Skip to the main content

The objective of the Internet Safety Technical Task Force's Technology Advisory Board (TAB) is to evaluate and assess the range of technologies that may be used to promote children's safety on the Internet.

Through its process, detailed below, the TAB received the following technology submissions:

ALIAS Technology LLC
Appen Speech and Language Technology [DSPT][TAT]
Aristotle
Assert ID
BeenVerified
Chatsafe
ChatSafe (Patent Pending) [update]
Choicepoint
ContentWatch/Net Nanny
Covenant Eyes [Unfiltered Version][Filter Plus Accountability]
Credint
DeepNines
e-Guardian
EthoSafe
Gemalto, Inc.
GenMobi Technologies, Inc.
icouldbe.org
Identity Corp
IDology

Infoglide Software Corporation
InternetSafety.com, Inc.
Keibi
Kidsnet
Kelly Maloney/RedStarhs [update]
McGruff SafeGuard
Microsoft
NetIDme Ltd
Portcard
Privo
Privo/Parity
PureSight Technologies Ltd.
RelyID
SaferSpace/Zemerick Software, Inc.
Sentinel [A.D.A.P.T.][SAFE]
SpectorSoft
Symantec
VerificAge [update]

Some of these submissions were presented publicly in September 2008. The ISTTF Open Meeting page includes these, mapped to the agenda, along with: accompanying slide decks; presentations from Facebook, MySpace, and WiredSafety's Teenangles; two "non-technology" presentations, and video of the day and half-long meeting, including welcoming remarks and open discussion. Comments from TAB Observers can be accessed below.


The Review Process

The TAB will undertake a technical review of the technologies submitted for its consideration and make public the results of this review. The review will attempt to determine whether the technologies works as described and how well protected they are from circumvention. The review will also attempt to determine the infrastructure and the operational requirements for the technologies.

The Role of TAB Members

TAB Members participate fully in both the design and execution of the review process for the technologies submitted for its consideration. Only Members will participate in the actual review process and only they will generate final conclusions and recommendations for the Task Force.

The Role of TAB Observers

TAB Observers will participate in the design of the review process but not the execution of the reviews. Observers typically have useful industry experience and domain expertise, but also potential conflicts of interest.  To mitigate any potential for bias, their involvement with the TAB must be limited. So, to be explicit, Observers have already and will continue to assist in the development of the review process (e.g., the creation of the Submission Template, the development of a taxonomy, the Evaluation Form) but they will not participate in the actual review process itself. Observers will, however, have access to the technology submissions and can submit a document called an "Observer's Comment" for any technology they choose that will be included in the final documentation of the TAB's work to the Task Force.

Observer Comments

CDT Comments
Polytechnic University Comments
Jeff Schmidt Comments


Call for Technology Submissions

The TAB is asking to receive submissions from individuals, companies, organizations, etc., with technologies relevant to child safety on the Internet. While this Task Force is focused in large measure on age verification and identity authentication technologies in the context of social network sites, we are not limited to any specific type of application; we are also interested in technologies that address other types of social media (IM, chatrooms, texting, etc.) as well as those that address Internet access more broadly. We will review these submissions and ask for further information and/or in-person presentations for technologies that have significant promise or about which we have questions.

Some categories of technology we are interested in receiving submissions for include but are not limited to: filtering, blocking, parental controls, labeling, rating, identification, authentication, age verification, imaging, search, and forensics.

Submission of Technologies for Review

To guide this process, we have prepared a Template for submissions. The Template is a formatted Word document that you should download and use to prepare your submission. The Template includes formatting information as well as notes about what you should include. The audience for your submission is technical, consisting primarily of computer scientists; your submission should be written with that audience in mind.

To have your technology included in the Technology Advisory Board's evaluation, please download the Template below, fill it out, and submit it as a PDF to tab@cyber.harvard.edu. This submission will be given to all TAB members for review and it may be made available to the public. We ask that you use the Template for consistency of style and content – please do not submit a press release or PowerPoint deck.

The deadline for submission is July 21, 2008.

Internet Safety Technical Task Force Technology Submission Template

Should we have any questions or follow up about your submission, we will contact you. Should you have any questions for us, please contact Jessica Tatlock at jtatlock@cyber.harvard.edu. We apologize in advance that we may not be able to respond to all inquiries.

Legal Disclaimer

The Berkman Center, the Task Force and Task Force members, and the Technology Advisory Board, including its members and observers are under no obligation to maintain the confidentiality of the submitted abstracts or other materials you provide. Please do not submit any information in your technical abstract that is confidential, proprietary or not for public dissemination. Please submit only information that you are willing to have made public. All submissions are subject to the Task Force Intellectual Property Policy. As described in the submission Template, you must certify along with your abstract or proposal that you have read and agree to the IP Policy, and you must grant the Berkman Center and the Task Force a license to publicly post your submission and use it to carry out the Task Force’s work and develop the Task Force’s reports.


Technology Advisory Board, Members

Ben Adida (Harvard Medical School, Harvard University) is a member of the Faculty at Harvard Medical School and at the Children's Hospital Informatics Program, as well as a research fellow with the Center for Research on Computation and Society with the Harvard School of Engineering and Applied Sciences. His research is focused on security and privacy of health data, the security of web applications, and the design of secure voting systems. Dr. Adida completed his PhD at MIT in the Cryptography and Information Security group. He is the Creative Commons representative to the W3C, working on interoperable web data as chair of the RDF-in-HTML task force. Previously, he co-founded two software startups that developed database-backed web application platforms based on free/open-source software.

Scott Bradner (Harvard University) has been involved in the design, operation and use of data networks at Harvard University since the early days of the ARPANET. He was involved in the design of the original Harvard data networks, the Longwood Medical Area network (LMAnet) and New England Academic and Research Network (NEARnet). He was founding chair of the technical committees of LMAnet, NEARnet and the COrporation for Research and Enterprise Network (CoREN). Mr. Bradner served in a number of roles in the IETF. He was the co-director of the Operational Requirements Area (1993-1997), IPng Area (1993-1996), Transport Area (1997-2003) and Sub-IP Area (2001-2003). He was a member of the IESG (1993-2003) and was an elected trustee of the Internet Society (1993-1999), where he currently serves as the Secretary to the Board of Trustees. Scott is also a trustee of the American Registry of Internet Numbers (ARIN). Mr. Bradner is the University Technology Security Officer in the Harvard University Office of the Provost. He tries to help the University community deal with technology-related privacy and security issues. He also provides technical advice and guidance on issues relating to the Harvard data networks and new technologies to Harvard's CIO. He founded the Harvard Network Device Test Lab, is a frequent speaker at technical conferences, a weekly columnist for Network World, and does a bit of independent consulting on the side.

Laura DeBonis (Berkman Center, Harvard University) is leading the ISTTF Technology Advisory Board, which serves the key function of assessing the range of technology tools that may be used to help ensure online safety for youth. Laura has recently left Google where she worked for 6 years on a variety of products and projects. Most recently, she was the Director for Library Partnerships for Google Book Search; she also worked on the launch teams for AdSense Online and Froogle as well as managed global operations in the early days of Book Search. Prior to Google, she worked at Organic Online, consulting for a variety of companies on their web strategies and design. Before attending graduate school, Laura spent a number of years working in documentary film, video and interactive multimedia, creating content for PBS, cable channels, and museums. Laura is a graduate of Harvard College and has an MBA from Harvard Business School.

Hany Farid (Dartmouth) received his undergraduate degree in Computer Science and Applied Mathematics from the University of Rochester in 1989. He received his Ph.D. in Computer Science from the University of Pennsylvania in 1997. Following a two year post-doctoral position in Brain and Cognitive Sciences at MIT, he joined the Dartmouth faculty in 1999. Hany is the David T. McLaughlin Distinguished Professor of Computer Science and Associate Chair of Computer Science. He is also affiliated with the Institute for Security Technology Studies at Dartmouth. Hany is the recipient of an NSF CAREER award, a Sloan Fellowship and a Guggenheim Fellowship. From working with federal law enforcement agencies on digital forensics, to the digital reconstruction of Ancient Egyptian tombs, Hany works and plays with digital media at the crossroads of computer science, engineering, mathematics, optics, and psychology.

Lee A. Hollaar (University of Utah) is a Professor in the School of Computing (formerly the Department of Computer Science) at the University of Utah in Salt Lake City. He has taught a variety of software and hardware courses, and currently teaches computer networking, operating systems, and intellectual property and computer law. He played a major role in adding two words to the vocabulary of intellectual property law:
* "Inducement" was recognized by the Supreme Court in its unanimous Grokster opinion. The concept of liability for inducement of copyright infringement was revitalized in his paper Sony Revisited: A new look at contributory copyright infringement, and refined in his amicus brief in the case. The paper also led to the introduction of the Induce Act in the 108th Congress.
* "Foreseeability" as a limit on doctrine of equivalents in patent law is the heart of the Supreme Court's Festo. It was proposed in the amicus brief whose filing he supervised as chair of IEEE-USA's intellectual property committee.
Professor Hollaar was on sabbatical leave in Washington, DC, during the 1996-97 academic year, as a Committee Fellow in the intellectual property unit of the Committee on the Judiciary of the United States Senate, where he worked on patent reform legislation, database protection, and what eventually became the Digital Millennium Copyright Act. He has been a special master, technical expert, or consultant in a number of copyright, patent, and trade secret cases. Professor Hollaar was one of the drafters of the Utah Digital Signature Act, which made Utah the first government in the world to recognize digital signatures as equivalent to handwritten ones. On November 19, 1997, as part of Utah's Digital Signature Day, Professor Hollaar executed the first legally-recognized digitally-signed will in the world. He received his BS degree in electrical engineering in 1969 from the Illinois Institute of Technology, and his PhD in computer science in 1975 from the University of Illinois at Urbana-Champaign. Dr. Hollaar was on the faculty of the University of Illinois prior to joining the faculty of the University of Utah in 1980.

Todd Inskeep (Bank of America) has over 20 years of Information Security and Internet experience ranging from secure radio and desktop systems to Security Architecture and eCommerce Authentication strategy at Bank of America. He’s a Certified Information Systems Security Professional with a Master’s in Strategic Intelligence currently leading work on the Bank’s overall eCommerce/ATM strategy. He also teaches security & risk management part-time at the University of North Carolina at Charlotte’s NSA-Designated Center of Excellence in Information Assurance. Todd holds a BS in Electrical Engineering from West Virginia University and a MS in Strategic Intelligence from the Joint Military Intelligence College.

Brian Neil Levine (University of Massachusetts Amherst) is an Associate Professor in the Dept. of Computer Science at the Univ. of Massachusetts Amherst, which he joined in 1999. He received MS and PhD degrees in Computer Engineering from the Univ. of California, Santa Cruz in 1996 and 1999, respectively. His research focuses on networking and security, and he has published over 60 papers on these topics. In the networking area, his research focuses on mobile systems and peer-to-peer networking. In the security area, his research is focused on privacy and forensics. His lab is currently funded by the NSF, DARPA, NSA, and ARO. He received a National Science Foundation CAREER grant in 2002 for work in peer-to-peer networking, a prestigious award for new faculty. In 2004, he was awarded a UMass Lilly Teaching Fellowship and, in 2007, his college's Outstanding Teacher Award. In 2008, he received the Excellence in Science & Technology Alumni Award from the Univ. at Albany, where he received a B.S. in 1994. Levine is currently an associate editor of the IEEE/ACM Transactions on Networking journal.

Adi Mcabian (Twistbox) is Managing Director of Twistbox Entertainment and currently serves on the Board of Directors of Mandalay Media (MNDL), its parent. Since founding the company, Mr. McAbian has been responsible for facilitating strategic collaborations with over 60 mobile operators worldwide on content standards and minor protection, he has been a frequent speaker, lecturing on adult mobile content business and management issues throughout Europe and the U.S. including conferences organized by iWireless World, Mobile Entertainment Forum, and Informa. Mr. McAbian has worked with various operators including Vodafone’s Global Content Standards group on establishing best practices in minor protection for both content and contact services as well as local implementations of those standards and supporting platforms in the over a dozen local markets. Mr. Mcabian also co-authored the Content Standards Rating Matrix currently used by nearly 100 networks to rate restricted content. Mr. McAbian is responsible for corporate strategy and carrier relationships that span the globe. Mr. McAbian's background includes experience as a successful entrepreneur and proven executive business leader with 12+ years as Business Development and Sales Manager in the broadcast television industry. Mr. McAbian is experienced in entertainment and media rights management, licensing negotiation and production, and has previously secured deals with AOL/Time Warner, Discovery Channel, BMG, RAI, Disney, BBC and Universal among others. Mr. McAbian currently serves on the Mobile Marketing Associations’ Consumer Best Practices Committee and will chair the up coming Age Appropriate Content and Services Sub-Committee.

RL Morgan (University of Washington). RL 'Bob' Morgan is Senior Technology Architect for the Computing & Communications Department at the University of Washington. In this role he contributes to designing, implementing, and documenting distributed computing and security infrastructure for the UW. He is the Chair of the Middleware Architecture Council for Education (MACE), providing guidance for the Internet2 Middleware Initiative. He is a primary contributor to a number of Internet2 middleware projects, notably Shibboleth, a system for secure access to inter-institutional web resources. He is also active in standards activities with the Internet Engineering Task Force (IETF) and the Organization for the Advancement of Structured Information Standards (OASIS), where he has helped to develop the Lightweight Directory Access Protocol (LDAP) and Security Assertion Markup Language (SAML) standards.

Lam Nguyen (Stroz Friedberg, LLC) heads Stroz Friedberg’s Digital Forensics lab in Boston. With over 11 years of coding, database development and digital forensics experience for leading government and commercial entities, Mr. Nguyen is an industry leader in digital forensics for data breach, e-discovery, and cybercrime in civil and criminal litigation, as well as corporate investigations. Mr. Nguyen has investigated hundreds of criminal cases and has led forensic investigations in data breach and intrusion cases. He was the lead investigator in several searches for Personally Identifiable Information on lost and stolen computers for a large pharmaceutical company. Mr. Nguyen recently conducted a forensic examination of an employee’s computer for a large investment bank. That examination led to his testimony in federal court that helped prove the employee was engaged in insider trading. Before joining Stroz Friedberg, Mr. Nguyen was the Lead Computer Forensics Specialist for the United States Department of Justice, Child Exploitation and Obscenity Section’s High Technology Investigative Unit. As the team leader, he initiated and developed online investigations of high-profile child exploitation cases; examined target computers seized in criminal investigations, and provided his expertise to federal prosecutors across the country. Mr. Nguyen is highly respected in the digital forensic community and has been qualified as an expert in federal court on a number of occasions. Sought after for his exceptional experience and commitment, he has trained law enforcement officers and trial attorneys on computer forensic issues domestically and abroad. Mr. Nguyen was an adjunct instructor at George Mason University for several years where he developed new courses and curricula on the subject of Computer Forensics and Network Security. More recently, he has been a guest lector at Harvard Law, Harvard Extension School, and the University of Massachusetts at Amherst. Mr. Nguyen’s dedication to public service has also included coordinating and delivering technology solutions critical to the operations of the U.S. Dept. of Commerce, Bureau of the Census, U.S. Dept. of Treasury, and Internal Revenue Service. Mr. Nguyen earned his Masters of Information Technology from American Intercontinental University and his undergraduate degree in Accounting Information Systems from Virginia Tech. He is certified in EnCase.

Jeffrey I. Schiller (MIT) received his S.B. in Electrical Engineering (1979) from the Massachusetts Institute of Technology. As MIT Network Manager he has managed the MIT Campus Computer Network since its inception in 1984. Prior to his work in the Network Group he maintained MIT's Multics timesharing system during the time-frame of the ArpaNet TCP/IP conversion. He is an author of MIT's Kerberos Authentication system. From 1994 through 2003 Mr. Schiller was the Internet Engineering Steering Group's (IESG) Area Director for Security, responsible for overseeing security related Working Groups of the Internet Engineering Task Force (IETF). He was responsible for releasing a U.S. legal freeware version of the popular PGP encryption program. Mr. Schiller is also responsible for the development and deployment of an X.509 based Public Key Infrastructure (PKI) at MIT. He serves as a consultant to other higher educational institution in the usage and deployment of PKI and related security technologies. Mr. Schiller is also a founding member of the Steering Group of the New England Academic and Research Network (NEARnet). NEARnet, now part of Level3, is a major nationwide Internet Service Provider.

Daniel Weitzner (MIT) is Policy Director of the World Wide Web Consortium's Technology and Society activities. As such, he is responsible for development of technology standards that enable the web to address social, legal, and public policy concerns such as privacy, free speech, security, protection of minors, authentication, intellectual property and identification. Weitzner holds an appointment as Principal Research Scientist at MIT's Computer Science and Artificial Intelligence Laboratory, co-directs MIT's Decentralized Information Group with Tim Berners-Lee, and teaches Internet public policy at MIT. As one of the leading figures in the Internet public policy community, he was the first to advocate user control technologies such as content filtering and rating to protect children and avoid government censorship of the Intenet. These arguments played a critical role in the 1997 US Supreme Court case, Reno v. ACLU, awarding the highest free speech protections to the Internet. He successfully advocated for adoption of amendments to the Electronic Communications Privacy Act creating new privacy protections for online transactional information such as Web site access logs. Before joining the W3C, Mr. Weitzner was co-founder and Deputy Director of the Center for Democracy and Technology, a leading Internet civil liberties organization in Washington, DC. He was also Deputy Policy Director of the Electronic Frontier Foundation. He serves on the Boards of Directors of the Center for Democracy and Technology, the Software Freedom Law Center, the Web Science Research Initiative. and the Internet Education Foundation. His publications on technical and public policy aspects of the Internet have appeared in the Yale Law Review, Science magazine, Communications of the ACM, Computerworld, Wired Magazine, and The Whole Earth Review. He is also a commentator for NPR's Marketplace Radio. Mr. Weitzner has a degree in law from Buffalo Law School, and a B.A. in Philosophy from Swarthmore College.

Technology Advisory Board, Observers

Rachna Dhamija (Usable Security Systems). Rachna Dhamija's research interests span the fields of computer security, human computer interaction and information policy. She received a Ph.D. from the School of Information Management and Systems at U.C. Berkeley in 2005. Her thesis focused on the design and evaluation of usable security systems. Previously, Dhamija worked on electronic payment system privacy and security at CyberCash. Her research has been featured in the New York Times, the Wall Street Journal and the Economist.

Evie Kintzer (WGBH) is WGBH Educational Foundation's Director of Strategic Planning and Special Projects. For the last eight years, Evie’s work with the President and Vice Presidents has included developing the Foundation’s strategic planning agenda, assessing implications of the competitive environment, chairing WGBH’s Advanced Media Group, and advising and developing project strategy and operating plans. Evie spent 13 years in the WGBH Legal Department as Director of Business Affairs and Deputy General Counsel, handling all of the business and legal affairs issues related to documentary programs produced by American Experience, NOVA, and FRONTLINE, as well as development of the Children’s Television and Interactive Departments. She holds a BA from Brandeis University and a JD from Hastings College of the Law.

Albert J. Marcella Jr. (Webster University) is president of Business Automation Consultants, LLC a global information technology and management-consulting firm providing information technology (IT) management consulting and IT audit and security reviews and training for an international clientele. Dr. Marcella is an internationally recognized public speaker, researcher, workshop and seminar leader with 30 years of experience in IT audit, security and assessing internal controls, and an author of numerous articles and 28 books on various IT, audit and security related subjects. Dr. Marcella’s most recent book Cyber Forensics: Collecting, Examining, and Preserving Electronic Evidence An Auditor’s Field Manual, second edition, focuses on issues, tools, and control techniques designed to assist audit, law enforcement, and info security professionals in the successful investigation of illegal activities perpetrated through the use of information technology. Professor Marcella is a tenured faculty member at Webster University in Saint Louis, MO, where he is responsible for teaching information technology management courses in the University’s graduate and doctoral programs. Dr. Marcella is the Institute of Internal Auditors Leon R. Radde Educator of the Year, 2000, Award recipient. Dr. Marcella has taught IT audit seminar courses for the Institute of Internal Auditors, continues to teach for the Information Systems Audit and Control Association, and has been recognized by the IIA as a Distinguished Adjunct Faculty Member.

John B. Morris, Jr. (Center for Democracy and Technology) is CDT's General Counsel, and the Director of its "Internet Standards, Technology and Policy Project." Prior to joining CDT in 2001, Mr. Morris was a partner in the law firm of Jenner & Block, where he litigated groundbreaking cases in Internet and First Amendment law. He was a lead counsel in the ACLU v. Reno/American Library Association v. U.S. Dep't of Justice case, in which the Supreme Court unanimously overturned the Communications Decency Act of 1996 and extended to speech on the Internet the highest level of constitutional protection. In that case, Mr. Morris was responsible for the development of the factual presentation concerning how the Internet works, a presentation that served as the foundation for the Supreme Court's landmark decision. From May 1999 through April 2000, Mr. Morris served as director of CDT's Broadband Access Project (while on leave from his firm). The Project undertook a comprehensive assessment of the legal, policy, and factual issues surrounding the emergence of broadband Internet access technologies. Prior to becoming a lawyer, Mr. Morris had extensive experience with computers and politics. In the mid-1970's, as a staff member on Capitol Hill, he helped to promote the use of computer software to manage and improve constituent communications. In 1981, Mr. Morris joined a D.C.-area computer company, where he was one of the lead system designers of a constituent management software system for Members of Congress. In 1985, he co-founded Intelligent Solutions, Inc., which developed the leading constituent services product used on Capitol Hill today. Mr. Morris received his B.A. magna cum laude with distinction from Yale University and his J.D. from Yale Law School, where he was the Managing Editor of the Yale Law Journal. Following law school, he clerked for Judge Thomas A. Clark of the Eleventh Circuit Court of Appeals, worked for three years as a staff attorney at the Southern Center for Human Rights in Atlanta, Georgia, and then joined Jenner & Block in Washington in 1990. In addition to his work with CDT, Mr. Morris is an Adjunct Professor of Law at Cardozo Law School in New York City.

Teresa Piliouras (Polytechnic University) is an Adjunct Professor in Computer and Information Science/Technology Management at Polytechnic University, where she has taught courses in network design, bioinformatics, network security, operations research, operations management, database design, and management of technology since 1994. The department participates in four interdisciplinary research centers and houses a number of departmental labs and research groups (http://www.poly.edu/cis/research/labs/index.php) which are funded by grants from government agencies such as the National Science Foundation, NASA, the Office of Naval Research, the Air Force, and the New York State Office of Science, Technology, and Academic Research, and private companies and foundations such as IBM, Hewlett-Packard, AT&T, the Sloan Foundation, Panasonic, Intel, and Verizon. The Information Systems and Internet Security (ISIS) Laboratory consists of heterogeneous platforms and multiple interconnected networks to facilitate experimentation in issues related to information security. ISIS was designated an NSA Center of Excellence in 2002. It is currently further being expanded with an NSF Scholarship for Service (SFS) capacity building grant and is the host laboratory for Polytechnic University's SFS program. Dr. Piliouras is working on ways to protect children on the Internet and to promote public health. She is involved in a number of broad-based community outreach programs to bring seniors and “at-risk” youth together to address problems of health and wellness. This involves creating community wiki-webs designed to create a sense of support and community, especially among those who may have been marginalized in the past. She is founder and President of Albright Associates, a company dedicated to protecting the privacy and safety of children in digital environments. Prior to Albright Associates, she was founder of TCR, Inc., a consulting company specializing in data mining and advanced intelligent technologies. She also held executive and technical positions at Accenture, Pitney Bowes, Boehringer Ingelheim, and Pepsico. She holds a Bachelor of Science from the University of Illinois, a Masters of Business Administration from Iona College, a Ph.D. from Polytechnic University, and a Postdoctoral Fellow from the Man-Machine Institute. She has authored numerous scholarly books and articles, including "Network Design: Management and Technical Perspectives" and "CRC Press Handbook of Modern Telecommunications."

Greg Rattray (Delta-Risk) is currently a Principal, Delta Risk Consulting, establishing risk management strategies and cyber security capacity building approaches for government and private sector clients and advising the Internet Corporation for Assigned Names and Numbers (ICANN) on approaches for enhancing global Internet security. Previously, Greg served 23 years as an U.S. Air Force officer, retiring in summer 2007. His assignments included Director for Cyber Security on the White House National Security Council staff, leading national policy development & NSC oversight for cyber security programs and oversight of Iraq telecommunication reconstruction. He commanded the Operations Group of the AF Information Warfare Center responsible for global operations of 900 personnel/$100 million active duty and National Guard team responsible for Air Force-wide tactics, red teams, exercising, test & training. He served in a number of operational intelligence and information operations assignments from the unit to Headquarters, Air Force levels. He also served as an Assistant Professor of Political Science and Deputy Director of the USAF Institute of National Security Studies at the Air Force Academy. He is the author of numerous books and articles including Strategic Warfare in Cyberspace, a seminal work in the cyber conflict field. He received his Ph.D. from Fletcher School of Law & Diplomacy, Tufts University, his Masters in Public Policy from J. F. Kennedy School of Government, Harvard University and his B.S. from U.S. Air Force Academy. He is a full member of the Council on Foreign Relations.

Jeff Schmidt (Consultant) is an independent security and technology risk consultant focusing on identity-related issues. Previously, Jeff founded Secure Interiors (SI), an early provider of managed Internet security services, and Authis, a provider of innovative identity services for the financial vertical. He managed both business to successful acquisition. Jeff also assisted in the re-launch of Kleiner Perkins backed ENDFORCE (formerly SmartPipes) by managing their flagship product offering to initial revenue generation. ENDFORCE was subsequently acquired by Sophos. Jeff also served as the CIO of The Ohio State University's second largest business unit and spent time at The Microsoft Corporation where he spearheaded Microsoft's first internal malicious testing of Windows 2000. Jeff is a founder and elected Director of the InfraGard National Members Alliance, the private sector component of the FBI's InfraGard Program (InfraGard is an FBI/private sector alliance dedicated to improving and extending information sharing between private industry and the government on matters of national security). Jeff helped the FBI create the InfraGard Program in 1998 and has received commendations from the Attorney General, the Director of the FBI, and the National Infrastructure Protection Center (NIPC - now a part of the Department of Homeland Security). On topics of computer security, Jeff is frequently interviewed and cited by numerous national publications and news outlets. He has authored several scholarly papers and has testified before state legislative bodies and the United States Congress. Jeff is a frequent speaker at major events such as Microsoft's DevDays, ITEC, ISSA, InfraGard, and Conference Board events. Jeff authored The Microsoft Windows 2000 Security Handbook, published by Que in four languages, and contributed to Using Windows NT 4.0, and Teach Yourself Linux in 10 Minutes, also published by Que. He received a BS CIS from The Ohio State University and an MBA Magna Cum Laude from the Fisher College of Business at The Ohio State University.

John Shehan (National Center for Missing and Exploited Children) is the Director of Exploited Children Services (ECS) at the National Center for Missing & Exploited Children (NCMEC) in Alexandria, Virginia. He is responsible for policy decisions and the overall operations within the ECS. Mr. Shehan has been with NCMEC since February, 2000 and has participated in and presented at numerous law enforcement investigative training programs on high technology crimes, online child exploitation as well as investigative and analytical skill development. He has provided extensive technical assistance to law enforcement in the United States and abroad on cases of child sexual exploitation, especially Internet crimes against children. To raise awareness of online child sexual exploitation, he speaks regularly with media outlets such as the MSNBC, CBS World News, New York Times, CNN and others. Mr. Shehan is an active and founding member of the Financial Coalition Against Child Pornography. He, along with other members at NCMEC collaborated to develop CyberTipline III. This system enables participating financial institutions and law enforcement to share information with an ultimate goal of eradicating the commercial viability of child pornography. John also spearheaded and manages the NetSmartz411 program. This program educates adults on all aspects of computers, the Internet and Internet safety. NCMEC's Exploited Children Services was established in 1996 by a mandate by the United States Congress. ECS works collaboratively with the Federal Bureau of Investigation, U.S. Postal Service, U.S. Department of Justice, and the U.S. Customs Service (now the Department of Homeland Security) in cases of child sexual exploitation. ECS serves as a resource center for the public, parents, law enforcement, and others on the issues of the sexual exploitation of children. ECS analysts process reports received on the sexual exploitation of children through the CyberTipline and disseminate the leads to federal, state, local and international law enforcement agencies for further investigation. ECS analysts provide technical assistance to federal, state, local, and international law enforcement agencies investigating child sexual exploitation cases.



Publications 01

Publication
Jan 14, 2009

Enhancing Child Safety and Online Technologies

Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States

The Internet Safety Technical Task Force was created in February 2008 in accordance with the "Joint Statement on Key Principles of Social Networking Safety" announced in January…