Transcripts For CSPAN2 David Redl Elaine Duke 20180131 : vi

CSPAN2 David Redl Elaine Duke January 31, 2018

Fascinating speakers in the state of the neck has never been more important than it is rightt now. With that in mind, would like to welcome to this Stage Committee assistant secretary of communications and information at the department of commerce and the administrator of the ncaa, david reynolds. Thank you. [applause] thanks for that introduction thats great to be here again and special thanks to tim were again for inviting me into the Exciting Program he put together again this year. Id like to talk about two items on the agenda real quick that stand out. First is the cybersecurity channel that is going to be featuring ab in ramallah later today as well for discussion between rabbit doll and my former boss, chairman greg walden. I look forward to seeing you later in the day. I would like to lay out some of the Early International programs favorite thing to be aggressive in advocating u. S. Interests g d values arrogation across the globe the itu and other form. Id like to discuss department of commerces Security Network to improve the security of things and 5g networks in the administration saying to counter the threat of bot nets. It has become what it is today in part because the longstanding bipartisan consensus around the principle of multistakeholder policymaking and standarder development. The idea of stakeholder should participate in open and transparent decisionmaking process. The mets continue to fight for the print old and in open interoperable collaboration between all stakeholders. Right now, ntia as to priorities internationally. First is the preservation of the hua service which is become one of the most pressing issues over the last several months. Dont know much about the service, its an incredibly valuable tool for governments, businesses and intellectual Property Holders in individual users around the world. Put simply, who is a service that provides easily Accessible Information to purchase and manage domain names. The information is the starting point for Law Enforcement agencies investigating activity and for private sector and government actors seeking to protect Critical Systems from dangerousin cyberattacks which e growing more frequent all the time. I mentioned her work t on. Net. We know that those in the front lines of mitigation rely on who is to do their work effectively. Who this information is also valuable for combating misuse of intellectual property and savvy internet consumers is legitimate. It is the cornerstone of trust and accountability on the internet. Those of you whoho participate d its essential character has not changed much since its inception in the early 80s. This is for good reason. Remains critically important to those who rely upon it. Over the last few months the service of essential character has been threatened in response to the European Union for gdp are initiate a process to assess how the rule could affect who is given that includes limited information about users to register internet domain. Here are the facts. It bounces cybersecurity line for sand and Consumer Protection and have noted only limited changes to who was to be necessary to achieve compliance. Still there are some train to take advantage of the situation by arguing we should barriers to the quickly and easily Accessible Information. Some have argued the service could become a relic of the internets history. Today i would like to be clear the service can and should retain the essential character while complying with National Privacy laws including the gdp are. Its in the interest of all stakeholders thatt it does and for anyone here in the u. S. Who may be persuaded by arguments for drastic change coming of the u. S. Government expects the information to continue to be made available through the service. The second priority is the conference planting pot as they all love to collect which is scheduled for this october. The United States needs to press for change including establishing effective membership oversight of the finances. Particularly important given the United States has one of the two largest donors of the union and fight against efforts to move the itu beyond its limited mandate and into internet related cybersecurity i matters. We need i. T. That can effectively and efficiently perform its vital functions in the area of radio i communicatin and one that fosters rather than hinders procompetitive policies for telecom, particularlyn developing countries. Many of you know it has five elected positions. Deputy general, Deputy Director general of the three bureaus of the union. Im please to reiterate the strong support for the candidacy as director of the itu telecommunication developmentr bureau. The sector is generally known as part of the conduct of the two parts of the world that have yet to realize the economic societal benefit that many of us take for granted. A former ntia official and i am certain terrain would make an a outstanding professor country director. Moving forward, ntia remains committed to the community in particular there are four areas we think are especially important. The first of the free flow of information. Second is the multistakeholder approach t governance. Third is privacy and security and forth this emerging technology. The free flow of Information Online is the bedrock american print both in access to information and freedom of expression are basic humanri rights. So governments around the world are increasingly Walking Access to websites and content curtailing online freedoms we been shutting down the internet entirely. Governments impose topdown heavy handed in their governmental regulation of the internet and weve seen court ruling for the First American companies to remove information that wouldve been a better protected speech in the united dates. They have Economic Growth in the societal and educational benefits of the internet and they must be imposed. The second focus area. How can ntia support and promote the internet governance . One addition to gdpr, are there any other domain names i should pursue . And online privacy. Speak morek about the current cybersecurity work in a moment but i hope the community will wait in on help us identify whether department can be be even more impactful. Finally ndaa always seeks input on the departments work on emerging technologies. Congress has led the u. S. Morenment when it comes to technologies at the leadership requires continued engagementt for american industry and from all of you. In order to ensure american entrepreneurs are able to take risks and find Global Markets for the Digital Products and services we need to make sure we are charting the right path. On such issues as artificial intelligence, 5g will you industry to help us make the right choices as a government. As i notice i was could is a key priority for the department of commerce and for the administration. As many of you know last may the president issued an executive order on strengthening the networks and critical infrastructure. Among other items the order sought botnet attacks can extremely damaging and to put the broader internet at risk as well as its users. The department of commerce and the department of Homeland Security identifies actions by stakeholders recognize we cannot solve this problem throughve government regulation. Earlier the department issued a draft report on enhancing resilience against botnets. We relied on an open and transparent process tond generic ideas in the report and what you think those of you who participated. The report outlines positive vision for the future as well as five couple , ventricles that wd improve the resilience of the internet. It suggests activity to be undertaken by both the government and private sector actors. Botnet attacks are global problem. Really any solution will require the entire ecosystem acting in concert. Were not starting fromm scratc. There are tools available today that could mitigate these threats but they are not widely used. Changing this require more education and awareness as well as ann alignment of market incentives that will find thenc sweet spot between security and convenience. Behind the scenes was a lot of collaboration between various Government Agencies as this report was beingng drafted. Input from the private sector we know theres a common understanding about what we need to do and where we need to go to make this positive future reality. If you havent already, i encourage you to read the report and please provide feedback. Rt you can find request for comments on the website. There will be a workshop hosted by the department of commerce next month and columns comes wl incorporate all the comments received into the report for delivering it to the president in may. As a side note i just like to express how proud i am of the work of february at ntia on this report. It really was an effort that took a lot of doing my folks across all different agencies and as the one who is now getting to see the fruits of the labor as the administrator im incredibly proud of they hard work theyve done and outreach in putting together a quality product. I panelco of effort, smith wereo foster a more secure internet of things environment. Late last year stakeholders develop a series of documents on iot security and patching. Some great products came out of that process include highlevel specification of the components of an iot security update and suggestions for how manufacturers can communicate to consumers. We will continue to engage with the iot and Security Committee to promote the principles and the ideas in this document. This year with the word on Software Component with a a particular eye towards thirdparty components t used in iot devices. Most modern software as all you know is not written completely from scratch but includes existing components, modules and vibrates from the opensource and commercial software world. Products are being developed quickly and there dynamic marketplaces. The growth of the internet makes this challenge all the more difficult. In addition to the increased number of devices, more traditional vendors are assumed the role of Software Developers to add smart features or connectivity to existing products. While the majority flybys and components do not have known vulnerabilities, some do. They shared quantity of Software Means that products will ship with vulnerabilities or outofdate components. Transparency can be a very important tool. It can help vendors that demonstrate a process and help defend his understand how to respond and prioritize during an incident. After all, you cant protect what you dont know about. Finally, with respect to 5g master the president made it clear 5g security is a critical element of our National Security. With the proliferation of devices of the internet of things bringing security both the device and the network itself will be important to ensuring that only our National Leadership in wireless but also ensuring access to vital part of our national economy. Ntia will work with our colleagues across the federal government to coordinate a National Strategy on spectrum access and work with the private sector to assure the standards process for 5g promotes our National Interest and security. Todays commerce is a Good Opportunity to reflect on what issues matter to you most. Everyone today as perspectives that can of which the work that india is doing and we urge you to reach out to the staff will be here throughout the day and have conversations about the things you think we should be working on. We want to hear from you. We want to know what you think to helptant other want you to continue to thrive. Thank you for your time. [applause] morning. My name is rachel. I am the director of the congressional challenge. Its a National Contest which encourages kids to learn to code and create apps. In the past three years old have of congress we have inspired over 8000 students in 42 states to learn to code, and where buildingng the pipeline domestic coders who will be equipped with the skills required for the jobs of the future. So im here to introduce Homeland Security deputy secretary elaine duke. She was previously acting secretary of Homeland Security from july to december of last year that she is an accomplished Public Servant with over three decades of experienceer here and deputy secretary duke has served as member of Homeland Security Advisory Council and Strategic Advisor to government, tech and services coalition. So please welcome secretary sorry, deputy secretary duke. [applause] good morning, everyone. Its really an honor to be here at state of the net. It is though a little funny for me when i think about being here speaking in front of this group that are here for the state of the net conference. I am a grandmother who like jane austen novels, and just got a twitter account lastwi week. We will see what i can do to give you some information about dhs and where we are with the state of the net, that hopefully will be useful to those of you here in the room today. As everyone points out, everyone is an internet stakeholder, even if they dont know it yet. Im learning it more, more each day. Thats what brings me here today, how the internet has increasingly connecting us with our threats and Homeland Security, specifically terrorists are using the internet to recruit and radicalize, and share information for doityourself mass murder. Nearly every terrorist plot we uncovered today has a digital dimension. To give you a sense of the scales of that problem, the fbi has said there are currently 1000 homegrown terrorist investigations across the 50 states, and 1000 isis related investigations. Some of these overlap but still the scale is alarming. Of those are just the suspects we know about. Its like living among potential landmines. In both the recent terrorist attack in newew york, the Port Authority bus bomb in the following attack with a rental truck, the attackers were appearing to be inspired in part by online terrorist propaganda. It is becoming a very, very common payoff. An attack happens. We reviewed the suspects electronic and social media, and we find radical earnings, jihadist connections, beheading videos, and more. To be very clear, the internet itself is not the problem. Terrorist use social media for the same reason anyone use social media. Its an easy way to get connected. The technology that is helping businesses thrive and family stay in touch is the same technology that is helping terrorists conspire at broadband speeds. You can think of it like fire. Fire can cook again or one your house. It can also and golf communities and leave lifelong scars like it just recently did in california. On to note also the internet itself does not cause radicalization, though it does appear to service catalysts. Internet and mobile Communication Technology just make the radicalization process faster and easier, and can a accelerate the path to violence. While isis isnt the first or only terrorist group to have a presence online, their groundbreaking use of open social media platforms has forced all of us to confront the challenging issues with clear eyes. Theres a lot of thorny issues with combining, combating violent radicalization, excuss me, online. Issues surrounding the terms of service, content removal versus monitoring, the role of private companies and confronting this National Security problem, and the role the government in challenging terrorist narratives. These issues are further complicated as terrorists move froms open channels to encryptd or closed once. Before we think about what we can do to combat terrorists use of the internet we have to acknowledge three facts. The first is the Legal Framework of the United States and the constitution that we in the federal government have sworn to protect and defend. In the United States ideology, regardless of the cause is protected by the first amendment. Congress shall make no law abridging the freedom of speech or that of the press. In practice that means that merely advocating political or social positions, strong rhetoric, or the philosophic embrace of violent tactics may be protected by the constitution. Just looking at isis propaganda or visiting a neonazi website does not constitute illegal activity in our country. Of course while the government may not be able to take action against specific content, this does not preclude social Media Companies from takingcl action. The second fact is that removal is a shortterm and difficult system to automate when your target proliferate at high volumes and it constantly changing media and speed. Around the world Internet Users upload more than 400 hours of content every minute. Thats about to sift through for our companies. Additionally, twothirds of the terrorist content is we shared within the first two hours of its lifecycle. The good news here is that the government and technologies are developing tools that automatically detect and flag tears content, and there are indications that Technical Solutions<

© 2025 Vimarsana