Charting the Frontiers of Cyberspace

In Idaho and other western states, access to the Internet is becoming increasingly important, especially to families in our most remote areas, by reducing the distance to vital services or even the nearest library from hundreds of miles to only a few clicks.

For most of us, the Internet and the computer systems behind it have become essential components of modern living, offering not only convenience and easy access to news and information, but also the opportunity to enrich our lives by opening new vistas and linking us together in new types of communities.

As we "colonize" these new communities, it is vital that we move forward carefully and with forethought. Any dangers we encounter must be conquered so that cyberspace is a safe space. As trailblazers, we should be prepared to handle any new pitfalls, until our society as a whole decides if and how they might be confronted.

Like many Idahoans, I am no friend of regulation and government intrusion into our lives, but not at the expense of our most vulnerable citizens. Our children and our seniors must be protected. I believe we can provide that protection while leaving the freedoms we enjoy intact. And, Congress has begun to address these issues. As you can see from the Legislation section of this briefing, only four bills related to Internet privacy and security issues were passed in each of the previous two sessions of Congress. Within the first six months of this current session, there were twenty-six pending bills related to these issues.

Until all the wilds of the Web are tamed, each of us must take on the responsibilty of keeping ourselves and our families safe while online. The Cybersafety section of this briefing offers tips for parents and students on safe surfing, and the Cybersecurity section explains the importance of securing the systems we use to access the Internet. Whether this is all new or old hat, I encourage you to review the Best Practices outlined below and take advantage of the many online resources available.

Cybersafety

full text
of S.Res.486

A recent survey of students in grades 5 - 12 found that:

  • more than 90 percent use computers
  • one-third feel they have the skills to get past filtering software
  • over half trust those with whom they chat on the Internet
  • 12 percent have been asked by an online chat "buddy" to meet in person
  • 40 percent admitted to giving out personal information to strangers online

With passage of S.Res.147, the Senate hopes to increase awareness of and educate the citizens of our nation about the dangers and risks involved in accessing the Internet. Children and teenagers who have access to the Internet may be the most vulnerable simply because they may not be aware that dangers and risks even exist.

There are tools and resources available—online, of course—that can help neutralize the pitfalls found on the Internet. In many cases just knowing that the pitfalls exist and how you might recognize and deal with them is adequate defense against them. Most everyone with an email address knows to delete phoney email messages with virus attachments. Sadly, however, with so much more at stake, some children do not yet know the Internet equivalent of, "Don't take candy from strangers." The goal of National Internet Safety Month is to change that, which is why I am a cosponsor of this legislation.

It's Up to You

If you are a student who is new to the Internet:

Check out the tips for students and new users below to learn how to stay safe on the Internet.

Talk to your parents or another adult you trust if you have questions or encounter any problems online.

Share what you learn about Internet safety with your friends and classmates who are online, too.

If you are an adult who is new to the Internet:

While the tips for students below are geared toward teens and children, adults need to stay safe online, too, and can use these basic guidelines to do so.

If your child accesses the Internet from home, school, the local library, or from a friend's house:

For those who have already discussed online safety with their kids, this can be an opportunity to review what each of you know and remember about staying safe online.

For those who have been putting off a talk about online safety, I hope you will consider the survey results above as a call to action.

Use the tips and guidelines below as a starting point to promoting Internet safety in your own home.

Share what you learn with your friends, family-members or colleagues who also have children online. Send them an email message right now with a link to this Issue Briefing: http://craig.senate.gov/cybersafe/.

If there are no children accessing the Internet in your home:

Talk to your friends, family members or colleagues who do have children online about the importance of Internet safety. Send them an email message right now with a link to this Issue Briefing: http://craig.senate.gov/cybersafe/.

Guidelines and Tips for Safe Surfing for Students and New Users

Never share personal identifiers
What you look like—your appearance, gender, age
Where you might be—address, school, workplace, hangouts, clubs
Who you are—your real name, not even your first name, teams you play on, bank account info
And NEVER share a pic of yourself—avoid posting your pic openly or emailing it to those you don't know well offline already
Create Game Plans and a Panic Plan in Advance
In chat rooms and IM conversations—decide how to calmly exit from threatening or uncomfortable conversations
While surfing the web—practice closing windows quickly so you will be prepared in case you accidentally open an inappropriate or upsetting website
When reading your email—learn how to delete attachments from strangers, get to know what spam and bogus ads look like
Talk about your Game Plan—Parents or other adults you know and trust can help you be ready to handle whatever comes up online
Remain anonymous to those you don't already know offline
Usernames—should be generic and not include your real name
Online Profiles—put down your thoughts, ideas, and principles instead of where you live and what you look like
Meet only in cyberspace—developing online friendships is fun, but avoid meeting for real, especially if your new friend keeps bringing it up
Not everything online is true
People you meet—may not be who they say they are
Online advertisements—some people will tell you anything to get you to buy something
Know what you may legally download
Music MP3s and Movies—usually are not given away online at no charge
Intellectual Property—just because you are able to download a file, like a song or video, doesn't make it legal
Software and Programs—know the difference between freeware, shareware, and purchased programs
Read the small print—read license agreements to check for unexpected program installations or personal info collection
Online Resources for Students
Learn
Ask-An-Expert Links all ages
Select from a huge list of topics to send a question to an expert.
Ask Jeeves for Kids all ages
Safely search online by asking regular questions, or access study tools and other student resources.
BAM! (Body and Mind) ages 9-13
Get the 411 on staying healthy and keeping fit, and get answers to your questions, no questions asked.
Homework Helper all ages
From RefDesk.com, links to helpful sites are sorted by grade level.
Explore
FirstGov for Kids all ages
Gateway to hundreds of kid-friendly sites from the US Government and other organizations.
NASA Kids all ages
Explore space, the "final frontier."
Kid's Castle all ages
Cool stuff from the Smithsonian
Kid's Capital all ages
Learn all about your nation's capital on this website from the Mayor of Washington, DC.
KIDS.US all ages
Another gateway to kid-friendly sites.
Play
Yahooligans! Games all ages
Safely download and play all kinds of games, like sports games, card games, trivia quizzes, and even arcade games!
Switch Zoo all ages
Switch the animals' heads, legs and tails to make new creatures at this virtual zoo.

T I P : Learn how to "bookmark" or save as a "favorite" any of the sites you really like so that you can remember to visit them again.



Guidelines and Tips for for Parents and Educators

Educate yourself
Learn about the risks and dangers of surfing and chatting
Find out what chat lingo and abbreviations mean
Know where to go online for help and answers to questions, then bookmark these sites for when you need them
Keep lines of communication open
Talk with children about how to stay safe online, and let them know you are there to help them get out of any bad situation
Avoid anger if a problem situation arises, rather help solve it constructively to ensure your child will come to you next time he or she needs help
Get involved in your child's online experience
Respect privacy, but keep computers in the open
Never allow a computer with Internet access in your child's bedroom.
Make the computer area fun for kids, and offer headphones instead of demanding quiet
Regulary review the files on your computer
Learn how to check for virus infections and update virus protection files
Keep tabs on files saved by your children, such as pictures and downloaded media files
Adopt practices to keep your computer secure, such as those in the Best Practices of Cybersecurity in this briefing
Include Internet-related issues in your other "talks"
Bring up chat room dangers during your "talk" on avoiding sexual predators, for instance
Online Resources for Parents and Educators
Parenting
Parents' Guide to the Information Superhighway: Rules and Tools for Families Online
This straight-forward and easy-to-understand online publication from The Children's Partnership offers basic information about children online, including a guide to age-appropriate activities, and describes how to approach getting your family started online.
NetSafeKids
From the National Research Council, this site focuses on protecting children from pornography and predators while online. Also offers guidance in understanding the maturity level of a child, tips on screening and monitoring content, and how to deal with an incident of exposure to pornography or predation.
Parents Guide to Internet Safety
This online publication from the FBI discusses online child exploitation, including how to recognize possible signs of trouble and what to do about it.
CyberAngels
Part of the Guardian Angels program and committed to fighting cybercrime, this non-profit organization's site features free online classes and other resources, from "Internet 101" to "Parenting Your Online Child." Assistance in selecting software solutions is also offered.
Family Fun
FirstGov for Kids
Gateway to hundreds of kid-friendly sites from the US Government and other organizations.
America's Library
Visit this website from the Library of Congress to meet amazing Americans, jump back in time, or play a few different games.
Family Friendly Sites Directory
Gateway to hundreds of family-oriented and kid-friendly sites.
Educators
How to Protect Kids' Privacy Online: A Guide for Teachers
The Children's Online Privacy Protection Act allows teachers to act on behalf of a parent during school activities online and this publication from the FTC explains how.
BAM! Teacher's Corner
This teacher's companion to the CDC's Body and Mind website for 9-13 year olds offers tools to use the site effectively in the classroom.
CyberSmart! For Teachers
Download handouts, posters, and lesson plans—an entire K-8 curricullum, actually—all for free.

REMEMBER: When online together, help your child build surfing confidence by handing over the controls, at least sometimes. Plus, he or she will have more fun.

Cybersecurity

The Congressional Internet Caucus was formed to educate Members of the House and Senate about the promise and potential of the Internet by providing a forum for Internet-related policy discussions and encouraging greater use of Internet resources by Caucus members in communicating information about government. As a member of the Caucus, I have pledged to promote the growth of the Internet, in both commerce and the free flow of information, and the advancement of our nation's leadership in the emerging digital world.

Consistent with Goal Seven of my Mission & Goals statement, Caucus members also seek to maximize the openess of and participation in government by the people. A vital component in reaching these goals involves cybersecurity, ranging from the protection of individuals accessing our nation's cyberspace to the guarding of cyberspace itself.

Secure your computer to help secure our nation

Are you a good
Cyber Citizen?

Cyber citizen security shield

Find out by taking the Online Security Test from the National Cyber Security Alliance.

staysafeonline.info

The connection that delivers the world to our computer screens can also serve as a gateway to our personal information, to our homes, families and offices. Threats to our security and safety, like viruses, hackers and worms, can make cyberspace a dangerous place. Those who do not protect themselves and take advantage of available precautions risk becoming victims of cybercrime, or, worse yet, unwitting participants in cyberterrorism. Even more disturbing than personal identity theft is that vulnerable computers could be used in a planned attack devised to weaken or disrupt key national infrastructures.

Fortunately, keeping your computer or your home or business network secure is largely a matter of routine maintenance combined with the Cybersecurity Best Practices outlined below. Additionally, there are numerous software and hardware solutions available which offer various levels of online protection. Learn more about which tools might be best for you and your family in the Online Resources section below.

Cybersecurity Best Practices

Take advantage of software updates and patches.
Most likely, the makers of the software applications you are using provide free updates known as security fixes, patches and service packs. Your operating system should always be kept up to date with the latest security patches.
Use strong passwords.
Your passwords should not contain any part of your name, username, or email address. Experts advise avoiding the use of any word you could find in a dictionary, and including both uppercase and lowercase letters combined with numbers and other special characters. Try using a "passphrase" to create a unique password made up of the first letter of each word in the phrase, such as remembering "Today I ate two tasty Idaho potatoes!" as "tI82tIp!" If you must write down your passwords in case you forget them, keep your list in a secure location away from your computer.
Use anti-virus software.
After installing the software, be sure to keep it current with the updates provided by the software maker. Over 500 new viruses are discovered each month. You are not just protecting yourself when using virus software, but also others you communicate with.
Handle email with care.
Don't open email messages from senders you do not know, and never open an email attachment--even from someone you do know--unless you understand exactly what you are opening. When sending an attachment, include that you have done so in the text of your message so that the recipient can be confident he or she knows what the attachment contains. Take the time to research any "virus alerts" you receive before forwarding to friends and family to make sure the message isn't actually a virus hoax, or even a virus itself. Be suspicious of messages with too-good-to-be-true offers and watch out for red flags like misspelled words, incorrect grammar, and excessive punctuation.
Disconnect from the Internet when you are not online.
The extra time required to reconnect and disconnect each time you access the Internet, especially if you have a broadband connection without a firewall in place, guarantees that hackers cannot access your personal files nor use your computer to harm others.
Know what you are downloading and read the "small print."
Take the time to understand what you are getting when you agree to download an application. Read the license agreement to make sure other programs, like spyware or file-sharing applications you do not want to install, are not required components. Pay attention to security alerts generated by your browser verifying that you really want to install a new plug-in or helper program, and be wary of pop-up ads masquerading as official-looking alerts trying to sell something or make you click through into a website.
Use a firewall to guard against intruders.
A firewall is your security guard that stands between your home computer and the Internet. It lets you control which traffic your computer accepts. It also controls which of your programs can connect to the Internet. With a firewall, you define which connections between your computer and other computers on the Internet are allowed and which are denied. Many operting systems offer free firewalls that you need only activate to use.
Discuss cybersecurity with family members and others who use your computer.
Make sure that anyone with access to your computer understands and follows the safety guidelines you establish. There are many online resources to help parents teach children how to remain safe online.

Glossary of Key Terms

The following terms appear in this briefing and are defined here for your convenience. Access GetNetWise for a more extensive list of Internet terms and definitions.

Cyberspace - Refers to the various information resources that are available through computer networks and the Internet, as well as to "communities" which have developed through their common use of such resources, and to the culture which is developing in such electronically connected communities. May also be used to distinguish the physical world from the digital, or computer-based world.

Firewall - Hardware or software that secures computer files by blocking unauthorized access.

Hacker - Someone who breaks into your computer (or into a network of computers) over the Internet.

Internet - A global connection of computer networks, also referred to as the "Net," which share a common addressing scheme.

Operating System - The main program that runs on a computer. An operating system allows other software to run and prevents unauthorized users from accessing the system. Major operating system include UNIX, Windows, MacOS, and Linux.

Plug-in - A small piece of software that enriches a larger piece of software by adding features or functions. Plug-ins enable browsers to play audio and video.

Spyware - Programs which surreptitiously install themselves on your computer through e-mail, unauthorized web downloads or by bundling themselves with other downloaded software. These programs are almost always installed without meaningful user consent, and vex systems with a range of annoying functions, such as displaying unwanted ads, changing users' browsers' default home pages, adding programs to the system tray and, in some cases, collecting personal information. They draw computing power away from your other applications making your computer sluggish and unstable, and are almost always very difficult to uninstall or disable.

Virus - A program that is loaded onto your computer unbeknownst to you. Viruses can make copies of themselves, quickly using up all available memory. Some viruses can transmit themselves across networks.

Worm - A program that reproduces itself over a network, usually performing malicious actions, such as using up the computer's resources and possibly shutting the system down.

Online Resources

Legislation

The Congressional Research Service (CRS) is a department of the Library of Congress, and works exclusively as a nonpartisan analytical, research, and reference arm for both the House and Senate. The following overview is an excerpt from a May, 2005 CRS report on Internet Privacy.

CRS Report for Congress

Internet Privacy: Overview and Pending Legislation

Updated May 16, 2005

|  108th Congress  |  107th Congress  |

109th Congress: Pending Legislation

The following table provides summary information on pending Internet privacy-related legislation . It should be noted that although some bills have similar titles or intents, the details may vary. For example, some bills seek to protect "personal information," while others protect "personally identifiable information" (PII). Some concern "data," while others concern "electronic data." Definitions may vary, or, in some cases, the FTC is directed to determine the definition.

Bill (Sponsor) Summary, Committee(s) of Referral, and Status
INTERNET PRIVACY GENERAL
H.R. 84 (Frelinghuysen) Online Privacy Protection Act. Requires the FTC to prescribe regulations to protect the privacy of personal information collected from and about individuals not covered by COPPA. (Energy & Commerce)
H.R. 1263 (Stearns) Consumer Privacy Protection Act. Broad consumer privacy bill including provisions related to identity theft, regulation of "data collection organizations," and a study of the impact on U.S. interstate and foreign commerce of privacy laws, etc., adopted by other countries. (Energy & Commerce, International Relations)
H.R. 1310 (Maloney) Protection of Civil Liberties Act. Inter alia, makes the Privacy and Civil Liberties Oversight Board an independent agency, instead of part of the Executive Office of the President, and specifies certain qualifications for Board members and requires they be confirmed by the Senate. (Government Reform, Judiciary, Homeland Security, Intelligence)
H.R. 1526 (Otter) Security and Freedom Ensured Act (SAFE Act). Inter alia, makes Sec. 216 of the USA PATRIOT Act subject to the sunset date. (Judiciary, Intelligence)
S. 737 (Craig) Security and Freedom Ensured Act (SAFE Act). Inter alia, sets additional requirements regarding use of authorities under Sec. 216 of the USA PATRIOT Act. (Judiciary)
S. 936 (Leahy-Sununu) E-Mail Privacy Act. Amends the Wiretap Act to clarify that it covers e-mail that is temporarily stored in transit (in response to the Councilman case). (Judiciary)
SPYWARE
H.R. 29 (Bono) Spy Act. Requires the FTC to prescribe regulations prohibiting the transmission of spyware programs via the Internet to computers without the user's consent, and notification to the user that the program will be used to collect PII; makes phishing unlawful. Reported from House Energy and Commerce Committee (H.Rept. 109-32)
H.R. 744 (Goodlatte) Internet Spyware (I-SPY) Prevention Act. Sets criminal penalties for certain spyware practices.(Judiciary)
S. 687 (Burns-Wyden) SPY BLOCK Act. Broad anti-spyware bill. Hearing held. (Commerce)
S. 1004 (Allen) Enhanced Consumer Protection Against Spyware Act. (Commerce)
IDENTITY THEFT/ PROTECTING SSNs AND OTHER PII
H.R. 82 (Frelinghuysen) Social Security On-line Privacy Protection Act. Regulates the use by interactive computer services of SSNs and related PII. (Energy and Commerce)
H.R. 92 (Frelinghuysen) Permits Medicare beneficiaries to use an identification number other than their SSN in order to deter identity theft. (Ways and Means, Energy and Commerce)
H.R. 220 (Paul) Identity Theft Prevention Act. Protects the integrity and confidentiality of SSNs, prohibits the establishment of a uniform national identifying number, and prohibits federal agencies from imposing standards of identification for individuals on other agencies or persons. (Ways & Means, Government Reform)
H.R. 1069 (Bean) Notification of Risk to Personal Data Act.* Requires federal agencies, and persons engaged in interstate commerce, in possession of electronic data containing personal information, to disclose any unauthorized acquisition of such information; requires financial institutions to disclose to customers and consumer reporting agencies any unauthorized access to personal information; and requires consumer reporting agencies to implement fraud alerts under certain circumstances. (Energy & Commerce, Government Reform, Financial Services)
H.R. 1078 (Markey) Social Security Number Protection Act. Regulates the sale and purchase of SSNs. (Energy & Commerce, Ways & Means)
H.R. 1080 (Markey) Information Protection and Security Act. Regulates the conduct of information brokers and the protection of PII held by them. (Energy & Commerce)
H.R. 1099 (Hooley) Anti-Phishing Act. Criminalizes phishing. (Judiciary)
Bill (Sponsor) Summary, Committee(s) of Referral, and Status
H.R. 1653 (Markey) S. 810 (Clinton) Safeguarding Americans from Exporting Identification Data (SAFE-ID) Act. Allows U.S. business entities to transmit PII of U.S. citizens to foreign affiliates or subcontractors in another country if that country has adequate privacy protections and the citizen has been given prior notice and not opted-out; and prohibits them from transmitting PII to foreign affiliates or subcontractors in a country without adequate privacy protections unless the U.S. citizen has opted-in. (House Energy & Commerce; Senate Judiciary)
H.R. 1745 (Shaw) Social Security Number and Identity Theft Prevention Act. To enhance SSN protections, prevent fraudulent misuse of SSNs, and otherwise enhance protection against identity theft. (Ways & Means)
S. 29 (Feinstein) Social Security Misuse Prevention Act. Limits the misuse of SSNs and establishes criminal penalties for such misuse. (Judiciary)
S. 115 (Feinstein) Notification of Risk to Personal Data Act.* Requires federal agencies, and persons engaged in interstate commerce, in possession of electronic data containing personal information, to disclose any unauthorized acquisition of such information. (Judiciary)
S. 116 (Feinstein) Privacy Act of 2005. Requires the consent of an individual prior to the sale and marketing of the individual's PII. (Judiciary)
S. 472(Leahy) Anti-Phishing Act. Criminalizes phishing. (Judiciary)
S. 500 (Bill Nelson) Information Protection and Security Act. Regulates information brokers and protects individual rights to PII. (Commerce)
S. 751 (Feinstein) Notification of Risk to Personal Data Act.* Requires federal agencies, and persons engaged in interstate commerce, in possession of data containing personal information to disclose any unauthorized acquisition of such information. (Commerce)
S. 768 (Schumer) Comprehensive Identity Theft Prevention Act. Broad identity theft prevention bill, including protecting SSNs, assistance to victims, coordinating international action against identity theft, notification of information breaches, and establishing an Office of Identity Theft at the FTC. (Commerce)


108th Congress: Internet Privacy-Related Legislation Passed

H.R. 2622 (Bachus) Fair and Accurate Credit Transactions Act. Includes several provisions related to identity theft, such as setting requirements on consumer reporting agencies and credit card issuers, requiring truncation of credit card numbers on electronically printed receipts, and extending the statute of limitations for when identity theft cases can be brought. (P.L. 108-159)
H.R. 1731 (Carter) Identity Theft Penalty Enhancement Act. Makes aggravated identity theft in conjunction with felonies a crime, and establishes mandatory sentences. (P.L. 108-275 H.R. 4818)
H.R. 4818 (Kolbe) FY2005 Transportation, Treasury and General Government Appropriations Bill. (incorporated into the FY2005 Consolidated Appropriations Act). Sec. 633 continues prohibition on use of appropriated funds to collect personal information about visitors to federal websites. (P.L. 108-447)
S. 2845 (Collins) Intelligence Reform and Terrorism Protection Act. Creates Privacy and Civil Liberties Oversight Board. (P.L. 108-458)


107th Congress: Internet Privacy-Related Legislation Passed

H.R. 2458
S. 803
(Turner)
(Lieberman)
E-Government Act. Inter alia, sets requirements on government agencies in how they assure the privacy of personal information in government information systems and establish guidelines for privacy policies for federal websites.
H.R. 5505 (Armey) Homeland Security Act. Incorporates H.R. 3482, Cyber Security Enhancement Act, as Sec. 225. Loosens restrictions on ISPs, set in the USA PATRIOT Act, as to when, and to whom, they can voluntarily release information about subscribers. (P.L. 107-296)
H.R. 2215 (Sensenbrenner) 21st Century Department of Justice Authorization Act. Requires the Justice Department to notify Congress about its use of Carnivore (DCS 1000) or similar Internet monitoring systems. (P.L. 107-273)
H.R. 3162(Sensenbrenner) USA PATRIOT Act. Expands law enforcement's authority to monitor Internet activities. See CRS Report RL31289 for how the act affects use of the Internet. Amended by the Homeland Security Act (see P.L. 107-296). (P.L. 107-56)
return to top of page