Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

Last year, after the social-networking site MySpace found that its members included some 29,000 registered sex offenders, the nation’s top state prosecutors demanded a technological fix, asking that the industry “explore and develop age and identity verification tools for social networking web sites.” But a new study concludes that such technologies are unlikely to thwart anonymous predators and that the threat facing children online is no worse than it is in the real world.

“Our review found too little evidence that any given technology or set of technologies, on their own, will improve safety for minors online to any significant degree,” says the report, written by the Internet Safety Technical Task Force, a group of 29 businesses, nonprofit organizations, academic groups, and technology companies that conducted the investigation with the Berkman Center for Internet and Society at Harvard University, at the request of 49 state attorneys general. “Moreover, the Internet itself, the ways in which minors use it, and the communities in which they participate, all change constantly, and the available technologies are quickly evolving.”

While no single age-verification solution can solve the Internet’s problems, tools are available to those who choose to use them, and social-networking sites cooperate with law enforcement and actively root out reported problems, says John Palfrey, a Harvard law professor who led the effort. Some 40 technologies are already on the market, including age-verification products and Web filtering and blocking programs.

The Achilles’ heel of age-verification technologies is, of course, that they only work if people use them. A parent can enroll his child with services such as, which creates an online age-verification credential. But for the service to be effective, the child must always use it and require that others he encounters online also possess such a credential.

The task force did not dismiss the risk posed by adult predators, but it says that bullying by peers is a bigger issue that requires responses from parents and schools as well as continued law-enforcement attention. Online risks to youth “are not radically different in nature or scope than the risks minors have long faced offline, and minors who are most at risk in the offline world continue to be most at risk online,” the report says. “Bullying and harassment, most often by peers, are the most salient threats that minors face, both online and offline.”

Connecticut attorney general Richard Blumenthal, one of the prosecutors who had pushed for the study, gave it mixed reviews. “This report is a step forward in the fight to better protect children from predators and inappropriate content on social networking sites,” he said in a statement, but he added that “the report unfortunately downplays the threat of predators–in relying on research that is outdated or inadequate–and it fails to provide specific plans to implement technology in improving social networking safety.”

1 comment. Share your thoughts »

Credit: Technology Review

Tagged: Computing, Web, security, Internet, social networking, communications, authentification

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me