Fascinating speakers in the state of the neck has never been more important than it is rightt now. With that in mind, would like to welcome to this Stage Committee assistant secretary of communications and information at the department of commerce and the administrator of the ncaa, david reynolds. Thank you. [applause] thanks for that introduction thats great to be here again and special thanks to tim were again for inviting me into the Exciting Program he put together again this year. Id like to talk about two items on the agenda real quick that stand out. First is the cybersecurity channel that is going to be featuring ab in ramallah later today as well for discussion between rabbit doll and my former boss, chairman greg walden. I look forward to seeing you later in the day. I would like to lay out some of the Early International programs favorite thing to be aggressive in advocating u. S. Interests g d values arrogation across the globe the itu and other form. Id like to discuss department of commerces Security Network to improve the security of things and 5g networks in the administration saying to counter the threat of bot nets. It has become what it is today in part because the longstanding bipartisan consensus around the principle of multistakeholder policymaking and standarder development. The idea of stakeholder should participate in open and transparent decisionmaking process. The mets continue to fight for the print old and in open interoperable collaboration between all stakeholders. Right now, ntia as to priorities internationally. First is the preservation of the hua service which is become one of the most pressing issues over the last several months. Dont know much about the service, its an incredibly valuable tool for governments, businesses and intellectual Property Holders in individual users around the world. Put simply, who is a service that provides easily Accessible Information to purchase and manage domain names. The information is the starting point for Law Enforcement agencies investigating activity and for private sector and government actors seeking to protect Critical Systems from dangerousin cyberattacks which e growing more frequent all the time. I mentioned her work t on. Net. We know that those in the front lines of mitigation rely on who is to do their work effectively. Who this information is also valuable for combating misuse of intellectual property and savvy internet consumers is legitimate. It is the cornerstone of trust and accountability on the internet. Those of you whoho participate d its essential character has not changed much since its inception in the early 80s. This is for good reason. Remains critically important to those who rely upon it. Over the last few months the service of essential character has been threatened in response to the European Union for gdp are initiate a process to assess how the rule could affect who is given that includes limited information about users to register internet domain. Here are the facts. It bounces cybersecurity line for sand and Consumer Protection and have noted only limited changes to who was to be necessary to achieve compliance. Still there are some train to take advantage of the situation by arguing we should barriers to the quickly and easily Accessible Information. Some have argued the service could become a relic of the internets history. Today i would like to be clear the service can and should retain the essential character while complying with National Privacy laws including the gdp are. Its in the interest of all stakeholders thatt it does and for anyone here in the u. S. Who may be persuaded by arguments for drastic change coming of the u. S. Government expects the information to continue to be made available through the service. The second priority is the conference planting pot as they all love to collect which is scheduled for this october. The United States needs to press for change including establishing effective membership oversight of the finances. Particularly important given the United States has one of the two largest donors of the union and fight against efforts to move the itu beyond its limited mandate and into internet related cybersecurity i matters. We need i. T. That can effectively and efficiently perform its vital functions in the area of radio i communicatin and one that fosters rather than hinders procompetitive policies for telecom, particularlyn developing countries. Many of you know it has five elected positions. Deputy general, Deputy Director general of the three bureaus of the union. Im please to reiterate the strong support for the candidacy as director of the itu telecommunication developmentr bureau. The sector is generally known as part of the conduct of the two parts of the world that have yet to realize the economic societal benefit that many of us take for granted. A former ntia official and i am certain terrain would make an a outstanding professor country director. Moving forward, ntia remains committed to the community in particular there are four areas we think are especially important. The first of the free flow of information. Second is the multistakeholder approach t governance. Third is privacy and security and forth this emerging technology. The free flow of Information Online is the bedrock american print both in access to information and freedom of expression are basic humanri rights. So governments around the world are increasingly Walking Access to websites and content curtailing online freedoms we been shutting down the internet entirely. Governments impose topdown heavy handed in their governmental regulation of the internet and weve seen court ruling for the First American companies to remove information that wouldve been a better protected speech in the united dates. They have Economic Growth in the societal and educational benefits of the internet and they must be imposed. The second focus area. How can ntia support and promote the internet governance . One addition to gdpr, are there any other domain names i should pursue . And online privacy. Speak morek about the current cybersecurity work in a moment but i hope the community will wait in on help us identify whether department can be be even more impactful. Finally ndaa always seeks input on the departments work on emerging technologies. Congress has led the u. S. Morenment when it comes to technologies at the leadership requires continued engagementt for american industry and from all of you. In order to ensure american entrepreneurs are able to take risks and find Global Markets for the Digital Products and services we need to make sure we are charting the right path. On such issues as artificial intelligence, 5g will you industry to help us make the right choices as a government. As i notice i was could is a key priority for the department of commerce and for the administration. As many of you know last may the president issued an executive order on strengthening the networks and critical infrastructure. Among other items the order sought botnet attacks can extremely damaging and to put the broader internet at risk as well as its users. The department of commerce and the department of Homeland Security identifies actions by stakeholders recognize we cannot solve this problem throughve government regulation. Earlier the department issued a draft report on enhancing resilience against botnets. We relied on an open and transparent process tond generic ideas in the report and what you think those of you who participated. The report outlines positive vision for the future as well as five couple , ventricles that wd improve the resilience of the internet. It suggests activity to be undertaken by both the government and private sector actors. Botnet attacks are global problem. Really any solution will require the entire ecosystem acting in concert. Were not starting fromm scratc. There are tools available today that could mitigate these threats but they are not widely used. Changing this require more education and awareness as well as ann alignment of market incentives that will find thenc sweet spot between security and convenience. Behind the scenes was a lot of collaboration between various Government Agencies as this report was beingng drafted. Input from the private sector we know theres a common understanding about what we need to do and where we need to go to make this positive future reality. If you havent already, i encourage you to read the report and please provide feedback. Rt you can find request for comments on the website. There will be a workshop hosted by the department of commerce next month and columns comes wl incorporate all the comments received into the report for delivering it to the president in may. As a side note i just like to express how proud i am of the work of february at ntia on this report. It really was an effort that took a lot of doing my folks across all different agencies and as the one who is now getting to see the fruits of the labor as the administrator im incredibly proud of they hard work theyve done and outreach in putting together a quality product. I panelco of effort, smith wereo foster a more secure internet of things environment. Late last year stakeholders develop a series of documents on iot security and patching. Some great products came out of that process include highlevel specification of the components of an iot security update and suggestions for how manufacturers can communicate to consumers. We will continue to engage with the iot and Security Committee to promote the principles and the ideas in this document. This year with the word on Software Component with a a particular eye towards thirdparty components t used in iot devices. Most modern software as all you know is not written completely from scratch but includes existing components, modules and vibrates from the opensource and commercial software world. Products are being developed quickly and there dynamic marketplaces. The growth of the internet makes this challenge all the more difficult. In addition to the increased number of devices, more traditional vendors are assumed the role of Software Developers to add smart features or connectivity to existing products. While the majority flybys and components do not have known vulnerabilities, some do. They shared quantity of Software Means that products will ship with vulnerabilities or outofdate components. Transparency can be a very important tool. It can help vendors that demonstrate a process and help defend his understand how to respond and prioritize during an incident. After all, you cant protect what you dont know about. Finally, with respect to 5g master the president made it clear 5g security is a critical element of our National Security. With the proliferation of devices of the internet of things bringing security both the device and the network itself will be important to ensuring that only our National Leadership in wireless but also ensuring access to vital part of our national economy. Ntia will work with our colleagues across the federal government to coordinate a National Strategy on spectrum access and work with the private sector to assure the standards process for 5g promotes our National Interest and security. Todays commerce is a Good Opportunity to reflect on what issues matter to you most. Everyone today as perspectives that can of which the work that india is doing and we urge you to reach out to the staff will be here throughout the day and have conversations about the things you think we should be working on. We want to hear from you. We want to know what you think to helptant other want you to continue to thrive. Thank you for your time. [applause] morning. My name is rachel. I am the director of the congressional challenge. Its a National Contest which encourages kids to learn to code and create apps. In the past three years old have of congress we have inspired over 8000 students in 42 states to learn to code, and where buildingng the pipeline domestic coders who will be equipped with the skills required for the jobs of the future. So im here to introduce Homeland Security deputy secretary elaine duke. She was previously acting secretary of Homeland Security from july to december of last year that she is an accomplished Public Servant with over three decades of experienceer here and deputy secretary duke has served as member of Homeland SecurityAdvisory Council and Strategic Advisor to government, tech and services coalition. So please welcome secretary sorry, deputy secretary duke. [applause] good morning, everyone. Its really an honor to be here at state of the net. It is though a little funny for me when i think about being here speaking in front of this group that are here for the state of the net conference. I am a grandmother who like jane austen novels, and just got a twitter account lastwi week. We will see what i can do to give you some information about dhs and where we are with the state of the net, that hopefully will be useful to those of you here in the room today. As everyone points out, everyone is an internet stakeholder, even if they dont know it yet. Im learning it more, more each day. Thats what brings me here today, how the internet has increasingly connecting us with our threats and Homeland Security, specifically terrorists are using the internet to recruit and radicalize, and share information for doityourself mass murder. Nearly every terrorist plot we uncovered today has a digital dimension. To give you a sense of the scales of that problem, the fbi has said there are currently 1000 homegrown terrorist investigations across the 50 states, and 1000 isis related investigations. Some of these overlap but still the scale is alarming. Of those are just the suspects we know about. Its like living among potential landmines. In both the recent terrorist attack in newew york, the Port Authority bus bomb in the following attack with a rental truck, the attackers were appearing to be inspired in part by online terrorist propaganda. It is becoming a very, very common payoff. An attack happens. We reviewed the suspects electronic and social media, and we find radical earnings, jihadist connections, beheading videos, and more. To be very clear, the internet itself is not the problem. Terrorist use social media for the same reason anyone use social media. Its an easy way to get connected. The technology that is helping businesses thrive and family stay in touch is the same technology that is helping terrorists conspire at broadband speeds. You can think of it like fire. Fire can cook again or one your house. It can also and golf communities and leave lifelong scars like it just recently did in california. On to note also the internet itself does not cause radicalization, though it does appear to service catalysts. Internet and mobile Communication Technology just make the radicalization process faster and easier, and can a accelerate the path to violence. While isis isnt the first or only terrorist group to have a presence online, their groundbreaking use of open social media platforms has forced all of us to confront the challenging issues with clear eyes. Theres a lot of thorny issues with combining, combating violent radicalization, excuss me, online. Issues surrounding the terms of service, content removal versus monitoring, the role of private companies and confronting this National Security problem, and the role the government in challenging terrorist narratives. These issues are further complicated as terrorists move froms open channels to encryptd or closed once. Before we think about what we can do to combat terrorists use of the internet we have to acknowledge three facts. The first is the Legal Framework of the United States and the constitution that we in the federal government have sworn to protect and defend. In the United States ideology, regardless of the cause is protected by the first amendment. Congress shall make no law abridging the freedom of speech or that of the press. In practice that means that merely advocating political or social positions, strong rhetoric, or the philosophic embrace of violent tactics may be protected by the constitution. Just looking at isis propaganda or visiting a neonazi website does not constitute illegal activity in our country. Of course while the government may not be able to take action against specific content, this does not preclude social Media Companies from takingcl action. The second fact is that removal is a shortterm and difficult system to automate when your target proliferate at high volumes and it constantly changing media and speed. Around the world Internet Users upload more than 400 hours of content every minute. Thats about to sift through for our companies. Additionally, twothirds of the terrorist content is we shared within the first two hours of its lifecycle. The good news here is that the government and technologies are developing tools that automatically detect and flag tears content, and there are indications that Technical Solutions will be among the most effective ways to manage the volume. However, as extremist groups migrate to encrypted messaging platforms, monitoring becomes more difficult. So while the content removal is an important part of the response, it cannot be the entire response. The third fact is that any longterm response mustac acknowledge that there are various audiences at play and each have different information needs. Some individuals already mobilized to violence. Some are radicalized but have not yet taken steps towards violence. Other people want to actively refute terrorist propaganda, and then theres the majority of people who just want to go about their daily life without the threat of terrorism. There is no one answer, there is no one silver bullet. But we at the department of Homeland Security are surgically focused on the terrorism prevention trying to prevent and intervene in the process of radicalization. And because so much of the radicalization is tied to the internet and because the internet knows no borders, we are actively trying to prevent both international and domestic terrorists from radicalizing anp recruiting pr people to violence. Through social media, social science research, and the whole body of knowledge we know tha its not a linear process. There are a number of root causes and drivers. Domestically, weve approached terrorism prevention in a range of voice. Today i need to tell you a little bit about how we try to challenge terrorist narratives, share information, c and catalye nongovernmental solutions. First, challenging narratives. The response details either challenging artist directly or providing alternative options. To the internationally recognized privatepublic partnership known as peertopeer, running violent, countering extremism program, weve engaged with young people internationally. Peertopeer challenge teams of students from colleges and universities to develop and implement social media programs targeting the narrative and online recruiters of violent extremism. We recognize the need for more resources in the space of enjoy Ece Department of Homeland Security office of terrorism prevention partnerships awarded to grants, 26 grants to commute debased organizations. At least half a dozen of the awardees will have a robust Online Presence including pushing back against the messages of isis and other terrorist recruiters and radicalizers. For example, one project is developing an application that will put highquality Video Editing tools tips on Digital Marketing and Relevant Research findings on radicalization and r recruitment in the hands of thousands. This will help make the creation of countermessages a viable practice and add to the peertopeer work that i mentioned earlier. While we are limited in what we can do domestically in the counter narrative space, countering narratives is an important partpa of our terrorim prevention strategy. I am excited to see the grant awardees move their ideas from application into action and then monitoring the results. Our second broad category of terrorism prevention is information sharing. At dhs we done a lot of work in this space over the last year. We want to expand understanding of violent radicalism and terrorist e recruitment so more people can identify it, and more importantly, more people can prevent it. This includes tools such as developing social Media Community awareness briefings to help Technology Sector become b aware of terrorist recruitment online so they can catalyze efforts to counter it. It also includes conferencesun such as the digital form on terrorism prevention that dhs cosponsored last september. At the digital forum, experts from government, the tech industry, maybe many of you, startups, Community Organizations gathered together to share information and t showcase technologies and techniques to counter the use of terrorist sociall media. Across the u. S. Government, dhs also administered of the houses an Interagency Task force to decrease information sharing a terrorism prevention with othere agencies. Including the National Counterterrorism center, the fbi and department of justice. That wide range of stakeholders brings me to a a third categoryf prevention, catalyzing solutions. Nt with apologies to the state of the net i want to bear fries your model. Everyone is a terrorism prevention stakeholder, even if they dont know it yet. We believe that in combining accounts of kyrgyz ngos and the Technology Sector. We can drive nongovernmental responses to terrorist recruitment and radicalization that are authentic, more scalable and more sustainable. We can create and disseminate more powerful counter narratives and alternative narratives. The truth is the government doesnt have great credibility in the online space. For good reasons i i believe we are too old, too big and too square. We need credible voices, especially for our community partners. So its important we help empower those groups with the information, partnerships and resources they need to be successful. This is not aso fight dhs or the u. S. Government can win on its own. Our enemies are dispersed, and they are crowdsourcing their activity. Fortunately, our allies are fighting with us in the same space. In the past year there has been aremendous progress of terrorist prevention, particularly of the center. Last july the United Kingdom home secretary and i traveled to Silicon Valley to meet with the newly launched Global Internet forumm on counterterrorism, or gis cd. The j sct led by facebook,k, microsoft, youtube and twitter is the first time Major Companies havet come together to work on research and Technology Techniques in this area. Moreover, they are committed to helping Smaller Companies thatng may not have the same resources to tackle terrorism prevention online. Es i am very, very encouraged by the work of gisct to counter this incredibly dangerous problem. We help more companies will consider engaging with us to help stop terrorism here and abroad because terrorists radicalization makes the world a more dangerous place for each one o us. We also know that of the country share our concern. At the 72nd United NationsGeneral Assembly this year, uk Prime Minister, italian Prime Minister and the french president addressed World Leaders on this topic along with our acting deputy secretary of s the time, ms. Clare grady. And in october i joined my International Counterpart at a g7 meeting in italy to discuss how to prevent terrorist use of the internet with the participation of the private sector, private sector and in wrestling of the private sector was with the so this is a true government private Industry Collaboration on countering terrorism on the internet. Our new secretary nielsen is continuing this robust engagement and sensual be traveling to Silicon Valley for a second meeting with gisct along with uk homee secretary amber rudd. We were also cohost the second digital form on terrorism prevention, also in Silicon Valley in february. Some of the topics on the agenda will be innovations in counter messaging, content takedown, and online to offlineed interventions. The third item is important because its not enough to push back against terrorist messaging. We have to ensure organizations are trying to develop off ramps for people at risk for radicalization to mobilization to violence. These off ramps need to be developed in partnership with local organizations, metering methods proven in related fields like Domestic Violence and suicide prevention. As i said before, we the government cannot do this alone. Im very proud of the role dhss plate in terrorism prevention so far, and countering terrorist use of the internet but our work and your work is not yet done. Preventing terrorism will remain core to the mission of the department but we arere very interested in working with partners such as you all corners of the world to make it a safer place for each one of us. Help us, please work with us. I know there are members of my staff from office of terrorism prevention partnerships here today. They are raising their hands and anxious to hear from you throughout the conference, and let us know. Michael brown raised his hand from the task force. I dont mean to frighten you, but please believe me when i tell you this is urgent. Each morning we sit there are intelligence briefing and im here today with the urgency and a purpose. Right now in some dark corner of the internet that are stepbystep instructions on how to build a bomb with items you could pick up in any hardware store. Right now a terrorist recruiter with hate in his heart is feeding allies to a confused teenager. D right now someone in the country is being tested. Do they become a soldier for the caliphate, or do they turn away . But working together we can change the outcome, and we can change lives. We are all terrorist prevention stakeholders, even if we dont know it yet. Thank you. [applause]