[House Hearing, 112 Congress]
[From the U.S. Government Publishing Office]



 
               DATA RETENTION AS A TOOL FOR INVESTIGATING INTERNET 
                CHILD PORNOGRAPHY AND OTHER INTERNET CRIMES
=======================================================================
                                HEARING

                               BEFORE THE

                   SUBCOMMITTEE ON CRIME, TERRORISM,
                         AND HOMELAND SECURITY

                                 OF THE

                       COMMITTEE ON THE JUDICIARY
                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             FIRST SESSION

                               __________

                            JANUARY 25, 2011

                               __________

                            Serial No. 112-3

                               __________

         Printed for the use of the Committee on the Judiciary



[GRAPHIC NOT AVAILABLE IN TIFF FORMAT]


      Available via the World Wide Web: http://judiciary.house.gov


                              __________



                    U.S. GOVERNMENT PRINTING OFFICE
63-873 PDF                    WASHINGTON: 2011
___________________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com.  






                           COMMITTEE ON THE JUDICIARY

                      LAMAR SMITH, Texas, Chairman
F. JAMES SENSENBRENNER, Jr.,         JOHN CONYERS, Jr., Michigan
    Wisconsin                        HOWARD L. BERMAN, California
HOWARD COBLE, North Carolina         JERROLD NADLER, New York
ELTON GALLEGLY, California           ROBERT C. ``BOBBY'' SCOTT, 
BOB GOODLATTE, Virginia                  Virginia
DANIEL E. LUNGREN, California        MELVIN L. WATT, North Carolina
STEVE CHABOT, Ohio                   ZOE LOFGREN, California
DARRELL E. ISSA, California          SHEILA JACKSON LEE, Texas
MIKE PENCE, Indiana                  MAXINE WATERS, California
J. RANDY FORBES, Virginia            STEVE COHEN, Tennessee
STEVE KING, Iowa                     HENRY C. ``HANK'' JOHNSON, Jr.,
TRENT FRANKS, Arizona                  Georgia
LOUIE GOHMERT, Texas                 PEDRO PIERLUISI, Puerto Rico
JIM JORDAN, Ohio                     MIKE QUIGLEY, Illinois
TED POE, Texas                       JUDY CHU, California
JASON CHAFFETZ, Utah                 TED DEUTCH, Florida
TOM REED, New York                   LINDA T. SANCHEZ, California
TIM GRIFFIN, Arkansas                DEBBIE WASSERMAN SCHULTZ, Florida
TOM MARINO, Pennsylvania
TREY GOWDY, South Carolina
DENNIS ROSS, Florida
SANDY ADAMS, Florida
BEN QUAYLE, Arizona

      Sean McLaughlin, Majority Chief of Staff and General Counsel
       Perry Apelbaum, Minority Staff Director and Chief Counsel
                                 ------                                

        Subcommittee on Crime, Terrorism, and Homeland Security

            F. JAMES SENSENBRENNER, Jr., Wisconsin, Chairman

                  LOUIE GOHMERT, Texas, Vice-Chairman

BOB GOODLATTE, Virginia              ROBERT C. ``BOBBY'' SCOTT, 
DANIEL E. LUNGREN, California        Virginia
J. RANDY FORBES, Virginia            STEVE COHEN, Tennessee
TED POE, Texas                       HENRY C. ``HANK'' JOHNSON, Jr.,
JASON CHAFFETZ, Utah                   Georgia
TIM GRIFFIN, Arkansas                PEDRO PIERLUISI, Puerto Rico
TOM MARINO, Pennsylvania             JUDY CHU, California
TREY GOWDY, South Carolina           TED DEUTCH, Florida
SANDY ADAMS, Florida                 DEBBIE WASSERMAN SCHULTZ, Florida
BEN QUAYLE, Arizona                  SHEILA JACKSON LEE, Texas
                                     MIKE QUIGLEY, Illinois

                     Caroline Lynch, Chief Counsel

                     Bobby Vassar, Minority Counsel
                            C O N T E N T S

                              ----------                              

                            JANUARY 25, 2011

                                                                   Page

                           OPENING STATEMENTS

The Honorable F. James Sensenbrenner, Jr., a Representative in 
  Congress from the State of Wisconsin, and Chairman, 
  Subcommittee on Crime, Terrorism, and Homeland Security........     1
The Honorable Robert C. ``Bobby'' Scott, a Representative in 
  Congress from the State of Virginia, and Ranking Member, 
  Subcommittee on Crime, Terrorism, and Homeland Security........     2
The Honorable Lamar Smith, a Representative in Congress from the 
  State of Texas, and Chairman, Committee on the Judiciary.......     4
The Honorable John Conyers, Jr., a Representative in Congress 
  from the State of Michigan, and Ranking Member, Committee on 
  the Judiciary..................................................     5

                               WITNESSES

Mr. Jason Weinstein, Deputy Assistant Attorney General, United 
  States Department of Justice, Washington, DC
  Oral Testimony.................................................     6
  Prepared Statement.............................................     9
Mr. John M. Douglass, Chief of Police, Overland Park, KS; 
  International Association of Chiefs of Police, Alexandria, VA
  Oral Testimony.................................................    16
  Prepared Statement.............................................    18
Ms. Kate Dean, Executive Director, United States Internet Service 
  Provider Association, Washington, DC
  Oral Testimony.................................................    23
  Prepared Statement.............................................    25
Mr. John B. Morris, Jr., General Counsel, Center for Democracy 
  and Technology, Washington, DC
  Oral Testimony.................................................    34
  Prepared Statement.............................................    36

          LETTERS, STATEMENTS, ETC., SUBMITTED FOR THE HEARING

Prepared Statement of Ernie Allen, President and CEO, The 
  National Center for Missing & Exploited Children, submitted by 
  the Honorable F. James Sensenbrenner, Jr., a Representative in 
  Congress from the State of Wisconsin, and Chairman, 
  Subcommittee on Crime, Terrorism, and Homeland Security........    56

                                APPENDIX
               Material Submitted for the Hearing Record

Prepared Statement of the Honorable Henry C. ``Hank'' Johnson, 
  Jr., a Representative in Congress from the State of Georgia, 
  and Member, Subcommittee on Crime, Terrorism, and Homeland 
  Security.......................................................    77
Prepared Statement of the Honorable Ted Deutch, a Representative 
  in Congress from the State of Florida, and Member, Subcommittee 
  on Crime, Terrorism, and Homeland Security.....................    81


 DATA RETENTION AS A TOOL FOR INVESTIGATING INTERNET CHILD PORNOGRAPHY 
                       AND OTHER INTERNET CRIMES

                              ----------                              


                       TUESDAY, JANUARY 25, 2011

              House of Representatives,    
              Subcommittee on Crime, Terrorism,    
                             and Homeland Security,
                                Committee on the Judiciary,
                                                    Washington, DC.

    The Subcommittee met, pursuant to notice, at 10 a.m., in 
room 2141, Rayburn House Office Building, the Honorable F. 
James Sensenbrenner, Jr. (Chairman of the Subcommittee) 
presiding.
    Present: Representatives Sensenbrenner, Smith, Gohmert, 
Goodlatte, Lungren, Poe, Griffin, Marino, Adams, Quayle, Scott, 
Conyers, Johnson, Chu, Deutch, Wasserman Schultz, and Quigley.
    Staff Present: (Majority) Caroline Lynch, Subcommittee 
Chief Counsel; Arthur Radford Baker, Counsel; Sam Ramer, 
Counsel; Lindsay Hamilton, Clerk; (Minority) Bobby Vassar, 
Subcommittee Chief Counsel; Liliana Coronado, Counsel; Ron 
LeGrand, Counsel; and Veronica Eligan, Professional Staff 
Member.
    Mr. Sensenbrenner. The Subcommittee will come to order. 
Welcome to the first hearing in the 112th Congress of the 
Subcommittee on Crime, Terrorism and Homeland Security.
    I would especially like to welcome our witnesses and thank 
you for joining us today.
    I am joined today by my colleague from Virginia, the 
distinguished Ranking Member of the Subcommittee, Bobby Scott; 
by the Chairman of the full Committee, Lamar Smith from Texas; 
and the Chairman emeritus, John Conyers of Michigan.
    Today's hearing examines the role of data retention as a 
law enforcement tool to investigate the distribution of child 
pornography on the Internet and other online crimes. Many 
Internet Service Providers, ISPs currently retain data that can 
be used to identify the operator or user of an illegal Web 
site. But not all ISPs retain this important data, and the 
length of time such data is retained often varies from one 
provider to the next.
    The issue of data retention is not new. In 1999, then 
Deputy Attorney General Eric Holder said that certain data must 
be retained by ISPs for reasonable periods of time so that it 
can be accessible to law enforcement. In the 12 years since Mr. 
Holder's endorsement of data retention by ISPs, the size, scope 
and accessibility of the Internet has increased exponentially. 
The criminals can now use the Internet to facilitate almost any 
crime, including illegal gambling, cigarette and prescription 
drug distribution, and child exploitation. These criminals have 
the luxury of cloaking themselves in the anonymity that the 
Internet provides, making their apprehension significantly more 
difficult.
    When law enforcement officers begin an investigation and 
develop information that will assist in identifying an 
offender, they are often frustrated to find that information 
relating describer information or information that would 
otherwise identify the perpetrator is not retained in a uniform 
manner. Current law already requires providers to preserve such 
data upon the request of law enforcement, but the preservation 
of data only works if the data has been retained.
    Internet crimes are often complex, multi-jurisdictional and 
international. This can result in protracted investigations 
before law enforcement officers are in a position to request 
data from the providers. When the information is developed 
sufficiently to point investigators to the records they need, 
it may be too late. Without uniform retention, the records that 
are desperately needed to attribute communications to a certain 
person or computer may be lost forever.
    This issue not only impacts Federal investigations of 
online crimes and national security matters but State and local 
law enforcement investigations as well.
    The International Association of Chiefs of Police adopted a 
resolution in 2006 expressing its support for data retention to 
aid in the investigation of crimes facilitated or committed 
through the use of the Internet and telephony-based 
communication services. Providing law enforcement officers with 
an expectation that certain data will be available ensures that 
our very limited police resources are properly assigned and are 
not sent on wild goose chases for information that no longer 
exists.
    Simply put, no matter what type of investigation it is, 
investigators ultimately have to identify the person at the 
keyboard. The service providers hold the key to identifying the 
person behind the screen name, an e-mail address or an Internet 
protocol address. Retention of their records is paramount to 
fighting crime in an Internet age.
    It is now my pleasure to recognize for his opening 
statement, the Ranking Member of the Subcommittee, the 
gentleman from Virginia, Mr. Scott.
    Mr. Scott. Thank you, Mr. Chairman, and I look forward to 
working with you, as the new Chairman of the Subcommittee. 
Today's hearing is meant to be an informational and fact-
finding proceeding to help us begin the conversation about the 
desirability, feasibility and consequences of retaining data 
regarding a consumer's Internet use.
    No one disputes that mandated data retention can help the 
identification and prosecution of those who engage in 
trafficking of child pornography on the Internet. The question 
is whether we--the question we should seek to answer however is 
how we can best investigate such crimes, consistent with the 
rights and liberties of all in society and consistent with the 
cost-benefits of such a policy.
    While we want to ensure the legitimate needs of law 
enforcement are met to allow to investigate and prosecute 
offenders who use the Internet to commit crimes, particularly 
those who use it to commit sex crimes against children, it is 
critical to understand the nature and scope of any problem 
under current law before we purport to fix it.
    Currently many companies already retained significant 
amounts of subscriber data, some up to 12 months. Nonetheless 
there is lack of empirical research about law enforcement's 
requests under current law and the instances in which data is 
not available.
    We should also review what law enforcement is doing with 
information that they presently have. I have been informed that 
the private industry already forwards over 100,000 leads a year 
to law enforcement, and less than 10,000 prosecutions have been 
brought in the last 3 years. If we are looking for the 
proverbial needle in a haystack, the last thing we need is more 
hay.
    As we review the current situation, we should also 
recognize that there is a lack of clarity about the types 
requests that law enforcement is presently making and whether 
much of the desired information is already available.
    For these reasons, we should consider whether we need a 
comprehensive study of data retention, including current 
practices and the costs associated with the various proposals 
of data retention policy, among other questions. Some of the 
questions are, what kind of data we are talking about 
retaining, whether it is all the content or just the site 
information? This way we will ensure that the public policy 
ultimately adopted will be an evidence-based, cost-effective 
policy.
    But apart from technological and practical issues that must 
be addressed, if we are to consider such policy, there are 
other costs, societal costs, associated with data retention. 
There are approximately 230 million Americans who use the 
Internet, and there are serious privacy and First Amendment 
concerns that are implicated in this discussion. We must ask 
ourselves whether it is prudent to require telecommunications 
companies to retain large amounts of personal and sensitive 
information, which would be attractive targets for computer 
hackers, about millions of Internet users in order to get a 
miniscule number of users who engage in crimes against children 
online. We need to consider alternative policies that 
specifically target those suspected of wrongdoing without 
requiring that innocent consumers compromise their rights to 
privacy and free speech when they choose to use the Internet.
    The notion of preserving large amounts of what amounts to 
be virtual potential crime scenes is a backward and possibly 
ineffective way to go about going about the important business 
of protecting our children. This is particularly true when the 
unintended collateral consequences of such a policy on 
industry, private interests, and on free speech may be 
substantial, as some of the witnesses will explain today.
    And when we consider the rights of privacy about retained 
data, we should also consider--we should also take the 
opportunity to consider retaining information on gun purchases 
by those enjoying their Second Amendment rights.
    Final point to keep in mind in our discussion is that 
several aspects of the mandated data retention policy run 
counter to the idea that we should always consider the cost-
benefit implications of any new regulations. Data retention 
policy can be expensive. This is a huge government expense. And 
just to get a sense of the possible costs, Congress 
appropriated $500 million to implement the Communications 
Assistance Law Enforcement Act a few years ago. This did not 
involve ongoing costs such that data retention will. Should the 
industry be expected to absorb some of the costs, we should be 
clear about what the costs are and what the benefits will be.
    So I look forward to hearing testimony from our witnesses 
and hope we can have a productive conversation about the 
complexities of data retention policies.
    Thank you, Mr. Chairman, for holding the hearing today.
    Mr. Sensenbrenner. Thank you, Mr. Scott.
    The Chair now recognizes the distinguished Chairman of the 
Committee, the gentleman from Texas, Mr. Smith.
    Mr. Smith. Thank you, Mr. Chairman.
    Mr. Chairman, like you, I thank our witnesses for being 
here today, and it is nice to be on the same side as the 
Administration, or maybe I should say, I am glad they are on 
our side, but it works well regardless.
    Also I want to mention, Mr. Chairman, that I heard Mr. 
Scott's remarks right now, and I am absolutely confident that 
we will be able to find that balance between protecting privacy 
and also protecting children. Mr. Scott mentioned having a 
productive conversation on that subject, and I look forward to 
that as well.
    Mr. Chairman, it may be difficult to believe, but according 
to the U.S. Justice Department, trafficking of child 
pornography images was almost completely eradicated in America 
by the mid-1980's. Purchasing or trading child pornography 
images was risky and almost impossible to undertake.
    The advent of the Internet reversed this accomplishment. 
Today child pornography images litter the Internet, and 
pedophiles can purchase, view or exchange this disgusting 
material with virtual anonymity.
    Parents who once relied on the four walls of their homes to 
keep their children safe are now faced with a new challenge. 
The Internet has unlocked the doors and opened windows into our 
homes. FBI Director Robert Mueller told this Committee in April 
2008 that, ``Just about every crime has gravitated to the 
Internet, and in certain cases the Internet has provided the 
vehicle for expansion that otherwise would not be there, and 
this is certainly true with child pornography.''
    The statistics reflect just how serious the problem of 
child exploitation has become. Since the National Center for 
Missing & Exploited Children, NCMEC, created the cyber tip line 
12 years ago, electronic service providers have reported almost 
8 million images and videos of sexually exploited children. 
According to that organization, child porn images increased 
1,500 percent between 1995 and 2005, an average increase of 
over 100 percent a year. The number of reports to a cyber tip 
line of child pornography, child prostitution, child sex 
tourism, child sexual molestation, and online sex enticement of 
children increased from 4,500 in 1998 to 102,000 in 2008. An 
average increase of over 200 percent per year.
    As many as one in three kids have received unsolicited 
sexual content online, and one in seven children has been 
solicited for sex online. More robust data retention will 
certainly assist law enforcement investigators on a wide array 
of criminal activity, but such a requirement would be 
especially helpful in the investigation of child pornography 
and other child exploitation matters. The investigation of 
these types of cases has become increasingly more complicated, 
and perpetrators have become increasingly more sophisticated in 
their methods of concealing their activities.
    When law enforcement officers do develop leads that might 
ultimately result in saving a child or apprehending a 
pornographer, their efforts should not be frustrated because 
vital records were destroyed simply because there was no 
requirement to retain them. Every piece of discarded 
information could be the footprint of a child predator.
    Last Congress I introduced the Internet Stopping Adults 
Facilitating the Exploitation of Today's Youth, SAFETY, Act of 
2009. Among other things, the bill required providers to retain 
records pertaining to the identity of an IP address user for at 
least 2 years. It ensures that the online footprints of 
predators are not erased.
    Data retention preserves critical evidence from the online 
crime scene so that investigators can apprehend the predator 
and potentially save a child from further exploitation.
    The Internet has proved to be of great value in many 
aspects of our lives, but it has also evolved into a virtual 
playground for sex predators and pedophiles, and facilitated 
nearly effortless trafficking of child pornography. The loss of 
a child's innocence or, even worse, their life is simply too 
high a price to pay for not retaining certain data for a 
reasonable amount of time.
    I look forward to hearing from our witnesses and working 
with them to combat one of fastest growing crimes in America.
    Thank you, Mr. Chairman, I yield back.
    Mr. Sensenbrenner. The Chair now recognizes the 
distinguished new Chairman emeritus of the full Committee, the 
speaker being the old Chairman emeritus, the gentleman from 
Michigan, Mr. Conyers.
    Mr. Conyers. Thanks, Chairman Sensenbrenner.
    It is with some reluctance that I join the rank of ex-
Chairmen like you, but here we are all together, working.
    This bipartisan thing is really getting frightening because 
we are all waiting with anticipation tonight at 8 o'clock to 
find out just how far the 44th is carrying this thing.
    Already Chairman Smith and the Department of Justice have 
hooked up people like the Constitution Project, ACLU, and David 
Cole; I won't mention myself, because I will be sitting next to 
a Republican tonight, and I don't want to get any flack. But I 
suppose this hearing is very necessary, but I am impressed with 
what the Center for Democracy and Technology is doing, along 
with the other dissidents that I have listed.
    I am worried about privacy rights. And data retention 
creates, as Bobby Scott has said, it creates some big problems, 
including identity theft. I think the Internet industry ought 
to be concerned about this, and let's see where we can go on 
it.
    Now if this cooperation continues in the Committee, this 
Subcommittee, we have got to look at the Federal prison system. 
There are a number of other projects that perhaps the 
Department of Justice and the Subcommittee on Crime can be 
working on. I look forward to working with all of you on this 
subject.
    Thanks, Chairman Sensenbrenner.
    Mr. Sensenbrenner. Thank you very much.
    Without objection, other Members' statements will be made a 
part of the record.
    And without objection, the Chair will be authorized to 
declare recesses during votes in the House.
    It is now my pleasure to introduce today's witnesses.
    Jason Weinstein serves as deputy assistant attorney general 
with the Department of Justice. He has also served as a special 
investigative counsel in the Justice Department's Office of the 
Inspector General and as assistant U.S. attorney in the 
southern district of New York. Mr. Weinstein previously served 
as chief of the Violent Crime Section in the U.S. Attorney's 
Office in Baltimore where he developed Project Exile, a multi-
agency effort to curb violent crime in that state. He received 
has Bachelors of degree in politics from Princeton and his J.D. 
From George Washington University Law School in 1994.
    Without objection, Mr. Weinstein's statement and the other 
witness's statements will appear in the record.
    Each witness will be recognized for 5 minutes to summarize 
their written statement, and the Chair recognizes Mr. 
Weinstein. 

    TESTIMONY OF JASON WEINSTEIN, DEPUTY ASSISTANT ATTORNEY 
  GENERAL, UNITED STATES DEPARTMENT OF JUSTICE, WASHINGTON, DC

    Mr. Weinstein. Good morning, Chairman Sensenbrenner, 
Chairman Smith, Chairman Emeritus Conyers, and Ranking Member 
Scott, and Members of the Subcommittee.
    And Mr. Chairman, although I was rooting for the Bears, let 
me congratulate you on the Packers making the Super Bowl.
    Mr. Sensenbrenner. You are forgiven.
    Mr. Weinstein. As we all know, the explosive growth of the 
Internet and other modern forms of communication has 
revolutionized nearly every aspect of our lives, but at the 
same time, it has also revolutionized crime.
    Increasingly the Internet and other forms of electronic 
communication are exploited by criminals to commit a staggering 
array of crimes, from hackers who steal tens of millions of 
bank card numbers to gang members who issue orders to murder 
their rivals to predators who sexually abuse children and post 
images of that abuse online and, of course, to terrorists.
    These criminals take advantage of the Internet because of 
its global nature and because of the speed with which it allows 
them to operate. Unfortunately, as an added benefit to them, 
the Internet also affords them a kind of anonymity.
    Federal, State and local law enforcement officers who 
investigate and prosecute these crimes need to have certain 
information about the identities and the activities of these 
criminals who commit them in order to identify and arrest the 
perpetrators. That information is noncontent data; that is, it 
is data about the criminals and their communications with 
others as opposed to the content of those communications.
    The government, under current law, is allowed to use lawful 
process, which is typically a subpoena, a court order or search 
warrant, to require providers to furnish that data. But those 
authorities are only useful if the data is still in existence 
at the time the government seeks to obtain it. And for that 
reason, data retention by companies that provide the public 
with Internet and other communication services is fundamental 
to our ability to protect public safety.
    Currently, despite the diligent and efficient work by law 
enforcement officers at all levels, critical data has too often 
been deleted by providers before law enforcement can obtain 
that lawful process. This gap between providers' retention 
practices and the needs of law enforcement can be extremely 
harmful to investigations that are critical to protecting the 
public from predators and other criminals.
    And the problem is exacerbated by the complexity of 
investigating crimes committed using online means. These crimes 
are difficult to detect, and they may not be discovered or 
reported to law enforcement until months and months have gone 
by.
    And they are even more difficult to investigate. They often 
involve the time-consuming process of obtaining evidence from 
overseas. They often require months and months of work 
obtaining records from a series of providers as agents attempt 
to follow the trail of steps used by criminals to try to cover 
their tracks and render themselves anonymous.
    Unfortunately, when providers have not retained the data 
that is needed for a sufficient period of time, important 
investigations of serious crimes may come to a dead end. To be 
sure, most providers are cooperative with law enforcement, and 
for that, we are appreciative. Many providers, in fact, already 
collect the types of data that we need to solve crimes, because 
they use that data to operate their networks or for other 
commercial purposes. The problem is often simply that that data 
is not retained long enough to meet the needs of public safety.
    However, some providers simply don't retain the needed data 
at all. Provider retention policies that are in place vary 
widely across the industry, and they are subject to change at 
will. In short, the lack of adequate, uniform and consistent 
data retention policies threatens our ability to use the legal 
tools Congress has provided to law enforcement to protect 
public safety.
    Now, in setting the retention policies and practices, 
companies are often motivated by a completely understandable 
desire to control costs and to protect the privacy of their 
users. But those factors must be balanced against the cost to 
public safety of allowing criminals to go free. And truly 
protecting privacy requires not only that we keep personal 
information from the criminals who seek to steel it but also 
that we ensure that law enforcement has the data that it needs 
to catch and prosecute those same criminals.
    Developing an appropriate and effective data retention 
requirement will mean balancing all of the interests involved: 
balancing the impact on privacy, the provider costs associated 
with retaining data for longer periods, and the cost to public 
safety when critical data noncontent data has been deleted. 
Congress has a critical role to play in fostering that 
discussion and in balancing those interests, and today's 
hearing is an important step in that process.
    As we embark on this discussion, it is important to be 
clear that this debate is not about giving the government, not 
about giving law enforcement new authorities. It is simply 
about making sure that data is available when law enforcement 
seeks to use the authorities that Congress has already 
provided.
    My primary goal here today is to explain the nature of the 
public safety interest in data retention. Today I am not in a 
position to propose a particular solution, but the Justice 
Department looks forward to working with Congress, with 
industry, and with other interested groups as we seek to 
develop just such a solution.
    I thank you for the opportunity to discuss this important 
issue with you this morning, and I would be pleased to answer 
your questions at the appropriate time.
    [The prepared statement of Mr. Weinstein follows:]
                 Prepared Statement of Jason Weinstein
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
                               __________

    Mr. Sensenbrenner. Thank you, Mr. Weinstein.
    John M. Douglass serves as the chief of police for the 
Overland Park Police Department in Kansas. He began his law 
enforcement career with the Overland Park Police Department in 
1973. He currently serves as cochair of the National Advisory 
Committee for the Regional Computer Forensic Lab System. He has 
served in numerous positions during his tenure with the 
Overland Park Police Department as well as other various 
professional positions, including the past president of the 
Kansas Association of Chiefs of Police. Chief Douglass has 
received numerous awards, including the Clarence M. Kelly Award 
For Excellence in Criminal Justice Administration in 2000, the 
Evelyn Wasserstrom Award and Clarence Barrow Peacekeeper Award. 
Chief Douglass received his Bachelor's degree from the 
University of Kansas and his Masters degree in public 
administration also from the University of Kansas.
    Mr. Douglass.

TESTIMONY OF JOHN M. DOUGLASS, CHIEF OF POLICE, OVERLAND PARK, 
KS; INTERNATIONAL ASSOCIATION OF CHIEFS OF POLICE, ALEXANDRIA, 
                               VA

    Chief Douglass. Thank you, Mr. Chairman, Members of the 
Subcommittee.
    As stated, my name is John Douglass, and I serve as the 
chief of police in Overland Park, Kansas, a suburb of Kansas 
City. I am here today on behalf of the International 
Association of Chiefs of Police, representing over 20,000 law 
enforcement executives in over 100 countries throughout the 
world.
    I am pleased to be here this morning to discuss the 
challenges currently confronting the U.S. law enforcement 
community and our need for further clarity on data retention 
issues.
    In the United States, there are more than 18,000 law 
enforcement agencies and well over 800,000 officers who patrol 
our State highways and streets of our communities each and 
every day.----
    Mr. Scott. Could you pull your microphone?
    Chief Douglass. Yes, sir, I am sorry.
    A great number of these officers also survey the Internet, 
phone and data logs, and other electronic communication as they 
investigate crimes. Each day Federal, State, and local tribal 
law enforcement agencies are investigating cybercrime cases, 
ranging from bank intrusions, to fraud, intellectual property, 
terrorism, economic espionage and, unfortunately, innocent 
images or child pornography crimes.
    Data preservation is a key component in any investigation. 
When criminals access the Internet through an ISP or Internet 
Service Provider or they send text messages, e-mails and other 
data, it creates important records and other information. In 
every case where criminal or civil action is envisioned, there 
is a clear need to preserve third-party logs and business 
records related to these connections which specifically 
demonstrate that a suspect's service provider is connecting 
with a victim's service provider or through another 
infrastructure en route.
    When law enforcement suspects that a crime has been 
committed, we request a subpoena, court order or search warrant 
to obtain critical evidence from the service provider, such as 
customer records, connection information or stored data.
    Take, for example, a case from southern California which 
would not have been solved without the cell phone data from 
Verizon Wireless. On July 26th, 2006, 22-year old Tori Vienneau 
and her 10-month infant son, Dean, were murdered in their two-
bedroom apartment in San Diego. Tori was found strangled in her 
living room, and Baby Dean was found strangled and hung from 
his crib in one of the adjoining bedrooms.
    This horrifying crime scene triggered an exhaustive 18-
month investigation. The case was ultimately solved exclusively 
by the circumstantial evidence, including cell text message 
content and cell tower data from Verizon Wireless. The 
defendant denied any involvement in the killings and provided 
an intricate and extensive alibi.
    Investigators focused their attention on Dennis Potts 
almost immediately because he was rumored to have had dinner 
plans with Tori on the night of her murder. Mr. Potts denied 
these rumors of dinner plans, and the victim's cell phone was 
examined for any text messages between the two of them 
supporting or refuting such rumors.
    In a most interesting twist, all incoming and outgoing text 
messages prior to 6:30 p.m. on the night of the killings had 
been deleted. The victim's cell phone provider was contacted, 
but the text message content was not stored by the cell 
provider and, therefore, could not be recovered that way.
    Over the ensuing months, the victim's phone was subjected 
to be extensive forensic analysis in the hopes of recovering 
some of these message. The defendant's cell phone carrier, 
Verizon Wireless, was also contacted, and investigators were 
told incoming text message content, victim-to-defendant text 
only, was preserved for only 3 to 5 days. But in a stroke of 
good luck, this incoming data still existed and was preserved.
    And it later proved to be pivotal in proving the 
defendant's guilt. The text message content proved not only 
that the defendant lied to investigators and that the two did 
in fact have plans to meet that evening, but also that the 
defendant was checking to see if the victim and her son were 
alone in the apartment.
    Verizon also provided the cell tower data from the 
defendant's phone. This data, coupled with some additional 
testing, showed the defendant's alibi was false, and he was not 
where he said he was. Furthermore, at the time of the killings, 
his cell phone pinged off a cell tower only 500 yards from the 
victim's apartment. This became the single most important piece 
of evidence in linking the defendant to the killings.
    Clearly, preserving digital evidence is crucial in any 
modern day criminal investigation. While law enforcement does 
have success obtaining evidence through the appropriate legal 
process, because we are extremely aware of spoliation concerns, 
we are not always successful. Many times we face obstacles in 
our investigations, from the differing locations of victims to 
their locations of the perpetrators.
    In closing, Federal, State, tribal and local law 
enforcement are doing all that we can to protect our 
communities from increasing crime rates and the specter of 
terrorism both online and in our streets, but we cannot do it 
alone. We need the full support and the assistance of the 
Federal Government and clear guidance and regulations on data 
retention to aid us in successfully investigating and 
prosecuting the most dangerous of criminals.
    [The prepared statement of Chief Douglass follows:]
                 Prepared Statement of John M. Douglass
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]

                               __________

    Mr. Sensenbrenner. Thank you very much, Chief.
    Kate Dean serves as the executive director of the United 
States Internet Service Provider Association. Ms. Dean has been 
active in telecommunications and Internet policy in Washington, 
D.C., for more than 10 years and is a member of the 
International Academy of Digital Arts and Sciences. She started 
her own firm in 2006, where, in addition to continuing to work 
with US ISPA, she volunteers with an organization in Singapore 
that brings healthy sanitation solutions to underserved 
villages in the developing world. And he received her bachelor 
degree in 2000 from American University.
    Ms. Dean.

   TESTIMONY OF KATE DEAN, EXECUTIVE DIRECTOR, UNITED STATES 
     INTERNET SERVICE PROVIDER ASSOCIATION, WASHINGTON, DC

    Ms. Dean. Chairman Sensenbrenner. Ranking Member Scott.
    Mr. Sensenbrenner. Could you pull the mike a little closer 
to you? 
    Ms. Dean. I sure can.
    Mr. Sensenbrenner. Thank you.
    Ms. Dean. My name is Kate Dean, and I am the executive 
director of the United States Internet Service Provider 
Association or US ISPA. Since January 2002, our members major 
Internet service, network and portal providers, have focused on 
policy and legal concerns related to law enforcement compliance 
and security matters, including ECPA, CALEA, cyber security and 
notably the fight against online child exploitation. For years 
US ISPA and our members have participated in efforts to examine 
the issue of data retention, particularly in a content of child 
exploitation, including past dialogues with the Department of 
Justice and with State and local law enforcement.
    We welcome the opportunity to continue the discussion 
today. Before addressing data retention, I would like to tell 
you about our efforts in the child protection arena. In 2005, 
we published ``Sound Practices for Reporting Child 
Pornography,'' a joint project between US ISPA and the National 
Center for Missing & Exploited Children.
    We updated those practices to reflect new requirements put 
in place by the 2008 passage of the Protect Our Children Act, a 
bill US ISPA strongly supported.
    Last year we developed sound practices for subpoena 
compliance with the National Association of Attorneys General. 
We also supported the Online Safety and Technology Working 
Group, which reported to Congress in June with their 
examination of industry reporting practices and data retention.
    US ISPA members have been active in various internet safety 
task forces, including the Technology Coalition and the 
Financial Coalition Against Child Pornography. Members maintain 
24-by-7 response capabilities, offer law enforcement guides, 
frequently interact with the ICAC and conduct training for 
investigators and prosecutors.
    As I hope our actions demonstrate, US ISPA is committed to 
the fight against online child exploitation. And we support law 
enforcement efforts to bring online criminals to justice, 
especially those who harm children. We fully appreciate the 
critical role that electronic evidence plays in those efforts.
    Service providers report tens of thousands of incidents of 
apparent child pornography each year to NCMEC. And because of 
the Protect Our Children Act, all providers are now required to 
sent robust reports, including subscriber information, 
historical and geographic data, and the images themselves 
through NCMEC's cyber tip line.
    At the time of receipt, providers automatically preserve 
the account and hold onto data for 90 days, awaiting legal 
process. The novel approach to preservation adopted in the 
reporting statute was derived from preservation authority that 
has long existed in the Electronic Communications Privacy Act. 
ECPA gives law enforcement the authority to require providers 
to preserve evidence needed for investigations for up to 180 
days without issuing legal process. We believe that effective 
use of preservation, a targeted, valuable tool, is key to 
addressing law enforcement's needs.
    US ISPA has carefully examined past data retention 
proposals and each time has concluded that a uniform retention 
mandate is certain to present significant challenges to the 
communications industry, as well as myriad unintended 
consequences. These challenges include the potential conflict 
of new obligations and regulatory burdens; new questions about 
user privacy and the standards for law enforcement access to 
stored data; technical and security risks; and delay when 
retrieving data, all which could negatively effect law 
enforcement investigations.
    Many of these challenges have plagued the European Union's 
attempt at implementation of its data retention directive. As 
we discuss the issue here today, a similar dialogue is taking 
place within the EU as they reassess their approach and 
consider alternatives, like preservation.
    Unlike preservation, data retention raises tough questions 
about breadth, scope, duration, liability and costs, costs that 
go well beyond mere dollars. These are all critical 
considerations that require close examination by industry and 
by Congress.
    In closing, US ISPA remains committed to an open dialogue, 
but we have concerns about the effectiveness and implementation 
of mandatory data retention. We worry about the indirect costs 
to innovation, privacy and the speed and accuracy of 
investigations. Based on our experiences, we continue to 
believe that targeted approaches like preservation are the best 
and most effective use of available resources. We appreciate 
this opportunity to present our views on this topic and look 
forward to working with you and your staff.
    [The prepared statement of Ms. Dean follows:]
                    Prepared Statement of Kate Dean
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]

                               __________

    Mr. Sensenbrenner. Thank you, Ms. Dean.
    John B. Morris, Jr., serves as general counsel at the 
Center for Democracy and Technology in Washington, D.C. He is 
director of the Internet Standards Technology and Policy 
Project. He is also involved in the Center for Democracy and 
Technology's work on cyber security, privacy and neutrality. 
Prior to joining the center, Mr. Morris was a partner in the 
law firm of Jenner & Block. Additionally, Morris has served as 
director of CDT's Broadband Access Project. He received his 
Bachelors degree from Yale and his J.D. From Yale Law School. 
Mr. Morris.

 TESTIMONY OF JOHN B. MORRIS, JR., GENERAL COUNSEL, CENTER FOR 
            DEMOCRACY AND TECHNOLOGY, WASHINGTON, DC

    Mr. Morris. Thank you very much, Chairman Sensenbrenner, 
Ranking Member Scott, Chairman Smith and Chairman Emeritus 
Conyers and the Members of the Committee.
    On behalf of the Center for Democracy and Technology, I 
would like to thank you for the opportunity to testify today. 
Child pornography is a horrific crime, and we applaud the 
efforts by this Congress and this Subcommittee to increase the 
resources available to prosecute this crime.
    A data retention mandate would raise a number of serious 
privacy and free speech concerns. At a time when there is a 
growing concern about privacy and identify theft, a growing 
concern about the commercial misuse of personal data and a 
growing concern about the intrusion of the Federal Government 
into the personal lives of American citizens, Congress should 
be very hesitant to require service providers create databases 
to track the Internet activities of 230 million innocent 
Americans.
    This morning I would like to set aside briefly the privacy 
and free speech concerns that I addressed in my written 
testimony and instead focus on the fact that a data retention 
mandate would harm innovation and competition on the Internet 
and harm the ability of the American Internet industry to 
compete in the global online marketplace, which in turn 
directly effects the ability of users to be able to participate 
and speak on the online market.
    Ms. Dean addressed the data retention concerns that the 
Internet Service Providers have. Let me look at the other end 
of the communication and then address proposals by law 
enforcement that source data be retained by any online services 
that allow users to communicate with each other. And the 
proposal that has been made to have services like Yahoo or 
Google or Facebook retain data is truly breathtaking and would 
be devastating to the Internet services, both to existing 
services and certainly to new innovators and startup services.
    The reach of the proposal cannot be underestimated. The 
proposed mandate that would reach most Web sites and online 
services, including all Web 2.0 sites, all social networking 
sites, all blogs, all sites that allow political or other 
commentary, the great majority of e-commerce sites and almost 
all modern news sites, like the NewYorkTimes.com or 
FoxNews.com.
    And the scale of what law enforcement is proposing is also 
astounding. Looking just at Facebook as an example, Facebook 
users post in the neighborhood of 2 billion chat messages every 
single day. When combined with other postings, Facebook alone 
would have to create and maintain a data retention database 
containing more than 1 trillion new records every single year. 
The size of Facebook's data retention database alone would be 
larger than all of the content that the Library of Congress has 
put online to date.
    Looking beyond Facebook, in 2009, there were 247 billion e-
mail messages sent every single day. And law enforcement is 
asking Congress to order that every single one of these 
messages be recorded and tracked. Over the course of a year, 
this mandate would require a database of more than 90 trillion 
records. And this does not even include chat or instant 
messaging, which is supplanting e-mail as a preferred method of 
person-to-person communications.
    Who would pay for this? Internet users would pay for this. 
And what would the impact of this burden be on online services? 
Some larger companies might survive, but smaller companies 
would likely be run out of business. Imposing an unfunded 
Federal mandate on anyone who allows users to communicate 
online can only have one result: There will be fewer businesses 
able to compete in the online marketplace, this will entrench 
the large providers, harm competition, harm innovation and 
ultimately harm users. Congress should not mandate the creation 
of an Orwellian tracking database with hundreds of trillions of 
records tracking innocent citizens wherever they go online.
    As a final critical point addressing the child pornography 
context, I have worked in this space a fair amount over the 
last 10 years, and every task force I serve on, every working 
group I serve on, I learned that law enforcement is overwhelmed 
with these cases. They don't have enough prosecutorial 
resources to prosecute all of the cases that they have. And so 
I really urge the Congress to look at the question as to 
whether adding more data and more data retention will in fact 
lead to more prosecutions of this horrific type of crime.
    The voluntary retention and data preservation orders allow 
law enforcement to target suspected criminals, and we urge the 
Subcommittee not to go down the path of imposing data retention 
mandates on this entire industry.
    [The prepared statement of Mr. Morris follows:]
               Prepared Statement of John B. Morris, Jr.
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
                               __________

    Mr. Sensenbrenner. Thank you, Mr. Morris.
    The Chair has written down the approximate order of 
appearances of the Members of the Subcommittee and will call on 
Members for 5 minutes in the order in which they appeared, 
alternatively by side.
    And I will start by recognizing myself for 5 minutes.
    And I want to direct my question to Ms. Dean. It seems to 
me that one of the problems that exists in this area is that 
there is not a uniform standard for how long the data has to be 
retained. It varies by Internet Service Provider. Would your 
association be willing to propose such a voluntary compliance 
order, picking a time and cooperation with law enforcement for 
the retention of this data in order to eliminate Congress 
stepping in?
    Ms. Dean. Thank you, Mr. Sensenbrenner, thank you Chairman.
    First of all, I guess I should say that we are here today 
because we are interested in the conversation, and we are 
interested in all opportunities to sit down with law 
enforcement and figure out if there is a solution to this 
problem that they describe today.
    US ISPA is always willing to be part of the dialogue with 
law enforcement at all levels. And I think that the questions 
that have been raised already today in opening statements are 
really what we should have the discussion about. We really need 
to learn more from law enforcement about the breadth of this 
kind of a requirement. Who do they want to keep data and 
specifically what kind of data do they want kept and for how 
long?
    Mr. Sensenbrenner. Well, let me say that I am a firm 
believer in carrots and sticks, and I am tossing you a carrot 
now. I think that there is a desire on the part of both the 
Administration and Congress to legislate in this area. I am 
giving you or tossing an oar for you to put in the water to try 
to bring your industry together to deal with this problem on a 
voluntary basis.
    And Mr. Morris has had a whole long list of questions that 
need to be answered. The fact is, is if you aren't a good 
rabbit and don't start eating the carrot, I am afraid that we 
are all going to be throwing the stick at you. So this is an 
opportunity for you to come up with some kind of a solution to 
all of the problems that both law enforcement and Mr. Morris 
have discussed. Are you on board, or should I take the oar 
back?
    Ms. Dean. I can tell you that I have heard you, and I am 
sure that my members have heard you as well, and they are 
dedicated to this issue, and we will absolutely sit down with 
law enforcement.
    Mr. Sensenbrenner. Okay, we are listening.
    I yield back the balance of my time.
    The gentleman from Virginia, Mr. Scott.
    Mr. Scott. Thank you.
    Mr. Morris, you talked about the cost of this data 
retention kind of in general, can you give something with a 
dollar sign in front of it, percentage of sales? What are we 
talking about in terms of cost?
    Mr. Morris. Truthfully, Mr. Scott, I can't give you dollar 
signs.
    Mr. Scott. Well, some of these data retention services 
retain huge amounts of data with negligible costs. Are we 
talking about anything significant?
    Mr. Morris. Yes. I think that simply the challenge of 
creating a database that would allow access to literally 
trillions of records is an enormous financial cost.
    Mr. Scott. Can you give something with a dollar sign in 
front of it, some numbers?
    Mr. Morris. I can't. One dollar sign I can give is that the 
vast majority of content and Web sites on the Internet are 
available for free, for $0 to their users. And those sites are 
very close to the line on a day-to-day basis as to whether they 
will make money or not make money. And the extra cost of any 
sort of Federal mandate would be very debilitating to those 
sites.
    Mr. Scott. Ms. Dean, you have been offered carrots and 
sticks. Right now, is it true that your industry is providing 
approximately 150,000 leads to law enforcement every year?
    Ms. Dean. In terms of the reporting apparent incidences of 
child pornography to the national center according to statutory 
obligations, I believe the number is somewhere around there. 
For the record, we could find out from NCMEC what the precise 
number is.
    But yes, service providers do report tens of thousands of 
reports a year, and they are----
    Mr. Scott. Now the way you reported, you have some kind of 
mechanism where somebody is sending a picture, and you can 
ascertain whether it fits a profile of what is known child 
pornography and that goes right to law enforcement; is that 
right?
    Ms. Dean. Well, the standard that service providers are 
required to transmit the images for referral to NCMEC is 
apparent. We don't know what is and is not child pornography. 
So when we, by either technical means or from user complaints, 
come upon such material, we box it up with all of the 
information that we have and transmit it to NCMEC.
    Mr. Scott. Mr. Weinstein, when you get this information, 
what do you do with it? I mean, you have got about 400,000 the 
last couple of years; you have hundreds of thousands of leads. 
Do you have the staff to follow through on those leads today?
    Mr. Weinstein. Ranking Member Scott, let me actually 
address both of those in order.
    When law enforcement gets referrals from NCMEC, from the 
national center, those referrals are distributed to law 
enforcement at the Federal level, depending on the part of the 
country that the referral comes from.
    Under the PROTECT Act of 2008, there is a mandatory 90-day 
retention period by ISPs that kicks in when those ISPs actually 
discover or become aware of possible child pornography, and 
they make a referral to the cyber tip line, as Ms. Dean 
indicated.
    The problem with that requirement, although it is a useful 
tool, is that it is limited in its effectiveness. Number one, 
it doesn't apply to other types of crimes beyond child 
exploitation, but even just within the realm of child 
exploitation, that obligation to retain and to report only 
kicks in when the ISP has actually discovered or become aware 
of the child pornography. And the statute doesn't impose any 
obligation on the ISP to do any monitoring of the network or to 
make any affirmative efforts to filed the child porn.
    Mr. Scott. Wait a minute. Can you keep up with the tips 
that you have coming in today? And you know that with across-
the-board budget cuts, you are looking at a loss of potentially 
thousands of FBI agents. Can you keep up with the tips that you 
are getting today?
    Mr. Weinstein. Well, it is fair to say that the scope of 
the problem far outpaces the resources we have available to 
fight it.
    Mr. Scott. Now you mumbled something about all crimes, if 
we pass something of data retention, is it true that this might 
be used for all crimes, not just child pornography?
    Mr. Weinstein. Well, it is my view that if Congress were to 
go down this road and actually create a data retention 
requirement, that it makes the most sense for it to apply to 
all crimes not just to child exploitation.
    Mr. Scott. And all of this information, now is the 
information we are talking about just site specific or content 
to include the content, because Mr. Douglass pointed out that, 
without the content, that information would not have been 
particularly helpful.
    Mr. Weinstein. Well, it is actually the opposite that is 
true, sir. It would not be content information that we would be 
taking about. It would be----
    Mr. Scott. Are we talking about retained--the policy, we 
are kind of vague here because we don't have a bill in front of 
us, but are you suggesting that we have content being preserved 
or retained as well as just the site information?
    Mr. Weinstein. No, I am talking about noncontent 
information about Internet communications, so IP addresses that 
are assigned to a user at the time of communication.
    Mr. Scott. So if we had that, then what Mr. Douglass used 
about reading the text messages wouldn't have been available.
    Mr. Weinstein. Well, as I understand it, text messages are 
generally not retained by providers.
    Mr. Scott. Well, that is what we are talking about 
retaining.
    Mr. Weinstein. Well, the case Mr. Douglass talked about was 
one in which text messages were crucial in solving the crime.
    Mr. Scott. The content of the message was important.
    Mr. Weinstein. Sure. The cases I am talking about, Mr. 
Scott, are cases in which an Internet user----
    Mr. Scott. Is it your proposal that content not be 
retained?
    Mr. Weinstein. Well, the Administration doesn't have a 
proposal today, but I think that one of the issues that 
Congress should engage in a discussion on is whether it should 
include content. My own view is that the most useful 
information to us in solving crimes is noncontent.
    Mr. Scott. Okay. Now, if this information is available, 
would it be--sitting up there, would it be available for 
private subpoena, like in a divorce case?
    Mr. Weinstein. Well, that is another issue that I think is 
worth discussing, whether it is only available to law 
enforcement or available to private litigants as well. My 
primary interest, obviously, is making sure it is available to 
law enforcement.
    Mr. Scott. Would we need to, if we passed something like 
this, turn around and have some regulations to protect privacy?
    Mr. Weinstein. Again, I think that sort of--the questions--
there are five or six questions that I think Congress should 
ask as we engage in this discussion. Number one--and some of 
these have already been alluded to. Number one is, what data 
needs to be retained, the issue we have been discussing? Number 
two is how long the data should be retained for. Number three 
is, who would need to retain it? Number four is, who would have 
access to it, the issue you just raised, whether it would be 
law enforcement only or private litigants as well? And number 
five is whether some additional protections for consumers are 
necessary, whether those need to be legislated or something 
industry can do on its own to enhance privacy and security of 
their networks.
    Mr. Scott. And Mrs. Dean is going to be very helpful in 
making sure that we follow through and particularly helpful in 
continuing to send you more information and more tips that you 
can follow through on.
    Mr. Sensenbrenner. Time of the gentleman has expired. The 
Chair recognizes the gentleman from Texas, Mr. Poe, for 5 
minutes.
    Mr. Poe. Thank you, Mr. Chairman.
    Ms. Dean, did you say that every year your business 
supplies law enforcement 190,000 tips?
    Ms. Dean. No. There is a statutory obligation under 18 
U.S.C. 2258(a), that required ECS and RCS providers--we will 
call them service providers today. So it is much broader----
    Mr. Poe. How many? Cut to the chase. How many do you 
provide?
    Ms. Dean. I think last year it was over 140,000.
    Mr. Poe. One hundred and forty thousand. Those go to whom, 
local, Federal?
    Ms. Dean. They go to the National Center for Missing & 
Exploited Children, according to statute, and NCMEC are the 
experts, and they deal with it from there. They refer it out to 
the proper jurisdiction.
    Mr. Poe. Mr. Weinstein, how many Federal cases were made on 
child pornography in 2010 or 2009? Give me a figure that I can 
understand.
    Mr. Weinstein. I would be happy to, Congressman, I just 
don't have it available. I find as I enter my 40's, my own 
personal data retention is not what it should be. But I would 
be happy to provide a number to you.
    Mr. Poe. I mean, can you give me a ball park figure? It 
wasn't 145,000, was it? 
    Mr. Weinstein. No, I don't believe it was 145,000.
    Mr. Poe. How many cases? Do you have any idea?
    Mr. Weinstein. I don't and I would also want to be able to 
get you that information at the local level, too. As you know, 
a great many of these cases are prosecuted by State and local 
law enforcement and are pursued by the ICAC task force, which 
the Department helps fund and which exists in every State in 
the United States.
    Mr. Scott. Would the gentleman yield?
    Mr. Poe. I will yield.
    Mr. Scott. Thank you. There is a report from the Department 
of Justice, the list is 8,352 in the last 4 years.
    Mr. Poe. Reclaiming my time. So it is about 2,000 a year.
    Chief Douglass, how many cases, since you are the chief, do 
you know how many cases local law enforcement has made in any 
given period of time?
    Chief Douglass. Mr. Poe, I can't give you a specific 
number. I can tell you, however, that we have--in Overland 
Park, it is a city of 170,000 people, and we have a three-man 
or three-person unit person working on it full time. And as far 
as I know, none of those cases came through the channels we are 
talking about. So they are working on their own leads in 
significant numbers.
    Outside of the arena, we are talking in a Federal sphere. 
The exact number I can't give you. But I can tell you we are 
working several peer-to-peer cases, two to three to four, every 
single month just in Overland Park.
    Mr. Poe. Can you supply the Committee with that data?
    Chief Douglass. Yes, sir, I will.
    Mr. Poe. And Mr. Weinstein, can you as well supply that?
    Mr. Weinstein. I will, yes, sir.
    Mr. Poe. Appreciate that.
    I am concerned about the overbroad idea of Federal 
legislation in any area.
    Certainly I think people that engage in this type of 
criminal activity ought to get their day in court before a jury 
as often as possible.
    But do you see any Federal concerns, constitutional 
concerns, Mr. Weinstein, since you are encouraging us to come 
up with some kind of legislation about the overbroad concept of 
more storage of personal information?
    Mr. Weinstein. Congressman, the way I approach the issue is 
this, to the extent that the collection of data creates privacy 
risks or creates risks to people's anonymity, those risks exist 
today right now. Much of the noncontent data that we are 
talking about here today, that law enforcement needs to solve 
these crimes is already being retained right now by a large 
number of communication providers for their own commercial and 
marketing purposes, and that includes ISPs. That includes the 
New York Times. That includes a lot of Web sites that you visit 
every day.
    A mandatory data retention requirement would only extend 
that retention time to make sure that it was applied 
universally across industry.
    To the extent that there are risks to privacy from those 
databases existing, those risks exist on day 1 when you open 
your account; they exist on day 30, day 60, day 90 day 180, day 
365. Whether a provider keeps the data for a day or a year, the 
provider has an obligation to protect that data. There is no 
system that is foolproof, but responsible providers take steps 
to safeguard the networks, and we can always do more.
    In terms of the impact on privacy of law enforcement having 
access to that data, as I said in my opening remarks, what we 
are not talking about, expressly not talking about, is in any 
way increasing the authority of law enforcement to get that 
data. The authorities Congress has already provided and that we 
exercise consistent with statute and constitutional obligations 
every day are the same authorities that will govern our access 
to these expanded databases or these databases that are kept 
for longer periods of time. We cannot--law enforcement cannot 
obtain that data unless lawful process is used, and that would 
continue to be the case.
    The ultimate safeguard against law enforcement abuse is 
that we are subject to be supervision of Congress, of the 
courts, of the Department of Justice, and prosecutors' ethical 
obligations to make sure that they use the lawful authorities 
properly and in accordance with the Constitution.
    Mr. Poe. Thank you, Mr. Chairman.
    Mr. Sensenbrenner. The gentleman from Michigan, Mr. 
Conyers.
    Mr. Conyers. Thank you, Mr. Chairman.
    This has been a very useful hearing and what I want to 
propose to you, Chairman Sensenbrenner, why don't we--the 
question is always, where do we go from here? Why don't we get 
the Smith proposal and my proposal and meet with Eric Holder 
and the deputy assistant attorney general and come up with a 
bill and let's just move it along.
    We can study this, you know. We are pretty good at studying 
things, but----
    Mr. Sensenbrenner. Would the gentleman yield?
    Mr. Conyers. Of course.
    Mr. Sensenbrenner. I would be happy to participate in that 
meeting, but it seems to me you are yanking the carrot away 
from Ms. Dean.
    Mr. Conyers. Well, the Humane Society may be looking for 
you pretty soon anyway with this carrot and stick approach. It 
has raised some very interesting questions, Mr. Chairman.
    But I think we all see where we are going here. It is not 
like this hasn't been worked on before. So I offer that 
proposal for your examination and, hopefully, action.
    Now John Morris, were you shocked as I was when the deputy 
assistant attorney general began to theorize about how far we 
could carry this business? I mean, I thought he would be a 
little bit more restrained in trying to get us on board, but he 
has left the door open for this to go all the way.
    Mr. Morris. Well, certainly there have over the years been 
a number of proposals for data retention that have always been 
targeted at child exploitation cases, which are certainly, I 
agree, among the worst of the worst cases out there. But I 
think that is one concern we have always had about those 
proposals, is that that simply would open the door to broad 
data retention applying to even, you know, to the broad range 
of cases. So, yes, it is a very serious concern that I have 
that we are talking about.
    Mr. Conyers. So he didn't surprise you?
    Mr. Morris. I am afraid it didn't surprise me that that is 
the direction that law enforcement is going, yes.
    Mr. Conyers. Do you have any defense at all to offer, 
Weinstein?
    Mr. Weinstein. Well, I must say, I don't think I have ever 
been referred to as ``unrestrained'' before. So I apologize if 
I gave that impression, Mr. Chairman Emeritus.
    To be clear, the government doesn't have a specific 
proposal. My purpose here today is to emphasize to you law 
enforcement's concern about the lack of the data and to flag 
the issues----
    Mr. Conyers. So when are you going to get a proposal? How 
many years is this going to take?
    Mr. Weinstein. I don't know where we are exactly in the 
process of developing a proposal, but we are here today and we 
are committed to engaging in this conversation with you and 
with the entities represented by the other people on the panel.
    Mr. Conyers. Well, I am going to call Eric Holder right 
after this hearing and see if we can get this moving. I mean 
there are a lot of things to study in the Crime Subcommittee, 
but I don't think we need a whole lot of time on this. And 
besides, why don't you take advantage of the bipartisanship 
that is raging all over the 112th Congress?
    Mr. Weinstein. I certainly think that in a lot of areas, we 
should take advantage of that bipartisanship.
    If I could, just to be clear, there are a number of 
permutations of this that could be done in terms of the type of 
providers that are covered, the type of information that is 
covered, the length of time, whether it is 30 days, 60 days, 6 
months, a year or more. As you know, the European Union has a 
data retention directive that its member states have been 
ordered to implement where data is retained for a minimum of 6 
months and maximum of 2 years. Within that range there are a 
number of possibilities, and also in terms of the scope of the 
crimes covered, there are a number of possibilities. We don't 
endorse any particular one of them, although, as I said, we are 
eager to participate in this process going forward and to come 
up with a proposal that we think balances all those costs.
    I should also be clear, we completely understand that there 
are costs imposed. While data storage costs are dropping 
dramatically, there will be costs imposed if data has to be 
retained longer than it currently is being retained. There is 
no doubt about that. And one of the greatest costs will be data 
retrieval in response to requests from law enforcement, 
although if we follow the practice that we do currently those 
costs will to a large extent be reimbursed.
    At the same time, I didn't mean in my remarks earlier to 
suggest that we don't think privacy is an issue. My only point 
is only that the privacy risk exists currently. The point here 
is to try to find a balance among all three interests, and I am 
confident we can do that.
    Mr. Sensenbrenner. The gentleman from Virginia, Mr. 
Goodlatte.
    Mr. Goodlatte. Thank you, Mr. Chairman, and thank you for 
holding this hearing. This is an issue that is of keen interest 
to me. I have long worked with Chairman Smith and Chairman 
Sensenbrenner and others on the issue of child pornography and 
other related issues on the Internet. Sometimes we have had 
successes. Sometimes the Court has set us back, but it is a 
concern and an ongoing effort.
    I have also spent a lot of time meeting with leaders over 
the years from the European Union and urged them not to impose 
a hard 2-year data retention requirement. The European Union 
sort of found not quite a 2-year requirement. It requires that 
the ISPs retain data for a period of between 6 months and 2 
years, and the EU has faced a great deal of difficulty in 
implementing this requirement.
    So it seems to me that if there is a lot of interest in 
this issue--and I share some of the concerns expressed by Ms. 
Dean and Mr. Morris and the problems that will ensue--it seems 
to me that the first place we ought to look is what the 
experience of the European Union is. And Ms. Dean, would you 
care to comment on that? And I will ask Mr. Weinstein, too.
    Ms. Dean. Well, I think that the experience in the European 
Union and the fact that they have had to come back to the table 
recently and they are reassessing their original approach begs 
that maybe we should look to a different approach for the 
United States. Certainly in different member states, the 
implementing legislation in the EU has been ruled 
unconstitutional, and I think that asks us to really come back 
to the table and look at innovative approaches, things like 
preservation.
    Mr. Goodlatte. Thank you. Mr. Weinstein?
    Mr. Weinstein. Yes, Congressman. My understanding--although 
I must say I can't speak with expertise about the state of 
affairs in the EU--but my understanding is that the European 
Court of Justice in 2009 ruled that the directive I referred to 
earlier was legal. There have been some issues with the 
implementing legislation, as Ms. Dean just indicated. And my 
understanding is that the process that is underway now is a 
process to harmonize and fix some problems with the 
implementation of the directive but that it is only a minority 
of the member states who have failed to comply; that is, that a 
majority of the states have complied. And so to the extent that 
they have, I think, as you suggested, there are some lessons to 
be gleaned from studying the way that the directive has been 
implemented in those places where it has been.
    Mr. Goodlatte. Mr. Morris?
    Mr. Morris. One lesson I think we can look at in Europe is 
what has the impact been? And studies have begun to show that 
data retention mandates in Germany, just to take one study, 
have reduced the willingness of citizens to go online for 
mental health services. And that, I think, is something--that 
is precisely the kind of very sensitive information that I 
think that Congress should be very concerned about, chilling 
the access that citizens have and the comfort that citizens 
have in going online.
    So I think there are at lot of lessons one can take from 
Europe, and certainly in Europe, there is a move to revisit 
data retention. And certainly I have heard many of the European 
politicians say that, you know, at the maximum one would say, 
you know, 6 months. Clearly that is the direction that they are 
going, to reduce the length of time. But there are serious 
concerns that are raised in Europe.
    Mr. Goodlatte. Thank you. Ms. Dean, what would a blanket 
data retention requirement have on smaller ISPs?
    Ms. Dean. This is a serious concern because we don't quite 
understand at this point what the breadth is. I mean, you could 
take some of the earlier comments made and assume that this is 
meant to apply to Web sites. And just because it is noncontent 
data does not mean that that data is not revealing and very 
interesting about people's behavior online. And it is not clear 
exactly what it is that companies will be called upon to 
retain. Are we looking at, you know, what Web sites they go to? 
And this all brings us back to the scope and the breadth and 
the duration of time. For small companies, I guess it is really 
up to the Subcommittee to consider whether these kinds of 
mandates could really be stomached by smaller companies. I can 
say that within my membership, I have large companies, but I 
also have small companies who provide services to rural areas 
and to lower-income Americans. And their services, because they 
are low-cost or free, would be greatly affected by a data 
retention mandate.
    Mr. Goodlatte. Thank you, Mr. Chairman.
    Mr. Sensenbrenner. The gentlewoman from California, Ms. 
Chu.
    Ms. Chu. Chief Douglass, internetworldstats.com, which is a 
Web site for international Internet usage statistics, said that 
as of 2007, there were 66 million Internet broadband 
subscribers in the U.S., which is about 22 percent of our 
population. Is it law enforcement's belief that we should 
retain all these subscribers' data? Or is it possible to do 
something that is more targeted? How would you determine which 
subscribers' data should be retained? And are you actually 
saying that all of those 66 million's information should be 
retained?
    Chief Douglass. Well, ma'am, essentially there is no way to 
specifically target it because if we knew who the bad guy was, 
we could just target them. But unfortunately we don't. And what 
we have to do is to assume that this information is like a bank 
that has a vault full of safety deposit boxes. Those safety 
deposit boxes remain totally sealed, totally inaccessible to 
the law enforcement until something happens and we are given 
direction to open one particular box. That is how this 
particular system would work.
    I would point out that there is a lot of information there. 
But in my own history in the last 2 weeks I applied for a loan. 
And when I applied for a loan, they pulled up my credit report 
and my credit report knew everything about me. That is on the 
Internet and that is maintained for 7 years. So my point being 
is, we all have to sacrifice to a certain extent for those 
particular component parts that require addressing. In this 
particular case with the credit report, my credit is good, but 
we had to sacrifice that access because some people's credit 
isn't so good. In this case, all of us would have to contribute 
to a certain balance of that sacrifice and privacy so that the 
criminal element can be addressed. And there is no way to 
target it or narrow it or move it down because we are dealing 
with the unknown.
    Ms. Chu. Mr. Morris, how do you respond to that? And also, 
how would the retention of the data of the 66 million people 
harm Americans' privacy rights and aggravate the problem of 
identity theft?
    Mr. Morris. Thank you, Congresswoman. Let me first respond, 
to take the credit reporting example, credit reporting, you 
know, Congress has passed very, very strong legislation to 
protect the privacy of that information. It is very strongly 
controlled. In contrast, data held by service providers has 
extremely little protection. The Electronic Communications 
Privacy Act was enacted in 1986. It is woefully out of date. 
Law enforcement can obtain the data that we are talking about, 
the noncontent data that we are talking about, with very, very 
minimal process or protection. And so, I mean, there are some 
very, very serious privacy concerns.
    I believe the Internet usage in the United States has now 
risen to about 70 percent. I think we are now talking about 230 
million Americans who would be covered by this. And the 
proposals that all of their access everywhere they go, all of 
their e-mails be monitored and tracked is really breathtaking. 
In the context of call records, telephone call records that 
were kept by telephone companies, we have seen very broad use 
of civil subpoenas by divorce attorneys and other civil uses. 
And my understanding--I am not sure if Ms. Dean may be able to 
tell me--but my understanding is that actually civil use, 
noncriminal use of data that is held by service providers 
represents one of the largest types of demands and requests 
that companies receive for this data.
    So it is clear if the data is required to be held, it will 
be used in a broad context.
    Ms. Chu. You are saying that there are far less protections 
that are provided by the Electronic Communications Privacy Act 
than for, say, credit reports.
    Mr. Morris. Right.
    Ms. Chu. Should that be updated first?
    Mr. Morris. Absolutely. The need to update ECPA is really 
critical. I mean, it is critical for privacy grounds. It is 
also critical for business grounds because it really is harming 
the American industry's ability to compete in the global 
marketplace, given the low standards of protection that ECPA 
affords.
    Ms. Chu. Is there a way to have a more effective use of 
existing data preservation requirements rather than having 
mandatory data retention?
    Mr. Morris. Well, Congress in 2008 authorized the 
appropriation of additional resources for both prosecution and 
also for the technical investigation of child obscenity crimes, 
which would allow law enforcement to get access to the 
information they need sooner, which would reduce the need or 
the argued need for a data retention mandate. If law 
enforcement is able to more promptly investigate these cases 
instead of being overwhelmed with other cases, then there is 
really not such an issue that data retention would be needed to 
address.
    Ms. Chu. Thank you.
    Mr. Sensenbrenner. At this point, the Chair asks unanimous 
consent that a statement by Ernie Allen of the National Center 
for Missing & Exploited Children be inserted in the record.
    [The prepared statement of Mr. Allen follows:]
    [GRAPHICS NOT AVAILABLE IN TIFF FORMAT]
    
                               __________

    Mr. Sensenbrenner. And now the Chair recognizes the 
distinguished Vice-Chair of the Committee, the gentleman from 
Texas, Mr. Gohmert.
    Mr. Gohmert. Thank you, Mr. Chairman.
    Mr. Weinstein, you had said in your statement that in some 
ways the problems of investigations being stymied by a lack of 
data retention is growing worse. Could you elaborate on what 
you mean by that?
    Mr. Weinstein. Yes, sir, Congressman. Certain types of 
providers, principally in the cell phone community, are not 
retaining data at all. Increasingly, we are having providers 
who are retaining data for shorter and shorter periods of time, 
if they retain it really at all. We also have encountered the 
problem repeatedly of providers who publish or state that their 
retention period is 6 months or some period of time, only to 
find that when we submit requests to those providers within the 
stated retention period, we are told that the data is no longer 
being retained. So in that sense, the problem is growing worse.
    As I said before, a great many providers are already 
retaining the data that we are talking about here. So the 
points that were made over privacy before, I think it is 
important to recognize that that data will continue to be 
retained by the providers and not by the government; that is, 
the government can only obtain it through lawful process. The 
data will be retained by providers, as it is currently. The 
problem is the inconsistency. The problem is that it is not 
held for a sufficient period of time, that it is not consistent 
across the board, that the decisions about how long to retain 
data for are made unilaterally by the providers and are subject 
to change at will and, as I said, are often not even honored.
    So what we think is essential is that whatever the decision 
is about the scope of the requirement, if Congress goes down 
this road, is that it be one that is clear and consistent 
across industry.
    In 2008, the Electronic Frontier Foundation published a 
user guide or a guide that was entitled, Best Practices for 
Online Service Providers, which I think is unintentionally the 
best argument for Congress to intervene in this space than 
anything that I could say today. It advises providers that they 
can't be forced to provide law enforcement with data that 
doesn't exist. It provides guidance about how to minimize what 
they referred to as ``the challenges of law enforcement 
compliance.'' It calls upon providers to obscure, delete as 
much data as possible. It advises providers to use secure 
deletion utilities to scrub the hard drives so that the logs 
cannot be obtained. The fact that providers are being guided to 
conduct themselves in this way I think speaks to the fact that 
the problem is growing worse and that congressional action--or 
congressional engagement on the issue is probably as timely as 
it has ever been.
    Mr. Gohmert. Well, you touched on this perhaps. But the 
Electronic Communications Privacy Act currently allows 
investigators to request preservation of records. And I would 
ask you, Mr. Douglass, if that is not being honored. And if it 
is, why is that not adequate?
    Chief Douglass. Well, congressman, I have no evidence, but 
it is not being honored. The problem is, it is not a question 
of honoring our request. The problem is that it is not there 
when we ask for it. So if the information has already been 
deleted or if it has already been spoiled in some respect, we 
can ask all day. But if it is not there, it is not there to 
get. And that is why the time requirement of 30 days is onerous 
because many cases are not brought to light in 30 days.
    Mr. Gohmert. Mr. Weinstein, have you made requests for 
preservation that have not been honored?
    Mr. Weinstein. Except in the sense that--the largest 
problem with preservation is what the Chief said. That is that 
the preservation tool, while a useful tool, is only valuable if 
the data still exists at the time that the preservation letter 
is submitted. For reasons that I alluded to in my oral remarks, 
these are extraordinarily complex crimes. In the child 
exploitation arena, increasingly they are international and 
global investigations. They are investigations that often start 
when law enforcement in another country seizes a server or 
seizes a computer that is being used by the administrator of a 
child sexual abuse distribution network. And it takes time to 
go from that seizure in Australia or New Zealand or Germany to 
identifying IP addresses of people in the United States who are 
engaging in that activity, and then having to follow the trail 
of those people here to the U.S. And invariably, really quite 
often, too often, by the time we are able to--and no matter how 
quickly we work, by the time we are able to find the provider--
--
    Mr. Gohmert. My time is running out. Let me ask quickly. We 
have talked in generalities. Is there a large ISP that 
consistently deletes information to prevent you from having 
that information preserved? I am asking specifically.
    Mr. Weinstein. Sure. I appreciate why you are asking 
specifically. But I would rather not talk about specific 
providers. But what I would say is that for the most part the 
ISP community is very cooperative.
    Mr. Gohmert. Well, pardon me for my background being a 
judge, but as a judge, if people weren't willing to get 
specific, then obviously it was not legitimate testimony that 
would come into evidence. Is there no specific----
    Mr. Sensenbrenner. The time of the gentleman has expired. 
You don't have to answer that one.
    The gentlewoman from Florida, Ms. Wasserman Schultz.
    Ms. Wasserman Schultz. Thank you, Mr. Chairman. Mr. 
Chairman, some of the Members and the witnesses may know that I 
was the House sponsor of the PROTECT Our Children Act of 2008 
which was a major effort and continues to be a major effort to 
develop a national strategy which has been developed, appoint 
the National Coordinator for Child Exploitation Prevention and 
Interdiction, which is Francey Hakes, who is actually here with 
us today and is in the audience and who has been doing an 
excellent job in this area, to finally coordinate the work of 
the Internet Crimes Against Children Task Forces and provide 
them with the resources that they need because previously they 
have really been only able to investigate less than 2 percent 
of the cases that occur when it comes to the transmission of 
child pornography online and other kinds of sexual predatory 
activities on the Internet.
    But all the money in the world and the coordination and the 
planning isn't going to help at all if we don't have the 
assistance from the Internet service providers. And with all 
due respect, Ms. Dean, I think we need to be clear that this is 
not about watching or tracking people's behavior online, which 
is how you described it a couple of minutes ago. It is about 
helping law enforcement connect the dots. And one of the things 
that I think is extremely important to underscore here is that 
that is the difficulty, is that right now, because there are 
varying degrees of cooperation, varying degrees of time that 
ISPs actually preserve this data--some as short as 7 days, 
without naming names, Mr. Chairman, as you suggested--that it 
really becomes extremely difficult, if not impossible, for law 
enforcement to be able to actually get to the information they 
need not about the individuals and their activity but about 
specifically the connectivity logs. I mean, that is what really 
we need to be able to get at are these connectivity logs. 
Because as people know who follow this stuff, an individual ISP 
address is not helpful because people have a different one for 
every computer that they log on to. So having the ability to 
track one individual's connectivity is what is necessary. Law 
enforcement already have the pictures. They already have the 
ability to lift the digital fingerprints. They lose that 
ability if ISPs don't hold onto that information for a 
standardized period of time.
    So my question to you, Ms. Dean, really is this: 
Voluntarily would be a lot better than mandating this. I think 
that is what we would all like to see, including law 
enforcement. So what are the ISPs willing to do voluntarily? 
You should come together and decide on a standard and propose 
it. Because that is going to be the best way that we can get 
this problem addressed without us being in a situation where we 
have to figure out legislatively how to make you do it.
    Ms. Dean. Thank you, ma'am. And I have been given some 
carrots and sticks today earlier from the Chairman, and I 
recognize the need to go back and work with my membership and 
to talk about this.
    We have been following data retention for many years. We 
have been engaged in this conversation. And certainly in the 
area of fighting online child exploitation, it is something 
that U.S. ISPA and our members are certainly committed to, so I 
can guarantee that we will be getting back to you and talking 
to your staff about this.
    Ms. Wasserman Schultz. Thank you. Mr. Chairman, at some 
point, if we could hear from Francey Hakes, who is the person 
that is coordinating all of this activity from the Department 
of Justice, it would be incredibly helpful. Mr. Weinstein, I 
know that you are doing your best, but Francey really is the 
person that is responsible in the law for coordinating all of 
this activity, and I know that she would be able to give us 
some very helpful information, one of which is--I am really not 
understanding why you don't have a specific proposal because, 
Mr. Weinstein, that is supposed to be in the National Strategy. 
So is it in the National Strategy? If it is not, then the 
National Strategy is deficient.
    Mr. Weinstein. Well, I don't believe that there is a 
specific data retention proposal, Congresswoman, in the 
National Strategy, although the National Strategy is designed 
to do a lot more than just address the issue of data retention, 
as you know. It is meant to lay out a framework for 
coordinating all of law enforcement's operations to address the 
problem.
    Ms. Wasserman Schultz. Before I run out of time, that is 
just a big concern that I think we need to address. You really 
do need to do a better job of giving us a number or a 
percentage of cases that have been hindered or reached a dead-
end. The anecdotal information is somewhat helpful, but if you 
don't really give us a concrete number.
    But the question that I have for you specifically is: In 
the Republican budget proposal, which proposes to cut 20 
percent across the board, what would that do to your ability to 
continue to investigate and solve these cases, if their budget 
proposal actually went through?
    Mr. Weinstein. Well, if I can address both pieces of that 
quickly. In terms of the concrete number, it is a challenge and 
it is frustrating to me, to Francey, and to all of us who are 
involved in working on this issue that we can't come up with a 
concrete number. And there are a number of reasons for that. 
But the primary one is that the Justice Department, like all 
levels of law enforcement, doesn't typically keep statistics on 
cases that do not result in charges. And very often what 
happens when an investigation hits a dead-end so that the 
investigator or the prosecutor moves on to another case, we 
don't log the fact that we tried but were not successful. The 
other thing is that law enforcement officers are smart, and 
they figure out over time which ISPs will keep data for which 
periods of time. And when they obtain a lead and they need to 
go to a provider, if it is outside what they understand to be 
the data retention period, they won't even bother to submit a 
request because they know it is not going to be fruitful, and 
they will try--sometimes successful, often not--to obtain the 
evidence they need from another source.
    So the anecdotal example that we could talk about, some of 
which I alluded to in my testimony, are not hypotheticals. They 
are illustrations. There are new anecdotal examples we get 
every day, every week, every month of cases that were not able 
to be made.
    Ms. Wasserman Schultz. And can you address my budget 
proposal question?
    Mr. Weinstein. If I may, Mr. Chairman.
    Mr. Sensenbrenner. Go ahead.
    Mr. Weinstein. The only thing I would add, this goes beyond 
child exploitation because every type of crime that we worry 
about is committed through online means now. And so I think 
that losing prosecutors and losing agents would seriously 
impact our ability to prosecute really virtually any type of 
online crime or crime committed through an online means at the 
level that we would like to.
    Mr. Sensenbrenner. The gentlewoman's time has expired. The 
gentleman from Arizona, Mr. Quayle.
    Mr. Quayle. Thank you, Mr. Chairman. And thanks to all of 
you for coming in today.
    My first question is going to be for Ms. Dean. What 
specific actions have your members voluntarily taken to combat 
child pornography so far?
    Ms. Dean. Well, I can speak as an association and as 
someone on behalf of the individual members. We have 
promulgated a number of sound practices to be more helpful to 
law enforcement in the areas of child pornography reporting and 
in general subpoena compliance when it deals with child 
exploitation cases. The members participate in a number of 
important task forces, things like the Technology Coalition and 
Financial Coalition Against Child Pornography, which we can get 
you more information about in the future. And certainly the 
companies interact with the ICACs on a regular basis. And 
moreover, they have highly skilled staff that work on these 
compliance issues, understand that child exploitation cases are 
a priority, and are trained to deal with them in a timely 
manner.
    Mr. Quayle. And also in your testimony, you spoke about 
some of the problems that we are facing with data retention in 
terms of it might slow down the process for immediate emergency 
situations, such as child abductions and the like. Obviously we 
don't want to negatively impact with legislation having these 
unintended consequences of maybe we have this increased data 
storage issues, but then it actually has some problems with the 
speed of recovery. Can you address that and maybe talk about it 
a little more?
    Ms. Dean. Yes. And thank you. I appreciate that 
opportunity. Because as we thought about data retention this 
most recent round, one of the things that occurred to the 
companies was that, you know, we have a number of concerns 
about the cost to innovation and so forth. But the main concern 
that we would have with building these massive data bytes--we 
are talking exabytes of information--how it would be that we 
would be 100 percent accurate in retrieving precisely the 
record that law enforcement requested and doing so in a timely 
and efficient manner and doing so in an emergency situation 
because we do get frequently emergency requests from law 
enforcement and want to be helpful. The reason this is so 
important to the companies is because, one, they take their 
responsibilities under ECPA and other statutes very seriously. 
But secondly, because we are dealing with people's lives and 
liberty here. And out of all this data, we have to make sure 
that, say, 18 months down the road that tiny particular piece 
of information is exactly the right information linking that 
exact target, and there is a concern in that area, yes.
    Mr. Quayle. Mr. Weinstein, can you give your side on that 
issue in terms of how that might affect emergency responses in 
slowing down the recovery time?
    Mr. Weinstein. Congressman, what I can say is that in those 
situations, as I have indicated a number of times, there is 
already a substantial number of providers who are keeping the 
kind of data that we were talking about and do keep it for a 
period of time. So it is not like they are creating systems out 
of whole cloth. They just need to figure out a way to keep it 
for longer, and there would be some potential additional cost 
of storing it for longer. But those same providers who have 
that data have to respond to the kind of requests you are 
talking about every day. And they manage to do so quite well. 
So if they are keeping a larger volume of data, it seems to me 
it would be a software engineering problem that is beyond my 
expertise. But to the extent that they are able to comply with 
those requests today when they have got the data available, I 
would expect them to be able to do so in the future.
    I do acknowledge, as I said before, that I think the 
principal additional cost of a data retention regime would be 
in data retrieval, not so much in data storage but in the data 
retrieval. But I wouldn't anticipate that there would be a 
significant impact on--negative impact, that is, on ISP's 
ability to respond to emergency requests. I think what it would 
mean though is that the nonemergency requests, there may be 
some additional delay in responding to them. But given where we 
are now, we are happy if they are being responded to at all.
    Mr. Quayle. All right. And further, do you have any 
suggestions in terms of retention period? Is it 1 year, 2 
years, 3 years, 4 years, keeping it forever? I mean, that is 
one thing that I was wondering is that, you know, with the 
statute of limitations--I don't know what they are for child 
pornography cases, but wouldn't you want to have that match up 
to when the statute of limitations expires?
    Mr. Weinstein. Well, I think that the statute of 
limitations for child sex abuse cases, I think there actually 
is none. So that would be keeping it indefinitely. For most 
Federal crimes, it is 5 years. I think that if the only 
consideration at play here was law enforcement, then I would 
think the statute of limitations would be the place to start 
the discussion. But that clearly is not the case. And I don't 
want to suggest for a second that that is what we would 
suggest.
    There are clearly other competing interests. The economic 
impact on the providers, to some extent privacy. And I think 
that when you balance those out, it clearly has to be something 
that is much more modest than the statute of limitations 
period. Where that number is, I can't say today. Although, as I 
have said, I think this is a very useful first step. I know 
this is an issue the Subcommittee has worked on for years and 
years. And I am hopeful that, working together, we can come to 
a place, come to a number that maximizes law enforcement's 
chances of solving the crimes it needs to solve without 
overwhelming the providers and without creating unintended 
consequences.
    Mr. Sensenbrenner. The time of the gentleman has expired. 
The gentleman from Georgia, Mr. Johnson.
    Mr. Johnson. Thank you, Mr. Chairman, for holding this very 
important hearing today on using Data Retention As a Tool for 
Investigating Internet Child Pornography and Other Internet 
Crimes. And this bill, H.R. 1076, is actually cited as the 
Internet Stopping Adults Facilitating the Exploitation of 
Today's Youth Safety Act of 2009. But it is a fact, isn't it, 
that the provisions of H.R. 1076 go far beyond stopping 
Internet child pornography; is that a fair assessment, Mr. 
Morris? Is that true?
    Mr. Morris. Well, certainly H.R. 1076 would very broadly 
sweep--the terms of that legislation would very broadly sweep--
--
    Mr. Johnson. Yes. I mean, section 5--yes, section 5, 
Retention of Records By Electronic Communication Service 
Providers is not limited to only investigations or matters 
concerning child pornography.
    Mr. Morris. Certainly I read that draft bill the same as 
you do. Yes, sir.
    Mr. Johnson. Okay. So it is kind of like perhaps you could 
say--and I don't say this disparagingly--but kind of like a 
Trojan horse. And you could have things in that Trojan horse 
that come out and surprise you.
    Mr. Morris. Yes. Certainly I agree that once the data is 
mandated to be retained, it will be used for a broad diversity 
of reasons, including civil litigation, perhaps even commercial 
use by the service provider, and a range of other things that 
concern us.
    Mr. Johnson. Well, let's talk about that in just a second. 
But let me look down at section 9 of the proposal. It grants 
$150 million to the Innocent Images National Initiative, $150 
million. Now does anybody have any idea what the Innocent 
Images National Initiative is?
    Mr. Weinstein. Yes, Congressman. The Innocent Images 
Initiative is a law enforcement initiative that was set up by 
the FBI and the Justice Department. The Innocent Images Task 
Forces are the groups that have primary responsibility on the 
Federal level for investigating child exploitation crimes.
    Mr. Johnson. Where would this money go to? Who would be the 
recipients of the $150 million?
    Mr. Weinstein. I can't speak to the specifics of the 
proposal, Congressman, because I am not as familiar with it. So 
I don't know what the intended use of that $150 million is. My 
guess would be that it would be primarily to support 
investigative resources, investigators and prosecutors.
    Mr. Johnson. But you would not say that there are any 
limits on how the money could be spent as provided by section 
10, is that correct?
    Mr. Weinstein. Well, again, I can't speak to the details of 
that specific proposal.
    Mr. Johnson. So in other words, can anybody on this panel 
tell me where the $150 million and to whom would the $150 
million provided under section 9 go to? Yes, Mr. Douglass, do 
you want to give it a stab?
    Chief Douglass. I will try to do so.
    Mr. Johnson. I have limited time now. Just answer me this: 
Do you know where the $150 million is going to?
    Chief Douglass. I know where a small part of it is going 
to.
    Mr. Johnson. Well, a small part. I want the big part. And I 
find it somewhat disturbing that we are not able to get at that 
in this hearing.
    So we have got Internet child pornography being the Trojan 
horse. And then inside that, we have a data retention 
situation, mandatory, that may fall upon the backs of 
commercial and private Internet service providers. And then we 
have $150 million to boot going to some----
    Mr. Sensenbrenner. The gentleman's time has expired.
    Mr. Johnson. Thank you, Mr. Chairman.
    Mr. Sensenbrenner. Last, but not least, the gentlewoman 
from Florida, Ms. Adams, is recognized for 5 minutes.
    Ms. Adams. Thank you, Mr. Chairman.
    Mr. Weinstein, I was listening. And coming from a law 
enforcement background, I am kind of curious. You made a 
comment about when your agents get to a point where they just 
stop because they have hit a dead-end and they move on, and you 
couldn't give us a caseload count. Is it your testimony today 
that your caseloads are not counted based on open/closed 
caseloads?
    Mr. Weinstein. Well, Congresswoman, certainly at the 
Federal level--I can't speak to the State and local--but at the 
Federal level we do, both the agencies and the Justice 
Department, keep track of cases that are open and closed. What 
I mean to suggest is that we couldn't look at that data and 
figure out how many of those were closed because of a failure 
of data retention. There are any number of reasons why a case 
is opened and then ultimately not able to be successfully 
concluded or result in a charge. It could be that there is a 
lack of evidence, it could be that there were other 
investigative hurdles. But I couldn't pinpoint within that 
gross number of cases how many were a data retention issue 
specifically.
    Ms. Adams. And so then I am not to be concerned at the fact 
that you would base your budget on caseload. You are basing it 
on your open caseloads, correct?
    Mr. Weinstein. You know, those cases take an extraordinary 
amount of time, as you know, especially now. And in the child 
exploitation arena, this is particularly true, but it is true 
in a lot of others as well, that to the extent that those cases 
involve international law enforcement, to the extent that the 
criminal is sophisticated and takes steps to try to anonymize 
himself or herself, there are a number of steps in the chain 
you have to go through that take a long time. You can 
investigate a case for years only to find that you are not able 
to bring a charge. So I think the fact that the case is open 
and how long it is open for reflects the amount of man and 
woman hours that are going into it. It is just that sometimes, 
for any number of reasons--data retention being one of them--
you can't actually successfully complete the investigation and 
indict anyone.
    Ms. Adams. And while sometimes it is a lot of man hours 
when the case is open or it sits there because you have hit a 
dead-end and you haven't closed it quite yet, and I recognize 
that. But that goes again to what Mr. Quayle asked you, and 
that was, how long then, how long would you recommend that 
these providers hold this data?
    Mr. Weinstein. Well, as I said to Mr. Quayle, I think the 
Administration doesn't have a position at this time on what the 
appropriate amount of time is. What I do believe is the case is 
that--at least as a starting point for discussion, I think the 
EU range of 6 months to 2 years is a useful starting point for 
discussion, but I wouldn't suggest, even as I sit here today, 
that it should be 6 months or 2 years or 1 year. I do believe 
that there is a time period that we could come to that would be 
long enough that law enforcement could maximize the chances of 
getting the evidence it needs to successfully complete a larger 
number of investigations and bring a larger number of criminals 
to justice but that wouldn't be so long or that would be 
moderated and would not overwhelm, in terms of cost or privacy 
impact, the other equities involved.
    I mean, ultimately, I think the fact that we haven't come 
to a conclusion on this issue successfully over the last 2 or 3 
years reflects the fact that it is really a complex exercise to 
try to figure out what that time period is; you know, what is 
the magic number that gives law enforcement what it needs but 
doesn't overwhelm the providers and that moderates the risk to 
privacy of having data held for a long period of time? I can't 
come up with that number today, but I am pretty confident that 
if we work at it, we will come to it.
    Ms. Adams. And your earlier testimony is something that I 
have had along my law enforcement career is that a lot of times 
when you start investigating these you end up going to 
different countries, and that adds time to the process, does it 
not?
    Mr. Weinstein. It does. In fact, I was thinking this 
morning about a case that we did that we call Operation 
Achilles, which was a multinational law enforcement operation 
to take down a network that was producing and distributing 
images and videos of child exploitation, and there was a 
little, little girl in the Northern District of Georgia who was 
rescued as a result of that investigation, but she was rescued 
2 years after the video of her being abused was discovered when 
a search was done in Australia of one of the members of the 
organization's computers. And it took 2 years of work every 
single day by the investigators, both in Australia and here in 
the U.S., to try to find out where that girl was so they could 
rescue her and ultimately capture the abuser, who was her 
father. Those cases can inherently take a long period of time. 
We are obviously committed to them, and we will investigate 
them as long as we humanly can.
    Ms. Adams. I hope so.
    Ms. Dean, hearing this testimony, I would agree with my 
colleagues that you go back to your membership and see if there 
is some kind of compromise you can come up with within your 
membership and to the law enforcement that doesn't require the 
Congress to intervene on this. It is really important that if 
there are children being abused, taken advantage of, or worse, 
we would like to have that information given to law enforcement 
so that the bad guys can be prosecuted.
    Mr. Sensenbrenner. The time of the gentlewoman has expired. 
The gentleman from Florida, Mr. Deutch.
    Mr. Deutch. Thank you, Mr. Chairman. I have a question, Mr. 
Weinstein, for you about the way that we investigate. There is 
a constituent of mine in my district of south Florida that runs 
a business. It is a data fusion program, child protection 
systems, which is a program that is used by the vast majority 
of ICAC task forces as well as 38 countries free of charge. I 
would like to know, since this is a system that enables law 
enforcement to track files across the vast expanse of the 
Internet and then identify the specific computers that are 
responsible, first--actually for you and for Mr. Douglass--are 
you aware of this opportunity, this program?
    Chief Douglass. I am aware of several programs that allow 
us to pinpoint peer-to-peer intersections and gives us a 
starting point to start with the subpoenas and search warrants. 
I do know this, that they are relatively successful but 
somewhat limited at this stage in scope.
    Mr. Deutch. Mr. Weinstein.
    Mr. Weinstein. Congressman, I am not familiar with that 
particular software, but I am familiar with a number of 
programs, as the Chief said he is as well. And you should know, 
the Department, under section 105 of the PROTECT Our Children 
Act, was directed to develop a technological solution known as 
the National Internet Crime Data System, and we are in the 
process of doing that. We have issued grants I think to the 
Massachusetts State Police in relation to the development of 
that. And once that system is operational, it will support 
efforts by Federal, State, local, and tribal enforcement, 
including the ICAC task forces, to more effectively investigate 
and deconflict those cases. So we are working very hard on 
developing technology that will enhance our ability to pursue 
those cases.
    Mr. Deutch. I would just suggest that the technology of 
this company has been used--their expertise has been used to 
catch criminals. They also helped identify the 9/11 terrorists. 
I would encourage you to reach out, and I would be happy to 
make that happen.
    Getting back to something you said earlier this morning, 
Mr. Weinstein, moving beyond this issue of data retention. I 
would like to ask you about other ways to streamline the 
prosecution of these cases and make it more likely that we will 
actually catch these people. The Internet, as was just 
discussed, is global, and the criminal activity bounces over 
local, State, and even national boundaries, borders. Does it 
make sense from a national law enforcement perspective to 
create a centralized place--at least for the United States--to 
subpoena ISP records rather than having to subpoena each 
company in a different way?
    Mr. Weinstein. Well, I haven't given a lot of thought to a 
proposal like that, although my first reaction is that to the 
extent people are concerned about privacy from having multiple 
databases of Internet activity, I would think that there would 
be some significant privacy concerns if there was one 
megadatabase of that activity. But I think that ultimately, 
Congressman, the challenge in these cases is not just the 
ability to get data, of course. They are inherently time 
consuming, and they take a long time. I think as our 
relationships improve with foreign law enforcement, we are able 
to proceed then more quickly and more efficiently. But 
ultimately, if providers were able to retain the data we needed 
for a reasonable and uniform period of time, we would have 
fewer dead-ends and we would be able to move the cases more 
quickly. Sometimes the cases take longer than they otherwise 
would because, having hit a roadblock when the data is not 
available, you have to figure out some other way around it, 
some other way around the lack of data, and to try to basically 
investigate the case over again from a different angle. If the 
data were available, whether it was in one common source, as 
you suggested, or maintained by individual providers for a 
reliable period of time, I think we would be able to pursue the 
cases more expeditiously and in larger numbers to a successful 
conclusion.
    Mr. Deutch. Mr. Douglass, from your perspective, would a 
centralized database help in pursuing these criminals?
    Chief Douglass. Well, again, I agree with Mr. Weinstein. A 
centralized database would certainly be the most efficient. 
However, the tenor of these conversations have been all about 
balance, and balance means that we balance out the effects of 
privacy and the effects of efficiency at the same time. So 
consequently, while it would absolutely be more efficient, I 
would also think it would raise a lot more concerns about 
concerns over privacy. I think we can work around that. If we 
have the locations we can go to that maintain those files, that 
is not a big deal.
    Mr. Deutch. Finally, Mr. Chair, Mr. Douglass, I appreciate 
what you are saying. And certainly we need to balance those 
interests, ultimately though being on the front lines of Mr. 
Weinstein in trying to catch these guys. I am just trying to 
figure out if that is something that we ought to be 
entertaining, and it sounds like it is something that could be 
helpful.
    Chief Douglass. I would have concerns about going that 
direction because I don't think that the benefits would 
outweigh the risks.
    Mr. Sensenbrenner. The gentleman's time has expired. The 
gentleman from Arkansas, Mr. Griffin.
    Mr. Griffin. Thank you, Mr. Chairman.
    Ms. Dean, I wanted to ask you, I was looking through your 
testimony, and it may just be a misunderstanding. But it 
appears that you make a distinction between data retention and 
data preservation. And I apologize for being out if you have 
explained that. But could you comment on that?
    Ms. Dean. Certainly. I would be happy to.
    Data presentation and data retention are--my luck today--
are very different. Data preservation is a targeted request 
from law enforcement to a provider to hold on to a specific 
person's data. And to be clear, to clear up some of the 
conversation from earlier, that is not simply an IP log. That 
is a very broad aspect of--it is a snapshot. Think of it as a 
snapshot at the exact moment that the request comes in of that 
person's account, e-mails, buddy lists, anything that we have 
got that is taken, set aside, and it is able to be preserved 
for up to 180 days. Now that doesn't go into the future because 
then you can get wiretap problems and things like that.
    Retention, what we are talking about here today, would be 
to hold on to a category of data, a category of providers on 
all of their users into the future.
    Mr. Griffin. So preservation would include the type of 
information that you would get in a subpoena such as method of 
payment, credit card records, all of that stuff, and the 
retention is just the data that relates to the ISP?
    Ms. Dean. Well, to be clear, preservation is so effective 
and valuable, we see it as very effective and valuable because 
we don't make a distinction as to what kind of process may come 
in the future. We simply freeze the account, set it aside, and 
it is available to law enforcement, pending the issuance of 
process. So they can get whatever it is the order calls for 
into the future.
    Mr. Griffin. What is your ideal? Are you happy with the 
status quo? I know that when I came back in, Mr. Weinstein had 
been asked by Representative Quayle about his ideal in terms of 
the time frame. I want to ask you what your ideal is.
    Ms. Dean. Well, one of the things I want to say is that, 
you know, we really do want to be involved in this 
conversation. We want to talk to our colleagues in law 
enforcement and find out what it is specifically that they 
need. We really do want to understand better which providers. 
And that is very important. Do you want the Facebooks of the 
world? Do you want you know access providers? Do you want the 
nytimes.com? It is very important.
    Mr. Griffin. I am running out of time. So there is not a 
specific time frame. It sounds like you are still sort of 
grappling with it. Chief Douglass, do you have an ideal time 
frame in mind that you think would capture most of the data 
that you would need?
    Chief Douglass. Yes, sir. My personal opinion is 6 months 
up to a year, maybe up to 18 months. But after that period of 
time, there is a point of diminishing returns. Certainly 6 
months does not seem to be unreasonable from an investigative 
standpoint. We will get quite a bit. That will be six times 
more than the best we can get right now. And in that event, I 
think that would be logical. But there are other factors to 
consider. And when we shape out whatever agreements or 
legislation or compromises that take place, those things should 
be fleshed out with all parties, understanding exactly where it 
goes. But from a law enforcement standpoint, I would think a 
minimum of 6 months would be advantageous. More like a year 
would probably be the best.
    Mr. Griffin. Have you been in any talks with the Department 
of Justice on this? Apparently, the Department of Justice has 
not settled on a specific time frame.
    Chief Douglass. No, sir. We haven't. And, you know, we come 
from two different localities with two different things in 
mind. The Department of Justice is looking at overall arching 
philosophy and policy for the entire country in that regard, 
and we are looking at it from how it affects Overland Park, 
Kansas and how it affects cities in your State. So we have 
common interests, but they are not necessarily parallel 
interests.
    Mr. Griffin. Maybe you can grab Mr. Weinstein there, and 
y'all can talk about that. Thank you. That is all I have, Mr. 
Chairman.
    Mr. Sensenbrenner. The gentleman's time has expired. And 
again, last but not least, the gentleman from Pennsylvania, Mr. 
Marino.
    Mr. Marino. Thank you, Mr. Chairman.
    And if I do ask a question that has already been asked 
because I was at another meeting, please tell me that and I 
will go on.
    Deputy Weinstein and Chief Douglass, I couldn't agree with 
you more on your approach, what you have done, and what you 
continue to do, particularly in the area of child abuse and 
cybercrime. As a prosecutor, as a district attorney for 12 
years, the State level, and as an United States attorney for 6 
years, I have personally prosecuted both types of cases in both 
courts. And on many instances, the evidence that we have 
gathered could be as much as 2 years old. So I implore you to 
please keep doing what you are doing, bring back to us any 
insight that this Committee can do to see that you can carry on 
that mission. And I thank you for that.
    Director Dean, again, please, I beg you to talk with your 
organizations, the individuals with whom you work. I am sure 
that you can come to a consensus. But please, please utilize 
the frontline law enforcement men and women when asking what 
can we do to improve the tools that you need to track down 
these child abusers. Many of the cases that I worked on 
personally involved photographs and pornography that came into 
the United States from other countries. But unfortunately, we 
have a fair number of those individuals in this country. So I 
implore you, please regulate this to the extent where it is 
effective and efficient yourselves because, I can agree with 
the Chairman and my colleagues, at one point, we will step in.
    And Attorney Morris, let me refer to something in your 
statement. And could you please correct me if I am wrong on 
this. Maybe it is just written or taken out of context. I am 
reading toward the end--actually, the next to the last page of 
your statement. It says in bold at the top, In the face of the 
serious risk and cost of data retention, Congress should 
carefully investigate what benefits there would be, if any, in 
the prosecution of child pornography cases.
    You are not suggesting that we do not investigate and 
prosecute child pornography cases, are you?
    Mr. Morris. Not in the least, Congressman. What I am 
suggesting is that given the current lack of resources, given 
the fact that, as I believe Congresswoman Wasserman Schultz 
said, that only 2 percent of the cases that are currently known 
do we have resources to prosecute that adding a massive data 
retention obligation is not going to increase the ability for 
us to put the child pornographers in jail. I certainly very, 
very strongly support the goal of putting these people in jail.
    Mr. Marino. Thank you. Now I do disagree with the 
percentage that was stated as to the cases that a re 
prosecuted. As a prosecutor, we could prosecute more crimes in 
any situation if the district attorney or the Chief or the 
deputy attorney general had more bodies and more investigators. 
But with that said, in my experience--and perhaps Deputy 
Weinstein and the Chief can respond to this--any case that came 
into our offices or series of cases would be investigated and 
eventually prosecuted.
    Gentlemen, what do you say about this?
    Ms. Wasserman Schultz. Would the gentleman yield just for 1 
second?
    Mr. Marino. Yes.
    Ms. Wasserman Schultz. I just want to thank you very much. 
I just wanted to clarify in saying that they are investigating 
less than 2 percent of the cases. It is not because they are 
unwilling to. It was because of the lack of resources, the lack 
of individuals, the lack of resources to be able to investigate 
more than that. But specifically in among the cases that they 
are able to investigate, they rescue a child in about 30 
percent of the cases. So it is incredibly important. I just 
wanted to make sure I was clear.
    Mr. Marino. Thank you. I understood that it is just a 
percentage, the 2 percent. I don't mean to brag about it, but 
our conviction rates in our office and our investigations and 
prosecutions were far more than 2 percent of the cases that 
came into the office.
    Mr. Weinstein. Congressman, I think, as you know, as a 
general matter, we follow the same approach that I know you 
followed in your office when you were the U.S. attorney. We 
don't turn cases away at the door. If they are there to pursue, 
we will pursue them.
    I think that it is not just increasing the number of cases. 
It is taking the existing cases as far as they can go. I used 
the case of the father who was abusing his daughter in northern 
Georgia a few moments ago. Because it took 2 years to identify 
that man as the abuser, by the time his computer was searched, 
the data that would have helped identify the other members of 
the group here in the U.S. with whom he was trading videos of 
child sexual abuse, we couldn't pursue those people because the 
data didn't exist. So a lot of times, it is taking the case 
that we have made and making it bigger and making sure that we 
are actually dismantling the entire organization so we can 
protect more children at the same time.
    Mr. Marino. Thank you. I think my time has expired.
    Mr. Sensenbrenner. The time of the gentleman has expired.
    I want to thank our witnesses for their testimony today. 
And, Ms. Dean, I hope you got the message, and I hope you will 
get to work with your organization to help us come up with a 
way that deals with this problem fairly. It is going to mean 
that your members are going to have to do a little bit more, 
and I think we all recognize that. But this is going to be a 
lot easier if this is worked out. There is a need to deal with 
this issue. I always prefer to have it done voluntarily in a 
trade organization. But I think you have got the message that 
if it isn't being dealt with voluntarily, the train will leave 
the station.
    So again, thank you all for your testimony today. Without 
objection, all Members will have 5 legislative days in which to 
submit to the Chair additional written questions for the 
witnesses which we will forward and ask them to respond as 
promptly as they can so that their answers may be made a part 
of the record. Without objection, all Members will have 5 
legislative days to submit any additional materials for 
inclusion in the record.
    And without objection, this hearing is adjourned.
    [Whereupon, at 12 p.m., the Subcommittee was adjourned.]
                            A P P E N D I X

                              ----------                              


               Material Submitted for the Hearing Record

 Prepared Statement of the Honorable Henry C. ``Hank'' Johnson, Jr., a 
   Representative in Congress from the State of Georgia, and Member, 
        Subcommittee on Crime, Terrorism, and Homeland Security
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]

  Prepared Statement of the Honorable Ted Deutch, a Representative in 
Congress from the State of Florida, and Member, Subcommittee on Crime, 
                    Terrorism, and Homeland Security
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]