HTML VersionForward to a FriendPrint this E-mail
Advertisement
advertising




November 24, 2004
Congress Aims to Protect Kids Online

The Xenia, Ohio, police department has a friend in Sen. Mike DeWine (R), not to mention the woman who runs DeWine's offices in the state.

The Buckeye State's senior senator came through with $100,000 in federal budget allocations that would keep the Xenia Police Division's Internet Child Protection Unit afloat for at least one more year. The unit, staffed by two detectives who work on overtime pay, has nearly exhausted its initial $200,000 in funding, which DeWine secured two years ago.

Fortunately for the hard-working officers, Greene County prosecutor William F. Schenck used to practice law with DeWine. To take it a step further, Schenck's wife Barbara manages DeWine's state offices. DeWine included the $100,000 in the massive government spending package that Congress is trying to send to President Bush before leaving for the Thanksgiving holiday.

Despite the pejorative label of "pork," this particular slice appears to be yielding dividends. According to Police Chief Randy Person, that initial $200,000 enabled the detectives to arrest more than 100 people from Ohio and other states who came to the Xenia area looking to have sex with children whom they met online. The unit also contributed information to more than 400 other online child-pornography cases throughout the United States, Person said.

That money is not entirely in the bag, however. Congress approved the package Saturday only to discover that it must revisit the legislation to remove one small provision that would allow congressional investigators to look at people's federal tax returns after they're filed at the IRS. Congress was expected to send the revised package to the White House before the end of the week.

Xenia wasn't the only local or state government expecting federal funds to fight online child exploitation:

* The Virginia Computer Crimes Unit is down for $732,000. The unit fights child porn and related issues, but the flashiest feather in its cap this year was for securing the first felony spam convictions in the nation. The money comes courtesy of Rep. Frank Wolf (R-Va.), according to Tim Murtaugh, spokesman for Virginia Attorney General Jerry W. Kilgore (R).

* Fairleigh Dickinson University stands to receive $500,000 to launch a cyber-crime program, which university spokeswoman Gretchen Johnson said would include a forensic security training center and a computer forensic laboratory. Johnson said the New Jersey school worked with local U.S. Reps. Steve R. Rothman (D) and Rodney P. Frelinghuysen (R) to secure the funding.

* Enough Is Enough, a group run by Donna Rice Hughes, is expected to get $500,000. Rice Hughes was appointed in 1999 by then-Senate Majority Leader Trent Lott (R-Miss.) to a congressional panel that studied child pornography. She also has received recognition from the National Law Center for Children and Families, a conservative group that supports anti-pornography laws. The lead in Congress was House Government Reform Committee Chairman Tom Davis (R-Va.).

* Morality in Media, a conservative watchdog group, would receive $225,000 for its Obscenity Crimes Project. The Web site, obscenitycrimes.org, bills itself as a resource for "educating the public and reporting possible violations of Internet obscenity laws." It also offers "help for porn victims and addicts" and a petition for visitors to sign that asks Bush to more vigorously enforce the nation's obscenity laws. Again, Congressman Wolf was the lead on this effort.

-- Robert MacMillan, washingtonpost.com Tech Policy Editor

Advertisement
Get your news just the way you like it. Add your favorite columnists and topics to a washingtonpost.com newsletter delivered to your in-box each morning. It's a free and easy way to make sure you never miss a thing. Personalize your e-mail today and enjoy customized articles tomorrow.



Experts say "phishing" scams that involve phony e-mails and Web sites have grown by what percentage since January?

A. 100
B. 500
C. 700
D. 1,200

spacer
PHISHING
Companies Forced to Fight Phishing
Phishing is a growing form of online fraud that blends old-fashioned confidence scams with innovations in technological trickery. washingtonpost.com explored the methods phishers use, how e-businesses are dealing with the problem and what phishing has done to its thousands of victims
Phishing Feeds Internet Black Markets
Phishing Schemes Scar Victims
A Brief History of Phishing
How to Fend off Phishing
Catch a Phish: Take the Quiz
Discussion Transcript: Dave Jevans, chairman of the Anti-Phishing Working Group

More News and Features

Internet Taxes
Moratorium on Web Tax Advances (Post, Nov. 18)

Copyright in the Digital Age
D.C. College Students Targeted in Piracy Suit (washingtonpost.com, Nov. 18)

U.S. Senate Passes Scaled-Back Copyright Measure (Reuters, Nov. 22)

Cyber-Security
Hackers Use Web Sites, Ads to Infect PCs (washingtonpost.com, Nov. 21)

AOL Concentrates On Security Issues With New Software (Post, Nov. 18)

The Politics of Television
FCC Says A La Carte TV Would Cost More (Post, Nov. 20)

Commentary: The FCC Chairman Has No Clothes (Post, Nov. 21)

H-1B Visas
More Visas For Foreign Workers: Quota Raised to Fill High-Tech Jobs (Associated Press, Nov. 23)

STAYING SAFE ONLINE

Computer Naivete Costs a Bundle
A comment from my daughter marked the start of a large headache, one that launched an odyssey that has taken $800 and roughly 48 man-hours over nearly three weeks to end. – By Kathleen Day
A Digital Doctor Treats Computer Contamination
Take Care to Guard Your Windows
Computer Users Need a Good Backup Plan
Skepticism Is the Message for E-Mail
When to Leave What Closed
Geek Speak

MORE RESOURCES FOR PROTECTING YOUR COMPUTER

Security Beyond Antivirus Programs (October 3, 2004)

How to Fix the JPEG Photo Flaw (October 1, 2004)

How to Avoid the Latest 'MyDoom' Worm (July 26, 2004)

How to Remove the 'Sasser' Worm (May 11, 2004)

Don't Pass on the Patches (April 19, 2004)

Fine-Tuning Your Firewall (April 5, 2004)

How to Deal With Spyware (March 28, 2004)


spacer
Tech Policy E-Letter Archive
More Stories

spacer
Tech Policy Section
spacer
Main Page
spacer
Cybercrime
spacer
Cybersecurity
spacer
Digital Rights/Piracy
spacer
E-Politics
spacer
FCC / Telecom Policy
spacer
Government IT
spacer
Internet Governance / ICANN
spacer
Internet Taxes
spacer
Privacy
spacer
Spam
spacer

spacer
Politics
Web Bug from http://media.washingtonpost.com/wp-srv/globalnav/images/spacer.gif
Politics and Campaigns News
spacer
Terry Neal: Talking Points
spacer
Dan Froomkin: White House Briefing
spacer
Howard Kurtz: Media Notes
spacer
Stephen Barr: Federal Diary
spacer
National Security
spacer
Bush Administration
spacer
Supreme Court
spacer
Federal Page
spacer
Editorials/Op-Eds


E-Mail Newsletter Services
To sign up for additional newsletters or get help, visit the E-mail Preferences Page.
•   To unsubscribe, visit the E-mail Preferences Page (do not reply to this e-mail).
•   For feedback, send mail to [EMAIL PROTECTED].
•   For advertising information, send mail to [EMAIL PROTECTED].
•   To subscribe to the print edition of The Washington Post newspaper, click here.

    Privacy Policy

© 2004 The Washington Post Company

Washingtonpost.Newsweek Interactive
c/o E-mail Customer Care
1515 N. Courthouse Road
Arlington, VA 22201


Reply via email to