ISTTF Report

The Internet Safety Technical Task Force recently released its final report, titled “Enhancing Child Safety and Online Technologies.” The Task Force prepared the report at the request of 50 state Attorneys General “to determine the extent to which today’s technologies could help to address  . . . online safety risks” including “the dangers of sexual solicitation, online harassment, and bullying, and exposure to problematic and illegal content.”  The Task Force concluded “the risks minors face online are complex and multifaceted and are in most cases not significantly different than those they face offline, and that as they get older, minors themselves contribute to some of the problems.”  (Today’s class discussion about cyberbullying, involving students far closer to the problem than me, echoed this conclusion.”  Cherry-picking from the 278-page report’s Executive Summary:

  • The Internet increases the availability of harmful, problematic and illegal content, but does not always increase minors’ exposure. Unwanted exposure to pornography does occur online, but those most likely to be exposed are those seeking it out, such as older male minors.
  • Social network sites are not the most common space for solicitation and unwanted exposure to problematic content, but are frequently used in peer-to-peer harassment, most likely because they are broadly adopted by minors and are used primarily to reinforce pre-existing social relations.
  • [Minors] who are most at risk often engage in risky behaviors and have difficulties in other parts of their lives. The psychosocial makeup of and family dynamics surrounding particular minors are better predictors of risk than the use of specific media or technologies.

The Task Force reviewed numerous technologies intended to protect child safety online “including age verification and identity authentication, filtering and auditing, text analysis, and biometrics,”  a review that produced “a state of cautious optimism.” The report did “note that almost all technologies submitted present privacy and security issues that should be weighed against any potential benefits. Additionally, because some technologies carry an economic cost and some require involvement by parents and teachers, relying on them may not protect society’s most vulnerable minors.”  The Task Force “cautions against overreliance on technology in isolation or on a single technological approach.”

3 thoughts on “ISTTF Report”

  1. That last bullet really stands out to me – minors who are most at risk engage in risky behavior and have difficulties in other areas of their lives.

    Sure age authentication and an identity layer will weed out some, but their will always be a way around it. Minors who want to find this content can and will find a way. It seems like that can be applied to anything for a minor (cigarettes, alcohol, drugs, porn). Just because you make it more difficult to access it doesn’t mean you will stop the ones who really want it.

  2. I agree with Alex about the last bullet. We might relate this to the case of Megan Meier. While I think we can all agree Megan’s classmate’s mother engaged in cyberbullying and caused Megan emotional trauma, I do not think we can fairly say that she alone caused Megan’s suicide. Where were Megan’s parents? Knowing their daughter was emotionally unstable, it was their duty as her parents to monitor her development and ensure she received whatever medical treatment she needed. I’m not trying to lay the foundation for a claim of neglect. However, I think cyberbullying is parallel to playground bullying and in both cases parents cannot know 100% of what goe on. Therefore they must be attentive to their child’s disposition and keep communication lines open.

    Adolescents who feel the need to rebel or engage in risky behavior will do so, regardless of whether we limit internet content. Therefore we should look not to censor the internet, but rather to improve the lives of these adolescents. I know, easier said than done.

Leave a Reply

Your email address will not be published. Required fields are marked *