diff --git "a/data/CHRG-112/CHRG-112hhrg63873.txt" "b/data/CHRG-112/CHRG-112hhrg63873.txt" new file mode 100644--- /dev/null +++ "b/data/CHRG-112/CHRG-112hhrg63873.txt" @@ -0,0 +1,2298 @@ + + - DATA RETENTION AS A TOOL FOR INVESTIGATING INTERNET CHILD PORNOGRAPHY AND OTHER INTERNET CRIMES +
+[House Hearing, 112 Congress]
+[From the U.S. Government Publishing Office]
+
+
+
+ 
+               DATA RETENTION AS A TOOL FOR INVESTIGATING INTERNET 
+                CHILD PORNOGRAPHY AND OTHER INTERNET CRIMES
+=======================================================================
+                                HEARING
+
+                               BEFORE THE
+
+                   SUBCOMMITTEE ON CRIME, TERRORISM,
+                         AND HOMELAND SECURITY
+
+                                 OF THE
+
+                       COMMITTEE ON THE JUDICIARY
+                        HOUSE OF REPRESENTATIVES
+
+                      ONE HUNDRED TWELFTH CONGRESS
+
+                             FIRST SESSION
+
+                               __________
+
+                            JANUARY 25, 2011
+
+                               __________
+
+                            Serial No. 112-3
+
+                               __________
+
+         Printed for the use of the Committee on the Judiciary
+
+
+
+[GRAPHIC NOT AVAILABLE IN TIFF FORMAT]
+
+
+      Available via the World Wide Web: http://judiciary.house.gov
+
+
+                              __________
+
+
+
+                    U.S. GOVERNMENT PRINTING OFFICE
+63-873 PDF                    WASHINGTON: 2011
+___________________________________________________________________________
+For sale by the Superintendent of Documents, U.S. Government Printing Office, 
+http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, [email protected].  
+
+
+
+
+
+
+                           COMMITTEE ON THE JUDICIARY
+
+                      LAMAR SMITH, Texas, Chairman
+F. JAMES SENSENBRENNER, Jr.,         JOHN CONYERS, Jr., Michigan
+    Wisconsin                        HOWARD L. BERMAN, California
+HOWARD COBLE, North Carolina         JERROLD NADLER, New York
+ELTON GALLEGLY, California           ROBERT C. ``BOBBY'' SCOTT, 
+BOB GOODLATTE, Virginia                  Virginia
+DANIEL E. LUNGREN, California        MELVIN L. WATT, North Carolina
+STEVE CHABOT, Ohio                   ZOE LOFGREN, California
+DARRELL E. ISSA, California          SHEILA JACKSON LEE, Texas
+MIKE PENCE, Indiana                  MAXINE WATERS, California
+J. RANDY FORBES, Virginia            STEVE COHEN, Tennessee
+STEVE KING, Iowa                     HENRY C. ``HANK'' JOHNSON, Jr.,
+TRENT FRANKS, Arizona                  Georgia
+LOUIE GOHMERT, Texas                 PEDRO PIERLUISI, Puerto Rico
+JIM JORDAN, Ohio                     MIKE QUIGLEY, Illinois
+TED POE, Texas                       JUDY CHU, California
+JASON CHAFFETZ, Utah                 TED DEUTCH, Florida
+TOM REED, New York                   LINDA T. SANCHEZ, California
+TIM GRIFFIN, Arkansas                DEBBIE WASSERMAN SCHULTZ, Florida
+TOM MARINO, Pennsylvania
+TREY GOWDY, South Carolina
+DENNIS ROSS, Florida
+SANDY ADAMS, Florida
+BEN QUAYLE, Arizona
+
+      Sean McLaughlin, Majority Chief of Staff and General Counsel
+       Perry Apelbaum, Minority Staff Director and Chief Counsel
+                                 ------                                
+
+        Subcommittee on Crime, Terrorism, and Homeland Security
+
+            F. JAMES SENSENBRENNER, Jr., Wisconsin, Chairman
+
+                  LOUIE GOHMERT, Texas, Vice-Chairman
+
+BOB GOODLATTE, Virginia              ROBERT C. ``BOBBY'' SCOTT, 
+DANIEL E. LUNGREN, California        Virginia
+J. RANDY FORBES, Virginia            STEVE COHEN, Tennessee
+TED POE, Texas                       HENRY C. ``HANK'' JOHNSON, Jr.,
+JASON CHAFFETZ, Utah                   Georgia
+TIM GRIFFIN, Arkansas                PEDRO PIERLUISI, Puerto Rico
+TOM MARINO, Pennsylvania             JUDY CHU, California
+TREY GOWDY, South Carolina           TED DEUTCH, Florida
+SANDY ADAMS, Florida                 DEBBIE WASSERMAN SCHULTZ, Florida
+BEN QUAYLE, Arizona                  SHEILA JACKSON LEE, Texas
+                                     MIKE QUIGLEY, Illinois
+
+                     Caroline Lynch, Chief Counsel
+
+                     Bobby Vassar, Minority Counsel
+                            C O N T E N T S
+
+                              ----------                              
+
+                            JANUARY 25, 2011
+
+                                                                   Page
+
+                           OPENING STATEMENTS
+
+The Honorable F. James Sensenbrenner, Jr., a Representative in 
+  Congress from the State of Wisconsin, and Chairman, 
+  Subcommittee on Crime, Terrorism, and Homeland Security........     1
+The Honorable Robert C. ``Bobby'' Scott, a Representative in 
+  Congress from the State of Virginia, and Ranking Member, 
+  Subcommittee on Crime, Terrorism, and Homeland Security........     2
+The Honorable Lamar Smith, a Representative in Congress from the 
+  State of Texas, and Chairman, Committee on the Judiciary.......     4
+The Honorable John Conyers, Jr., a Representative in Congress 
+  from the State of Michigan, and Ranking Member, Committee on 
+  the Judiciary..................................................     5
+
+                               WITNESSES
+
+Mr. Jason Weinstein, Deputy Assistant Attorney General, United 
+  States Department of Justice, Washington, DC
+  Oral Testimony.................................................     6
+  Prepared Statement.............................................     9
+Mr. John M. Douglass, Chief of Police, Overland Park, KS; 
+  International Association of Chiefs of Police, Alexandria, VA
+  Oral Testimony.................................................    16
+  Prepared Statement.............................................    18
+Ms. Kate Dean, Executive Director, United States Internet Service 
+  Provider Association, Washington, DC
+  Oral Testimony.................................................    23
+  Prepared Statement.............................................    25
+Mr. John B. Morris, Jr., General Counsel, Center for Democracy 
+  and Technology, Washington, DC
+  Oral Testimony.................................................    34
+  Prepared Statement.............................................    36
+
+          LETTERS, STATEMENTS, ETC., SUBMITTED FOR THE HEARING
+
+Prepared Statement of Ernie Allen, President and CEO, The 
+  National Center for Missing & Exploited Children, submitted by 
+  the Honorable F. James Sensenbrenner, Jr., a Representative in 
+  Congress from the State of Wisconsin, and Chairman, 
+  Subcommittee on Crime, Terrorism, and Homeland Security........    56
+
+                                APPENDIX
+               Material Submitted for the Hearing Record
+
+Prepared Statement of the Honorable Henry C. ``Hank'' Johnson, 
+  Jr., a Representative in Congress from the State of Georgia, 
+  and Member, Subcommittee on Crime, Terrorism, and Homeland 
+  Security.......................................................    77
+Prepared Statement of the Honorable Ted Deutch, a Representative 
+  in Congress from the State of Florida, and Member, Subcommittee 
+  on Crime, Terrorism, and Homeland Security.....................    81
+
+
+ DATA RETENTION AS A TOOL FOR INVESTIGATING INTERNET CHILD PORNOGRAPHY 
+                       AND OTHER INTERNET CRIMES
+
+                              ----------                              
+
+
+                       TUESDAY, JANUARY 25, 2011
+
+              House of Representatives,    
+              Subcommittee on Crime, Terrorism,    
+                             and Homeland Security,
+                                Committee on the Judiciary,
+                                                    Washington, DC.
+
+    The Subcommittee met, pursuant to notice, at 10 a.m., in 
+room 2141, Rayburn House Office Building, the Honorable F. 
+James Sensenbrenner, Jr. (Chairman of the Subcommittee) 
+presiding.
+    Present: Representatives Sensenbrenner, Smith, Gohmert, 
+Goodlatte, Lungren, Poe, Griffin, Marino, Adams, Quayle, Scott, 
+Conyers, Johnson, Chu, Deutch, Wasserman Schultz, and Quigley.
+    Staff Present: (Majority) Caroline Lynch, Subcommittee 
+Chief Counsel; Arthur Radford Baker, Counsel; Sam Ramer, 
+Counsel; Lindsay Hamilton, Clerk; (Minority) Bobby Vassar, 
+Subcommittee Chief Counsel; Liliana Coronado, Counsel; Ron 
+LeGrand, Counsel; and Veronica Eligan, Professional Staff 
+Member.
+    Mr. Sensenbrenner. The Subcommittee will come to order. 
+Welcome to the first hearing in the 112th Congress of the 
+Subcommittee on Crime, Terrorism and Homeland Security.
+    I would especially like to welcome our witnesses and thank 
+you for joining us today.
+    I am joined today by my colleague from Virginia, the 
+distinguished Ranking Member of the Subcommittee, Bobby Scott; 
+by the Chairman of the full Committee, Lamar Smith from Texas; 
+and the Chairman emeritus, John Conyers of Michigan.
+    Today's hearing examines the role of data retention as a 
+law enforcement tool to investigate the distribution of child 
+pornography on the Internet and other online crimes. Many 
+Internet Service Providers, ISPs currently retain data that can 
+be used to identify the operator or user of an illegal Web 
+site. But not all ISPs retain this important data, and the 
+length of time such data is retained often varies from one 
+provider to the next.
+    The issue of data retention is not new. In 1999, then 
+Deputy Attorney General Eric Holder said that certain data must 
+be retained by ISPs for reasonable periods of time so that it 
+can be accessible to law enforcement. In the 12 years since Mr. 
+Holder's endorsement of data retention by ISPs, the size, scope 
+and accessibility of the Internet has increased exponentially. 
+The criminals can now use the Internet to facilitate almost any 
+crime, including illegal gambling, cigarette and prescription 
+drug distribution, and child exploitation. These criminals have 
+the luxury of cloaking themselves in the anonymity that the 
+Internet provides, making their apprehension significantly more 
+difficult.
+    When law enforcement officers begin an investigation and 
+develop information that will assist in identifying an 
+offender, they are often frustrated to find that information 
+relating describer information or information that would 
+otherwise identify the perpetrator is not retained in a uniform 
+manner. Current law already requires providers to preserve such 
+data upon the request of law enforcement, but the preservation 
+of data only works if the data has been retained.
+    Internet crimes are often complex, multi-jurisdictional and 
+international. This can result in protracted investigations 
+before law enforcement officers are in a position to request 
+data from the providers. When the information is developed 
+sufficiently to point investigators to the records they need, 
+it may be too late. Without uniform retention, the records that 
+are desperately needed to attribute communications to a certain 
+person or computer may be lost forever.
+    This issue not only impacts Federal investigations of 
+online crimes and national security matters but State and local 
+law enforcement investigations as well.
+    The International Association of Chiefs of Police adopted a 
+resolution in 2006 expressing its support for data retention to 
+aid in the investigation of crimes facilitated or committed 
+through the use of the Internet and telephony-based 
+communication services. Providing law enforcement officers with 
+an expectation that certain data will be available ensures that 
+our very limited police resources are properly assigned and are 
+not sent on wild goose chases for information that no longer 
+exists.
+    Simply put, no matter what type of investigation it is, 
+investigators ultimately have to identify the person at the 
+keyboard. The service providers hold the key to identifying the 
+person behind the screen name, an e-mail address or an Internet 
+protocol address. Retention of their records is paramount to 
+fighting crime in an Internet age.
+    It is now my pleasure to recognize for his opening 
+statement, the Ranking Member of the Subcommittee, the 
+gentleman from Virginia, Mr. Scott.
+    Mr. Scott. Thank you, Mr. Chairman, and I look forward to 
+working with you, as the new Chairman of the Subcommittee. 
+Today's hearing is meant to be an informational and fact-
+finding proceeding to help us begin the conversation about the 
+desirability, feasibility and consequences of retaining data 
+regarding a consumer's Internet use.
+    No one disputes that mandated data retention can help the 
+identification and prosecution of those who engage in 
+trafficking of child pornography on the Internet. The question 
+is whether we--the question we should seek to answer however is 
+how we can best investigate such crimes, consistent with the 
+rights and liberties of all in society and consistent with the 
+cost-benefits of such a policy.
+    While we want to ensure the legitimate needs of law 
+enforcement are met to allow to investigate and prosecute 
+offenders who use the Internet to commit crimes, particularly 
+those who use it to commit sex crimes against children, it is 
+critical to understand the nature and scope of any problem 
+under current law before we purport to fix it.
+    Currently many companies already retained significant 
+amounts of subscriber data, some up to 12 months. Nonetheless 
+there is lack of empirical research about law enforcement's 
+requests under current law and the instances in which data is 
+not available.
+    We should also review what law enforcement is doing with 
+information that they presently have. I have been informed that 
+the private industry already forwards over 100,000 leads a year 
+to law enforcement, and less than 10,000 prosecutions have been 
+brought in the last 3 years. If we are looking for the 
+proverbial needle in a haystack, the last thing we need is more 
+hay.
+    As we review the current situation, we should also 
+recognize that there is a lack of clarity about the types 
+requests that law enforcement is presently making and whether 
+much of the desired information is already available.
+    For these reasons, we should consider whether we need a 
+comprehensive study of data retention, including current 
+practices and the costs associated with the various proposals 
+of data retention policy, among other questions. Some of the 
+questions are, what kind of data we are talking about 
+retaining, whether it is all the content or just the site 
+information? This way we will ensure that the public policy 
+ultimately adopted will be an evidence-based, cost-effective 
+policy.
+    But apart from technological and practical issues that must 
+be addressed, if we are to consider such policy, there are 
+other costs, societal costs, associated with data retention. 
+There are approximately 230 million Americans who use the 
+Internet, and there are serious privacy and First Amendment 
+concerns that are implicated in this discussion. We must ask 
+ourselves whether it is prudent to require telecommunications 
+companies to retain large amounts of personal and sensitive 
+information, which would be attractive targets for computer 
+hackers, about millions of Internet users in order to get a 
+miniscule number of users who engage in crimes against children 
+online. We need to consider alternative policies that 
+specifically target those suspected of wrongdoing without 
+requiring that innocent consumers compromise their rights to 
+privacy and free speech when they choose to use the Internet.
+    The notion of preserving large amounts of what amounts to 
+be virtual potential crime scenes is a backward and possibly 
+ineffective way to go about going about the important business 
+of protecting our children. This is particularly true when the 
+unintended collateral consequences of such a policy on 
+industry, private interests, and on free speech may be 
+substantial, as some of the witnesses will explain today.
+    And when we consider the rights of privacy about retained 
+data, we should also consider--we should also take the 
+opportunity to consider retaining information on gun purchases 
+by those enjoying their Second Amendment rights.
+    Final point to keep in mind in our discussion is that 
+several aspects of the mandated data retention policy run 
+counter to the idea that we should always consider the cost-
+benefit implications of any new regulations. Data retention 
+policy can be expensive. This is a huge government expense. And 
+just to get a sense of the possible costs, Congress 
+appropriated $500 million to implement the Communications 
+Assistance Law Enforcement Act a few years ago. This did not 
+involve ongoing costs such that data retention will. Should the 
+industry be expected to absorb some of the costs, we should be 
+clear about what the costs are and what the benefits will be.
+    So I look forward to hearing testimony from our witnesses 
+and hope we can have a productive conversation about the 
+complexities of data retention policies.
+    Thank you, Mr. Chairman, for holding the hearing today.
+    Mr. Sensenbrenner. Thank you, Mr. Scott.
+    The Chair now recognizes the distinguished Chairman of the 
+Committee, the gentleman from Texas, Mr. Smith.
+    Mr. Smith. Thank you, Mr. Chairman.
+    Mr. Chairman, like you, I thank our witnesses for being 
+here today, and it is nice to be on the same side as the 
+Administration, or maybe I should say, I am glad they are on 
+our side, but it works well regardless.
+    Also I want to mention, Mr. Chairman, that I heard Mr. 
+Scott's remarks right now, and I am absolutely confident that 
+we will be able to find that balance between protecting privacy 
+and also protecting children. Mr. Scott mentioned having a 
+productive conversation on that subject, and I look forward to 
+that as well.
+    Mr. Chairman, it may be difficult to believe, but according 
+to the U.S. Justice Department, trafficking of child 
+pornography images was almost completely eradicated in America 
+by the mid-1980's. Purchasing or trading child pornography 
+images was risky and almost impossible to undertake.
+    The advent of the Internet reversed this accomplishment. 
+Today child pornography images litter the Internet, and 
+pedophiles can purchase, view or exchange this disgusting 
+material with virtual anonymity.
+    Parents who once relied on the four walls of their homes to 
+keep their children safe are now faced with a new challenge. 
+The Internet has unlocked the doors and opened windows into our 
+homes. FBI Director Robert Mueller told this Committee in April 
+2008 that, ``Just about every crime has gravitated to the 
+Internet, and in certain cases the Internet has provided the 
+vehicle for expansion that otherwise would not be there, and 
+this is certainly true with child pornography.''
+    The statistics reflect just how serious the problem of 
+child exploitation has become. Since the National Center for 
+Missing & Exploited Children, NCMEC, created the cyber tip line 
+12 years ago, electronic service providers have reported almost 
+8 million images and videos of sexually exploited children. 
+According to that organization, child porn images increased 
+1,500 percent between 1995 and 2005, an average increase of 
+over 100 percent a year. The number of reports to a cyber tip 
+line of child pornography, child prostitution, child sex 
+tourism, child sexual molestation, and online sex enticement of 
+children increased from 4,500 in 1998 to 102,000 in 2008. An 
+average increase of over 200 percent per year.
+    As many as one in three kids have received unsolicited 
+sexual content online, and one in seven children has been 
+solicited for sex online. More robust data retention will 
+certainly assist law enforcement investigators on a wide array 
+of criminal activity, but such a requirement would be 
+especially helpful in the investigation of child pornography 
+and other child exploitation matters. The investigation of 
+these types of cases has become increasingly more complicated, 
+and perpetrators have become increasingly more sophisticated in 
+their methods of concealing their activities.
+    When law enforcement officers do develop leads that might 
+ultimately result in saving a child or apprehending a 
+pornographer, their efforts should not be frustrated because 
+vital records were destroyed simply because there was no 
+requirement to retain them. Every piece of discarded 
+information could be the footprint of a child predator.
+    Last Congress I introduced the Internet Stopping Adults 
+Facilitating the Exploitation of Today's Youth, SAFETY, Act of 
+2009. Among other things, the bill required providers to retain 
+records pertaining to the identity of an IP address user for at 
+least 2 years. It ensures that the online footprints of 
+predators are not erased.
+    Data retention preserves critical evidence from the online 
+crime scene so that investigators can apprehend the predator 
+and potentially save a child from further exploitation.
+    The Internet has proved to be of great value in many 
+aspects of our lives, but it has also evolved into a virtual 
+playground for sex predators and pedophiles, and facilitated 
+nearly effortless trafficking of child pornography. The loss of 
+a child's innocence or, even worse, their life is simply too 
+high a price to pay for not retaining certain data for a 
+reasonable amount of time.
+    I look forward to hearing from our witnesses and working 
+with them to combat one of fastest growing crimes in America.
+    Thank you, Mr. Chairman, I yield back.
+    Mr. Sensenbrenner. The Chair now recognizes the 
+distinguished new Chairman emeritus of the full Committee, the 
+speaker being the old Chairman emeritus, the gentleman from 
+Michigan, Mr. Conyers.
+    Mr. Conyers. Thanks, Chairman Sensenbrenner.
+    It is with some reluctance that I join the rank of ex-
+Chairmen like you, but here we are all together, working.
+    This bipartisan thing is really getting frightening because 
+we are all waiting with anticipation tonight at 8 o'clock to 
+find out just how far the 44th is carrying this thing.
+    Already Chairman Smith and the Department of Justice have 
+hooked up people like the Constitution Project, ACLU, and David 
+Cole; I won't mention myself, because I will be sitting next to 
+a Republican tonight, and I don't want to get any flack. But I 
+suppose this hearing is very necessary, but I am impressed with 
+what the Center for Democracy and Technology is doing, along 
+with the other dissidents that I have listed.
+    I am worried about privacy rights. And data retention 
+creates, as Bobby Scott has said, it creates some big problems, 
+including identity theft. I think the Internet industry ought 
+to be concerned about this, and let's see where we can go on 
+it.
+    Now if this cooperation continues in the Committee, this 
+Subcommittee, we have got to look at the Federal prison system. 
+There are a number of other projects that perhaps the 
+Department of Justice and the Subcommittee on Crime can be 
+working on. I look forward to working with all of you on this 
+subject.
+    Thanks, Chairman Sensenbrenner.
+    Mr. Sensenbrenner. Thank you very much.
+    Without objection, other Members' statements will be made a 
+part of the record.
+    And without objection, the Chair will be authorized to 
+declare recesses during votes in the House.
+    It is now my pleasure to introduce today's witnesses.
+    Jason Weinstein serves as deputy assistant attorney general 
+with the Department of Justice. He has also served as a special 
+investigative counsel in the Justice Department's Office of the 
+Inspector General and as assistant U.S. attorney in the 
+southern district of New York. Mr. Weinstein previously served 
+as chief of the Violent Crime Section in the U.S. Attorney's 
+Office in Baltimore where he developed Project Exile, a multi-
+agency effort to curb violent crime in that state. He received 
+has Bachelors of degree in politics from Princeton and his J.D. 
+From George Washington University Law School in 1994.
+    Without objection, Mr. Weinstein's statement and the other 
+witness's statements will appear in the record.
+    Each witness will be recognized for 5 minutes to summarize 
+their written statement, and the Chair recognizes Mr. 
+Weinstein. 
+
+    TESTIMONY OF JASON WEINSTEIN, DEPUTY ASSISTANT ATTORNEY 
+  GENERAL, UNITED STATES DEPARTMENT OF JUSTICE, WASHINGTON, DC
+
+    Mr. Weinstein. Good morning, Chairman Sensenbrenner, 
+Chairman Smith, Chairman Emeritus Conyers, and Ranking Member 
+Scott, and Members of the Subcommittee.
+    And Mr. Chairman, although I was rooting for the Bears, let 
+me congratulate you on the Packers making the Super Bowl.
+    Mr. Sensenbrenner. You are forgiven.
+    Mr. Weinstein. As we all know, the explosive growth of the 
+Internet and other modern forms of communication has 
+revolutionized nearly every aspect of our lives, but at the 
+same time, it has also revolutionized crime.
+    Increasingly the Internet and other forms of electronic 
+communication are exploited by criminals to commit a staggering 
+array of crimes, from hackers who steal tens of millions of 
+bank card numbers to gang members who issue orders to murder 
+their rivals to predators who sexually abuse children and post 
+images of that abuse online and, of course, to terrorists.
+    These criminals take advantage of the Internet because of 
+its global nature and because of the speed with which it allows 
+them to operate. Unfortunately, as an added benefit to them, 
+the Internet also affords them a kind of anonymity.
+    Federal, State and local law enforcement officers who 
+investigate and prosecute these crimes need to have certain 
+information about the identities and the activities of these 
+criminals who commit them in order to identify and arrest the 
+perpetrators. That information is noncontent data; that is, it 
+is data about the criminals and their communications with 
+others as opposed to the content of those communications.
+    The government, under current law, is allowed to use lawful 
+process, which is typically a subpoena, a court order or search 
+warrant, to require providers to furnish that data. But those 
+authorities are only useful if the data is still in existence 
+at the time the government seeks to obtain it. And for that 
+reason, data retention by companies that provide the public 
+with Internet and other communication services is fundamental 
+to our ability to protect public safety.
+    Currently, despite the diligent and efficient work by law 
+enforcement officers at all levels, critical data has too often 
+been deleted by providers before law enforcement can obtain 
+that lawful process. This gap between providers' retention 
+practices and the needs of law enforcement can be extremely 
+harmful to investigations that are critical to protecting the 
+public from predators and other criminals.
+    And the problem is exacerbated by the complexity of 
+investigating crimes committed using online means. These crimes 
+are difficult to detect, and they may not be discovered or 
+reported to law enforcement until months and months have gone 
+by.
+    And they are even more difficult to investigate. They often 
+involve the time-consuming process of obtaining evidence from 
+overseas. They often require months and months of work 
+obtaining records from a series of providers as agents attempt 
+to follow the trail of steps used by criminals to try to cover 
+their tracks and render themselves anonymous.
+    Unfortunately, when providers have not retained the data 
+that is needed for a sufficient period of time, important 
+investigations of serious crimes may come to a dead end. To be 
+sure, most providers are cooperative with law enforcement, and 
+for that, we are appreciative. Many providers, in fact, already 
+collect the types of data that we need to solve crimes, because 
+they use that data to operate their networks or for other 
+commercial purposes. The problem is often simply that that data 
+is not retained long enough to meet the needs of public safety.
+    However, some providers simply don't retain the needed data 
+at all. Provider retention policies that are in place vary 
+widely across the industry, and they are subject to change at 
+will. In short, the lack of adequate, uniform and consistent 
+data retention policies threatens our ability to use the legal 
+tools Congress has provided to law enforcement to protect 
+public safety.
+    Now, in setting the retention policies and practices, 
+companies are often motivated by a completely understandable 
+desire to control costs and to protect the privacy of their 
+users. But those factors must be balanced against the cost to 
+public safety of allowing criminals to go free. And truly 
+protecting privacy requires not only that we keep personal 
+information from the criminals who seek to steel it but also 
+that we ensure that law enforcement has the data that it needs 
+to catch and prosecute those same criminals.
+    Developing an appropriate and effective data retention 
+requirement will mean balancing all of the interests involved: 
+balancing the impact on privacy, the provider costs associated 
+with retaining data for longer periods, and the cost to public 
+safety when critical data noncontent data has been deleted. 
+Congress has a critical role to play in fostering that 
+discussion and in balancing those interests, and today's 
+hearing is an important step in that process.
+    As we embark on this discussion, it is important to be 
+clear that this debate is not about giving the government, not 
+about giving law enforcement new authorities. It is simply 
+about making sure that data is available when law enforcement 
+seeks to use the authorities that Congress has already 
+provided.
+    My primary goal here today is to explain the nature of the 
+public safety interest in data retention. Today I am not in a 
+position to propose a particular solution, but the Justice 
+Department looks forward to working with Congress, with 
+industry, and with other interested groups as we seek to 
+develop just such a solution.
+    I thank you for the opportunity to discuss this important 
+issue with you this morning, and I would be pleased to answer 
+your questions at the appropriate time.
+    [The prepared statement of Mr. Weinstein follows:]
+                 Prepared Statement of Jason Weinstein
+[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
+                               __________
+
+    Mr. Sensenbrenner. Thank you, Mr. Weinstein.
+    John M. Douglass serves as the chief of police for the 
+Overland Park Police Department in Kansas. He began his law 
+enforcement career with the Overland Park Police Department in 
+1973. He currently serves as cochair of the National Advisory 
+Committee for the Regional Computer Forensic Lab System. He has 
+served in numerous positions during his tenure with the 
+Overland Park Police Department as well as other various 
+professional positions, including the past president of the 
+Kansas Association of Chiefs of Police. Chief Douglass has 
+received numerous awards, including the Clarence M. Kelly Award 
+For Excellence in Criminal Justice Administration in 2000, the 
+Evelyn Wasserstrom Award and Clarence Barrow Peacekeeper Award. 
+Chief Douglass received his Bachelor's degree from the 
+University of Kansas and his Masters degree in public 
+administration also from the University of Kansas.
+    Mr. Douglass.
+
+TESTIMONY OF JOHN M. DOUGLASS, CHIEF OF POLICE, OVERLAND PARK, 
+KS; INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE, ALEXANDRIA, 
+                               VA
+
+    Chief Douglass. Thank you, Mr. Chairman, Members of the 
+Subcommittee.
+    As stated, my name is John Douglass, and I serve as the 
+chief of police in Overland Park, Kansas, a suburb of Kansas 
+City. I am here today on behalf of the International 
+Association of Chiefs of Police, representing over 20,000 law 
+enforcement executives in over 100 countries throughout the 
+world.
+    I am pleased to be here this morning to discuss the 
+challenges currently confronting the U.S. law enforcement 
+community and our need for further clarity on data retention 
+issues.
+    In the United States, there are more than 18,000 law 
+enforcement agencies and well over 800,000 officers who patrol 
+our State highways and streets of our communities each and 
+every day.----
+    Mr. Scott. Could you pull your microphone?
+    Chief Douglass. Yes, sir, I am sorry.
+    A great number of these officers also survey the Internet, 
+phone and data logs, and other electronic communication as they 
+investigate crimes. Each day Federal, State, and local tribal 
+law enforcement agencies are investigating cybercrime cases, 
+ranging from bank intrusions, to fraud, intellectual property, 
+terrorism, economic espionage and, unfortunately, innocent 
+images or child pornography crimes.
+    Data preservation is a key component in any investigation. 
+When criminals access the Internet through an ISP or Internet 
+Service Provider or they send text messages, e-mails and other 
+data, it creates important records and other information. In 
+every case where criminal or civil action is envisioned, there 
+is a clear need to preserve third-party logs and business 
+records related to these connections which specifically 
+demonstrate that a suspect's service provider is connecting 
+with a victim's service provider or through another 
+infrastructure en route.
+    When law enforcement suspects that a crime has been 
+committed, we request a subpoena, court order or search warrant 
+to obtain critical evidence from the service provider, such as 
+customer records, connection information or stored data.
+    Take, for example, a case from southern California which 
+would not have been solved without the cell phone data from 
+Verizon Wireless. On July 26th, 2006, 22-year old Tori Vienneau 
+and her 10-month infant son, Dean, were murdered in their two-
+bedroom apartment in San Diego. Tori was found strangled in her 
+living room, and Baby Dean was found strangled and hung from 
+his crib in one of the adjoining bedrooms.
+    This horrifying crime scene triggered an exhaustive 18-
+month investigation. The case was ultimately solved exclusively 
+by the circumstantial evidence, including cell text message 
+content and cell tower data from Verizon Wireless. The 
+defendant denied any involvement in the killings and provided 
+an intricate and extensive alibi.
+    Investigators focused their attention on Dennis Potts 
+almost immediately because he was rumored to have had dinner 
+plans with Tori on the night of her murder. Mr. Potts denied 
+these rumors of dinner plans, and the victim's cell phone was 
+examined for any text messages between the two of them 
+supporting or refuting such rumors.
+    In a most interesting twist, all incoming and outgoing text 
+messages prior to 6:30 p.m. on the night of the killings had 
+been deleted. The victim's cell phone provider was contacted, 
+but the text message content was not stored by the cell 
+provider and, therefore, could not be recovered that way.
+    Over the ensuing months, the victim's phone was subjected 
+to be extensive forensic analysis in the hopes of recovering 
+some of these message. The defendant's cell phone carrier, 
+Verizon Wireless, was also contacted, and investigators were 
+told incoming text message content, victim-to-defendant text 
+only, was preserved for only 3 to 5 days. But in a stroke of 
+good luck, this incoming data still existed and was preserved.
+    And it later proved to be pivotal in proving the 
+defendant's guilt. The text message content proved not only 
+that the defendant lied to investigators and that the two did 
+in fact have plans to meet that evening, but also that the 
+defendant was checking to see if the victim and her son were 
+alone in the apartment.
+    Verizon also provided the cell tower data from the 
+defendant's phone. This data, coupled with some additional 
+testing, showed the defendant's alibi was false, and he was not 
+where he said he was. Furthermore, at the time of the killings, 
+his cell phone pinged off a cell tower only 500 yards from the 
+victim's apartment. This became the single most important piece 
+of evidence in linking the defendant to the killings.
+    Clearly, preserving digital evidence is crucial in any 
+modern day criminal investigation. While law enforcement does 
+have success obtaining evidence through the appropriate legal 
+process, because we are extremely aware of spoliation concerns, 
+we are not always successful. Many times we face obstacles in 
+our investigations, from the differing locations of victims to 
+their locations of the perpetrators.
+    In closing, Federal, State, tribal and local law 
+enforcement are doing all that we can to protect our 
+communities from increasing crime rates and the specter of 
+terrorism both online and in our streets, but we cannot do it 
+alone. We need the full support and the assistance of the 
+Federal Government and clear guidance and regulations on data 
+retention to aid us in successfully investigating and 
+prosecuting the most dangerous of criminals.
+    [The prepared statement of Chief Douglass follows:]
+                 Prepared Statement of John M. Douglass
+[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
+
+                               __________
+
+    Mr. Sensenbrenner. Thank you very much, Chief.
+    Kate Dean serves as the executive director of the United 
+States Internet Service Provider Association. Ms. Dean has been 
+active in telecommunications and Internet policy in Washington, 
+D.C., for more than 10 years and is a member of the 
+International Academy of Digital Arts and Sciences. She started 
+her own firm in 2006, where, in addition to continuing to work 
+with US ISPA, she volunteers with an organization in Singapore 
+that brings healthy sanitation solutions to underserved 
+villages in the developing world. And he received her bachelor 
+degree in 2000 from American University.
+    Ms. Dean.
+
+   TESTIMONY OF KATE DEAN, EXECUTIVE DIRECTOR, UNITED STATES 
+     INTERNET SERVICE PROVIDER ASSOCIATION, WASHINGTON, DC
+
+    Ms. Dean. Chairman Sensenbrenner. Ranking Member Scott.
+    Mr. Sensenbrenner. Could you pull the mike a little closer 
+to you? 
+    Ms. Dean. I sure can.
+    Mr. Sensenbrenner. Thank you.
+    Ms. Dean. My name is Kate Dean, and I am the executive 
+director of the United States Internet Service Provider 
+Association or US ISPA. Since January 2002, our members major 
+Internet service, network and portal providers, have focused on 
+policy and legal concerns related to law enforcement compliance 
+and security matters, including ECPA, CALEA, cyber security and 
+notably the fight against online child exploitation. For years 
+US ISPA and our members have participated in efforts to examine 
+the issue of data retention, particularly in a content of child 
+exploitation, including past dialogues with the Department of 
+Justice and with State and local law enforcement.
+    We welcome the opportunity to continue the discussion 
+today. Before addressing data retention, I would like to tell 
+you about our efforts in the child protection arena. In 2005, 
+we published ``Sound Practices for Reporting Child 
+Pornography,'' a joint project between US ISPA and the National 
+Center for Missing & Exploited Children.
+    We updated those practices to reflect new requirements put 
+in place by the 2008 passage of the Protect Our Children Act, a 
+bill US ISPA strongly supported.
+    Last year we developed sound practices for subpoena 
+compliance with the National Association of Attorneys General. 
+We also supported the Online Safety and Technology Working 
+Group, which reported to Congress in June with their 
+examination of industry reporting practices and data retention.
+    US ISPA members have been active in various internet safety 
+task forces, including the Technology Coalition and the 
+Financial Coalition Against Child Pornography. Members maintain 
+24-by-7 response capabilities, offer law enforcement guides, 
+frequently interact with the ICAC and conduct training for 
+investigators and prosecutors.
+    As I hope our actions demonstrate, US ISPA is committed to 
+the fight against online child exploitation. And we support law 
+enforcement efforts to bring online criminals to justice, 
+especially those who harm children. We fully appreciate the 
+critical role that electronic evidence plays in those efforts.
+    Service providers report tens of thousands of incidents of 
+apparent child pornography each year to NCMEC. And because of 
+the Protect Our Children Act, all providers are now required to 
+sent robust reports, including subscriber information, 
+historical and geographic data, and the images themselves 
+through NCMEC's cyber tip line.
+    At the time of receipt, providers automatically preserve 
+the account and hold onto data for 90 days, awaiting legal 
+process. The novel approach to preservation adopted in the 
+reporting statute was derived from preservation authority that 
+has long existed in the Electronic Communications Privacy Act. 
+ECPA gives law enforcement the authority to require providers 
+to preserve evidence needed for investigations for up to 180 
+days without issuing legal process. We believe that effective 
+use of preservation, a targeted, valuable tool, is key to 
+addressing law enforcement's needs.
+    US ISPA has carefully examined past data retention 
+proposals and each time has concluded that a uniform retention 
+mandate is certain to present significant challenges to the 
+communications industry, as well as myriad unintended 
+consequences. These challenges include the potential conflict 
+of new obligations and regulatory burdens; new questions about 
+user privacy and the standards for law enforcement access to 
+stored data; technical and security risks; and delay when 
+retrieving data, all which could negatively effect law 
+enforcement investigations.
+    Many of these challenges have plagued the European Union's 
+attempt at implementation of its data retention directive. As 
+we discuss the issue here today, a similar dialogue is taking 
+place within the EU as they reassess their approach and 
+consider alternatives, like preservation.
+    Unlike preservation, data retention raises tough questions 
+about breadth, scope, duration, liability and costs, costs that 
+go well beyond mere dollars. These are all critical 
+considerations that require close examination by industry and 
+by Congress.
+    In closing, US ISPA remains committed to an open dialogue, 
+but we have concerns about the effectiveness and implementation 
+of mandatory data retention. We worry about the indirect costs 
+to innovation, privacy and the speed and accuracy of 
+investigations. Based on our experiences, we continue to 
+believe that targeted approaches like preservation are the best 
+and most effective use of available resources. We appreciate 
+this opportunity to present our views on this topic and look 
+forward to working with you and your staff.
+    [The prepared statement of Ms. Dean follows:]
+                    Prepared Statement of Kate Dean
+[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
+
+                               __________
+
+    Mr. Sensenbrenner. Thank you, Ms. Dean.
+    John B. Morris, Jr., serves as general counsel at the 
+Center for Democracy and Technology in Washington, D.C. He is 
+director of the Internet Standards Technology and Policy 
+Project. He is also involved in the Center for Democracy and 
+Technology's work on cyber security, privacy and neutrality. 
+Prior to joining the center, Mr. Morris was a partner in the 
+law firm of Jenner & Block. Additionally, Morris has served as 
+director of CDT's Broadband Access Project. He received his 
+Bachelors degree from Yale and his J.D. From Yale Law School. 
+Mr. Morris.
+
+ TESTIMONY OF JOHN B. MORRIS, JR., GENERAL COUNSEL, CENTER FOR 
+            DEMOCRACY AND TECHNOLOGY, WASHINGTON, DC
+
+    Mr. Morris. Thank you very much, Chairman Sensenbrenner, 
+Ranking Member Scott, Chairman Smith and Chairman Emeritus 
+Conyers and the Members of the Committee.
+    On behalf of the Center for Democracy and Technology, I 
+would like to thank you for the opportunity to testify today. 
+Child pornography is a horrific crime, and we applaud the 
+efforts by this Congress and this Subcommittee to increase the 
+resources available to prosecute this crime.
+    A data retention mandate would raise a number of serious 
+privacy and free speech concerns. At a time when there is a 
+growing concern about privacy and identify theft, a growing 
+concern about the commercial misuse of personal data and a 
+growing concern about the intrusion of the Federal Government 
+into the personal lives of American citizens, Congress should 
+be very hesitant to require service providers create databases 
+to track the Internet activities of 230 million innocent 
+Americans.
+    This morning I would like to set aside briefly the privacy 
+and free speech concerns that I addressed in my written 
+testimony and instead focus on the fact that a data retention 
+mandate would harm innovation and competition on the Internet 
+and harm the ability of the American Internet industry to 
+compete in the global online marketplace, which in turn 
+directly effects the ability of users to be able to participate 
+and speak on the online market.
+    Ms. Dean addressed the data retention concerns that the 
+Internet Service Providers have. Let me look at the other end 
+of the communication and then address proposals by law 
+enforcement that source data be retained by any online services 
+that allow users to communicate with each other. And the 
+proposal that has been made to have services like Yahoo or 
+Google or Facebook retain data is truly breathtaking and would 
+be devastating to the Internet services, both to existing 
+services and certainly to new innovators and startup services.
+    The reach of the proposal cannot be underestimated. The 
+proposed mandate that would reach most Web sites and online 
+services, including all Web 2.0 sites, all social networking 
+sites, all blogs, all sites that allow political or other 
+commentary, the great majority of e-commerce sites and almost 
+all modern news sites, like the NewYorkTimes.com or 
+FoxNews.com.
+    And the scale of what law enforcement is proposing is also 
+astounding. Looking just at Facebook as an example, Facebook 
+users post in the neighborhood of 2 billion chat messages every 
+single day. When combined with other postings, Facebook alone 
+would have to create and maintain a data retention database 
+containing more than 1 trillion new records every single year. 
+The size of Facebook's data retention database alone would be 
+larger than all of the content that the Library of Congress has 
+put online to date.
+    Looking beyond Facebook, in 2009, there were 247 billion e-
+mail messages sent every single day. And law enforcement is 
+asking Congress to order that every single one of these 
+messages be recorded and tracked. Over the course of a year, 
+this mandate would require a database of more than 90 trillion 
+records. And this does not even include chat or instant 
+messaging, which is supplanting e-mail as a preferred method of 
+person-to-person communications.
+    Who would pay for this? Internet users would pay for this. 
+And what would the impact of this burden be on online services? 
+Some larger companies might survive, but smaller companies 
+would likely be run out of business. Imposing an unfunded 
+Federal mandate on anyone who allows users to communicate 
+online can only have one result: There will be fewer businesses 
+able to compete in the online marketplace, this will entrench 
+the large providers, harm competition, harm innovation and 
+ultimately harm users. Congress should not mandate the creation 
+of an Orwellian tracking database with hundreds of trillions of 
+records tracking innocent citizens wherever they go online.
+    As a final critical point addressing the child pornography 
+context, I have worked in this space a fair amount over the 
+last 10 years, and every task force I serve on, every working 
+group I serve on, I learned that law enforcement is overwhelmed 
+with these cases. They don't have enough prosecutorial 
+resources to prosecute all of the cases that they have. And so 
+I really urge the Congress to look at the question as to 
+whether adding more data and more data retention will in fact 
+lead to more prosecutions of this horrific type of crime.
+    The voluntary retention and data preservation orders allow 
+law enforcement to target suspected criminals, and we urge the 
+Subcommittee not to go down the path of imposing data retention 
+mandates on this entire industry.
+    [The prepared statement of Mr. Morris follows:]
+               Prepared Statement of John B. Morris, Jr.
+[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
+                               __________
+
+    Mr. Sensenbrenner. Thank you, Mr. Morris.
+    The Chair has written down the approximate order of 
+appearances of the Members of the Subcommittee and will call on 
+Members for 5 minutes in the order in which they appeared, 
+alternatively by side.
+    And I will start by recognizing myself for 5 minutes.
+    And I want to direct my question to Ms. Dean. It seems to 
+me that one of the problems that exists in this area is that 
+there is not a uniform standard for how long the data has to be 
+retained. It varies by Internet Service Provider. Would your 
+association be willing to propose such a voluntary compliance 
+order, picking a time and cooperation with law enforcement for 
+the retention of this data in order to eliminate Congress 
+stepping in?
+    Ms. Dean. Thank you, Mr. Sensenbrenner, thank you Chairman.
+    First of all, I guess I should say that we are here today 
+because we are interested in the conversation, and we are 
+interested in all opportunities to sit down with law 
+enforcement and figure out if there is a solution to this 
+problem that they describe today.
+    US ISPA is always willing to be part of the dialogue with 
+law enforcement at all levels. And I think that the questions 
+that have been raised already today in opening statements are 
+really what we should have the discussion about. We really need 
+to learn more from law enforcement about the breadth of this 
+kind of a requirement. Who do they want to keep data and 
+specifically what kind of data do they want kept and for how 
+long?
+    Mr. Sensenbrenner. Well, let me say that I am a firm 
+believer in carrots and sticks, and I am tossing you a carrot 
+now. I think that there is a desire on the part of both the 
+Administration and Congress to legislate in this area. I am 
+giving you or tossing an oar for you to put in the water to try 
+to bring your industry together to deal with this problem on a 
+voluntary basis.
+    And Mr. Morris has had a whole long list of questions that 
+need to be answered. The fact is, is if you aren't a good 
+rabbit and don't start eating the carrot, I am afraid that we 
+are all going to be throwing the stick at you. So this is an 
+opportunity for you to come up with some kind of a solution to 
+all of the problems that both law enforcement and Mr. Morris 
+have discussed. Are you on board, or should I take the oar 
+back?
+    Ms. Dean. I can tell you that I have heard you, and I am 
+sure that my members have heard you as well, and they are 
+dedicated to this issue, and we will absolutely sit down with 
+law enforcement.
+    Mr. Sensenbrenner. Okay, we are listening.
+    I yield back the balance of my time.
+    The gentleman from Virginia, Mr. Scott.
+    Mr. Scott. Thank you.
+    Mr. Morris, you talked about the cost of this data 
+retention kind of in general, can you give something with a 
+dollar sign in front of it, percentage of sales? What are we 
+talking about in terms of cost?
+    Mr. Morris. Truthfully, Mr. Scott, I can't give you dollar 
+signs.
+    Mr. Scott. Well, some of these data retention services 
+retain huge amounts of data with negligible costs. Are we 
+talking about anything significant?
+    Mr. Morris. Yes. I think that simply the challenge of 
+creating a database that would allow access to literally 
+trillions of records is an enormous financial cost.
+    Mr. Scott. Can you give something with a dollar sign in 
+front of it, some numbers?
+    Mr. Morris. I can't. One dollar sign I can give is that the 
+vast majority of content and Web sites on the Internet are 
+available for free, for $0 to their users. And those sites are 
+very close to the line on a day-to-day basis as to whether they 
+will make money or not make money. And the extra cost of any 
+sort of Federal mandate would be very debilitating to those 
+sites.
+    Mr. Scott. Ms. Dean, you have been offered carrots and 
+sticks. Right now, is it true that your industry is providing 
+approximately 150,000 leads to law enforcement every year?
+    Ms. Dean. In terms of the reporting apparent incidences of 
+child pornography to the national center according to statutory 
+obligations, I believe the number is somewhere around there. 
+For the record, we could find out from NCMEC what the precise 
+number is.
+    But yes, service providers do report tens of thousands of 
+reports a year, and they are----
+    Mr. Scott. Now the way you reported, you have some kind of 
+mechanism where somebody is sending a picture, and you can 
+ascertain whether it fits a profile of what is known child 
+pornography and that goes right to law enforcement; is that 
+right?
+    Ms. Dean. Well, the standard that service providers are 
+required to transmit the images for referral to NCMEC is 
+apparent. We don't know what is and is not child pornography. 
+So when we, by either technical means or from user complaints, 
+come upon such material, we box it up with all of the 
+information that we have and transmit it to NCMEC.
+    Mr. Scott. Mr. Weinstein, when you get this information, 
+what do you do with it? I mean, you have got about 400,000 the 
+last couple of years; you have hundreds of thousands of leads. 
+Do you have the staff to follow through on those leads today?
+    Mr. Weinstein. Ranking Member Scott, let me actually 
+address both of those in order.
+    When law enforcement gets referrals from NCMEC, from the 
+national center, those referrals are distributed to law 
+enforcement at the Federal level, depending on the part of the 
+country that the referral comes from.
+    Under the PROTECT Act of 2008, there is a mandatory 90-day 
+retention period by ISPs that kicks in when those ISPs actually 
+discover or become aware of possible child pornography, and 
+they make a referral to the cyber tip line, as Ms. Dean 
+indicated.
+    The problem with that requirement, although it is a useful 
+tool, is that it is limited in its effectiveness. Number one, 
+it doesn't apply to other types of crimes beyond child 
+exploitation, but even just within the realm of child 
+exploitation, that obligation to retain and to report only 
+kicks in when the ISP has actually discovered or become aware 
+of the child pornography. And the statute doesn't impose any 
+obligation on the ISP to do any monitoring of the network or to 
+make any affirmative efforts to filed the child porn.
+    Mr. Scott. Wait a minute. Can you keep up with the tips 
+that you have coming in today? And you know that with across-
+the-board budget cuts, you are looking at a loss of potentially 
+thousands of FBI agents. Can you keep up with the tips that you 
+are getting today?
+    Mr. Weinstein. Well, it is fair to say that the scope of 
+the problem far outpaces the resources we have available to 
+fight it.
+    Mr. Scott. Now you mumbled something about all crimes, if 
+we pass something of data retention, is it true that this might 
+be used for all crimes, not just child pornography?
+    Mr. Weinstein. Well, it is my view that if Congress were to 
+go down this road and actually create a data retention 
+requirement, that it makes the most sense for it to apply to 
+all crimes not just to child exploitation.
+    Mr. Scott. And all of this information, now is the 
+information we are talking about just site specific or content 
+to include the content, because Mr. Douglass pointed out that, 
+without the content, that information would not have been 
+particularly helpful.
+    Mr. Weinstein. Well, it is actually the opposite that is 
+true, sir. It would not be content information that we would be 
+taking about. It would be----
+    Mr. Scott. Are we talking about retained--the policy, we 
+are kind of vague here because we don't have a bill in front of 
+us, but are you suggesting that we have content being preserved 
+or retained as well as just the site information?
+    Mr. Weinstein. No, I am talking about noncontent 
+information about Internet communications, so IP addresses that 
+are assigned to a user at the time of communication.
+    Mr. Scott. So if we had that, then what Mr. Douglass used 
+about reading the text messages wouldn't have been available.
+    Mr. Weinstein. Well, as I understand it, text messages are 
+generally not retained by providers.
+    Mr. Scott. Well, that is what we are talking about 
+retaining.
+    Mr. Weinstein. Well, the case Mr. Douglass talked about was 
+one in which text messages were crucial in solving the crime.
+    Mr. Scott. The content of the message was important.
+    Mr. Weinstein. Sure. The cases I am talking about, Mr. 
+Scott, are cases in which an Internet user----
+    Mr. Scott. Is it your proposal that content not be 
+retained?
+    Mr. Weinstein. Well, the Administration doesn't have a 
+proposal today, but I think that one of the issues that 
+Congress should engage in a discussion on is whether it should 
+include content. My own view is that the most useful 
+information to us in solving crimes is noncontent.
+    Mr. Scott. Okay. Now, if this information is available, 
+would it be--sitting up there, would it be available for 
+private subpoena, like in a divorce case?
+    Mr. Weinstein. Well, that is another issue that I think is 
+worth discussing, whether it is only available to law 
+enforcement or available to private litigants as well. My 
+primary interest, obviously, is making sure it is available to 
+law enforcement.
+    Mr. Scott. Would we need to, if we passed something like 
+this, turn around and have some regulations to protect privacy?
+    Mr. Weinstein. Again, I think that sort of--the questions--
+there are five or six questions that I think Congress should 
+ask as we engage in this discussion. Number one--and some of 
+these have already been alluded to. Number one is, what data 
+needs to be retained, the issue we have been discussing? Number 
+two is how long the data should be retained for. Number three 
+is, who would need to retain it? Number four is, who would have 
+access to it, the issue you just raised, whether it would be 
+law enforcement only or private litigants as well? And number 
+five is whether some additional protections for consumers are 
+necessary, whether those need to be legislated or something 
+industry can do on its own to enhance privacy and security of 
+their networks.
+    Mr. Scott. And Mrs. Dean is going to be very helpful in 
+making sure that we follow through and particularly helpful in 
+continuing to send you more information and more tips that you 
+can follow through on.
+    Mr. Sensenbrenner. Time of the gentleman has expired. The 
+Chair recognizes the gentleman from Texas, Mr. Poe, for 5 
+minutes.
+    Mr. Poe. Thank you, Mr. Chairman.
+    Ms. Dean, did you say that every year your business 
+supplies law enforcement 190,000 tips?
+    Ms. Dean. No. There is a statutory obligation under 18 
+U.S.C. 2258(a), that required ECS and RCS providers--we will 
+call them service providers today. So it is much broader----
+    Mr. Poe. How many? Cut to the chase. How many do you 
+provide?
+    Ms. Dean. I think last year it was over 140,000.
+    Mr. Poe. One hundred and forty thousand. Those go to whom, 
+local, Federal?
+    Ms. Dean. They go to the National Center for Missing & 
+Exploited Children, according to statute, and NCMEC are the 
+experts, and they deal with it from there. They refer it out to 
+the proper jurisdiction.
+    Mr. Poe. Mr. Weinstein, how many Federal cases were made on 
+child pornography in 2010 or 2009? Give me a figure that I can 
+understand.
+    Mr. Weinstein. I would be happy to, Congressman, I just 
+don't have it available. I find as I enter my 40's, my own 
+personal data retention is not what it should be. But I would 
+be happy to provide a number to you.
+    Mr. Poe. I mean, can you give me a ball park figure? It 
+wasn't 145,000, was it? 
+    Mr. Weinstein. No, I don't believe it was 145,000.
+    Mr. Poe. How many cases? Do you have any idea?
+    Mr. Weinstein. I don't and I would also want to be able to 
+get you that information at the local level, too. As you know, 
+a great many of these cases are prosecuted by State and local 
+law enforcement and are pursued by the ICAC task force, which 
+the Department helps fund and which exists in every State in 
+the United States.
+    Mr. Scott. Would the gentleman yield?
+    Mr. Poe. I will yield.
+    Mr. Scott. Thank you. There is a report from the Department 
+of Justice, the list is 8,352 in the last 4 years.
+    Mr. Poe. Reclaiming my time. So it is about 2,000 a year.
+    Chief Douglass, how many cases, since you are the chief, do 
+you know how many cases local law enforcement has made in any 
+given period of time?
+    Chief Douglass. Mr. Poe, I can't give you a specific 
+number. I can tell you, however, that we have--in Overland 
+Park, it is a city of 170,000 people, and we have a three-man 
+or three-person unit person working on it full time. And as far 
+as I know, none of those cases came through the channels we are 
+talking about. So they are working on their own leads in 
+significant numbers.
+    Outside of the arena, we are talking in a Federal sphere. 
+The exact number I can't give you. But I can tell you we are 
+working several peer-to-peer cases, two to three to four, every 
+single month just in Overland Park.
+    Mr. Poe. Can you supply the Committee with that data?
+    Chief Douglass. Yes, sir, I will.
+    Mr. Poe. And Mr. Weinstein, can you as well supply that?
+    Mr. Weinstein. I will, yes, sir.
+    Mr. Poe. Appreciate that.
+    I am concerned about the overbroad idea of Federal 
+legislation in any area.
+    Certainly I think people that engage in this type of 
+criminal activity ought to get their day in court before a jury 
+as often as possible.
+    But do you see any Federal concerns, constitutional 
+concerns, Mr. Weinstein, since you are encouraging us to come 
+up with some kind of legislation about the overbroad concept of 
+more storage of personal information?
+    Mr. Weinstein. Congressman, the way I approach the issue is 
+this, to the extent that the collection of data creates privacy 
+risks or creates risks to people's anonymity, those risks exist 
+today right now. Much of the noncontent data that we are 
+talking about here today, that law enforcement needs to solve 
+these crimes is already being retained right now by a large 
+number of communication providers for their own commercial and 
+marketing purposes, and that includes ISPs. That includes the 
+New York Times. That includes a lot of Web sites that you visit 
+every day.
+    A mandatory data retention requirement would only extend 
+that retention time to make sure that it was applied 
+universally across industry.
+    To the extent that there are risks to privacy from those 
+databases existing, those risks exist on day 1 when you open 
+your account; they exist on day 30, day 60, day 90 day 180, day 
+365. Whether a provider keeps the data for a day or a year, the 
+provider has an obligation to protect that data. There is no 
+system that is foolproof, but responsible providers take steps 
+to safeguard the networks, and we can always do more.
+    In terms of the impact on privacy of law enforcement having 
+access to that data, as I said in my opening remarks, what we 
+are not talking about, expressly not talking about, is in any 
+way increasing the authority of law enforcement to get that 
+data. The authorities Congress has already provided and that we 
+exercise consistent with statute and constitutional obligations 
+every day are the same authorities that will govern our access 
+to these expanded databases or these databases that are kept 
+for longer periods of time. We cannot--law enforcement cannot 
+obtain that data unless lawful process is used, and that would 
+continue to be the case.
+    The ultimate safeguard against law enforcement abuse is 
+that we are subject to be supervision of Congress, of the 
+courts, of the Department of Justice, and prosecutors' ethical 
+obligations to make sure that they use the lawful authorities 
+properly and in accordance with the Constitution.
+    Mr. Poe. Thank you, Mr. Chairman.
+    Mr. Sensenbrenner. The gentleman from Michigan, Mr. 
+Conyers.
+    Mr. Conyers. Thank you, Mr. Chairman.
+    This has been a very useful hearing and what I want to 
+propose to you, Chairman Sensenbrenner, why don't we--the 
+question is always, where do we go from here? Why don't we get 
+the Smith proposal and my proposal and meet with Eric Holder 
+and the deputy assistant attorney general and come up with a 
+bill and let's just move it along.
+    We can study this, you know. We are pretty good at studying 
+things, but----
+    Mr. Sensenbrenner. Would the gentleman yield?
+    Mr. Conyers. Of course.
+    Mr. Sensenbrenner. I would be happy to participate in that 
+meeting, but it seems to me you are yanking the carrot away 
+from Ms. Dean.
+    Mr. Conyers. Well, the Humane Society may be looking for 
+you pretty soon anyway with this carrot and stick approach. It 
+has raised some very interesting questions, Mr. Chairman.
+    But I think we all see where we are going here. It is not 
+like this hasn't been worked on before. So I offer that 
+proposal for your examination and, hopefully, action.
+    Now John Morris, were you shocked as I was when the deputy 
+assistant attorney general began to theorize about how far we 
+could carry this business? I mean, I thought he would be a 
+little bit more restrained in trying to get us on board, but he 
+has left the door open for this to go all the way.
+    Mr. Morris. Well, certainly there have over the years been 
+a number of proposals for data retention that have always been 
+targeted at child exploitation cases, which are certainly, I 
+agree, among the worst of the worst cases out there. But I 
+think that is one concern we have always had about those 
+proposals, is that that simply would open the door to broad 
+data retention applying to even, you know, to the broad range 
+of cases. So, yes, it is a very serious concern that I have 
+that we are talking about.
+    Mr. Conyers. So he didn't surprise you?
+    Mr. Morris. I am afraid it didn't surprise me that that is 
+the direction that law enforcement is going, yes.
+    Mr. Conyers. Do you have any defense at all to offer, 
+Weinstein?
+    Mr. Weinstein. Well, I must say, I don't think I have ever 
+been referred to as ``unrestrained'' before. So I apologize if 
+I gave that impression, Mr. Chairman Emeritus.
+    To be clear, the government doesn't have a specific 
+proposal. My purpose here today is to emphasize to you law 
+enforcement's concern about the lack of the data and to flag 
+the issues----
+    Mr. Conyers. So when are you going to get a proposal? How 
+many years is this going to take?
+    Mr. Weinstein. I don't know where we are exactly in the 
+process of developing a proposal, but we are here today and we 
+are committed to engaging in this conversation with you and 
+with the entities represented by the other people on the panel.
+    Mr. Conyers. Well, I am going to call Eric Holder right 
+after this hearing and see if we can get this moving. I mean 
+there are a lot of things to study in the Crime Subcommittee, 
+but I don't think we need a whole lot of time on this. And 
+besides, why don't you take advantage of the bipartisanship 
+that is raging all over the 112th Congress?
+    Mr. Weinstein. I certainly think that in a lot of areas, we 
+should take advantage of that bipartisanship.
+    If I could, just to be clear, there are a number of 
+permutations of this that could be done in terms of the type of 
+providers that are covered, the type of information that is 
+covered, the length of time, whether it is 30 days, 60 days, 6 
+months, a year or more. As you know, the European Union has a 
+data retention directive that its member states have been 
+ordered to implement where data is retained for a minimum of 6 
+months and maximum of 2 years. Within that range there are a 
+number of possibilities, and also in terms of the scope of the 
+crimes covered, there are a number of possibilities. We don't 
+endorse any particular one of them, although, as I said, we are 
+eager to participate in this process going forward and to come 
+up with a proposal that we think balances all those costs.
+    I should also be clear, we completely understand that there 
+are costs imposed. While data storage costs are dropping 
+dramatically, there will be costs imposed if data has to be 
+retained longer than it currently is being retained. There is 
+no doubt about that. And one of the greatest costs will be data 
+retrieval in response to requests from law enforcement, 
+although if we follow the practice that we do currently those 
+costs will to a large extent be reimbursed.
+    At the same time, I didn't mean in my remarks earlier to 
+suggest that we don't think privacy is an issue. My only point 
+is only that the privacy risk exists currently. The point here 
+is to try to find a balance among all three interests, and I am 
+confident we can do that.
+    Mr. Sensenbrenner. The gentleman from Virginia, Mr. 
+Goodlatte.
+    Mr. Goodlatte. Thank you, Mr. Chairman, and thank you for 
+holding this hearing. This is an issue that is of keen interest 
+to me. I have long worked with Chairman Smith and Chairman 
+Sensenbrenner and others on the issue of child pornography and 
+other related issues on the Internet. Sometimes we have had 
+successes. Sometimes the Court has set us back, but it is a 
+concern and an ongoing effort.
+    I have also spent a lot of time meeting with leaders over 
+the years from the European Union and urged them not to impose 
+a hard 2-year data retention requirement. The European Union 
+sort of found not quite a 2-year requirement. It requires that 
+the ISPs retain data for a period of between 6 months and 2 
+years, and the EU has faced a great deal of difficulty in 
+implementing this requirement.
+    So it seems to me that if there is a lot of interest in 
+this issue--and I share some of the concerns expressed by Ms. 
+Dean and Mr. Morris and the problems that will ensue--it seems 
+to me that the first place we ought to look is what the 
+experience of the European Union is. And Ms. Dean, would you 
+care to comment on that? And I will ask Mr. Weinstein, too.
+    Ms. Dean. Well, I think that the experience in the European 
+Union and the fact that they have had to come back to the table 
+recently and they are reassessing their original approach begs 
+that maybe we should look to a different approach for the 
+United States. Certainly in different member states, the 
+implementing legislation in the EU has been ruled 
+unconstitutional, and I think that asks us to really come back 
+to the table and look at innovative approaches, things like 
+preservation.
+    Mr. Goodlatte. Thank you. Mr. Weinstein?
+    Mr. Weinstein. Yes, Congressman. My understanding--although 
+I must say I can't speak with expertise about the state of 
+affairs in the EU--but my understanding is that the European 
+Court of Justice in 2009 ruled that the directive I referred to 
+earlier was legal. There have been some issues with the 
+implementing legislation, as Ms. Dean just indicated. And my 
+understanding is that the process that is underway now is a 
+process to harmonize and fix some problems with the 
+implementation of the directive but that it is only a minority 
+of the member states who have failed to comply; that is, that a 
+majority of the states have complied. And so to the extent that 
+they have, I think, as you suggested, there are some lessons to 
+be gleaned from studying the way that the directive has been 
+implemented in those places where it has been.
+    Mr. Goodlatte. Mr. Morris?
+    Mr. Morris. One lesson I think we can look at in Europe is 
+what has the impact been? And studies have begun to show that 
+data retention mandates in Germany, just to take one study, 
+have reduced the willingness of citizens to go online for 
+mental health services. And that, I think, is something--that 
+is precisely the kind of very sensitive information that I 
+think that Congress should be very concerned about, chilling 
+the access that citizens have and the comfort that citizens 
+have in going online.
+    So I think there are at lot of lessons one can take from 
+Europe, and certainly in Europe, there is a move to revisit 
+data retention. And certainly I have heard many of the European 
+politicians say that, you know, at the maximum one would say, 
+you know, 6 months. Clearly that is the direction that they are 
+going, to reduce the length of time. But there are serious 
+concerns that are raised in Europe.
+    Mr. Goodlatte. Thank you. Ms. Dean, what would a blanket 
+data retention requirement have on smaller ISPs?
+    Ms. Dean. This is a serious concern because we don't quite 
+understand at this point what the breadth is. I mean, you could 
+take some of the earlier comments made and assume that this is 
+meant to apply to Web sites. And just because it is noncontent 
+data does not mean that that data is not revealing and very 
+interesting about people's behavior online. And it is not clear 
+exactly what it is that companies will be called upon to 
+retain. Are we looking at, you know, what Web sites they go to? 
+And this all brings us back to the scope and the breadth and 
+the duration of time. For small companies, I guess it is really 
+up to the Subcommittee to consider whether these kinds of 
+mandates could really be stomached by smaller companies. I can 
+say that within my membership, I have large companies, but I 
+also have small companies who provide services to rural areas 
+and to lower-income Americans. And their services, because they 
+are low-cost or free, would be greatly affected by a data 
+retention mandate.
+    Mr. Goodlatte. Thank you, Mr. Chairman.
+    Mr. Sensenbrenner. The gentlewoman from California, Ms. 
+Chu.
+    Ms. Chu. Chief Douglass, internetworldstats.com, which is a 
+Web site for international Internet usage statistics, said that 
+as of 2007, there were 66 million Internet broadband 
+subscribers in the U.S., which is about 22 percent of our 
+population. Is it law enforcement's belief that we should 
+retain all these subscribers' data? Or is it possible to do 
+something that is more targeted? How would you determine which 
+subscribers' data should be retained? And are you actually 
+saying that all of those 66 million's information should be 
+retained?
+    Chief Douglass. Well, ma'am, essentially there is no way to 
+specifically target it because if we knew who the bad guy was, 
+we could just target them. But unfortunately we don't. And what 
+we have to do is to assume that this information is like a bank 
+that has a vault full of safety deposit boxes. Those safety 
+deposit boxes remain totally sealed, totally inaccessible to 
+the law enforcement until something happens and we are given 
+direction to open one particular box. That is how this 
+particular system would work.
+    I would point out that there is a lot of information there. 
+But in my own history in the last 2 weeks I applied for a loan. 
+And when I applied for a loan, they pulled up my credit report 
+and my credit report knew everything about me. That is on the 
+Internet and that is maintained for 7 years. So my point being 
+is, we all have to sacrifice to a certain extent for those 
+particular component parts that require addressing. In this 
+particular case with the credit report, my credit is good, but 
+we had to sacrifice that access because some people's credit 
+isn't so good. In this case, all of us would have to contribute 
+to a certain balance of that sacrifice and privacy so that the 
+criminal element can be addressed. And there is no way to 
+target it or narrow it or move it down because we are dealing 
+with the unknown.
+    Ms. Chu. Mr. Morris, how do you respond to that? And also, 
+how would the retention of the data of the 66 million people 
+harm Americans' privacy rights and aggravate the problem of 
+identity theft?
+    Mr. Morris. Thank you, Congresswoman. Let me first respond, 
+to take the credit reporting example, credit reporting, you 
+know, Congress has passed very, very strong legislation to 
+protect the privacy of that information. It is very strongly 
+controlled. In contrast, data held by service providers has 
+extremely little protection. The Electronic Communications 
+Privacy Act was enacted in 1986. It is woefully out of date. 
+Law enforcement can obtain the data that we are talking about, 
+the noncontent data that we are talking about, with very, very 
+minimal process or protection. And so, I mean, there are some 
+very, very serious privacy concerns.
+    I believe the Internet usage in the United States has now 
+risen to about 70 percent. I think we are now talking about 230 
+million Americans who would be covered by this. And the 
+proposals that all of their access everywhere they go, all of 
+their e-mails be monitored and tracked is really breathtaking. 
+In the context of call records, telephone call records that 
+were kept by telephone companies, we have seen very broad use 
+of civil subpoenas by divorce attorneys and other civil uses. 
+And my understanding--I am not sure if Ms. Dean may be able to 
+tell me--but my understanding is that actually civil use, 
+noncriminal use of data that is held by service providers 
+represents one of the largest types of demands and requests 
+that companies receive for this data.
+    So it is clear if the data is required to be held, it will 
+be used in a broad context.
+    Ms. Chu. You are saying that there are far less protections 
+that are provided by the Electronic Communications Privacy Act 
+than for, say, credit reports.
+    Mr. Morris. Right.
+    Ms. Chu. Should that be updated first?
+    Mr. Morris. Absolutely. The need to update ECPA is really 
+critical. I mean, it is critical for privacy grounds. It is 
+also critical for business grounds because it really is harming 
+the American industry's ability to compete in the global 
+marketplace, given the low standards of protection that ECPA 
+affords.
+    Ms. Chu. Is there a way to have a more effective use of 
+existing data preservation requirements rather than having 
+mandatory data retention?
+    Mr. Morris. Well, Congress in 2008 authorized the 
+appropriation of additional resources for both prosecution and 
+also for the technical investigation of child obscenity crimes, 
+which would allow law enforcement to get access to the 
+information they need sooner, which would reduce the need or 
+the argued need for a data retention mandate. If law 
+enforcement is able to more promptly investigate these cases 
+instead of being overwhelmed with other cases, then there is 
+really not such an issue that data retention would be needed to 
+address.
+    Ms. Chu. Thank you.
+    Mr. Sensenbrenner. At this point, the Chair asks unanimous 
+consent that a statement by Ernie Allen of the National Center 
+for Missing & Exploited Children be inserted in the record.
+    [The prepared statement of Mr. Allen follows:]
+    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
+    
+                               __________
+
+    Mr. Sensenbrenner. And now the Chair recognizes the 
+distinguished Vice-Chair of the Committee, the gentleman from 
+Texas, Mr. Gohmert.
+    Mr. Gohmert. Thank you, Mr. Chairman.
+    Mr. Weinstein, you had said in your statement that in some 
+ways the problems of investigations being stymied by a lack of 
+data retention is growing worse. Could you elaborate on what 
+you mean by that?
+    Mr. Weinstein. Yes, sir, Congressman. Certain types of 
+providers, principally in the cell phone community, are not 
+retaining data at all. Increasingly, we are having providers 
+who are retaining data for shorter and shorter periods of time, 
+if they retain it really at all. We also have encountered the 
+problem repeatedly of providers who publish or state that their 
+retention period is 6 months or some period of time, only to 
+find that when we submit requests to those providers within the 
+stated retention period, we are told that the data is no longer 
+being retained. So in that sense, the problem is growing worse.
+    As I said before, a great many providers are already 
+retaining the data that we are talking about here. So the 
+points that were made over privacy before, I think it is 
+important to recognize that that data will continue to be 
+retained by the providers and not by the government; that is, 
+the government can only obtain it through lawful process. The 
+data will be retained by providers, as it is currently. The 
+problem is the inconsistency. The problem is that it is not 
+held for a sufficient period of time, that it is not consistent 
+across the board, that the decisions about how long to retain 
+data for are made unilaterally by the providers and are subject 
+to change at will and, as I said, are often not even honored.
+    So what we think is essential is that whatever the decision 
+is about the scope of the requirement, if Congress goes down 
+this road, is that it be one that is clear and consistent 
+across industry.
+    In 2008, the Electronic Frontier Foundation published a 
+user guide or a guide that was entitled, Best Practices for 
+Online Service Providers, which I think is unintentionally the 
+best argument for Congress to intervene in this space than 
+anything that I could say today. It advises providers that they 
+can't be forced to provide law enforcement with data that 
+doesn't exist. It provides guidance about how to minimize what 
+they referred to as ``the challenges of law enforcement 
+compliance.'' It calls upon providers to obscure, delete as 
+much data as possible. It advises providers to use secure 
+deletion utilities to scrub the hard drives so that the logs 
+cannot be obtained. The fact that providers are being guided to 
+conduct themselves in this way I think speaks to the fact that 
+the problem is growing worse and that congressional action--or 
+congressional engagement on the issue is probably as timely as 
+it has ever been.
+    Mr. Gohmert. Well, you touched on this perhaps. But the 
+Electronic Communications Privacy Act currently allows 
+investigators to request preservation of records. And I would 
+ask you, Mr. Douglass, if that is not being honored. And if it 
+is, why is that not adequate?
+    Chief Douglass. Well, congressman, I have no evidence, but 
+it is not being honored. The problem is, it is not a question 
+of honoring our request. The problem is that it is not there 
+when we ask for it. So if the information has already been 
+deleted or if it has already been spoiled in some respect, we 
+can ask all day. But if it is not there, it is not there to 
+get. And that is why the time requirement of 30 days is onerous 
+because many cases are not brought to light in 30 days.
+    Mr. Gohmert. Mr. Weinstein, have you made requests for 
+preservation that have not been honored?
+    Mr. Weinstein. Except in the sense that--the largest 
+problem with preservation is what the Chief said. That is that 
+the preservation tool, while a useful tool, is only valuable if 
+the data still exists at the time that the preservation letter 
+is submitted. For reasons that I alluded to in my oral remarks, 
+these are extraordinarily complex crimes. In the child 
+exploitation arena, increasingly they are international and 
+global investigations. They are investigations that often start 
+when law enforcement in another country seizes a server or 
+seizes a computer that is being used by the administrator of a 
+child sexual abuse distribution network. And it takes time to 
+go from that seizure in Australia or New Zealand or Germany to 
+identifying IP addresses of people in the United States who are 
+engaging in that activity, and then having to follow the trail 
+of those people here to the U.S. And invariably, really quite 
+often, too often, by the time we are able to--and no matter how 
+quickly we work, by the time we are able to find the provider--
+--
+    Mr. Gohmert. My time is running out. Let me ask quickly. We 
+have talked in generalities. Is there a large ISP that 
+consistently deletes information to prevent you from having 
+that information preserved? I am asking specifically.
+    Mr. Weinstein. Sure. I appreciate why you are asking 
+specifically. But I would rather not talk about specific 
+providers. But what I would say is that for the most part the 
+ISP community is very cooperative.
+    Mr. Gohmert. Well, pardon me for my background being a 
+judge, but as a judge, if people weren't willing to get 
+specific, then obviously it was not legitimate testimony that 
+would come into evidence. Is there no specific----
+    Mr. Sensenbrenner. The time of the gentleman has expired. 
+You don't have to answer that one.
+    The gentlewoman from Florida, Ms. Wasserman Schultz.
+    Ms. Wasserman Schultz. Thank you, Mr. Chairman. Mr. 
+Chairman, some of the Members and the witnesses may know that I 
+was the House sponsor of the PROTECT Our Children Act of 2008 
+which was a major effort and continues to be a major effort to 
+develop a national strategy which has been developed, appoint 
+the National Coordinator for Child Exploitation Prevention and 
+Interdiction, which is Francey Hakes, who is actually here with 
+us today and is in the audience and who has been doing an 
+excellent job in this area, to finally coordinate the work of 
+the Internet Crimes Against Children Task Forces and provide 
+them with the resources that they need because previously they 
+have really been only able to investigate less than 2 percent 
+of the cases that occur when it comes to the transmission of 
+child pornography online and other kinds of sexual predatory 
+activities on the Internet.
+    But all the money in the world and the coordination and the 
+planning isn't going to help at all if we don't have the 
+assistance from the Internet service providers. And with all 
+due respect, Ms. Dean, I think we need to be clear that this is 
+not about watching or tracking people's behavior online, which 
+is how you described it a couple of minutes ago. It is about 
+helping law enforcement connect the dots. And one of the things 
+that I think is extremely important to underscore here is that 
+that is the difficulty, is that right now, because there are 
+varying degrees of cooperation, varying degrees of time that 
+ISPs actually preserve this data--some as short as 7 days, 
+without naming names, Mr. Chairman, as you suggested--that it 
+really becomes extremely difficult, if not impossible, for law 
+enforcement to be able to actually get to the information they 
+need not about the individuals and their activity but about 
+specifically the connectivity logs. I mean, that is what really 
+we need to be able to get at are these connectivity logs. 
+Because as people know who follow this stuff, an individual ISP 
+address is not helpful because people have a different one for 
+every computer that they log on to. So having the ability to 
+track one individual's connectivity is what is necessary. Law 
+enforcement already have the pictures. They already have the 
+ability to lift the digital fingerprints. They lose that 
+ability if ISPs don't hold onto that information for a 
+standardized period of time.
+    So my question to you, Ms. Dean, really is this: 
+Voluntarily would be a lot better than mandating this. I think 
+that is what we would all like to see, including law 
+enforcement. So what are the ISPs willing to do voluntarily? 
+You should come together and decide on a standard and propose 
+it. Because that is going to be the best way that we can get 
+this problem addressed without us being in a situation where we 
+have to figure out legislatively how to make you do it.
+    Ms. Dean. Thank you, ma'am. And I have been given some 
+carrots and sticks today earlier from the Chairman, and I 
+recognize the need to go back and work with my membership and 
+to talk about this.
+    We have been following data retention for many years. We 
+have been engaged in this conversation. And certainly in the 
+area of fighting online child exploitation, it is something 
+that U.S. ISPA and our members are certainly committed to, so I 
+can guarantee that we will be getting back to you and talking 
+to your staff about this.
+    Ms. Wasserman Schultz. Thank you. Mr. Chairman, at some 
+point, if we could hear from Francey Hakes, who is the person 
+that is coordinating all of this activity from the Department 
+of Justice, it would be incredibly helpful. Mr. Weinstein, I 
+know that you are doing your best, but Francey really is the 
+person that is responsible in the law for coordinating all of 
+this activity, and I know that she would be able to give us 
+some very helpful information, one of which is--I am really not 
+understanding why you don't have a specific proposal because, 
+Mr. Weinstein, that is supposed to be in the National Strategy. 
+So is it in the National Strategy? If it is not, then the 
+National Strategy is deficient.
+    Mr. Weinstein. Well, I don't believe that there is a 
+specific data retention proposal, Congresswoman, in the 
+National Strategy, although the National Strategy is designed 
+to do a lot more than just address the issue of data retention, 
+as you know. It is meant to lay out a framework for 
+coordinating all of law enforcement's operations to address the 
+problem.
+    Ms. Wasserman Schultz. Before I run out of time, that is 
+just a big concern that I think we need to address. You really 
+do need to do a better job of giving us a number or a 
+percentage of cases that have been hindered or reached a dead-
+end. The anecdotal information is somewhat helpful, but if you 
+don't really give us a concrete number.
+    But the question that I have for you specifically is: In 
+the Republican budget proposal, which proposes to cut 20 
+percent across the board, what would that do to your ability to 
+continue to investigate and solve these cases, if their budget 
+proposal actually went through?
+    Mr. Weinstein. Well, if I can address both pieces of that 
+quickly. In terms of the concrete number, it is a challenge and 
+it is frustrating to me, to Francey, and to all of us who are 
+involved in working on this issue that we can't come up with a 
+concrete number. And there are a number of reasons for that. 
+But the primary one is that the Justice Department, like all 
+levels of law enforcement, doesn't typically keep statistics on 
+cases that do not result in charges. And very often what 
+happens when an investigation hits a dead-end so that the 
+investigator or the prosecutor moves on to another case, we 
+don't log the fact that we tried but were not successful. The 
+other thing is that law enforcement officers are smart, and 
+they figure out over time which ISPs will keep data for which 
+periods of time. And when they obtain a lead and they need to 
+go to a provider, if it is outside what they understand to be 
+the data retention period, they won't even bother to submit a 
+request because they know it is not going to be fruitful, and 
+they will try--sometimes successful, often not--to obtain the 
+evidence they need from another source.
+    So the anecdotal example that we could talk about, some of 
+which I alluded to in my testimony, are not hypotheticals. They 
+are illustrations. There are new anecdotal examples we get 
+every day, every week, every month of cases that were not able 
+to be made.
+    Ms. Wasserman Schultz. And can you address my budget 
+proposal question?
+    Mr. Weinstein. If I may, Mr. Chairman.
+    Mr. Sensenbrenner. Go ahead.
+    Mr. Weinstein. The only thing I would add, this goes beyond 
+child exploitation because every type of crime that we worry 
+about is committed through online means now. And so I think 
+that losing prosecutors and losing agents would seriously 
+impact our ability to prosecute really virtually any type of 
+online crime or crime committed through an online means at the 
+level that we would like to.
+    Mr. Sensenbrenner. The gentlewoman's time has expired. The 
+gentleman from Arizona, Mr. Quayle.
+    Mr. Quayle. Thank you, Mr. Chairman. And thanks to all of 
+you for coming in today.
+    My first question is going to be for Ms. Dean. What 
+specific actions have your members voluntarily taken to combat 
+child pornography so far?
+    Ms. Dean. Well, I can speak as an association and as 
+someone on behalf of the individual members. We have 
+promulgated a number of sound practices to be more helpful to 
+law enforcement in the areas of child pornography reporting and 
+in general subpoena compliance when it deals with child 
+exploitation cases. The members participate in a number of 
+important task forces, things like the Technology Coalition and 
+Financial Coalition Against Child Pornography, which we can get 
+you more information about in the future. And certainly the 
+companies interact with the ICACs on a regular basis. And 
+moreover, they have highly skilled staff that work on these 
+compliance issues, understand that child exploitation cases are 
+a priority, and are trained to deal with them in a timely 
+manner.
+    Mr. Quayle. And also in your testimony, you spoke about 
+some of the problems that we are facing with data retention in 
+terms of it might slow down the process for immediate emergency 
+situations, such as child abductions and the like. Obviously we 
+don't want to negatively impact with legislation having these 
+unintended consequences of maybe we have this increased data 
+storage issues, but then it actually has some problems with the 
+speed of recovery. Can you address that and maybe talk about it 
+a little more?
+    Ms. Dean. Yes. And thank you. I appreciate that 
+opportunity. Because as we thought about data retention this 
+most recent round, one of the things that occurred to the 
+companies was that, you know, we have a number of concerns 
+about the cost to innovation and so forth. But the main concern 
+that we would have with building these massive data bytes--we 
+are talking exabytes of information--how it would be that we 
+would be 100 percent accurate in retrieving precisely the 
+record that law enforcement requested and doing so in a timely 
+and efficient manner and doing so in an emergency situation 
+because we do get frequently emergency requests from law 
+enforcement and want to be helpful. The reason this is so 
+important to the companies is because, one, they take their 
+responsibilities under ECPA and other statutes very seriously. 
+But secondly, because we are dealing with people's lives and 
+liberty here. And out of all this data, we have to make sure 
+that, say, 18 months down the road that tiny particular piece 
+of information is exactly the right information linking that 
+exact target, and there is a concern in that area, yes.
+    Mr. Quayle. Mr. Weinstein, can you give your side on that 
+issue in terms of how that might affect emergency responses in 
+slowing down the recovery time?
+    Mr. Weinstein. Congressman, what I can say is that in those 
+situations, as I have indicated a number of times, there is 
+already a substantial number of providers who are keeping the 
+kind of data that we were talking about and do keep it for a 
+period of time. So it is not like they are creating systems out 
+of whole cloth. They just need to figure out a way to keep it 
+for longer, and there would be some potential additional cost 
+of storing it for longer. But those same providers who have 
+that data have to respond to the kind of requests you are 
+talking about every day. And they manage to do so quite well. 
+So if they are keeping a larger volume of data, it seems to me 
+it would be a software engineering problem that is beyond my 
+expertise. But to the extent that they are able to comply with 
+those requests today when they have got the data available, I 
+would expect them to be able to do so in the future.
+    I do acknowledge, as I said before, that I think the 
+principal additional cost of a data retention regime would be 
+in data retrieval, not so much in data storage but in the data 
+retrieval. But I wouldn't anticipate that there would be a 
+significant impact on--negative impact, that is, on ISP's 
+ability to respond to emergency requests. I think what it would 
+mean though is that the nonemergency requests, there may be 
+some additional delay in responding to them. But given where we 
+are now, we are happy if they are being responded to at all.
+    Mr. Quayle. All right. And further, do you have any 
+suggestions in terms of retention period? Is it 1 year, 2 
+years, 3 years, 4 years, keeping it forever? I mean, that is 
+one thing that I was wondering is that, you know, with the 
+statute of limitations--I don't know what they are for child 
+pornography cases, but wouldn't you want to have that match up 
+to when the statute of limitations expires?
+    Mr. Weinstein. Well, I think that the statute of 
+limitations for child sex abuse cases, I think there actually 
+is none. So that would be keeping it indefinitely. For most 
+Federal crimes, it is 5 years. I think that if the only 
+consideration at play here was law enforcement, then I would 
+think the statute of limitations would be the place to start 
+the discussion. But that clearly is not the case. And I don't 
+want to suggest for a second that that is what we would 
+suggest.
+    There are clearly other competing interests. The economic 
+impact on the providers, to some extent privacy. And I think 
+that when you balance those out, it clearly has to be something 
+that is much more modest than the statute of limitations 
+period. Where that number is, I can't say today. Although, as I 
+have said, I think this is a very useful first step. I know 
+this is an issue the Subcommittee has worked on for years and 
+years. And I am hopeful that, working together, we can come to 
+a place, come to a number that maximizes law enforcement's 
+chances of solving the crimes it needs to solve without 
+overwhelming the providers and without creating unintended 
+consequences.
+    Mr. Sensenbrenner. The time of the gentleman has expired. 
+The gentleman from Georgia, Mr. Johnson.
+    Mr. Johnson. Thank you, Mr. Chairman, for holding this very 
+important hearing today on using Data Retention As a Tool for 
+Investigating Internet Child Pornography and Other Internet 
+Crimes. And this bill, H.R. 1076, is actually cited as the 
+Internet Stopping Adults Facilitating the Exploitation of 
+Today's Youth Safety Act of 2009. But it is a fact, isn't it, 
+that the provisions of H.R. 1076 go far beyond stopping 
+Internet child pornography; is that a fair assessment, Mr. 
+Morris? Is that true?
+    Mr. Morris. Well, certainly H.R. 1076 would very broadly 
+sweep--the terms of that legislation would very broadly sweep--
+--
+    Mr. Johnson. Yes. I mean, section 5--yes, section 5, 
+Retention of Records By Electronic Communication Service 
+Providers is not limited to only investigations or matters 
+concerning child pornography.
+    Mr. Morris. Certainly I read that draft bill the same as 
+you do. Yes, sir.
+    Mr. Johnson. Okay. So it is kind of like perhaps you could 
+say--and I don't say this disparagingly--but kind of like a 
+Trojan horse. And you could have things in that Trojan horse 
+that come out and surprise you.
+    Mr. Morris. Yes. Certainly I agree that once the data is 
+mandated to be retained, it will be used for a broad diversity 
+of reasons, including civil litigation, perhaps even commercial 
+use by the service provider, and a range of other things that 
+concern us.
+    Mr. Johnson. Well, let's talk about that in just a second. 
+But let me look down at section 9 of the proposal. It grants 
+$150 million to the Innocent Images National Initiative, $150 
+million. Now does anybody have any idea what the Innocent 
+Images National Initiative is?
+    Mr. Weinstein. Yes, Congressman. The Innocent Images 
+Initiative is a law enforcement initiative that was set up by 
+the FBI and the Justice Department. The Innocent Images Task 
+Forces are the groups that have primary responsibility on the 
+Federal level for investigating child exploitation crimes.
+    Mr. Johnson. Where would this money go to? Who would be the 
+recipients of the $150 million?
+    Mr. Weinstein. I can't speak to the specifics of the 
+proposal, Congressman, because I am not as familiar with it. So 
+I don't know what the intended use of that $150 million is. My 
+guess would be that it would be primarily to support 
+investigative resources, investigators and prosecutors.
+    Mr. Johnson. But you would not say that there are any 
+limits on how the money could be spent as provided by section 
+10, is that correct?
+    Mr. Weinstein. Well, again, I can't speak to the details of 
+that specific proposal.
+    Mr. Johnson. So in other words, can anybody on this panel 
+tell me where the $150 million and to whom would the $150 
+million provided under section 9 go to? Yes, Mr. Douglass, do 
+you want to give it a stab?
+    Chief Douglass. I will try to do so.
+    Mr. Johnson. I have limited time now. Just answer me this: 
+Do you know where the $150 million is going to?
+    Chief Douglass. I know where a small part of it is going 
+to.
+    Mr. Johnson. Well, a small part. I want the big part. And I 
+find it somewhat disturbing that we are not able to get at that 
+in this hearing.
+    So we have got Internet child pornography being the Trojan 
+horse. And then inside that, we have a data retention 
+situation, mandatory, that may fall upon the backs of 
+commercial and private Internet service providers. And then we 
+have $150 million to boot going to some----
+    Mr. Sensenbrenner. The gentleman's time has expired.
+    Mr. Johnson. Thank you, Mr. Chairman.
+    Mr. Sensenbrenner. Last, but not least, the gentlewoman 
+from Florida, Ms. Adams, is recognized for 5 minutes.
+    Ms. Adams. Thank you, Mr. Chairman.
+    Mr. Weinstein, I was listening. And coming from a law 
+enforcement background, I am kind of curious. You made a 
+comment about when your agents get to a point where they just 
+stop because they have hit a dead-end and they move on, and you 
+couldn't give us a caseload count. Is it your testimony today 
+that your caseloads are not counted based on open/closed 
+caseloads?
+    Mr. Weinstein. Well, Congresswoman, certainly at the 
+Federal level--I can't speak to the State and local--but at the 
+Federal level we do, both the agencies and the Justice 
+Department, keep track of cases that are open and closed. What 
+I mean to suggest is that we couldn't look at that data and 
+figure out how many of those were closed because of a failure 
+of data retention. There are any number of reasons why a case 
+is opened and then ultimately not able to be successfully 
+concluded or result in a charge. It could be that there is a 
+lack of evidence, it could be that there were other 
+investigative hurdles. But I couldn't pinpoint within that 
+gross number of cases how many were a data retention issue 
+specifically.
+    Ms. Adams. And so then I am not to be concerned at the fact 
+that you would base your budget on caseload. You are basing it 
+on your open caseloads, correct?
+    Mr. Weinstein. You know, those cases take an extraordinary 
+amount of time, as you know, especially now. And in the child 
+exploitation arena, this is particularly true, but it is true 
+in a lot of others as well, that to the extent that those cases 
+involve international law enforcement, to the extent that the 
+criminal is sophisticated and takes steps to try to anonymize 
+himself or herself, there are a number of steps in the chain 
+you have to go through that take a long time. You can 
+investigate a case for years only to find that you are not able 
+to bring a charge. So I think the fact that the case is open 
+and how long it is open for reflects the amount of man and 
+woman hours that are going into it. It is just that sometimes, 
+for any number of reasons--data retention being one of them--
+you can't actually successfully complete the investigation and 
+indict anyone.
+    Ms. Adams. And while sometimes it is a lot of man hours 
+when the case is open or it sits there because you have hit a 
+dead-end and you haven't closed it quite yet, and I recognize 
+that. But that goes again to what Mr. Quayle asked you, and 
+that was, how long then, how long would you recommend that 
+these providers hold this data?
+    Mr. Weinstein. Well, as I said to Mr. Quayle, I think the 
+Administration doesn't have a position at this time on what the 
+appropriate amount of time is. What I do believe is the case is 
+that--at least as a starting point for discussion, I think the 
+EU range of 6 months to 2 years is a useful starting point for 
+discussion, but I wouldn't suggest, even as I sit here today, 
+that it should be 6 months or 2 years or 1 year. I do believe 
+that there is a time period that we could come to that would be 
+long enough that law enforcement could maximize the chances of 
+getting the evidence it needs to successfully complete a larger 
+number of investigations and bring a larger number of criminals 
+to justice but that wouldn't be so long or that would be 
+moderated and would not overwhelm, in terms of cost or privacy 
+impact, the other equities involved.
+    I mean, ultimately, I think the fact that we haven't come 
+to a conclusion on this issue successfully over the last 2 or 3 
+years reflects the fact that it is really a complex exercise to 
+try to figure out what that time period is; you know, what is 
+the magic number that gives law enforcement what it needs but 
+doesn't overwhelm the providers and that moderates the risk to 
+privacy of having data held for a long period of time? I can't 
+come up with that number today, but I am pretty confident that 
+if we work at it, we will come to it.
+    Ms. Adams. And your earlier testimony is something that I 
+have had along my law enforcement career is that a lot of times 
+when you start investigating these you end up going to 
+different countries, and that adds time to the process, does it 
+not?
+    Mr. Weinstein. It does. In fact, I was thinking this 
+morning about a case that we did that we call Operation 
+Achilles, which was a multinational law enforcement operation 
+to take down a network that was producing and distributing 
+images and videos of child exploitation, and there was a 
+little, little girl in the Northern District of Georgia who was 
+rescued as a result of that investigation, but she was rescued 
+2 years after the video of her being abused was discovered when 
+a search was done in Australia of one of the members of the 
+organization's computers. And it took 2 years of work every 
+single day by the investigators, both in Australia and here in 
+the U.S., to try to find out where that girl was so they could 
+rescue her and ultimately capture the abuser, who was her 
+father. Those cases can inherently take a long period of time. 
+We are obviously committed to them, and we will investigate 
+them as long as we humanly can.
+    Ms. Adams. I hope so.
+    Ms. Dean, hearing this testimony, I would agree with my 
+colleagues that you go back to your membership and see if there 
+is some kind of compromise you can come up with within your 
+membership and to the law enforcement that doesn't require the 
+Congress to intervene on this. It is really important that if 
+there are children being abused, taken advantage of, or worse, 
+we would like to have that information given to law enforcement 
+so that the bad guys can be prosecuted.
+    Mr. Sensenbrenner. The time of the gentlewoman has expired. 
+The gentleman from Florida, Mr. Deutch.
+    Mr. Deutch. Thank you, Mr. Chairman. I have a question, Mr. 
+Weinstein, for you about the way that we investigate. There is 
+a constituent of mine in my district of south Florida that runs 
+a business. It is a data fusion program, child protection 
+systems, which is a program that is used by the vast majority 
+of ICAC task forces as well as 38 countries free of charge. I 
+would like to know, since this is a system that enables law 
+enforcement to track files across the vast expanse of the 
+Internet and then identify the specific computers that are 
+responsible, first--actually for you and for Mr. Douglass--are 
+you aware of this opportunity, this program?
+    Chief Douglass. I am aware of several programs that allow 
+us to pinpoint peer-to-peer intersections and gives us a 
+starting point to start with the subpoenas and search warrants. 
+I do know this, that they are relatively successful but 
+somewhat limited at this stage in scope.
+    Mr. Deutch. Mr. Weinstein.
+    Mr. Weinstein. Congressman, I am not familiar with that 
+particular software, but I am familiar with a number of 
+programs, as the Chief said he is as well. And you should know, 
+the Department, under section 105 of the PROTECT Our Children 
+Act, was directed to develop a technological solution known as 
+the National Internet Crime Data System, and we are in the 
+process of doing that. We have issued grants I think to the 
+Massachusetts State Police in relation to the development of 
+that. And once that system is operational, it will support 
+efforts by Federal, State, local, and tribal enforcement, 
+including the ICAC task forces, to more effectively investigate 
+and deconflict those cases. So we are working very hard on 
+developing technology that will enhance our ability to pursue 
+those cases.
+    Mr. Deutch. I would just suggest that the technology of 
+this company has been used--their expertise has been used to 
+catch criminals. They also helped identify the 9/11 terrorists. 
+I would encourage you to reach out, and I would be happy to 
+make that happen.
+    Getting back to something you said earlier this morning, 
+Mr. Weinstein, moving beyond this issue of data retention. I 
+would like to ask you about other ways to streamline the 
+prosecution of these cases and make it more likely that we will 
+actually catch these people. The Internet, as was just 
+discussed, is global, and the criminal activity bounces over 
+local, State, and even national boundaries, borders. Does it 
+make sense from a national law enforcement perspective to 
+create a centralized place--at least for the United States--to 
+subpoena ISP records rather than having to subpoena each 
+company in a different way?
+    Mr. Weinstein. Well, I haven't given a lot of thought to a 
+proposal like that, although my first reaction is that to the 
+extent people are concerned about privacy from having multiple 
+databases of Internet activity, I would think that there would 
+be some significant privacy concerns if there was one 
+megadatabase of that activity. But I think that ultimately, 
+Congressman, the challenge in these cases is not just the 
+ability to get data, of course. They are inherently time 
+consuming, and they take a long time. I think as our 
+relationships improve with foreign law enforcement, we are able 
+to proceed then more quickly and more efficiently. But 
+ultimately, if providers were able to retain the data we needed 
+for a reasonable and uniform period of time, we would have 
+fewer dead-ends and we would be able to move the cases more 
+quickly. Sometimes the cases take longer than they otherwise 
+would because, having hit a roadblock when the data is not 
+available, you have to figure out some other way around it, 
+some other way around the lack of data, and to try to basically 
+investigate the case over again from a different angle. If the 
+data were available, whether it was in one common source, as 
+you suggested, or maintained by individual providers for a 
+reliable period of time, I think we would be able to pursue the 
+cases more expeditiously and in larger numbers to a successful 
+conclusion.
+    Mr. Deutch. Mr. Douglass, from your perspective, would a 
+centralized database help in pursuing these criminals?
+    Chief Douglass. Well, again, I agree with Mr. Weinstein. A 
+centralized database would certainly be the most efficient. 
+However, the tenor of these conversations have been all about 
+balance, and balance means that we balance out the effects of 
+privacy and the effects of efficiency at the same time. So 
+consequently, while it would absolutely be more efficient, I 
+would also think it would raise a lot more concerns about 
+concerns over privacy. I think we can work around that. If we 
+have the locations we can go to that maintain those files, that 
+is not a big deal.
+    Mr. Deutch. Finally, Mr. Chair, Mr. Douglass, I appreciate 
+what you are saying. And certainly we need to balance those 
+interests, ultimately though being on the front lines of Mr. 
+Weinstein in trying to catch these guys. I am just trying to 
+figure out if that is something that we ought to be 
+entertaining, and it sounds like it is something that could be 
+helpful.
+    Chief Douglass. I would have concerns about going that 
+direction because I don't think that the benefits would 
+outweigh the risks.
+    Mr. Sensenbrenner. The gentleman's time has expired. The 
+gentleman from Arkansas, Mr. Griffin.
+    Mr. Griffin. Thank you, Mr. Chairman.
+    Ms. Dean, I wanted to ask you, I was looking through your 
+testimony, and it may just be a misunderstanding. But it 
+appears that you make a distinction between data retention and 
+data preservation. And I apologize for being out if you have 
+explained that. But could you comment on that?
+    Ms. Dean. Certainly. I would be happy to.
+    Data presentation and data retention are--my luck today--
+are very different. Data preservation is a targeted request 
+from law enforcement to a provider to hold on to a specific 
+person's data. And to be clear, to clear up some of the 
+conversation from earlier, that is not simply an IP log. That 
+is a very broad aspect of--it is a snapshot. Think of it as a 
+snapshot at the exact moment that the request comes in of that 
+person's account, e-mails, buddy lists, anything that we have 
+got that is taken, set aside, and it is able to be preserved 
+for up to 180 days. Now that doesn't go into the future because 
+then you can get wiretap problems and things like that.
+    Retention, what we are talking about here today, would be 
+to hold on to a category of data, a category of providers on 
+all of their users into the future.
+    Mr. Griffin. So preservation would include the type of 
+information that you would get in a subpoena such as method of 
+payment, credit card records, all of that stuff, and the 
+retention is just the data that relates to the ISP?
+    Ms. Dean. Well, to be clear, preservation is so effective 
+and valuable, we see it as very effective and valuable because 
+we don't make a distinction as to what kind of process may come 
+in the future. We simply freeze the account, set it aside, and 
+it is available to law enforcement, pending the issuance of 
+process. So they can get whatever it is the order calls for 
+into the future.
+    Mr. Griffin. What is your ideal? Are you happy with the 
+status quo? I know that when I came back in, Mr. Weinstein had 
+been asked by Representative Quayle about his ideal in terms of 
+the time frame. I want to ask you what your ideal is.
+    Ms. Dean. Well, one of the things I want to say is that, 
+you know, we really do want to be involved in this 
+conversation. We want to talk to our colleagues in law 
+enforcement and find out what it is specifically that they 
+need. We really do want to understand better which providers. 
+And that is very important. Do you want the Facebooks of the 
+world? Do you want you know access providers? Do you want the 
+nytimes.com? It is very important.
+    Mr. Griffin. I am running out of time. So there is not a 
+specific time frame. It sounds like you are still sort of 
+grappling with it. Chief Douglass, do you have an ideal time 
+frame in mind that you think would capture most of the data 
+that you would need?
+    Chief Douglass. Yes, sir. My personal opinion is 6 months 
+up to a year, maybe up to 18 months. But after that period of 
+time, there is a point of diminishing returns. Certainly 6 
+months does not seem to be unreasonable from an investigative 
+standpoint. We will get quite a bit. That will be six times 
+more than the best we can get right now. And in that event, I 
+think that would be logical. But there are other factors to 
+consider. And when we shape out whatever agreements or 
+legislation or compromises that take place, those things should 
+be fleshed out with all parties, understanding exactly where it 
+goes. But from a law enforcement standpoint, I would think a 
+minimum of 6 months would be advantageous. More like a year 
+would probably be the best.
+    Mr. Griffin. Have you been in any talks with the Department 
+of Justice on this? Apparently, the Department of Justice has 
+not settled on a specific time frame.
+    Chief Douglass. No, sir. We haven't. And, you know, we come 
+from two different localities with two different things in 
+mind. The Department of Justice is looking at overall arching 
+philosophy and policy for the entire country in that regard, 
+and we are looking at it from how it affects Overland Park, 
+Kansas and how it affects cities in your State. So we have 
+common interests, but they are not necessarily parallel 
+interests.
+    Mr. Griffin. Maybe you can grab Mr. Weinstein there, and 
+y'all can talk about that. Thank you. That is all I have, Mr. 
+Chairman.
+    Mr. Sensenbrenner. The gentleman's time has expired. And 
+again, last but not least, the gentleman from Pennsylvania, Mr. 
+Marino.
+    Mr. Marino. Thank you, Mr. Chairman.
+    And if I do ask a question that has already been asked 
+because I was at another meeting, please tell me that and I 
+will go on.
+    Deputy Weinstein and Chief Douglass, I couldn't agree with 
+you more on your approach, what you have done, and what you 
+continue to do, particularly in the area of child abuse and 
+cybercrime. As a prosecutor, as a district attorney for 12 
+years, the State level, and as an United States attorney for 6 
+years, I have personally prosecuted both types of cases in both 
+courts. And on many instances, the evidence that we have 
+gathered could be as much as 2 years old. So I implore you to 
+please keep doing what you are doing, bring back to us any 
+insight that this Committee can do to see that you can carry on 
+that mission. And I thank you for that.
+    Director Dean, again, please, I beg you to talk with your 
+organizations, the individuals with whom you work. I am sure 
+that you can come to a consensus. But please, please utilize 
+the frontline law enforcement men and women when asking what 
+can we do to improve the tools that you need to track down 
+these child abusers. Many of the cases that I worked on 
+personally involved photographs and pornography that came into 
+the United States from other countries. But unfortunately, we 
+have a fair number of those individuals in this country. So I 
+implore you, please regulate this to the extent where it is 
+effective and efficient yourselves because, I can agree with 
+the Chairman and my colleagues, at one point, we will step in.
+    And Attorney Morris, let me refer to something in your 
+statement. And could you please correct me if I am wrong on 
+this. Maybe it is just written or taken out of context. I am 
+reading toward the end--actually, the next to the last page of 
+your statement. It says in bold at the top, In the face of the 
+serious risk and cost of data retention, Congress should 
+carefully investigate what benefits there would be, if any, in 
+the prosecution of child pornography cases.
+    You are not suggesting that we do not investigate and 
+prosecute child pornography cases, are you?
+    Mr. Morris. Not in the least, Congressman. What I am 
+suggesting is that given the current lack of resources, given 
+the fact that, as I believe Congresswoman Wasserman Schultz 
+said, that only 2 percent of the cases that are currently known 
+do we have resources to prosecute that adding a massive data 
+retention obligation is not going to increase the ability for 
+us to put the child pornographers in jail. I certainly very, 
+very strongly support the goal of putting these people in jail.
+    Mr. Marino. Thank you. Now I do disagree with the 
+percentage that was stated as to the cases that a re 
+prosecuted. As a prosecutor, we could prosecute more crimes in 
+any situation if the district attorney or the Chief or the 
+deputy attorney general had more bodies and more investigators. 
+But with that said, in my experience--and perhaps Deputy 
+Weinstein and the Chief can respond to this--any case that came 
+into our offices or series of cases would be investigated and 
+eventually prosecuted.
+    Gentlemen, what do you say about this?
+    Ms. Wasserman Schultz. Would the gentleman yield just for 1 
+second?
+    Mr. Marino. Yes.
+    Ms. Wasserman Schultz. I just want to thank you very much. 
+I just wanted to clarify in saying that they are investigating 
+less than 2 percent of the cases. It is not because they are 
+unwilling to. It was because of the lack of resources, the lack 
+of individuals, the lack of resources to be able to investigate 
+more than that. But specifically in among the cases that they 
+are able to investigate, they rescue a child in about 30 
+percent of the cases. So it is incredibly important. I just 
+wanted to make sure I was clear.
+    Mr. Marino. Thank you. I understood that it is just a 
+percentage, the 2 percent. I don't mean to brag about it, but 
+our conviction rates in our office and our investigations and 
+prosecutions were far more than 2 percent of the cases that 
+came into the office.
+    Mr. Weinstein. Congressman, I think, as you know, as a 
+general matter, we follow the same approach that I know you 
+followed in your office when you were the U.S. attorney. We 
+don't turn cases away at the door. If they are there to pursue, 
+we will pursue them.
+    I think that it is not just increasing the number of cases. 
+It is taking the existing cases as far as they can go. I used 
+the case of the father who was abusing his daughter in northern 
+Georgia a few moments ago. Because it took 2 years to identify 
+that man as the abuser, by the time his computer was searched, 
+the data that would have helped identify the other members of 
+the group here in the U.S. with whom he was trading videos of 
+child sexual abuse, we couldn't pursue those people because the 
+data didn't exist. So a lot of times, it is taking the case 
+that we have made and making it bigger and making sure that we 
+are actually dismantling the entire organization so we can 
+protect more children at the same time.
+    Mr. Marino. Thank you. I think my time has expired.
+    Mr. Sensenbrenner. The time of the gentleman has expired.
+    I want to thank our witnesses for their testimony today. 
+And, Ms. Dean, I hope you got the message, and I hope you will 
+get to work with your organization to help us come up with a 
+way that deals with this problem fairly. It is going to mean 
+that your members are going to have to do a little bit more, 
+and I think we all recognize that. But this is going to be a 
+lot easier if this is worked out. There is a need to deal with 
+this issue. I always prefer to have it done voluntarily in a 
+trade organization. But I think you have got the message that 
+if it isn't being dealt with voluntarily, the train will leave 
+the station.
+    So again, thank you all for your testimony today. Without 
+objection, all Members will have 5 legislative days in which to 
+submit to the Chair additional written questions for the 
+witnesses which we will forward and ask them to respond as 
+promptly as they can so that their answers may be made a part 
+of the record. Without objection, all Members will have 5 
+legislative days to submit any additional materials for 
+inclusion in the record.
+    And without objection, this hearing is adjourned.
+    [Whereupon, at 12 p.m., the Subcommittee was adjourned.]
+                            A P P E N D I X
+
+                              ----------                              
+
+
+               Material Submitted for the Hearing Record
+
+ Prepared Statement of the Honorable Henry C. ``Hank'' Johnson, Jr., a 
+   Representative in Congress from the State of Georgia, and Member, 
+        Subcommittee on Crime, Terrorism, and Homeland Security
+[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
+
+  Prepared Statement of the Honorable Ted Deutch, a Representative in 
+Congress from the State of Florida, and Member, Subcommittee on Crime, 
+                    Terrorism, and Homeland Security
+[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
+
+
+                                 
+
+