Transcripts For CSPAN David Redl Elaine Duke 20180204 : vim

CSPAN David Redl Elaine Duke February 4, 2018

Hello, everyone. It is my pleasure and my privilege to be up here at this podium at the internet education foundations 14th annual state of the net conference. My name is emery rone, a fellow at the internet law frame work for early career professionals, started by our Parent Organization and im hereto interview right, im in the other room next to cspan well be pulling down panelists throughout the day and talking about what is the most important issues facing the state of the net. I hope to speak with as many of you as possible that sit on all the panels. As you know, we have fascinating topics and incredible speakers and the state of the net has never been more important than it is right now. With that in mind, id like to bring to the stage the astandpoint secretary, and david rhettle. [applause] well, thanks for that introduction and its great to be here again at the state of the net. And especially thank you for inviteing me and congratulations on the Exciting Program youve put together again this year. Id like to two items on the agenda quick, that stands out to me. The excellent Cyber Security panel, and a discussion between rob mcdowell and my former boss chairman greg walton. Both things im looking forward to later in the day. For my time id like to lay out Early International priorities in the new administration. We plan to be aggressive in advocating interest in values in ourengagement across the globe at i can, itu and others. And discuss the department of commercial Cyber Security work toimprove the security net of things and administrations plan to counter the threat of bot nets. The internet has become what it is today in part because of a longstanding bipartisan concensus of multistakeholder policy making and development. The idea that all should participate in transparent decision makingprocess. We must continue to fight for this principle and for an internet thats golf vens between collaboration between all stake holders. Right now, ntia has two priorities. The preservation of the who is service, one of the pressing issues related to icahn the last several months. If you dont know much about the service, its a valuable actual for governments, businesses, intellectual Property Rights holders and Internet Users around the world. Put simply, who is it the serviceprovides easily Accessible Information about entities that purchase and manage domain names. This information is often the starting point for Law Enforcement agencies when investigating malicious Online Activity and for private sector and government actors seeking to protect Critical Systems from dangerous cyber attacks, which are becoming more frequent all the time. Bot nets, we know those rely on who is to do their work effectively. Who is, valuable is information for safe have i internet consumers making sure the website theyre using is legitimate. Its a simple service, but its the cornerstone of trust and accountability on the internet. Those of you who participate in ican know who is is under constant review for years and essential character has not changed much since its inception in the early 80s. The utility remains critically important for those who rely upon it. The last few months the service of essential character has been threatened. In response to the European Unions general Data Protection regulation,ican assessed the rule and given limited personal information for users who register internet doemains. Many european officials have noted only limited changes to who is would be necessary to achieve gdpr compliance. Still there are some who are trying to take advantage of the situation by arguing that we should erect barriers to the quickly and easily accessible who is information. And some have argued the service must go dark and become a relic of the internet history. Today id like to be clear, the who is service can and should retain its essential character while complying with National Security laws. For anyone in the u. S. Who may be persuaded by those calling for drasstic change. The second area is the itus treaty making conference, the plenty pod as we love to call it, scheduled for this october. I believe the United States needs to press for change in the itu, including establishing effective membership oversight over the finances. This is particularly important given the United States is currently one of the two largest donors to the union, an and we need to fight against efforts to an i aggressive effort tomove it beyond and know Cyber Security matters. We need an itu in the area of Radio Communications and fosters, rather than hinders policies for telecom, particularly in developing countries. As many of you know, the itu has five positions. Fosters, rather than hinders it brings connectivity to parts of the world that has societal benefits. Martin is a veteran of the process and im certain that doreen would make an outstanding director of the sector. There are four areas where we think are especially important. Flow oft is the free information, second is the multistakeholder approach to internet governance, third is privacy and security, force is emerging technology. The free flow of Information Online is a bedrock american principle. To information and freedom of expression are basic human rights. Governments around the world are increasingly blocking access to websites and content, curtailing online freedoms are even shutting down the internet entirely. Governments are imposing topdown, heavyhanded intergovernmental regulation of the internet. We have seen Court Rulings that have forced American Companies to remove information that would have been considered protected speech in the United States. These restrictions threaten Economic Growth and societal education benefits of the internet. The second focus area, how can we continue to support and promote the multistakeholder approach to internet governments . Are there any other Domain Name System related activities that we should pursue . These are the kinds of questions we want to hear from our stakeholders. We plan to continue our longstanding engagement in the Internet Governance Forum at united nations. There is always room for improvement. He will seek input on the opportunities that we face. Awareness. E national we want to know what we can do to help lower barriers to participation. Third, we want to know how to leverage our references to sure up on my privacy. I will talk about private secret work in a moment. Areas wheredentify the department can be impactful. And tia as commerce has led the u. S. Government when it comes to new and emerging technologies. That leadership requires continued engagement from american industry and from all of you. Order to ensure that american entrepreneurs are able to take risks and find Global Markets for the Digital Products and services, we need to make to that were treading the. On such issues of artificial we are looking for industry to help us make the right choices. As many of you know, the president issued an executive order on strengthening the Cyber Security of federal networks and critical infrastructure. It sought to promote action against botnets. Botnet attack can be extremely damaging and put the broader internet at risk. Wereepartment of commerce asked to identify actions i can be taken by stakeholders, recognizing that we cannot solve this problem through government regulation. The departments issued a draft report on enhancing resilience against botnets. We relied on an open process to generate ideas in the report. I want to thank those of you who participated. The report outlines the positive vision for the future, as well as five, trickles that would improve the resilience of the internet. Activities to be taken by government and private users. Are a global problem. No cigar government can solve it in isolation. Any solution will require the entire ecosystem. We are not starting from scratch. There are tools available today that can mitigate this. They are not widely is. Jing jing changing this will require market incentive that will find the street spot sweet spot between marketing and convenience. We now know that there is a common understanding of how low we need to do and where we need to go to make this positive future a reality. If you have not already come i encourage you to read the report and please provide feedback. You can find it on our website. There will be a workshop hosted by the department of commerces month. We will incorporate all of the comments received in the report for delivering it to the president in may. I would like to express how proud i am of the work that everyone has done on this report. It was an effort that took a lot of doing by folks across all agencies. As the one who is now getting to see the fruits of their labor, im incredibly proud of the hard work they have done in putting together a quality product. Commerce has been working to foster a more secure internet environment. Developed a series of documents on iot security and patching. Two great products and out of the process, including a highlevel specification and suggestions for how manufacturers can communicate punch ability to communicate consumers. This year we will be working on Software Component transparency with a particular eye towards thirdparty components used in iot devices. Most modern software is not written from scratch but includes existing components, modules, and libraries from the open source. Products are being developed quickly and in a genetic marketplace. It can be a challenge to track the use of all of the separate components. The growth of the internet makes this challenge all the more difficult. In addition to the increased number of devices, or traditional vendors are assuming the role of Software Developers to add smart features to existing products. Of librariesority and components do not have known for abilities, some do. The sheer quantity of Software Means that products will ship with vulnerabilities. Can be a very important tool here. A camerawork vendors that demonstrate a secure Development Process and help Defenders Know how to respond and prioritize during an incident. You cannot protect if you do not know about it. With respect to 5g, the president made it clear that five G Network Security is a critical element of her National Security. The networkn itself will be important to ensuring our National Leadership in wireless but also to ensuring access to a vital part of our national economy. We will continue to work with our colleagues across the federal government to coordinate a National Spectrum access. Todays conference is a Good Opportunity to reflect on what issues matter to you most. Everyone here today has perspectives that can enrich the work that were doing to get urge you to reach out to our staff. Will be here throughout the day. Have conversations about the things we should be working on. We want to hear from you. We want to know what you think is important. We want to be able to help the industry thrive. They queue for your time. Thank you for your time. [applause] good morning. My name is rachel. I am the director of the challenge. Al ap it encourages kids to learn how to code and create apps. 8000ve inspired over students in a 42 states to learn to code. We are building the pipeline of domestic coders for the they will be equipped with the skills required for the jobs of the future. Im here to introduce homeland elainey deputy secretary duke. She was previously acting secretary of Homeland Security from julydecember of last year. She is an accomplished Public Servant with over three decades of experience. As member ofd Homeland Security Advisory Council and Strategic Advisor to government tech and services coalition. Please welcome secretary deputy secretary duke. [applause] good morning everyone. It is an honor to be here. It is a little funny for me. I think about being here, speaking in front of this group that are here for this state of the net conference. Likes grandmother who jane austen novels and just got a twitter account last week. [laughter] we will see what i can do to give you some information about vhs and where we are the state of the neck. Hopefully it will be useful to those of you here in the room today. Everyone points out, everyone at the internet stakeholder is an internet stakeholder even if they do not know it yet. That is what brings me your today. Is the internet has an increasingly connecting us with our threats. Specifically, terrorists are using the internet to recruit and radicalize and share information for doityourself mass murderer. Werly every terrorist plot uncovered today has a digital dimension. To give you a sense of the scale of that problem, the fbi has said that there were currently 1000 home grown terrorist investigations across the 50 states. And 1000 isis related investigations. Some of these overlap. The scale is alarming. Those are just at the suspect we know about. It is like living among potential landmines. Recent terrorist attack in new york, the attempted Port Authority bomber, and the halloween attack with a rental truck, the attackers were appearing to be inspired in part by online terrorist propaganda. It is becoming a very, very common tale. We reviewed their electronics and social media and find radical learning, jihadist connections, beheading videos, and more. To be clear, the internet itself is not the problem. Terrorists use social media for the same reason anyone uses it. It is an easy way to get connected. The technology that is helping businesses thrive and family stay in touch is the same technology that is helping inspire at broadband speeds. You can think of it like fire. , it can cook your dinner can also engulf communities and leave lifelong scars like it just recently did in california. That theortant to note internet itself does not cause a radicalization. It does appear to serve as a catalyst. Internet and mobile Communications Technology just makes the radicalization process faster and easier and can accelerate the path to violence. First ors is not the only terrorist group to have a presence online, their groundbreaking use of open social media platforms has forced all of us to confront the challenging issues with clear eyes. There are a lot of issues with combining violent combating violent radicalism online. Issues surrounding the terms of theice, content removal, role of private companies, and the role of the government in challenging terrorist narratives. These issues are for the collocated as terrorists move from open channels to encrypted or closed once. Before we think about all he can do to combat terrorist use of the internet, we have to knowledge three facts. The first is the Legal Framework of the United States and the constitution that we come in the federal government, have sworn to protect and defend. States, regardless of the cause it is for, it is protected by the first amendment. Congress shall make no law abridging the freedoms of speech or of that of the press. In practice, that means that merely advocating political or , strongositions rhetoric, or the philosophic embrace of violent tactics may be protected by the constitution. Propagandag at isis or visiting a neonazi website does not constitute a legal andand illegal activity illegal activity. This is not preclude social Media Companies from taking action. Current removal is a shortterm and difficult system to automate. When your target proliferates at high volume and constantly changing media and feet speed. Internet users upload more than 400 hours of content every minute. That is a lot to sift through for our companies. Two thirds of the terrorist content is reshared within the first two hours of its lifecycle. The good news here is that the government and technologies are developing tools that automatically detect and black terrorist content. There are indications that Technical Solutions be among the most effective ways to manage the volume. Toextremist groups migrate encrypted messaging platforms, monitoring becomes more difficult. Removal is anent important part of the response, it cannot be the entire response. The third fact is that any longterm response must acknowledge that there are various audiences at play. Each have different information needs. Some individuals are already mobilized to violence. Some are radicalized but have not yet taken steps towards violence. Other people want to actively refute terrorist propaganda. Then there are the majority of people who just want to go about their daily lives without the threat of terrorism. There is no one answer. There is no one silver bullet. We are surgically focused on the terrorism prevention, trying to prevent and intervene in the process of radicalization. Because so much of it is tied to the internet, because the internet knows no border, we are actively trying to prevent those international and domestic terrorists from radicalizing and people to violence through social media, social science research, and the whole body of knowledge. We know it is not a li

© 2025 Vimarsana