Which of the following statements is true about the unsolicited commercial e-mail known as spam?

[Senate Hearing 108-968] [From the U.S. Government Printing Office] S. Hrg. 108-968 SPAM (UNSOLICITED COMMERCIAL E-MAIL) ======================================================================= HEARING before the COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS FIRST SESSION __________ MAY 21, 2003 __________ Printed for the use of the Committee on Commerce, Science, and Transportation SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED EIGHTH CONGRESS FIRST SESSION U.S. GOVERNMENT PRINTING OFFICE 85-548 WASHINGTON : 2013 ----------------------------------------------------------------------- For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001 JOHN McCAIN, Arizona, Chairman TED STEVENS, Alaska ERNEST F. HOLLINGS, South CONRAD BURNS, Montana Carolina, Ranking TRENT LOTT, Mississippi DANIEL K. INOUYE, Hawaii KAY BAILEY HUTCHISON, Texas JOHN D. ROCKEFELLER IV, West OLYMPIA J. SNOWE, Maine Virginia SAM BROWNBACK, Kansas JOHN F. KERRY, Massachusetts GORDON H. SMITH, Oregon JOHN B. BREAUX, Louisiana PETER G. FITZGERALD, Illinois BYRON L. DORGAN, North Dakota JOHN ENSIGN, Nevada RON WYDEN, Oregon GEORGE ALLEN, Virginia BARBARA BOXER, California JOHN E. SUNUNU, New Hampshire BILL NELSON, Florida MARIA CANTWELL, Washington FRANK R. LAUTENBERG, New Jersey Jeanne Bumpus, Republican Staff Director and General Counsel Robert W. Chamberlin, Republican Chief Counsel Kevin D. Kayes, Democratic Staff Director and Chief Counsel Gregg Elias, Democratic General Counsel C O N T E N T S ---------- Page Hearing held on May 21, 2003..................................... 1 Statement of Senator Allen....................................... 10 Statement of Senator Burns....................................... 8 Statement of Senator Cantwell.................................... 55 Statement of Senator McCain...................................... 1 Letter dated May 21, 2003 from Bill Gates, Chairman and Chief Software Architect, Microsoft.............................. 3 Letter dated May 20, 2003 from Jerry Berman, President, Center for Democracy & Technology.......................... 4 Statement of Senator Nelson...................................... 17 Statement of Senator Wyden....................................... 9 Witnesses Dayton, Hon. Mark, U.S. Senator from Minnesota................... 15 Hughes, J. Trevor, Executive Director, Network Advertising Initiative..................................................... 76 Prepared statement........................................... 78 Leonsis, Ted, Vice Chairman, America Online, Inc. and President, AOL Core Service............................................... 58 Prepared statement........................................... 61 Rotenberg, Marc, Executive Director, Electronic Privacy Information Center and Adjunct Professor, Georgetown University Law Center..................................................... 83 Prepared statement........................................... 85 Salem, Enrique, President and CEO, Brightmail Inc................ 63 Prepared statement........................................... 64 Scelson, Ronald, Scelson Online Marketing........................ 89 Prepared statement........................................... 92 Schumer, Hon. Charles E., U.S. Senator from New York............. 11 Prepared statement........................................... 14 Swindle, Hon. Orson, Commissioner, Federal Trade Commission...... 18 Report dated April 30, 2003 from the Federal Trade Commission's Division of Marketing Practices entitled ``False Claims in Spam''......................................................... 20 Prepared statement........................................... 37 Thompson, Hon. Mozelle W., Commissioner, Federal Trade Commission 38 Prepared statement........................................... 40 SPAM (UNSOLICITED COMMERCIAL E-MAIL) ---------- WEDNESDAY, MAY 21, 2003 U.S. Senate, Committee on Commerce, Science, and Transportation, Washington, DC. The Committee met, pursuant to notice, at 9:35 a.m. in room SR-253, Russell Senate Office Building, Hon. John McCain, Chairman of the Committee, presiding. OPENING STATEMENT OF HON. JOHN McCAIN, U.S. SENATOR FROM ARIZONA The Chairman. Good morning. Today, the Committee will examine whether there are ways we can effectively deal with the increasing proliferation of spam in America. I commend the Federal Trade Commission for its dedication to the complex policy and technical issues involved in putting an end to unwanted spam. I also want to strongly commend Senators Burns and Wyden for their continued work over the years in trying to address this issue through legislation. Literally hundreds of hours have been spent by these two Senators and their staffs in trying to address this very, very difficult issue. Spam means different things to different people. The FTC defines spam generally as unsolicited commercial e-mail, and some Americans do not want any of it, other consumers like to receive unsolicited offers by e-mail. To them, spam means only unwanted, fraudulent or pornographic e-mail that floods their in-box. Many American businesses view e-mail as a new medium through which to market or communicate more efficiently with consumers. To them, that is not spam, but commercial speech protected by the First Amendment. Internet service providers are caught in the middle, often drawing a distinction between what they, but not necessarily consumers perceive as good or bad actors, and permitting some unsolicited e-mails to pass through their networks to consumers while blocking others in their spam filters. Regardless of whether you call all unsolicited commercial e-mail spam, it is rapidly on the rise, and its sheer volume is affecting how consumers and businesses use e-mail. E-mail messaging has fundamentally changed the way we communicate with family and friends, the way we communicate with businesses that provide goods and services, and the way that businesses market products to consumers. The growing affliction of spam, however, may threaten all of us. Less than 2 years ago, spam made up only 8 percent of all e-mail. Today, industry experts estimate that more than 45 percent of all global e-mail traffic is spam, and many expect it to reach the 50 percent mark by this summer. AOL estimates that it blocks 80 percent of all its inbound e-mail, nearly 2.4 billion messages each day. Managing this influx adds real cost to consumers and businesses. There are other costs to Americans, such as the cost to our children, who may be victimized by the nearly 20 percent of spam that contains pornographic material, some including graphic sexual images. The FTC also tells us that two-thirds of all spam contains deceptive information, much of it peddling get-rich-quick schemes, dubious financial or health care offers, and questionable products and services. While most agree that something should be done about spam, it is clear that legislation alone will not solve the problem. Yesterday's New York Times had a very interesting article. It says--and I will not, obviously, quote the whole article. I will include it in the record, but it said at first, it looked as if some students at the Flint Hill School, a prep academy in Oakton, Virginia, had found a lucrative alternative to an after-school job. Late last year, technicians at America Online traced a new torrent of spam, or unsolicited e-mail advertisements, to the school's computer network. On further inquiry, though, AOL determined the spammers were not enterprising students. Instead, a spam-flinging hacker who has still not been found exploited a software vulnerability to use Flint Hill's computers to relay spam while hiding the e-mails' true origins. I mention that story because the complexity of this issue is challenging to all of us, and the complexity and the innovative ways that spammers are employing make this to some degree an issue that has ever-changing challenges. The fact that there may be--keeping up with resourceful spammers' latest technology is not the only challenge. Jurisdictional barriers only complicate enforcement, and up to 90 percent of all spam may pass through mail servers outside of the United States. The fact that there may be no silver bullet to the problem of spam does not mean, however, that we should stand idly by and do nothing at all about it. It is clear we must act, but I ask the witnesses to help us define the problem and tell us how, whether by technical, legislative, or other means we can be most effective. For Congress' part, we should make no mistake, unless we can effectively enforce the laws we write, those laws will have little meaning or deterrent effect on any would-be purveyor of spam. Finally, I ask industry to continue to respond to the demands of American consumers in doing all that it can to stop the worst part of spam. Parents should not have to think twice before encouraging their children to use the computer. I thank the witnesses, and look forward to the testimony. Also, I would like to enter into the record, letters from Mr. Bill Gates and also Jerry Berman of the Center for Democracy and Technology, basically stating their commitment to working with us to try to eliminate this issue. [The information referred to follows:] Microsoft May 21, 2003 Letter from Bill Gates to the U.S. Senate Commerce Committee Regarding Spam Hearings Dear Chairman McCain and Ranking Member Hollings: Thank you for holding this important and timely hearing on spam. I greatly appreciate the leadership of both you and your Commerce Committee colleagues. I regret that we are unable to participate directly, but would like to take the opportunity to share Microsoft's perspective on this critical e-commerce and consumer issue. The torrent of unwanted, unsolicited, often offensive and sometimes fraudulent e-mail is eroding trust in technology, costing business billions of dollars a year, and decreasing our collective ability to realize technology's full potential. According to some industry estimates, spam now makes up more than 50 percent of all e-mail. To make matters worse, spam often preys on less sophisticated e-mail users, such as our children, posing a genuine threat to personal security and privacy and threatening the very utility of e-mail as a viable communication tool. Microsoft firmly believes that spam can be dramatically reduced, and that the solution rests squarely on the shoulders of industry and government. There is no silver bullet solution to the problem. Rather, we believe that fully addressing this problem for the long-run requires a coordinated, multi-faceted approach that includes technology, industry self-regulation, effective legislation, and targeted enforcement against the most egregious spammers. In terms of technology, Microsoft is committed to providing customers with the best solutions available, and engaging on every level to find new and better technical means to stop spam. To date, Microsoft's investments in anti-spam technologies have already paid off for businesses and consumers through innovations available in new versions of our products, such as MSN, Hotmail, Exchange and Outlook. The industry is building better filters every day, and is investing heavily in research and development to open the door to greater innovation. We need filtering technologies that are easier for consumers to use, and more effective at determining which e-mail messages are spam and which are desired communications. This differentiation will greatly reduce the risk of falsely misidentifying legitimate e-mail as spam. While we and others have made significant advances in anti-spam technology, we recognize there is still much work to be done. But technology is not the only answer. Effective and complementary self- regulation efforts by the industry are crucial. Specifically, we support the establishment of an independent trust authority or authorities around the globe that could spearhead industry best practices, and then serve as an ongoing resource for e-mail certification and customer dispute resolution. In short, these authorities could provide mechanisms to identify legitimate e-mail, making it easier for consumers and businesses to distinguish wanted mail from unwanted mail. Of course, any technology designed to establish the identity of legitimate commercial firms and associate them with a trusted sender ``seal'' should be based on open standards and developed with broad input from affected industries. But in order for the self-regulation and technology efforts to be successful, they need to be supported by strong Federal legislation that prohibits fraudulent and deceptive spamming practices, and empowers consumers without threatening the vitality of legitimate e- commerce. Specifically, Federal legislation should create incentives for e- mail marketers to adopt best practices, and to certify themselves as trusted senders who can be more easily identified by consumers and filters alike. One way to encourage marketers to adopt e-mail best practices is to provide a Safe Harbor for those companies who are members of an FTC-approved self-regulatory organization. Under this approach, safe harbor participants would be entitled to avoid the burden of additional labeling requirements (such as ``ADV:'' to identify e-mail advertisers) while enjoying other regulatory benefits based upon their compliance with specific sender guidelines. Thus, Federal legislation should identify the basic components that industry guidelines must address, such as notice and choice obligations, but permit the industry to take the lead in developing the specific guidelines within these parameters. Microsoft believes other elements of Federal legislation should include:Effective Internet service provider (ISP) enforcement that allows ISPs to prosecute spammers on behalf of their customers;Meaningful definitions to capture all bad actors involved in sending unlawful spam, including those who knowingly assist in the transmission of unlawful spam;Provisions that permit state Attorneys General to enforce violations of Federal law, as well as existing state contract and trespass laws, in order to further increase the pressure on persistent spammers;Express language that preserves the right of ISPs to combat spam (i.e., provisions that make it clear that the Federal anti-spam law does not impose an obligation on ISPs to block or carry certain types of e-mail messages, and does not impair an ISP's ability to enforce its anti-spam policies); andFederal preemption of state statutes that regulate the sending of commercial e-mail messages provided the Federal anti-spam law contains strong substantive requirements. Because ISPs rely heavily on state contract and trespass laws, as well as laws relating to computer fraud and theft, in their fight against spammers, Federal preemption in any anti-spam law should include a carve-out for such state laws. The recent increase in anti-spam legislative activity both domestically and internationally is encouraging, and we commend you for the important work you are doing in this area. Current U.S. state laws already make it possible for the industry to begin taking action against spammers who are illegally targeting customers. Enforcement efforts across the industry to date have been successful, and more will come. ISPs including Microsoft, AOL and Earthlink have already begun to file lawsuits, as have the Federal Trade Commission and many state Attorneys General, in an effort to increase the costs of sending spam, thereby reducing its volume. As a leader in the industry, Microsoft is committed to using its resources to help address this problem from every perspective: technology, self-regulation, legislation and enforcement. We have started to see progress on all fronts, but much more work needs to be done. We pledge our support to your legislative effort, and look forward to sharing our proposals and working with others toward a viable solution. When industry, government and technology come together to solve the spam problem, we will truly be able to offer consumers a trustworthy, safe and more productive e-mail experience. Sincerely, Bill Gates, Chairman and Chief Software Architect. ______ Center for Democracy & Technology Washington, DC, May 20, 2003 Chairman John McCain, Senate Committee on Commerce, Science, and Transportation, United States Senate, Washington, DC. Dear Chairman McCain: The Center for Democracy and Technology is continuing its activity to help find effective solutions to the problem of unsolicited commercial e-mail--also known as ``spam.'' We welcome the Committee's inquiry into this important issue, and look forward to working together towards a solution that will protect the Internet and its users from the choking effects of unwanted e-mail, while maintaining the openness and innovation that makes the Internet so valuable. As per your request, we have attached our recent report ``Why Am I Getting All This Spam?'' which we ask you to consider in the Committee's hearings on this issue. In the report, CDT explored the ways in which spam was received by over two hundred and fifty e-mail addresses spread all over the Internet. In six months, we received over eight thousand unsolicited e-mail messages to addresses that had been posted on the Web, used in newsgroups, or disclosed to Internet businesses. From that research, CDT created a series of tips for users to take steps to shield themselves from spam. Those tips, as well as the rest of our report, are attached. Based on our research and further discussions, CDT believes that the spam problem merits targeted Federal legislation to help alleviate the burdens spam causes for consumers, businesses, and ISPs. While spam is undeniably a major problem for the future of the Internet, we must be careful to craft legislation that can be effective and does not run counter to freedom of speech and other concerns. A prerequisite to narrow and effective spam legislation is open dialogue among policymakers, industry, and Internet users--a dialogue that is only beginning to occur. This committee has an important role to play in creating the kind of open discussion that will lead to the best path forward. We look forward to continued work with you on this important issue. Sincerely, Jerry Berman, President. ______ LexisNexis Copyright 2003 The New York Times Company The New York Times--May 20, 2003 Tuesday Correction Appended Late Edition--Final SECTION: Section A; Column 1; Business/Financial Desk; Pg. 1 LENGTH: 1835 words HEADLINE: TECHNOLOGY; E-MAIL'S BACKDOOR OPEN TO SPAMMERS BYLINE: By SAUL HANSELL BODY: At first, it looked as if some students at the Flint Hills School, a prep academy in Oakton, Va., had found a lucrative alternative to an after-school job. Late last year, technicians at America Online traced a new torrent of spam, or unsolicited e-mail advertisements, to the school's computer network. On further inquiry, though, AOL determined that the spammers were not enterprising students. Instead, a spam-flinging hacker--who still has not been found--had exploited a software vulnerability to use Flint Hills' computers to relay spam while hiding the e-mail's true origins. It was not an isolated incident. The remote hijacking of the Flint Hills computer system is but one example among hundreds of thousands of a nefarious technique that has become the most common way for spammers to send billions of junk e-mail messages coursing through the global Internet each day. As spam has proliferated--and with it the attempts by big Internet providers to block messages sent from the addresses of known spammers-- many mass e-mailers have become more clever in avoiding the blockades by aggressively bouncing messages off the computers of unaware third parties. In the last two years, more than 200,000 computers worldwide have been hijacked without the owners' knowledge and are currently being used to forward spam, according to AOL and other Internet service providers. And each day thousands of additional PC's are compromised at companies, institutions and--most commonly of all--homes with high- speed Internet connections shared by two or more computers. ``The spammers have mutated their techniques,'' said Ronald F. Guilmette, a computer consultant in Roseville, Calif., who has developed a list of computers that are forwarding spam. ``Today, if you are trying to do a really mass spamming, it is de rigueur to do it in an underhanded manner.'' Just last Thursday, 17 law enforcement agencies and the Federal Trade Commission issued a public warning about some of the ways spammers now commandeer computers to evade detection. The officials translated the warning into 11 languages because many of the exploited computers are known to be in China, South Korea, Japan and other countries with heavy Internet use. Mostly, the spammers are exploiting security holes in existing software, but increasingly they are covertly installing e-mail forwarding software, much like a computer virus. For some, hacking is no longer about pranks, but making a profit. ``This is not about a hacker trying to show off, or give you a hard time,'' said William Hancock, chief security officer for Cable and Wireless, the British telecommunications company. ``This is about money. As long as there are people who want spam to go out, this is not going to go away.'' Spam fighters say that some software is too easy to exploit and should be fixed. Moreover, computer users can take technical precautions to safeguard their machines. But not everyone will bother to take those steps, even if he or she discovers having been dragooned into the spammers' global army. To begin with, most users do not see much effect when their computer has been co-opted. Surfing the Web from the victimized computer may be slower than usual but that is not always easy to detect. In most cases, the owners' e-mail addresses are not added to the spammed messages, so there is no need to worry that friends and associates will think the PC owners have suddenly started peddling herbal Viagra. Indeed, the only way most users even become aware of such hijackings is when they receive telephone calls or e-mail from their Internet service providers saying a piece of spam was traced back to their machines. ``People are shocked,'' said Bobby Arnold, a network abuse engineer at Earthlink, the big Internet provider. ``Someone will say, `I thought my computer was running a little slow, but I had no idea it was being used to send spam.' '' Some of the victims of the hidden spammers are revolted to learn, Mr. Arnold said, that they are aiding the hucksters and pornographers responsible for what many Internet users consider the medium's great blight. The truly offended rush to safeguard their machines. But others, who see no direct impact to themselves, simply shrug off the problem, Internet providers say. Intent on reducing their network clutter, the providers then often try to cajole them into cooperating--and, if that fails, will sometimes cut off a user's service. Sometimes people do find that someone has been sending spam and using their e-mail address as the sender, but this does not mean that their computers were used. Nothing on the Internet verifies that an e- mail message was actually sent by the person listed in the ``From'' address, which is one reason fighting spam is so hard. And spammers like to send e-mail that appears to be from their enemies or names chosen at random. The legitimate owners of those addresses are often left to clean out hundreds or thousands of complaints from their e-mailboxes. When a computer receives an e-mail message, it does record a code number, called an Internet protocol address, that can be traced to the computer that is connecting to it. But often e-mail is passed from one machine to another and the identity of the original sender cannot be verified. Indeed, the rapid rise in the number of spammers trying to hijack innocent computers is a direct result of their desire to hide their own Internet protocol addresses from spam blockers. Most commonly, they are taking advantage of a backdoor in much of the software that office users or people with high-speed connections at home often install to share an Internet link among several computers--or so-called proxy servers. Some other types of e-mail and Web surfing software, typically run by larger companies, can also be taken advantage of if security features are not properly set up. Because it essentially enables one computer to masquerade as another, a proxy server is an ideal tool for anyone seeking to use the Internet anonymously. So proxy servers are used by people in some countries to visit websites blocked by government censors. They are also used by hackers trying to attack other machines. And they are perfect for spammers trying to avoid filters. None of these uses would be possible if the owners of the proxy servers made sure to configure them for access only by authorized users. But whether from laziness or ignorance, many users of proxy servers leave them open to anyone on the Internet. AnalogX Proxy, a free proxy-server program that has been downloaded by more than a million people, is automatically in the open state when it is first installed. Mark Thompson, the author of AnalogX, said he had rebuffed the requests of many antispam activists to distribute the software with the security features already activated because doing so would make it harder to set up. ``The biggest plug for the proxy is it is really easy to get it running,'' he explained. Mr. Thompson said he did try to achieve a compromise by revising the program to give people a warning about security problems every time it starts. Even so, Wirehub, a Dutch Internet service provider, says that 45,000 of the 150,000 open proxy servers it has identified as sending spam appear to be using AnalogX. To find all these vulnerable machines, spammers and other hackers deploy computers that do nothing more than try to connect to millions of computers across the Internet, looking for open proxy servers to exploit. At the Flint Hills School, ``it was pretty amazing how fast our vulnerability was picked up by the spammers,'' Robert Hampton, the school's director of technology, said recently. Once the problem was identified, the school was able to fix it immediately. Spammers and hackers trade or sell lists of open proxy servers on dozens of websites. And other sites sell software a would-be spammer can use to find new servers. In the last six months, an increasingly common trick has been for spammers to attach rogue e-mail-forwarding software to other e-mail messages or hide it in files that are meant to emulate songs on music sharing sites like KaZaA. As with all such hacker contraptions, and much spam, it is difficult to figure out who is behind these programs. But there is some evidence that one of the major spam-sending programs, known as Jeem, originated in Russia, which has been a fertile ground for both spammers and hackers. Last October, Michael Tokarev, a Russian computer programmer active in the worldwide antispam effort, noticed a lot of spam in Russian that offered bulk-mailing services. The messages were identical, but they came from many different computers. He investigated and found they were forwarded by a program, calling itself Jeem, that had not been seen before. Mr. Tokarev said that in December, a Russian forum for spammers called Carderplanet.com contained a posting offering to sell the Internet addresses of open proxy servers, for $1 each, that appeared to be machines infected with Jeem. ``Since the last week of December, several big U.S. spammers started to use those Jeems, too,'' Mr. Tokarev wrote in an instant message interview last week. Machines infected with Jeem, which is especially hard to find because it keeps switching its identity on the computers it borrows, seem to be used these days mostly by spammers selling pornography, David Ritz, a volunteer spam fighter, said. Using a software monitoring tool he helps run, Mr. Ritz last week examined the messages sent to Internet news groups from just one home computer infected with Jeem. On one day last week, this computer sent 773 pornographic news postings with subjects like ``Lolita paradise'' and ``N.U.D.E--L,O,L,I,T,A,S.'' ``Open proxies are the single greatest threat to the integrity of the network that we see now,'' he said. AOL, which has made fighting spam a central part of its marketing thrust, is taking what some see as radical action against open proxy servers. It will no longer accept any incoming e-mail sent directly from the computers of individual home users with high-speed service. This will not affect most home users because they typically do not run e-mail servers on their own computers but connect their e-mail programs to servers run by their Internet providers. But a handful of advanced users and small businesses do run their own e-mail servers connected to high-speed lines, and they no longer can send e-mail to AOL users. Road Runner, the high-speed service of Time Warner cable, is taking a different approach. It is actively running the same sort of scanning program used by the spammers to find out whether any of its customers have open proxy servers. Those that do are asked to close them. Many other service providers shy away from such scanning because it appears to be an invasion of privacy. ``It's a race,'' said Mark Harrick, Road Runner's director of network security. ``There are malicious individuals scanning our users looking for vulnerabilities every day, and we want to find them first.'' CORRECTION-DATE: May 21, 2003 CORRECTION: A front-page article yesterday about mass e-mailers who bounce spam off the computers of unwitting third parties misspelled the name of a prep school in Virginia whose network was used to send spam. It is Flint Hill, not Hills. The article also misspelled the surname of the director of security for Road Runner, which is scanning its customers' systems to determine whether they are vulnerable. He is W. Mark Herrick Jr., not Harrick. GRAPHIC: Chart: ``Close the Door To Spammers'' To avoid having their e-mail ads blocked, spammers are increasingly relaying their messages covertly through computers of home and office Internet users. The users are often unaware that their computers have been hijacked. Measures to prevent spammers from commandeering a computer will also make for a safer Internet connection. ERECT A FIREWALL A firewall program governs what programs may connect to the Internet and can block the forwarding of rogue e-mails. Firewalls come both as software programs and built into routers, devices used to share a connection. USE ANTIVIRUS PROTECTION This software protects against infiltration by a covert spam-relaying program. Keep this software updated, as hackers are prolific. BEWARE OF DOWNLOADS Many malicious programs are distributed in the form of attachments to e-mails, or files to download, as from a music-sharing website. LIMIT PROXY SERVERS If using proxy-server software instead of a router to share an Internet connection, make sure it is set to share only with computers on the local area network, not the entire Internet. Common proxy-server programs include AnalogX Proxy and Wingate. (pg. C6) The Chairman. I would like to ask Senator Burns, if that is OK, Senator Burns and then Senator Wyden, and then we will welcome our two colleagues. STATEMENT OF HON. CONRAD BURNS, U.S. SENATOR FROM MONTANA Senator Burns. Thank you, Mr. Chairman, and I think you hit the nail on the head a little while ago. I want to thank my colleague, Senator Wyden, and you mentioned him spending many hours on this issue, and we have for the last 4 or 5 years, but I also want to commend you for your patience in putting up with us. We have been involved in this issue quite a while now, and now we are finally coming down to a product I think we can present to the American people with pride, and I think also the Chairman's acknowledgement that legislation alone will not take care of this problem. It will, however, facilitate industry and law enforcement people, especially the FTC, to get down to business and look at it seriously, as if we have the technology to prevent this unwanted commercial e-mail, if you want to call it that, and do something about it, because it is the cost to businesses and individuals are escalating, and they are wide- ranging. Businesses lose money when employees take more time to wade through their e-mails, individuals who pay long distance charging to ISPs end up footing the bill while their inbox is filled with unsolicited messages. Servers all over the country have difficulty blocking spam, all while spammers work to find more and more ways to circumvent the latest software server or individual blocking systems. I want to specifically, really, at this point thank my colleague, Senator Wyden, who has been working tirelessly for years. Last month, Senator Wyden and I reintroduced the CAN- SPAM bill, which passed unanimously out of this Committee last year. I thank the cosponsors of the bill, particularly those on this Committee and here today, including Senators Stevens, Breaux, Nelson, and, of course, Senator Schumer, and we will hear from him later. The CAN-SPAM bill empowers consumers and grants additional enforcement authority to the FTC to take action against spammers. The bill will provide additional tools to end this online harassment by allowing users to remove themselves from the mass e-mail lists and impose steep fines up to $1.5 million on those spammers. For particularly flagrant offenders, the CAN-SPAM bill carries criminal penalties, including up to a year in jail for those who disguise their identities and use false and misleading subject lines. In short, this bill provides broad consumer protection against bad actors, while still allowing legitimate Internet advertising as a justified means of flourishing. While it is obvious to anyone with an e-mail account that the scourge of spam has continued to worsen, the trends are becoming more apparent by the day, and even more alarming. According to a recent article in The Washington Post, spam currently accounts for 40 percent of all the e-mail traffic. The number is estimated to exceed that this summer. America Online alone is blocking 2.4 billion spam messages every day. That seems almost unbelievable. If current trends continue and nothing is done, the toxic sea of spam is threatening to drown the very medium of e-mail. The digital dreck of spam is particularly poisonous in rural areas. Because of the vast distances in Montana, many of my constituents are forced to pay long distance charges for their time on the Internet. Spam makes it nearly impossible for those in rural America to realize the tremendous economic and educational benefits of the online era. In today's information age, where beating the competitor to the next sale is absolutely critical to survival, spam-related slow-downs and shutdowns are causing real economic damage. According to one study done by a consulting group, spam will cost U.S. businesses $10 billion this year alone. The true impact of spam is seen is individual stories. A constituent of mine, Jeff Smith, who built a cutting-edge cyber hotel in Missoula, Montana, he has calculated that spam has cost his business $300,000 a year. Nearly half of the bandwidth he buys is sucked up by unwanted messages. His entire company is only worth $2.5 million, so clearly, a loud clarion call for Federal legislation has gone forth, and the Committee should heed this call. Just weeks ago the New York Times mentioned it, as was cited by our Chairman today, and understanding the peril that we are in is drowning something that actually a lot of folks have thought to be one of the great tools that we have in this country especially in areas we might call remote. So thank you, Mr. Chairman, for having this hearing. Thank you for your patience. Thank you for understanding the problem that we are facing. The Chairman. Thank you, Senator Burns. Senator Wyden. STATEMENT OF HON. RON WYDEN, U.S. SENATOR FROM OREGON Senator Wyden. Thank you, Mr. Chairman. I will just make a few comments. Senator Burns and I have been prosecuting this case against spam now for more than 4 years, and he has said it very well, and I have been really proud to have been his junior partner in this cause all these years, and we appreciate the fact that you are willing to hold this hearing. Mr. Chairman, it just seems to me what this issue is all about is giving consumers control over their inbox. At this point, there are few, if any, consequences for those who have chosen to abuse the open and low-cost nature of e-mail, and that is what Senator Burns and I have been trying to change all these years, and I wanted to take just a minute to put a bit of perspective on this, because as we have been at this now for several Congresses, what would always happen is that we would get favorable reactions from people, citizens and others who are frustrated with spam, but we always heard a number of arguments that now was not the time for congressional action. People would say, well, the problem is not so serious, it is just an annoyance. They would say, you can use the delete key, that is the only solution that anybody needs, it is overkill to have a variety of enforcement tools, and what seemed particularly ironic in this Committee, since we led the effort for the Internet Tax Freedom Act, people said that spam legislation would stunt the growth of E-commerce. Well, I do not think those arguments hold much weight any more, given the fact that we have got this tidal wave of spam, and the question now is to look at the good ideas. Senator Burns and I think that we have come up with an approach that is going to work, but we know our colleagues have a number of good ideas, and we are anxious to look at those as well, but begin to change the odds. The people who are spamming are not technological simpletons. These are very sophisticated, savvy people, and what we need to do is to change the odds, and we believe in our legislation, by producing a tiered approach on enforcement--Senator Burns and I have criminal penalties, we give the Federal Trade Commission civil authority to bring action, we give the state Attorneys General the authority to bring action, and we give the ISPs, the Internet service providers the authority to bring action, and we believe that if you bring a modest number of enforcement actions using that kind of authority, you send a message to those scamming spammers and people who want to abuse the system that the odds are going to change. The odds are more likely that this is going to be treated as a serious problem and you are going to have some consequences. The last point that I would make, Mr. Chairman, is that I think you absolutely have to have a tough enforceable national law, because the alternative is, the country will have a crazy quilt of state laws. The spammers will play the states off against each other, and I think the problems will continue to proliferate. What this really comes down to is, in our country, we think that the consumer ought to have a right to know where e-mail is coming from, and they ought to have a right to tell the spammer to stop. We are anxious to move forward finally, welcome our colleagues. They have good ideas, and several of our other colleagues do as well. Let us move to examine them and then pass legislation here in this Committee. And I thank you. The Chairman. Thank you. I would like to welcome both of our colleagues, Senator Schumer and--Senator Allen, did you have an opening comment? STATEMENT OF HON. GEORGE ALLEN, U.S. SENATOR FROM VIRGINIA Senator Allen. If I may, Mr. Chairman. Thank you, and I want to thank all of our witnesses for appearing this morning on this important topic. In fact, I was with a group of people--I will not mention who; it is political, but I said we have to leave here because we have got a hearing on spam, and everyone said go, great, get rid of it, and so this is a good bipartisan issue that I think all Americans care about. Obviously, for e-mail and Internet to continue, it has to be efficient, and unfortunately--and you will get all the testimony here--it is becoming that you spend more time deleting unwanted messages, and that is one thing personally, it is another thing for a business, and I will also speak briefly on a few points here. I know that Commissioners Swindle and Thompson will be testifying, the FTC Commissioners, and I want to commend you all for the effort you have been making particularly enforcing against e-mail that is fraudulent or containing deceptive information. That is very important, and I commend you. The goal here, as we see it, is to empower consumers or provide them with a choice while preserving legitimate E-commerce business activities that are important for the growth of our economy and businesses. I do think that the costs, though, associated with spam far outweigh the benefits of it. This is a balance we have to strike here, and consumers-- and I will say this as a parent--are becoming increasingly concerned about the spam that is coming through to our children, not just disruptive to the family, but children, and people will talk about that. I will say from personal experience now, using AOL as my Internet service provider compared to previous ISPs, it is much better in blocking this unwanted spam. You may have to click off a few ads, which you have always had to do, but as far as blocking this unwanted spam, it is far, far better in that regard, and I know that Mr. Leonsis will testify on AOL's efforts. Finally, I want to commend this legislation that Senator Burns and Senator Wyden have. I think it is a good bill pending before our Committee, Mr. Chairman, as it relates to the issue of state preemption, which is an important matter for Virginia, and we have just passed a very good law. It strikes the right balance as far as enforcement and preserving certain causes of action as far as fraud, so I think ultimately, an approach which incorporates the good legislation like the Burns-Wyden legislation, as well as effective Government enforcement, and let us also couple it with technology advancements and solutions, and improved business practices. We will strike that appropriate balance needed to empower consumers while maintaining e-mail as a viable commercial communications tool, and I thank you, Mr. Chairman, for having this very timely, needed hearing. I thank all the leaders and our colleagues for their leadership, and look forward to reading and hearing the testimony of our witnesses. The Chairman. Thank you. Welcome to our colleagues, Senator Schumer and Senator Dayton. Senator Schumer. STATEMENT OF HON. CHARLES E. SCHUMER, U.S. SENATOR FROM NEW YORK Senator Schumer. Thank you, Mr. Chairman. First, I want to thank you for holding these timely hearings and for your leadership on so many consumer issues. I think people who have problems with all sorts of different new technological and other industry problems look to you as a beacon, and once again, you are Johnny-on-the-spot, and we very much appreciate it. I also want to--I did not even--the double entendre was not intended. [Laughter.] Senator Schumer. Sometimes these things just slip out. It is not so bad. Worse things have been said about people. In any case, I also want to thank Senators Burns and Wyden. They have been true trailblazers and leaders on this issue, and I know as we try to come together on legislation that their proposals and their thoughts on this will help us dramatically in Congress solve this problem. Now, it is no secret, Mr. Chairman, we are under siege. Armies of online marketers have overrun e-mail inboxes across the country with ads for herbal remedies, get-rich-quick schemes, and pornography. Today's spam traffic is growing at a geometric rate, causing the superhighway to enter a state of virtual gridlock. What was a simple annoyance last year has become a major concern this year, and could cripple one of the greatest inventions of the 20th Century next year if we do nothing. As a result, Mr. Chairman, a revolution against spam is brewing as the epidemic of junk e-mail exacts an ever- increasing toll on families, businesses, and the economy. A number of us in the Senate have proposed legislation aimed at curbing the spread of spam. I have proposed a no-spam list, criminal penalties for spammers, and several other initiatives geared toward reducing the number of unwanted e-mails we get in our inboxes, and obviously there are many other solutions out there, and we know that there is no silver bullet; that not any one solution is going to solve this problem, because as you mentioned, the technology--you have offensive and defensive warfare, and every time a defensive warfare does some good, the offense uses the same technology to get ahead. But there is one fact that is very encouraging, and that is that 90 percent of spam, it is estimated, is caused by about 250 users, such as the fellow they just caught in my state, in Buffalo. That means that legislation, while it will not eliminate spam, can really go after the worst users. So can enforcement, and we can make a real dent and turn the tide, so instead of the number of spam messages every one of us gets going up each week, it will go down and down until it is back to being just an annoyance. So today I am going to discuss these measures, but I also want to talk about one other thing, because spam grows so exponentially, and that is the need for an international effort in the war on spam to occur at the same time we seek to deal with the problem here in the United States. The simple fact of the matter is that so many of the problems that have come about in the digital age are inherently global. Spam is no exception. Spam is truly an international issue, because the Internet is a global resource, and stemming the rising tide of spam is essential if the Internet is to continue to be an effective medium of communication and commerce. It would not do us much good if we went after the spammers here in the United States and they set up shop in another country and just did the same thing. Other countries are beginning to deal with spam, Korea and Australia among them. Their governments are considering anti- spam measures, and collaboration with these and other Nations is crucial if the U.S. is to be effective, so that is why today I am proposing an international agreement, a treaty to fight spam. A global agreement will ensure that anti-spam standards protecting American computers are enforceable both here and abroad. An international agreement will become more important as new regulations and law enforcement efforts in the U.S. cause the most prolific spammers to flee to other countries. We know that is what they do. We have experience with money laundering, digital piracy, child pornography. We know that as soon as we tighten up our laws here and institute vigorous enforcement, those who want to violate our laws move abroad to avoid prosecution. The bottom line is that the second we tighten up enforcement here at home, rogue actors go overseas to continue their activities. If we are just focused on curbing spam here at home, we will be unsuccessful, but that does not mean we should sit on our hands until we get our fellow countries on board with these efforts. There is a lot of work that needs to be done here, and that is why so many interested parties, including the Direct Marketing Association, have come around to the view that the Federal Government can play a meaningful role in stopping spam. They know that effective anti-spam legislation makes it more likely that consumers will read legitimate marketing messages. We also have the problem of pornography, which is really a serious one. Let me illustrate this point with a story. My wife and I have two wonderful children, one of whom is just about to complete her first year at college, and the other, a 14-year- old girl, Alison, is an absolute whiz on the Internet. She spends far more time on the Internet than she does watching television, which until recently we thought was great, considering what is on television. Well, as parents we do our best to make sure the Internet is a positive experience for her, a device to help her with her school work, learn about events taking place around the world, maybe even a way to order the latest N Sync CD. You can imagine my wife's and my anger and dismay when we discovered that not only was she a victim of spam, but like all e-mail users, much of the junk mail she was receiving advertised pornographic websites, things I would not want to see, let alone have my child see. That is another reason that we have to move, and we have to move quickly. So let me just discuss the solution that I have proposed. Criminal penalties, and we really need stiff jail time for repeat offenders. We can warn them once, fine them significantly second, but if they keep doing this, we should give them jail time, and I am working with my colleagues on the Judiciary Committee. We will have to work in concert with the Commerce Committee, which has primary jurisdiction, in terms of criminal penalties. We can hunt down the spammers one by one using these penalties, and again, because so much of spam is caused by so few people, it should make a real difference. Another idea I have offered is the national no-spam registry. A list maintained by the FTC would be a gigantic database of people who can call in or e-mail in and opt out of receiving unwanted spam by submitting their mail addresses to the list. The list is modeled on the highly successful do-not- call registries that have been used to ward off telemarketers. It has been very successful in telemarketing. Admittedly, it is a little harder with spam, because it is a lot cheaper than having somebody make a phone call, but again, given the small number of people who do this, it can make a real and dramatic difference. Although a similar list for e-mail addresses poses security challenges that must be addressed before implementation, I am hopeful that this list, in conjunction with ADV labeling, safeguards for those who employ best practices, might be one way we can give consumers control over their inboxes. In conclusion, Mr. Chairman, this is a very important issue. The technology which has blessed our lives and accounted for so much of the prosperity we have seen in the last two decades is at risk, a very real part of it, and I am glad that you are Chairman of this Committee and look forward to working with you, Senator Burns, and Senator Wyden to come up with a good, strong, comprehensive bill. At the same time, I hope we can all work together to get our country to start talking to other countries about a treaty, so when we solve things here, they do not just go right overseas and we have to start all over again. Thank you, Mr. Chairman. [The prepared statement of Senator Schumer follows:] Prepared Statement of Hon. Charles E. Schumer, U.S. Senator from New York Chairman McCain, Senator Hollings, Colleagues, Good morning. Mr. Chairman, I want to thank you for holding this hearing to address Unsolicited Commercial e-Mail or spam. I also want to commend Senators Burns and Wyden for their leadership and hard work on this issue. I believe we are under siege. Armies of online marketers have overrun e-mail inboxes across the country with advertisements for herbal remedies, get-rich-quick schemes and pornography. As you are all aware, spam traffic is growing at a geometric rate, causing the Superhighway to enter a state of virtual gridlock. What was a simple annoyance last year has become a major concern this year and could cripple one of the greatest inventions of the 20th century next year if nothing is done. Way back in 1999, the average e-mail user received just 40 pieces of unsolicited commercial e-mail--what we call spam--each year. This year, the number is expected to pass 2,500. I know that I'm lucky if I don't get 40 pieces of spam every couple of days! As a result, a revolution against spam is brewing as the epidemic of junk e-mail exacts an ever increasing toll on families, businesses and the economy. Let me illustrate this point with a story. My wife and I have two wonderful children, one of whom is just about to complete her first year at college. The other, a 14 year-old girl, is an absolute whiz on the Internet who loves sending and receiving e-mail. As parents, we do our best to make sure she has good values and that the Internet is a positive experience for her--a device to help her with her schoolwork or learn about events taking place around the world and, maybe even a way to order the latest N Sync CD. You can imagine my anger and dismay when I discovered that not only was she a victim of spam like myself, but, like all e-mail users, much of the junk e-mail she was receiving advertised pornographic websites. I was and remain virtually powerless to prevent such garbage from reaching my daughter's inbox. The frustration I feel in the battle against spam is one that I think business owners and Internet Service Providers across that nation can identify with. According to Ferris Research, spam costs businesses in the United States $10 billion each year in lost productivity, consumption of Information Technology resources and help-desk time. With surveys showing that over 40 percent of e-mail traffic qualifies as spam, ISPs spend millions of dollars each year on research, filtering software and new servers to deal with the ever expanding volume of junk e-mail being sent through their pipes. And, if the spam itself isn't enough, spammers often engage in crimes such as identity theft and fraud to secure e-mail addresses and domain names from which to send millions of pieces of junk e-mail. All of this demonstrates that it's time to take back the Internet from the spammers. And why I am joining you today in saying that enough is enough. We all know that spammers use a variety of tools and methods to send millions of e-mail messages each day. In order to be effective, I believe spam solutions will have to be as creative and varied as the spammers' efforts. We should give law enforcement officials, ISPs and others a wide variety of tools to fight spam. Among the possible solutions that are exist--and this is not an exhaustive list--are pending legislation in the Senate and the House the would enact anti-e-mail harvesting provisions and special e-mail labeling requirements; stipulate valid unsubscribe features; and prohibit false and fraudulent header, router and subject line information. And that's just a start. As I said before, because of the dramatic challenges we face in stemming the spam flood, we need a multi-pronged approach. In particular, I believe stiff criminal penalties--including jail time for repeat offenders--are warranted. I am working with my colleagues on the Judiciary Committee on a bill to create these new penalties. We will hunt down spammers one by one, using criminal penalties to show what will happen to those who continue to send junk e-mail. Another idea I have offered is a National No-Spam Registry. This list, maintained by the Federal Trade Commission, would be a gigantic database of people who have ``opted out'' of receiving spam by submitting their e-mail addresses to the list. The list is modeled on the highly successful Do-Not-Call registries that have been used to ward off telemarketers. Although a similar list for e-mail addresses poses security challenges that must be addressed before implementation, I am hopeful that this list might be one way we can give consumers control over their in-boxes. None of these solutions will be the silver bullet that stops all spam. But a multi-faceted approach has a better chance of reducing the ever-growing amount of spam than a solitary solution. And stemming this rising tide is essential if the Internet is to continue to be an effective medium of communication and commerce. If spam continues to grow, people will rely on their e-mail less and less. Right now, consumers are becoming so frustrated at the junk e-mail bombardment that they delete legitimate commercial e-mail as if it were spam. This is why so many interested parties, including the Direct Marketing Association, have come around to the view that the Federal Government can play a meaningful role in stopping spam. They know that effective Federal anti-spam legislation will make it is more likely that consumers will read legitimate marketing messages. I think we can all agree that spammers must not be allowed to bog down the vast potential of e-mail and the Internet. It is my hope that the impressive roster of panelists you have assembled here today will stimulate ideas to stop spammers in their tracks. I look forward to hearing their testimony and working with all of you to bring and end to the current junk e-mail epidemic. The Chairman. Thank you very much, Mr. Schumer. Thank you for coming. Senator Dayton. STATEMENT OF HON. MARK DAYTON, U.S. SENATOR FROM MINNESOTA Senator Dayton. Thank you, Mr. Chairman. I thank you for the opportunity to testify before you this morning, and I commend you for your leadership in this whole area, and I certainly commend Senators Burns and Wyden also for their leadership and the legislation that they have introduced. I want to just at the outset, on behalf of the state of Minnesota and the good Minnesota Company, Hormel, voice an objection to the use of the word, ``spam'' to characterize all of this activity. You know that spam was, for a half-century, the bane of existence of servicemen and women and others, and it came to define a certain low point in some people's view of things, but I think it has actually gotten much lower if that is the case. Senator Burns and I had the opportunity--I ate over in South Korea at the DMZ--to eat my third MRE, and I must say, Spam at any temperature is a lot better than the MRE that I ate---- [Laughter.] Senator Dayton.--however automatically warmed in its pouch, and now we have this form of spam, which is, you know, very, very different from the Hormel version. For one, with Hormel, you get to choose whether or not you want it. Second, it is not forced down anyone's throat. [Laughter.] Senator Dayton. The source is clearly identified, and the contents, too. You can ask Hormel what they put in their Spam, and they will just tell you right up front it is everything but the kitchen sink. [Laughter.] Senator Dayton. And in what proportions, and what--it is left to your imagination, but my anti-spam proposals are incorporated in the legislation I have introduced as 563, which is the Consumer/Owner's Bill of Rights, and it is broader than just the anti-spam, but I will focus on that point alone this morning, and it is a starting point, not an end product at all, and I recognize going into this that the great appeal of the Internet is that it has been unregulated and it has been free. I have met many who have enjoyed it that way and used it that way and want to keep it that way, but unfortunately, individual freedom becomes, in a larger and ever-larger social system, a form of anarchy. In that process comes a form of Darwinism, where everyone is on his or her own. The strongest, the smartest, the most aggressive tend to take over and dominate, and that is the situation with spam today. There are 31 billion messages being transmitted through cyberspace today, each day. That is an estimate, but it is enormous and ever-expanding, and these 31 billion messages are transmitted freely and free. They are unregulated, they are unrestricted, and they are largely unwatched, and everyone who is involved in that system must individually then protect themselves; the individuals, businesses, and the like, which is great for the software industry, who has not created this problem, but has tried to help deal with it. There are all sorts of software that you can buy to prevent spam and pop-ups and ads and all sorts of things, which range from nuisances at best, but then increasingly, invasions of people's lives, spies, identity theft, credit card theft, and spam also becomes a carrier of viruses, worms, trojan horses, which are even more destructive and costly to individuals and to businesses. McAfee's anti-virus unit estimates that there are 62,000 virus threats today, and these numbers that I am throwing out are ones that other sources would have quite different, which is part of the function of the expansion of this, and rapidly growing aspect of this whole realm, is that I have seen numbers that deviate quite a bit from one another, but one virus alone, the Code Red worm in the year 2001 was estimated by Computer Economics, an independent research firm, to have a worldwide cost of $2.62 billion, one virus, and it is expanding, and some would say it is even exploding. Senator Schumer referenced Howard Carmack, who was recently arrested. It is estimated that he issued himself 825 million pieces of spam last year, one individual in 1 year. Write Mail, the spam blocker firm, estimates, and others have said, some 40 percent of all Internet e-mail today is spam. I have seen figures that estimate that percentage is higher, but the percent share of the e-mail is increasing, I think everyone would agree. Legislation will not solve this, as others have said, but the situation will not improve without legislation. In fact, it will get worse, and I think this is a case where the perfect becomes the enemy of the good. This is going to be a moving target. It is going to be ongoing. It is sort of going to be like the Mad Magazine Spy v. Spy, where they will be ever-dueling, one escalating and outsmarting and outwitting the other, and the other needing to respond. So whatever we design has to be flexible, the process must be nimble, and it has to be dynamic. It has to keep up with these ever-new developments, and so I would recommend something along the lines of what Robert Kennedy said up in the Department of Justice years ago, the Anti-Organized Crime Task Force, a SWAT team, a team that would drive this effort, carry out congressional mandates, and would interact with industry, with users, with leaders in Congress, but we have to have something that is as dynamic as the industry itself, and as inventive as the spam producers themselves. My own legislation suggests a national registry, where people can opt out one time. Another is to make every e-mail sent to someone in the United States be identified as to its source, and finally, I think it is worth looking at--I am not prepared to propose this now, but some very, very small charge to every e-mail that is sent, so small that it would not be onerous for an individual or a business that has regular use, but it would add up and be a financial deterrent for those who are sending millions and even billions of these e-mails all over the world. Thank you, Mr. Chairman. The Chairman. Thank you very much, Mr. Dayton. Senator Nelson has an opening comment, and we will leave and go vote and come right back. As soon as you finish, we will take a quick break. STATEMENT OF HON. BILL NELSON, U.S. SENATOR FROM FLORIDA Senator Nelson. And it will be short, Mr. Chairman. I just want to throw on the table another approach, and the approach would be to have an opt-out provision---- If all of you leave, that means I am chairing the Committee. [Laughter.] Senator Nelson. We will take up the Nelson bill right now. [Laughter.] Senator Nelson. The approach is virtually along the same lines. It would be more, instead of the implied consent that Senator Wyden's bill indicates, there would be more of a consumer protection. The message would have to have an opt-out provision where the consumer could say, I do not want any more of this, and if we are really going to put teeth into this, that this violation, both criminal penalty with jail time and/ or fines, would be the first element showing the conspiracy or continuum of activities that would activate the RICO Act, which is the Racketeer Influenced and Corrupt Organization Act, which then gives prosecutors the tools to go after the criminal enterprise and to confiscate the assets. Now, that is starting to put some bite into the legislation, and so I want to offer that, and that will be a part of the discussion as we get in and tinker with this legislation, trying to fit and design a solution so that consumers can start using their e-mail. I mean, it is just unbelievable. A week ago, I was in my Tampa office. The press had come in. We were just going to shoot the breeze, and I happened to punch up on the computer to see what messages were there. In 1 day, I had a normal letter-size piece of paper, single-spaced, full of unwanted e-mail messages, two of which were pornographic. Now, if that is happening to a United States Senator, you can imagine what is happening to our citizens all across the country, and they do not want this, and it is time for the Government to do something to stop it. Another interesting change is that the major network providers in the past have been quite skittish about any kind of interference with this new form of communication, but they have come around now because we are starting to see that there is so much of an interference with the normal communication lines that the Government is going to have to step in and do something about this, perhaps with the FTC, but also very likely with legislation. And I will just close my comments and dash off to vote, to say this. Since I had that conversation in my Tampa office, the media wrote about it, and that has been in Florida, and I will tell you, everywhere I have gone in Florida since, people keep coming up to me and saying, thank you for being willing to do something about this, because it has gotten to the point that we are fed up and we have had enough, so I hope that we will do something about it. The Committee will stand in recess. [Recess.] The Chairman. We will resume the hearing. The witnesses in the first panel are Hon. Orson Swindle of the Federal Trade Commission and Hon. Mozelle Thompson, also with the Federal Trade Commission. Welcome, gentlemen. Since one of you has white hair and one of you has no hair, we will begin with the white-haired Mr. Swindle. [Laughter.] Mr. Thompson. I am just follically challenged. [Laughter.] Mr. Swindle. I would win if we did this on looks, too. [Laughter.] The Chairman. Mr. Thompson. [Laughter.] STATEMENT OF HON. ORSON SWINDLE, COMMISSIONER, FEDERAL TRADE COMMISSION Mr. Swindle. Thank you, Mr. Chairman and Members of the Committee, for this timely discussion of spam and the threat it poses to potential benefits of information technology. Consumers must have trust and confidence and comfort with technology and its uses, particularly when it comes to their privacy and security of personal and sensitive information. Spam undermines consumer trust and confidence. It represents a significant and rapidly growing threat to web-based services. The Commission's prepared testimony provides the Committee with an excellent overview of our efforts to combat spam. What is spam? We have heard it discussed several times this morning. The FTC defines spam as any commercial electronic mail message that is sent, typically in bulk, to consumers without the consumers' prior request or consent. I think the Chairman's term, unwanted, may be perfect. There are at least four major concerns caused by spam. First, the volume is increasing at astonishing rates. Current estimates indicate that at least 40 percent of all e-mail is spam. Second, recent studies by the FTC indicate that spam has become the weapon of choice of those engaged in fraud and deception. Nearly 66 percent of the spam we examined appeared to contain falsity and deception. I would ask that our False Claims in Spam Report be included as part of the record, Mr. Chairman. The Chairman. Without objection. [The information referred to follows:]Mr. Swindle. Third, the sheer volume of spam, coupled with its capacity to transmit viruses, trojan horses and other damaging code, threatens to do major damage to the Internet and our critical infrastructure. Fourth, there is no easy solution. No one silver bullet that will solve the problem. Solutions must be pursued from many directions. These concerns represent enormous cost to businesses, the economy, consumers, and society. Two specific problems demand attention by policymakers and industry leaders. First, there is the complex combination of technology, market forces, and public policy that will be evolving for years to come. The second problem is one that I characterize as being heavily influenced by the emotions of consumers, small businesses, and home users by the millions who are literally fed up with spam. I am concerned that spam is about to kill the killer app of the Internet, specifically consumer use of e-mail and E-commerce. If consumers lose confidence in web-based services and turn away, tremendous harm will be done to the economic potential of information technology. Solving these problems will require innovation, resources, and time. However, dealing with the emotional reaction to spam by millions of users will demand immediate attention before it gets out of hand. Internet service providers, software manufacturers, and those engaged in designing operating systems must empower consumers with better control over their incoming e-mail. Easing the spam burden on consumers would help to shore up trust and confidence. Surely consumer empowerment is possible today. Why has industry not solved this problem? Frankly, to date I am not convinced that industry has made the commitment or really wants to empower consumers by giving them easy-to-use tools for personal control. I read a book last summer, Tuxedo Park, by Jennet Conant, a fascinating account of Alfred Loomis, a wealthy financier from the 1920s. He funded a private research laboratory at his Tuxedo Park estate, attracting the greatest scientists of the day. They were instrumental in the rapid development of radar, which enabled us to keep the supply lines open to England in early World War II. Wartime crisis demanded that creative minds quickly find technical solutions to complex problems. Loomis and his friends were up to the task. It occurs to me that we have a crisis today. We must avoid major setbacks to the potential of information technology. We need great minds to quickly find solutions to spam. Empowering consumers would be a good first step. Is industry motivated to do the right thing, and do it now? The FTC's law enforcement efforts against spam are aggressive, but finding the guilty parties is resource- intensive and a difficult technical challenge. We give consumer education high priority at the commission. Our information security website and private sector partnerships continue to expand our reach. Recently, we released findings from three studies to better understand the magnitude of the spam problem, how spam is proliferated, and how consumers and users are victimized. Our recent 3-day spam forum aimed to better inform the dialogue and find the best possible solutions to the spam problem. The forum was remarkable in its discussions and participation, over 400 participants and some 80 or so panelists. I would like to share some of the forum's revelations, as well as some personal observations about the realities of spam. First and foremost, the private sector must lead the way to finding the solution. We likely will not find the perfect solution. The target will be constantly moving as technology evolves. More laws are not necessarily the right answer. I heard little universal enthusiasm from participants for currently proposed legislation. Laws bestowing competitive advantage to larger firms over smaller firms are questionable. Unenforceable laws will have little real effect. Overreaching laws will have unintended adverse consequences. Passing legislation to mandate best practices for the good actors will not help us track down the bad actors engaged in fraud and deception. We must work together. Consumers, users, and civil society organizations must be a part of our continuing dialogue to find solutions. Awareness and safe computing practices by all participants are essential, and developing a culture of security where all participants work to minimize our many vulnerabilities is an imperative, not an alternative. Our efforts to solve the spam problem and secure our information systems and networks is not a destination. We are embarked upon a journey. I thank you, Mr. Chairman. [The prepared statement of Mr. Swindle follows:] Prepared Statement of Hon. Orson Swindle, Commissioner, Federal Trade Commission Thank you Mr. Chairman and members of the Committee for this timely discussion of SPAM and the threat it poses to the potential benefits of information technology. Consumers must have trust, confidence and comfort with technology and its uses, particularly when it comes to their privacy and the security of personal and sensitive information. SPAM undermines consumer trust and confidence. It represents a significant and rapidly growing threat to web-based services. The Commission's prepared testimony provides the Committee with an- excellent overview of our efforts to combat SPAM. What is SPAM? The FTC defines unwanted and unsolicited SPAM as ``any commercial electronic mail message that is sent-typically in bulk-to consumers without the consumers prior request or consent.'' There are at least four major concerns caused by SPAM. First, the volume is increasing at astonishing rates, current estimates indicate at least 40 percent of all e-mail is SPAM. Second, recent studies by the FTC indicate that SPAM has become the weapon of choice of those engaged in fraud and deception. Nearly 66 percent of the SPAM we examined appeared to contain falsity and deception. I would ask our False Claims in Spam report be included as part of the record. Third, the sheer volume of SPAM--coupled with it's capacity to transmit viruses, trojan horses, and other damaging code--threatens to do major damage to the Internet and our critical infrastructure and the Internet. Fourth, there is no easy solution--no one silver bullet that will solve the problem. Solutions must be pursued from many directions. These concerns represent enormous costs to businesses, the economy, consumers and society. Two specific problems demand attention by policy makers and industry leaders. First, there is the complex combination of technology, market forces and public policy that will be evolving for years to come. The second problem is one that I characterize as heavily influenced by the emotions of consumers, small--businesses and home users by the millions who are literally fed up with SPAM. I am concerned that SPAM is about to kill the ``killer app'' of the Iinternet--specifically--consumer use of e-mail and e-commerce. If consumers lose confidence in web-based services and turn away, tremendous harm will be done to the economic potential of information technology. Solving these problems will require innovation, resources and time. However, dealing with the emotional reaction to SPAM by millions of users, demands immediate attention before it gets out of hand. Internet service providers, software manufacturers, and those engaged in designing operating systems must empower consumers with better control over their incoming e-mail. Easing the SPAM burden on consumers would help to shore up trust and confidence. Surely, consumer empowerment is possible today. Why has industry not solved this problem? Frankly, to date, I am not convinced that industry has made the commitment or really wants to empower consumers by giving them easy-to- use tools for personal control. I read a book last summer, Tuxedo Park, by Jennet Conant--a fascinating account of Alfred Loomis, wealthy financier from the 1920s. He funded a private research laboratory at his Tuxedo Park estate, attracting the great scientists of his day. They were instrumental in the accelerated development of radar which enabled us to keep supply lines open to England early in WWII. War time crisis demanded that creative minds quickly find technical solutions to complex problems. Loomis and friends were up to the task. It occurs to me that we have a crisis today--we must avoid major set backs to the potential of information technology. We need great minds to quickly find solutions to SPAM. Empowering consumers would be a good first step. Is industry motivated to do the right thing and do it now? he FTC's law enforcement efforts against SPAM are intensifying, but finding the guilty parties is resource intensive and a difficult technical challenge. We give consumer education high priority at the Commission. Our information Security website and private sector partnerships continue to expand our reach. Recently, we released findings from three studies to better understand the magnitude of the SPAM problem, how SPAM is proliferated, and how consumers and users are victimized. Our recent three-day SPAM Forum aimed to better inform the dialogue and find the best possible solutions to the SPAM problem. The Forum was remarkable in its discussions and participation--over 400 participants and 80 panelists. I would like to share some of the Forum's revelations--as well as some personal observations--about the realities of SPAM. First and most essential--the private sector must lead the way! We likely will not find the perfect solution. The target will be constantly moving as technology evolves. More laws are not necessarily the right answer. I heard little universal enthusiasm from participants for currently proposed legislation. Laws bestowing competitive advantage to larger firms over smaller competitors are questionable. Unenforceable laws will have little real effect: Overreaching laws will have unintended adverse consequences. Passing legislation to mandate best practices for ``good actors'' will not help us track down the ``bad actors'' engaged in fraud and deception. We must work together. Consumers, users, and civil society organizations also must be a part of our continuing dialogue to find solutions. Awareness and safe computing practices by all participants are essential. Developing a culture of security where all participants work to minimize our many vulnerabilities is an imperative, not an alternative. Our efforts to solve the SPAM problem and secure our information systems and networks is not a destination--we are embarked upon a journey! Thank you, Mr. Chairman. The Chairman. Thank you. Commissioner Thompson, welcome. STATEMENT OF HON. MOZELLE W. THOMPSON, COMMISSIONER, FEDERAL TRADE COMMISSION Mr. Thompson. Thank you, Mr. Chairman. I thank you for this opportunity to appear before you today and talk about the issue of spam, bulk unsolicited commercial e-mail. At the outset, I would like to praise this Committee and its Members for holding this hearing and the work that it has done over the years to focus attention on this important subject. Spam is a complex issue that resonates with consumers, businesses, and Governments alike. The FTC, along with Members of this Committee, have been interested in this issue for a long time. In 2001, the Committee asked this Commission's views on the CAN-SPAM Act, S. 630, sponsored by Senators Burns and Wyden. At that time, we unanimously supported the bill, stating the Commission generally favors the underlying goal of the legislation, and as set forth in our written testimony submitted today, the FTC has already brought over 50 cases against deceptive and fraudulent spam. While these cases are important, they focus on only one aspect, fraud and deception, of what has grown to be a much larger problem. For this reason, 3 weeks ago, the Commission held a 3-day workshop to get a better insight on the problem of spam. My observation is that it was a unique event. It was a unique week. It is not every day that an FTC workshop draws over 400 attendees for 3 days to pose questions to 87 panelists representing a wide perspective on one issue. At the same time, three of America's largest ISPs announced a voluntary business initiative and three new legislative proposals were introduced, and there have been more since then. In addition, representatives from numerous countries, including Australia, Canada, Japan, and the European Union, also attended and participated in those discussions. We are just beginning to digest all of this information, so we have not reached conclusions about how this information may affect our views, but like Commissioner Swindle, I would like to share at least some of my observations. One key lesson we learned from our spam workshop is the scope of the spam problem appears to have changed significantly. It is no longer simply a matter of consumer annoyance at receiving unwanted e-mail. We have some very significant problems. First, that through fraud and deception across international borders, there is an undermining of consumer confidence, as shown by this chart here, that how much of the spam has falsity in its face. Second, that it threatens business, because the volume of e-mail places a choke-hold on E-commerce. It was the first time I had actually heard a large group of witnesses claim that spam constitutes a threat to the future of the Internet, and you can just see from this chart the growth from 8 percent to 45 percent this year, and projected to 2007, that it could constitute up to 70 percent of e-mail. Finally, we heard a lot about areas that Commissioner Swindle has worked in, talking about security issues, including spam used to spread viruses, and the very disruption of service caused by volume that could impact the activities of consumers, businesses, and Governments on the Internet. What that tells me is that the problem of spam has become broader. It has evolved, and the scope of possible solutions may also have to expand. Clearly, strong law enforcement is an important part of this. To address fraud and deception, we also have to work with other countries' law enforcers for cross-border actions, and I know the Committee is aware that the FTC has submitted some legislative proposals this year to enable us to have better tools to work cooperatively with other governments to root out fraud and deception, but there also has to be a business answer, with business initiatives and best practices that distinguishes good actors from bad, and we also want to ensure that there continues to be incentives to develop technological tools that provide consumers with means to address and manage their e-mail. Finally, there has to be strong consumer and business education to enable consumers to make better choices, and to protect themselves. The interesting challenge for all of this is, all of it has to take place within a backdrop, or an umbrella that accommodates a desire for a timely solution, one that has ongoing flexibility, because, as was alluded to earlier, there are very clever people out there, and we have to have a mechanism to be as clever as they are, and finally, First Amendment concerns, because the Supreme Court, we know, is now considering what are the boundaries of commercial speech. Now, I would like to conclude by saying that, to recognize the importance of what this Committee does and how we respond to spam, that as you all are aware, I spend also a lot of time internationally as Chair of the OECD Consumer Policy Committee, where we are talking about this issue and how to address it internationally. We are also talking about how to address this bilaterally. I can tell you that, although other countries have looked at legislation, some have passed it, they have tried various enforcement tools, around the world people are looking to the United States for leadership on how we address this problem, how we can provide consumers with a good experience, how we can make this tool useful to businesses and consumers alike and still provide a free flow of information. It is an interesting challenge for us, but I am sure it is one the Committee is well-equipped to meet. Thank you. [The prepared statement of Mr. Thompson follows:] Prepared Statement of the Federal Trade Commission Mr. Chairman, the Federal Trade Commission appreciates this opportunity to provide information to the Committee on the FTC's efforts to address the problems that result from bulk unsolicited commercial e-mail. This statement discusses the Commission's law enforcement efforts against spam, describes our efforts to educate consumers and businesses about the problem of spam, and focuses particularly on the Commission's recent Spam Forum and several studies on the subject that the Commission's staff has undertaken in recent months.\1\ --------------------------------------------------------------------------- \1\ The views expressed in this statement represent the views of the Commission. Commissioners' oral statements and responses to any questions you may have represent their own views, and not necessarily the views of the Commission or any other Commissioner. --------------------------------------------------------------------------- As the Federal Government's principal consumer protection agency, the FTC's mission is to promote the efficient functioning of the marketplace by acting against unfair or deceptive acts or practices and increasing consumer choice by promoting vigorous competition. To fulfill this mission, the Commission enforces the Federal Trade Commission Act, which prohibits unfair methods of competition and unfair or deceptive acts or practices in or affecting commerce.\2\ Commerce on the Internet, including unsolicited commercial e-mail, falls within the scope of this statutory mandate. --------------------------------------------------------------------------- \2\ The FTC has limited or no jurisdiction over specified types of entities and activities. These include banks, savings associations, and Federal credit unions; regulated common carriers; air carriers; non- retail sales of livestock and meat products under the Packers and Stockyards Act; certain activities of nonprofit corporations; and the business of insurance. See, e.g., 15 U.S.C. Sec. Sec. 44, 45, 46 (FTC Act); 15 U.S.C. Sec. 21 (Clayton Act); 7 U.S.C. Sec. 227 (Packers and Stockyards Act); 15 U.S.C. Sec. Sec. 1011 et seq. (McCarran-Ferguson Act). --------------------------------------------------------------------------- Unsolicited commercial e-mail (``UCE'' or ``spam'') is any commercial electronic mail message that is sent--typically in bulk--to consumers without the consumers' prior request or consent. The extreme speed, anonymity and negligible cost of sending spam differentiate it from other forms of unsolicited marketing, such as direct mail or telemarketing. Those marketing techniques, unlike spam, impose costs on marketers that limit their use. There are two basic problems with spam. First, deception and fraud appear to characterize the vast majority of spam. Indeed, spam appears to be the vehicle of choice for many fraudulent and deceptive marketers. Second, a serious Internet infrastructure problem flows from the sheer volume of spam that is now being sent. Spam, even if not deceptive, may lead to significant disruptions and inefficiencies in Internet services, and may constitute a significant problem for consumers and businesses using the Internet. In addition, spam can spread viruses that wreck havoc for computer users. These problems together pose a threat to consumers' confidence in the Internet as a medium for electronic commerce. Virtually all of the panelists at the Commission's recent Spam Forum, described in more detail below, opined that the volume of unsolicited e-mail is increasing exponentially and that we are at a ``tipping point,'' requiring some action to avert deep erosion of public confidence in e-mail that could hinder, or even destroy, it as a tool for communication and online commerce. In other words, as some have expressed it, spam is ``killing the killer ap.'' The consensus of all participants in the workshop was that a solution to the spam problem is critically important, but cannot be found overnight. There is no quick or simple ``silver bullet.'' Rather, solutions must be pursued from many directions--technological, legal, and consumer action. The Forum helped to suggest paths to follow toward solutions to the spam problems. These solutions will depend on cooperative efforts between government and the private sector. In fact, the Forum is only the most recent example of the FTC's role as convener, facilitator, and catalyst to encourage that activity. But the Commission also plays another important role--that of law enforcer. The Commission has pursued a vigorous law enforcement program against deceptive spam, and to date has brought 53 cases in which spam was an integral element of the alleged overall deceptive or unfair practice.\3\ Most of those cases focused on the deceptive content of the spam message, alleging that the various defendants violated Section 5 of the FTC Act through misrepresentations in the body of the message.\4\ More recently, the Commission has expanded the scope of its allegations to encompass not just the content of the spam but also the manner in which the spam is sent. Thus, FTC v. G. M. Funding,\5\ and F.T.C. v. Brain Westby \6\ allege (1) that e-mail ``spoofing'' is an unfair practice,\7\ and (2) that failure to honor a ``remove me'' representation is a deceptive practice. In these cases, the defendants' e-mail removal mechanisms did not work and consumers' e-mailed attempts to remove themselves from defendants' distribution lists were returned as undeliverable. --------------------------------------------------------------------------- \3\ A summary listing of these cases is attached as Appendix A. \4\ E.g., FTC v. 30 Minute Mortgage, Inc., No. 03-60021 (S.D. Fla. filed Jan. 9, 2003). \5\ No. SACV 02-1026 DOC (C.D. Cal. filed Nov. 2002). \6\ No. 032-3030 (N.D. Ill. filed Apr. 15, 2003). \7\ ``Spoofing'' involves forging the ``from'' or ``reply to'' lines in an e-mail to make it appear that the e-mail was sent from an innocent third-party. The third party then receives bounced-back undeliverable messages and angry ``do not spam me'' complaints. --------------------------------------------------------------------------- Westby is also the first FTC case to allege that a misleading subject line is deceptive because it tricks consumers into opening messages they otherwise would not open. In other cases, the Commission has alleged that the defendants falsely represented that subscribing to defendants' service could stop spam from other sources \8\ or that purchasers of a spamming business opportunity could make substantial profits.\9\ Thus, through our law enforcement actions the Commission has attacked and will continue to attack deception and unfairness in every aspect of spam. --------------------------------------------------------------------------- \8\ FTC v. NetSource One, No. 022-3077 (W.D. Ky. filed Nov. 2, 2002). \9\ FTC v. Cyber Data, No. CV 02-2120 LKK (E.D. Cal. filed Oct. 2002); FTC v. Internet Specialists, No. 302 CV 01722 RNC (D.Conn. filed Oct. 2002). --------------------------------------------------------------------------- Experience in these cases shows that the primary law enforcement challenges are to identify and locate the targeted spammer. Of course, finding the wrongdoers is an important aspect of all law enforcement actions, but in spam cases it is a particularly daunting task. Spammers can easily hide their identity, forge the electronic path of their e- mail messages, or send their messages from anywhere in the world to anyone in the world. Tracking down a targeted spammer typically requires an unusually large commitment of staff time and resources, and rarely can it be known in advance whether the target's operation is large enough or injurious enough to consumers to justify the resource commitment. To complement its law enforcement efforts, the Commission endeavors to educate consumers and businesses on ways they can reduce the amount of unwanted spam they receive, and about particular types of scams commonly disseminated through spam, such as illegal chain letters and ``Nigerian'' scams.\10\ These materials are available on the FTC's spam website, www.ftc.gov/spam. --------------------------------------------------------------------------- \10\ Claiming to be well-placed Nigerians, con artists offer to transfer millions of dollars into the prospective victim's bank account in exchange for a small fee. Those who respond to the initial offer may receive official-looking documents. Typically, the victim is then asked to provide blank letterhead and his or her bank account numbers, as well as some money to cover transaction and transfer costs and attorney's fees. --------------------------------------------------------------------------- Another aspect of the Commission's approach to spam is to investigate and research the problems it poses to understand them better. Through this research, the Commission can refine and better focus its law enforcement and consumer and business education efforts. Studying the Spam Problem The Commission has engaged in several research projects to explore how spam affects consumers and online commerce. These projects include a ``Remove Me'' surf, a ``spam Harvest,'' and a study of False Claims in Spam. The ``Remove Me'' Surf Last year the Commission announced the results of the ``Remove Me'' surf, in which the FTC and law enforcement partners tested whether spammers where honoring the ``remove me'' or ``unsubscribe'' options in spam.\11\ From e-mail that participating agencies had forwarded to the FTC's spam database, the Commission's staff selected more than 200 messages that purported to allow recipients to remove their names from a spam list. The agencies set up dummy e-mail accounts to test the pledges. We found that 63 percent of the removal links and addresses in our sample did not function. If a return address does not work to receive return messages, it is unlikely that it could be used to collect valid e-mail addresses for use in future spamming. This finding tends to disprove the common belief that responding to spam guarantees that you will receive more of it. --------------------------------------------------------------------------- \11\ The ``Remove-Me'' surf was conducted as part of International Netforce, an enforcement sweep in which the FTC was joined by the Alaska Attorney General, the Alaska State Troopers, Government Services of the Province of Alberta, the British Columbia Securities Commission, the British Columbia Solicitor General, the Canadian Competition Bureau, the Idaho Attorney General, the Montana Department of Administration, the Oregon Department of Justice, the Washington Attorney General, the Washington State Department of Financial Institutions, and the Wyoming Attorney General. --------------------------------------------------------------------------- The ``Spam Harvest'' In its ``Spam Harvest,'' the Commission's staff conducted an examination of what online activities place consumers at risk for receiving spam. The examination discovered that one hundred percent of the e-mail addresses posted in chat rooms received spam; one received spam only eight minutes after the address was posted. Eighty-six percent of the e-mail addresses posted at newsgroups and Web pages received spam, as did 50 percent of addresses at free personal Web page services, 27 percent from message board postings, and 9 percent of e- mail service directories. The ``Spam Harvest'' also found that the type of spam received was not related to the sites where the e-mail addresses were posted. For example, e-mail addresses posted to children's newsgroups received a large amount of adult-content and work-at-home spam. As part of this project, the staff developed consumer education material, including a publication, ``E-mail Address Harvesting: How Spammers Reap What You Sow,'' that provides tips, based on the lessons learned from the Spam Harvest, to consumers who want to minimize their risk of receiving spam. The tips advise, among other things, that consumers can minimize the chances of their addresses being harvested by using at least two e-mail addresses--one for use on websites, newsgroups and other public venues on the web, and another e-mail address solely for personal communication. Another suggested strategy to reduce spam is ``masking'' (disguising) e-mail addresses posted in public.\12\ --------------------------------------------------------------------------- \12\ Masking involves putting a word or phrase in one's e-mail address so that it will trick a harvesting computer program, but not a person. For example, if one's e-mail address is ``[email protected],'' one could mask it as ``[email protected]'' Some newsgroup services or message boards won't allow masking of e-mail addresses and some harvesting programs may be able to pick out common masks. --------------------------------------------------------------------------- The ``False Claims in Spam'' Study An additional FTC staff study examined false claims in spam. The staff examined 1,000 spam messages selected randomly from three sources: our spam database of consumer-forwarded messages, the spam received at the addresses used in the Spam Harvest, and spam that reached FTC employee computers. The staff analyzed the messages based upon the types of products or services offered, the indicia of deception in the content of the messages, and the indicia of deception in the ``from'' and ``subject'' lines of the messages. The Types of Products or Services Offered--The staff found that 20 percent of the spam contained offers for investment or business opportunities, which include such things as work-at-home offers, franchise opportunities, or offers for securities. Another 18 percent of the spam offered adult-oriented products or services. Of those adult messages, about one-fifth included images of nudity that appeared automatically in the body of the message. Further, 17 percent of the spam messages involved finance, including credit cards, mortgages, refinancing, and insurance. All together, the investment/business opportunity, adult, and finance offers comprised 55 percent of our sample. Indicia of Falsity in the Content of Spam Messages--The staff also determined how many spam messages appeared misleading. Using expertise gleaned from past law enforcement actions and recent research efforts, the staff identified specific representations likely to be false. The staff found that 40 percent of all the combined categories of spam messages contained indicia of falsity in the body of the message. An astonishing 90 percent of the investment/business opportunity category of spam contained indicia of false claims. Evidence of Falsity in the ``From'' and ``Subject'' Lines--The staff also looked at evidence of deception in the ``from'' and ``subject'' lines of the spam. One third of the messages contained indicia of falsity in the ``from'' line. Messages falling into this category included ``from'' lines connoting a business or personal relationship, such as using a first name only, or stating ``Your [email protected]'' Another common instance of misleading ``from'' lines occurs when spammers make the sender's name the same as the recipient's address, so it appears that one has sent the message to oneself. In addition, the staff found that 22 percent of the spam messages contained indicia of falsity in the subject line, such as using ``Re:'' to indicate familiarity or a subject line that was unrelated to the content of the message, such as ``Hi'' or ``Order Confirmation.'' Over one third of adult-content spam contained false information in the subject line. Further, only two percent of the analyzed spam contained the label ``ADV:'' in the ``subject'' line, even though such a label is required by the laws of several states. Conclusions of the False Claims in Spam Study--Adding up the various forms of deception, the staff found that 66 percent of the spam appeared to contain at least one form of deception.\13\ This Spam Study confirms the Commission's earlier belief that fraud operators, who are often among the first to exploit any technological innovation, have seized on the Internet's capacity to reach millions of consumers quickly and at a low cost through spam. Not only are fraud operators able to reach millions of individuals with one message, but they also can misuse technology to conceal their identity. The Commission believes the proliferation of fraudulent or deceptive spam on the Internet poses a threat to consumer confidence in online commerce and, therefore, views the problem of deception as a significant issue in the debate over spam. --------------------------------------------------------------------------- \13\ The remaining spam messages were not necessarily truthful, but they did not contain any obvious indicia of falsity. --------------------------------------------------------------------------- The FTC Spam Forum Building upon our research, education, and law enforcement efforts, the FTC held a three-day public forum from April 30 to May 2, 2003 on spam e-mail. This was a wide-ranging public examination of spam from all viewpoints. The Commission convened this event for two principal reasons. First, spam is frequently discussed, but facts about how it works, its origins, what incentives drive it, and so on, are not widely known. The Commission anticipated that the Forum would generate an exchange of useful information about spam to help inform the public policy debate. This could help the Commission determine what more it might do to more effectively fulfill our consumer protection mission in this area. Second, the Commission sought to act as a potential catalyst for solutions to the spam problem. Through the Forum, the Commission brought to the table representatives from as many sides of the issue as possible to explore and encourage progress toward possible solutions to the detrimental effects of spam. The Commission believes that the Forum advanced both goals. As described below, the panelists contributed valuable information from a variety of differing viewpoints to the public record. In addition, the Forum spurred a number of participants into cooperation and action. Most notably, on the eve of the Forum, industry leaders Microsoft, America Online, and Yahoo! announced a collaborative effort to stop spam. Moreover, several potential technological solutions to spam were announced either at or in anticipation of the Forum. The Commission intends to foster this dialogue, and, when possible, to encourage other similar positive steps on the part of industry. The strong interest in addressing spam is shared by: consumers, Internet Service Providers (``ISPs''), law enforcement authorities, marketing services, bulk e-mail marketers, anti-spammers, and retailers and manufacturers. These interest groups were represented at the Forum by 87 different panelists collectively possessing a tremendous range of expertise, and coming from all over the globe to participate in this discussion. Distinguished representatives from the European Commission, Canada, Australia, Korea, and Japan offered their views on how spam affects their countries and how they are trying to tackle the problem. On the domestic front, panelists included prominent representatives from all sectors affected by spam, such as the president of the consumer group, the SpamCon Foundation, the president of the Direct Marketing Association, vice presidents of America Online and Microsoft, and the Washington State Attorney General. Distinguished members of Congress--Senators Burns, Wyden, and Schumer, and Representative Lofgren--also addressed Forum attendees. The Spam Forum was organized into twelve panel discussions that were conducted over the course of three days. In addition to the 87 panelists, approximately 400 people were present each day in the audience at the FTC Conference Center, with many more individuals participating via a video link or by teleconference. Questions for the panelists were accepted from the audience and via a special e-mail address from those attending through video link or teleconferencing. Day One of the Forum focused on the mechanics of spam. Panelists discussed in detail how spammers find e-mail addresses and how deception in the sending of spam affects consumers and online commerce. Discussions then focused upon security weaknesses that enable or facilitate spam, such as open relays \14\ and open proxies.\15\ Day Two explored the economic costs of spam. Panelists participated in an in- depth discussion of economic incentives inherent in spam and the costs of spam to marketers, ISPs, and consumers, and its effects on emerging technologies. Specifically, panelists discussed spam blacklists, e-mail marketers, and wireless spam (unsolicited text messages received via cell phone). Day Three focused on potential solutions to spam. Panelists discussed three potential avenues to a solution: legislation, litigation, and technology. Specific topics covered included: state, federal, and international legislation; civil and criminal law enforcement and private litigation against spammers; and various technological approaches. --------------------------------------------------------------------------- \14\ Open relays allow spammers to route their e-mail through servers of other organizations, thereby disguising the origin of the e- mail. Spammers identify and use other organizations' open relays to avoid detection by the filter systems that ISPs use to protect their customers from unwanted spam. Routing spam through open relays also makes it difficult for law enforcement agencies to track down senders of fraudulent or deceptive spam. \15\ A proxy server runs software that allows it to be the one machine in a network that directly interacts with the Internet. This provides the network with greater security. But if a proxy is not configured properly (i.e., if it is an ``open proxy''), it also may allow unauthorized users to pass through the site and connect to other hosts on the Internet. For example, a spammer can use an open proxy to connect to a mail server. If the server has an open mail relay, the spammer can send a large amount of spam and then disconnect--all anonymously. --------------------------------------------------------------------------- Panelists at the Forum bought forward an enormous amount of information about spam and how it affects consumers and businesses. Several primary themes emerged from the various discussions. First, the volume of spam is increasing sharply. Many panelists reported that the rate of increase is accelerating. For example, one ISP reported that in 2002 alone it experienced a 150 percent increase in spam traffic. Second, spam imposes real costs. The panelists offered concrete information about the costs of spam to businesses and to ISPs. Specifically, ISPs reported that costs to address spam have increased dramatically over the past two years. ISPs bear the cost of servers and bandwidth necessary to channel the flood of spam, even that part of the flood that is being filtered out before reaching recipients' mail boxes. America Online reported that it recently blocked an astonishing 2.37 billion pieces of spam in a single day. Third, spam is an international problem. According to our international panelists, most of the spam received in their countries is in English and advertises American products or companies. Most panelists agreed that any solution to stopping spam will have to involve an international effort. Our law enforcement experience has taught that the path from a fraudulent spammer to a consumer's in-box typically crosses at least one international border and frequently several. Thus, fraudulent spam exemplifies the growing problem of cross-border fraud. To enhance our effectiveness in the fight against fraudulent spam and other kinds of fraudulent schemes that cross international borders, the Commission will be asking this Committee, as part of our forthcoming reauthorization testimony, for additional legislative authority in a number of areas, including measures that would: allow the agency to share such information on targeted schemes with our overseas counterparts; provide investigative assistance to them in appropriate cases; improve our ability to obtain information from U.S. criminal agencies and Federal financial regulators, who are often investigating the same types of fraudulent conduct that we are; and improve the agency's ability to obtain consumer redress in cross-border cases by clarifying the Commission's authority to take action in such cases, and by expanding the agency's ability to use foreign counsel to pursue assets offshore. Legislation expanding the Commission's authority in these ways is essential to improve the agency's ability to fight fraudulent spam in particular, as well as other manifestations of the more general problem of cross-border fraud. Approaches to Solving the Spam Problem The broad themes that emerged from the Forum panel discussions depict the spam problem as increasing volume, increasing costs, and increasing international effects. This confirms that finding solutions to the problems posed by spam will not be quick or easy; moreover, the consensus of panelists was that no single approach will likely cure the problem. Some panelists at the Forum stated that a large scale technological change in the e-mail protocol system is not likely to occur. Nevertheless, others indicated that there are incremental technical changes that can be grafted onto the existing e-mail protocol to ease the burden of unwanted e-mail on ISPs and consumers. In addition, consumer representatives stressed that any solution should include consumer empowerment--to allow e-mail recipients to decide what messages they want to receive in their inbox, and to give recipients the technical tools to effectuate those decisions. Some panelists, but by no means all, advocated additional Federal legislation and law enforcement efforts as a means to provide needed accountability and deterrence. All Spam Forum participants agreed that solving the problem of bulk unsolicited commercial e-mail will likely necessitate an integrated effort involving a variety of technological, legal, and consumer action, rather than one single solution. Through the Forum and the follow-up efforts it suggested, the Commission hopes to act as a catalyst for technologists, industry, law enforcement, and policy officials to work together to find a solution. Conclusion E-mail provides enormous benefits to consumers and businesses as a communication tool. The increasing volume of spam to ISPs, to businesses, and to consumers, coupled with the use of spam as a means to perpetrate fraud and deception put these benefits at serious risk. The Commission looks forward to continuing its research, education, and law enforcement efforts to protect consumers and businesses from the current onslaught of unwanted messages. The Commission appreciates this opportunity to describe its efforts to address the problem of spam, and the outcome of its recent Spam Forum. The Chairman. I thank you both. I have gotten letters, as I mentioned, I would include for the record from the Center for Democracy and Technology, Mr. Jerry Berman. He says, based on our research and further discussion, CDT believes that the spam problem merits targeted Federal legislation to help alleviate the burden spam causes to consumers, businesses, and ISPs, and I also had a letter from Mr. Gates which I think Mr. Leonsis is going to talk about more, where he makes several recommendations. I would like for both of you, if you would, to comment on these recommendations, perhaps in writing to us, because there is a series of them, as to your views as to whether they should be included in the legislation or not. I would hope, and I know that Senator Burns and Senator Wyden would hope that we could get this issue to the floor sometime before the summer recess, because it is clearly an issue that needs to be addressed one way or the other, so I would hope that you would get us that. I guess my first question is, suppose that we enacted the best law that took care of every problem, every loophole---- We have 5 minutes left on the vote, Conrad. Do you want to go and vote and then come back? Senator Burns. We are voting again? [Laughter.] The Chairman. I think so. Maybe you want to go and then come back so we can keep the hearing going. And what do you do about somebody located, and you have an international agreement with the major countries in the world, somebody located in the Grand Caymans, as is the case with Internet gambling sites today. What is the answer? Mr. Swindle. Senator, I will start off. Obviously, and it has been said by, I think, everyone who has testified to this point, that no single solution, no single thing is going to be the solution. Passing legislation is not going to solve this problem. Someone said earlier that having legislation penalties would help us hunt down the perpetrators, and that got right to the point here. The penalties are not going to help us hunt down the perpetrators. In fact, the biggest problem we have is finding those who are sending the spam out. It is a technical problem that from my observation, listening to the forum we had last week, most of the people in technology were saying we do not yet know how to do this. We have got a lot of work to do. Laws can certainly classify a certain group of people who do certain things as criminals if we want to go that far and say that if we catch them, we penalize them heavily, and that might be a good idea as Senator Nelson was proposing, but the problem still remains finding them, and until we solve that problem, we have got to seek other alternatives. I speak of the emotion of the broad base of users, hundreds of millions, certainly in this country, and I have been told the numbers may reach 600 million by the end of this year worldwide. It seems to me that it would be practical, and I am not much on technology, but if you would give me the ability to put a screen in front of my computer so that nothing comes in there except what is on that screen--in other words, my address book--you would go a long way to solving my emotional problem with spam, my frustration with it, my wanting to just turn this thing off and walk away from it. That will be the biggest disaster we can imagine right now. Some of this technical stuff is going to take years to evolve, the same way with the legislation, but give the consumer the power, empower the consumer to say no to what is coming into his mailbox, and as I mentioned in my comments, I am not sure that industry is prepared, and not because they cannot do it, but I am not sure they are prepared to do it because they do not want to do it, because it cuts them off from a potential customer. Well, I think that is dead wrong. We have an issue before us that can do grave damage to this incredible tool that we have. I think we all need to quit speaking and lobbying in terms of special interest, our own interest, and think about a cause greater than ourselves. We have a bigger issue here. The Chairman. Commissioner Thompson. Mr. Thompson. I think you highlight a very important point that we have to do what we can to eliminate jurisdictions of convenience, in other words, places that might serve as safe harbors for those who would engage in spamming. It is something we have discussed internationally. Countries have different ways of approaching that, and we are trying to talk to them about what has been effective, what has not been effective, what are ways that we can look at in the future. I believe that some legislative vehicle is helpful, but it is not the only solution, but it also means a cooperative effort, and not just waiting for an international treaty, although that can be a long-term goal. There is a short-term goal of having ongoing discussions, including bilateral agreements and understandings about how you actually prosecute cases that have fraud and deception at their core, and that includes what legislation we need to streamline the process so that we can share information with entities that have the same goals as we do. I think what is important is for us at the very least to come an understanding with countries about why this issue is a problem and is a threat to the Internet, and a threat to consumer confidence. I think we are reaching those goals, and to talk about what are the potential avenues for solution. I think we are at that point, and it is a very important point. The Chairman. Commissioner Swindle, would a do-not-spam list be an effective way of cutting down on some of this problem? Mr. Swindle. In a word, I do not believe so. We are just now coming to grips with how we are going to implement a do- not-call list. In the business of telemarketing, there is a relatively finite or small number of telemarketers. There are 5,000 or 10,000. I am not sure how many there are, but when you talk about the Internet, we are talking millions. We are talking in telemarketing a very regulated industry that literally does have borders, state control of telecommunications and so forth. In the Internet, it is totally borderless. I tried to imagine what the database for a telemarketing sales rule or do-not-call rule will be, and it will be large, because it is probably one of the more popular things that have come down the pike since I have been there. How we manage that, how we make it reactive, that it does what it is supposed to do, is a very complex problem, and we are going to get there, but we are not there yet. We have no experience, not ruling it out. The Chairman. Do you agree? Mr. Thompson. I agree. I also think there are challenges in terms of resources, because the scale and the size of what is going to be contained in any database and the security that is going to be necessary will be very resource-intensive. I think it can be part of a solution, but in and of itself it may not be a solution. The Chairman. Senator Nelson, I have got to go vote. Senator Nelson. Mr. Chairman, do you want me to keep the testimony going or wait until you return? The Chairman. Knowing you, I am sure that is not a problem. [Laughter.] Senator Nelson. That is an appropriate reconfirmation of the relationship that I have with the Chairman. He knows I am not going to do anything crazy. [Laughter.] Mr. Thompson. Once again, you are in charge. Mr. Swindle. If I might finish the point, and Senator--or Commissioner Thompson--congratulations. [Laughter.] Mr. Swindle. I gave you a promotion there. We are really going to take control here. I was speaking of the database for telemarketing for the do-not-call list on the telephone. That is going to be an enormously big, complex thing, but we can get a grip on it. we have been doing this a long time. The Internet is something else. First off, you know the debate we get in on telephones of portability of numbers. We cannot figure out exactly how to do that. How many times do people change their telephone numbers? Not very often. How many times do they change their e-mail addresses? It goes on. How many people are there out there with e-mail addresses, and they have multiple e-mail addresses. You are talking about an incredibly large database that will be difficult to secure, and if I am a spammer, I just look at that as a target-rich environment. I do not think it is a solution. Mr. Thompson. One of the challenges we have is trying to cater static responses to moving targets, and in this area the target is moving very quickly. As we heard earlier, people who are engaged in spamming have every economic incentive to be clever and invest their time and money in morphing themselves into different entities, cloaking themselves, using the technology in order to send out their spam because it is so cheap for them to do so. For just a minimal positive response, your return on investment is quick and rapid. It is hard for us in an open network to change that, but I think we are talking about what other things that we can do to get at the bad actors, and one challenge that we still have to face is what do we do about volume, because even if we get after the bad actors, you still have this chart with rapid increase. The slope may come down a little, but because of the economics, you are still going to have many people trying to use this in marketing, and it could have some disruptions in service and other things that make the consumer experience not very good. I do not know what the right answer is, but it is a challenge that we have to consider. Senator Nelson. You all have mentioned that the FTC is seeking the additional legislative authority to improve the agency's ability to obtain information from U.S. law enforcement agencies. Now, can you discuss for the Committee how the FTC coordinates investigations with other agencies, criminal agencies, and can you expand on your request for the additional legislative authority in this area? Mr. Thompson. I can talk briefly about it, that I think we have a good relationship with agencies within the United States, and I want to clarify the question a little. I think what we are asking for are ways to make it easier for us to share information with sister agencies that may lie outside of the United States. One of the trends that we are seeing, especially in the E- commerce areas, is that we represent the richest and most robust marketplace in the E-commerce base in the world. That means others who would seek to defraud people want to come here and victimize our citizens. Right now, the way our legislation works, there are very complex rules dealing with confidentiality of investigations and the information we gather as part of a prosecution that makes it harder for us to share information with, for example, a law enforcer in France, or a law enforcer in Canada who may be interested in prosecuting those who are living there that victimize our citizens, so in some ways, what we would like to see is some legislative streamlining that would make it easier for us to prosecute in a way that recognizes the global nature of the problem. Senator Nelson. Would you perhaps--while I was voting, both of you had already commented on the legislative approach to this problem in trying to put a criminal penalty as a means of stopping it, recognizing that we have got to work with the international arena as well. Would you further comment how, what you would like to see in law that would give you the tools as the regulator to attack this problem? Mr. Swindle. Senator, I mentioned, made reference to your comments about rather punitive measures we could take against those who do cause damage, and I am moving more and more toward the belief that we are getting into criminal acts. When you consider how we are so totally integrated now with information systems and networks, how we are so dependent upon them, I mean, you know, today you can be at your home with a very inexpensive computer that is more powerful than the computers you had in the space shuttle you went up in. That computer can be captured if it is not adequately protected and then it can be used as a weapon to go out and do damage to financial systems, to air control systems, to the Defense Department, it is unlimited, because you are in these networks. Those who would do this intentionally to disrupt information systems, to disrupt power grids, to disrupt air control, to shut down through the devices and code that goes out, and they overwhelm ISPs, overwhelm financial networks, this is grave, grave damage. This is far beyond going out and stealing 150 bucks from a grocery store, which is a crime. I think we are approaching the point where we do need to establish these people who do this as criminals, but we get back to the same problem, how do we find them, and that is a technology problem that we have not yet solved as far as I am familiar with. But I do think, again to repeat the point that I think I made while you were out, as I said in my comment, we have got two problems here. One is this very complex technical, legal, public policy legislative arena, the other is this emotion, of all the wonderful people in this country and around the world who want to use this. They are excited about it. I love to shop on Amazon and eBay and things of this nature, but the more we are harmed by spam, and spam is one of the biggest carries of viruses that damage our computers, we lose confidence in it and we are going to back away from that. That is going to be a severe hit for the economic potential and entertainment potential and fun potential of information technology. I contend that industry had better focus on that right now and get something done. They need to give consumers and users and students and home users and small businesses the capacity to put a wall in front of their computer and say, I do not want it in here if it is not on my wall, in other words, your address book, and you know, the argument is, well, you are going to miss a message from an old friend. My problem. I can deal with that much better than having this open relay. So, I think criminal designation is probably going to be necessary, and I do think we need--to sort of paraphrase what you said, I think we need a couple of good hangings here. Mr. Thompson. I think a challenge, though, I think it is important perhaps to have some criminal penalties for the most egregious behavior, but let us talk a little about the fact that that may only represent the one tale of the people who are involved in spam, because one of the challenges you have when you introduce the element of criminalization, the standard of proof may be different. The idea of intent is different. Right now, for example, based on the FTC act for fraud and deception, we do not have to prove intent. Once you introduce that element, that makes it harder to go after what may be the bulk, which you may be able to get to based on civil prosecution and penalties. Also, one other factor that I think is important to consider is that, how do you wind up prioritizing within the criminal enforcement community this kind of behavior, because it is not only just providing some sort of criminal remedy, but it is also talking to criminal prosecutors and making sure that they understand how important this is compared to any number of different criminal statutes they have to enforce, so I think the challenge is to view criminal penalties, maybe one aspect of a solution, but there have to be many more tools in addition to that. Senator Nelson. Thank you for your statements. After the April 30 spam workshop, the Commission has received a tremendous amount of testimony from consumers marketers, ISPs, filtering technology firms and many others. The work that the Commission has already done in combination with the workshop materials would aid this Committee in its work on crafting spam legislation that works. Can you report to this Committee in 45 days an outline of a legislative approach that deals with the issues raised during the workshop, a consumer education plan, any jurisdictional needs that should be addressed in reauthorization, and the cost to implement such recommendations? Mr. Swindle. Senator, we would never refuse your request. We will make every effort. That is one of the reasons we held the workshop, because we believe that we needed to get everybody who is involved in this in the same room at the same time and have it out, and actually a couple of them did try to have it out, but I think the whole purpose of that is to try to better inform all of us, the regulators, and the legislators as to what we can do with this, and in the process co-opt the industry in all of its respects, and even some of the people who like to engage in this stuff in here and talk about the harm that is being done. That is our goal, to try to prepare a well-informed body of knowledge, and I will certainly take back your request, and we will get to work on this and give you a response to that question. I would be a little remiss if I answered it before I found out what we have got. Senator Nelson. Thank you very much. Thanks to both of you. Senator Wyden. Senator Burns. Senator Burns. Thanks for coming down today, and thanks for the invite you offered us during your three day workshop down there, and I am sorry I did not get to stay for it, and I have already got it written down here that maybe the video that--I think you videoed every session. I will tell you what, I would not mind having a set of those videos, and I know you have got hours and hours of them, but, you know, we could thumb through those things, and that would probably be a good way to do it, is just to get the videos of those sessions, those testimonies and those discussions. I think that was a very good workshop, and I thank you for allowing us to come down and participate in that. And Commissioner Swindle, you are exactly right, the best solution to this whole thing is people who participate and use best business ethics, and we know those are the answers, but we also know that the industry is going to have to step forward. It is my belief that they will not until there is a national legislation that forces them to at least consider some things that can be flexible and be very light on their feet to deal with this thing as far as the legitimate marketers, because I am a market-oriented guy. I think this thing, you know, when you walk from here to downtown, you walk by a lot of businesses and you see a lot of advertising, and you see a lot of things that are wanting to do business with you, and this industry should not be any different. However, I think the industry is going to have to step forward and set up a standard of best practices, and have those legitimate marketers--we welcome them--who want to do business in this realm of doing that. Now, you have already responded to the no-spam list. We would be remiss if we did not consider that, but I am not real sure that that is not a detail maybe that the FTC could--on their own, because you have done a wonderful job down there. You have taken this issue and you have elevated it to a position of national awareness. You have done a terrific job down there, and we do not want to do anything through legislation that would curtail that particular activity with the FTC, but I just want--you mentioned, Mr. Swindle, in your testimony, the Commission mentioned the testimony that a solution to spam must include consumer empowerment, and of course, we use that term a lot. Do you think opting out constitutes consumer empowerment? Mr. Swindle. That is certainly a form of it, Senator. Unfortunately, a lot of the spam does not honor the opt-out selection, so you have still got the spam coming in, and the point I made is, I was reading the article this morning about Microsoft's initiative that was in the Post this morning, and my friend and sometimes adversary Marc Rotenberg, who I believe is going to be testifying on a later panel, made the statement, or is reported to have made the statement that Microsoft's proposal does not address the core need of consumers, which is to be free of commercial e-mail unless they specifically request it. That is different from opt out. I have suggested that, to accommodate or try to resolve this emotional turning away from electronic commerce and e-mail that we are experiencing because of spam, that the ISPs and software manufacturers and the hardware manufacturers, whoever does this stuff can provide to the consumer the capacity to easily, recognizably simply say--this is oversimplification, but I do not want to receive any e-mail from anybody other than the ones I send to and the ones that are in my address book. Think of all the e-mail that would not come in any more, just do not even have it come in, and that is what I mean about quick fixes for emotional problems, but I think there is a basic need. Opt out certainly recognizes this, but it is not honored. There is a basic need for consumers to be allowed, at their own choice, to be free of--Senator McCain used ``unwanted.'' That may be the best way to put it, unwanted e- mail, and if you put them in control of that, we will have a lot happier users out there and we will have less a problem on this emotional bent, and we can really get to work on this legislative and technology bent. Senator Burns. We could call them weeds. That is kind of an invasive and unwanted---- Mr. Swindle. Nutgrass down in South Georgia. Mr. Thompson. I think that is a nice way of characterizing it. Senator Burns. We have to eliminate the weeds, and if we can find a herbicide to spray them and it kills the weed and lets the grass grow, that is what we are looking for in this situation. Senator Nelson. Some of them are snakes. Mr. Swindle. I would like to use an illustration, Senator, if I may, and it will take just another minute. I just bought my wife a brand new, nice computer. It is a great computer, Dell, a great company, has got Microsoft XP on it, a fine piece of software. All of a sudden, I started getting pop-up spam messages that says, Messenger, centered, dead center, large, right in my screen, and I do not know how to copy it. There is a way to copy it, but I am not technically savvy enough to figure it out. I said, where is this stuff coming from? It comes from a built-in Microsoft messenger, Instant Messaging, I guess, sort of like AOL, a wonderful device, if you want it. The problem is, Microsoft put that in that computer, defaulted to the on position, did not tell me it was there, did not tell me how to easily get it off of there, and they use it, or somebody's using their system, maybe an affiliate, to send me spam that I do not want. The industry needs to solve this problem. They can solve it technically. They just need to want to solve it, and as to your initial proposal, maybe they need a fire lighted under them. I think they do. I think the FTC has done a grand job of elevating the subject of privacy to the public. Everybody is aware that they ought to be concerned about their privacy. We have achieved a very--I would never say excellent, because we are still working on it. It is a journey, not a destination, but we have more companies doing better things on privacy than ever before, and we have not passed a law to get there, but public pressure, if you inform the public, they then demand. Industry will respond because that is how they stay in business. Senator Burns. I believe that, and I thank you for your openness and your frankness about this, because I think we have been talking about this issue for 4 or 5 years. It is time to quit beating around the bushes and tell it like it is and then go ahead and respond to that, and I thank both Commissioners for coming this morning. Mr. Chairman, thank you. The Chairman. Senator Wyden. Senator Wyden. Thank you, Mr. Chairman. First, I always welcome the views of the Federal Trade Commission, but I will tell you, I am a little troubled about sitting around and waiting another 45 days, or whatever. It is time to get going, folks. It is time to protect consumers. This problem has grown so dramatically, just in the last few months, that I just fear if we embark on yet another prolonged kind of study session, we are not going to get after this, and it is time to start moving, and frankly, Senator Burns and I in the last 4 years have been looking at just about every idea under the sun. We are going to continue to look at others, but I want to get some things clear on the record. First, on the enforcement provisions, 2 years ago, Commissioner Swindle, Eileen Harrington came to the Committee and said that the enforcement mechanism in the Burns-Wyden bill would work. In fact, her comments are, the enforcement scheme laid out in the bill likely would work well. Now, it has got four tiers. The four tiers are the criminal penalties, the Federal Trade Commission civil penalties, the authority of the state Attorneys General, and the ability of an ISP, an Internet service provider to bring suit. I guess the first question I would like to know from both of you on the record, do you disagree this morning--so we can actually get a sense of what two Commissioners think this morning, do either of you disagree with what Eileen Harrington said when she said the enforcement mechanism in the Burns-Wyden bill would work well? Commissioner Swindle. Mr. Swindle. Senator, we essentially do that already. Under section 5 of the Federal Trade Commission Act we deal with deception and unfairness, a false header, that is an address, the from line of somebody that is not the real person, that is deception. Deception in the subject line is deception. Deception in the subject matter is deception. We have the ability, with the existing laws, to do those things. Certainly the criminal and civil aspects of it are positive things. We do that already. We work very well with the Department of Justice in trying to find solutions to these problems and certainly go after the bad guys. We certainly encourage the continued ability of states to enforce the Federal Trade Commission Act, and working with the AGs, and we do a marvelous job with that. Senator Wyden. But Commissioner, obviously, empowering the state Attorneys General is something the Congress has to do. The ISP provision is something the Congress has to do. I just want to know, so we do not go out and reinvent the wheel every 45 days or 60 days, whether you agree with what Eileen Harrington said, and I happen to think you have done useful work. It is not a referendum on whether you all have done useful work. Eileen Harrington said our enforcement mechanism would work. Do you agree with that? Mr. Swindle. I have not disagreed, but the point I want to make, Senator, is, we can have this structure, which you know is wonderful. The problem still remains finding those who are doing the evil. That is a technology challenge. It is a staffing challenge. We go after these cases, and one of the big dilemmas we have is trying to figure out how many resources can we devote to this when we very likely will not find who did it, and the effect of what was happening, does it warrant the spending of these resources. It is a very difficult thing. Enforcement is many things. It is having the structures you described, certainly, but also you have to have the capacity to go do something with those tools. You have to have the capacity to find the person who has done wrong and bring them in and stand them up in front of those four standards and get them. Senator Wyden. Commissioner Thompson, Eileen Harrington, do you think she was right when she said, what we are trying to do on enforcement would work well? Mr. Thompson. I think she was right, what she said when she said it. What I think is based upon what I have heard and the information that we have gotten that the problem may have morphed a little. Now, I do not want to make any mistake about it. You will hear from me today instances where I would like to come back and tell you whether certain parts of the various bills we see will address part of the problem, but I do not want to make any mistake about it. I think that we need legislation, and we need it this year. The issue is whether the form of legislative vehicles we have seen so far address parts of the problem and not other parts of the problem, and we would like to be a resource to you to give you the best information of whether some of those parts might be more effective or might be necessary elements in addressing the problem. Let me give you an example. I was actually moved by the information that was given to us by a small ISP provider, when I say small, less than 20,000 subscribers who said that last year, they spent $200,000 to deal with spam, and they were able to spread that cost passing it through to their subscribers, but they saw a real choke point coming up ahead, because they were so small, that they would not be able to pass that cost on, and that is because of volume. I am not sure we have a way to address that, but I would like to give you the best information that I have, and I am willing to come back to you in 45 days or sooner, if necessary, to give you what that best judgment is. Senator Wyden. Mr. Chairman, if I could just get one other question in very briefly, what we tried to do in the Federal Trade Commission portion of it is to give you all the flexibility to make distinctions between the big-time offenders and the small-time violators. Again, because we had gotten favorable testimony from the Federal Trade Commission, we felt we were headed in the right direction. Do you all still feel that that is a sensible distinction to be making, either of you? Mr. Swindle. Senator, I think we need to continue this dialogue. I have been using this expression for a long time. There are no simple answers to this. I have not seen one piece of legislation that I think will be adequate. I do not know that we need additional authority. As I said, we have the capacity to go after deception and fraud right now. We have got to realize that this is going to be an evolving process. It is going to take technology advances, it is going to take industry stepping up to the plate and doing what they ought to do because it is the right thing to do, and it is going to take us working and advising and consulting with you, Senator Burns, Senator McCain, and other Members of the Congress, trying to find the best possible solution. We want to find the best possible solution, I mentioned. We are not going to find the perfect solution. We can forget that. We just are not going to find it, but the best possible solution will be the one that is effective and the one that does not do more harm than good and start to make impediments, and again, industry could solve much of this problem if they would get it done so that you would not be having to try to get it done through legislation, which invariably, because of the speed of this industry, the legislation will always be behind. Senator Wyden. My time has expired. My only point is that when you have the real scofflaws, when you have the real bad actors, those are not people who are paying attention to what industry self-regulatory initiatives are all about, and that is why we have got to move, and we have got to move quickly, and I think we ought to have your input, but Mr. Chairman, I hope that this effort to have 45 more days and more discussion will not turn into something that is so prolonged that we cannot get action on it. We have had a lot of years of studying it, and I think we ought to get moving, and I thank you for the time. The Chairman. Senator Cantwell. STATEMENT OF HON. MARIA CANTWELL, U.S. SENATOR FROM WASHINGTON Senator Cantwell. Thank you, Mr. Chairman. I know this Committee and my colleagues here today have spent a great deal of time working on this issue, as the FTC has, on trying to enforce and crack down on the individuals, and I am anxious to hear from our second panel as well, because I think we are going to hear some interesting comments from them, because I think the industry is being very much impacted by this as well. There are people who very much count on having a relationship with online consumers, and that relationship is being damaged by the perpetrators of spam, so I think everybody is interested in moving forward. Why not focus more narrowly on one particular aspect of this issue, which is harvesting. I know my colleagues here have language in their legislation, but why not, as a first step, something that we can all have consensus on, and we know that there are perpetrators of spam, either autogenerated by computers, or people who are actually harvesting names that are available online from various websites. Why not crack down on that right away, and focus on the anti-harvesters as a key component? Mr. Swindle. Senator, I personally think the clandestine capturing of e-mail addresses and then turning around and using them is an abominable act. It is commonplace, we all know that, and perhaps we need to look at it in terms of saying you cannot do this, but again, we get back to how do we enforce it, how do we find those who do it, because from a technology standpoint, it is fairly well concealable, but again, it is just one small element of this whole problem that we need to keep working and need to be getting industry to step up and tell us, number 1, how to solve the problem with technology, and number 2, we are not going to do this any more. I have a good friendship with a member of industry that was telling me when he took over the company, and it is a fairly big company, he said that he found out that one of the practices of the company was, when they got e-mail addresses they sold them, and he asked, why are you doing that, did you ask for permission. They said, no. He said, we are stopping that right now. That is the kind of leadership we need. Senator Cantwell. We have had a lot of discussion, I am sure, in the last couple of years about what those relationships are and what businesses have the right, in various types of marketing, what relationships they can extend to some of their partners, but in this notion of anti- harvesting legislation, being specific, that you cannot autogenerate or cannot take names that you have gotten from other places online and e-mail them, and then going back to those, and I know it is not obvious who all of these entities are, but with a little investigation you can find them. If that organization cannot prove that they have a prior business relationship with that name, then they would be guilty of having harvested it. It is a more simple framework of saying that there are people--you know, we have had all this debate about opt in and opt out, and we can continue to have it, or what is the right framework, and how do you make the penalties, but I think 90 percent of the people would agree on the anti- harvesting aspect. Mr. Thompson. I think that would be helpful. Mr. Swindle. I think it is a legitimate approach. I would ask for consideration to how you define existing relationship, because some of the definitions of it I have seen, you could drive a Mack truck through them. You almost have an existing relationship just because you exist, and that needs to be carefully thought of, because, again, I made a statement in my opening remarks that the laws of legislation that will tend to favor larger firms over smaller firms is not a good idea in my mind, that I think some of the larger firms will have the capacity to drive trucks through large holes. Mr. Thompson. I think it would be helpful. I think it is an element, but I think it is only one element. I know that this Committee has been particularly concerned about how to deal with protecting what consumers' interests are. I think it is important, though, that we also manage their expectations. I think that this is one element, but I think there are other parts of the problem that need to be addressed, too, and I think that a well-crafted legislation should have various pieces, because there is not one single answer to this problem. Senator Cantwell. Well, I think that that is--I agree with that, but I think focusing on the most egregious issues is important for us to do, too. If we are not going to move forward on the whole framework, let us make progress on the most egregious side of the equation. And Mr. Swindle, I just wanted to clarify when you were talking about that example, you were talking about--with Microsoft, you were talking about seeing a pop-up message, right? You were not talking about somehow someone e-mailed you an additional message? Mr. Swindle. I am going to use the term that is alien to Microsoft, I guess, Instant Message, which I guess belongs to AOL, but right in the middle of the screen a message. Senator Cantwell. I know what you are referring to. So are you saying that you lump that in with--I am not saying it might not be a rude behavior, and one that the consumer---- Mr. Swindle. It is spam. Senator Cantwell. How are you defining it as spam? Mr. Swindle. It was a commercial notice placed on my screen without me being able to control it, not knowing it was there. I found out how to control it and cut it off, and I have not gotten any more, but it would have been nice if Microsoft told me, hey, Orson, thank you for buying the new computer and getting our software. By the way, our instant messenger service is on, and you are going to be receiving messages from us, and if you do not want it on, just do this and turn it off. They did not give me the courtesy of doing that. The message basically said, if you do not want to receive things like this, go to a website and you can get instant message blocker, or something like that. It was advertisement, pure, unadulterated advertising. Senator Cantwell. Well, and I certainly think that there are issues about what should be, once you have installed someone's software, what capabilities they should have in continuing to communicate to you, and that should be clear to consumers and you should give them options. Mr. Swindle. Give me the power to turn it off, to say no-- -- Senator Cantwell. Right. Exactly. Mr. Swindle.--that is all I ask, and they should have done that and they did not do it, and I find it interesting, they are now promoting how they are going to stop spam, and by their own practices, they are sending me spam. Senator Cantwell. Well, I do not know that Microsoft is, but---- Mr. Swindle. An associate. Senator Cantwell.--I think that it is a related issue, the software functionality, and giving consumers obviously the ability to turn off and turn on, and to be asked permission is a very key point, but I would try to keep that as a related, but separate issue to this notion of that then comes into your e-mail queue from a variety of people that are generating. Mr. Swindle. I was looking at my e-mail and blanking over my inbox---- Senator Cantwell. Your screen. Mr. Swindle.--was this spam message. It cannot be called anything other than that. The Chairman. Thank you, Senator. It is time---- Senator Cantwell. Thank you. Thank you, Mr. Chairman. The Chairman. The Senator from Washington's time has expired. Thank you. Thank you very much, Commissioners. I appreciate your time and your input, and I will look forward to your comments on the Microsoft recommendations. The sooner you can get those to us, the better. Thank you. Our next panel is Mr. Ted Leonsis, the Vice Chairman of America Online; Mr. Enrique Salem, President and CEO, Brightmail; Mr. J. Trevor Hughes, Executive Director, Network Advertising Initiative; Mr. Marc Rotenberg, Executive Director, Electronic Privacy Information Center; and Mr. Ronald Scelson, who is of Scelson Online Marketing. I welcome you. I appreciate your patience, and I apologize for the delay, which has been caused by votes on the floor. Mr. Leonsis, welcome. It is a pleasure. Please proceed. STATEMENT OF TED LEONSIS, VICE CHAIRMAN, AMERICA ONLINE, INC. AND PRESIDENT, AOL CORE SERVICE Mr. Leonsis. Thank you, Mr. Chairman. Chairman McCain, Members of the Committee. On behalf of America Online and our 35 million worldwide members, I would like to thank you for the opportunity to testify before the Committee on the issue of unsolicited commercial e-mail. My name is Ted Leonsis, and I am Vice Chairman of America Online and President of the AOL Core Service, and as one of the early pioneers in this industry, I am here today because I believe this issue is the most important matter that is facing us today, and that is not a personal opinion. That comes directly from the hearts and minds of our members. I would also like to thank the fellow panelists for being here today, especially FTC Commissioners Orson Swindle and Mozelle Thompson for hosting a very timely workshop on spam earlier this month, and you will enjoy the tapes. It was at that forum where we made an announcement that to me was a shocking reflection of how bad things had truly gotten when it comes to the online medium that we helped to create, and the rising tide of spam. On April 30, we announced that our company was blocking up to 2.4 billion spam e-mails in one day from being delivered to our members. That amount is double the number of spam e-mails we had blocked in one day from just 8 weeks earlier, on March 5, and over four times the amount of spam we blocked since early December. On a yearly basis, and this is mind-boggling, that means we are now blocking almost 24,000 spam e-mails from going to each one of our members' e-mail inboxes. And to give you some more context, if a standard business- size envelope represented each spam e-mail we were blocking, and every day, every single day you laid those envelopes end to end, they would stretch around the earth four times and then on to the moon, but this is more than just sheer raw numbers. There is raw anger that spam generates from our members that has forced us and me personally to declare that the worst spammers are public enemy number 1, and we now know that canning the spam remains the priority, number 1 issue for online consumers today, and our members tell us, they go out of their way to tell us how much they hate spam every day on our service. We put a report spam button on our AOL software that came out in the fall and today more than 9 million receipts will come from our members. They are forwarding spam to help us block more and more of it right at our servers. Those are more than 9 million individual pleas from our members for action on spam, and as far as I am concerned, we are hearing them loud and clear, but even though our members are reporting more spam to us then ever before, and even though we are blocking more spam from getting to our members than ever before, it is clearly not enough to stop the rot of the e-mail tool that has become so central to our people's daily online lives, and that is why we are all here today. We really need your help. We are not just at a crisis period, but we are at a point now where the very tool that is the core communication point in the online world is under attack. In short, we are witnessing a serious threat to consumer confidence in the e-mail function, and if that happens, it will lead to an erosion of faith in the online medium in general, and that would be a crime. That is why we applaud everyone here for stepping forward. You would have had and will continue to have a very critical and timely role to play in the effort to eradicate this scourge of spam. This is an issue that begs for attention but more importantly begs for action. We recognize better than anyone that there is no silver bullet that is going to kill spam on the Internet. It is everywhere, and no one owns the spam problem and no one will have the solution. We are in this together, Government, our competitors, our consumers, the entire industry. Every constituent that is online this matters to, and we are responding in AOL forcibly and comprehensively to the spam attack and believe we are rising to the occasion to defend our members in five key areas, and these are all pillars of our plan to battle against spam. First, we are and will continue to invest in providing the very best software tools to empower members to fight back against spam and spammers, such as the report spam button in customizable mail controls on our 8.0 software. 100 days after that announcement, we released a new version of our software called 8.0 Plus, and made it very easy for our members to move into a mode where they would only receive e-mail from people that they knew, so we have listened to the FTC and that capability is already built in. Second, we are constantly updating and strengthening the anti-spam filters that we own and operate at our server level, and we use our daily member feedback to do so. They are providing us with the lists, and we are listening and responding technically. Third, we are working with State and Federal-level policymakers to ensure that the public laws stay abreast of and involved with the ever-changing, even more complex nature of spam. Fourth, we are playing offense legally. We have filed civil lawsuits against over 100 individuals and corporations who spam our members, and we are raring to go to do it with more. And fifth, we are working across the industry with key stakeholders such as Earthlink, Yahoo, and Microsoft, no small feat for AOL to do, in an effort to share resources, collaborate on technical solutions and set industry guidelines to beat these spammers, but even with all that, right now it is not enough, and so we are constantly seeking to advocate newer, tougher weapons against what I like to call the leadership targets in this war on spam, and that is where I believe you and Congress can step in with strong anti-spam legislation. We need bigger mallets in this online version of Whack-a- Mole that we are playing to go after the worst spam offenders, namely the outlaws and the kingpins of the spam world, and I am talking about those spammers who systematically and perseveredly send spam using fraudulent and invasive methods, those who mislead, lie, and falsify with disdain and disregard for any law or measure of decency. They need to get what they deserve, criminal penalties, felony counts, and jail time. I pointed to the recently unveiled Virginia anti-spam law, which is now the toughest in our nation, and the criminal penalties it contains, as well as the asset forfeiture provision as to a good starting point for Federal action. At the same time, we cannot allow these spam evildoers to represent in any way appropriate, legitimate, and practical marketing via e-mail. That is why, in addition to the remedy I just mentioned for outlaw spammers, we would all like to see a Federal bill established of rules of the road on the Internet for marketers who legitimately communicate online with consumers. If there is ever an idea whose time has come, it is stronger, meaningful anti-spam legislation with this two- pronged approach. Give law enforcement the tools to seek criminal and felony penalties against the very worst offenders on spam, and let the good practitioners of e-mail marketing be guided by a set of standards that we will all abide by. I know this is a tall order, but we will continue to play our part and invest and do our best to innovate and constantly give our members better anti-spam tools, seek more and more technological solutions, make our anti-spam filters even better so we can block more spam, and also work across the industry in a collaborative and cooperative way without regard to competitive boundaries. I am calling for us to work together in a multifaceted way in a more comprehensive approach, but we really need all of you by our side every step of the way. Do not let the spammers get away with it, and we have to act now. We are so pleased that Senators Burns and Wyden have taken such a strong and active interest in this issue, and we look forward to continuing to work with them and other Members in crafting legislation that will really help. I thank the Chairman and Members of the Committee. [The prepared statement of Mr. Leonsis follows:] Prepared Statement of Ted Leonsis, Vice Chairman, America Online, Inc. and President, AOL Core Service Chairman McCain, Senator Hollings, and members of the Committee, on behalf of America Online, Inc., I would like to thank you for the opportunity to testify before the Committee on the issue of junk e- mail--or ``spam.'' My name is Ted Leonsis, and I am Vice Chairman of America Online, Inc. and President of the AOL Core Service. I would like to tell you a little bit about the nature of the spam problem and its effect on ISPs and Internet users, as well as some of the things that AOL is doing--along with our other industry colleagues--to help address this issue. But first, I would like to commend you for holding this hearing and taking a forward-looking approach to the spam problem at such a critical time. We believe that there is a strong and important role for government to play on this issue, and we are anxious to work with you to find a solution to this crisis. Spam is one of the biggest problems facing Internet users and Internet service providers (ISPs) today. Junk e-mail clogs the arteries that carry communications across the Internet--misappropriating the network and resources of ISPs, and negatively affecting the online experience of Internet users. And because junk e-mailers do not bear most of the costs of sending their millions of messages, consumers and ISPs must shoulder the majority of the expense and burden of handling spam. Moreover, much of the mail contains objectionable or misleading advertisements. Consumers are being bombarded with offensive, deceptive, annoying e-mail; and legitimate commercial e-mail that consumers might want to read is being lost in a sea of junk. Clearly, spam is a significant business and consumer issue that needs to be addressed. While spam has caused problems for ISPs and consumers for years, it has grown exponentially in recent months. Spam now accounts for 60-80 percent of all mail coming in from the Internet to AOL members, and AOL estimates that the overall volume of spam is doubling at least every four to six months. Spam is costing U.S. businesses in excess of $10 billion annually, clogging the Internet and overwhelming e-mail service providers (see Ferris Research at www.ferris.com). For everyone in the online world, spam is a burden that has reached crisis proportions--and it's only getting worse. Fighting spam has become a serious quality of life issue for everyday consumers. At AOL, we're listening to our members and have declared spammers to be ``Public Enemy #1.'' AOL has taken a number of important steps over the past few months to fight back against spam, basing our actions on the complaints and concerns of our members. First, we have deployed strong technologies across our network to block and filter spam. Our anti-spam filters are now blocking up to 2.4 billion pieces of unwanted mail per day, which means we are stopping almost 70 spam e-mails per account per day from landing in the e-mail inboxes of our members. And we've fine-tuned technology that stops spam before it happens by preventing spammers from gathering--or ``harvesting''--e-mail addresses from AOL areas. Second, we're enlisting our members in this fight by giving them new tools that make it easier than ever to block spam and report spammers. Our popular ``Report Spam'' button has resulted in a dramatic increase in the amount of spam being reported directly to AOL by its members--we now receive upwards of 9 million reports of unwanted e-mail per day. AOL's Mail Controls are easy to use and allow our Members to block e-mail from specific mail address or entire domains, or to create a ``permit list'' of addresses from whom they will accept mail. We're also providing our members with important consumer safety tips that can help them reduce spam and improve the security of their online experience--particularly in the broadband environment, where it is critical that consumers know how to protect themselves in the world of ``always-on'' high-speed connections. Later this year we will introduce new spam identification tools that will be personalized for each member, so members can decide for themselves what is unwanted mail. And we will strengthen our already powerful Mail Controls, offering more ways stop spam before it reaches the inbox. In addition, AOL will--in keeping with our longstanding commitment to providing strong Parental Controls--take special steps to help provide kids on AOL with a safe, spam-free experience. In addition to the technology tools we use and provide to our members, we're also joining with other ISPs in waging war against spammers in court. Just recently, AOL filed lawsuits against over a dozen companies and individuals responsible for sending 1 billion spam e-mails to our members. We've taken more than 100 individuals and companies to court over the past few years, resulting in millions of dollars in monetary penalties against spammers. We're supportive of the actions that Earthlink and other ISPs have taken to fight spam on the legal front, and we look forward to finding new ways that industry can work together to bring spammers to justice. We're also building alliances with others in our industry to think creatively and constructively about how to craft and implement real solutions to the spam problem. Just last month we joined with Microsoft and Yahoo! to announce a commitment to work together and with other industry stakeholders to combat spam. The group will initiate an open dialogue to drive the development of open technical standards and industry guidelines that will help fight spam, as well as discussing ways to cooperate with law enforcement efforts against large-scale spammers. And finally, we're working with policymakers to support efforts to reduce unwanted e-mail. For example, we worked with Virginia legislators, the Attorney General, and the Governor to get a tough new law enacted in Virginia earlier this month that would provide criminal penalties for spammers who send junk e-mail by fraudulent means. We were also honored to participate in the spam workshop sponsored by the FTC several weeks ago, which served as a lively forum for debate and discussion about the complexities of the spam problem and how it can be addressed. Yet despite these efforts, spam remains a problem for service providers and their customers, particularly because many spammers use fraudulent transmission tactics--such as forging e-mail addresses and Internet domain names--to circumvent filters that are designed to allow ISPs to manage their mail load and empower consumers to exercise choice. In fact, we believe that these ``outlaw spammers'' (those who engage in fraud) are the primary cause of the overall spam problem. The ``outlaw'' spam problem includes: 1) e-mail that is sent using falsified means of technical transmission; 2) e-mail sent using hacked e-mail accounts; and 3)e-mail sent by spammers who intentionally abuse legitimate e-mail service providers by registering for multiple e-mail accounts or domain names using a false identity for the sole purpose of transmitting spam. ``Outlaw'' spam has increased alarmingly in the past year, and we believe that this dramatic growth underlies the astonishing increase in overall spam volume. These spammers are hijacking the computer resources and bandwidth of private consumers and businesses large and small, threatening to overwhelm the entire online medium. With the spam problem reaching crisis proportions, we believe that government can play a strong role in helping fight spam--both through increased enforcement efforts and through the enactment of new laws to target spam. AOL believes that Federal legislation can serve two purposes in helping to fight spam. First, it can help set baseline rules of the road for legitimate marketers who use the e-mail medium to reach consumers. Such rules, combined with industry standards and new spam-fighting technologies developed by relevant stakeholders, will help to ensure that marketers use e-mail responsibly and will also provide legitimate businesses with some clarity regarding the legal obligations governing their marketing operations. Second, we believe that government action is critical to deterring ``outlaw'' spammers. Strong and effective laws--including tough criminal penalties--must be put in place to pursue and prosecute spammers who use fraudulent transmission tactics. The newly amended Virginia Computer Crimes Act is an example of a law that gives ISPs and law enforcement powerful tools for fighting ``outlaw'' spam. The Act calls for enhanced criminal penalties if, for instance, spammers employ minors to send spam or derive significant revenue from sending large- scale spam. This statute provides another way for law enforcement and service providers to take direct aim at ``outlaw'' spammers, using the law to put them out of business. We hope that Congress will follow Virginia's lead by enacting legislation that will target ``outlaw spam'' by imposing stiff penalties on spammers who engage in techniques of fraud and falsification. Such legislation is needed not only to stop existing abuses, but also to safeguard new e-mail technologies that outlaw spammers may try to circumvent. We are pleased that many Members of Congress--including Members of this Committee--have taken an interest in the spam problem and are working to advance legislative solutions. In the meantime, AOL is committed to maintaining a leadership role in the fight against spam. The goodwill and trust of our members depends on our continued focus on developing solutions to this problem. AOL will to continue to pursue strong enforcement actions and innovate our spam fighting tools--putting our members in even greater control. But ultimately, we believe the spam battle must be fought on many fronts simultaneously in order to be successful. From technology to education, from legislation to enforcement, industry and government can work together to reduce spam significantly and give consumers control over their e-mail inboxes. We applaud the Committee for examining this issue at such a critical time, and we look forward to working with you and other lawmakers to stop spammers in their tracks. Thank you for the opportunity to testify; I am happy to answer any questions you may have on this topic. The Chairman. Thank you. Mr. Salem, welcome. STATEMENT OF ENRIQUE SALEM, PRESIDENT AND CEO, BRIGHTMAIL INC. Mr. Salem. Thank you, Mr. Chairman and Members of this distinguished Committee, for allowing me to address you on this topic of unsolicited commercial e-mail, often referred to as spam. I am Enrique Salem, Chief Executive Officer of Brightmail Incorporated. Today, our software process is approximately 10 percent of the world's Internet e-mail for our customers. E- mail has become a ubiquitous form of communication for businesses and personal use. Spam is flooding our inboxes and it is threatening the viability of e-mail as a communication tool. It undermines consumer confidence and threatens the future of e-mail and online commerce. The growth curve of spam has been steep over the last 5 years. Brightmail has seen an increase of more than 900 percent in the number of unique spam attacks per month, dating from April 2001 to April 2003. Attacks can have anywhere from 10 to tens of millions of messages that span a few hours to many days. Over the same period, the amount of unsolicited commercial e-mail has increased from a few messages to approximately 46 percent of all Internet e-mail, and that is a conservative number. The numbers are actually growing very, very rapidly, and we believe that by the end of this year, it will be more than 50 percent. The current volume of spam being sent has a significant cost to ISPs and businesses. Spam is currently the number 1 complaint for many ISPs, and is negatively impacting customer satisfaction while driving support costs and infrastructure costs. On the business front, a recent report from Ferris Research estimates that spam costs U.S. businesses $10 billion a year in lost productivity, bandwidth, and storage costs. Businesses face an additional liability by allowing offensive and fraudulent content to reach employees. Adult content has increased more than 170 percent in the last 12 months. Unlike traditional direct mail or telemarketing, e-mail marketing has a very low marginal cost. As a result, despite extremely low response rates, spammers can make a profit. The more e-mails a spammer can send, the greater his profit, while costs remain nearly constant. The Internet does not know geographic boundaries. 90 percent of the spam hitting our probe network is untraceable, or uses some form of deception to hide its origin. In many cases, this is accomplished by sending the mail through unsecured open relays and open proxies that are spread out across the world. Of the 10 percent that is traceable, 60 percent claims to be from Europe, with 16 percent claiming to be from Asia. Spammers will continue to use deceptive techniques to evade filters. We are starting to see an increasing amount of corporate identity theft, where spammers send mail using well- known brand names in an attempt to evade filters and reach user inboxes. A consequence of this technique is that less dynamic spam filters can blacklist legitimate corporate domains in a misguided attempt to fight spam. The sheer volume of spam is also having a direct impact on legitimate direct marketers. The messages are being lost in a sea of spam. Overzealous filters now block an increasing amount of legitimate mail. In many cases, it is inappropriately deleted or placed in a bulk mail folder, which reduces the response rates to legitimate marketing campaigns. It is important to note that spam is invading other forms of electronic communication, including Instant Messaging and wireless devices. One only needs to look at what has happened in the international wireless markets to see that spam has become a very serious problem on cell phones, such as in Japan and on the NTT DoCoMo Network. We should not exclude these other valuable communication tools from consideration, because the same problems affecting e-mail today will soon affect these other forms of communication. I am here to tell you we will solve the spam problem. The solution will require strong legislation, cooperation between direct marketers, ISPs, and technology providers. It will require legislation, but there are limits to what laws alone can do. Strong laws can serve as a deterrent to spammers. We need Federal laws that prohibit deception in e-mail headers. There also needs to be a valid way to opt out, but we still need to define what it means to opt out. What are we opting out of? We need to prohibit the sale of tools to harvest e-mail addresses, as well as the sale of e-mail lists that have been inappropriately created. Beyond spam filtering, technology will be required to identify legitimate e-mail. There will need to be a set of best practices and guidelines defined and managed by industry coalitions that are followed by legitimate direct e-mail marketers, allowing us to more effectively block spam and allowing legitimate mail to be successfully delivered, preserving e-mail as a viable communications tool. Thank you for the opportunity to comment and participate in this important discussion. [The prepared statement of Mr. Salem follows:] Prepared Statement of Enrique Salem, President and CEO, Brightmail Inc. Spam Problem Overview E-mail has become a ubiquitous form of communication for both business and personal use. With e-mail has come spam. Today, spam is spreading in such staggering amounts--flooding both corporate and personal inboxes--that it now threatens the viability of e-mail as a primary communication tool. Unsolicited commercial e-mail (UCE), commonly known as spam, has reached epidemic proportions. Analyst firm IDC currently estimates that 7.3 billion pieces of spam are sent each day with 3.9 billion of those sent in North America. The growth curve has been steep. Over the last 5 years, we have seen the amount of unsolicited commercial e-mail increase from a few messages to approximately 46 percent of all Internet e-mail. Brightmail predicts that by December of 2003 spam will become more than 50 percent of all Internet e-mail. It has become a serious problem for Internet Service Providers (ISPs), businesses and individuals. Unlike direct mail or telemarketing, e-mail marketing has very low marginal cost. As a result, despite extremely low response rates, spammers can make a profit fairly easily. The more e-mails a spammer can send, the greater his profit, while the cost remains nearly constant. Bulk e-mailers are sending between 80 and 100 million messages a day. This both explains the alarming growth rate of spam and makes it more frightening--there is no financial disincentive for flooding the Internet with more and more spam. Costs to ISPs and Businesses A recent Gartner Group study on spam estimates that spam costs an ISP with 1,000,000 users $7 million per year. Spam is currently the number one complaint for many ISPs and is negatively impacting customer satisfaction while driving up support and infrastructure costs. Businesses are also not immune from the costs. A 2003 report by Ferris Research estimates that spam costs U.S. businesses $10 billion/year in lost productivity alone. Businesses must also add additional storage and bandwidth to handle the increase in e-mail traffic due solely to spam. Lastly, businesses face an additional liability--allowing offensive and fraudulent content that is often a part of spam to reach employees. Adult content has increased more than 170 percent in the last 12 months and scams have nearly doubled in the same time period. These are concerns that go beyond the IT department and into the human resources arena. Costs to Direct Marketers Another significant consequence of the sheer volume of spam being sent is that over zealous filtering attempts are now blocking an increasing amount of legitimate mail. In many cases it is improperly deleted or placed in a bulk mail folder reducing the response rates to legitimate marketing campaigns. Spam is a large and growing problem As seen in Chart 1 below, Brightmail has seen an increase of more than 900 percent in the number of unique spam attacks/month from April 2001 to April 2003. A spam attack is a unique grouping of messages based on their content--for example, Herbal Viagra. Spammers will inject random content into each message to attempt to confuse filters by making each message that they send appear to be different. Attacks can have anywhere from ten to tens of millions of messages and can last from a few hours to many days.Chart 1 Spam is becoming increasingly offensive or fraudulent As noted in Charts 2 and 3 below, from April 2002 to April 2003, Brightmail has seen ``adult'' spam increase by more than 170 percent and spam categorized as ``scams'' nearly double. These offensive e- mails are troublesome and costly for consumers as well as for businesses.Charts 2 & 3 Spam is threatening the viability of e-mail As seen in Chart 4 below, over the past two years, both spam and e- mail have grown. However, spam comprises a greater and greater percentage of the total amount of e-mail that is sent each year, which is threatening the viability of e-mail as a communications tool.Chart 4 Spam is an International Problem Much of the spam reaching U.S. inboxes is routed through other countries. The majority of spam is untraceable (90 percent), but of that spam that does claim to come from a certain region of the world, the majority comes from Europe--with the Russian Federation comprising 10 percent--and Asia--with China leading Asia. A key point to make is that even if a spam message claims to originate in China, it very well could have originated in North America or somewhere else. This point has implications as we consider the impact of various state and Federal spam legislation.Chart 5 Tracking Spammers is difficult Spammers often obfuscate their true location by enlisting open relays or proxy servers throughout the world. Trying to track down the true origin of a known spam message is often quite difficult, as demonstrated in Exhibit 1 below.Exhibit 1 Use of Open Proxies Spammers aggressively use technology to hide their tracks. A perfect example is the growing use of open proxies; open proxies are misconfigured servers that allow spammers to generate large volumes of e-mail that are not easily traceable to the actual sender. There are many thousands of open proxy servers available to spammers at any given time and a great deal of spam flows through these servers--both in the U.S. and overseas. Changing Techniques to Reach Inboxes Spammers have moved beyond simple text-based e-mail to entice end- users to click through. One such technique is using HTML-based e-mail. An example of a recent HTML-based spam message appears to the recipient as follows: Exhibit 2When in reality, the HTML code behind this seemingly benign image is collecting valuable information for the spammer.Spam Can Lead to Digital Identity Theft Spammers also employ well-known brand names in an attempt to get end-users to open e-mails. Not only does this perpetrate the spam problem, it also does considerable damage to the reputations of companies. We see spam from global corporations that was actually sent out by a spam shop halfway around the globe. These innocent corporations face more than the wave of bounced messages and angry responses from the spammed. This type of corporate identity theft can severely damage a company's worldwide brand since spammers have global reach. Additionally, some misguided attempts to fight spam result in building blacklists that often include the domain names of these victims of domain identity theft. These blacklists further the damage done by the open relays and falsified headers of spammers when subscribers to these blacklists can no longer receive e-mail from the legitimate enterprises. Domain names are an intrinsic part of a corporate brand. The theft of these names for mass mailing of unsolicited e-mail has hurt some companies already and the trend may grow in the months and years ahead. Corporations have a responsibility to their employees and shareholders to take measured steps in securing their messaging systems. In fact, as liability cases do make their way into the courts, the extent to which corporations can demonstrate that they made ``best efforts to protect against spam'' will have a large bearing on the outcomes. In the header information in Exhibit 3 below, a spammer has used two well-known company names to trick the recipient into thinking that the e-mail is from a trusted source, when in fact it is just an attempt to obfuscate the true identity of the sender.Exhibit 3 Spam: Moving Beyond E-mail Wireless Spam There is a huge impending need for anti-spam protection in the mobile/wireless environment. Wireless e-mail produces a unique set of threats from spam, including volume issues when wireless users receive large amounts of spam. Viruses and worms can harm or temporarily paralyze PDA devices or the applications that run on them. Cell phones are particularly vulnerable to dictionary attacks done by spammers using phone numbers, with the advent of text messaging and SMS. There is currently more of a need for anti-spam protection for wireless devices in foreign markets than in the U.S. The highest risk to wireless spam and viruses exists in Asia and Europe, but the need in the U.S. for protection is growing. We can see the future for U.S. wireless in overseas experiences as they have adopted wireless technology more rapidly. One way that spam is affecting wireless communications overseas is by causing carriers to pay back their own customers for each spam message received. Since carriers like NTT DoCoMo in Japan charge for incoming messages, customers were at first paying their carrier for the pleasure of receiving and having to delete spam from their own devices. Now DoCoMo refunds customers for spam messages received, which is detrimental to DoCoMo's bottom line. Additional costs of wireless spam are passed on to end-users. With wireless messaging pricing models, wireless users must pay for each message and, often, each line of content within that message. With unwanted messages flooding wireless devices, end-users will no longer find technologies like SMS a viable mode of communication. With the continued adoption of wireless communications in the U.S. will come a dramatically increased need for wireless anti-spam and anti-virus technology, to protect the end user and the provider's bottom-line. As wireless adoption continues, spammers will increasingly target wireless users with spam, making for an expensive and very inconvenient dilemma. As spam invades PDAs, cell phones and the like, wireless carriers will have to block spam or face customer churn and costly refunds for unwanted wireless spam. Instant Messaging (IM) Spam Spam is also infiltrating the desktops of business and home users via another popular communication tool--Instant Messaging (IM). As more businesses use IM to communicate with business colleagues who are offsite or traveling, spam via this route has some of the same negative impacts that it does via e-mail--productivity issues and potential liability issues for offensive content that is delivered via IM. Exhibits 4 and 5 below are examples of recent IM spam that were received by business users. Exhibit 4 offers a common pitch to lose weight while Exhibit 5 contains more offensive content. Spam via IM is of particular concern to parents whose children use IM to communicate with friends. Exhibit 4Exhibit 5Impact of Current Spam Legislation State Legislation As of April 2003, twenty-nine (29) states have spam control laws. In July 1997 Nevada became the first state to enact spam control legislation (law amended in 2001 and 2003). Nevada law states that it is illegal to send unsolicited commercial e-mail unless it is labeled ``ADV'' or ``ADVERTISEMENT'' at the beginning of the subject line, and includes the sender's name, street address, and e-mail address, along with opt-out instructions. Similar spam control legislation was passed in California in September 1998. California law currently states that unsolicited commercial e-mail messages must include opt-out instructions and contact information, and opt-out requests must be honored and that certain messages must contain a label (``ADV:'' or ``ADV:ADLT'') at the beginning of the subject line. Only a small percentage of the messages Brightmail processes each month uses these labels, partly because less sophisticated spam filters were identifying messages with these marks and partly because spammers do not abide by these U.S. state laws since they are not sending spam from these states Indiana and New Mexico and Virginia are the states to most recently pass spam related legislation, doing so in April 2003. Virginia's recently updated law has received a great deal of attention due to the stiff penalties for sending spam from within the state of Virginia, including giving the authorities power to seize assets earned from sending bulk unsolicited e-mail pitches while imposing up to 5 years in prison for violators. Have these state laws had an impact on the volume of spam? Not really--spam has continued to increase dramatically over the past few years, from being an annoyance to a serious threat to the viability of e-mail. Part of the problem has to do with enforcement of the laws-- there have been limited number of cases that leverage current state law given that the burden of proof is often on the recipient and can be a heavy burden at best. An example of this heavy burden is the eTracks case that is currently being litigated by a San Francisco-based law firm, Morrison and Foerster LLP. States have limited budgets and those dollars are being allocated to enforcing laws that more directly impacts the safety and well being of its residents. Foreign Spam Legislation We've seen spam legislation enacted in other countries, such as Japan where businesses delayed implementing technological solutions in hopes that Federal legislation would eliminate the spam problem. The law, enacted in October 2002, which required unsolicited text messages to be tagged, has had little impact on reducing the volume of spam sent via text messaging in Japan. The European Union (EU) has also passed legislation that its member states must comply with by October 2003, which requires that there must be a prior opt-in relationship between a sender and recipient in order for unsolicited e-mail or text messaging to be sent. Some member states are already in compliance, but the amount of spam that European e-mail users receive continues to climb. ISPs and European businesses are being forced to examine technological solutions to the spam problem, given that legislation is having little impact on the spam problem. Federal Spam Legislation There is hope that Federal laws will have the muscle required to combat the growing spam problem. The only current Federal restrictions on e-mail spam are the general criminal and civil fraud prohibitions. The FTC currently works with law enforcement to combat fraudulent e- mail scams, but at the moment 56 percent of spam does not fit the legal definition for fraud, according to a recent study by the FTC, and is therefore beyond current law. Given federal, state, and local law enforcement's focus on preventing terrorism and their limited resources, they simply cannot keep up with spam. However, there are a number of proposals currently in front of Congress. These include the Can Spam Act (revised in April 2003) that would require unsolicited commercial e-mail messages to be labeled, require unsolicited commercial e-mail messages to include opt-out instructions and the sender's physical address, and prohibit the use of deceptive subject lines and false headers in such messages. Additionally, this bill would pre-empt any state laws that prohibit unsolicited commercial e-mail outright, but would not affect the majority of state spam laws. Another Federal initiative, the Computer Owners' Bill of Rights (S. 563) would require the Federal Trade Commission to establish a ``do- not-e-mail'' registry of addresses of persons and entities who do not wish to receive unsolicited commercial e-mail messages. Additionally, the FTC would be empowered to impose civil penalties upon those who send unsolicited commercial e-mail to addresses listed on the registry. A third proposed law, the Reduce Spam Act, requires that unsolicited bulk commercial e-mail messages would be required to include a valid reply address and opt-out instructions, and a label (``ADV:'' or ``ADV:ADLT'', or other recognized standard identification). These requirements would apply to messages sent in the same or similar form to 1,000 or more e-mail addresses within a two-day period. In addition, false or misleading headers and deceptive subject lines would be prohibited in all unsolicited commercial e-mail messages, whether or not sent in bulk. Additionally, New York Senator Charles Schumer is planning to propose legislation that would incorporate many elements of other proposed legislation but also adds funding for enforcement of the ``do not mail'' registry component of his proposed legislation. From our point of view labeling has not helped to solve the problem, as it is a component of current state legislation. Benefits and Consequences of Legislation As with other public hazards, legislation can play an important role in the fight against spam. However, the extent of the problems often extends beyond state and country borders, preventing legislation alone from solving the problem. Consider the parallels in the offline world. While there are many ``laws of the road'' for drivers, still the public wants the auto industry to build as many safety features into cars as they possibly can. Similarly, while ``Breaking and Entering'' is a felony crime, homeowners use locks, bars and alarm systems to protect themselves from robbery. While legislation plays an important role in highlighting the seriousness of spamming, it is currently very difficult to enforce. Spamming is a global problem, with e-mail being routed around the globe and with wanton disregard for local regulations. Governments cannot impose regional laws on assailants outside their boundaries. Even when legal authorities can catch a spammer within their jurisdiction, the burden of proof can be daunting to prosecuting attorneys. Legislation may help to deter some spammers and provides a framework for prosecution and operations of both Direct Marketers and anti-spam companies. But, enforcement is key and will prove expensive and difficult. We need to alert this committee that is it critical to set the expectations of the public at the right level as far as the real impact of legislation on the volume of spam received. We believe the solution will involve a coordinated effort by Internet Service Providers, Direct Marketers, technology providers and law enforcement agencies. We will need to establish guidelines that outline e-mail best practices. These guidelines will need to be followed by direct marketers. It will become important to be able to identify legitimate direct marketers and there will need to be improvements in how direct marketers manage their lists. Appendix Brightmail Corporate Overview Brightmail, the worldwide leader in anti-spam technology, provides anti-spam software that makes messaging secure and manageable. Founded in 1998, Brightmail protects the networks of enterprises, service providers, and mobile network operators by filtering spam, viruses and undesired messages at the Internet gateway. Brightmail currently serves many of the largest service providers, including AT&T WorldNet, EarthLink, MSN, and Verizon Online as well as leading enterprises that include eBay, Booz Allen Hamilton, Deutsche Bank, and Cypress Semiconductors. In April 2003, across its customer base, Brightmail software filtered over 60 billion messages and protected over 250 million mailboxes. Brightmail anti-spam architecture includes a patent protected ``spam alert network'' called the Brightmail Probe Network, a collection of more than a million decoy e-mail accounts. It is designed to attract unsolicited e-mail and has a statistical reach of more than 250 million e-mail accounts that provide Brightmail with a unique insight into the changing face of spam throughout the world. Brightmail is backed by world-class investors and partners and is headquartered in San Francisco, CA. Brightmail ArchitectureProbe NetworkTM The Probe Network has a statistical reach of more than 250 million e-mail accounts. It consists of millions of decoy e-mail addresses that receive more than 300 million spam messages per month. The data from the Probe Network is used for the real-time creation of anti-spam rules that are propagated to Brightmail customers every few minutes--24 hours per day. This patent protected technology is used to provide Brightmail customers with spam protection from the highly dynamic, ever changing, phenomena that spam has become. U.S. Patent 6,052,709 (Apparatus and method for controlling delivery of unsolicited electronic e-mail)BLOC (Brightmail Logistics and Operations Center)Operates 24 hours/day--365 days/yearEmploys state-of-the-art tools to identify new spam attacksMessages are automatically grouped into spam attacks and then rules automatically written against themQA technicians verify the rules before they are made availableNew anti-spam rule updates every few minutesRules are transmitted via a secure conduit (HTTPS)Brightmail software is installed at the customer siteBrightmail's extensive anti-spam rule set contains filters that automatically block identified spam attacksUses sophisticated grouping algorithms and pattern matching to identify and eliminate spam as it enters the e-mail gatewayUpdated in real-timeProtection against spam is always current The Chairman. Thank you, sir. Mr. Hughes. STATEMENT OF J. TREVOR HUGHES, EXECUTIVE DIRECTOR, NETWORK ADVERTISING INITIATIVE Mr. Hughes. Mr. Chairman and Members of the Committee, I want to thank you for inviting me to testify. My name is Trevor Hughes, and I am the Executive Director of the Network Advertising Initiative. The NAI is a cooperative group of companies, and we are dedicated to resolving public policy concerns related to emerging technologies. In the past, the group has tackled issues such as self-regulatory solutions for online ad targeting and the use of web beacons online. We have now turned our focus to the growing problem of spam and to that end, a coalition has been formed within the NAI which is made up of 35 leading companies which are e-mail service providers. All of these companies are struggling with the onslaught of spam, as well as the emerging problem related to the deliverability of legitimate and wanted e-mail. Let me tell you a little bit about e-mail service providers. E-mail service providers enable their customers to deliver volume quantities of e-mail messages. These messages originate from the full spectrum of the U.S. economy. Large and small businesses, educational institutions, nonprofits, governmental agencies, publications and affinity groups all use the services of e-mail service providers to communicate with their customers, members, and constituents. While ESPs do serve the marketing needs of the marketplace, it is by no means the only customer group served. My members provide and deliver transactional messages such as account statements, airline confirmations, and purchase confirmations. They deliver e-mail publications and newsletters. They deliver affinity messages. The NAI and the e-mail Service Provider Coalition believes that much can be done to solve the problem of spam. At the most fundamental level, we believe that we need to create accountability within the e-mail delivery system. Spammers spend their days concocting new methods to obscure and falsify their identity in order to sneak past existing filters and avoid accountability. In many ways, our existing tools are merely reacting to the spam that is received today and not preparing for or combatting the spam that will arrive tomorrow. For this reason, we believe that the solution to spam exists in three components, a legislative component, a technological component, and a social component. I will address the technological component briefly, and then focus on the part of the solution for which we look to you, Federal legislation. Part of the problem in treating the spam epidemic is that spammers enjoy the impunity of anonymity. Spammers hide behind open relays, they spoof identities, and they deceive recipients with misleading from and subject lines. Make no mistake, the business of spamming is one of fraud and deception. The NAI recently proposed a technological blueprint to respond to this problem. Essentially the blueprint, called Project LUMOS, is designed to force senders of volume e-mail to incorporate authenticated identity into every message sent. The use of authenticated identity, along with a rating of sending practices over time, prevents spammers from hiding behind the technology of e-mail, and forces all senders to be accountable for their sending practices. We have engaged with many of the major ISPs and other groups on this effort, and we are greatly encouraged by the traction our effort has gained since it was launched 1 month ago. The ESP coalition strongly believes that strong, preemptive Federal legislation will be a critical component, but again not the only component in the successful resolution of the spam problem. In the United States today we have 28, and it could be 29 by now, states that have enacted some form of spam legislation. Unfortunately, the standards and definitions applied by these statutes are not consistent. As a result, we have a crazy quilt of different standards that has created an unnecessarily complex compliance system. To make matters worse, enforcement within the global medium of e-mail is exceedingly difficult when limited by state boundaries. We need preemptive Federal legislation to harmonize these standards and provide powerful tools to enforcement officials. We believe that the current spam bill before the Senate, the CAN-SPAM Act, strikes the appropriate balance with regard to preemption. The CAN-SPAM Act would allow for a national standard to be set for the delivery of unsolicited commercial e-mail. Given the incentives provided within the bill, most legitimate businesses will move to a fully consent-based model for e-mail delivery. This is particularly true where the standards set by the bill will be uniform across the entire country. To combat spammers, the bill provides strong enforcement tools for the FTC, the state Attorneys General, and to ISPs. We strongly support enforcement by all of these groups. One issue that has been raised in discussions regarding spam legislation and may be raised again is a private cause of action. Such a solution, while tempting, would do nothing to stop spam. Spammers spend their days looking for ways to technologically obscure their identity. Pursuing spammers requires enormous technological, financial, and investigative resources. Individuals do not have such resources, but Governments and ISPs do. We have a very real example of what a private cause of action means when included in a spam statute. In the state of Utah, a spam statute was passed last year that allows for a private cause of action in class action lawsuits. A single plaintiffs firm in Utah has now filed hundreds and by some accounts thousands of class action lawsuits under the statute, but the firm is not pursuing spammers. Given the cost and complexity of finding actual spammers, this firm has targeted leading companies and brands using law firm employees as plaintiffs and seeking out ``gotcha'' moments as the basis of their complaints. Perhaps most telling is the fact that there are no data to suggest that the amount of spam in Utah has been reduced by even one message. Another issue that has been raised in relation to spam is that of opt in versus opt out. Over the past few years, our industry has lost critical time debating this issue while spam has been allowed to proliferate. Let me make this perfectly clear. This debate, regardless of what standard is eventually adopted, will not result in the reduction of spam. A spammer's stock in trade is in deception. They do not care about whether they have permission from the recipient. They pay no heed to all of the existing state laws regarding spam. The most restrictive opt-in statute will do nothing to dissuade spammers from sending their messages. Again, the NAI is very supportive of the CAN-SPAM Act. We will continue to work with staff over a few technical details of the bill, but look forward to seeing a Federal law enacted this year. On behalf of the NAI E-mail Service Provider Coalition, I want to pledge that we will continue to work to fight spam and preserve e-mail with you and the members of your staff. Thank you, and I look forward to your questions. [The prepared statement of Mr. Hughes follows:] Prepared Statement of J. Trevor Hughes, Executive Director, Network Advertising Initiative Executive Summary The NAI is a cooperative group of companies dedicated to resolving public policy concerns related to privacy and emerging technologies. In the past, the NAI has successfully launched self-regulatory solutions to online ad targeting, and the use of web beacons. The NAI has now turned its focus to the growing problem of spam and the related concern of deliverability of wanted e-mails. As part of this effort, a coalition has been formed within the NAI to represent the interests of e-mail service providers (ESPs). The E-mail Service Provider Coalition (``ESP Coalition'') is made up of 35 leading companies--all of which are struggling with the onslaught of spam, as well as the emerging problems related to the deliverability of legitimate and wanted e-mail. E-mail service providers enable their customers to deliver volume quantities of e-mail messages. These messages originate from the full spectrum of the U.S. economy--large and small businesses, educational institutions, non-profits, governmental agencies, publications, and affinity groups all use the services of ESPs to communicate with their customers, members, and constituents. While ESPs serve the marketing needs of the business community, it is by no means the only customer group served. E-mail service providers also deliver transactional messages (such as account statements, airline confirmations, and purchase confirmations); e-mail publications; affinity messages; and relational messages. Within the ESP Coalition, we estimate that our members provide volume e-mail services to over 250,000 customers. The ESP Coalition sees spam as a threat to the long-term viability of the ESP industry. Indeed, spam presents a dire threat to all uses of e-mail--marketing, transactional, affinity and relational--as the continued growth of spam will lead to the widespread abandonment of e- mail as a communications tool. Put simply, the spam problem will critically damage the ESP industry if it is not curtailed. Consumers and businesses will not use e-mail if the system becomes so choked with misleading and deceptive messages that those messages that are actually wanted are lost in the fray. The ESP Coalition strongly supports legislation to respond to the growing menace of spam. We believe that strong preemptive Federal legislation will be a critical component (but not the only component) in the successful resolution of the spam problem. In the United States today, we have 28 states that have enacted some form of spam legislation. Many more are considering spam legislation in their current legislative sessions. Unfortunately, the standards and definitions applied by these statutes (and proposed in pending bills) are not consistent. As a result, we have a crazy quilt of differing standards and definitions that has created an unnecessarily complex compliance system. To make matters worse, enforcement within the global medium of e-mail is exceedingly difficult when limited by state boundaries. We need preemptive Federal legislation to harmonize these standards and provide powerful tools to enforcement officials. Federal legislation must carefully balance the legitimate use of e- mail against the need to respond to spam. E-mail represents one of the most powerful drivers of efficiency and productivity in today's economy. Our response to spam must take into account and protect the widespread utility of e-mail. Overly restrictive or poorly crafted solutions may end up ``throwing the baby out with the bathwater'' and damaging the very tool we hope to protect. The NAI is very supportive of the current spam bill proposed in the Senate (the CAN-SPAM Act). While we continue to work on some minor technical details within the bill--such as the length of time available for processing unsubscribe requests and definitional issues--we are encouraged by the fundamental structure and approach taken by Senators Burns and Wyden. We feel that this bill endeavors to balance the continued use of e-mail as a legitimate communications tool with strong standards and enforcement tools to prevent spam. Testimony Mr. Chairman and Members of the Committee, I want to thank you for inviting me to testify. My name is Trevor Hughes, and I am the Executive Director of the Network Advertising Initiative (NAI). The NAI is a cooperative group of companies dedicated to resolving public policy concerns related to privacy and emerging technologies. In the past, the NAI has created self-regulatory programs for online ad targeting, and the use of web beacons. The group has now turned its focus to the growing problem of spam and the related concern of deliverability of wanted e-mails. As part of this effort, a coalition has been formed within the NAI to represent the interests of e-mail service providers (ESPs). The E-mail Service Provider Coalition (``ESP Coalition'') is made up of 35 leading companies--all of which are struggling with the onslaught of spam, as well as the emerging problem related to the deliverability of legitimate and wanted e-mail. Let me begin my testimony by explaining the unique role that e-mail service providers play in the search for solutions to the spam problem. E-mail service providers enable their customers to deliver volume quantities of e-mail messages. These messages originate from the full spectrum of the U.S. economy--large and small businesses, educational institutions, non-profits, governmental agencies, publications, and affinity groups all use the services of ESPs to communicate with their customers, members, and constituents. While ESPs serve the marketing needs of the business community, it is by no means the only customer group served. E-mail service providers also deliver transactional messages (such as account statements, airline confirmations, and purchase confirmations); e-mail publications; affinity messages; and relational messages. The ESP industry is robust and growing. Within the ESP Coalition, we estimate that our 35 members provide volume e-mail services to over 250,000 customers. These customers represent the full breadth of the U.S. marketplace--from the largest multi-national corporations to smallest local businesses; from local schools to national non-profit groups and political campaigns; from major publications with millions of subscribers to small affinity-based newsletters. Even my local soccer association uses an e-mail service provider to deliver schedules and standings to the players in the league. Jupiter Research estimates that the e-mail marketing industry (which, again, is only a portion of the total spectrum of ESP customers) will grow in size to 2.1 billion dollars in 2003 (up from 1.4 billion dollars in 2002). By 2007, Jupiter estimates that the size of the e-mail marketing industry will reach 8.2 billion dollars. All of these numbers are for the U.S. market alone. Expanding the scope of this research to include all customers served by ESPs and foreign markets would increase these numbers significantly. But the size and importance of e-mail in the marketplace should not be measured by dollars alone. E-mail is indeed the ``killer app''. Over the past ten years, e-mail has been a strong driver of productivity and efficiency in the marketplace. It has also been an important social tool. E-mail has shortened distances in the world--allowing communication to occur with unprecedented speed and detail. E-mail has created affinity within groups that previously were too widely separated geographically to effectively recognize their common interests and positions. As an example of the importance of e-mail, a recent study by the META Group showed that, given a choice between e-mail or telephones, 74 percent of business people would give up their phones before e-mail. In other words, 74 percent of people now find e-mail to be more critical than the telephone in their daily work. The Threat of Spam and the Solution(s) to Spam The ESP Coalition sees spam as a threat to the long-term viability of the e-mail service provider industry. Indeed, spam presents a dire threat to all uses of e-mail--marketing, transactional, affinity and relational--as the continued growth of spam will lead to the widespread abandonment of e-mail as a communications tool. Put simply, the spam problem will critically damage the ESP industry if it is not curtailed. Consumers and businesses will not use e-mail if the system becomes so choked with misleading and deceptive messages that those messages that are actually wanted are lost in the fray. I will not belabor the statistics on the growth of spam or the costs associated with handling spam. Surely all of the panelist can agree that we are presented with an enormous problem. Without an expedient solution, spam may end up killing the ``killer app'' of e- mail. The media and marketplace have been replete with spam solutions for many years. Important vendors, such as Brightmail, have done a tremendous job at stemming the tide of spam. But the problem still exists and continues to grow. Increasingly, we are presented with the question: can anything be done? The NAI believes that much can be done to solve the problem of spam. At the most fundamental level, we believe that we need to create accountability within the e-mail delivery system. Spammers spend their days concocting new methods to obscure and falsify their identity in order to sneak past existing filters and avoid accountability. In many ways, our existing tools are merely reacting to the spam received today--and not preparing for or combating the spam that will arrive tomorrow. Stated differently, our efforts to cure spam are responding to the symptoms (the actual spam received) and not the cause (the lack of accountability on the part of spammers). So how do we create accountability within the e-mail system? We believe that the solution to spam exists in three components: legislative, technological, and social. Let me address the technological and social components quickly and then focus on the part of the solution for which we look to you: Federal legislation. The Technological Component Part of the problem in treating the spam epidemic is that spammers enjoy the impunity of anonymity. Spammers hide behind open relays, they spoof identity, and they deceive recipients with misleading ``from'' and ``subject'' lines. Make no mistake; the business of spamming is one of fraud and deception. The recent efforts of the FTC in relation to open relays and deception in spam should be commended. It is critical that we have strong deterrents to dissuade spammers from their trade. But the fundamental architecture of the Internet and e-mail protocols still allows for the deception to occur. The NAI recently proposed an architectural ``blueprint'' to respond to this problem. I will submit a description of the effort along with this testimony. Essentially, the NAI's blueprint, called ``Project Lumos'', is designed to force senders of volume e-mail to incorporate authenticated identification into every message sent. The use of authenticated identity, along with a rating of sending practices over time, prevents spammers from hiding behind the technology of e-mail and forces all senders to be accountable for their sending practices. We have engaged with many of the major ISPs and other groups on this effort and are greatly encouraged by the traction our effort has gained since our launch just one month ago. Other technological solutions also hold promise. The NAI is actively working with other constituencies in the marketplace to bring about such solutions. I hope that we will have much more to share with you before the end of this year. The Social Component One part of the spam problem that has not been actively discussed is the need for consumer education around the appropriate use of e-mail addresses. The Center for Democracy and Technology (www.cdt.org) recently released a study on the consumer actions that result in exposure of e- mail addresses and, subsequently, spam. The results were compelling: the CDT report found that appropriate management of an e-mail address by the holder of that address can drastically reduce the amount of spam received. Further, the study found that there are a few actions that can create enormous amounts of spam. Specifically, the CDT reported that posting an e-mail address on a public website and posting an e- mail address in a public newsgroup or chatroom both resulted in huge amounts of spam. This is due to the use of ``spiders'' or ``bots''-- programs that scour the web for e-mail addresses and harvest them into a spammer's database. Clearly, one component in the total solution to spam is the education of consumers on issues such as those raised by the CDT report. If consumers understand those practices that result in spam, they will be much better able to control the amount of spam in their in-boxes. The Legislative Component The ESP Coalition strongly supports Federal legislation to respond to the growing menace of spam. We believe that strong preemptive Federal legislation will be a critical component (but not the only component) in the successful resolution of the spam problem. In the United States today, we have 28 states that have enacted some form of spam legislation. Many more are considering spam legislation in their current legislative sessions. Unfortunately, the standards and definitions applied by these statutes (and proposed in pending bills) are not consistent. As a result, we have a crazy quilt of differing standards that has created an unnecessarily complex compliance system. To make matters worse, enforcement within the global medium of e-mail is exceedingly difficult when limited by state boundaries. We need preemptive Federal legislation to harmonize these standards and provide powerful tools to enforcement officials. We believe that the current spam bill before the Senate, the CAN- SPAM Act, sponsored by Senators Burns and Wyden, strikes the appropriate balance with regard to preemption. The CAN-SPAM Act would allow for a national standard to be set for the delivery of unsolicited commercial e-mail. Given the incentives provided within the bill, most legitimate businesses will move to a fully consent-based model for e- mail delivery. This is particularly true where the standard set by the bill will be uniform across the entire country. To combat spammers, the bill provides strong enforcement tools to the FTC, state attorneys general, and ISPs. We strongly support enforcement by all of these groups. As a coalition made up of legitimate businesses in the e-mail industry, the NAI also strongly supports the inclusion of an affirmative defense for good faith compliance efforts within the CAN SPAM Act. Such tools help to ensure that litigation is properly targeted towards true spammers, and offers important protections for businesses working diligently to maintain approved best practices. One issue that has been raised in discussions regarding spam legislation, and may be raised again, is that of a private cause of action. Such a solution, while tempting, would do nothing to stop spam and would definitely create a morass of litigation against legitimate companies. Spammers spend their days looking for ways to technologically obscure their identities. Pursuing spammers requires enormous technological, financial and investigative resources. Individuals do not have such resources, but governments and ISPs do. In fact, if a private cause of action existed, ISPs would be drawn away from their enforcements efforts by a flood of discovery requests generated through consumer litigation. We have a very real example of what a private cause of action means when included in a spam statute. In the state of Utah, a spam statute was passed last year that allows for a private cause of action and class action suits. A single plaintiffs' firm in Utah has now filed hundreds (and by some accounts, over a thousand) class action lawsuits under this statute. But the firm is not pursuing spammers. Given the cost and complexity of finding actual spammers, this firm has targeted leading companies and brands--using law firm employees as plaintiffs and seeking out ``gotcha'' moments as the basis of their complaints. Perhaps most telling is the fact that there are no data to suggest that the amount of spam in Utah has been reduced by even one message. Another issue that has been raised in relation to spam legislation is that of ``opt-in'' versus ``opt-out''. Over the past few years, our industry has lost critical time debating this issue, while spam has been allowed to proliferate. Let me make one thing perfectly clear: the debate over ``opt-in'' or ``opt-out'', regardless of what standard is eventually adopted, will not result in the reduction of spam. A spammer's stock and trade is in deception. They do not care about whether they have permission from the recipient of the message. They pay no heed to all of the existing state laws regarding spam. The most restrictive ``opt-in'' spam statute will do nothing to dissuade spammers from sending their messages. A recent FTC study conveys this point succinctly. By reviewing a large body of spam received within the agency, the FTC estimated that fully two thirds of spam is fraudulent, misleading or deceptive. This means that the majority of spam is already violating an existing law in the United States. As currently written, the CAN-SPAM Act will provide important incentives for legitimate businesses to raise their e-mail standards. The NAI firmly believes that e-mail must be sent with the consent of the recipient, or within a pre-existing business relationship. Furthermore, we believe that e-mail should be sent with informed consent--meaning that recipients have clear and conspicuous notice as to the results of providing their e-mail address. This is a meaningful and workable standard. Again, the NAI is very supportive of the CAN-SPAM Act. We will continue to work with staff on a few technical issues details of the bill (such as the need for longer processing periods for unsubscribe requests), but look forward to seeing a Federal law enacted this year. The Threat of Filtering and Blacklists Before I conclude today, I want to raise one growing problem in the fight against spam. While spam clearly represents a serious threat to the continued viability of e-mail, the problems created by some of the current tools used to combat spam are equally threatening. Internet Service Providers (ISPs) are aggressively building filtering technologies to limit the amount of spam entering their systems. Conceptually, this is a positive development. However, the spam filters currently in place are creating a new problem: wanted e-mail is not being received. According to a report by Assurance Systems, in the 4th quarter of 2002, an average of 15 percent of permission based e-mail was not received by subscribers to the major ISPs. Some ISPs had non-delivery rates that were startling: NetZero 27% Yahoo 22% AOL 18% Compuserve 14% AT&T 12% The same report for the 3rd quarter of 2002 showed an average of 12 percent non-delivery rate for the major ISPs--meaning that the filtering of permission based e-mail increased 25 percent from the third to fourth quarters of 2002. Some of the e-mail campaigns within the Assurance Systems report had non-delivery rates as high as 38 percent. Non-delivery of wanted messages due to filtering (called ``false positives'' within the industry) represents an enormous threat to the ongoing viability of e-mail as an effective communications tool. The market will stop using e-mail for important communications if e-mail delivery is unreliable. It is critical that false positives be eliminated if e-mail is to survive as an efficient and productive means for communication. One of the main drivers in the false positive problem is the emergence and use of blacklists. These are lists of alleged spammers that ISPs--and any network administrator--can use to filter incoming e- mail. The blacklist operators build registries of IP addresses that they believe are associated with spam and make the lists available publicly. Currently, there are an estimated 300 blacklists in operation. Again, the concept of a blacklist may seem to make sense at first glance. Unfortunately, the reality of blacklists in today's marketplace is far different. Many blacklists operate without standards and operate behind a veil of anonymity. For example, one of the leading blacklists, SPEWS (www.spews.org), offers no contact information: no phone numbers, no names, no addresses, and no e-mail address for the organization. The website has purportedly been registered in Irkutsk, Russia. SPEWS has no defined standards for posting to its blacklist--evidence has shown that a single complaint can result in the blocking of an entire range, or ``neighborhood'', of IP addresses. Further, for those innocent senders that become listed on SPEWS, the only way to resolve the problem is to post their request for removal to a public spam forum available through Google (http://groups.google .com/groups?hl=en&lr=&ie=UTF-8&oe=UTF-8&group=news.admin.net- abuse.email). All of these efforts are designed to combat spam. But in their zeal to eliminate the problem, they have created a potentially disastrous ``ricochet'' effect: false positives. Going forward, our solution to spam must carefully balance the need for strong action against spammers with a determination to preserve the deliverability of legitimate e- mail. Conclusion The NAI believes that the problem of spam will be best resolved through three powerful forces: legislation (and enforcement); technology; and consumer education. Our group is actively working with ISPs and solutions providers to craft architectural solutions to spam that will drive accountability into the dark recesses of the Internet. We strongly feel that technology must be used to force spammers to identify themselves and be held accountable for their practices. We also believe that consumers must understand the need for careful management of their e-mail addresses. We could drastically reduce the amount of spam received by average consumers through educational efforts on what not to do with an e-mail address. But the technological and educational solutions are not enough. We need a strong Federal statute to raise the standards for e-mail practices across the entire country. Legitimate businesses will respond to such a statute by raising their practices to meet or exceed the standard set by law. Enforcement officials at both the state and Federal level and ISPs will have powerful tools to seek out and bring to justice those individuals responsible for spam. And we can do it while maintaining the balance necessary to preserve the legitimate use of e-mail. Mr. Chairman, on behalf of the NAI E-mail Service Provider Coalition, I want to pledge that we will continue to work to fight spam and preserve e-mail with you and members of your staff. Spam is a complex problem and our efforts to craft solutions must be thoughtful, robust and effective. Thank you and I look forward to any questions you may have. The Chairman. Thank you. Mr. Rotenberg. STATEMENT OF MARC ROTENBERG, EXECUTIVE DIRECTOR, ELECTRONIC PRIVACY INFORMATION CENTER AND ADJUNCT PROFESSOR, GEORGETOWN UNIVERSITY LAW CENTER Mr. Rotenberg. Thank you, Mr. Chairman and Members of the Committee. My name is Marc Rotenberg. I am Executive Director of the Electronic Privacy Information Center. We are a nonprofit, nonpartisan research organization here in Washington. We work in close association with the consumer and civil liberties organizations both in the United States and around the world. I think it is fair to say that there are few issues of greater concern to Internet users today than the growing problem of spam, but I think it is also fair to say that it is one of the most complex policy issues facing the Internet. Even though there is broad agreement about the tremendous cost and inconvenience that spam is placing on the use of the Internet, there is still important questions about the appropriate role of law and technology, the relationship between the Federal Governments and the states, and even the question of how best to ensure consumer protection with a problem that clearly has international dimensions, but all of these factors do not diminish the scope of the problem. As Chairman Muris stated at the public workshop last month, approximately 40 percent of e-mail messages today could be considered spam, and it is to be anticipated that in the next year the majority of e-mail traffic on the Internet will be spam. As Mr. Salem commented as well, it is also the case that spam will be migrating to new communication environments, including both Internet messaging and cell phone advertising, so the need to draw an effective line here with respect to the Internet has consequences as well for development of new industry and new consumer services. There are many factors that contribute to the problem of spam. As you all know, it is relatively easy and inexpensive to send a message to many, many people online. It is also obviously difficult to determine the origin of the messages, particularly for the most aggressive spammers. There are difficult jurisdictional problems, particularly with respect to international spam, and there are even some definitional problems associated with spam, as well as the fact that technical solutions which are being pursued aggressively by the ISPs are nonetheless imperfect. As one of the witnesses commented earlier, spam filters have the effect of both underblocking, which is to say, allowing messages to go through that the user does not desire, as well as overblocking, which means to exclude messages that the end user would like to receive. In almost any filter system, the end user has to download the e-mail and incur the cost and connection time to receive the messages before the filters are activated. I wanted to focus briefly on what I think are the key policy issues in trying to find a solution to the spam problem, and I am going to draw both on the experience of list development on the Internet as well as previous efforts with legislation to protect privacy when similar problems have arisen, and I would like to point out first of all that I think if any case is clearly made for an opt-in provision, it is for online marketing. In fact, the traditions on the Internet indicate this, because as people who have been on the Internet for a while and understand the operations of lists, the best lists operate on an opt-in basis. People are provided the opportunity to sign up for the list. If their e-mail address changes, there are easy ways for them to change the e-mail address, and if they wish to be removed from the list, they can do so by quickly going to a web page or sending an unsubscribe message. These are the practices that are being followed by the best marketing firms online, as well as the companies that understand that permission-based marketing, marketing based on opt in, works particularly well in the online environment. Now, there is a good argument about whether or not it would work in the offline environment, but for the online environment, I think opt in is the right way to go. I would also like to suggest that on the question of enforcement means, the private right of action that is found in the Telephone Consumer Protection Act that gives individual consumers the opportunity to go to small claims court and seek a maximum, a maximum of $500, has proven to be an effective way of dealing with the problem of junk faxes and telemarketing, and I think a private right of action that provides limited damages is also a matter of fairness, because, of course, it is the end user who is being inconvenienced and burdened by the unsolicited marketing. Finally, on this critical issue of preemption, I am very sympathetic to the concerns of the industry groups about trying to comply with 50 different state statutes, but the reality is that it is the state Attorneys General who have been on the front lines of dealing with the spam problem, and it has been the state legislatures that have developed many of the most effective and innovative responses in response to the growing problem of spam, and I would like to caution you about the danger of basically telling the state legislatures and the state Attorneys General that the problem to spam will be found in Washington, and that the limited opportunities to go after spammers if a Federal preemption law was passed will essentially be eliminated. That having been said, I would like to thank you, Mr. Chairman and Members of the Committee, and particular Senator Burns and Senator Wyden, who I know have been doing a great deal of work on this issue for a number of years, for your efforts. Many people online will be very grateful to you if an effective, sensible solution can be found to the problem of spam. [The prepared statement of Mr. Rotenberg follows:] Prepared Statement of Marc Rotenberg, Executive Director, Electronic Privacy Information Center and Adjunct Professor, Georgetown University Law Center Summary of RecommendationsContinue to support strong enforcement action by the FTCPromote international cooperation, particularly with consumer protection agenciesRecognize that many of the current spammers are likely subject to prosecution under current unfair and deceptive trade practices lawsEnact a Federal baseline that establishes an opt-in standard, gives consumers legal rights to go after spammers, and does not preempt state lawAnticipate that similar problems may arise with cellular phone advertising in the near future Statement Mr. Chairman, members of the Committee. Thank you for the opportunity to testify today about the problem of Unsolicited Commercial E-mail, or ``spam.'' My name is Marc Rotenberg. I am the Executive Director of the Electronic Privacy Information Center. EPIC is a non-profit, non-partisan research organization. We work in close association with a wide range of consumer and civil liberties organizations, both in the United States and around the world. There are few issues of greater concern today to users of the Internet than spam. Spam is also one of the most complex policy issues for the Internet. Even though there is broad agreement about the urgency of the problem, there are still questions about the appropriate role of law and technology, the relationship between the Federal Government and states, and even the question of how best to tackle a consumer problem that clearly has a significant international dimension. Scope of the Spam Problem As Chairman Muris noted at the recent FTC public workshop, the spam problem is increasing rapidly. In 2001 the FTC began to routinely collect spam. During that year, the FTC received an average of 10,000 messages per day. In 2002, that figure went up to 47,000 a day. The number has gone to 130,000 e-mails a day this year. As a measure of how fast a new e-mail address can attract spam, Chairman Muris reported that the FTC had seeded an e-mail address in a chat room. That e-mail address began receiving spam in eight minutes. It has been estimated that 40 percent of e-mail in the United States is spam, creating an annual cost of over $10 billion. These costs are incurred through lost productivity and the additional equipment, software and labor needed to deal with the problem. On spam, the interests of Internet users and the Internet industry are generally aligned. Only the Direct Marketing Association has expressed opposition to sensible opt-in legislation. However, as the recent FTC Workshop made clear, this position is simply not viable in the online world. Permission-based marketing, which relies on the affirmative consent of consumers, has always been a good business practice. Now it may be critical to stem the flood of undesired e-mail. Factors Contributing to Spam Several factors contribute to the spam problem. First, it is inexpensive and relatively simple to send spam to a very large number of Internet users. Unlike traditional junk mail, the marginal cost for each additional electronic message is essentially zero. Therefore, spammers are as likely to send to a million users as they are to a thousand. Second, the origin of spam is often difficult to determine. Spammers will frequently send messages from domains they do not own and in ways that conceal the source of the message. The spammers also show little regard for any effective list management. There is no meaningful effort to obtain consent or allow users to opt-out of undesired marketing. Third, spam raises difficult jurisdictional problems. Spammers may send messages from one state to another and even from one country to another. While there is general agreement across jurisdictions about the need to reduce spam, there are questions about how best to coordinate enforcement measures. Fourth, there are definitional problems associated with spam. Commercial marketers who engage in bulk e-mail advertising may be reluctant to concede that their messages are spam even though the vast majority of recipients find the messages burdensome and undesirable. Some Internet users may consider bulk political mail as ``spam,'' though for both practical reasons and the First Amendment, it is appropriate to distinguish between commercial and non-commercial bulk mail. Fifth, technical solutions are imperfect. While ISPs have had some success identifying the source of spam, spammers rotate domains and even change the key terms in a message to avoid detection. Similarly, typical users find it difficult to adapt filters and other techniques to accurately remove spam. There is always the risk that a filter will delete messages that the user needs to receive. Other techniques, such as challenge and response, may be too cumbersome for most users. Sixth, the long-time reluctance of the private sector to acknowledge the need for a legislative solution to the spam problem coupled with the Direct Marketing Association's active opposition to Internet privacy has certainly contributed to the problem. While the industry's desire to avoid regulation is understandable, here the failure to establish strong measures to limit spam are contributing to a tragedy of the commons that threatens to undermine the commercial potential of the Internet. Difficultly Consumers Face with Spam While ISPs clearly face a significant cost that can be measured in bandwidth, staff hours, hardware, and even litigation fees, consumers face the ongoing annoyance that spam simply makes the Internet less friendly and e-mail less useful. For the consumer facing a mailbox full of spam, even good software programs do not solve the problem of the time and cost of downloading e-mail before it can be analyzed and assessed. These burdens fall particularly on consumers in rural regions, consumers who are traveling outside the country, and others who are likely to pay high fees while connected to the Internet. The most widely used spam filters, while they can be effective, invariably under block and over block incoming mail. As a result, users continue to receive undesired e-mail and are losing important e-mails that may include business proposals or simply notes from friends. Some spam filters group incoming messages as likely being spam, but the consumer must still sort through the messages. In addition, many of the techniques proposed by some are simply impractical or nonsensical. For example, a challenge response method to determine whether e-mail is coming from an actual person would probably discourage even desired communication. Similarly, routinely changing mail addresses is an impractical solution as is trying to prevent one's mail address from being posted on a website where it can be harvested by one of the programs is not a workable approach as anyone who has a publicly accessible staff directory knows. A better approach for the consumer is one that empowers individuals to go after the spammers who misuse their personal e-mail address for unsolicited commercial e-mail and impose costs and burdens. Technical Measures It is clear that industry groups and technical groups are eager to find a solution to the spam problem. Many innovative approaches are currently being pursued even as some of the routine flaws that are exploited by spammers are fixed. Congress should continue to encourage technical solutions, but the possibility of technical solutions should not be a reason to avoid legislation. ISPs clearly favor better legal tools as well as better technologies to go after spammers when they can be identified. Moreover, without legal sanctions there is no practical basis to put an end to egregious spamming. There is one caution on the technology front that should be brought to the attention of the Committee. Several technological solutions, not surprisingly, focus on determining the actual identity of spammers, and would make identification through digital certificates and other means a requirement for sending e-mail to multiple recipients. While this approach may be appropriate for commercial speech, it would not be appropriate for political or religious speech. The Supreme Court has made clear in a series of cases that the right to speak anonymously is a central element of the First Amendment. Any attempt by the government to require identification for bulk e-mail that would include political speech would raise significant Constitutional concerns. Legislative Proposals S. 877, the CAN-SPAM Act, sponsored by Senator Burns and Senator Wyden, contains many important elements for a good anti-spam measure. All unsolicited marketing e-mail would be required to have a valid return e-mail address so recipients could ask to be removed from mass e-mail lists. Once notified, marketers would be prohibited from sending any further messages to a consumer who has asked them to stop. The bill would enable Internet Service Providers (ISPs) to bring action to keep unlawful spam from their networks. The legislation contains enforcement provisions allowing the Federal Trade Commission to impose civil fines on those who violate the law. State Attorneys General would be given the ability to sue on behalf of citizens who have been targeted by unscrupulous marketers. This a good starting point, but we urge the Committee to go further, particularly to protect consumer interests. As the Burns-Wyden measure currently stands, it is simply not a sufficient solution. It gives the FTC a great deal of authority and the ISPs many opportunities to bring complaints. However, for the state attorneys who are already on the front lines and for the users who are also saddled with the costs and burden of spam there is not enough in the bill currently to reform egregious online practices or assure that spammers will be pursued. Three critical changes are necessary to strengthen the Burns-Wyden measure. First, the Committee should endorse a full opt-in regime for unsolicited commercial e-mail except in those cases where a prior business relationship exists. Opt-in is the logical basis for Internet mailings. In fact, most Internet lists today are based on opt-in. These lists typically also provide users with the opportunity to update their contact information and remove themselves from the list if they choose. There are many opportunities for companies to obtain consent and to build online marketing techniques, in parallel with the traditional Internet lists, which would be welcome by consumers. Where there is a genuine preexisting relationship, then it would be appropriate to communicate by e-mail. Simply visiting a website is not sufficient. There should be some actual exchange for consideration before a ``preexisting business relationship is established.'' Second, the bill should incorporate a private right of action that allows individuals to bring action in small claims court, similar to the approach established by the Telephone Consumer Protection Act (TCPA) for junk faxes and telemarketing. The opportunity to pursue a modest judgment in small claims court has provided a useful incentive in the effort to stem junk faxes and would be helpful for spam. In fact, many of the state measures take an approach similar to the TCPA in recognition that those who are the target of spam should have the legal right to seek redress against those who are responsible for the spam. Also, as the TCPA has shown, a national do not e-mail list may help with enforcement, though technical experts have expressed some concerns about the possible misuse of a national Do Not Spam list. Third, the bill should not preempt state law. While it is clear that some revisions have been made to the CAN SPAM Act to take account of the important efforts of states to combat spam, the bill still unduly restricts state legislatures that have been on the front lines of the problem. Even with the FTC's important enforcement efforts, there is a real risk that a ``one size fits all'' approach will not be effective and will undermine the basic structure of federalism in the United States that allows the states to pursue different approaches to common problems. As Washington Attorney General Christine Gregoire stated on behalf of the Attorney Generals for 44 states, a weak Federal statute that preempts stronger state laws will reduce the level of consumer protection and facilitate the continued growth of spam. This would clearly not be a desirable outcome. House Proposals Several proposals are also under consideration in the House. Those bills that establish opt-in, provided for a private right of action, and leave the states free to pursue innovative approaches will respond to the spam problem most effectively. There is also an interesting provision in one of the House measures that would penalize automated harvesting techniques that are deployed for the purpose of sending unsolicited commercial e-mail. This provision may help with the spam problem. Additional Issues Mr. Chairman, you asked us also to address related issues that may be of interest to the Committee. I'd like to note that the problems of Unsolicited Commercial E-mail are likely to arise in a new setting that will impact million of consumers in the United States and that is cell phone based advertising. Although we are still in the early stages, it is apparent from the experience of other countries that consumers are beginning to express concern about advertising on their phones. If it is permission-based, there should be few problems. But if marketers begin to send bulk text messages or video messages to cell phone users, there will certainly be negative effects on the growth of cell phone based services. Already, providers in the United States are proposing to send e-mail to cell phones. There is also significant work on the spam problem underway in many countries outside of the United States, and in particular in the European Union. It is interesting to note that virtually all of these approaches rely on an opt-in and some private right of action. The approach taken in the European Union Communications Directive emphasizes permission-based marketing and the need to ensure that even after opt-in is established, consumers retain the right to opt-out of online marketing lists. Similarly, an extensive report from the Australian government on the spam problem released just last month urges the adoption of legislation based on prior consent where there is no preexisting business relationship; requires commercial electronic messages to contain accurate details of the senders names and physical and electronic addresses; and further recommends appropriate codes of conduct for marketers and effective means of enforcement. Finally, a joint resolution issued in 2001 by the Trans Atlantic Consumer Dialogue, an alliance of more than sixty consumer organizations in the United States and Europe, recognized that the use of unsolicited commercial electronic communication is a growing burden for people who use e-mail. The TACD said, ``governments need to work together to develop common approaches to address consumer concerns about unsolicited commercial e-mail.'' The group acknowledged the important differences between commercial and non-commercial speech, and urged the adoption of a policy based on prior affirmative consent. Conclusion Mr. Chairman, spam is a complex problem. There is no simple legislative solution. A multi-tiered approach that includes aggressive enforcement, better technology for identifying and filtering spam, and cooperation at the state and international level will all be necessary. In addition, baseline Federal legislation that gives users the opportunity to go after spammers and ensures that marketing lists are built on explicit consent and not on deception is a critical part of the effort to stem the tide of undesired commercial e-mail. Given the rapid increase in the spam problem in just the last two years, I urge the Committee not to delay action on legislation. References Prepared Statement of the Federal Trade Commission before the Subcommittee on Commerce, State, the Judiciary and Related Agencies of the Committee on Appropriations, United States House of Representatives, April 9, 2003 (Chairman Timothy J. Muris). Coalition Against Unsolicited Commercial E-mail http://www.cauce.org/ Commission Nationale Informatique et Libertes, website on spam. http://www.cnil.fr/frame.htm?http://www.cnil.fr/thematic/internet/ spam/spam sommaire.htm CNIL's Report on Spam http://www.cnil.fr/thematic/docs/internet/boite a spam.pdf EPIC Spam Page http://www.epic.org/privacy/junk_mail/spam/ FTC Spam Page http://www.ftc.gov/spam/ Federal Trade Commission, ``False Claims in Spam'' (April 2003) http://www.ftc.gov/spam/ CAN-SPAM Act, S. 877 (Senators Burns-Wyden) http://www.spamlaws.com/federal/108s877.htm Internet Society, ``All About the Internet: Spamming'' http://www.isoc.org/internet/issues/spamming/ Junkbusters http://www.junkbusters.com/ National Office of the Information Economy, ``Final Report of the NOIE Review of the Spam Problem and How It Can Be Countered'' (April 2003) David E. Sorkin, Spam Laws htp://www.spamlaws.org/ Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (``Directive on Privacy and Electronic Communications'') http://register.consilium.eu.int/pdf/ en/02/st03/03636en2.pdf TransAtlantic Consumer Dialogue (TACD), ``Resolution on Unsolicited Commercial E-mail'' (2001) http://www.tacd.org/cgi-bin/db.cgi?page=view&config=admin/ docs.cfg&id=98 The Chairman. Thank you, Mr. Rotenberg. Mr. Scelson, welcome. STATEMENT OF RONALD SCELSON, SCELSON ONLINE MARKETING Mr. Scelson. First off I would like to thank Senator McCain for inviting me here for this. I know I am probably the most disliked person in this entire room. I send close to 100 million e-mails out every 12 hours. The Chairman. You have shown a great deal of courage by coming here today, and we appreciate it. Mr. Scelson. There are a lot of things, listening to you speak---- The Chairman. Pull the microphone closer. Mr. Scelson. Listening to you all speak, I originally had a speech just like these gentlemen, but being here today, I have to get a little bit more of a feel about the things people do not like and what the Government's aspects of this are, and the e-mails I send out right now, the reason I have gone back to being a spammer--I originally started out, spam was not known as spam back then, but eventually started becoming one---- The Chairman. How long have you been in business? Mr. Scelson. Fifteen years. The reason e-mail has grown is, people still buy. My average complaint ratio is 1,000 people complain, close to 2,000 removes in a mailing, and a 1 to 2 percent response rate. If it is hated so bad then why do more people buy than they complain about it? Most of what the Government is not aware of, and certain ISPs, including Hotmail's newest filters that are here with us, leave out in detail to you all is, right now, the state laws, for instance, that say you have to provide a valid remove and ADV and a subject, their key filter, which was just updated on Thursday, I had broken as of Friday and released free to the other bulk mailers, has in there that remove word, unsubscribe, opt in. Well, now, you tell me follow the law, do not send spam, be a good guy. I would be a good guy and mail in the Hotmail and AOL, no offense, and their filters will filter this out. Now, if I do not use this, I am then accused of being a spammer. I agree with all of the people here, there is no reason to use proxies, there is no reason to use relays, and a remove is a good option to add in there for people to use. As far as the way we gather our addresses, most addresses for bulk snail mail are purchased from banks and a lot of companies. Your proposal to make extracting and gathering e- mail addresses and buying them is a good idea if this is also going to be added to the snail mail industry. What is fair for one is fair for the other. Personally, I do not get addresses this way, so it does not affect me. Most of the gentlemen that are here all offer a member's directory and I am a paid member of all of these clients. This member's directory is identical to a Yellow Pages providing e-mail name, phone number, and address. To automate software, which I have done for clients to extract phone numbers and phone books, is the exact same technology that extracts their members directory, which I am a paid member of, and this is granted free from AOL to give me access to all these users. AOL does have the highest filter system in the world, no matter what anybody thinks. I do this every day. I give them full credit for this. The biggest thing I find, most people also seem to forget when it comes to this, is the carriers right now are deciding and filtering whose mail gets what. Whether you are going to read and see our mail or not, this is censorship. I was brought up and fought for this, and still fight for this, because I believe in freedom. As an individual, what makes us free is the freedom of choice, and that is who should decide whether or not they are going to receive this mail or not. The Senator here does not like receiving e-mail. It should be his choice to decide whether he is going to receive it or not. I have heard the facts that it has risen the price of AOL and other companies' business to their customers, to increase pricing, and the burden of mail basically getting into their system. Some of these price increases are brought on by their own filters. At one time, you could send 100 messages, 100 people one message at a time, using less resources and less bandwidth. Their new filters now make it mandatory that we send one person one message at a time, thus chewing up their bandwidth and increasing their cost. On our end, I have one location alone that is $2,200 a week in bandwidth, so I keep hearing, the more we send, the less cost we have. The same bandwidth which you chew up on your end we are chewing up on our end. I am more than willing to work with any legislation to solve this problem. I agree spam is not the way to go. When I set up my company to not send spam and send 100 percent legal mail, we went above and beyond that to include a toll-free phone number, a physical address, a website, full information on the bottom of our messages, so that we were 100 percent we are above and beyond all common laws. The areas such as Qwest, which I have lawsuits against some of these carriers, AT&T, BellSouth, AOL I have had dial up accounts through that they have also terminated. If you mail 100 percent legal and they get a single complaint, they will turn around and kill your circuit, so A, we go out of business, or B, we then resort to forging the headers. The biggest complaint here is, you cannot find us. Well, if you could, you are going to shut us down, so why should we let you find us? The laws definitely need to be made. I keep hearing there is no one simple solution. If you look at my written testimony, which it will take Government backing, and I am sure AOL's people would like to look at this as well, it states in there a very simple way that costs no money on AOL's end, no money on our end, makes the tax dollars go back to the Government, because if I stay here in the U.S. I owe you tax money for all the money I am making, the customers, et cetera. You pass the laws, we go outside the U.S., operations get moved outside the U.S., and from what attorneys have told me, if the corporation, the incoming money and everything is outside the U.S., there is no tax dollars owed in the U.S. And basically, if you look at this system, it is very simple, to the point it does not cost money, and if the system's broken, that is where legislation again would have to enforce it. It solves the whole problem. As of right now the last carrier I was on was Covista. I was on them for 2 weeks, sending approximately 180 million e- mails a day. That is one e-mail per user in my database a day. I never send more than that. They shut me down for a total of 1,200 complaints. Well, when you look at the volume of mail I am pumping out, to get 1,200 complaints mathematically is nothing. I do honor my removes. Even to this day, I send spam because I have to cloak my circuits to protect them from being shut down, but I still run, still have an honor, have a valid remove. It is not known as opt out, it is not known as a remove because the filters would interfere, but words such as take me off your list is very understandable to a person receiving it, and very much honored. One of the other big problems in e-mail is, the anti-spam organizations preach, do not use the removes, we are confirming your address is good, we will not remove you. I cannot say there are not dumb people in the world. They are in every form of business and any walk of life, every nationality, it does not matter, but most companies I know of have the advanced technology that when I send an e-mail to Hotmail server, I know right out of the gate whether that address is good or bad, and if it is bad, instead of, because we have to force affirm addresses due to your filters, if that address is bad, my mailer will not send it to it, just to keep from clogging up anybody else's server, so since I know whether the address is good or bad or not, whether you ask to be removed, all that tells me is yes, you want the mail or no, you do not. I already know you are good. AOL, on the other hand's, system accepts everything, but AOL is nice enough to provide the undeliverable to everybody, so I still know if you are good or not. Agreed, there needs to be a solution, but just do not take the freedom away from the individual. This should be their right and not the carrier's to say, we are going to shut you down and we are going to block you. Most anti-spam groups that are fighting against spam are not Government-backed, Government-owned or anything. The reason Covista shut me down is that Spam House went to Qwest, which is Covista's carrier, and threatened to blacklist their entire network because every anti-filtering trick they hit me with did not work, and I still stayed 100 percent legal, and because of their threat Qwest passed it on down the line. I had to sue Covista for this. Now, between everybody here, it is not their fault. I do not feel I should have to sue them, but that is the way the Government works. The anti-spam groups that have no legal right are interfering and forcing these people to shut us down. The Pink Contracts, which is what got me really well-known, everyone thinks they are contracts to send spam. I can show these contracts to you. There is not a single word in that contract to send spam. The details of that contract define every state, what its law is, and that if I send mail staying within every one of these laws, they will not shut me down, which I should not have a contract to have to do this. My price for the bandwidth is three times higher when used for this particular means of doing it, and they still will step in eventually, once they get threatened enough, and shut you down, and most people are not aware of all of this. Most bulk mailers are scared to admit it because of the recourses that will happen. I have been fighting for so long that if I do not say anything and no one else does, then either everyone is going to really turn to the underground and become a really bad thing, or we can find a solution and work together. AOL has AOL's special offers. I am assuming you are familiar with this. It is their own personal spam company. They spam their own users with it, and I have received at my Hotmail account from AOL special offers advertisements to sign up for AOL, so the same people that are here complaining about mail send mail. Why? Because it is profitable to the client and to them. I am told there are a lot of cost factors in reading this e-mail, and the time it takes up on your end, Senator, when you read this e-mail, for you to go through it and push delete, which if we could use ADD you would know which ones are junk to make it a lot easier. When you read this mail and push delete, yes, it took some of your time, but if you are at home where you do not have the extra assistance of the people around you, you have to walk outside, go get the junk mail out of the box, read this junk mail--do you ever think of how many chemicals, pollution, trees and all are involved in this, and then you have to throw it away, so if you add the time it takes you to deal with snail mail versus e-mail, both of them cost you time and money. E- mail is less on that comparison. And that is basically all I have to say, and thank you again for having me here today. [The prepared statement of Mr. Scelson follows:] Scelson's Online Marketing Slidell, LA To Whom It May Concern, My name is Ronald Scelson and I am the owner/operator of a commercial e-mail company that sends bulk e-mail as a form of advertising for companies over the Internet. I feel my company is doing no different than any other advertising company who uses the postal service to send out unsolicited bulk-mail to your home. The only difference is we send this information via the Internet instead of the United States Postal Service. It all began with sending e-mail into newsgroups. It went from there to the sending of e-mail, as we know it today. At that time mail was just sent, we didn't care how. It was just pumped out and there were no removes. ``Removes'' is an industry term meaning--a hyperlink that will be sent back to the sender asking to have his/her e-mail address removed from your mailing list. When e-mail advertising started getting known by people as ``Spam,'' my company was one of the first companies to get removes and valid ``From'' addresses. Now, in response to the commercializing of e-mails, some groups were formed as ``Blacklisting'' companies. For example, SpamCop started interfering and getting us blacklisted. Note: These companies are not government- backed nor funded, they are typical ``everyday people'' playing the role of a bully. Intimidating Internet carriers to cut off service to my company and other companies paying top dollar for Internet Service. My belief is that this business is doing a legitimate form of advertising and when done correctly, makes the client, government, and the commercial mailers money. In response to the bully tactics used by the Anti-Spam hate groups, my company decided to go Opt-In. In order to do this, Commercial Mailers had to sign a contract with the carriers now known as ``Pink Contracts.'' They are said to be Spam contracts to allow the sending of Spam under today's terminology. What these contracts were really for was to force us to pay twice as much money as a normal business would for Internet Service. Allow commercial e-mail to be sent not ``Spam'' to people without shutting us down. Now what this really means is that all states have laws pertaining to e-mail and if you break this law the e-mail that is sent will be considered to be ``Spam.'' This contract allowed us to send e-mail as long as we abide by every state law. Meeting all of the requirements indicated by individual state law will not be considered Spam. This would also not be in violation of any ISP's (Internet Service Provider) policy. Now, when we sent the mail this way Anti-Spam (groups of people against Commercial e-mail that post your private info on their site. They also violate and interfere with current laws) groups would go to the carrier and tell the carrier ``Hey! We've blacklisted them every way we can they are getting around it somehow so either you shut them down or we will shut you down!'' Well, then the carrier shuts us down and breaks the contract. We have tried this with several companies. The last time we tried this doing it 100 percent legal the outcome was my circuit was shut down, we were put out of business and a major lawsuit--which to this day has still not been resolved. So, I was forced to go back to being a ``Spammer,'' where I could keep my Internet connection live and support my family. I believe that there should be guidelines and Spam should be illegal. But the only way this would work is when the carriers realize that we live in the United States and not a communist country! They provide services that aren't different than any electric company. They get paid not to read, censor, and destroy people's e-mail, but to provide a service! Now the individual has lost his/her right to get any e-mail he/she wants. The Carriers have determined that they would screen all incoming mail and only allow e-mail that the carrier wants the end user to receive. But not limiting themselves to their own advertising, that still to this day does not get screened. If I were to go into your Post Office Box, without your written permission, open your, mail, decide what I think you should have or should not have, I would go to jail for this. This is exactly what the carriers are doing, The government says they want you to identify yourself and put ``ADV'' (advertising) in the subject and not forge your headers. If I mail 100 percent legal you come across two problems: 1. The carrier, not the individual, filters ADV, then none of my mail will get in and I will go out of business, 2. If I identify myself and not forge anything, the 'SP will terminate my circuit for mailing legal and put me out of business. This is called legal mail, but I won't last a week and my line will be turned of For no legal reasons, except for the bullying power the anti-spam groups have. 1 agree with having laws governing bulk e-mails. But carriers should be held accountable when they submit to these anti- spam groups. Terminating service to companies; such as my own, without any legal reason to do so is not the democracy that we all should be living. I think it should be done the right way as long as the carriers know they will be shut down for blocking a company or shutting down a company doing it legally. Filters are designed for 1SPs to eliminate ``Spam''. Most of these people that design these are ``scam-artists.'' Think about it, if the server accepts mail in any way. Then there is a way to send bulk mail. If laws are passed to eliminate bulk e-mail, then the ISPs will shut down the commercial mailers. Then all the mailers are going to do is start corporations offshore and send their mail from offshore, now your laws and filters do nothing. Then, there is no taxable money being exchanged and money will be sent out of the country. This is not a solution, this is a joke! I designed a system 5 years ago because I believe in the freedom of the United States and the company that I stand behind. We should have the right to do our business in a legal way with out any interference from someone whom has no say so in the matter. The system that can stop Spam gives the freedom back to the people, It is very simple and very cheap, especially when you look at AOT. who spent 11 million dollars last year to stop Spam and it did not work. Most people are not aware when you hit the send e-mail button what all happens behind the scenes. Mail servers talk together just like people, if you send an e-mail to fjdhfjhdhsj @hotmail,com it will give an answer, error 550 user not available this means the address is no good. If you send it to [email protected] and my mailbox is full it will give an error 520 users mailbox full. Now my system is really simple and would be used by the individual not the carrier to stop Spam. They all have buttons in web-based e-mails example (Send mail) all you have to do is put an option ``No Bulk E-mail'' and put a check in the box. What this will cause to happen is when I send an e-mail to you, I will see an error (example: 420) at that point, I know this user does not want e- mail. This could only work if legislature enacts a law that would require Commercial mailers to look for this error when mailing. They would also be held criminally liable if they ignore and continue to send mail to these accounts. If you mail without forged headers, a valid from address, contact information and ``Adv'' in the subject they cannot shut you down or block you. If they do, there should be a fine imposed on the ISP. There would be no need for removes. Users are complaining they didn't ask to receive the mail so why should they remove themselves from 2000 plus different e-mail companies; they are right this system eliminates that problem. Reporters have interviewed me several times on this issue; and the articles have always focused on the money being made and never mention the cost that ``we'' as Commercial Mailers have to put out. The bandwidth at just one location cost $2,100.00/wkly, which is approximately $110,000.00 annually just for one carrier. AOL says they spend millions stopping Spam. This is a cost factor they brought on themselves and are passing on to the consumer. They are spending money doing something they should not be doing in the first place. I find this to be illegal, immoral, and unconstitutional. An example of this, is if I take a gun and shoot someone, the gun doesn't go to jail for murder, I do. I, as a human, squeezed the trigger. Well, AOL puts a filter in place that reads, censors, and destroys legal mail THIS is illegal. They get away with this because they say a human does not read these messages, but a human did press the enter key to read and destroy mail. What is the difference? Some people state that snail mail is okay because you pay the post office to send it. We are more like private carries like UPS and FedEx. (UPS and FedEx are registered trademarks to the individual companies. They are not in any way affiliated with my company.) A customer pays a private carrier to send mail. This company then pays the costs for fuel, drivers, and the truck to deliver the mail. As a customer pays us to send mail, we in turn pay for the servers, networking, electricity, and technology to deliver the mail. The ISPs say that ``Spam'' is chewing up so much bandwidth they are right at the end of capacity; this is their own fault. Part of ISPs Anti-spam filters do not allow high ``BCC'' (blind carbon copy) I could set my BCC setting to 500 for every 500 people who get this e-mail I will use up a total of 33k in size (est. the ad is 33k). Since this filter is in place, I have to mail at 1 BCC, which means that if I send an ad to 500 people then it would be like 500 times 33k. Now I have consumed 1.6 megabytes of bandwidth for those 500 people. So, now you see why their cost went up, They say ``Spammers'' break laws, well here are some examples: If we use ADV it, we are blocked. If we use Remove or unsubscribe, we are blocked. If we use the same ``From'' address that is valid, we are blocked.. If we send too many e-mails from one IP, we are blocked. So, we have two options: (1) Break the law and stay in business or do it legal and go out of business. (Meanwhile these carriers continue to violate the laws that are passed and for a touch of proof if you go to this website there is a list of common filters look for yourself. http://www_mirror.ac.uk/sites/spamassassin.taint.org/spam assassin.org/tests.html) (2) If the government wants to pass laws it needs to be fair to everyone involved. The Commercial Mailers and the Carriers. But not allow these Anti-Spam groups to get away with threatening peoples lives just to feel that they have the power to control a company's destiny. Every state should have the same law to eliminate any possibility of violating these laws. This is necessary, due to the fact, that it is unknown where the recipient of an e-mail resides and whether or not you have violated any laws. I don't believe you should e-mail private servers. AOL, Hobnail, Yahoo etc. provide consumers a service offering e-mail addresses. The consumer should have the right to choose to receive and sort his or her own mail, not the carrier. Laws and Censoring (filtering) e-mail are not going to work, it will only drive the price up for the smaller companies. As with the larger companies, like Norton's System Works,. Which sold more copies than ever before with e-mail. Due to the reduction of the marketing and merchandising costs, the product was made available to the consumer at $39.95 in contrast to the $299.99 retail cost in stores. I consider myself living the American dream. I went to school in New Orleans where it was plagued by drugs and weapons. This is not what school was meant to be. I managed to survive the experience and ended up in a low-income neighborhood, still filled with drugs and violence. Even with a GED, I could not give my children the life I believe they deserve. So I started my own company and taught myself how to accomplish these things. In doing so, I found a way to create a business, provide for my family and put my children through a better school environment than I had. This to me IS the American Dream; freedom to grow and become something you dream of being. For doing this I was criticized, shut down, put out of business and threatened. I hope by me coming forward, this will show the untold side of the story that these anti-spam groups don't want you to hear. Please allow yourself to be open-minded and compare this industry to bulk mail. The differences between the two are that when you receive mail at your home, You open it, read it if you want, then throw it in the trash. You then have to carry that trash to the curb, where it is then hauled away and used as landfill (like we don't have enough trash already). Not to mention the trees that are cut down for the paper used! Then there is the Electronic Mail (E-Mail). If you don't want it, just check off DELETE. No mess, no cleanup, no pollution. I think my way is better! If there are any questions or comments, or if I could be of any service, please don't hesitate to contact me. Respectfully submitted, Ronald Scelson. The Chairman. Did you say that it took you less than 24 hours to break one of Mr. Salem's filters? Mr. Scelson. Yes, sir. The Chairman. How do you feel about that, Mr. Salem? Mr. Scelson. Excuse me, on his part, to defend him, something most people forget is, if a server accepts mail, obviously there is a way in. Unless the server does not accept mail there will always be a way in. Mr. Salem. So I think that it is pretty clear that spammers have an economic incentive to try to avoid filters. One comment that I will make is that the way our solution works, we actually have set up a very elaborate system that basically only receives unsolicited bulk e-mail, so any mail messages that are being blocked are not based on words such as remove or unsubscribe, or anything else, so what that means is, if you hit our decoys, by definition, that decoy never requested the mail, so we are able to say, yes, it is definitively spam, and what our customers contract us to do is block that mail. I will tell you that we will continue the fight, because that is what our customers want us to do, and over the next couple of years I am confident we will solve this problem. The Chairman. Mr. Leonsis, are you a spammer? Mr. Leonsis. Well, I would like to hire you. [Laughter.] Mr. Leonsis. We would probably have a better relationship if you were on our side of the fence. I took a couple of notes during your comments, and very articulate, very heartfelt, and we have not raised prices to our members because of spam. We are absorbing that cost. We are taking an advocacy position for our members. With AOL, when you sign on, and since you are a paid member you would know that there is a terms of service, and our privacy policy, and we do not allow any member or any company or any partner that pays us to spam our members. We have preferences that allow you to opt out of AOL e-mails, AOL pop- ups, and we promote that. In fact, we have been actively promoting that off of our front screen, and so you have been violating TOSS, and I am sure you have been opening multiple accounts. In regards to how they are getting e-mail addresses from member directories, that is a shame. AOL has always considered itself a community, and we have been able to get people to locate other people. My mother, as an example, died of breast cancer, and when she was sick she would go to the member directory to try and locate other women who were recently diagnosed with breast cancer. She certainly was not going to the member directory so that she could get e-mails that were unwanted or unsolicited or pornographic, and that is why that part of the business across the industry has shrunken, because people are gaining knowledge of what the tricks are and are now looking at their identity as being something that they need to protect. So while I believe that marketing is important, I also believe that e-mail is not a medium, that e-mail is more a utility. It is something basic and fundamental. There are places on ISPs and places on services that you can buy advertising and reach out to members, it does not trick people, and we need to kind of separate out kind of the myths from the facts of how commerce is done. The Chairman. Mr. Scelson talks about Pink Contracts. What do you know about that, and do you believe it is prevalent today, and I will ask Mr. Hughes and Mr. Rotenberg the same question. Mr. Leonsis. We are taking a different approach right now. We do not look at black lists. The Chairman. My question is, do you know about Pink Contracts and do you believe it is prevalent today? Mr. Leonsis. I am not aware of how prevalent or not it is. What we have really done is say that how we look at what spam is, it is not our opinion, it is our members' opinion. We every day baseline where the complaints are coming, and the ones that rise to the top and get escalated, that is what spam is, and we have really no opinions on it. We have a very, very large, active community. We let them report in, and the numbers do not lie. When our members say, this is spam, that is when it gets blocked. The Chairman. Mr. Hughes, do you know of the Pink Contracts that Mr. Scelson refers to, and Mr. Salem knows about them. Maybe I should ask him next. Go ahead, about the Pink Contracts. Mr. Salem. There are definitely relationships between marketers and ISPs, and oftentimes we are asked to make sure certain mail is not blocked. That is absolutely the case. as far as the details of those agreements, I am not aware of those details. The Chairman. Mr. Hughes. Mr. Hughes. Clearly, we have heard of Pink Contracts, and as we understand it, Pink Contracts are paid for delivery contracts. I am not aware of any of my members engaging in those practices, but let me say that we truly are in a Spy v. Spy situation. We have heard on the other end of our panel here today that AOL on the one hand is building more robust filters day by day by day, and spammers on the other side are working at ways to avoid those filters. As a result, the legitimate players in the middle delivering transactional messages, the consent-based marketing messages, have to build relationships with ISPs in order to make sure that wanted mail is actually delivered, and in some situations this is actually critical mail to have delivered. For example, it could be an airline ticket confirmation. It is a transactional message that is delivered in volume. So I can tell you quite definitively that a year ago, 18 months ago, none of my members really had resources that were dedicated to ISP relationships. In other words, delivery relationships. Today, most of my members have at least one, and sometimes they have full staffs. The Chairman. I was referring to the relationship of spammers and ISPs. I am talking about the illegitimate contracts, not the one where you get an airline ticket. Mr. Hughes. Sure. We have definitely heard of the practice. I have never heard of it within our organization. There definitely is a place, though--I want to make sure it is clear, there is a place for a dialogue between senders and ISPs. The Chairman. I understand there is room for dialogue between all the mail recipients and senders, but if there are contracts that go, that actually not only condone but contractualize the practice of spamming, then we have got an issue here. Mr. Hughes. I would agree. The Chairman. Mr. Rotenberg. Mr. Rotenberg. Mr. Chairman, I am not familiar with the practice, but I do want to say briefly that I would challenge Mr. Scelson's assertion that he gets 1 to 2 percent response rate on his mailings. I find that very hard to believe. The Chairman. Well, we will let Mr. Scelson respond, then. Go ahead. Mr. Scelson. I can pull lead stats from one of my servers off my laptop top show you what it did before filters were kicked in, after filters were penetrated. The 1 percent is the most average. There are a few exceptions, and one good exception to this was Norton System Works was a reseller, was a client of mine. AOL is very familiar with that one. I know they got hit hard with it. I think they also have a lawsuit involved in that one, too, if I am not mistaken. The Chairman. Mr. Scelson, one of the things that disturbs a lot of us about this, and maybe you could comment on this, does it disturb you that so much of this is pornography, and occasionally child pornography? Mr. Scelson. Yes, sir, totally. I personally do not send any adult material, have not sent adult material, and do not intend to, no matter how this boils out. The Chairman. But it is up to--I understand about 20 percent of the spam. Mr. Scelson. Yes, sir, it is, and most of the bad names that all e-mail companies get is not Norton System Works being sold that is really making people upset, it is the adult industry. Personally, you and I, even though I will not mail it, Playboy advertises that in the real world today nobody frowns on it. Why? Because it is kept very low key. There is no nudity, there is no vulgarity, unless you are a paid member. The porn you see in your e-mail today, all of us have seen, and it is just dreadful. My daughter is 9 years old, and she uses the computer quite well, and she sees this, so I understand where you all are coming from this, and totally agree with you. The Chairman. My time has expired. Mr. Leonsis, you want to make a comment? Mr. Leonsis. I think as an ISP, as I stated earlier, we have a very strict covenant with our members on privacy and security. It is called Terms of Service, and we never enter into contracts to allow spam on our service. It is why the most egregious spammers we are taking to court, and you have to read TOSS. It prohibits unsolicited bulk e-mail, and that applies whether you are one of our partners or not. We have people that pay us a lot of money, and sometimes it gets escalated to me on why cannot we spam, and we say, that is not what our rules allow, and so again, this is a utility function. You cannot just look at it as media, and an efficient way to deliver ad messages. The Chairman. Well, again, I was not challenging your organization, but if the so-called Pink Contracts are in existence, then it is something we have to deal with. Mr. Leonsis. There are none in our organization. The Chairman. But there is ample testimony that they are in existence. Mr. Scelson. Senator McCain, again the contracts are not to send spam. The contracts are to send e-mail that obeys all the laws. There is no such thing as a spam contract. If you are going to violate a law, I have not seen a carrier yet sign a contract for this. The Chairman. Now we get into definitions. Senator Wyden, do you want to go, or Senator Burns? Either way. Senator Burns. I have a couple of questions, and I will tell you what I am going to do, I am going to set up a private little appointment with a couple of you, because we need to explore some of this a little bit further. We have heard you may get legislation that has unintended consequences, and that worries me a little bit, and Mr. Rotenberg, you are exactly right about some of these areas. As you know, I am a free marketer. I like that, and I do not want to get into a situation where we do have unintended consequences. In other words, when you come up here and serve in the Senate you sort of file back here the little saying that says, do no harm in everything that you do. I am wondering if this legislation--now, this is the first time I have run into Pink Contracts. Now, you would have thought I would have picked that up along the way, but us country boys, we do not pick up everything. This tells me that should you pass a law that you are actually falling into forcing people into the grips of maybe an enterprise that another middle man in business that somebody does not want to pay just to get your message to a legitimate message of what you have a return address that you really want to do business on the Internet, but you are putting another middle man in there, injecting one in there that is going to drive the costs for both the consumer and the person that is doing business. Is that a false way of looking at things? It was not explained very well, but you understand where I am coming from. Mr. Salem. If I could make a quick comment, I think there has to be a way to identify legitimate marketers, and that is something that is going to become very, very important so that we can deliver messages from airlines or car companies, and so there is going to have to be relationships between the direct marketers and the carriers to make sure that that can happen, because what has happened to date is because some of those relationships do not exist. They are all being treated the same in many cases. Mr. Leonsis. Nine million reports a day on spam, and I cannot remember the last e-mail I received from an AOL member saying, please send me spam, so I understand the concern about erring, or the pendulum swinging too far, but it is way over here right now, and the laws that we are in discussion about today are very good steps, and as an industry we are going to work with our State AGs, and we need your help to get that pendulum back into a balance. Senator Burns. If anybody wants to comment on this, because it is sort of an interesting idea. Mr. Rotenberg. I think it is a very important point you make, Senator. Consumer groups are not against the use of the Internet for advertising. In fact, one of the wonderful things about the Internet for the consumer is the ability to get great prices on stuff you want, to be notified about books and authors that you are interested in, to get travel deals, and a lot of people are signing up for those lists to get that information because it frankly gives them a good deal. The problem, and I agree with Mr. Leonsis, the pendulum has swung so far in terms of the amount of marketing that the stuff you desire is just getting drowned out. You cannot even find it any more, because there is so much junk you are getting with the commercial marketing that you would like to receive, so I think legislation is appropriate. I want to be clear on that point. I think there is always a risk of unintended consequences. I think legislation will help. I do not think it will solve the problem, but I am sensitive to this issue of not closing some doors you might want to leave open, and the question of state enforcement, particularly if they are issues around illegal business contracts, suddenly becomes very important. Senator Burns. Anyone else? I want to hear a comment from all of you, really, basically. Mr. Hughes. Senator Burns, this is clearly complex problem, and unintended consequences exist today. I would like to give you two dystopian visions of the future we have about e-mail. One is, we allow spam to proliferate, and all of us stop using e-mail because our inboxes have become so choked with spam. The other is, we use blunt instruments to solve spam, and in the process of fixing the problem we kill the killer app. We kill e-mail. That emerges in something called false positives. False positives are wanted messages that are unreceived because of a filter or black list or some other tool to block them. What we have seen in the marketplace today, there is a study that came out from a company called Assurance Systems, is that in the fourth quarter of 2002 there was an average 15 percent false positive rate across the top 10 ISPs. That means 15 percent of wanted messages, of legitimate messages were not being delivered the inboxes of recipients. That is one of the unintended consequences of the blunt instruments that we are using. We need a much more balanced system to make sure that we kill spam but save e-mail. Senator Burns. Yes, sir. Mr. Scelson. Senator, I do totally agree there needs to be legislation on it. Again, the solution that is in my written testimony that I gave you all, you all have not got to see this yet. I am sure you will see it before the end of the day. It is a no cost factor. It is very simple. There is no loss of unwanted mail, and one of the biggest complaints I have heard from people I send mail to is, there are over 2,000 bulk mail companies, not 200, that I am well aware in full existence out of 2,000 bulk companies you did not ask to receive mail in the first place. Why should you have to remove from each one? The Government gets involved with the remove. Why should the Government have to spend tax dollars on a global remove system? The system I propose costs no money and gives the power back to the people. The other thing I am looking for from the Government is, if I mail 100 percent within your laws, that companies like Brightmail will not filter the removes that are mandatory on us, and that carriers like BellSouth and AT&T and MSN will not come in and shut my circuits down for sending legal mail, and right now that is basically what they are doing, so I cannot reveal who I am, but they are right, we need to. Now, the same people that fight the spam have websites up that I used to reveal exactly who I was, and everything about the company website, the whole info. These people have my children's school on their website, my children's social security numbers, they have threats in there that if nothing else can stop me, maybe we should do something to their family. They are not bluntly saying go out and hurt them, but they are pushing strong accusations. I have never seen AOL or you all do anything like this, but a lot of these big anti-spam groups that were at the FCC hearing, it is on their website. You have the Internet, look for yourself. All I ask is, open your eyes to see it all. Senator Burns. I am going to go to Senator Wyden now, but I appreciate those comments, and sure, we will take a very serious look at this, because I am still--we think we are on the right track with our piece of legislation, but that is not to say that we are written in stone of a better idea or something that could be incorporated with what we are doing, and we will probably explore that as we move along. Senator Wyden. Senator Wyden. Thank you, Mr. Chairman. All of you were excellent. Mr. Scelson, a question for you to see if I can get it straight. You said that you were above-board and complying with all the laws and trying to act in a straightforward way, but I think I also heard you say, and I just want to clarify this, that you are, in fact, disguising the source of the e-mail because you believe otherwise you are going to get blocked by ISPs, is that right? Mr. Scelson. Senator, that is a two-part question. I have not sent 100 percent legal mail in the last 6 months, since my last carrier breached a contract for sending legal mail. Since that time, again, if I send right off of one IP their systems detect how many e-mails come from one IP, will block this. If I send right off of my real IP, the carrier will come in and yank the circuit from me, so I have no choice but to hide this. I do not want this. If I am told today, you mail legal we will not shut you down, my spam days are over with. There is no need for spam. There are legitimate ways to do this. Senator Wyden. I understand that, and that is really what is at issue, and to your credit you are being very honest. What I think has concerned Senator Burns and I now for 4 years is that the bottom line is, is that the recipient of the e-mail cannot really tell where it is coming from, number 1, and number 2, if the recipient, again empowering the consumer, wants to tell the ISP to do certain things to protect them, the recipient is not in a position to do it. That is why we are trying to come up with a legislative solution here. And just a couple of other points. Is there any dispute among you five about the urgency of this effort, because I will tell you, it just seems to me that the volume of spam today really has the potential of poisoning the medium, and doing it in a real hurry. If you look at how fast it is going, I have been at this for three or 4 years now, and I am going to be looking at Senator Nelson, who has an attractive idea, and Senator Schumer has an attractive idea, but you know, those ideas of sending it to the Federal Trade Commission for 45 days, giving the exponential growth, I want us to move now, and I would just like to make sure that all of you are clear for the record how urgent this is, and if it is not done quickly, you are really talking about the potential to poison this medium. Mr. Hughes. Senator, if I could, we needed legislation last year, we needed it yesterday, we need it as soon as possible, but more important than Federal preemptive legislation is, once we have that, we need strong enforcement. Legislation will be useless unless we create the deterrent effect that it is intended to create, so we are very supportive of legislation today. Senator Wyden. I will tell you that beyond the fact that the Federal Trade Commission 2 years ago said that the enforcement model on the Burns-Wyden bill worked well, I am absolutely convinced, having worked on these issues since the days when I was Director of the Gray Panthers, that you bring a modest number of enforcement actions--you are not going to have to bring hundreds, but you bring a modest number of enforcement actions that are tough, that send a real message out there, that there are going to be consequences, that there are going to be significant consequences, and I think you change the world out there in the cyber arena. The only other point I wanted to make sure we were on the record, Mr. Rotenberg, you know I have enormous respect for you and what your organization does. We work with you on everything from the total information awareness program to CAPS, privacy issues and the like, but clearly what the states are doing is not working. We have got 30 states now that have enacted anti- spam statutes. If this was going to be solved at the state level, it would seem to me what the states would have put together collectively would have been more effective. Do any of you disagree with the proposition that Senator Burns and I have been advancing that this has got to be dealt with at the national level? Mr. Salem. Just a couple of comments, Senator Wyden. First, there is definitely an urgency on this problem right now. A lot of the state legislation has talked about labeling. Labeling has not proven to help us solve the problem, so I think that is something that does need to be looked at as your bill continues forward. I think the other thing that I would say is that we are going to need to invent some technology, because in my testimony I said 90 percent of e-mail today is untraceable, so there is some form of deception that is making it hard to identify who is sending it, and that is why I am surprised it took 24 hours. I think that is good, because we actually have data filters every five to 10 minutes to try to stay ahead of the spammers, because that is what is required to block and keep spam out of inboxes, so we absolutely support what you are doing. We would like to continue to help shape it so that it can be enforced, but there is going to have to be some technology invention so we can track who is the originator of that mail. Senator Wyden. It is a fair point, and that is one of the reasons we tried to give a wide berth as it relates to the enforcement tools. We have got four enforcement tools, we have got flexibility for the Federal Trade Commission, because we know that the spammers are not technological simpletons. They are people who are constantly going to be on the cutting edge, and you can act on Tuesday and they will be devising something on Thursday. The last point that I wanted to ask about was the question in the New York Times report yesterday that indicated that in the last 2 years 200,000 computers worldwide had been hijacked without the owners' knowledge, and are currently being used to forward spam. Now, in our legislation, we say that you cannot use an originating e-mail address the access to which was obtained by means of false or fraudulent pretenses or representations. We think that that might have been a useful tool had it been enacted to try top prevent the hijacking, but I am going to turn this over to Senator Nelson to wrap up. We would just like you to look at that language, because it may need some tweaking, but my sense is that had that part of the Burns-Wyden bill been on the books, that could have been used to derail that very serious hijacking situation, and we would like you to work with us, and I am not saying this is the last word. Mr. Rotenberg. Mr. Rotenberg. I wanted to say we very much supported the efforts to pass Federal legislation. We think it is necessary. We think your bill is a good model. We completely agree that there has to be a strong national approach. I think the FTC has done good work and the workshop was good, and I think the enforcement intentions are there. As I said, I think the real concern is simply, if you close the door on the states, which is not to say that they solved the problem, but if you largely prevent them from pursuing the problem, then I think that raises some problems, but beyond that, I think there is a lot of support in the consumer community, and it was the consumer groups actually a couple of years ago, to their credit, that said we have got to get a handle on the spam problem, because otherwise the Internet is going to be largely useless in terms of consumer use, and the groups that we have worked with have said, make this a priority, so I think if it can be done right, it will be a great accomplishment. Senator Wyden. You are absolutely right. We would not be anywhere near where we are without the consumer groups, and you are absolutely right on that point. The reason that Senator Burns and I give that activist role to the state Attorneys General to bring actions is that we think, again, that they bring a modest number of those actions, and that is a significant deterrent. And my final message to you five, because you have been excellent, keep the heat on us and do not let the Congress dawdle on this. At every possible stage for the last three or 4 years Senator Burns and I have been up against this argument. Well, now is not really the time. We need to study this. We need to send it to the Committee on Acoustics and Ventilation and let them look at it for another 6 months, and we cannot afford it. Ted Leonsis has made the point that this has grown so dramatically that we cannot afford to let that happen. There are a lot of good ideas in the Congress. We should look at them. You should tell us how to make them fit into an integrated system, but my message is, do not let the Congress dawdle now, do not let the Congress delay, so that we can get this passed. Mr. Chairman, are you going to chair? I know Senator Nelson had some questions. Senator Burns. I do not have any more, and it is almost lunchtime, and I have never missed a meal and by God I do not plan to. Senator Nelson. Well, you can just turn the Committee over to me. [Laughter.] Senator Burns. We already did that a while ago and it did not work, Senator. [Laughter.] Senator Nelson. We got a lot of business done while you were gone. Senator Burns. You proceed on, please, Senator. We signed on for the term. Senator Nelson. Mr. Chairman, one of the characterizations that I would modify in some of your characterizations, your concern naturally about impeding the normal intercourse of commerce, and that is a legitimate concern also expressed by Mr. Scelson, but the difference, I think, that I would look at it, you gave the example of walking down the street and seeing advertisements, and that is in a public domain. I think when you get into personal mail coming into a personal box sitting in your personal home, then it is a little bit different, and that is what I think rises this to the level of concern where I think we are going to have to have some criminal laws applicable. I would love to have your response to that. Mr. Scelson. Senator, based upon what you said is basically the reason I am fighting. That choice is the individual's right. No offense to any of these individual companies. They should not decide if they are going to censor, read or destroy your legal mail. As an individual, that should be that person's right to decide. If the carriers did not shut you down for doing it the right way, ADV is a way that as soon as you open your e-mail you know you can get rid of it. My IPs would never change. If the individual wanted to block me, I have no problems with this. It is the companies that are going in and destroying your mail. If I go to your office and decide to go snoop through your mail and decide what you are going to get, I am not going to make it out the front door without going to jail, but at the same time, these filters are taking from your rights. They say a computer is doing this. There is nothing wrong with it. A human does not see this. Well, as an example, if you shoot someone with a gun, the gun shot him, not me. But I am a human, I squeeze that trigger, I am responsible. When they filter and censor people's mail, a human is sitting in that entity. A human is responsible for destroying your private mail. It is the same scenario. What you are saying is absolutely correct. Senator Nelson. Well, the temporary Chairman characterized the problem at one point as weeds, weeds growing up, you use some Round-Up on them, get rid of the weeds, and I interjected with a big smile on my face. I said, it is not weeds, it is snakes in the weeds, and when the pornography starts coming at me, I think that is poisonous snakes, and that is where we have got to figure out some way to draw the line. Let me just ask one final question. Twenty-nine states have grappled with this, the most recent of which is Virginia, which has the strongest law, and so since Mr. Leonsis is from Virginia, what do you like about the new Virginia law, and are there parts of that that could serve for us to incorporate in this Federal legislation? Mr. Leonsis. Well, the Virginia law really worked in tandem with what we can do commercially, and where we like the law, it really does give teeth especially to the Attorney General, and I think in all cases at the state level it is the Attorney General who has to go in and do the biting, and I think what is really important is that there be a rules of the road on a national level, and the states, looking at their individual laws we will have to deal with, it would be much better if we had a unified view from the top down, but we always need to be able to empower the AGs to go execute the law state by state. Senator Burns. If the Senator would yield, what drove us in this direction, Senator Nelson, was the fact that some of us that has been here for a day or two know and understand and see the ramifications of trying to pass legislation that one size fits all for 50 states, and it does not work. We tried to write policy in agriculture, I mean, a host of things that it just does not work, so that is the reason we did not want to take a giant step that erodes the state's ability to deal with the situation. That is the reason we went down the road we went down. Senator Nelson. Well, I would just give in response, from the basis of my experience when I was in the state legislature in the 1970s, I passed the first computer crimes law in the Nation, giving prosecutors the tools to go after the more sophisticated type of criminal that was using a computer instead of a crowbar. When I came to Congress, I passed the Federal computer crimes law. Now, it was a law that had Federal application, but it supplemented what the states were starting to do, and we have got to kind of find this balance. I can understand Mr. Scelson. He would be going nuts if he had to deal with 50 different state standards, and so somehow you have got to have perhaps if there is a stronger standard in a state, that that takes precedence over the Federal law, but that there would be a uniformity with the Federal law to which they could then comply. Mr. Scelson. Excuse me, Senator, what I am about to tell you has never been challenged before, and very few people are aware of this. There is a website called w3c.com. It is all the guidelines that were presented by the Federal Government when the Internet was released to the people. In those guidelines it states, ``states do not have the right to pass laws pertaining to the Internet.'' It has not stopped anyone. It has not been changed on that site, so if that is true, then Federal law is the only way to go with this, but as of so far, no one has ever fought or challenged this to my knowledge. Senator Burns. Well, thank you, and Senator Nelson, we thank you for your participation. We are going to leave this record open for a couple of weeks if there is something else, and there are other Senators that will probably want to make inquiries, so if there are, you can respond both to the Senators and the Committee, and we thank you for your testimony today, and this Committee is adjourned. [Whereupon, at 12:30 p.m., the hearing was adjourned.]

Which of the following is a side effect of the growth of Internet advertising?

Which of the following is a side effect of the growth of Internet advertising? -More and more advertisers are moving ad spending away from traditional media to the Internet.

Which of the following are the three 3 primary consumer motivations that the vals strategy considers when grouping consumers into two 2 types?

VALS includes three primary motivations: ideals motivated, achievement motivated and self-expression motivated.

Which of the following are the three primary consumer motivations?

Primary Motivation: Ideals, Achievement, and Self-Expression VALS includes three primary motivations that matter for understanding consumer behavior: ideals, achievement, and self-expression.

Which statement about advertising agencies like WPP is true?

Which statement about advertising agencies such as the WPP Group and Omnicom is TRUE? They are mega-agencies controlling a majority of the advertising dollars spent around the globe.