegated to the Federal Bureau of Investigation at the supervisory field level. The U.S. Postal Inspection Service would benefit from having this investigative tool to aid in its law enforcement efforts against child exploitation. As the Internet has changed the manner in which child pornographers operate, so too, must the law enforcement tools used to investigative and arrest the perpetrators of these crimes adapt to the changing environment. It appears an amendment would be needed to 18 U.S.C. � 3486 in order to include authority for the Postmaster General to issue administrative subpoenas in criminal investigations involving child exploitation. (Exhibit B) If such an amendment is enacted, the Postal Service would then publish regulations authorizing Postal Inspectors in Charge at the field level similar to the process used by the Federal Bureau of Investigation. This amendment would greatly assist federal agencies in the pursuit of those individuals who are sexually abusing and exploiting our children. The interest and assistance of the Subcommittee on Oversight and Investigations are welcomed and appreciated. If you require any additional information, please contact Deputy Chief Inspector William Kezer at 202-268-8709. Sincerely, L. R. Heath Chief Postal Inspector Enclosures Response for the Record of Flint Waters, Lead Special Agent , Wyoming Division of Criminal Investigation, Internet Crimes Against Children Task Force Technology Center, United States Department of Justice May 30, 2006 The Honorable Edward Whitfield Chairman Oversight and Investigations Subcommittee of the Energy and Commerce Committee U.S. House of Representatives Washington, DC 20515-0001 Dear Mr. Chairman: 1. You state in your testimony that a special agent from the Department of Homeland Security worked with your task force. Is this an employee of the Immigration and Customs Enforcement, or some other division? Special Agent Balliett is an employee with Immigrations and Customs Enforcement. She is assigned to our task force full time and routinely handles cases throughout the region related to the trafficking of child sexual abuse images and Internet child victimization. I can�t emphasize enough how the Federal support of our mission makes it possible to protect Wyoming children. This cross-jurisdictional problem has overwhelmed state and local law enforcement. Without the Federal resources we have received, like a special agent from ICE and the ongoing guidance and funding provided from the Office of Justice Programs, we would have failed. 2. Under Wyoming law, if law enforcement has a current IP, e-mail and home address for an Internet user suspected of possessing child pornography, is that sufficient to obtain a search warrant and seize that computer? If the suspicion of criminal conduct rises to a level of probable cause we can obtain a search warrant to seize the computer. I will make myself available for any further questions that may arise from this matter. Respectfully, Flint Waters, Lead Agent, Wyoming ICAC Response for the Record of Chris Swecker, Acting Assistant Executive Director, Federal Bureau of Investigation, United States Department of Justice Response for the Record of Dr. Frank Kardasz, Sergeant, Phoenix Police Department, Project Director, Arizona Internet Crimes Against Children Task Force, United States Department of Justice Please describe the difficulty of tracking illegal Internet activity that occurs through wireless access points. Are there tools to determine where the activity originates? The difficulty in tracking illegal Internet activity originating from wireless access points might best be described by way of a true-life example. In August, 2005, I received a call from an officer of the Milwaukee, Wisconsin Police Department. He was investigating the case of a missing boy who had disappeared with someone the boy had met via the Internet. Milwaukee computer forensics examiners had looked into the contents of the boys computer. They found the screen name of the suspect with whom the boy had been chatting before he had disappeared. They subpoened the Internet service provider (ISP) associated with the suspect�s screen name. Subpoena results indicated that the Internet protocol address affiliated with the screen name originated from an apartment in Phoenix, Arizona. Milwaukee PD provided me with the apartment address. My detectives and I immediately went to the Phoenix apartment. We quickly eliminated the apartment resident as a suspect but we learned that she possessed an unencrypted wireless router and the device provided free Internet access to everyone in nearby apartments. We began interviewing neighbors, asking them if they had observed a new boy in the area. Our diligence and luck prevailed. One local resident said that a man living nearby had recently been accompanied by a boy whom the man said was his son. We then conducted surveillance for several hours until the man and boy appeared. Detectives apprehended the suspect, a wanted sex offender with felony warrants from prior offenses, and the boy, who had been molested by the suspect. The Phoenix suspect had used a laptop computer from his nearby apartment to intercept the unencrypted wireless signal from his unsuspecting neighbor�s computer router. This permitted the offender to communicate with the boy in Wisconsin and entice him into meeting. The boy is now back with his mother in Wisconsin. The suspect awaits trial. There were no special tools available to us that could have pinpointed the exact location of the offender who had used his neighbors unencrypted wireless access. We employed two old-fashioned police techniques; interviews and surveillance. My colleagues nationwide have shared other similar stories with me involving wireless access points used for criminal offenses. In some cases their investigations dead-end at a wireless access point that is providing unencrypted Internet service to everyone in antenna range. In other cases interviews and surveillance fail because the elusive suspect(s) quickly move on to other wireless access points. Countless libraries, coffee shops, airports, hotels and businesses now provide free wireless Internet access either accidentally, because they fail to enable the encryption features to protect the signal, or as a free-bonus customer service. While free wireless access is a welcome service for law-abiding citizens, it is also a tool for criminals. Are there tools to determine where the activity originates? The answer is yes and no. A subpoena or search warrant to the ISP associated with an Internet protocol (IP) address is the tool that we use to identify the specific location of the computer assigned to an IP address. In some cases, the computer we identify is attached to a router that is broadcasting a wireless signal to another computer, the exact location of which is unknown. If the wireless signal is being used by a remote computer, the investigation continues and becomes more difficult. There are technical surveillance tools, to wit, radio spectrum analyzers and direction finders, that can be used to further hone in on the remote computer, but these tools are somewhat expensive for the average local law enforcement agency ($5,000 - $25,000), they require advanced training and are often inexact in a city environment where several wireless signals may be present at the same time. In your testimony, you stated that the cell phone providers maintained their records for cell phone usage for long periods of time, but that Internet service providers (ISP) did not. Internet service providers have alleged that they do not have storage space to maintain records for any length of time. Do you know why cell phone providers can store this information for long periods of time, but Internet service providers cannot? My comments about records preservation were based on my limited knowledge of the cell phone industry and from my experiences, mostly as a cellular service consumer. I know that cell phone providers often closely track customer usage by the minute and cell phone providers often maintain copious records for billing purposes. I have reviewed cell phone billing statements that gave long lists of individual calls including the numbers called from and to, the number of minutes used during each call and the cost of each call. Maintaining so much data likely entails computer servers with large data storage capacity. Internet service providers do not normally bill customers on a per-minute basis so there is usually not a need to record the frequent changes in Internet data-packet destinations that are needed for billing purposes by cell phone companies. I have seen computer traceroute software that enables reporting of the location of each server through which data packets travel across the Internet but the data storage capacities needed to track all of that information would be incredibly large, and in most cases, unnecessary. The datum that we believe would be most useful in order to have a starting point for our investigations are, minimally, the subscriber information. There is no privacy violation when ISP�s retain subscriber information and we in law enforcement could only subsequently obtain the information through a subpoena or search warrant. I believe that Internet service provider can preserve this data. Many of them already retain the data because without it, they are unable to bill customers who use their services. If ISP�s are stating they cannot store the information, it is probably because they choose not to store it. Computer data storage capacity has increased exponentially in recent years and the cost of data storage has decreased. I am aware that data retrieval and subsequently reporting the information back to law enforcement requires human intervention and entails labor costs. It is my opinion that ISP�s can store the information if they choose to. It is also my opinion that some ISP�s will not satisfactorily store data and recover data for law enforcement until the law mandates them to do so. Are you proposing that all records of individual Internet use be maintained by the service provider, including e-mails, instant messages and chat room discussions, or only the IP addresses and other identifying information about the addressee? If all you want is the background information to identify subscribers, do you believe that a lack of storage space is a problem for the ISP? I am not proposing that all records of individual Internet use be maintained by service providers. Maintaining ALL records, including the content of all emails, instant messages and chat room discussions for extended periods of time would present the ISP�s with a significant storage responsibility. Although it is possible to preserve all of the data, it would require very large data storage capacities. Preserving all data, including the intimate details of private text messages and/or the images transmitted during private communications would undoubtedly send privacy protection advocates into a lather! Even though the information would be retained by the ISP�s and not released to law enforcement except by court order, privacy advocates would likely balk. Basic subscriber information, that data which is presently available from cooperating ISPs through subpoena is the minimum we hope to mandate that ISP�s preserve for law enforcement investigations. This information would not be available to law enforcement except through subpoena or search warrant. Although I do not claim intimate knowledge of the specific equipment or storage capacities presently available to all ISP�s, I do not believe that storing this information would present most ISP�s with storage space problems. Are administrative subpoenas only used for business records? In my work involving Internet crimes, our administrative subpoenas have been used only for retrieving business records from Internet service providers. As a wider practical matter, I am aware that administrative subpoenas can also be used to demand personal documents and other tangible things from not only businesses but also from private citizens. Under Arizona law, if law enforcement has a current IP, e-mail and home address for an Internet user suspected of possessing child pornography, is that sufficient to obtain a search warrant to seize that computer? No. In Arizona, a search warrant must be based on probable cause for a felony offense and the warrant must be authorized by a magistrate. The required probable cause is described in the affidavit accompanying the search warrant. The affidavit is written by the investigator(s) who work the case. Although a current IP address and the physical "home" address where the felony offense originated would be two very important items towards obtaining a search warrant, detectives would also conduct other investigative activities to build the necessary probable cause. The activities could include surveillance of the location, records checks and criminal history checks of the property owners, motor vehicle checks on vehicles frequenting the location, pretext visits and/or calls to the location. The combination of several of these items, along with the physical "home" address associated with the IP address would provide the probable cause needed for the search warrant. Thank you for the opportunity to respond to the preceding questions. Please contact me if you require additional information. Regards, Dr. Frank Kardasz, Sgt. / Project Director Phoenix P.D. /AZ Internet Crimes Against Children Task Force 620 W. WashingtonPhoenix, AZ 85003 desk: 602 256 3404 email: [email protected] web site: http://azicac.net Response for the Record of James Plitt, Director, Cyber Crimes Center, Office of Investigations, United States Immigration and Customs Enforcement, United States Department of Homeland Security No response was received to the following question submitted to Mr. Plitt. The Honorable John D. Dingell Question for Mr. James Plitt, Director Cyber Crimes Center, Office of Investigations U.S. Immigration and Customs Enforcement U.S. Department of Homeland Security April 6, 2006 Subcommittee on Oversight and Investigations Hearing entitled: "Sexual Exploitation of Children Over the Internet: What Parents, Kids and Congress Need to Know About Child Predators" 1. Please describe in detail the relationship between the Cyber Crimes Center of Immigration and Customs Enforcement and the Innocent Images National Initiative of the Federal Bureau of Investigation. When a child exploitation investigation involves trans-border movement of images, which agency takes the lead in dealing with foreign agencies such as Interpol? Do both agencies count that investigation as one of their own? Response for the Record of Grier Weeks, Executive Director, National Association to Protect Children No response was received to the following questions submitted to Mr. Weeks. The Honorable John D. Dingell Questions for Mr. Grier Weeks, Executive Director PROTECT April 6, 2006 Subcommittee on Oversight and Investigations Hearing entitled: "Sexual Exploitation of Children Over the Internet: What Parents, Kids and Congress Need to Know About Child Predators" -- SEQ CHAPTER \h \r 1-1. Please describe state statutes of limitation for possessing and distributing child pornography and any problems that may result. How successful has PROTECT been in increasing these time limitations? 2. Mr. Swecker of the Federal Bureau of Investigations testified, despite the public concern about child pornography, his office had not received any additional investigative resources in the FY2007 budget. Does the same situation exist in the States? Are state legislatures generally more willing to increase penalties for these crimes than to increase resources to investigate and prosecute them? SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET: WHAT PARENTS, KIDS AND CONGRESS NEED TO KNOW ABOUT CHILD PREDATORS WEDNESDAY, MAY 3, 2006 House of Representatives, Committee on Energy and Commerce, Subcommittee on Oversight and Investigations, Washington, DC. The subcommittee met, pursuant to notice, at 2:25 p.m., in Room 2123 of the Rayburn House Office Building, Hon. Ed Whitfield (chairman) presiding. Members present: Representatives Walden, Burgess, Blackburn, Barton (ex officio), Stupak, DeGette, Inslee, Baldwin, and Whitfield. Also present: Representative Gingrey. Staff Present: Mark Paoletta, Chief Counsel for Oversight and Investigations; Alan Slobodin, Deputy Chief Counsel for Oversight and Investigations; Kelli Andrews, Counsel; Karen Christian, Counsel; Michael Abraham, Legislative Clerk; Edith Holleman, Minority Counsel; and David Nelson, Minority Investigator/Economist. Mr. Whitfield. I am going to call this hearing to order, and I apologize for our delay today. There was a hearing in the hearing room prior to our arrival and I certainly want to welcome those on the first panel. We will have a second panel of witnesses as well. Those buzzers that you hear going off are calling us to votes on the floor. We are going to have three votes on the floor, so I apologize in advance for further delay, but we will go do the three votes, then we will come back. We will do our opening statements, then we will swear in the first panel, and then we will get into the questions and answers. So please forgive us, and we will adjourn the hearing--not adjourn, but recess the hearing until we can do these three votes. Thank you very much. [Recess.] Mr. Whitfield. I will call the hearing to order, and once again apologize for the delay because of the votes on the floor. We are extremely enthusiastic that we have such a great panel of witnesses today on a subject matter that is quite serious, and one that is quite disturbing. This will be our third hearing on "Sexual Exploitation of Children Over the Internet: What Parents, Kids, and Congress Need to Know About Child Predators." Our first two hearings brought to light many staggering and sobering facts about how children are victimized over the Internet. We know the number of sexually exploitative images of child victims continues to rise, and that a large-scale commercial industry has developed around taking, trading, and selling sexually exploitative images of children over the Internet. We also heard testimony at our last hearing from several law enforcement agencies that are trying to combat this problem and catch child predators. It is not an easy task. Although the Immigration and Customs Service, the Federal Bureau of Investigation, the U.S. Postal Service, the Internet Crimes Against Children Task Force, and many State and local agencies are working on putting child predators behind bars. The Internet has caused a proliferation of both the abusers as well as the images of the abused. At our last hearing, I was struck by how many different law enforcement agencies are working on this problem, and yet, there does not seem to be any national strategy in place to deal with this growing problem. I hope that through our hearing on this topic, a national strategy will be put in place to ensure that our children are safer and child predators are caught and put behind bars. Today, we will continue to learn about this horrific problem. We have a brave young lady with us today whom I had the opportunity to visit with before the hearing, Masha Allen, and I want to extend my most sincere thanks to you, Masha, publicly, for coming forward to tell us about your experience at the hands of a pedophile who happened to be your adoptive father. I also want to thank her mother, Faith Allen, for accompanying her today. Masha is now 13 years old, will testify about how she was adopted when she was 5 years old from a Russian orphanage by a divorced man living alone in Pennsylvania named Matthew Mancuso. Her adoptive father, Mr. Mancuso, sexually molested Masha from the first day she arrived at his home as a 5-year-old until law enforcement finally caught up with him 6 years later. Masha is a survivor, and she will be able to tell us as the voice of a child victim and for victims everywhere how she feels particularly violated by the sexually exploitative images taken and posted by Mancuso over the entire Internet. We will also hear testimony from Nancy Grace, a former State court prosecutor in Atlanta, Georgia, who I understand handled a number of cases involving sexually abused children. We also look forward to hearing from Ms. Grace about her media work involving issues surrounding the sexual exploitation of children and specifically, over the Internet. Finally, we will revisit some questions that we previously had for the Department of Justice and Federal Bureau of Investigation witnesses at our last hearing which were not answered because we did not feel like the right witnesses were present. I am very glad to see that the Department of Justice has sent us up one witness that the subcommittee did request, Ms. Alice Fisher, who I had the opportunity to meet with earlier; however, we are still disheartened that we will once again not hear testimony from Mr. Andrew Osterbein, who is the head of the section at the Department of Justice that actually handles cases involving the sexual exploitation of children over the Internet. I know that Ms. Fisher oversees this section, and I am hopeful that she will be able to add some significant detail to how that section handles these types of cases, particularly when a cooperating child victim witness is involved, and also, we want to hear, obviously, from law enforcement on what we can do to help them do their jobs better. A daunting challenge in combating the sexual exploitation of children over the Internet continues to be faced by all of us involved in this issue, and we hope to learn more today about the efforts of law enforcement in this area, and also to understand what the Department of Justice�s recently proposed legislative package will add to their efforts in this regard. I thank all of you for being here today. There isn�t a more important issue than this one on our plate, and we want to make some efforts to curtail this, obviously, and prohibit it and be very stern in our enforcement of these statutes. [The prepared statement of Hon. Ed Whitfield follows:] Prepared Statement of the Hon. Ed. Whitfield, Chairman, Subcommittee on Oversight and Investigations GOOD AFTERNOON. I�D LIKE TO WELCOME EVERYONE TO THE SUBCOMMITTEE�S THIRD HEARING THAT EXPLORES ISSUES RELATED TO THE SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET. OUR FIRST TWO HEARINGS ON THIS TOPIC HAVE BROUGHT TO LIGHT MANY STAGGERING AND SOBERING FACTS ABOUT HOW CHILDREN ARE VICTIMIZED OVER THE INTERNET. WE LEARNED AT OUR LAST HEARING THAT THE NUMBER OF SEXUALLY EXPLOITATIVE IMAGES OF CHILD-VICTIMS CONTINUES TO RISE AND THAT A LARGE-SCALE COMMERCIAL INDUSTRY HAS DEVELOPED AROUND TAKING, TRADING AND SELLING SEXUALLY EXPLOITATIVE IMAGES OF CHILDREN OVER THE INTERNET. WE ALSO HEARD TESTIMONY AT OUR LAST HEARING FROM SEVERAL LAW ENFORCEMENT AGENCIES THAT ARE TRYING TO COMBAT THIS PROBLEM AND CATCH THESE CHILD PREDATORS. IT IS NOT AN EASY TASK. ALTHOUGH THE IMMIGRATION AND CUSTOMS SERVICE, THE FEDERAL BUREAU OF INVESTGATION, THE U.S. POSTAL SERVICE, THE INTERNET CRIMES AGAINST CHILDREN TASK FORCE AND MANY STATE AND LOCAL AGENCIES ARE WORKING ON PUTTING THESE CHILD PREDATORS BEHIND BARS, THE INTERNET HAS CAUSED A PROLIFERATION OF BOTH THE ABUSERS, AS WELL AS, IMAGES OF THE ABUSED. AT OUR LAST HEARING, I WAS STRUCK BY HOW MANY DIFFERENT LAW ENFORCEMENT AGENCIES ARE WORKING ON THIS PROBLEM--AND YET, THERE DOES NOT SEEM TO BE ANY NATIONAL STRATEGY IN PLACE TO DEAL WITH THIS GROWING PROBLEM. I HOPE THAT THROUGH OUR HEARINGS ON THIS TOPIC, A NATIONAL STRATEGY WILL BE PUT IN PLACE TO ENSURE THAT OUR CHILDREN ARE SAFER AND THAT THESE CHILD PREDATORS ARE CAUGHT. AT OUR HEARING TODAY, WE WILL CONTINUE TO LEARN ABOUT THIS HORRIFIC PROBLEM. WE HAVE A VERY BRAVE YOUNG LADY HERE WITH US TODAY-- MASHA ALLEN. I WANT TO EXTEND MY DEEPEST THANKS TO MASHA FOR COMING FORWARD TO TELL US ABOUT HER HORRIFIC EXPERIENCE AT THE HANDS OF A PEDOPHILE AND I ALSO WANT TO THANK HER MOTHER, FAITH, FOR ACCOMPANYING HER UP HERE TO THIS HEARING. MASHA, WHO IS NOW 13 YEARS OLD, WILL TELL US ABOUT HOW SHE WAS ADOPTED WHEN SHE WAS JUST 5 YEARS OLD FROM A RUSSIAN ORPHANAGE BY A DIVORCED MAN, LIVING IN PENNSYLVANIA, NAMED MATTHEW MANCUSO. HER ADOPTIVE FATHER, MANCUSO, SEXUALLY MOLESTED MASHA FROM THE FIRST DAY SHE ARRIVED AS A 5 YEAR OLD UNTIL LAW ENFORCEMENT FINALLY CAUGHT HIM 6 YEARS LATER. MASHA IS A SURVIVOR--AND SHE WILL BE ABLE TO TELL US, AS THE VOICE OF CHILD VICTIMS EVERYWHERE, HOW SHE FEELS PARTICULARLY VIOLATED BY THE SEXUALLY EXPLOITATIVE IMAGES TAKEN AND POSTED BY MANCUSO OVER THE INTERNET. WE WILL ALSO HEAR TESTIMONY FROM NANCY GRACE, A FORMER STATE COURT PROSECUTOR IN ATLANTA GEORGIA, WHO I UNDERSTAND HANDLED A NUMBER OF CASES INVOLVING SEXUALLY ABUSED CHILDREN. WE ALSO LOOK FORWARD TO HEARING FROM MS. GRACE ABOUT HER MEDIA WORK INVOLVING ISSUES SURROUNDING THE SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET. FINALLY, WE WILL REVISIT SOME QUESTIONS THAT WE PREVIOUSLY HAD FOR THE DEPARTMENT OF JUSTICE AND FEDERAL BUREAU OF INVESTIGATION WITNESSES AT OUR LAST HEARING WHICH WERE NOT ANSWERED BECAUSE THE KNOWLEDGEABLE WITNESSES WE REQUESTED WERE NOT SENT UP TO TESTIFY. I MUST STATE THAT THIS HAS BEEN AN EXTREMELY FRUSTRATING PROCESS TO GET THE WITNESSES WE WANT--AND WHO WE BELIEVE WILL PROVIDE THE MOST THOROUGH ANSWERS-- FROM THE DEPARTMENT OF JUSTICE AND FROM THE FBI UP HERE TO TESTIFY. I HOPE THAT TODAY IS THE BEGINNING OF THE END OF MY FRUSTRATION ON THIS POINT. I AM VERY GLAD TO SEE THAT THE DEPARTMENT OF JUSTICE HAS SENT UP ONE OF THE WITNESSES THAT THE SUBCOMMITTEE REQUESTED-- MS. ALICE FISHER. HOWEVER, I AM STILL DISHEARTENED THAT WE WILL, ONCE AGAIN, NOT HEAR ANY TESTIMONY FROM MR. ANDREW OOSTERBAAN, THE HEAD OF THE SECTION AT THE DEPARTMENT OF JUSTICE THAT ACTUALLY HANDLES CASES INVOLVING THE SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET. I KNOW THAT MS. FISHER OVERSEES THIS SECTION AND I�M HOPEFUL THAT SHE�LL BE ABLE TO ADD SOME SIGNIFICANT DETAIL TO HOW THAT SECTION HANDLES THESE CASES, PARTICULARLY WHEN A COOPERATING CHILD-VICTIM WITNESS IS INVOLVED. I AM ALSO PLEASED TO SEE THAT MR. ROLDAN AND MR. BELL, FROM THE FBI, ARE HERE TODAY TO TESTIFY. MR. ROLDAN--I AM SURE YOU KNOW THAT WE REQUESTED YOUR ATTENDANCE AT THE HEARING WE HAD ON APRIL 6TH. WE WERE VERY DISTURBED TO LEARN THAT RATHER THAN ATTEND OUR HEARING, YOU WERE APPEARING ON MORNING NEWS SHOWS LIKE CNN AND THE TODAY SHOW. WE�RE GLAD YOU MADE TIME FOR US TODAY AND LOOK FORWARD TO HEARING ABOUT THE WORK THAT INNOCENT IMAGES IS DOING TO COMBAT THIS GROWING PROBLEM. I UNDERSTAND THAT THE WORK THAT LAW ENFORCEMENT HAS CUT OUT FOR THEM IN COMBATTING THIS PROBLEM OF THE SEXUAL EXPLOITATION OF CHILDREN OVER THE INTERNET IS MASSIVE. I HOPE TO LEARN MORE TODAY ABOUT THEIR EFFORTS IN THIS AREA--AND ALSO TO UNDERSTAND WHAT THE DEPARTMENT OF JUSTICE�S RECENTLY PROPOSED LEGISLATION WILL ADD TO THEIR EFFORTS IN THIS REGARD. THANK YOU ALL FOR BEING HERE TODAY. Mr. Whitfield. So at this time, I will recognize our Ranking Member, Mr. Stupak from Michigan, for his opening statement. Mr. Stupak. Thank you, Mr. Chairman, and thanks for convening this hearing. This committee must take our time to adequately address a number of very serious issues involving child pornography and exploitation on the Internet. These include sexual exploitation of very young children by members of their own family; how to remove pornographic images of children from the Internet; how to keep these images off the Internet; and whether the Department of Justice and the Federal Bureau of Investigation are aggressively investigating and convicting individuals for these crimes. The sexual abuse and exploitation of children facilitated by the Internet is a criminal activity of horrible dimensions. Last month, we heard the story of Justin Berry, when he was a 13-year-old boy, was manipulated to perform sexual acts in from of a web camera for 5 years. Unlike the case before us today, the FBI and Department of Justice have largely failed to act on the information provided by Justin that would have saved other children from sexual predators. They failed to shut down or arrest the Internet operator of Justin�s child pornography site. While the site is now shut down, the operator has fled the country. Today, we will hear another tragic story of child pornography, this one involving a 5-year-old child adopted from a Russian orphanage for the sole purpose of sexual exploitation. Masha Allen, a young girl of great courage, will tell us of her 5 years of rape and how she became featured in one of the most sought after sets of child pornography images. Masha�s adoptive father specifically requested a blonde-haired, blue-eyed 5-year-old girl, and three adoption agencies helped fulfill this wish. The adoption agency that delivered Masha to this monster did not check the living and sleeping arrangements for the child. The agency did not interview the adoptive father�s estranged daughter, whom he had previously abused when she was the same age as Masha. The agency did not perform follow-up home visits after the adoption, as required. The agency delivered a 5-year-old child into a living hell. Masha was rescued only after an undercover Illinois police officer corresponded with her adoptive parents--excuse me, her adoptive father, and obtained his Internet address and a search warrant. When executing this warrant, authorities rescued Masha. Masha, now 13, will testify how her images became the most sought-after images for pedophiles. We will learn how, because of web file sharing, her terrible ordeal did not end with her rescue. As the Supreme Court observed over 20 years ago in New York v. Ferber, and I quote "The distribution of photographs and films depicting sexual activity by juveniles is intrinsically related to a sexual abuse of children, and harm to the child is exacerbated by their circulation." Mr. Chairman, this Nation has done very little to stop the Internet exploitation of children like Masha. Last month, we were shocked to learn that 80 percent of the pornographic images on the Internet involve children less than 12 years of age. Thirty-nine percent involve children under 6 years of age, and 19 percent portray children age 3 or younger. Even more disturbing is the fact that at least a third, and perhaps as many as 75 percent of the men caught with these images molest and rape their own children, just as Masha�s adoptive father did. Also today, we will finally hear from the Department of Justice. I will be interested to know why, after 8 months, there has been little follow up in the Justin Berry case, while other cases, like Masha�s, received an immediate response with search warrants and arrests. Is there a Constitutional, legal, or resource impediment that Congress does not fully understand? Why are there so few of the tens of thousands of perpetrators who buy, sell, and trade images of young children being raped and tortured are not prosecuted. After our last meeting, U.S. Attorney General Gonzalez announced that his agency had rounded up 1,100 violent sexual offenders, some of which were child molesters. But from what this subcommittee has heard, 1,100 is a small fraction of the true number of sexual predators in our society. So what is the Justice Department�s plan for the rest of these people? Finally, Mr. Chairman, I know that you plan to call Internet service providers and related businesses that facilitate the transmission of images over the Web. It is important to learn what they believe can be done to prevent the dissemination of the estimated 3.5 million pornographic images currently on the Internet. I truly hope that when these companies testify, they will have viable plans to remove the horrible images of Masha and other young victims from the Internet. Voluntary action to clean up the Internet has not been successful in dealing with this problem. I look forward to continuing to work with you to make sure Congress does everything it can to protect our children and prevent images of abuse from flooding the Internet. I yield back the balance of my time. Mr. Whitfield. Mr. Stupak, thank you very much, and I am going to go out of order for just 1 minute. Congressman Phil Gingrey is on the first panel with us, and he is the Representative and represents in the Congress Masha Allen and her mother, Faith Allen, and he has some amendments on the House floor that he is going to have to take care of, so Congressman Gingrey, I will recognize you now for any comment you would like to make about Masha and her family, or this issue. Mr. Gingrey. Thank you, Mr. Chairman and Ranking Member Stupak and members of the subcommittee. Thank you for allowing me the opportunity to talk about a remarkable young lady, Masha Allen. Masha is a strong, resilient 13-year-old girl who lives in Georgia�s 11th District, which I am honored to represent. I want you to hear Masha�s story from her in her own words so you can fully grasp what horrors she has lived through, but I guarantee the first thing you will notice, as I did, is her strength of spirit. This little girl was forced to grow up too fast in order for her to process the numerous atrocities that she has experienced. However, Masha�s determined spirit gives her the power to stand up and tell her story, illustrating the fact that she is much more than a victim of child sexual exploitation. Masha is a wonderful, willful girl who has decided to be empowered by her situation, and to do something to deter the disgusting world of Internet child pornography that has grown to be a multi-billion dollar industry. There are many places in this young girl�s story where the system failed to protect her from the monster who adopted her. Even before the horrible sexual exploitation began, it is important to understand how she has come to be before you today. You should ask yourself, as I did, how the regulations that exist in international adoption agencies failed, how follow-up visits or school intervention did not rescue this child much sooner, how our Federal laws have really abandoned this area of child welfare, and most importantly, what is Congress�s responsibility now that we have heard her story? The world of Internet child pornography is vast, it is dark, and it is deep. These possessors of child pornography trade these images like we would trade baseball cards, and the business indeed is booming. With the Federal government stretched thin trying to investigate, prosecute, and convict these numerous and varied possessors of child pornography, advocates are left trying to find new avenues to expose these animals with the goal of deterring future acts of child pornography. This is how the idea of Masha�s Law came to fruition: the need to introduce legislation that updates a 20-year-old civil statute and brings it into the 21st Century. Current civil law allows victims of child sexual exploitation to recover damages of no less than $50,000; however, Federal copyright law provides statutory damages of $150,000 to be awarded to a copyright holder when a song is illegally downloaded from the Internet. There is something wrong with that picture. Masha�s Law allows a civil remedy for the dissemination of child pornography to be equal to other illegal downloads. By increasing the amount of damages a victim is able to recover, the Government can accomplish in civil court what is a lengthy and complex process in criminal, stopping the pictures. Congressman Tierney and I introduced H.R. 4703, Masha�s Law, as a companion to legislation in the Senate spearheaded by Senators Kerry and Isakson, to even out a horrible inequity that currently exists in Federal law. It is one step that can be taken to stem the tide of child pornography; however, I know that it is just one step. As you listen to testimony today, keep in mind the responsibility of the Federal government to protect our children. We need to be proactive. We need to respond to the reality that Internet child pornography is a growing business, one that victimizes our children and leaves them with scars that may never heal. As a physician Member of Congress, it is very important for me to convey to you what a devastating and lasting effect these images have on children. The physical injuries they suffer as a result of child molestation may be more obvious; however, the psychological damages are lengthy and they may not be fully realized until these children are well into adulthood. Child victims struggle with constant feelings of guilt and responsibility for the abuse and betrayal, a sense of powerlessness, and a feeling of worthlessness. In the case of Internet child pornography, these images are permanent proof of their exploitation. Unfortunately, with these images documented in cyberspace, they are irretrievable and can continue to circulate forever, allowing the child to be victimized each and every time the image is downloaded and viewed. The reality of these crimes are horrible; however, I am encouraged when I see victims who have the courage to tell their story. By supplying Americans with the knowledge of these criminals and arming prosecutors with an avenue in civil court to attack their pocketbooks, we can take tremendous strides toward ending the cycle of pornography. As I said earlier, I am proud to be here today with such an amazing and courageous girl who is looking to turn her victimization into an avenue to stop this horrendous criminal behavior. This completes my testimony, Mr. Chairman, and thank you for giving me the opportunity to go out of order. Mr. Whitfield. Thank you, Congressman Gingrey. At this time, I recognize Dr. Burgess for his opening statement. Mr. Burgess. Thank you, Mr. Chairman, and thank you for having this important series of hearings. As a father of three, I cannot comprehend how people can commit these types of crimes against children. And like my colleagues, I continue to be angered and astonished by the cruelty in the stories that we hear. Just last week, I read another story in my hometown newspaper about a local man charged with sexually abusing children and posting their pictures on the Internet. This is happening in our communities, and it must be stopped. For the sake of our children, we cannot afford to ignore the problem any longer. Mr. Chairman, I view these hearings as having two main goals. The first, of course, is to educate Congress and the public, and second, to implement stricter laws for deterrence and retribution. I, for one, have learned a great deal more than I ever wanted to know about this topic; however, it is crucial for the safety of our children for all of us to know about these evils so that we can help end this abusive and dangerous practice. It is through the brave souls of children like Justin Berry and Masha Allen that we know so much about this secretive world. Masha, thank you for appearing before us today. Your courage and your dignity are apparent, and you are, in fact, an inspiration to all of us. I also would like to thank my friend, Dr. Gingrey, for introducing Masha�s Law. When enacted, this law will help to ensure that abused children receive a portion of the justice they deserve. I am a cosponsor of the bill and I encourage my colleagues to also cosponsor this important legislation. As I mentioned before, I feel that the goal of this hearing should be stricter laws regarding this type of abuse. Congressman Gingrey�s legislation is a good start. I am also aware that the Department of Justice has ideas regarding an increase in penalties for Internet service providers not reporting known violations. Just one step, as Dr. Gingrey said. It is my sincere hope that these hearings will be a catalyst for even more legislation named at curbing this problem. Our children are depending upon us to do this. Mr. Chairman, I believe, as we learned in other hearings, we have to hold organizations and Federal agencies like the Department of Justice accountable for enforcing these laws. It does us no good to continue to pass laws if enforcement is nonexistent. Mr. Chairman, thank you again for your continued leadership and dedication to this grave situation. I look forward to working with you and others on the committee as we continue to seek solutions to the most egregious deviation from the norm that I think I have ever seen. I yield back. Mr. Whitfield. Thank you, Dr. Burgess. At this time, I recognize Ms. DeGette for her opening statement. Ms. DeGette. Thank you very much, Mr. Chairman, and I want to add my thanks for this series of important hearings. We are all learning a shocking amount, and I am hoping that instead of just emoting for the next few months, we actually have legislation that actually comes out of these hearings. I want to extend a special welcome to our first witness. Masha, we are really privileged to have you here with us today. You had quite a journey in your life, and I know it has been hard, but we think that there are many, many wonderful things ahead of you and this is just the first one of those many things. You are really brave and you, and also Justin, who testified before, are going to teach us a lot of things that we can help both make laws and enforce laws that will stop this from happening to other children. So you are starting with what I hope will be a lifetime of helping other people. Mr. Chairman, what happened to Masha is one of the worst cases any of us have ever heard about. It really boggles the mind to comprehend how someone as evil as this was allowed to adopt a young girl. I hope that some light will be shed on how this was allowed to happen, and while it is not under this committee�s purview, maybe the hearing will spur some needed changes in the system, the adoption system, to make sure this never happens again. So Chairman, in preparing for this hearing, I learned that the primary investigators on the case tracked down Masha�s adoptive father by using an IP address. They were able to locate his whereabouts by obtaining the IP address, which then led them to his home. Tracing pedophiles and others who produce and distribute child pornography through their IP addresses is an important tool used by law enforcement agencies. In our last hearing, by way of contrast, we heard some testimony from investigators who actually saw a 2-year-old being raped live on the Internet. It was shocking. They were able to trace this to my home State of Colorado. They knew that the perpetrator and the little child were in Colorado, but when they tried to subpoena the IP address, those records had been destroyed by the Internet service provider because ISPs do not keep those records on any kind of consistent basis. After the hearing, Mr. Stupak and I had the idea, maybe we can do some simple legislation, and what that legislation would say is that Internet service providers have to maintain the addresses for a period of 1 year. This created havoc among the IP community, and I am horrified that the provider community is not working with us on this, because it seems to me to be a very simple piece of legislation. I am going to continue to fight for it. I am telling this to all the people sitting out there in the audience. We are not saying that the Internet providers should keep all of the communications. That would be burdensome. All we are saying is that they should have to keep the IP addresses of their subscribers for a period of 1 year. We are also not saying that we want anybody to violate folks� privacy rights. Instead, just like if you were subpoenaing bank records--and Ms. Grace knows about this. She is a former prosecutor and I used to be a public defender in my youth. If the law enforcement investigators had probable cause, they could go and get a warrant. They could serve that warrant, and they could get that information from the Internet provider. That seems to be a very minor burden to ask to be able to find these horrible criminals who are making crimes on the Internet. One last thing I will say that I have been thinking about is use of an Internet service provider is a contractual agreement. I would assume that all of the Internet service providers enter into a contractual agreement with their subscribers that they will not commit crimes over that Internet service. And so therefore, if Internet service providers are obtaining evidence of criminal activity under their contract with their subscribers, they should be able to turn that over to law enforcement authorities. I don�t understand what the big deal is, but I will tell you this, Mr. Chairman. I have heard that our next hearing is supposed to be a hearing when the Internet service providers come in, and I am very much looking forward to asking them these questions. In addition, if we have a telecom bill that comes up on the floor next week or the week after, I do intend to work with Chairman Barton, who has said he wants to work with me, and I know you do, too, Mr. Chairman, to make sure that we craft something that is sensible, that is narrowly drafted, and that protects these kids so that all of the kids, just like Masha, that we can find these criminals and we can bring them to justice. Thank you very much, Mr. Chairman. Mr. Whitfield. Thank you, Ms. DeGette, and we do look forward to the Internet service providers when they come to testify. I know that Ms. Fisher is going to be making some comments, I believe, about a recent meeting that she had with some Internet service providers on this issue. At this time, I recognize the Vice Chairman of this subcommittee, Mr. Walden, for his opening statement. Mr. Walden. Thank you very much, Mr. Chairman. I am actually going to waive my opening statement. I very much appreciate our witnesses today, but I want to reserve the extra 3 minutes I will get for questioning of this panel. So I am going to waive at this time. Mr. Whitfield. Thank you very much. At this time, I recognize Ms. Baldwin for her opening statement. Ms. Baldwin. Thank you, Mr. Chairman. I want to also acknowledge and commend the subcommittee�s work in prior sessions examining the proliferation of child exploitation over the Internet. Sexual exploitation and the assault of minors is simply one of the most heinous crimes that can ever be committed, yet advancements in Internet technology have greatly enabled the production, viewing, and trafficking of images that are the result of such crimes against children. I applaud this subcommittee�s effort to shed light on these abhorrent but burgeoning networks of child predators online, and to educate the public, especially parents, about the dangers such individuals pose to children�s access to the Internet. Having read the New York Times article detailing the harrowing story of Justin Berry and his testimony before the committee several weeks ago, it is clear to me that our Department of Justice has some explaining to do over the way its Child Exploitation and Obscenities Section handles child sexual exploitation over the Internet. Although I am disappointed, as the Chairman is, that Mr. Andrew Osterbein, Chief of CEOS, still will not be testifying today, I hope that Ms. Fisher will be able to offer some insight into the general operations of the Section in handling the referral of online child exploitation cases. In addition, I am pleased that Mr. Roldan has finally agreed to testify before this subcommittee on its second panel today. I hope we will have an informative discussion regarding the operation of Innocent Images, especially the level of resources that this Section has devoted to investigate sexually explicit images of children online. Finally, I also want to acknowledge and thank Masha Allen for her courage and the courage you have exhibited in coming before this committee to testify today regarding your experiences. It is really unimaginable to me to know how the international adoption process, which is aimed at giving children a new start through a nurturing family, would become a tool of child predators. Masha, your story is one of both despair and hope. Our adoption system failed you in ensuring that a healthy, stable home was provided to you, and as a result, you have endured years of inconceivable suffering. But yours is also a story of hope, as law enforcement officers worked to bring you to safety and to provide you an opportunity to live a life free of violence. I admire your courage very much. I hope that the hearings this subcommittee has been conducting will lead directly to a reduction in such violent crimes against children. Whether it is through informing parents of the dangers of online child predators, or a greater oversight of Federal responses to the issue of child exploitation on the Internet, or new legislative proposals that would deter online pedophilia. Again, I thank the subcommittee for holding this important hearing. Mr. Chairman, I yield back my remaining time. Mr. Whitfield. Thank you, Mrs. Baldwin. At this time, I recognize Ms. Blackburn for her opening statement. Mrs. Blackburn. Thank you, Mr. Chairman. I appreciate that. I thank you for holding the hearing, for the time and effort that you have put into it, and the work that the staff continues to do to help us and work with us on this issue. I also want to thank our witnesses. We appreciate your time and the efforts that you put in to preparing your testimony, and being here with us today. Masha, we are especially happy and we are grateful that you would agree to join us and be with us. This subcommittee started with these hearings, just as you have heard other members mention today, with testimony from Justin Berry about the pervasiveness of child predators on the Internet. One of the things that has surprised us, it is like anything else you begin to investigate and you look at it, and you realize as you are peeling back the layers that it is much deeper than you ever imagined it could possibly be. So we know that there is a lot of work to be done on this. Justin described for us how the predators help teenagers set up websites and webcams and how they lure them into the sexual acts for money. He also told the committee that the Department of Justice�s CEOS failed to act on information provided to them. At the risk of his own life, he provided that information of over 1,500 child predators and distributors of child pornography, yet it seems that the Department of Justice is unconcerned about the information or has chosen not to move forward. We are looking forward to getting that answer, because it is troubling when the FBI has used similar information in Operation Falcon and the Regpay investigations that led to hundreds of warrants and arrests and convictions. It is very difficult for us to comprehend why the information from Mr. Berry has not led to similar actions. I would have to say, too, I am also concerned about the funding for the Departments that are investigating child pornography and exploitation. I have yet to hear from the Department about their budget submissions to cover the exponentially increased workload that has come from the investigations. But not all the blame should be put on the Department of Justice. Right now, unfortunately, there are some Members of Congress who would rather see multi-hundred million dollar railroads and multi-million dollar subsidies to corporations that already have $7 billion in revenues, but yet cannot adequately fund the Departments that are trying to save our children from being victims of these crimes. The House has acted to implement a nationwide sex offender registry and enhanced criminal penalties for crimes against children. The bill, the Child Safety Act, was passed by the House this past September, but we have got some members in the Senate that have refused to allow the bill to be considered. These members have put their unpolitical ambitions ahead of the protection and welfare of our children. That needs to stop. I have also had brought to my attention, and I would like to bring to the attention of the committee, a recent investigation by News Channel 5 in Nashville, Tennessee, which is there in my district, and they found a fast-food restaurant franchise all over the country that had been hiring sex offenders to work in the restaurants. This has seriously troubled me because of the actions that we have seen of these despicable people and what they go to to try to get close to the children so that they can proposition the children. This is something we are still working on, Mr. Chairman, and hope to have more information for the committee on that issue at some point soon. We are also looking at the work opportunity tax credit that is there to help in hiring and retraining expellant and wanting to be certain that none of that money is directed towards individuals that would have committed these crimes. Again, to our panel, I thank you. I thank you so much, Mr. Chairman. Thank you, and I yield back. Mr. Whitfield. Thank you, Mrs. Blackburn. At this time, I recognize Mr. Inslee for his opening statement. Mr. Inslee. Thank you. I just hope that the courage of Masha Allen and Justin Berry is matched with appropriations by the U.S. Congress for resources to actually do something about this instead of just talk about it. As a prosecutor, I learned that you could have all the laws on the books and you can have all the fancy library books you wanted in your library of all the great statutes that legislators had passed with great fanfare, but if you didn�t have detectives, if you didn�t have Internet search tools, if you didn�t have prosecutors, if you didn�t have victim advocates to help them through this process, this didn�t get shut down. This is not getting shut down. It is a $20 billion industry, we are told, on the Internet. To put that in context, it is a $3 billion industry for music, just to give a context to how large this is. So while this has exploded exponentially, the United States Congress, the way it is currently formed, has had tiny little dribs and drabs of additional appropriations to get the prosecutors, to get the detectives, to get this job done. There is no secret here. When Justin Berry had the courage to come forward several weeks ago to talk about this, we learned from these detectives that said I got stacks, I got boxes back in my office that we can prosecute tomorrow if we had any resources to investigate them. So you will know whether Masha Allen�s courage is matched by Congress when you see whether or not we do the Federal appropriations to help the FBI and the Justice Department to get to the bottom of this, and whether also we help local communities with their local prosecution, because they are just as important as the Feds are in this. And instead, what this Congress has done is cut funding for local law enforcement in the COPS program and a variety of other places. So I just want to say I just hope that Congress will show respect for Masha�s courage here with appropriations in addition to our verbal thanks for her courage here today. Thank you. Mr. Whitfield. Thank you, Mr. Inslee. The Chairman of the full Energy and Commerce Committee has just come in from a meeting, and at this time I recognize Chairman Barton for any opening statement he may want to make. Chairman Barton. Well, thank you. I am not going to give an opening statement. I do want to appreciate you, Mr. Chairman and Mr. Stupak for continuing to focus on this issue. I want to thank the young lady here who is brave enough to come forward. I want to thank the media representatives who have stood by her and helped to protect her and bring her story to the public. I appreciate what you all are doing. This is an issue that this subcommittee takes absolutely seriously. I have four children and two stepchildren, of which three are still at home, and on a bipartisan basis, we are going to absolutely guarantee that when the hearings get through, if there is legislation that can be passed at the Federal level to help prevent this obscenity, we are going to do it. I will be back to ask my questions, Mr. Chairman. I will come back for the second panel. I want to ask our friends at the Justice Department some questions. But on this panel, I just want to say thank you and we will continue to work together to try to find ways to prevent this problem. Thank you, Mr. Chair. [The prepared statement of Hon. Joe Barton follows:] Prepared Statement of the Hon. Joe Barton, Chairman, Committee on Energy and Commerce Thank you, Mr. Whitfield, for holding this hearing. Today�s hearing marks the third in a series of hearings that this subcommittee has held about the sexual exploitation of children over the Internet. Our previous hearings have revealed a shocking and revolting problem. Unfortunately, with regard to the Justin Berry case, these hearings also have raised serious questions about whether the Justice Department and the Federal Bureau of Investigation are being aggressive enough in pursuing those individuals who seek to abuse and exploit children over the Internet. Today, we are joined by two witnesses who can help explain how the Justice Department and the FBI investigate and prosecute these cases: Alice S. Fisher, Assistant Attorney General for the Criminal Division at Justice, and Raul Roldan, Section Chief of the Cyber Crime Section of the Cyber Division at FBI. I thank you both for taking the time to appear before us this afternoon although I am disappointed that Andrew Oosterbaan, the chief of the Child Exploitation and Obscenity Section at the Justice Department, was not sent to this hearing. The recent arrests of 1,102 sexual offenders as part of the "Operation Falcon II" investigation are an example of the progress that is being made by the Justice Department, FBI, and other law enforcement agencies in the war against the sexual exploitation of children. I would like to take this opportunity to commend your departments for everything they did to make "Operation Falcon II" a success. Bringing these sexual predators to justice will undoubtedly help to make this world a safer place for our children. However, I think one thing this Committee�s investigation has shown us is that there is still much more work to do. Therefore, in addition to learning how effectively these cases are investigated and prosecuted, I hope Ms. Fisher and Mr. Roldan can comment on the role of Internet Service Providers and credit card companies in these investigations. The previous hearings have demonstrated that the war against child pornography is not simply a matter of law enforcement resources. For example, at our last hearing, agents from the state Internet Crimes Against Children task forces explained that some of their investigations have been thwarted because Internet Service Providers did not retain the data that would allow them to identify online child predators. There may be other areas where more should be required of the Internet and financial services industries with respect to retaining data and conducting due diligence of those who use servers and financial networks to distribute child pornography. As the Committee moves forward with this investigation, we are simply trying to better understand the scope of the problem, the adequacy of law enforcement efforts to fight it, and what we should do legislatively to help put an end to this epidemic of abuse. We are also joined today by Masha Allen. After being adopted from a Russian orphanage, Masha was raped and molested by her adoptive father, Matthew Mancuso, who placed images of that abuse on the Internet. Thankfully, Mancuso was prosecuted, convicted, and is now incarcerated. However, hundreds of images of Masha�s abuse are still on the Internet today. For this reason, Masha bravely decided to come forward and tell the public about the abuse she suffered and about the dangers lurking online. I know appearing before us today must not be easy, Masha, but I hope you will take some comfort in knowing that your story might help others. With Masha today is our colleague, Congressman Phil Gingrey of Georgia. Congressman Gingrey has introduced a bill, H.R. 4703, also known as "Masha�s Law," which he will discuss with us today. This bill will increase the civil statutory damages available to victims of online child exploitation to $150,000, the same fine that is imposed on those who illegally download music from the Internet. I thank the Congressman for taking the time to appear before the Committee this afternoon. I look forward to hearing from the witnesses and yield back the balance of my time. Mr. Whitfield. Thank you, Mr. Chairman, and I think that concludes all the opening statements, so we will now get to the testimony, which is where we learn most of the important issues that we need to deal with. You are aware that--I would, first of all, say that on the first panel, obviously, there has been a lot of reference to Masha Allen. Masha is on this first panel. She is 13 years old. She was the young lady who grew up until she was 5 years old in Russia. She was adopted by a gentleman in Pennsylvania and she will be testifying today. In addition, Ms. Nancy Grace, who is with CNN and was a former prosecutor, and has had a lot of experience and interest in this particular subject matter. We welcome her. In addition, although the next three people that I am going to introduce are not going to be giving opening statements, they may be answering some questions. Mr. James Marsh, who is the attorney for Masha, and then Maureen Flatley, who works with Masha and her family and I understand she is an expert on adoption agency practices and other child issues. And then, of course, we are delighted that Masha�s adoptive mother, Faith Allen, is with us today, and we welcome you to the panel as well, Faith. So we take this testimony under oath because it is an investigatory hearing, and I would ask you now, do any of you have any objection to testifying under oath? I would also advise you that under the rules of the House and the rules of the committee, everyone is entitled to legal counsel, and we know that Masha does have legal counsel. I have already introduced him. But the rest of you, do any of you desire to be advised by legal counsel? Okay. All right. In case not, then I would ask all of you to stand and raise your right hand, and I will swear you in. [Witnesses sworn.] Mr. Whitfield. Thank you very much. You are now sworn in, you are under oath, and we will begin the opening statements. Masha, we are going to recognize you first for your 5-minute opening statement, and once again, we genuinely appreciate your willingness to testify before the committee and help bring this issue to the public. STATEMENTS OF MASHA ALLEN, C/O JAMES R. MARSH, ESQ.; AND NANCY GRACE, CNN NANCY GRACE Ms. Allen. Thank you. My name is Masha Allen. I am 13 years old and I live near Atlanta, Georgia, with my mother, Faith Allen. When I was 5 years old, Matthew Mancuso, a Pittsburgh businessman who was a pedophile, adopted me. I was rescued almost three years ago when the FBI raided his home in a child pornography citing. After I was rescued, I learned that during the 5 years I lived with Matthew, he took hundreds of pornographic pictures of me and traded them over the Internet. Thank you for conducting this hearing. Also, thank you for letting me have Nancy Grace here. Nancy is really special to my family and me. She has been an advocate for me and lots of other kids. The Internet is everywhere in my story. You need to do something about it right away. I was born August 25, 1992, in Russia. For the first 3 years of my life, I lived at home with my mother and siblings. My mother was an alcoholic. When I was 3 years old, she tried to kill me. She stabbed me in the neck and I almost died. The Government took me away from her and I went to live in an orphanage near my family�s home in Russia. Living in the orphanage was scary and dangerous. There was constant noise and the older children abused the younger ones. I was afraid all the time. I kept all my belongings under my pillow because I was afraid that they would be stolen. After living in the orphanage for 2 years, I found out that I was going to be adopted. Matthew visited the orphanage a couple of times. He seemed nice. He gave me presents. I asked if he was married and if I would have a mother, but he said no. He adopted me in Russia in July, 1998. After that, we left Russia and traveled to his house outside of Pittsburgh. The abuse started the night I got there. Matthew didn�t have a bedroom for me. He made me sleep in his bedroom from the very beginning. He molested me all the time. He made me dress up in adult clothes and even pretended to marry me. Sometimes he kept me chained in the basement. Because he didn�t want me to grow up, he only let me eat a little bit of food: plain pasta, raw vegetables, no meat. Five years after I went to live with him, I was only gaining a little bit of weight. When I was rescued, I was 10 years old, but I only wore a size 6X. Matthew let me go to school and sometimes play with friends, but he told me if I ever told anyone what was happening, that something bad would happen to me. Even though I was the size of a 5-year-old when I was 10, no one at my school ever said anything to anyone. No one from the adoption agency ever came to check on me to make sure I was okay. I never told anyone about the abuse because I was afraid and I thought that no one cared. A lot of people ask me how anyone could let a pedophile adopt a little girl. I didn�t know very much about my adoption until my lawyer investigated everything. Now, I know there were three adoption agencies involved with my adoption by Matthew. The first was Families Through International Adoption in Indiana. I think Matthew found them on the Internet. He went to an office they had in New Jersey. The State of New Jersey found out that they were operating without a license and closed them down. The same people who worked for that agency just started a new agency in the same office in New Jersey that they called Reaching Out Through International Adoptions. The two agencies are fighting over who was really responsible for Matthew adopting me, but the name of the Families Through International Adoption is on the home study, the immigration paperwork, and the Russian government documents. I think Matthew also paid Families Through International Adoptions. Reaching Out Through International Adoption was really just the same agency, the same people, with different names. A third agency did Matthew�s home study to adopt me. They were in Pittsburgh and were called the Family Health Council, but they just changed their name to Adagio Health. I found out, after I was safe, that none of these agencies asked Matthew any questions. They never really checked him out. They showed him pictures of me, probably on the Internet, before he had a home study to adopt me. In some of the pictures they showed him of me from the orphanage, I was naked. He told them he was divorced and had a daughter that he wasn�t close to. I found out later that the reason his daughter didn�t talk to him was because she was molested, too. While I lived with Matthew, no one from any of the adoption agencies ever came to check on me, though the Russian government requires it. As my story came out, we found out two other kids, a boy from Romania and a girl from Russia were adopted by pedophiles, too. Just so you know, 14 other Russian kids have actually been murdered by their adoptive parents. I am sure there are other kids in trouble, but no one seems to care about any of this. When I told my story in public for the first time, all the adoption agencies, not just Matthew�s, tried to cover up my story. I lived with Matthew for 5 years. The whole time, he starved and molested me. The whole time, he took pictures of me. I didn�t know until later that he was putting my pictures on the Internet to trade, maybe to sell to other pedophiles. I was rescued when the FBI discovered that Matthew had a lot of child pornography on his computer. They came to raid his house; they didn�t know I would be there. When the FBI arrested Matthew, I was taken to the hospital, examined, and then put in foster care. My foster mother was Faith Allen. She understood what I was going through because she was sexually abused when she was little. She was a foster child in Georgia when she was growing up. As soon as I went to live with her, I felt safe. She adopted me on May 14, 2004. Matthew was prosecuted by the U.S. Attorney�s Office in Pittsburgh on September 25, 2003. He was convicted on child pornography charges for all the pictures he had on his computer. He was only sentenced for 15 years in prison for that. I was afraid he would get out of jail too soon. He was convicted again in Pennsylvania State Court on August 23, 2005, of 11 criminal acts for some of the things he did to me. He was sentenced last November to 35 years in prison. I was really upset that he didn�t receiver a harder sentence. I was even more upset that he was sent to a hospital in Massachusetts so he could be rehabilitated. A person like Matthew can never be rehabilitated. Plus, in this hospital prison, he has free healthcare, free mental health services, and can read magazines, play ping-pong, and have hobbies. No one cares about rehabilitating me. I just lost my Medicaid and my mom has to work doubly hard to pay for the things that I need while Matthew lays around in the hospital playing games. I was really mad that Matthew didn�t get a harder sentence and that he went to an easy prison, but I got much more upset when I found out about the pictures of me that he put on the Internet. I had no idea he had done that. When I found out about it, I asked our lawyer to get them back. He told me that we couldn�t do that. I found out that they would be there forever. That is when I got mad and decided to go public with my story. Usually when a kid is hurt, the abuser goes to prison and the abuse is over, but because Matthew put my pictures on the Internet, the abuse is still going on and everyone can see them. People are still downloading them. We get notices from the FBI every time someone is arrested for it. I want every single one of them to go to jail, and they will be punished, but that is a problem too. I found out last summer that if someone downloads a song off the Internet, the penalty is three times worse than if someone downloads child pornography. I couldn�t believe it. How could this be? That is when I decided we had to change the laws about downloading child porn. Senator Kerry and Senator Isakson and Congressman Gingrey and Congressman Tierney introduced bills in Congress that make the penalty the same as downloading songs. That was a few months ago. There hasn�t been a vote on it. I want every single Member of Congress to support these bills and want Congress to pass them right away. There are lots of cases of people downloading our pictures, and I want every single one of them to be punished as much as possible. There might be more pictures of me on the Internet than any other real child. The police told my lawyer that a lot of child pornographers, more than half even, have my pictures on their computers, and there are a lot of other kids like me, too. People who are doing this should be afraid. We know who they are. A lot of people downloading those pictures are professionals. They are doctors and teachers and ministers who would like to put their pictures on the Internet and tell people what they are doing. People stopped downloading songs when they found out they could be sued. We are going to sue these guys too, every single one of them. I want to tell them you aren�t doing this in secret anymore. Everyone can find out who you are. I am really upset about the pictures on the Internet, and I am upset about what Matthew did to me, physically. A lot of people are surprised that I wanted to go public with my story, but I have been on the Internet since I was 5 years old. Going on television shows wasn�t going to hurt me. I did it because I don�t think anyone is doing enough about the things that happened to me and a lot of other kids. Talking to John Quinones and Nancy Grace helped me. They were my champions. I felt in charge of my story because of them. I know they will help me to help other kids like me. People need to know about this stuff. The adults who let this happen have just tried to cover it up. You have to do something about the Internet. Matthew found the adoption agency on the Internet. They let him look at my pictures from Russia on the Internet, even though they didn�t know anything about him. Other kids have been adopted by pedophiles the same way. Matthew put my pictures on the Internet after he got me. People are still downloading them, even though he has been in prison for 2 years. We don�t even know whether he still makes money from them, even though he is in jail. Even now that I am safe, the Internet is still a dangerous place for me to go. The police detective who found Matthew�s home for the FBI said I should never go to chat rooms even for fun things, because they almost always have pedophiles. Ten years ago, I was a scared little girl in a Russian orphanage. For 5 years, I was held hostage by a monster. But in the last 2 years, a lot of amazing things have happened. John Quinones and Nancy listened to me and told my story to the whole world. I called my Congressman, Dr. Gingrey, who didn�t even know me. He introduced a bill in Congress right away to help me and other kids like me. Because of all these things, I believe I can do something for other kids so they don�t have to go through what I did. Some people say we can�t control what is on the Internet, but that is ridiculous. If we can put a man on the moon, we can make the Internet safe for kids. That is just common sense. I am going to work hard to protect other kids and make sure people who hurt them are punished. I hope you will help me. You can start by passing Masha�s Law right away. That would be a good start. Thank you. [The prepared statement of Masha Allen follows:] Prepared Statement of Masha Allen, c/o James R. Marsh, Esq. My name is Masha Allen. I am 13 years old and live near Atlanta, Georgia with my mother, Faith Allen. When I was five years old Matthew Mancuso, a Pittsburgh businessman who was a pedophile, adopted me. I was rescued almost three years ago when the FBI raided his home in a child pornography sting. After I was rescued I learned that during the five years I lived with Matthew he took hundreds of pornographic pictures of me and traded them over the Internet. Thank you for conducting this hearing. Also, thank you for letting me have Nancy Grace here. Nancy is really special to my family and me. She has been an advocate for me and lots of other kids. The Internet is everywhere in my story. You need to do something about it right away. I was born on August 25, 1992 in Novochakhtinsk, Russia. For the first three years of my life I lived at home with my mother and siblings. My mother was an alcoholic. When I was three years old she tried to kill me. She stabbed me in the neck and I almost died. The government took me away from her and I went to live in an orphanage near my family�s home in Russia. Living in the orphanage was scary and dangerous. There was constant noise and the older children abused the younger ones. I was afraid all the time. I kept all of my belongings under my pillow because I was afraid they would be stolen. After living in the orphanage for two years I found out that I was going to be adopted. Matthew visited the orphanage a couple of times. He seemed nice. He gave me presents. I asked him if he was married and if I would have a mother but he said no. He adopted me in Russia in July 1998. After that we left Russia and traveled to his house outside of Pittsburgh. The abuse started the night I got there. Matthew didn�t have a bedroom for me. He made me sleep in his bed from the very beginning. He molested me all the time. He made me dress up in adult�s clothes and even pretended to marry me. Sometimes he kept me chained in the basement. Because he didn�t want me to grow up, he only let me eat a little bit of food -- plain pasta, raw vegetables, no meat. Five years after I went to live with him I had only gained a little bit of weight. When I was rescued I was 10 years old but I only wore a size 6X. Matthew let me go to school and sometimes play with friends. But he told me if I ever told anyone what was happening that something bad would happen to me. Even though I was the size of a five year old when I was ten, no one at my school ever said anything to anyone. No one from the adoption agency ever came to check on me to make sure I was OK. I never told anyone about the abuse because I was afraid and I thought no one cared. A lot of people ask me how any could let a pedophile adopt a little girl. I didn�t know very much about my adoption until my lawyer investigated everything. Now I know there were three adoption agencies involved in my adoption by Matthew. The first was Families Thru International Adoption in Indiana. I think Matthew found them on the Internet. He went to an office they had in New Jersey. The state of New Jersey found out that they were operating without a license and closed them down. The same people who worked for that agency just started a new agency in the same office in New Jersey that they called Reaching Out Thru International Adoption. The two agencies are fighting over who was really responsible for Matthew adopting me. But the name of Families Thru International Adoption is on the home study, the immigration paperwork and the Russian government documents. I think Matthew also paid Families Thru International Adoption. Reaching Out Thru International Adoption was really just the same agency and the same people with a different name. A third agency did Matthew�s home study to adopt me. They were in Pittsburgh and were called the Family Health Council. But they just changed their name too, to Adagio Health. I found out after I was safe that none of these agencies asked Matthew many questions. They never really checked him out. They showed him pictures of me, probably on the Internet, before he had a home study to adopt me. In some of the pictures they showed him of me from the orphanage I was naked. He told them he was divorced and had a daughter that he wasn�t close to. I found out later that the reason his daughter didn�t talk to him is that he molested her too. While I lived with Matthew no one from any of the adoption agencies ever came to check on me even though the Russian government requires it. Since my story came out we found out that two other kids -- a boy from Romania and a girl from Russia -- were adopted by pedophiles too. Just so you�ll know, fourteen other Russian kids have actually been murdered by their adoptive parents in America. I�m sure there are other kids in trouble. But no one seems to care about any of this. When I told my story in public for the first time all the adoption agencies, not just Matthew�s tried to cover up my story. I lived with Matthew for five years. The whole time he starved and molested me. The whole time he took a lot of pictures of me. I didn�t know until later that he was putting my pictures on the Internet to trade and maybe sell to other pedophiles. I was rescued when the FBI discovered that Matthew had a lot of child pornography on his computer. They came to raid his house. They didn�t know I would be there. When the FBI arrested Matthew I was taken to the hospital, examined and then put in foster care. My foster mother was Faith Allen. She understood what I was going through because she was sexually abused when she was little. She was a foster child in Georgia when she was growing up. As soon as I went to live with her I felt safe. She adopted me on May 14, 2004. Matthew was prosecuted by the US Attorney�s office in Pittsburgh and on September 25, 2003 he was convicted on child pornography charges for all the pictures he had on his computer. He was only sentenced to fifteen years in prison for that. I was afraid he would get out of jail too soon. He was convicted again in Pennsylvania state court on August 23, 2005 of eleven criminal acts for some of the things he did to me. He was sentenced last November to 35 years in prison. I was really upset that he didn�t receive a harder sentence. I was even more upset that he was sent to a hospital in Massachusetts so he could be rehabilitated. A person like Matthew can never be rehabilitated. Plus in this hospital prison he has free health care, free mental health services and he can read magazines, play ping-pong and have hobbies. No one cared about rehabilitating me. I just lost my Medicaid and my mom has to work double hard to pay for the things I need while Matthew lays around the hospital playing games. I was really mad that Matthew didn�t get harder sentences and that he went to an easy prison. But I got much more upset when I found out about the pictures of me that he put on the Internet. I had no idea he had done that. When I found out about it I asked our lawyer to get them back. He told me we couldn�t do that. Then I found out that they would be there forever. That�s when I got mad and decided to go public with my story. Usually, when a kid is hurt and the abuser goes to prison, the abuse is over. But because Matthew put my pictures on the Internet the abuse is still going on. Anyone can see them. People are still downloading them -- we get notices from the FBI every time someone is arrested for it. I want every single one of them to go to jail and really be punished. But that�s a problem too. I found out last summer that if someone downloads a song off the Internet the penalty is three times worse than if someone downs child pornography. I couldn�t believe it! How can this be? That�s when I decided that we had to change the laws about downloading child porn. Senator Kerry and Senator Isakson and Congressman Gingery and Congressman Tierney introduced bills in Congress that make the penalty the same as downloading songs. That was a few months ago. There hasn�t been a vote on it. I want every single member of Congress to sponsor these bills and I want the Congress to pass them right away. There are a lot of cases of people who downloaded my pictures and I want every single one of them to be punished as much as possible. There might be more pictures of me on the Internet than any other real child. The police told my lawyer that a lot of child pornographers -- more than half even -- have my picture on their computers. And there are a lot of other kids like me too. The people who are doing this should be afraid. We know who they are. A lot of the people downloading these pictures are professionals. They are doctors and teachers and ministers. We�re going to put THEIR pictures on the Internet and tell people what they are doing. People stopped downloading songs when they found out they could be sued. We�re going to sue these guys too -- every single one we find out about. I want to tell them, "You�re not doing this in secret anymore. Everyone can find out who you are! I�m more upset about the pictures on the Internet than I am about what Matthew did to me physically. A lot of people are surprised that I wanted to go public with my story. But I�ve been on the Internet since I was five years old. Going on a television show wasn�t going to hurt me. I did it because I didn�t think anyone was doing enough about the things that happened to me and to a lot of other kids. Talking to John Quinones and Nancy Grace has helped me. They were my champions. I feel in charge of my story because of them. I know they will help me to help other kids like me. People need to know about this stuff. The adults who let this happen have just tried to cover it up. You have to do something about the Internet. Matthew found the adoption agency on the Internet. They let him look at my pictures from Russia on the Internet even though they didn�t really know anything about him. Other kids have been adopted by pedophiles the same way. Matthew put my pictures on the Internet after he got me. People are still downloading them even though he has been in prison for two years. We don�t even know whether he still makes money for them even though he�s in jail. Even now that I�m safe the Internet is still a dangerous place for me to go. The police detective who found Matthew�s house for the FBI said I should never go to chat rooms even for fun things because they almost always have predators. Ten years ago I was a scared little girl in a Russian orphanage. For five years I was held hostage by a monster. But in the last two years a lot of amazing things have happened. John Quinones and Nancy listened to me and told my story to the whole world. I called my Congressman, Dr. Gingery, who didn�t even know me. He introduced a bill in Congress right away to help me and other kids like me. Because of all these things, I believe I can do something for other kids so they don�t have to go through what I did. Some people say we can�t control what�s on the Internet but that�s ridiculous. If we can put a man on the moon, we can make the Internet safe for kids. That�s just common sense. I�m going to work hard to protect other kids and make sure people who hurt them are punished. I hope you will help me. You can start by passing Masha�s Law right away! That would be a good start! Witness contact information: James Marsh, Esquire Marsh, Menken and Weingarden, PLLC 81 Main Street Suite 305 White Plains, NY 10606 914.686.4456 Mr. Whitfield. Thank you very much, Masha, for your testimony. At this time, I will recognize Ms. Grace for her 5-minute opening statement. Ms. Grace. Thank you. After growing up in a loving home where there was nothing the eye could see except soybean fields and pine trees, I suddenly learned about a whole other world, a world I had never known anything about, after the murder of my college sweetheart just before our wedding, my fianc�. In deep grief, I answered the call not just to be a crime victim, but to fight violent crime. I applied, entered, and graduated from law school and had the opportunity to fight violent crime over 10 years in inner city Atlanta. I learned about a world I never knew existed. I learned there were people who do not follow the rules as we know them. During that time, I often represented the single most innocent segment of America, its children. I learned in court that children speak a language all their own. Prosecutors and social workers are very hard-pressed to understand it sometimes. Once I broke that barrier, I was pained to learn the suffering of our children. No, not children far, far away in some other country, where we can go to bed at night and put our head on the pillow and sleep, and think no, no, not here. Not here in America. They are here in our country, in our States, on this very block. Their suffering knows no barrier, white, black, good students, bad students, the well-to-do, the poor. I can�t begin to tell you what I saw with my own two eyes. How many children ranging from infants to toddlers, elementary schoolers, beaten, raped, used, covered in cigarette burns, sometimes starved, left alone. Child by child, case by case, jury by jury, I tried so hard to make a difference so that one day these children would know when they grow up that someone had fought for them when they were too powerless to struggle. As the years went on, I began to realize that I was simply putting a band-aid on a mortal wound. That while I could detect, apprehend, and punish child predators, I had no way of stopping future predators. What could be done, I wondered, besides taking the individual offender off the street. I didn�t know the answer, so I, like you, just struggled every day and wrestled. My life path landed me at Court TV and CNN�s Headline News, and I have the opportunity to continue this battle in another forum. It is there at Headline News I learned of Masha. When I approached Headline executives, we joined together to tell the world her story. Together, we join forces today to ask you for our voices to be heard. All the statistics that you have heard became real for me when I met this girl, this little girl, a tiny girl with a big, big voice. As you know, her case highlights so many grievous failings of our system, from illegal foreign adoption, what can go so horribly wrong, to undetected full-blown child molestation that went undetected by teachers, friends, neighbors from age 5 to age 10. Most of us have memories of birthday cakes, of Christmas trees, of dinner around the table when your parents come home from work with your brother and your sister. Not her. Her memories are fear and pain and sexual exploitation at the hands of a man we now know to be a virtual clearinghouse for the most horrific child pornography I have ever laid my eyes on. In addition to the outright abuse he heaped on his own child, dozens and dozens, hundreds of photos of this girl will be forever on the Internet. Did you hear her say, I asked my lawyer could he get them back? Nothing she said hurt me so much as that, that innocence of a child believing she could take it all back and it would be okay. Now, technology has made it so easy for these twisted perpetrators to not only fill their appetite for our children, but allow them a window back into the child�s home, every home in America where a child is sleeping, is playing, is setting the dinner table tonight, doing their homework. In addition, the so-called Super Highway is just that. It is just a pit stop for predators to gather, to share stories, share their illegal photos, and pass on tips to each other, and they do, to how better meet, seduce, have sex with, and sometimes kidnap our children. This child, a little girl, has been so very brave. A staggering majority of little children, child molestation victims, never speak out. They never make a peep. Often, they can�t. They go on living their lives in quiet desperation with the albatross hanging around their neck of pain and helplessness like no other. Not only has this child come forward and spoken out, she has made her way here to our Nation�s capital. How many of us dreamed of being here one day to make a difference? As you all know, it is written in the oldest book of all, "A little child shall lead us," and so she has. She has displayed more courage in her short life than many of us will in a lifetime. I am here today before you, humble, on behalf of every child victim I ever knew, every child victim I never met, for those who are too young or weak or innocent or simply afraid to speak out, to ask you, sirs and madams, for your help in passing legislation, forcing it through, that will stop child sex predators. I am so proud to be in this room today that you may often take for granted. My prayer is that you will use your power to protect the weakest among us. Thank you. [The prepared statement of Nancy Grace follows:] Prepared Statement of Nancy Grace, CNN Nancy Grace After growing up in a loving home, where there was nothing but soybean fields and tall pine trees as far as the eye could see, I suddenly learned about a whole other world. Suddenly and without warning, I became a victim of violent crime when my fianc�, my college sweetheart was murdered shortly before our wedding. In deep grief, I answered the call not to simply be a victim of violent crime, but to fight it. In that vein, I applied, entered, and graduated from law school and then, had the opportunity to fight violent crime for over ten years in the courtrooms of inner-city Atlanta. During that time, I learned about a world I had never before known existed. A world where rules, as we know them, do not apply--where those more powerful or cunning prey on others that are weaker or simply more innocent than themselves. During that time, I often represented the single most innocent segment of American life, specifically, children. I learned in court that children speak a language of their own that prosecutors and social workers are hard pressed to understand. Once I broke that barrier, I was pained to learn the suffering of children-- not far, far away in another country so we could say "No, no-never here in America!" and put our head to our pillow at night to sleep easy, but here, in this country, in this region, in this state".on this street. Their suffering knows no barrier, white, black, good students, bad students, the well-to-do, the poor. I can not begin to tell you what I saw with my own two eyes. How many children did I see? Ranging from infants to toddlers to elementary schoolers beaten horribly, raped, used, covered in cigarette burns, sometimes starved, left alone. Child by child, case by case, jury by jury, I tried so very, very hard to make a difference in these particular children�s lives--so that one day they would know when they grew up, that someone had cared, someone had fought for them when they were to young and innocent, too powerless to fight back. As the years went on, I began to realize that I was simply putting a Band-Aid on a mortal wound-- that while I could detect, apprehend, and punish child predators, I had no way of stopping future predators. What could be done, I wondered, besides taking that individual offender off the street after-the-fact? I didn�t know the answer--so I just kept on and on and on. My life-path landed me at Court TV and at CNN�s Headline News, where I have the opportunity to continue my battle in another forum. And it is there, at Headline News, I first learned of Masha. When I told Headline News executives of her story, the call to try and DO SOMETHING was heard. Together, we join forces in asking you for her, for our voices to be heard. The threat of internet child predators is like no other. Some studies put numbers of child internet victims at one in five young internet users. (Youth Internet Safety Survey, 2001). When asked, many of the children stated the solicitation made them feel extremely upset or afraid. Ninety-seven percent of the solicitors were strangers. (Id.) Shockingly, seventy percent of these unwanted solicitations happened when the child was using a computer in their own home. These statistics became real to me the evening I met Masha, a tiny little girl who now, has a big, big voice. As you know, her case highlights so many grievous failings of the legal system, ranging from illegal foreign adoptions and what can go so horribly wrong, to undetected full-blown child molestation that went undetected by teachers, friends, and neighbors from Masha�s age five to age ten. Most of us have memories of birthday cakes, Christmas trees. School bus rides and dinners around the family table each night. Not Masha. Her early childhood memories are those of fear, pain, and sexual exploitation at the hands of a man we now know to be virtual clearing house for internet child pornography. In addition to the outright abuse he heaped on his own adopted child for years, dozens and dozens of photos of her in pornographic poses remain forever in cyberspace, traded like baseball cards amongst child predators. It is horrific. It is wrong. And now, technology has made it so easy for these twisted perpetrators to not only fuel their own sick appetites for our children through internet child pornography, but to allow them a window into every home in America where a child is sleeping, playing, setting the table, doing their homework. In addition, the so-called Super Highway is just that, and serves as a pit stop for predators to gather, share stories, share their illegal photos, and pass on tips to each other as to how better to meet little children, then seduce, and even abduct them. This child, Masha, a little girl for Pete�s sake, has been so very, very brave. A staggering majority of child molestation victims never speak out, never make a peep, and go on living their lives in quiet desperation, never really being free of the albatross hanging around their necks, a hidden pain and feeling of helplessness like no other. Not openly has this child come forward and spoken out, she has made her way here, to our nation�s capital, to ask for you to act. As it was written "a little child shall lead us," and so she has. She has displayed more courage in her short life than many will show in a lifetime. I am here today on behalf of every child victim I ever represented, of every child victim I never met, on behalf of those who are too weak or young or innocent or simply too afraid to speak out, to ask you for your help in passing legislation that will not only crack down upon, but help stop ongoing child sex predators. I am so proud to be here today. My prayer is that you will use your power to protect the weakest among us. Thank you. Mr. Whitfield. Thank you, Ms. Grace. Your testimony was certainly compelling, both of you. You almost don�t know where to really start. When you think about this subject matter, it shows, I think, something systemically wrong with our society because I have been told that in the U.S. this problem is so pervasive that it is just mind-boggling for everyone. We have heard testimony about Masha and what has happened to her, and earlier today I found out that there have been 14 adopted children from Russia that have been murdered by their American adoptive parents. We can�t fathom why adoptions like this have been allowed to happen, why someone like Mancuso would be able to adopt a child from anywhere. So one of the questions that I would like to get into to start off with relates to this adoption issue. It is my understanding, and Mr. Marsh, you may be able to help in this, or Ms. Flatley or maybe Ms. Grace, that the name of the adoption agency was the Families for International Adoption, is that the name of the agency? Ms. Flatley. Families Through International Adoption is the agency of record. Mr. Whitfield. Families Through International Adoption. And Mr. Mancuso initially went to New Jersey, is that correct? Ms. Flatley. An office that they had in Cherry Hill, New Jersey, correct. Mr. Whitfield. And was that a licensed agency in New Jersey? Ms. Flatley. It was not, and the State of New Jersey ultimately suspended their operations. Mr. Whitfield. And when did he actually adopt Masha, was it in 1998? Ms. Flatley. The adoption was finalized, I believe, in July of 1998. Mr. Whitfield. And he went to Russia to pick her up, is that correct? Ms. Flatley. Correct. Mr. Whitfield. Now, Masha, when you first met Mr. Mancuso in Russia, how was it explained to you about who he was or what he was or why he was there? Ms. Allen. I knew that he was going to adopt me because I found out, but they didn�t really tell me a lot about him, so yeah. Mr. Whitfield. So the people at the orphanage in Russia told you that you would be adopted by an American? Ms. Allen. Yes. Mr. Whitfield. And I suppose at that time you were maybe excited about it, because from what you said about the orphanage, that was a rather unpleasant experience also. Is that correct? Ms. Allen. Yes. Mr. Whitfield. And how many times did you meet Mr. Mancuso and spend time with him before you actually went to America with him? Ms. Allen. About two or three times. Mr. Whitfield. Two or three times? Ms. Allen. Yes. Mr. Whitfield. And how long did you stay with him? Ms. Allen. He came like for the day to visit for a couple hours sometimes. Mr. Whitfield. How did you feel about it? Did you want to go to America? Did you feel like that was in your best interest at that time? Ms. Allen. Well, he seemed nice. He would bring me gifts. Mr. Whitfield. And you knew that he was not married, correct? Ms. Allen. Yeah, he told me he wasn�t. Mr. Whitfield. I guess that was maybe disappointing for you, but at the same time, it was an opportunity for maybe a new life for you. Would that be accurate? Ms. Allen. Yeah. Mr. Whitfield. Now, when you arrived at Mr. Mancuso�s home, it is my understanding that there was only one bedroom. Is that right? Ms. Allen. Yeah, he only had one bedroom. Mr. Whitfield. And that is when he told you that you would actually be sleeping with him? Ms. Allen. Yeah, he told me that because we got in late, and so we just went to bed like first thing. Mr. Whitfield. And what did you think about that? Ms. Allen. I didn�t-- Mr. Whitfield. Of course, you were very young at the time, weren�t you? Ms. Allen. Yeah. Mr. Whitfield. How old were you? Ms. Allen. I was 5. At first I thought it might be normal, because you know how some little kids sleep with their parents, but then after the first night I figured out that there was something wrong because he tried to touch me or something. Mr. Whitfield. Now, I know this has been difficult for you, but you did testify also that he actually kept you chained in the basement or in a room or where? Ms. Allen. In the basement. Mr. Whitfield. How frequently were you chained in the basement? Ms. Allen. Maybe like once a month or something. Mr. Whitfield. For how long? Ms. Allen. A couple hours, or sometimes he would leave me down there for a while. Mr. Whitfield. Now, why would he do that? Ms. Allen. I don�t know. Mr. Whitfield. He would just take you downstairs and chain you? Ms. Allen. Yeah, he would take my pictures and-- Mr. Whitfield. Were you nude? Ms. Allen. Yes, I was. Mr. Whitfield. And did he have you chained to a bed or to a post or-- Ms. Allen. Yeah, it was a post. There were two of them. Mr. Whitfield. Two posts? Ms. Allen. Yes. Mr. Whitfield. Your hands would be chained, or your legs? Ms. Allen. Both. Mr. Whitfield. Both? Ms. Allen. Yes. Mr. Whitfield. That went on for the entire period of time that you lived with him? Ms. Allen. Yes. Mr. Whitfield. And did he ever tell you what he was going to do with those pictures? Ms. Allen. No, he just said he was keeping them. I don�t know. Mr. Whitfield. So you had no idea that he was trading them over the Internet-- Ms. Allen. No. Mr. Whitfield. --all around the world? Ms. Allen. At the time, I didn�t think that that was possible. I didn�t know. Mr. Whitfield. Was there ever a time that you were scared of him, that he might injure you physically or try to harm you? Ms. Allen. I was always scared of him, but I don�t really think that he--like he never hit me a lot or anything, but I was always scared of him. Mr. Whitfield. Now, he did tell you frequently that if you told anyone that you might be harmed. Is that correct? Ms. Allen. Yes. Mr. Whitfield. Did you ever think about telling someone else? I often wonder when a child is experiencing the type of things that you are experiencing, and we talked to Justin Berry about this as well. Can you explain to us how you felt and why you didn�t tell anybody? Ms. Allen. I was afraid because I thought he would do something to me, and I didn�t know what would happen. At school, they would never talk about any of this kind of stuff, so I was really confused, too. Mr. Whitfield. Yes, yes. Mr. Marsh or Ms. Flatley, how is it that an adoption agency--do you have any idea how much money Mr. Mancuso paid this adoption agency? Ms. Flatley. We are informed by a reliable source that it was probably in the neighborhood of about $15,000, which is actually somewhat less than we might have expected. Mr. Whitfield. And from the facts of this case and from the information that you have seen on applications or whatever, is there any reason that you can fathom why an adoption agency would approve a gentleman like Mancuso to adopt any child? Ms. Flatley. I think the question, Mr. Chairman, is more does an adoption agency like this ever decline to place a child with anyone. The adoption, as we have discussed, was exceptionally unregulated. In fact, I wanted to share with Mr. Walden as an aside that the two other children that we know of who were adopted by pedophiles were adopted in Salem County, Oregon. The perpetrators were prosecuted by the same State prosecutor, who did a wonderful job, by the way. So one of the underlying issues here, and the thing that I think was of greatest concern to us is that when we began to investigate the circumstances around Masha�s adoption, and we certainly believe that the adoption agencies in this case might have been manipulated by him, although it turns out not to have been the case, that they have characterized on national television that the process that went on in Masha�s adoption was actually typical. Mr. Whitfield. Typical? Ms. Flatley. It begs the question in our minds how many other Masha�s are there out there. The fact is, no one knows. But the fact is, we are quite certain that there are. Mr. Marsh. We also, in looking into this, Mr. Chairman, believe that the fragmentation in the adoption system worked to Mr. Mancuso�s advantage. He was dealing with a well-regarded agency in Pittsburgh to do the home study. He was dealing with another agency headquartered out of State to do the adoption. That agency was dealing with a facilitator in Russia to actually find the child. The facilitator was dealing with a different set of orphanages in Russia to identify and procure the child. So based on the fragmentation in the system, he was able to basically pick and choose the avenue by which he wanted to adopt and I think this is definitely a factor that helped facilitate. Mr. Whitfield. Did you say a well-respected agency in Pittsburgh did the home study? Mr. Marsh. We initially thought that it would be an independent social worker or someone very new that had signed off on the home study, which really reads like a public relations document. In fact, I wish we had a copy here today because it is laughable. On the last page of the document, the writer refers to Mr. Mancuso as being a highly moral individual and an outstanding citizen. I am not mincing words here. It says that, ironically and unbelievably. So we believe that it would be a rookie social worker doing the report that he could have conceivably paid off, and in fact, it was a well-respected agency that-- Ms. Flatley. And Mr. Whitfield, if I may add, we also believe that one of the reasons this happened so readily is the U.S. State Department has effectively become a lobbying arm for the adoption industry. We were quite disturbed to learn from the Salem County, Oregon prosecutor�s office who prosecuted the two other pedophiles who adopted children, one from Romania and one from Russia, that the U.S. State Department, this past fall, attempted to coerce him into deleting any references to adoption from his press releases, and in fact, furnished him by e-mail with a draft press release to substitute for the press release that he had written. Now, it should be noted that he really didn�t get the adoption connection at the time. It appeared a coincidence to him. But to the extent that you and we have been hampered in our efforts to institute greater and more effective regulation of adoption, it is in large part because, in fact, the U.S. government has conspired with the system to remain unregulated. Mr. Whitfield. So in that instance, it sounds like the State Department was doing a cover-up as well as the adoption agency wanted to cover up. Ms. Flatley. Exactly. When Masha�s story went public on ABC News Primetime Live in December, 3 weeks before Primetime�s story aired, when the adoption agencies--not just the ones involved, I should say, but all of the adoption agencies involved in international adoption, discovered that Primetime was doing a story on this, they inundated ABC News with over 3,000 e-mails attempting to coerce them into canceling the story and/or censoring the story. So to the extent that we have a culture here in this industry that is not about the children, we have a more serious problem and the problem you see in front of you today. Mr. Walden. Mr. Chairman, just a point of order. Just for the record, it is actually Marion County. It is the City of Salem, but I know we may want to follow up just for our record, but I appreciate the reference. Ms. Flatley. Very good, thank you. Mr. Whitfield. At this time, I would recognize Mr. Stupak. We have, unfortunately, 7 minutes to cast a vote, five votes. So we are going to recess and we will be back at 5:00. I apologize once again, and Mr. Stupak will be recognized. Mr. Stupak. Before we leave, Mr. Marsh, can you give us that document that you testified to where they described Mr. Mancuso-- Mr. Marsh. Yes, we can. Mr. Stupak. --so we can have it for the record to complete your testimony. Mr. Marsh. Absolutely. Mr. Stupak. Thank you. [Recess.] Mr. Whitfield. I apologize. You have been very patient and at this time, I am going to recognize Mr. Stupak for his line of questioning, then I understand that some people on the first panel, Ms. Grace in particular, have some time deadlines, so I recognize Mr. Stupak. Mr. Stupak. Well, thank you. Let me thank all the witnesses for their testimony, especially Masha, for your testimony. I think we should also acknowledge your mother, Faith Allen, who is here with you, for her very important role that she plays in your life. Let me ask you, Masha, if I may, one question. What is most important to you, and from your testimony, I think I can understand it, but I would like you to explain it. Is it getting your images off the Internet, is that the most important thing to you? Ms. Allen. Yeah, it is very important for me, but I understand that it is very unlikely that they all will be taken off. The thing that is most important to me right now is trying to help other people and trying to get everyone aware of the topic. Mr. Stupak. Okay. Mr. Marsh, you are Masha�s attorney, and I know you are contemplating a civil litigation against a number of parties involved in the actual adoption. We have a book here, it is titled "Beyond Tolerance: Child Pornography on the Internet" by Philip Jenkins, in which he describes the great difficulty in removing these images from the Internet. There are literally thousands of collectors all over the world who have thousands of images, some of them decades old. In fact, they call them the classic collections, if I am correct. These people are technologically very sophisticated and a click of the button can give them a new location and a new life. So what can we in Congress and law enforcement do to help remove these images? Mr. Marsh. That is a very good question, Congressman. The first thought that I had when Masha asked me that question last summer as to whether or not we could remove her pictures from the Internet was in the nature of copyright law, whether or not we could gain any sort of legal control over them so that we would have at least a remedy or a cause of action or some way to assert a legal claim over the images themselves. I was quite frankly-- Mr. Stupak. Would you have to cert that through the victim? Mr. Marsh. Excuse me? Mr. Stupak. The copyright. Mr. Marsh. We were actually quite surprised to find that that provision was already provided for in the criminal code-- Mr. Stupak. Sure. Mr. Marsh. --and it involved what is the precursor to Masha�s Law and had been on the book for 20 years. I was, quite frankly, very shocked to find that our current code provides for civil remedies for a violation of the criminal possession, distribution, and creation provisions. Not surprisingly, I guess, was that law had never been used in 20 years. There were no reported decisions, and at the time we were developing a strategy to deal with this, there did come a decision from the Eastern District of Virginia which dealt with this law. It was the first reported case, and that is when we contacted our friends on the Hill about enhancing this. Mr. Stupak. Sure. Mr. Marsh. And giving the victims an actual cause of action so that they can go in and assert a legal claim over these images. Mr. Stupak. So I take it that Virginia court then upheld the cause of action? Mr. Marsh. The Virginia court did uphold the cause of action. Mr. Stupak. For civil-- Mr. Marsh. For the civil-- Mr. Stupak. --remedies? Mr. Marsh. --remedies, but it pointed out that due to a quirk in the law, the law--and your question is very relevant here-- the law as written only allows a victim to file a claim when they are age 18 or younger. Mr. Stupak. Right. Mr. Marsh. So once the victim hits age 19, they lose the cause of action. It was just based on inartful drafting. Mr. Stupak. But no matter when images may have been taken-- Mr. Marsh. Exactly. Mr. Stupak. They may have been 12 years old at the time. Mr. Marsh. So part of what we are doing with Masha�s Law is we are removing that limitation. In terms of the-- Mr. Stupak. But if you file a claim--you are under 18, let us say you have filed a claim that probably hasn�t been litigated, and then as we talked about the classic collectors may produce these images years later, would you be able to come back and bring a claim? Mr. Marsh. That is what Masha�s Law allows us to do. It basically eliminates the cap of age 18, so if you discover that somebody has downloaded the images when you are 20 or 30 or 40, you still have the cause of action to pursue them. Mr. Stupak. So caps lifted, how about statute of limitations? Mr. Marsh. The statute of limitations, because of the way the law is structured, you can get current downloaders-- Mr. Stupak. Correct, okay. Mr. Marsh. We are actually receiving now notices through the victims of crime-- Mr. Stupak. So every download or every transmission of the image should be a new cause of action? Mr. Marsh. That is correct, and that is how it is worded, and that is what the criminal law recognizes. In terms of the international reach of the problem, I was, quite frankly, shocked by a recent report by the International--it is basically the equivalent of the National Center for Missing and Exploited Children-- Mr. Stupak. Right. Mr. Marsh. Ninety-four countries have no laws regarding child pornography at all. Mr. Stupak. But still underneath this civil remedy, if you will, that may be available, you still almost have to go at it each image at a time. Mr. Marsh. Absolutely, and that is what we are doing and that is being facilitated for us by the Victims of Crime Act which Congress passed 2 years ago. We are now receiving notices from the FBI and from the U.S. Attorney�s Office regarding every prosecution and every investigation involving Masha�s pictures. So this really allows us, instead of being a needle in a haystack, where do you start, how do you find these guys, how do you find the perpetrators? We are actually, under the Victims of Crime Act, receiving notices of individual cases, and we are receiving dozens of those at a time of individuals who have pled guilty or been convicted criminally of this crime today, and then we can pursue civil remedies against each one of them. Mr. Stupak. Let me ask you this. Going back to Mr. Jenkins� book, he states on page 215, let me just read this here. "In spite of all the enforcement efforts of recent years, it is still remarkably easy for any reasonably discreet person to pursue this highly illegal conduct indefinitely, as long as obvious traps are avoided. Law enforcement agencies and their political masters have just had a very poor idea of the organization and the mechanisms of child porn subculture, and above all, of its critical institutions, such as news groups and bulletin boards. Do you agree with that? Mr. Marsh. Absolutely I agree with that. Mr. Stupak. Is it because of lack of resources, technical know-how? Mr. Marsh. I was surprised, Congressman, and we are always on the lookout technologically for Masha�s pictures, different means of transmission, how are these pictures being distributed. I was actually surprised that something called the UseNet--I don�t know if you know what the UseNet is. I used it 15 years ago prior to the Internet. The UseNet is still out there and being used to transmit binary pictures of child pornography. Certainly, some of the earliest FBI stings involved the UseNet. I thought it had gone from the face of the Earth, but it is actively in place out there. What we are also seeing is that pedophile networks are using a Napster-like technology to create basically parallel Internets that only they have access to that are widely distributed, widely diffuse. There is no central server, and images and access to that basically underground Internet are strictly controlled by masterminds in the business of child pornography. Mr. Stupak. I was going to ask you this question, but let me go to Ms. Grace, if I may. As you know, it is a crime for anyone other than law enforcement agencies to possess images of child sexual exploitation, so not even news gathering organizations can view it. So the entire field of knowledge, if you will, or knowing how horrible this really is and how effectively or ineffectively the laws are being enforced are really hidden. Do you think there is a need to have some broader public knowledge of exactly what is going on than there currently is? Ms. Grace. Certainly, a broader public knowledge of what is going on, but absolutely under no condition further dissemination of child pornography and some misled attempt to inform the public. And as to the earlier question is how do you get these off the Internet? There is no way. They are just like roaches, you can�t stop them. But the ones that you can apprehend, they you can stop. And I feel that just like the orphanage that sent her here, the adoption agency that mishandled it to another one that did a fake home study, they go off one title and spring up under another name. If they could just be stopped, just like these-- Mr. Stupak. Sure. Ms. Grace. Yes. Mr. Stupak. Ms. Flatley, you were indicating a little bit about --and I would like to hear your views a little bit more on this adoption, because the way Masha has described the problems with the due diligence done by the U.S. adoption agencies that facilitated her adoption from a Russian orphanage, and by the agency that did the home study, it is our understanding that although Mr. Mancuso had a large house, he had no bedroom set up for Masha? Ms. Flatley. Correct. Mr. Stupak. One would assume that when you are doing an adoption home or foster home study, almost the first thing you do would just look to see if the person is going to have their own room , a place to sleep-- Ms. Flatley. Exactly. Mr. Stupak. That the basic steps, it seems like even if they were initially taken, there was no follow-up. I find it sort of outrageous, you take a look at it, even the Humane Society does follow-up on placement of dogs and cats and things like that, but we don�t do it for children? Ms. Flatley. The standards are quite a bit lower for home studies for foreign adoptions than they are, for instance, for adoptions from foster care. So one of the first exercises that we went through when we obtained Mancuso�s home study, which we did with some difficulty, was to compare his home study done in Pennsylvania to the one that was done when Faith readopted Masha, and they are like night and day. They have had to submit to all kinds of invasive tests, there were home visits and so forth. I think the thing that we found the most troubling about this home study is that it is not clear from the language of the home study that they ever visited Mancuso�s house even once. Mr. Stupak. After the adoption? Ms. Flatley. Before the adoption. But there is a very vivid description in the home study, which I believe we are having faxed to the committee right now-- Mr. Stupak. Okay. Ms. Flatley. --that there was no room set up for the child, that there was an extra room, but it was a mix and match of furniture. Let us say for the sake of discussion that they might have tried to play that off by saying well, he hadn�t gotten the child yet and so therefore he wasn�t ready. Any reasonable person might suggest that you would go back to make sure that he had, especially because he was a single father. Mr. Stupak. Well, international adoptions by U.S. child welfare agencies, are there any legal oversights? Ms. Flatley. There is not only no real oversight, this has been a conspicuous exception to what is in every other respect in this country a broad regulatory framework at the Federal and the State level. The argument is often made by the industry to foreclose more regulation, but adoption is a State law issue and we can�t tell the States what to do. That will come as quite a shock to the States in a number of other important areas. More importantly, they extend that argument by saying in the case of foreign adoption that we simply can�t dictate to the foreign governments about what should happen. But that is in two important ways. One is that the Russian government requires post-placement supervision, which almost never happens, or at least doesn�t happen enough, but the other issue is that we have had a number of foreign countries who have closed down international adoption to the United States because we apparently suspend American child welfare law when these children enter the country. So we have some real serious issues in terms of the regulatory framework. Mr. Stupak. Well, when these children enter the country, do they come in as U.S. citizens then if the adoption is-- Ms. Flatley. They do and they don�t. There has been a change recently that Congress passed a couple of years ago, the Child Citizenship Act, which now facilitates citizenship for kids when they are adopted abroad before they enter the United States as if they were born to their families, but that was probably not in effect when Masha was adopted. But more importantly, so what? What difference does it make, if they are here as illegal aliens or they are adopted by American families or if they are here to visit people, the child welfare system in this country would shut down if we said that families who had children had any kind of right to privacy when there was an issue of the best interest of the child. And so the agency-- and I have interviewed the agency at some length about why there wasn�t supervision, and they argued to me that, well, Mancuso didn�t want to cooperate with the Russian standards. Well, I believe the Russian standards are the standards we should have, and in fact, that the Russian standards for post-placement supervision are not only quite a bit stronger than ours, we don�t have any that are standard. The other issue is that adoption is largely inherently interstate commerce. Every single international adoption is--I believe that the Energy and Commerce Committee should have jurisdiction over this issue. I have said that for years. But ultimately, if we are allowing children to enter this country with people that we have not done adequate due diligence on, and then on top of it we are going to argue that we have no moral or legal authority to check on those children once they get here, we are out of our minds. Mr. Stupak. Well, I believe the chairman and everyone on this committee would agree that the Energy and Commerce Committee certainly has jurisdiction over this. This subcommittee though, Oversight and Investigations, we do not write legislation. We can only make recommendations, but we are very interested and we will make sure we get those recommendations to the proper people. Ms. Flatley. Thank you very much. Mr. Stupak. Thank you. Thank you all. Mr. Whitfield. Thank you, Mr. Stupak. Mr. Walden is going to be recognized next, but I understand, Ms. Grace, that you have another commitment and we need to dismiss you. But before you go, Mr. Walden, do you have a specific question for her? Mr. Walden. I just have one quick question for Ms. Grace, and first of all, I appreciate all the work you have done in this area, both as, I guess, a prosecutor, but also on the air, I think you have gotten the message out to Americans on the kind of problem that we have uncovered here and that you have continued to do work on. I guess this morning you were on Good Morning America and had some ideas about how we might be able to combat the proliferation of-- Ms. Grace. Yes, I did. Mr. Walden. Can you share those ideas? Ms. Grace. Yes, and I consider them to be more innovative than simply increasing the time that felons would do behind bars, which I coincidentally am all for. First of all, I feel that parents don�t know what their children are doing online. It is very obvious. I mean, if you look at Columbine, they were cooking up bombs in the garage and they didn�t know that, much less where they go online. I think that it would be a fantastic idea, and so easily done, just as you get a readout of what calls you have made on your cell phone every month to pay another dollar to AOL and they could for $6 a month to get a readout of where your computer has gone. Also, when you buy a beer, not that any of you esteemed drink or imbibe, but when other people buy a beer, look at it. There is a warning there, and I don�t understand why on laptops and desktops all over the country there is not a warning for adults to see. Also, I don�t know how many of you have a TiVo, but to get into the thing, you have to go through a tutorial. And I don�t understand why every time you buy a computer, a new computer, which can be controlled through interstate commerce, there is not a warning. They are on microwaves, they are on beer bottles, they are on cigarettes, and none as to the dangers of the Internet. We do public warnings all the time. I have a very extensive list of ideas which I will be happy to submit to the committee. Mr. Walden. Thank you. That would be most helpful. I appreciate it. I realize you do have to leave. I have got questions for the other panelists. Ms. Grace. Yes, sir. Mr. Walden. Thanks again for your good work. Ms. Grace. And again, thank you for having me. Mr. Whitfield. Chairman Barton, Ms. Grace is going to be dismissed. She has-- Chairman Barton. I don�t have any questions for this panel, Mr. Chairman. Mr. Whitfield. Ms. Grace, thank you very much for being with us, and thank you for the leadership that you are providing on this issue. Ms. Grace. We are focusing on you. This committee is so kind to hear us tonight on our live show and taking calls from America, so I hope you listen. Mr. Whitfield. Okay. Ms. Grace. Thank you. Mr. Whitfield. Thank you. Mr. Walden, you want to continue? Mr. Walden. Yes, thank you, Mr. Chairman. Ms. Flatley, if I might ask you just a follow-up question. I may have missed this in the intervening period. What has become of the agency in Pennsylvania that did the home study review that said that her adoptive father was this marvelous moral character? Ms. Flatley. As is the case with the other two social service agencies involved in this, they continued to operate and thrive. I believe, although I am not positive, that the agency in Pennsylvania may receive actually some Federal funding because they do quite a bit of family planning. They are all in business. They are all considered leaders-- Mr. Walden. Did they suffer any penalty? Ms. Flatley. Absolutely none. This is the first public discussion. Today is the first day that their identities have been revealed publicly. Mr. Walden. What is the name of the agency that did the reviews? Ms. Flatley. The agency in Pittsburgh was called the Family Health Council at the time that the home study was done. They recently changed their name to Adagio Healthcare. They are based in Pittsburgh. Mr. Walden. Mr. Marsh, are you Masha�s legal counsel? Mr. Marsh. Yes, I am. Mr. Walden. Is there not some grounds here for litigation? Mr. Marsh. There are plenty of grounds, and to be quite frank with you, we have been so busy in the 6 months since I met Masha trying to figure out exactly what happened, who were the players, how it happened, we have a fraction of the documentation that we believe is out there. Because of the confidentiality concerns, we are only able to get it through a third party, not through the agencies themselves. Despite waivers and requests and letters, they are hiding behind Mr. Mancuso�s right to privacy and refusing to release those documents to us so we can gain a fuller understanding of exactly why this happened. We know why it happened, excuse me, we don�t know exactly how it happened and we are going to get to the bottom. Mr. Walden. Mr. Chairman, that almost sounds like something we ought to be looking at and perhaps use our subpoena power to get there. Ms. Flatley. Well, if I may add that, when James and I because involved in this case, we had a sense of what had happened, but even we, I don�t think, under any circumstances anticipated the alacrity with which this adoption took place. And we have reached out to all the social service agencies involved because we initially believed that they, in fact, had been somehow manipulated and would want to join with us in helping to close these loopholes and do a better job. As I said before, not only did they argue that this adoption was routine and this is how they always did business, but in fact, when we began a discussion with them to obtain voluntarily from them a copy of Masha�s home study, they asserted that Mancuso had a right to privacy and they could not disclose it. We ended up getting it from another source in November, but to your point, I think that what has been the most troubling about this is that the more we have investigated it, the more we realize we needed to know, so in fact, this case is much more complicated than we originally thought it would be. Mr. Walden. And I appreciate the work you are doing, and just for the record, I am a big fan of adoption. My two brothers are adopted, my niece is adopted. Ms. Flatley. Adoption is what saved this child, and I just want to say that at many points in this discussion, James and I and Masha and Faith have been accused of trying to somehow undermine adoption, stop adoption, being anti-adoption. Nothing could be further from the truth. Let it be clear that adoption saved this child�s life. Faith adopted her. Mr. Walden. No, I-- Ms. Flatley. And that Masha felt so strongly about the power of adoption in her own life that she actually wrote a letter to President Putin which was hand-delivered to him several months ago. So I think we all want to say very clearly that the only good adoption is a safe adoption-- Mr. Walden. Right. Ms. Flatley. --and it makes it safer for all consumers of adoption services to regulate adoption effectively and consistently. Mr. Walden. Masha, if I could, first of all, thank you for speaking out. I can�t begin to imagine the pain and suffering and sorrow you have gone through, but what you are doing today obviously will have enormous benefit for others. When Justin Berry was in that very seat not long ago, testifying about the problems he encounters on the Internet and all, I asked him a similar question, one I want to ask you. As a child, what advice do you have for parents and adults and for other children who might be in your situation, who might be watching this sometime and say I know somebody who may be in this situation. How could your friends have helped? What should we be looking for? What would you tell other kids who might find themselves in a situation similar to that which you were in? Ms. Allen. I would just say that even if you are threatened, you should speak out because that is the only way that it is going to stop. Mr. Walden. Who do you speak out to, your teacher, your pastor, your-- Ms. Allen. Whoever you trust more, because it is easier to talk to someone you trust. Mr. Walden. Right. Ms. Allen. And I think parents should be watching out for their kids, too, like and doctors should be checking to see if the kids have any problems or eating disorders or anything like that. Mr. Walden. Did you get any medical treatment in those years when you were-- Ms. Allen. Yes, I did. Mr. Walden. And the medical providers didn�t question your health status? Ms. Allen. No. Mr. Marsh. She did receive, if not routine, sporadic healthcare. We did get a copy of her medical records, and ironically, in the context of all of this, we got the school records. It is obvious to me that Mancuso was a very savvy operator. His initial contact with the school was with the school nurse, who he immediately befriended, knowing that as a medical professional on site she would be a natural conduit for any sort of abnormalities or information. Although it is hard to believe that the growth charts that are in the school records show Masha at the 10th percentile in terms of weight, and she was quite a bit taller, so that even suppressed her more, because her height was normal but her weight was severely underweight. So consistently throughout her school record, we have--and we have a doctor here--a growth chart which indicates a child year after year after year, growing-- Mr. Walden. Did they never ask? Mr. Marsh. They never asked, according to Masha. No one ever asked anything about her. Nobody ever asked anything about her time in Russia, why she came to America. It was as if the person is in front of your house screaming rape and no one is hearing, seeing, or realizing what is going on right under their nose. And so for us, at least, the growth charts were a chilling indication that something was very wrong with this child and someone should at least have made an inquiry about her health status, given that she was so underweight. Ms. Flatley. If I could just add, I mean, having interviewed a lot of people that were involved in life, what is shocking to me as a parent myself-- Mr. Walden. Nobody noticed. Ms. Flatley. --is that her teachers never said anything, despite the fact that she looked emaciated. The pictures of Masha when she was rescued, she literally looks like a concentration camp survivor. The social service agencies involved, there were three, none of them checked on this child. The neighbors never said a word, obviously. It is somewhat mystifying to me that her physician did not somehow want to explore even perhaps a neglect allegation because she wasn�t growing. So it is one of the issues in Masha�s case that is particularly troubling is that this child was failed by literally everyone that could have protected her. Mr. Walden. Well, Masha, thank you, and thanks to all of you on our panel, and to my colleague for the work that you are doing to bring light to this problem. Hopefully we can bring a little legislation to this problem, get a handle on it. So thank you, and thank you, Mr. Chairman. Mr. Whitfield. Thank you, Mr. Walden. Mr. Chairman, Chairman Barton, do you have any questions for this panel? Chairman Barton. Not for this panel. I am here to support this panel, and I have questions for the second panel. Mr. Whitfield. Thank you. Well, I want to thank those of you on the first panel. Masha, we once again appreciate very much your coming forward. You have been immensely helpful. Mr. Marsh, Ms. Flatley, we will continue to stay in touch with you. Ms. Allen, best wishes to you, and Congressman Gingrey, thank you very much for being with us today, and for your legislation as well. This panel is dismissed. Mr. Marsh. Thank you, Mr. Chairman. Mr. Whitfield. At this time, we will call the second panel. First, we have the Honorable Alice Fisher, who is Assistant Attorney General for the Criminal Division, U.S. Department of Justice, Washington, D.C.; and Mr. Raul Roldan, who is the Section Chief for the Cyber Crimes Section of the Cyber Division, FBI, U.S. Department of Justice. And we have Mr. Arnold Bell, who is the Unit Chief, Innocent Images Unit, FBI, U.S. Department of Justice. They are also joined by Mr. Swecker from the FBI. As you all--I want to apologize to this panel as well. I know when you arrived at 2:00 you thought you would probably be home by 6:00, but we had a lot of interruptions, and thank you for your patience. We appreciate your being here. You are aware that the committee is holding an investigative hearing, and when doing so, we have the practice of taking testimony under oath. Do any of you have any objection to testifying under oath? And of course, under the rules of the House and rules of the committee, you are entitled to be advised by counsel. Probably all of you are lawyers, so I am assuming you don�t need to be advised by counsel. So if you would please stand and raise your right hand, I would like to swear you in. [Witnesses sworn.] Mr. Whitfield. Thank you. You are now under oath. Ms. Fisher, you may give your 5-minute opening statement. STATEMENTS OF ALICE S. FISHER, ASSISTANT ATTORNEY GENERAL, CRIMINAL DIVISION, UNITED STATES DEPARTMENT OF JUSTICE; AND RAUL ROLDAN, SECTION CHIEF, CYBER CRIME SECTION OF THE CYBER DIVISION, FEDERAL BUREAU OF INVESTIGATION, UNITED STATES DEPARTMENT OF JUSTICE Ms. Fisher. Thank you, Mr. Chairman, Ranking Member Stupak, Chairman Barton, and other distinguished members of this committee. Thank you for inviting me here to testify before you today about the Department of Justice�s efforts to protect children from sexual exploitation on the Internet, and thank you for having these hearings that shine light on this horrific growing problem. The anonymity of the Internet has provided opportunities for criminals who prey upon our children. Our children face a threat from molesters who troll the Internet, looking for young victims so they can lure and molest. Other criminal elements sponsor sex tourism aimed at children and facilitated by the Internet, but the most pervasive crime against children perpetrated on the Internet is child pornography. The mere thought, yet alone depictions, of children, some still in their infancy, being subjected to such degrading treatment turns the stomach and boggles the mind. Despicable, unconscionable, intolerable, sickening. These are words you have used over the past weeks describing this problem, and I could not agree with you more. In my role at the Department of Justice and as a mother of two boys, 4 and 8, I would like to see all child predators put behind bars. I am committed to doing what we can for this problem. You have heard testimony about the scope of the problem, which is enormous, but make no mistake, the investigation and prosecution of those who generate, traffic in, and possess child pornography is a top priority of the Department of Justice. The Attorney General has reiterated this time and again, and he is personally committed. The Department of Justice prosecutes these cases in all 94 U.S. Attorney�s Offices across the Nation. The Criminal Division also through its Child Exploitation and Obscenity Section coordinates nationwide investigations, takedowns, and also prosecutes these cases. These career prosecutors, as well as State prosecutors, as well as Federal and State law enforcement, I thank them all for their service, for they have one of the hardest jobs. I can tell you that I am still haunted today by some of the materials which I have reviewed, but these professionals who work day in and day out to protect our children are exposed to and are forced to review these horrific materials, photos, videos, every day, and then come home to their own children. These professionals come to work every day because they are committed to making a difference and protecting our children, and stopping the pain that we have heard so much about over these weeks at your hearings. The Department has made great progress, and I want to take a moment just to give you a few examples of some of our recent prosecutions and takedowns. First, an example of trading in child pornography. The Internet, as you know, has allowed predators who create and traffic in child pornography to create a virtual community where they can share and trade in these disgusting images. One such community, a chat room that went by the name "Kiddypics & Kiddyvids" allegedly included among the images, a live streaming video of one member sexually molesting an infant. Law enforcement conducted an undercover operation resulting in charges against 27 individuals in the U.S., Canada, Australia, and Great Britain, and seven child victims of sexual molestation were identified. Second, an example of sexual abuse of children. Child predators have also used the Internet to provide so-called molestation on demand. In one case, a predator took scripts here in this country, so-called orders, then went to Cuba and to Ecuador and paid poverty-stricken families to let him molest their children, some of whom were under the age of 12. He would then send those pictures back over the video of him playing out these sick fantasies. We caught that man responsible for this ring. We prosecuted him and his co-conspirators, and he received a 100-year prison term. But our efforts did not stop there. We launched Operation Lost Innocence to target Mariscal�s customers across the country, and to date, that operation has resulted in 107 searches, 55 arrests, and 44 convictions. Third, we also prosecute, as we must, the financial facilitators. We pursue the companies that provide the means by which these predators can create, market, and sell these horrendous images. In the Regpay case, for example, we prosecuted the Belarus company that had provided credit card processing services to hundreds of child pornography sites. We secured guilty pleas from the executives, but again, that was only the beginning. That Regpay case gave rise to a follow-on investigation, which resulted in 341 domestic and approximately 703 foreign arrests, 254 indictments, and 241 convictions. I could go on all day with examples like these, successful prosecutions of horrendous crimes. Prosecuting child predators is and remains a top priority for the Department of Justice. The Attorney General made this clear when he announced the Project Safe Childhood Initiative, which seeks to integrate Federal, State, and local efforts to prosecute child pornography, to educate the communities, and to provide enhanced training for law enforcement, and $14 million will go out this year to support ICECs across the country who prosecute these things on a State and local level. Federal prosecutions, investigations, and caseloads in these matters have dramatically increased in the last decade, and the Department is working aggressively, but is it enough? You heard from Ernie Allen of NCMEC last week who told you that 1,500 leads come into the Cyber TipLine every week, and 50 percent of those come from ISPs, but it will take all of us to combat this problem. I pledge to you, as the Attorney General has pledged, that the Department is committed and dedicated to this task. Congressman Barton said he had never been more revolted in preparing for a hearing than having to read the material about these predators who prey on our most vulnerable, our children. I have looked at the pictures and I have looked at the videos, and sir, you are right. I thank you for this hearing, and I look forward to answering your questions. [The prepared statement of Hon. Alice S. Fisher follows:] Prepared Statement of the Hon. Alice S. Fisher, Assistant Attorney General, Criminal Division, United States Department of Justice Mr. Whitfield. Thank you very much, Ms. Fisher. At this time, I recognize Mr. Roldan for his opening statement. Mr. Roldan. Thank you, chairman. Good evening Mr. Chairman, Congressman Stupak, and members of the subcommittee. On behalf of the FBI, I would like to thank you for this opportunity to address the FBI�s role in combating the sexual exploitation of children through the use of the Internet. I will start with the personnel involved in this particular program. The number of funded positions assigned to the FBI�s Innocent Images program is 127. Due to the seriousness of these matters, however, the FBI has consistently utilized the equivalent of 242 agents working child exploitation matters. Let me emphasize something, too, that is just not the agents. We have many other employees involved in this. I don�t give you the numbers because there are so many analysts, people involved in the forensic analysis, secretaries that are supporting this particular program, so it is just not the agents. The men and women involved in the Innocent Images program are some of the most dedicated and hardworking people in the Federal government. They enjoy my respect and sincere appreciation for the work they do every day. I can tell you this: I have been assigned here for approximately 10 months. I have been in the FBI for over 18 years, and I have met some of the most committed individuals that I have worked with anywhere and anyplace. So I am very proud to be among them. At any one time, the FBI has more than 2,400 active child sexual exploitation investigations. Because of the magnitude of the crime problem, our primary focus is on complex investigations targeting organized criminal groups, financiers, and illegal websites, individuals, or groups who engage in the production of child abuse images, sexual predators who travel from one jurisdiction to another, and persons with large collections of child abuse images. As an example, I would like to describe how we work a typical sexual abuse website investigation. First, we must locate the server where the website content is physically located. Once the server is located, and upon finding probable cause, a search warrant is requested. Once a search warrant is executed, the media containing the illegal content is seized for forensic analysis. Once a computer analysis is completed, the targets of the investigation are prioritized. I want to state unequivocally that any information that would lead us to a child who is being sexually abused is treated as a top priority, and not only as a top priority, but as an urgency. That includes expediting the forensic analysis. Then after we identify the website administrators, the producers of the images, and the financiers of the website. Once the illegal website and the organizations managing, financing, and producing the child pornography have been taken out of business, the information associated with the customers paying for access to the website is analyzed and acted upon. However, this endeavor is very complex. First, we must attempt to accurately identify each and every customer accessing the website. This piece of the investigation requires vast resources. Child sexual abuse websites investigated by the FBI have been found to contain anywhere from 9,000 to more than 30,000 different customer entries. The most useful data utilized to identify the customers at this time is the credit card information. In order to obtain credit card information from a financial institution, the FBI must seek a Federal Grand Jury subpoena for each bank who issued a credit card use for the website customers. The information obtained can then be utilized to identify each and every individual account holder who paid to enter the illegal website. Even after all of the financial information is obtained, and a thorough analysis of all of the information is conducted, there is not enough probable cause established to request a search warrant on the customer�s residence. The only option that remains is knocking on the customer�s doors and asking for consent to access their computers. If this consent is not granted, the investigation cannot proceed until additional incriminating evidence is uncovered. This whole process is labor intensive and takes an excessive amount of time. In addition, it would also take more than 11 special agent hours to accomplish what we would call a knock and talk type of investigation on each illegal website customer. In contrast, another totally separate investigative technique that the FBI currently utilizes addresses child sexual abuse matters in a peer-to-peer investigation. It allows for us to capture the child sexual abuse images as they are being transmitted real time and collect identifying information on the perpetrators the instant the crime occurs. Immediately thereafter we can obtain search warrants and seize the evidence. One such investigative initiative resulted in over 400 cases open, 300 search warrants, 50 convictions, and 14 victim children identified and rescued. In conclusion, we would like nothing more than to knock on each person that is involved as a customer in child sexual abuse websites, but again, those are the resources that are required, for example, in a case of 30,000. That is how many people we would require to send out. My comments today are intended to reassure the subcommittee and the American people that the FBI takes this matter very seriously, and has a very aggressive program assigned to address child sexual exploitation. I would like to express my appreciation to the subcommittee for addressing this very serious issue. I look forward to answering your questions. [The prepared statement of Raul Roldan follows:] Prepared Statement of Raul Roldan, Section Chief, Cyber Crime Section, Cyber Division, Federal Bureau of Investigation, United States Department of Justice Good Morning Mr. Chairman, Congressman Stupak, and Members of the Subcommittee. On behalf of the FBI, I would like to thank you for this opportunity to address the FBI�s role in combating the sexual exploitation of children through the use of the Internet. Specifically, I would like to explain to the Subcommittee how the FBI manages the Innocent Images National Initiative on a national and an international level. Two weeks ago, the Subcommittee heard the testimony of Acting Executive Assistant Director Chris Swecker which described this initiative and its accomplishments. As he testified, over the past 10 years, the Innocent Images program has grown exponentially. Between fiscal years 1996 and 2005, there has been a 2050% increase in cases opened (113 to 2500). During this ten-year period, the program has recorded over 15,556 investigations opened; 4,784 criminals being charged; 6,145 subjects being arrested, located or summoned to appear in a court of law; and 4,822 convictions obtained. The FBI�s Innocent Images Unit is responsible for the creation and implementation of national and international initiatives targeting those who use the Internet to sexually exploit defenseless children. The unit, housed in Calverton, Maryland, also works closely with and has a sizable contingent assigned to the National Center for Missing and Exploited Children. The Innocent Images Unit serves as a central location for addressing major cases such as the sexual exploitation of children through pornographic websites, distributing investigative leads to our field divisions and Legal Attach� offices, and managing the FBI�s national program. Its responsibilities include developing and publishing policy, managing program funds, certifying undercover operations, and the training of FBI employees, state, local and international partners. The number of funded positions for the Innocent Images program is 127 positions. Due to the seriousness of these matters, however, the FBI has consistently utilized personnel resources at a higher level than those funded. We currently have the equivalent of 242 Agents working child sexual exploitation matters. Not just anyone can do this work. Our dedicated men and women are exposed to the most graphic and disturbing images and movies that you could possibly imagine. They wade through thousands of pieces of material every day, all day, and then they go home and tuck their own children into bed. However, the men and women of the Innocent Images Unit, and those involved in investigating the sexual exploitation of children in our field offices, are some of the most dedicated and hard working people in the federal government. They enjoy my respect and sincere appreciation for the work that they do everyday. They are some of the most dedicated and passionate employees I have met in my 18-year career as a Special Agent of the FBI. At any one time, the FBI has more than 2,400 active child sexual exploitation investigations. Because of the magnitude of the crime problem, and in an effort to capitalize on the FBI�s intelligence collection, analysis, and investigative strengths, our primary focus is on complex investigations targeting organized criminal groups involved in commercial child sexual abuse websites. As Mr. Swecker testified, these investigations almost always span multiple jurisdictions and usually expand beyond the borders of the United States. In an effort to reach beyond the borders of the United States in a more efficient manner, the FBI has partnered with law enforcement officials from several countries who work side by side with FBI agents in Calverton, Maryland in a task-force setting. Other areas where the FBI makes a major impact include investigating the financiers of illegal websites, as well as individuals or groups who engage in the production of child sexual abuse images. The FBI also investigates sexual predators that travel from one jurisdiction to another to engage in sex with minors. Finally, we target persons with large collections of child sexual abuse images. These individuals represent a real danger as we find a large percentage of those we arrest for possession of images of child sexual abuse are also committing contact offenses. Our investigative efforts attempt to maximize the impact the FBI can have on this very serious crime problem. I would like to describe how we work a typical case, such as a child sexual abuse website investigation. An investigation may sometimes be initiated from a referral by the National Center for Missing and Exploited Children. We utilize a variety of investigative techniques, to include administrative subpoenas and data base checks, to capture evidence in an attempt to locate the server where the website contents are physically located. Once the server is located and upon finding probable cause, a search warrant is requested and issued. In many cases the company that runs the server is not aware that its computers contain illegal content as they may also host hundreds of legitimate websites. Once the search warrant is executed, the media containing the illegal content is seized and delivered to our Computer Analysis and Research Teams (CART) for forensic analysis. Given the tremendous amount of digital data seized by the FBI, this analysis could take months to accomplish, as these teams are responsible for the forensic examination of digital data in all of the FBI�s investigative programs, to include counterterrorism investigations and other high priority matters. Once the computer analysis is completed, the targets of the investigation are prioritized in partnership with prosecutors from the Department of Justice. I want to state unequivocally that any information that would lead us to a child who is being sexually abused is treated not only as a top priority, but also as a matter of great urgency. Our second priority is the identification of the website administrators. Generally, these individuals administer more than one child sexual abuse website. Thereafter, the producer of the images is identified, as these images represent evidence of the actual sexual molestation of a child. Next the funding vehicle and the financiers of the website are identified. Once the illegal website and the organizations managing, financing, and producing the child sexual abuse and exploitation images have been taken out of business, the information associated with the customers paying for access to the illegal website is analyzed and acted upon. Of course we recognize that the customers of the websites may also be sexually exploiting children and we do everything possible to investigate these individuals. But this endeavor is complex and labor intensive. First, we must accurately identify the customers accessing the website. I must reemphasize the word accurately, because in order for us to initiate an investigation, each and every one of the perpetrators must first be accurately identified. This phase of the investigation is very lengthy and requires vast resources as child sexual abuse websites investigated by the FBI have been found to contain anywhere from 9,000 to more than 30,000 different customers entries. Another issue to consider is the fact that most illegal-website customer entries are normally years old. Once outdated, this information cannot be utilized to show probable cause, request search warrants, or acquire the appropriate evidence to proceed with an investigation. The most useful data for the purpose of attempting to identify the customer is the credit card numbers. In order to obtain credit card information from a financial institution on these types of investigations the FBI must seek a Federal Grand Jury subpoena. Currently this requires a presentation to a Grand Jury to request a subpoena for each individual bank in order to identify each and every individual account holder who paid to enter the illegal website. Even after all of the financial information is obtained through these subpoenas, and a thorough analysis of all of the information is conducted, there is rarely enough probable cause established to request a search warrant on the customers� residences. The only option that remains is knocking on the customers� doors and asking for consent to access to their computers. If this consent is not granted, the investigation cannot proceed any further until additional incriminating evidence is uncovered through other investigations. Under our current process, it takes an excessive amount of time for a team of intelligence analysts to process and analyze a customer list on an average child pornography website. It would also take more than 11 special-agent-hours to accomplish a knock-and-talk type of investigation on each illegal-website customer. Again, let us remember that every illegal-website investigation will have a minimum of thousands, and sometimes hundreds of thousands of customers. We are exploring ways to expedite this process, but there are numerous hurdles to overcome. In contrast, another totally separate investigative technique currently being utilized by the FBI to address child sexual abuse matters through Peer-to-Peer investigations, allows for us to capture child sexual abuse and exploitation images as they are being exchanged by pedophiles, and collect identifying information on the perpetrators the instant the crime is occurring. Immediately thereafter, we can obtain search warrants, and have the authorities go in and seize evidence in as little as a one-week time period. Using the technique I just described, and others also currently available, the FBI makes hundreds of arrests and prosecutable cases every year. For example, one such investigative effort resulted in over 400 cases opened, 300 search warrants, over 50 convictions to date, and 14 victim children identified and rescued. This example was presented to you in order to better describe how the FBI has to prioritize not only who must be targeted in an investigation, but also what investigative tools must be utilized in order to maximize investigative results by making a serious impact on the overall crime problem, and putting the most egregious sexual offenders behind bars. My comments today are intended to reassure the Subcommittee and the American people that the FBI takes this matter very seriously and has a very aggressive program designed to address child sexual exploitation. In closing, the FBI looks forward to working with other law enforcement agencies, private industry, and the Department of Justice in continuing to combat this very serious crime problem. The protection of our children requires the combined efforts of all sectors of our society. I would like to express my appreciation to the Subcommittee for addressing this very serious issue, and I would also like to thank Chairman Whitfield, Ranking Member Stupak, and the Subcommittee for the privilege of appearing before you today. I look forward to answering your questions. Mr. Whitfield. Well, thank you, Mr. Roldan and Ms. Fisher both. The committee values your testimony and certainly the input the FBI and the great job that you do in trying to bring perpetrators of these crimes to justice. As you know, when we first started these hearings we got off on a little bit of a rough edge, I guess, with the Bureau, the FBI, and the Department of Justice, and I think a lot of that stemmed from the fact that it appeared to us that in the Justin Berry case that there was some bias against Justin Berry. There was some relationship there that just did not work out with the FBI and the Department of Justice, and many of us felt--whether we are correct in that perception or not, but we felt that valuable information that was given to the Department was not followed up on in an expedited way and a timely way and that, in effect, jeopardized the opportunity to catch some perpetrators that you had some very hard evidence on. So I would make that comment just starting off, and we will get into some of this later, but I know Ms. Fisher, for example, you had a meeting recently with some Internet service providers, and one of the issues that we have heard a lot about is maintaining those records for a length of time that would facilitate an investigation by the Bureau or other law enforcement agencies. Could you tell us how your meeting with the Internet service providers went? Ms. Fisher. I would be happy to. I think the data retention issue that was raised by the Congresswoman is a very important one, because law enforcement does need data to track down ISPs and track down some of these perpetrators, but it is also, as I learned from the ISPs, a very complex one, and I am glad that you will be hearing from them directly next week as to how data is stored and how you can retrieve it and those issues. Many of the service providers retain it for a certain period of time, 90 days or longer. Some retain it for much less periods of time, some 14 days. So I think it is important that we all look at this issue. The Attorney General, in a speech that he gave at the National Center for Missing and Exploited Children just last week or the week before, said that he wanted the Department to look at this issue and has set forth an expert group to deal with this issue, both with the policy people and people that understand the technology. That working group has already been meeting and those meetings are going to go forward. Mr. Whitfield. Now, do you have any information that would lead you to believe that some of the Internet service providers and remote computing services are not reporting apparent child pornography on their network that they know about? Ms. Fisher. Well, I know that there are several, about 217 ISPs that are reporting to the National Center for Missing and Exploited Children, and have reported evidence of these crimes. Those go into the database, and then of course NCMEC sends it out to law enforcement so it can be acted on, whether it is in the State, local, Federal level. Whether there are others out there that are not reporting on evidence of these crimes is something that we are on the lookout for. One thing that I would like to point out to you, because now we are into talking about the statute that you have, 13032, that requires ISPs to report when they have this kind of evidence, and in that statute it talks about liability when ISPs don�t report. We just cleared today, the Administration just cleared today a proposal that would add and enhance, I believe, significant penalties for ISPs to report in the following way. Right now the statute provides that the penalties exist for people who willfully and knowingly fail to report. This new proposal which we have talked to your staff about just this morning, because it just got cleared, this new proposal would allow for civil penalties for people who negligently fail to report evidence of the crime. That, I believe, enhances our efforts and our ability to go after those who aren�t reporting when we discover that they aren�t reporting. Mr. Whitfield. Have you all ever prosecuted anybody under the existing statute? Ms. Fisher. To date we have not prosecuted anyone under the existing statute, but that certainly shouldn�t imply that we wouldn�t, and it came to our attention that there were ISPs out there that were willfully and knowingly not reporting to NCMEC. We are on the lookout for that and we would prosecute under the statute. We want to enforce all the laws in this area and we want to enforce them aggressively and we want to use the sentences and the penalties that Congress has given us under the PROTECT Act and others to put these people behind bars. Mr. Whitfield. I would ask you and Mr. Roldan both this question as people involved in law enforcement and prosecuting what I would consider some of the worst crimes that could be committed. What is the most frustrating aspect of this whole process from your perspective, and what frustrates you the most in bringing people to justice for committing these crimes? Ms. Fisher. Well, when we actually bring them to justice and get them convicted, that doesn�t frustrate me. That is a good thing. But what I think, as these hearings have demonstrated, what is frustrating is that this problem continues to grow, and it is going to take all of us working together. Law enforcement alone is not the answer. It is going to take Congress, it is going to take educators, it is going to take parents, and that is why I think the visibility of these hearings and making people aware of what happens when there are children going on the Internet is so important. Mr. Whitfield. It is so pervasive. I know I was reading an article just yesterday that a gentleman from Saudi Arabia, 37 years old, flew to California and he had been involved in the Internet and he thought he was in a conversation with the father of a two and a half year old child, and he flew to California for the purpose of molesting this child and was paying the parents. Of course, when he arrived, it was law enforcement that had set him up. But this was a 37-year-old psychiatrist from Saudi Arabia who flew to California for this purpose. Mr. Roldan, in your testimony you indicated that from �96 to 2005 that the FBI had opened something like 15,500 some odd cases in this area, but had obtained like 4,800 convictions. I was just curious what happened in those other cases. The evidence just was not good enough to convict, or-- Mr. Roldan. There is a variety of reasons. I am going to go ahead and defer to Mr. Bell because he has worked most of those cases. Arnold, please? Mr. Bell. Thank you, Mr. Chairman. Before I begin my remarks, I would like to thank the committee for bringing this issue to light, and thanks for the opportunity to be here this evening. In cases that we investigate, oftentimes the evidence either is not there to have a successful prosecution, or in some instances, cases are deferred to other agencies or deferred to a State authority, and we don�t capture some of those statistics. Mr. Whitfield. Okay. Now, you all presented a legislative proposal just in the last couple of days that you feel like would assist the Department, is that correct? Ms. Fisher. That is correct. Mr. Whitfield. And could you briefly cover some of the provisions of that legislation that you think would be particularly helpful? Ms. Fisher. Are you referring to the legislation that was sent up last week and this is included in that-- Mr. Whitfield. Right. Ms. Fisher. And this relates to ISP reporting. Mr. Whitfield. Right. Ms. Fisher. There is also some other legislation that I thank the House for passing on child safety and that is now with the Senate, but that is important. The PROTECT Act was very important to this effort. What this new legislation does is again, for ISPs that fail to report it increases the penalties for those who willfully and knowingly fail to report, and in addition, it now allows us to set up a regulatory scheme where ISPs that negligently fail to report will also be fined $50,000 for the first time, $100,000 for each subsequent time. We look forward to working with this committee and with Congress in any other ideas in this area to move forward, and we are constantly looking for new ideas. I think it is important, again, to make sure that we have all the tools to fight this problem. Mr. Whitfield. Well, do you feel like there is any specific way that this committee can help or-- Ms. Fisher. Well like I said, I think you are already helping. I think the fact that the House passed the Child Safety Act helped. Mr. Whitfield. Okay. Ms. Fisher. I would note also on sentencing, you know, sentencing reform is an issue that the Department is very concerned about. The Sentencing Commission just did a look at what has happened in the post-Booker world, after the Supreme Court came out and said that the sentencing guidelines were advisory instead of mandatory. And one important thing that they noted was that in child sexual abuse cases they are seeing more downward departures, meaning more sentences given by judges under the guidelines. So sentencing reform is another thing that should be focused on here. Mr. Whitfield. Okay. Well, I see my time is about expired, so I am going to recognize Mr. Stupak, but I think he is yielding his time to Ms. DeGette, so Ms. DeGette. Ms. DeGette. Thank you, Mr. Chairman. We are working together because we both have scheduling constraints, so I will just take a few minutes and then I will yield the rest of the time to Mr. Stupak. I want to thank all of you for coming and I have a few questions. One of them, my main issue as I discussed in my opening statement is this concept of retention of subscriber information by ISPs, not, in fact, the communications, but rather the subscriber information. I am wondering if all of you in law enforcement--and I know, believe you me, Ms. Fisher, I have been meeting with these ISPs, too, and I know all of the explanations and the excuses and everything else, but the fact is, these ISPs retain subscriber information now. What we would really be talking about is accounts that had been closed, because if it was an ongoing account and law enforcement tried to subpoena that, it would be available because it is an existing account. So what you are really talking about is closed accounts, and I think that having that retained so if there was probable cause to think that a crime had been committed by that subscriber, law enforcement could subpoena that and it would be useful in the investigation. Don�t you think that that would be helpful to investigators? Maybe I should ask some of the investigators. Mr. Swecker, I think you testified before that that would be useful. Mr. Swecker. It would be. We find that the information is often stale by the time we get the information, if we get it. Most of the major ISPs are keeping it for about 90 days, but you are right on the money when you talk about retaining at least the ISP. Maybe not necessarily the content, but at bare minimum at least the ISP addresses. Ms. DeGette. I just keep thinking about that investigator who we have talked to quite a bit in my office who talked about the child who was being raped online, and then by the time they got to Colorado the data was gone. Mr. Roldan or Mr. Bell, do you have any sense of how helpful do you think that would be towards investigation of these cases? Mr. Roldan. Yes, if you notice from my testimony, the process is very long to initially identify the individuals, the customers that are entering the illegal websites, and obviously the IP address would provide the first information. The more information we have, the more helpful it is to the investigation. Ms. DeGette. And because it does take some time to identify the perpetrator, you can�t always subpoena that information within 14 or 30 days, correct? Mr. Roldan. And there is also a difference in the subpoenas that are available. On the credit cards, we have to go through a grand jury. On the ISPs for the IP address, we go through-- Ms. DeGette. It is administrative, right. I have a couple more questions, and then I will yield to Mr. Stupak, about the search warrants. In the Larry Walt case in Missouri, there was a Sergeant Michael Ziglefa who was involved in that case, the local FBI office got a warrant with an e-mail address and an IP address, which led to a physical address for the defendant, which was obtained from the ISP. Nobody knew whether the computer was at that address or not, but the FBI got a search warrant anyway, and the judge said that probable cause for the issuance of a search warrant exists when there is "a fair probability that contraband or evidence of a crime will be found in a particular place. Any of you who know the answer to this, is that the criteria used by the Justice Department and the FBI when requesting search warrants for child pornography? Ms. Fisher. Certainly, all of the cases depend on the facts and circumstances, and I am not sure about the facts in that case. But you have cited the right standard for probable cause. Now, what is going to allow you to get a search warrant with your judges in that district is going to be best known by the prosecutors in that district, as far as what more you are going to need. If you have an ISP address that takes you back to a computer and you have evidence that somebody is in the house using that computer, what do you know about that person, are they living there, et cetera. But all of those facts and circumstances are going to be looked at I believe that the prosecutors that I work with are going to look for that first opportunity to get that search warrant. Ms. DeGette. So you wouldn�t have to prove that the computer was actually there, just that there was a fair probability? That is the definition of probable cause, right? Ms. Fisher. Well again, yes, but you would have to look at the whole facts and circumstances. Ms. DeGette. Exactly. Thank you very much, and I will yield to Mr. Stupak. Thank you for your comity, Mr. Stupak. Mr. Stupak. Ms. Fisher, you indicated that these new provisions have been sent up here on Section 13032, had there been any prosecutions? You said no. Have any efforts been made to prosecute anyone under 13032? Ms. Fisher. I know that there have not been any prosecutions. Mr. Stupak. Have any efforts been made to seek any prosecutions under 13032? Ms. Fisher. Well, certainly we are on the lookout for it, and if we found evidence of that. I can�t tell you how far certain investigations have gone, but I can assure you, Congressman-- Mr. Stupak. 13032 was an act in �99 by the Congress, right? Ms. Fisher. That is correct, sir. Mr. Stupak. And in 2000, the Clinton Administration put forth the regulations to implement the law, is that correct? Ms. Fisher. I believe there were some regulations that did go out, sir. Mr. Stupak. And then since then, nothing has been done to use this law to apply it to any cases, isn�t that correct? Ms. Fisher. I can�t say that nothing has been done, but I will agree with you, sir, that there have been no prosecutions under the standard that is put forth in the statute. With regard to ISPs, again, with regard to ISPs who have not reported-- Mr. Stupak. Has the Justice Department or you or anyone ever come to Congress and say we don�t feel your law is enforceable, and therefore we have to make some changes until today? Ms. Fisher. No, I am not aware of that. Mr. Stupak. Well, we had testimony at the last hearing from the Center for Missing and Exploited Children that you weren�t using the law because you didn�t think that it was enforceable, that the Department of Justice didn�t think it was enforceable. Ms. Fisher. There is nothing that strikes me about this law that is not enforceable. Mr. Stupak. Then why are you recommending changes to it? Ms. Fisher. We believe that we are going to make it more enhanced, because now we will be-- Mr. Stupak. Well, how would you know if it needed to be enhanced if you have never used it? Ms. Fisher. Sir, we have never prosecuted a case under that. I can�t say that we have never used the statute. Mr. Stupak. So why would you want-- Ms. Fisher. In fact, I think the whole-- Mr. Stupak. The law has never been used for prosecution, why would it have to be changed? Ms. Fisher. Well, this act has a lot of provisions that have been used with regard to reporting in, and I am sure, as you know, you heard from NCMEC, the reporting in is a success story. There are over 200 ISPs that are reporting-- Mr. Stupak. Out of how many ISPs are there? Ms. Fisher. I don�t know the answer to that, sir, but Congressman-- Mr. Stupak. And they don�t report underneath this law. They report under a different law. Ms. Fisher. There are over 217 ISPs that are now reporting to NCMEC. This deals with ISPs that are not reporting and willfully and knowingly not reporting. That is correct. Mr. Stupak. So why isn�t this law being enforced? Ms. Fisher. I can�t say that it is not being enforced. I think we are talking past each other for there has not been a prosecution under this law. That does not mean that it hasn�t been investigated. That does not mean that we don�t stand ready, that when-- Mr. Stupak. Wait a minute. We already had testimony that it hasn�t been used at all. Are you saying that the people who testified before did not tell the truth before this committee? Ms. Fisher. No, absolutely not. Mr. Stupak. Well, one of you-- Ms. Fisher. I think I am being completely consistent. Mr. Stupak. Well, either Justice is not telling us the truth, or the other people who testified are not telling the truth. We can�t have the same reading or the same understanding of the same law. Let me ask you this question. Isn�t it true, with your so-called changes today, you are really shifting your responsibility, Justice Department�s responsibility, to the Federal Communications Commission? Ms. Fisher. Absolutely not. Mr. Stupak. Well, under Section C, the purpose of this paragraph, "The Federal Communications Commission shall have the authority to levy civil fines under it and shall promulgate the rules and consultation with the Attorney General to effectuate the purposes of subparagraph B and to provide the appropriate administrative review of civil penalties." To some of us sitting up here, it looks like you are shifting this responsibility from Justice to the FCC. Ms. Fisher. Absolutely not. The criminal penalties for willful and knowing failure to report will still be prosecuted by the Department of Justice. The civil penalties in the civil regime as under this bill will be administered by the FCC, but now, what is great about this is that we can get both. We can get people who negligently failed to report, but we can also get people who willfully and knowingly failed to report. Mr. Stupak. Have you ever used it? Ms. Fisher. We stand by--it has not been prosecuted. There is-- Mr. Stupak. Can you tell me a case where you have used it? Ms. Fisher. No, sir, I agree with you. This statute has not been used to prosecute an ISP for failing to report. Mr. Stupak. And I will bet you if we never would have brought up these hearings, we wouldn�t have these so-called enhancements of this law unless we had these hearings, correct? Ms. Fisher. I don�t know when exactly these enhancements were starting to be discussed at the Justice Department. I can tell you that we are always looking at enhancements on reporting and looking at enhancements to laws that combat this horrific problem. I thank you for these hearings. Mr. Stupak. Let me ask you about Operation Falcon. You discussed in your testimony, you said it resulted in 372 open investigations, 579 search warrants, 341 domestic arrests, 254 indictments, and 241 convictions. ISIS told us that they, as well as State and local law enforcement, verified the names, credit card information, and physical addresses of over 21,000 individuals in the United States that paid to download images of the rape and torture of children. You have testimony that at least one-third, as much as three-fourths of these individuals have or will engage in such horrible acts themselves. There are at least 20,000 individuals known to the Department of Justice that are a threat to the safety of children where no attempt has been made to remove them from the community. Are you content that CEOS has done everything it can to prosecute these individuals, these remaining 20,000? Ms. Fisher. Well, I certainly, as I said, want all child predators put behind bars. That-- Mr. Stupak. I am just going off the 20,000. Ms. Fisher. This investigation, like many others, continue, and hopefully we will find and prosecute the people that are committing these horrible acts on our children. Mr. Stupak. So it is your testimony you can�t find the 20,000? You have the names and addresses-- Mr. Whitfield. Mr. Stupak, your 10 minutes have expired. I am going to go to the full committee Chairman, and then we will come back. Very good. Chairman Barton. Mr. Chairman, thank you, but if Mr. Stupak wants to conclude that, I am happy to defer until he has concluded that particular line. Mr. Stupak. What happened to the other 20,000? You had the credit card information, their names, and their physical addresses, so what happened to 20,000? You said you couldn�t find them. Ms. Fisher. I never said I couldn�t find them. Mr. Stupak. Okay. Ms. Fisher. I said that the investigation continues. Mr. Stupak. Okay. So you are still working on it? Ms. Fisher. Absolutely. We are still working on all of these investigations and these operations. Mr. Stupak. Is that since we have had these hearings or-- Ms. Fisher. No, sir. Mr. Stupak. I just wondered if it was like the statute, that is all. Thank you, Mr. Chairman. I will look forward to my 5 minutes later. Mr. Whitfield. Mr. Chairman. Chairman Barton. Well, thank you, Chairman Whitfield, for holding this hearing. I am going to start off thanking all you witnesses for being here. I mean that. One of you has been here before, in a little bit of a difficult situation. The other three of you have gotten here in a somewhat unusual fashion, but the truth is, you are here and we are happy you are here. I want this to be a positive hearing. I have not normally had the Attorney General of the United States walk into my office and say that either he would come or you folks would come, and so I thank Attorney General Gonzalez for making that commitment, and I have not often had to call the Director of the FBI and have the kind of conversation I had with him to get some of our FBI witnesses here. So I am sincere in saying we appreciate it and I think we are on the same team. Congress wants to bring these folks to justice, these child predators, and you folks obviously do. You all have dedicated a large part of your professional career to that. So I want to start off by kind of reestablishing what the problem is, and I guess, Ms. Fisher, I go to you since you are the senior Department of Justice official here. How many perpetrators do we think there are in the country that engage in child pornography and preying on children for pornographic purposes? Does the Department of Justice have an estimate of that? Ms. Fisher. I don�t have an estimate with me, but it is hundreds of thousands. Chairman Barton. Hundreds of thousands. Mr. Swecker, as the FBI senior person, would you agree with that? Mr. Swecker. I would. I mean, it is very difficult. There are different categories, if you will, possessors versus people who are actually producing and abusing the children. So there are different--as you well know, there are different categories, but there are a lot of them out there and I think-- Chairman Barton. So you wouldn�t disagree with the order of magnitude? Mr. Swecker. No, not at all. Chairman Barton. Okay. Do we have an estimate of the number of commercial child pornographic sites there are on the Internet on any given day? Anybody? Mr. Bell. I don�t know if there is a way to determine with certainty a number like that. I did a simple Google search on some terms that I know, and I had 130,000 hits. Chairman Barton. One hundred thirty thousand? Mr. Bell. Right, and that was on one search term. Chairman Barton. So we have hundreds of thousands of potential if not actual predators. We have hundreds of thousands of commercial sites. What is our estimate on number of victims then, the actual children themselves, based on that? Would that also be in the hundreds of thousands, the millions, the tens of thousands? Just kind of a general order of magnitude, what would it be? Mr. Roldan. Sir, it would have to be in the hundreds of thousands-- Chairman Barton. Hundreds of thousands. Mr. Roldan. --because every time we arrest someone, there is more than one victim. Chairman Barton. Okay. Now, at our previous hearing, one of our witnesses from law enforcement made the point that I thought was rather telling, that this wasn�t just a law enforcement problem, and I agree with that. I mean, with this kind of an order of magnitude, we cannot ask a handful of Federal officials backed up by State and local--I mean, this is a huge problem. My first question, and I will direct this to Ms. Fisher, given the order of magnitude, when I look at the number of officials at the Department of Justice and the number of agents at the FBI that are dedicated to this problem, it is in the dozens at DOJ, and at the FBI, it is several hundred. What does the Congress need to do to significantly increase the personnel and the financial resources that are being dedicated to tracking this problem? I have no doubt that everybody that is assigned is absolutely committed to bringing to justice these fiends, but I am a little puzzled as to why given the order of magnitude that we all understand in general terms, there hasn�t been a huge request to put more agents, more prosecutors, more resources into combating the problem? We are fighting a forest fire with a can of aerosol spray or something. Is it a Congressional problem that we are unwilling to work to increase the resources, or is it there are so many other problems that you just don�t feel like you can put more resources into it? Ms. Fisher. I think you can always put more resources to attack this problem. One of the things that we have tried to do in the Department of Justice, and I will let the FBI follow me, because I know that they put a great deal of resources on this. We use all 94 of our U.S. Attorney�s offices to prosecute this. Second, the Attorney General himself has told the prosecutors and told the U.S. Attorneys this is our priority. Third, we have this new initiative called Project Safe Childhood, and what that does is it makes us link up with the State and locals who also have resources to prosecute these crimes, to train them, to give them money to prosecute. I think $14 million is going out to ISIS this year, and to enhance community awareness. So those are some of the things that we are trying to do to address the problem, sir. Chairman Barton. I don�t want to beat a dead horse here. The young man who was the primary witness at the last hearing who had been sexually abused indicated that the website that he was operating, his one website, if I understand, that one website took in $1 million a month. We estimate that the national take on child pornography in the United States through the Internet is upwards of $20 billion a year, $20 billion. And we are talking about a $14 million upgrade? A million million, a thousand million is a billion. I think the Congress will work with the Administration to find a way, instead of having a couple of hundred FBI agents, a dozen or so specialists at DOJ, or even--so let us put thousands. If we are serious about this, let us put some real muscle in. Again, I am not negative on what you are doing, but if I have got to put out a major forest fire, I don�t send out one firefighter, no matter how good he is. You know, I mobilize the entire operation. My next point. The gentleman on the end here, Mr. Bell, said that he put in a phrase and he got 130,000 hits that there was--he thinks there may be a commercial site on the Internet for child pornography. Now, it is illegal to engage in child pornography. Why wouldn�t it be possible, and if we need to change the law, if you can prove that that is a site that is a child pornographic trafficker, shut it down immediately? Why can�t you do that? It is an illegal act, it is engaged in illegal activity. Why don�t we just take it off as soon as we know it is there? Mr. Bell. The difficulty in addressing the commercial websites in particular is there are several mechanisms for masking where they actually are. We have to identify where the host server is. Oftentimes, that is not in the United States. Oftentimes, these websites are administered by people who are not in the United States. Chairman Barton. Is there anyplace in the world where child pornography is legal? Mr. Bell. Not that I am aware of, but I think as you mentioned there are 90-some countries where it is not--I am sorry, there are 94 countries where it is not illegal, we heard testimony today. Some of the guys that are doing this that are doing it for profit and as a business are situating themselves in those places where they kind of have safe harbors. We have tried to address this through international cooperation. We have an international task force. I think some of your staff members have met some of the officers that we have from overseas that are working with us, and we are trying hard to address these sites, wherever they might be in the world. Mr. Whitfield. Mr. Chairman, I might just make a comment, though, that 94 countries do not have any laws on child pornography, but I have been told that it is estimated that 40 percent of all the sites are right here in the U.S. Mr. Bell. What we found through some of our investigation is that oftentimes when we finalize our investigations, we find the services to be housed in the U.S. are in Western European modernized countries and the reason for that, we believe, is that the infrastructure is so much better here for high speed broadband and such. So the guys--the subjects who are administering these sites tend to be offshore, but the mechanisms are here. Chairman Barton. Do we have the technical capability, if it were legal, if I put up a child pornography site called Kiddyporn.barton--or Bartonkiddyporn.com, and I am engaged in illegal transactions for child pornography, it is technically possible to shut my site down and not let it be accessed. Is that not correct? Mr. Bell. It is possible. It is possible to shut the site down, but what happens is sites are generally hosted in several locations at one time. The analogy I like to use is owning four homes. If you are a drug dealer and you own four homes and the police raid one of your homes, you just go to the next home. What we are finding in our investigations is that sites are located in multiple servers in multiple locations. Chairman Barton. But my point is, if we have detective capability to shut these sites down, why don�t we make sure you have the constitutional and legal ability to just do it if you can prove by accessing it there is child pornography on that site. Boom, shut it down, just do it. Make it tough on these guys, you know, make it tough on them. There are not that many of you, so just--I mean, I think we will back you up. I don�t believe anybody on either side of the aisle this is the committee of jurisdiction for the Internet. Now, we don�t have criminal penalty enforcement. That is your friends on the Judiciary Committee. But if you need--I mean, what the Attorney General has sent up in terms of a legislative package I think is a step in the right direction, but it appears to me that there is so much that we could do if we are serious about this, and we just are not doing it. And so my plea is let us think big. Let us think as big as the traffickers think. They are having hundreds of thousands of sites, hundreds of thousands of perpetrators, and we are fighting that with, you know, just a handful of people. I have some other questions, Mr. Chairman, but my time is expired. I do want Mr. Roldan�s thoughts in writing and will give him a question in writing. He says the best way to get at these folks is through credit card information, but they have to go on a case-by-case basis to a Grand Jury to get a subpoena to get that identification of the individual with the credit card number. I would like to see what we need to do to make it possible to access those credit cards without having to go on a case-by-case basis. Again, if you can prove that that credit card has been used at a site that traffics in commercial child pornography, I would be willing to vote for a bill that makes it an automatic that you can go to the bank and get the identification of that credit card holder. If you prove that they purchased child pornography or accessed a site and paid to go to a site where child pornography was there, that would be prima facie evidence that they are engaged in it and you can get their name. You don�t have to spend all the time to go to do th--and again, I don�t want to violate anybody�s constitutional rights, but I would think if you can prove that that credit card has been used, you ought to be able to get the name of the person using it without having to do all the effort that the FBI and the State law enforcement people are having to do. Thank you folks for coming, and again, Mr. Whitfield, thank you, and Mr. Stupak for doing this investigation. Lastly, I am told that the million dollars a month was not a site that was operated by Justin Berry, it was another case, the Reedy case. Thank you. Mr. Whitfield. Thank you, Mr. Chairman. At this time, I recognize Mr. Stupak for his remaining 6 minutes. Mr. Stupak. Thank you, Mr. Chairman. Ms. Fisher, you said in your response to the Chairman that 94 DA�s are all working on this and it is a priority with the Attorney General to prosecute these cases. Then what happened last July when Justin Berry came to the Justice Department with some current IP addresses, physical addresses, credit card information of persons who were subscribers to his website, but neither the FBI nor Justice has used this information to obtain search warrants? What happened there? Ms. Fisher. Of course because this is a pending investigation there is some stuff that is public that I can talk about and there is material that is not public with regard to the investigation that I can�t talk about. What is public is that there has been two people charged with regard to this investigation, Mr. Mitchel and Mr. Richards-- Mr. Stupak. Two out of 1,500 I believe it is, right? Wasn�t there 1,500? Ms. Fisher. There have been two people charged. One has been convicted, one is pending trial. There have been--the website itself has been taken down. There have been search warrants. It would be inappropriate for me--that is public and that is what I can tell you about the investigation. Mr. Stupak. Wait a minute. You guys didn�t do anything to shut down this server. The guy fled the country. Ms. Fisher. I am sorry. There were search warrants that were done that have taken down that commercial website. Mr. Stupak. Tell me, what was done to put down this website then? Ms. Fisher. I will leave that to the FBI. Mr. Stupak. Okay, someone tell me. Mr. Swecker. I can just say that all the information that was given to us is being aggressively pursued, very aggressively pursued with substantial resources. Without going into the details-- Mr. Stupak. Sure. So are there going to be more indictments or what? You have 1,500 names and addresses, credit card information, physical addresses, IP addresses. Do you anticipate more indictments or anything on this case? It has been 8 months. Mr. Swecker. It is ongoing, but what I would like to do is have Mr. Bell just generically go over-- Mr. Stupak. We all sit here and talk about the courage of these young people coming here, and when they give you the information and it is 8 months and you get two out of 1,500, their confidence is rather shaken. I think we do more harm to these young people who are willing to step forward if we take the information and it is such a slow process. The website, the person fled the country. That is a given, right? The operator fled the country by the time you got around to it. Mr. Swecker. The agents working this case, the prosecutors working this case are aggressively pursuing every lead in this case. Mr. Stupak. Understood, and I have heard that so much today, but the point I hope you understand as we sit up here and these young people who are willing to come forward, and we hear oh, we are aggressively pursuing this case. Justin Berry has gone to you a couple times and asked for information, and no one would give him information. Don�t you think you at least owe him an explanation what is going on, other than can�t talk about it or ongoing pending case? Mr. Swecker. Sir, I know you have a law enforcement background and I know that you know that we don�t discuss cases with witnesses in terms of the details of the case. Mr. Stupak. But you certainly discuss cases with the victim, because they have the right to know. Let me ask this one. The Chairman was making an excellent point, Chairman Barton. In the UK, Internet service providers have a process for identifying websites that contain this filth and remove those images 48 hours after identification, unless law enforcement requests otherwise. I understand that is a voluntary regulatory system that will not work here, as most of our ISPs are unwilling to even use the NCMEC reporting forms. The UK reduced the percentage of its images located on their servers from 18 percent of the worldwide total to four tenths of one percent in 2005. In 2 years, they went from 18 percent to four tenths of one percent. Of course, that doesn�t count the U.S. part. So has the Department thought about requesting from the Congress some legislation that would create a mechanism to notify ISPs of violation or sites that may be violating and mandate removal of these sites from our servers within 48 hours of notification from either NCMEC or from law enforcement? Have you thought about that? Ms. Fisher. Congressman, just last week when I met with the ISPs I raised this issue with them, and I know they are coming in next week to talk about this. In fact, one of the ones that I met with is AOL, who has been a very good reporter to NCMEC, but they, I believe, are on the board of that entity in the UK, and so I think that they would be better seen to address that particular issue, but I can tell you that we constantly work with the ISPs and with NCMEC to do everything that we can. Mr. Stupak. All right, I guess we will talk to the ISPs. Do you have any suggestions? We heard administrative warrants last hearing on how we crack down on this, other than talk to the ISPs? We heard administrative warrants, which I thought was a good idea. We will work on that. Do you have any other comments for us or this proposal that you gave us today where you shifted to the Federal Communications Commission? Any other suggestions? Ms. Fisher. I applaud the legislation that was passed by the House that is now pending with the Senate. I think that you should look at sentencing reform with regard to the downward departures, that is an issue. There is something called the cyber convention that is now pending also in the Senate that tries to get our foreign countries that sign on to that cyber crime treaty to have data retention in place so we can work with our international partners. I think any-- Mr. Stupak. Let me ask you this idea. How about if we pay overtime to local law enforcement who work this area? You do it Justice-based terrorism task force and violent crime task force, because the sergeant who really broke Masha�s case doesn�t do it anymore because his jurisdiction can no longer afford the overtime. So why doesn�t Justice use some of that money and pay overtime to local law enforcement who seem to be ahead of this problem, or trying to stay ahead of this problem? Would that be an idea? Ms. Fisher. Certainly. We do send money out through the ICECs to help the local efforts. The State and locals do such an amazing job at combating child exploitation, and I commend them for their work. Mr. Stupak. Thank you, Mr. Chairman. Mr. Whitfield. The gentleman�s time is expired. At this time, I recognize Mr. Walden for 10 minutes. Mr. Walden. Thank you very much, Mr. Chairman. Ms. Fisher, at our hearing on April 4, concerns were raised by Justin Berry and his attorney, Steve Ryan, about the handling of Justin�s case by Department of Justice. I am sure you are aware of our hearing. In particular, Justin and Mr. Ryan described how an affidavit was unsealed in the case involving Gregory Mitchel, a man we understand allegedly molested Justin and also was engaged in a commercial enterprise involving the production of sexually exploitative images of children. The unsealing of this affidavit was particularly detrimental to Justin because it was only partially redacted and contained information that other child predators involved with Mr. Mitchel in this commercial enterprise would realize came from Justin. In effect, it altered--it alerted, I should say, other potential perpetrators that Justin was a government witness. Mr. Ryan, Justin�s attorney, testified under oath that he had been assured the day before the unsealing of Mr. Mitchel�s affidavit by Mr. Andrew Oosterbaan, head of the CEOS section, that the affidavit would remain sealed. Subsequently, we learned that an error was made and the affidavit was unsealed. I understand that those sorts of mistakes can happen. However, I asked Justin�s attorney, Steve Ryan, while he was under oath, whether he, on behalf of Justin, ever requested the Justice Department reseal the affidavit. Mr. Ryan said that he would get back to us on that question because he wanted to make sure he gave us an accurate response. I have an e-mail that was forwarded from Mr. Ryan to staff the following day. There should be a copy of it on the dais for you if you want to read it. Ms. Fisher. That is okay. Mr. Walden. We can share it with you. I don�t know if somebody is able to do that. I would like to move that the e-mail be entered into our record, Mr. Chairman. Mr. Whitfield. Without objection. [The information follows:] Mr. Walden. The e-mail he forwarded staff is an e-mail dated September 15 of 2005 from Holly Roth, an attorney working with Mr. Ryan and Justin, to Mr. Andrew Oosterbaan, Sherri Stephan of DOJ, and Stephanie Thacker of DOJ. In this e-mail, Ms. Roth writes, and I quote "Drew: Reserving all of our rights in light of what has happened, we would like you to take every possible action to get the warrant affidavit back under seal. Please advise us right away of your position on this." We note this affidavit remains unsealed. Can you explain to us why this affidavit was not resealed? Ms. Fisher. Well, I can. When this e-mail was sent about resealing the affidavit, which the complaint underlying arrest warrant affidavit that describes all the facts that was unsealed in a redacted form by the court, that affidavit was already in the public realm, and according to the U.S. Attorney, the press already had that affidavit. So the judgment was made that they would offer protection for Justin, and I believe that that offer-- Mr. Walden. Physical protection? Ms. Fisher. Yes, physical protection and any other kind of protection, and that was made. Of course, because the Mitchel case was ongoing, he had already had his initial appearance and he was going forward, that affidavit at some point was going to become unsealed, but at that period of time after this Thursday e-mail, that is the event that took place. Mr. Walden. But is that sort of standard procedure in these types of cases? Ms. Fisher. Eventually, yes. The complaint and the affidavit-- if there is a complaint and an affidavit, they are unsealed as to the defendant because the defendant gets to know the charges against him. Mr. Walden. Sure. Ms. Fisher. And then as the case progresses, sometimes it is 30 days, sometimes it is immediate, sometimes it is a little bit later, those documents are unsealed because the case is going on and the defendant is making further appearances, and of course, our court proceedings are public. Mr. Walden. Okay. Ms. Fisher. But let me assure you, Congressman, because I think this gets at the issue. There would never be a deliberate attempt by the Justice Department to put a victim or a cooperating witness in harm�s way. There certainly was no attempt to do that here. We want to protect our victims and we want to protect our investigation and our case. Mr. Walden. Sure, but when Mr. Ryan asked that it be resealed, why was it--that just didn�t matter at that point? Ms. Fisher. It is not that it didn�t matter at all. Unfortunately, it was already in the public realm and so resealing would have been ineffective, so the judgment was made at the time by the people on the ground to offer him protection. Mr. Walden. Okay. And when you say it is already in the public realm, does that mean that it was at one time open and available but could it--I am not an attorney, so you are going to have to work with me on this. But resealing it, would that take it out of the public realm? Ms. Fisher. Well, when I said it was already in the public realm, the press in Roanoke already had a copy of the affidavit and had called the U.S. Attorney in Roanoke, according to my conversations with the U.S. Attorney in looking into this. And so it was already in the public realm, and of course, it had been made-- Mr. Walden. But it was like one reporter in Roanoke had it? Ms. Fisher. I believe that is right but I am not sure that they knew that at the time. But I think that when they were considering whether resealing would be effective, and of course, it would only have remained resealed for a certain period of time-- Mr. Walden. How long would that be, normally, in a case? Ms. Fisher. It would depend on the local rules in the courthouse down there. Sometimes it is 15 days, sometimes it is longer. It depends on your relationship with the court and the motions that are filed. But this was not done on purpose. We want to protect our victims. I am sorry that it happened. I believe everybody is sorry that it happened. Mr. Walden. Okay. Mr. Roldan, what is the current budget for the Innocent Images Unit? Mr. Roldan. Sir, I can break it down for you, but-- Mr. Walden. You need to turn your mic on there if you would. Thank you, sir. Mr. Roldan. I can break it down for you, sir, but right now it is a little bit less than $20 million. Mr. Walden. And is it-- Mr. Roldan. Including personnel. Mr. Walden. And has the Unit�s budget been the same since its inception? Mr. Roldan. No, sir. It started in 1998 and we received 60 positions equivalent to $5.8 million. Mr. Walden. That was in �98? Mr. Roldan. In 1998. We also received-- Mr. Walden. And what is it today? Mr. Roldan. Total in personnel or non-personnel. I will give you the whole--1998, 60 positions, equivalent $5.8 million. Mr. Walden. Okay. Mr. Roldan. In addition, non-personnel $4.2 million. In 1999, 45 positions equivalent to $5.2 million. Mr. Walden. So it has gone down? Mr. Roldan. No, in addition. This is reoccurring. So in addition to the 60 positions, we received an additional 45 positions. Mr. Walden. You got an additional 45 positions. Mr. Roldan. Yes, sir. Mr. Walden. Okay. Mr. Roldan. And in 2005, in addition to the $4.2 million non-personnel, we received an additional $3 million non-personnel. No additional positions, but we received $3 million in non-personnel. So now we are up to $7.2 million reoccurring. It will reoccur every year. And then in 2006, we received an additional 22 positions, which is approximately $2.69 million. Mr. Walden. Okay. Do you believe that is adequate to keep up with the volumes we are hearing about here? Mr. Roldan. We could use more resources in this particular matter, obviously, from the numbers we are getting. Mr. Walden. All right. Within the cyber crimes section, what priority is placed on Innocent Images investigations as opposed to intellectual property crimes, such as downloading music from the Internet, for example? How many positions do you have on these intellectual property cases? Mr. Roldan. Minimal, sir. As a matter of fact, the Innocent Images program is just below the intrusion matters, which address counterterrorism and counterintelligence. This was just recently changed, too, by the way. Mr. Walden. When? Mr. Roldan. Most recently, we started working on a national strategy approximately a year ago or a little less than a year ago, and that national strategy was recently signed. That is where the changes were made. Mr. Walden. Okay, because it used to be like third in your priority, didn�t it? Mr. Roldan. Yes, sir, you are correct. Mr. Walden. After intellectual property cases, after hacking, and after intrusion? Mr. Roldan. Yes, sir, you are correct. Mr. Walden. Okay. All right. Ms. Fisher, one final question on this affidavit issue. Have you ever resealed an affidavit in a case? Ms. Fisher. No, sir. I have not had occasion to do so. Mr. Walden. Does it ever happen in--I meant the Justice Department in general, not necessarily you personally. Ms. Fisher. The Justice Department, I couldn�t say for the entire Justice Department. I think it unusual, but I would never say that it couldn�t happen or wouldn�t happen. It would be up to the court, obviously. Mr. Walden. All right. Ms. Fisher. Could I clarify one thing-- Mr. Walden. Sure. Ms. Fisher. --Mr. Chairman? I think I mentioned the cyber crime treaty earlier as something that could be done and could be worked on that is in the Senate right now, and I mentioned it in regards to data retention. It actually helps us with international cooperation and information sharing, not data retention, so I apologize for that. I just wanted to clarify that for the record. Mr. Walden. All right. Thank you, Mr. Chairman. My time is expired. Mr. Whitfield. Thank you, Mr. Walden. At this time, I recognize Dr. Burgess for 10 minutes. Mr. Burgess. Thank you, Mr. Chairman. I apologize for being out of the room for a while during part of the testimony. When evidence comes to light that some of this activity has been going on, but it comes to you late, does it reach a point where the evidence is just too stale to pursue an investigation or a search warrant? Ms. Fisher. There could be a staleness problem with regard to search warrants, but as far as the investigation goes, I would defer that to Mr. Swecker. Mr. Swecker. Can you repeat that question? Mr. Burgess. If you don�t catch something right away, is there an expiration date on the ability to investigate it and pursue a search warrant? Mr. Swecker. The answer is yes, because data can become stale and you can�t use it in a search warrant, for example, because it is not current enough. We often get information that is a year, 2 years old, and unless you can update that information and get it to the point where it is fresh enough to get a search warrant, you can�t act on it without just knocking on the door and doing the knock and talk that I think Raul discussed earlier. Mr. Burgess. So then what happens? Does the case just get dropped? Mr. Swecker. No. I mean, if you have a list of subscribers that are 2 years old, for example, you continue with the investigation. It goes into a database. If you do get to the names of the subscribers and you get the information on it, that goes into the Innocent Images database and usually we run across these folks again. So it doesn�t just die, I mean, the investigation continues on. Mr. Burgess. Is there any tool that we could give you here that would help you with the staleness problem? Is there any legislative tool that Congress could supply you? Mr. Swecker. I will defer to Justice on that one. I mean, we like data retention. It is a question of how long and how much data is going to be retained. There is an issue ith our regional forensic labs, frankly. There is a bottleneck there. Innocent Images cases, as we refer to them, have to take a backseat to terrorism exploitation with respect to our computer forensic examinations. There are only about nine labs, I believe, forensic labs around the country right now, and these are labs that are shared by State and local and FBI and other Federal agencies. There are times when we can�t get to this information because of the press of terrorism, counterintelligence cases, and other cases that the Director has stated, and rightfully so, that are higher priorities. So more forensic labs would help. Mr. Burgess. I have a hard time differentiating between this type of terrorism and some of the other types that you pursue, but I understand what you are saying. So you will try to pursue a case even though some of the information has become quite dated? Mr. Swecker. Yes. Arnold, can you elaborate on that a little bit? Mr. Bell. Yes, sir. Even when we receive dated information, we have several databases that are contained in house. In addition, we have databases that are available to us at the National Center for Missing and Exploited Children. We will take the names of the individuals that we have, we will take whatever information we have, and we will bounce it off those databases. Sometimes we find people that we have encountered before, sometimes we find people that we already have active investigations on, or when we go through the National Center, some other agency may have active investigations on. The information that we have, if someone else has an investigation, our information generally will bolster some other investigation or allow us to continue on with investigations we might already have ongoing on a particular subject. For example, on a website case we might have 10,000 such leads, but all that information might be 2 or 3 years old. We bounce that off of all the databases that are available to us. Mr. Burgess. So you have someone who is continually working on those? Mr. Bell. We do those regularly. Mr. Burgess. Do you have any--I mean, are there success stories from successful prosecutions from that? Mr. Bell. You know what, I can�t think of any that came specifically from some data of that age right now. I am sure there are. I can get back to the committee if it is necessary. Mr. Burgess. Well, I am sure all of you were in the room when we heard the testimony from the pervious panel. I have just got to tell you, I am really bothered by human traffickers masquerading as adoption agencies. I mean, I had no idea that that sort of thing could even happen. Is there any role for the Department of Justice or the FBI in working up these cases and pursuing these individuals? I mean, that is really at the heart of what we are talking about, from the standpoint of the Internet. The Internet has put all of this stuff on steroids. At the heart of it, you had a pedophile go overseas and adopt a baby, and went through three agencies in order to do it. Is that possible? Ms. Fisher. It was such a sad and horrific story that she told, and she is such a brave girl. I was thinking that same thing as she was testifying, is there something-- Mr. Burgess. Well, are you guys investigating-- Ms. Fisher. --for the Department-- Mr. Burgess. Go ahead--aspects of those adoption agencies? I mean, I don�t want to come down hard on international adoption agencies that are doing good work and providing people the children they have always longed for, but this is so heinous. Surely, the FBI is investigating adoption agencies, international adoption agencies, after seeing this kind of information, because as someone on the previous panel said, there have got to be other Mashas out there. We just haven�t found them yet. Mr. Swecker. Can I address that? Mr. Burgess. Sure, I wish you would. Mr. Swecker. You hit it right on the head. It is a human trafficking case, and we address human trafficking cases. We have a pretty sizeable inventory of human trafficking cases. We can get back to you as to how many of those that would involve adoption agencies. As you know, we played a role in this case, although it was first scoped out by a local officer. He came to the FBI for some additional help in getting the search warrant put together and actually conducting the raid. But to answer your question, we do have a role to play. Mr. Burgess. Are any of the people who were involved in this case that was before us today, any of the adoption agency people in jail, on trial, awaiting trial? Has anyone been punished for what happened to this 5-year-old? Mr. Swecker. Not that I am aware of. Ms. Fisher. Other than the defendant, her adoptive father who is in prison, I am not aware of any others. Mr. Burgess. And I mean, the failures are--her teachers, I don�t know whether she got medical care during her 5 years with this guy. I don�t know whether he took her in for her immunizations. If she went to school, I presume she had immunizations. I presume she was weighed by a nurse and someone should have noted that her weight was lower than the 20th percentile for a 10-year-old. I mean, it is just hard to imagine how this was missed over and over and over again. The failings of our system are just rampant in this case. The Toronto police department spent considerable time and resources to find this child, only to learn that her identify had been--or that she had been found 2 years earlier by the FBI working with the Chicago police department. Do you have things in place internationally now to try to help that? What is being done amongst Federal law enforcement agencies and the Justice Department? Mr. Swecker. The answer is yes. Our database has been merged with the National Center for Missing and Exploited Children database, which is actually when the match was made in this case two years after she was recovered. NCMEC has put out a list of protocols that need to be followed in these types of cases, and as a last resort, placing the child�s picture out on the public domain. That protocol wasn�t followed in this case, and I will let Arnold follow up on that, but we can�t force other international law enforcement agencies to follow those protocols. They are really advisory in nature. Most countries do. Mr. Burgess. How do our efforts compare with that of other countries? Are we keeping up? Mr. Swecker. We do. We have recovered--in comparison to the international law enforcement agencies, we have recovered 124 children versus the combined efforts of 181 other countries in the recovery of about 257 children. So one agency has recovered 124; combined, 181 agencies have recovered 250. So we compare, I mean, we lead the world in these types of investigations in terms of recovered children. Mr. Burgess. Is there any idea how big the universe of children who are exploited by child predators is? I mean, how does that figure of 187 compare with-- Mr. Swecker. We tried to take a stab at that a little earlier, and we think it is hundreds of thousands internationally, probably tens of thousands-- Mr. Burgess. Probably not a great figure. Mr. Swecker. --nationally. Mr. Burgess. Mr. Chairman, it has been a long day. This is an emotionally exhausting topic. I am going to yield back the balance of my time. Mr. Whitfield. Thank you, Mr. Burgess. Once again, I want to thank the panel. We look forward to continuing to work with you as we continue efforts in this area. The record will remain open for 30 days and the documents and these records will be submitted in to be formally a part of the record. [The information follows:] Mr. Whitfield. Mr. Roldan, I think Chairman Barton indicated he would be getting a question to you, and we would appreciate an answer on that. I hope you all enjoyed being with the Energy and Commerce Oversight Subcommittee this afternoon. With that, the hearing is adjourned. [Whereupon, at 7:25 p.m., the subcommittee was adjourned.]