Pulling down panelists throughout the year talking about what is the most important issues facing the state of the the net. I hope to speak with with as much of you as possible and sit on all of the panels as you know we have some fascinating topics some incredible speakers in the state of the net has never been more important than it is right now. With that in mind, i would like to welcome to the stage, the assistant secretary of communication and informations at the department of commerce. The administrator of the mtia david rettle. Thank you. [applause] well thanks for that introduction, and it is great to be here again at the state of the net, and special thanks to tim for invite megaand congratulations on the Exciting Program youve put together again this year. I would like to take this opportunity to talk about two items on the agenda quick that stand out for me prnlly first is excellent Cybersecurity Panel that is featuring mtia later today evelyn as well as the discussion between rob mcdowel and my former boss chairman greg so both things im looking forward to seeing later in the day. For my time i would like to lay out Early International policy priorities in the new administration. We plan to be aggressive in advocating for u. S. Interesting, and values, in our engagement across the globe itu and in other fora i would like to discuss cybersecurity work including efforts to improve security of internght of thingses and figi networks to counterbot net. Nd the internght has become what it is today in part because of a long stand ising bipartisan consensus around principle of multistakeholders. That idea to participate in open and transparent Decision Making process. Ll we must continue to fight for this principle and for an internght that is open and governed through collaboration between all stakeholders. Right now mtia has two, first is the preservation of the who is service one of the most pressing issues relate odd to i can over the last several months. If you dont know about the who a tool forit is government, business, intellectual property right holders and individual internght users around the world. Accessible information about the purchase and have the domain names when investigatinofinvestigating male activity and the private sector and government actors seeking to protect systems from dangerous Cyber Attacks which are more frequent overtime. I mentioned to work on the bath mats they kno i mentioned our work on botnets. We know those in the front lines of botnet mitigation woodlot on them to do the work effectively. Its a Simple Service but its the cornerstone of trust and accountability on the internet. Those of you who participate in i can know who is and has a bit of the cartridge and the subject of debate for use. Its essential character has not changed much since its inception in the early 80s. This is for good reason. It certainly remains important to those relyso upon it but over the last few months of the services essential character has been threatened. In response, icann initiate a process to assess how a this rue could affect who is, includes limited personal information about users a registered internet domains. Here are the facts. It balances the interests of cybersecurity, Law Enforcement and Consumer Protection and many european officials have noted only limited changes toed who is would be necessary to achieve compliance. Still there are some are try to take advantage of the situation but arent we should erect barriers to the accessible information. Some have argued the service must go dark and become a relic of the internet history. Today id like tohe be clear, te service cant and should be retained its essential character will comply with National Privacy laws. Its an interest of all internet stakeholders that it does and for anyone in the u. S. Who may be persuaded by arguments calling for drastic change please note the Us Government expected this information to continue to be made available. Our second Priority Areas making preparations for the conference, plenty pot. Which is scheduled foror this october. I believe that United States needs to press u for change including the subject effective membership oversight of the finances. This is particularly important given that United States is one of the two largest donors to the union and we need to fight against the continued efforts to drastically move youngest limited mandate and into internet related and cybersecurity matters. We need to perform its vital functions been rated communications and one that fosters rather than hinders procompetitive policiesth for telecom particularly in developingom countries. As many of you know we have five elected positions, directorgeneral, Deputy Director general of the directors of the three bureaus. Im pleased to reiterate the t strong support for the candidacy as director of the itu telling medications development bureau. A farmer in tight official, a veteran of the process and i am certain doreen would make an outstanding director of the sector. Going forward we remain committed to working with the internationall internet community, in particular there are four areas we think are especially important. The first is the free flow of information, second privacy and security, and emerging technology. The free flow of Information Online is a bedrock american principle and access to expression our basic human rights. Governments around the world are increasingly blocking access to websiteses and content, curtailg online freedoms, or shutting down the internet entirely. Governments are posing topdown heavyhanded intergovernmental regulation. In the past few yearsrs weve sn rulings that a force companies remove information that wouldve been considered protected speech in the United States. These restrictions threaten Economic Growth g and the sociel and educational benefits of the internet and they must be opposed. The second focus area of how can ntia continue to support and promote the multistakeholder approach to internet government . One edition, are there any other names related activities . These of the questions we want to hear o from our stakeholders on. We plan to continue our longstanding engagement in the Internet Governance Forum atng e United Nations. The forum of multistakeholder dialogue on crosscutting internet policy d issues. Theres always room for improvement here well seek input on the opportunities and nchallenges we face, how we can raise National Awareness about the idea andne its contributions to internet governance globally and wante to know we can do to help lower barriers to participation. Third, we want to not leverage resources to t better short cybersecurity and online privacy. Ill speak more about the cybersecurity work a moment. Ntia always seeks input on the departments work on emerging technologies. Commerce is led the government to new andes emerging technologies but the leadership requires continued engagement for american industry and from all of you. In order to ensure american entrepreneurs are able to take risks at the Global Market for Digital Products and services we need to make sure we are charting the right path. On such issues as artificial intelligence, blockchain and 5gg we are lookingnd for industry to help us makee the right choices as a government. As i notice ive is good is a key priority for the department of commerce and the administration. As many of you know last may the president issued an executive order strengthening the Cybersecurity Federal Networks and criticale infrastructure. Among other items action against Botnets Botnets and other threats. Botnet attacks can be extremely damaging at and the put the brr internet at risk as well as its users. Commerce and Homeland Security west i website about actions that could be taken by stakeholders recognizing we cannot solve this problem through government regulation. Earlier the department issued a draft report on enhancing resilience against botnets. We provide an open process Digital Gadgets in the report and what you think those of you who participated. The report outlined positive vision for theut future as wells five couple ventricles that would improve the internet. It suggests supporting activities to be undertaken by both government and privateer sector actors. Botnet attacks are a global problem. No single government or sector can solve it in isolation. Really any solution will require the entire ecosystem acting in concert. Were not starting from scratch. There are tools available today that can mitigate these threads that they are not widely used. Changing this will require more education as well as an alignment of market incentives that will find the sweet spot between security and convenience. Behind the scenes there was a lot of collaboration. Combined with essential input from the private sector we know theres a common understanding about what we need to do and what we need to go to make this future a reality. If you havent already i encourage you to read the report and please provide feedback. You can find the request on our website. There will be a workshop hosted by department of commerce next month and commerce will incorporate all the comments received into the report for delivering it to the president in may. Theres a side note, just like to express our proud i am of the work of everybody at ntia on this report. It really was an effort that took a lot of doing by folks across all different agencies and as the one who is now getting see the fruits of their labor as the administrator im incredibly proud of the hard work theyve done an outreach of putting together a quality product. And it failed effort commerce has been working to foster more secured secure internet of things in private. Last year stakeholderss in one f the open multistakeholder processes develop documents on i. T. Security and patching. Some great products came out of that process including highlevel specification of the components of an iot secretly update and suggestion for how manufacturers communicate patches to consumers. We will engage with the iot and security committees to promote the principles and thes ideas. This year we will be working Software Component transparency with a particular eye towards third components. Most modern software as you know is not written a completely from scratch. But includes existing components, modules and library from opensource and commercial software world. Products are being developed quickly and in a dynamic marketplace. It could be a challenge to track the use of all of the separate components. The growth of the internet makes this challenge all the more difficult. In addition to the increased number of devices, more traditional vendors are assuming the role of Software Developers to add smart features to existing products. While the majority of libraries and components do not have known vulnerabilities, some do in the ship quantity of Software Means products will ship with vulnerabilities or out of it components. Transparency can be a very important tool. You can reward vendors the that demonstrate the secure Development Process and help defenders understand how to respond and prioritize during an incident. You cant protect what you dont know about. With respect to 5g last you the president made it clear 5g Network Security is a critical element of our National Security. With the proliferation of devices of the internet of things is bringing, security of both the device and the network itself would be important to ensuring that only our National Leadership in wireless but also to ensuring access to vital part of our national economy. Ntia will continue work with our colleagues across the federal government to coordinate a National Strategy on spectrum access and work with the private sector to ensure the standards process for 5g continues to promote our National Interest and security. Todays coverage is a Good Opportunity to reflect on what issues matter to you most. Everyone has perspectives that can enrich the work that ntia is doing and we urge you to reach out to the staff who will be here throughout the day and have conversations about the things you think we should be working on. We want to hear from you. What you know what you think is important and we want to be able to help you and the industry to continue to thrive. Thank you for your time. [applause] good morning my name is rachel the cost. I am the director of the congressional challenge. Its a National Contest which encourages kids to learn to code and create apps pick in the past three years on behalf of congress weve inspired over 8000 students in 42 states to learn to code and rebuilding the pipeline of domestic coders who will be equipped with the skills required for the jobs of the future. So im here to introduce Homeland Security deputy secretary elaine duke. She was previously acting secretary of Homeland Security from july to december of last year. She is an accomplished Public Servant with over three decades ntof experience, and deputy secretary duke has served as member of Homeland SecurityAdvisory Council and Strategic Advisor to government check and services coalition. So please welcome deputy secretary duke. [applause] good morning, everyone. Its really an honor to be here at state of the net. It is though a little funny for me when i think about being here speaking in front of this group that are here for the state of the net conference. I am a grandmother who likes janend austen novels and just gt a twitter account last week. So well see what i can do to give you some information about dhs and where we are with the state of the net, but hopefully we will be useful to those of you here in the room today. As everyone points out, everyone its an internet stakeholder, even if they dont knowak it ye. Im learning it more and more each day. Thats what brings me here today, have the internet has increasingly connecting us with our threats and Homeland Security, specifically terrorists are using the internet to recruit and radicalize and share information for doityourself mass murder. Nearly every terrorist plot we uncovered today has a digital dimension. To give youou a sense of the sce of that problem the fbi has said there are currently 1000 homegrown terrorist investigations across the 50 states, and 1000 isisrelated investigations. Some of these overlap, but still the scale is alarming. And those are just the suspects we know about. Its like living among potential landmines. In both the recent terrorist attack in new york, the attempted Port Authority bus station bomber and the halloween attack with a rental truck, the attackers were appearing to be inspired in part by online terrorist propaganda. It is becoming a very, very common tale, and attack happens, we reviewed the suspects electronic and social media, and we find radical earnings, jihadist connections, beheading videos and more. To be very clear the internet itself is not the problem. Terrorist use social media for the same reason anyone use social media. Its an easy way to get connected. That technology that is helping elbusinesses thrive and families stay in touch is of the same technology thats helping terrorists inspired at broadband speeds. You can think of it like fire. Fire to cook for dinner or waterhouse. It could also in golf communities and leave lifelong scars like it just recently did in california. Its Important Note also that the internet itself does not cause radicalization, though does a disservice catalyst. Internet and mobile Communication Technology just make the radicalization process faster and easier, and can accelerate the path to violence. While isis isnt the first or only terrorist group to have a presence online, their groundbreaking use of open social media platforms has forced all of us to confront the challenging issue with clear eyes. There are a lot of thorny issues with combining combating violent radicalization online. Issues surrounding the terms of service, content removal versus monitoring, the role of private companies in confronting this National Security problem, and the role of the government in challenging terrorist narratives. These issues are further complicated as terrorists move from open channels to encrypted or closed ones. Before we think of what we can do to combat terrorists use of the internet, we have to acknowledge three facts. The first is the Legal Framework of the United States and the constitution that we in the federal government have sworn to protect and defend. In the United States ideology, regardless of the cause of support is protected by the first amendment. Congress shall make no law abridging the freedom of speech or that of the press. In practice, that means that merely advocating political or social positions, strong rhetoric, or the philosophic embrace of violent tactics may be protected by the constitution. Constitution. Just looking at