Skip to main content

tv   David Redl Elaine Duke  CSPAN  February 2, 2018 7:27am-8:00am EST

7:27 am
and it should be used to ensure that american people get more information, accurate information toic choose their leaders and their government and their own future. so thank you very much enjoy the event. and i really appreciated being able to launch you off today. thank you. [applause] >> hello everyone it is my pleasure an my privilege to be up here this podium at the internet education foundations 14th annual state of the net conference. my name is emory a fellow at the internet law and policy and a framework for early career professionals that was started bit ief parent organization. and i'm here to interview -- sorry i'm here in other o room next to c-span where we'll be
7:28 am
pulling down panelists throughout the year talking about what is the most important issues facing the state of the the net. i hope to speak with with as much of you as possible and sit on all of the panels as you know we have some fascinating topics some incredible speakers in the state of the net has never been more important than it is right now. with that in mind, i would like to welcome to the stage, the assistant secretary of communication and informations at the department of commerce. the administrator of the mtia david rettle. thank you. [applause] >> well thanks for that introduction, and it is great to be here again at the state of the net, and special thanks to tim for invite megaand congratulations on the exciting program you've put together again this year. i would like to take this opportunity to talk about two items on the agenda quick that stand out for me prnlly first is
7:29 am
excellent cybersecurity panel that is featuring mtia later today evelyn as well as the discussion between rob mcdowel and my former boss chairman greg so both things i'm looking forward to seeing later in the day. for my time i would like to lay out early international policy priorities in the new administration. we plan to be aggressive in advocating for u.s. interesting, and values, in our engagement across the globe itu and in other fora i would like to discuss cybersecurity work including efforts to improve security of internght of thingses and figi networks to counterbot net.nd the internght has become what it is today in part because of a long stand ising bipartisan consensus around principle of multistakeholders. that idea to participate in open and transparent decision making process.ll we must continue to fight for this principle and for an internght that is open and governed through collaboration between all stakeholders.
7:30 am
right now mtia has two, first is the preservation of the who is service one of the most pressing issues relate odd to i can over the last several months. if you don't know about the who a tool forit is government, business, intellectual property right holders and individual internght users around the world. ... accessible information about the purchase and have the domain names when investigatinofinvestigating male activity and the private sector and government actors seeking to protect systems from dangerous cyber attacks which are more frequent overtime. i mentioned to work on the bath mats they kno i mentioned our work on botnets. we know those in the front lines of botnet mitigation woodlot on them to do the work effectively.
7:31 am
it's a simple service but it's the cornerstone of trust and accountability on the internet. those of you who participate in i can know who is and has a bit of the cartridge and the subject of debate for use. its essential character has not changed much since its inception in the early '80s. this is for good reason. it certainly remains important to those relyso upon it but over the last few months of the services essential character has been threatened. in response, icann initiate a process to assess how a this rue could affect who is, includes limited personal information about users a registered internet domains. here are the facts. it balances the interests of cybersecurity, law enforcement and consumer protection and many european officials have noted only limited changes toed who is would be necessary to achieve compliance. still there are some are try to take advantage of the situation but aren't we should erect
7:32 am
barriers to the accessible information. some have argued the service must go dark and become a relic of the internet history. today i'd like tohe be clear, te service can't and should be retained its essential character will comply with national privacy laws. it's an interest of all internet stakeholders that it does and for anyone in the u.s. who may be persuaded by arguments calling for drastic change please note the us government expected this information to continue to be made available. our second priority areas making preparations for the conference, plenty pot. which is scheduled foror this october. i believe that united states needs to press u for change including the subject effective membership oversight of the finances. this is particularly important given that united states is one of the two largest donors to the union and we need to fight against the continued efforts to drastically move youngest limited mandate and into
7:33 am
internet related and cybersecurity matters. we need to perform its vital functions been rated communications and one that fosters rather than hinders procompetitive policiesth for telecom particularly in developingom countries. as many of you know we have five elected positions, director-general, deputy director general of the directors of the three bureaus. i'm pleased to reiterate the t strong support for the candidacy as director of the itu telling medications development bureau. a farmer in tight official, a veteran of the process and i am certain doreen would make an outstanding director of the sector. going forward we remain committed to working with the internationall internet community, in particular there are four areas we think are especially important. the first is the free flow of
7:34 am
information, second privacy and security, and emerging technology. the free flow of information online is a bedrock american principle and access to expression our basic human rights. governments around the world are increasingly blocking access to websiteses and content, curtailg online freedoms, or shutting down the internet entirely. governments are posing top-down heavy-handed intergovernmental regulation. in the past few yearsrs we've sn rulings that a force companies remove information that would've been considered protected speech in the united states. these restrictions threaten economic growth g and the sociel and educational benefits of the internet and they must be opposed. the second focus area of how can ntia continue to support and promote the multi-stakeholder approach to internet government? one edition, are there any other
7:35 am
names related activities? these of the questions we want to hear o from our stakeholders on. we plan to continue our long-standing engagement in the internet governance forum atng e united nations. the forum of multi-stakeholder dialogue on crosscutting internet policy d issues. there's always room for improvement here we'll seek input on the opportunities and nchallenges we face, how we can raise national awareness about the idea andne its contributions to internet governance globally and wante to know we can do to help lower barriers to participation. third, we want to not leverage resources to t better short cybersecurity and online privacy. i'll speak more about the cybersecurity work a moment. ntia always seeks input on the departments work on emerging technologies. commerce is led the government to new andes
7:36 am
emerging technologies but the leadership requires continued engagement for american industry and from all of you. in order to ensure american entrepreneurs are able to take risks at the global market for digital products and services we need to make sure we are charting the right path. on such issues as artificial intelligence, blockchain and 5gg we are lookingnd for industry to help us makee the right choices as a government. as i notice i've is good is a key priority for the department of commerce and the administration. as many of you know last may the president issued an executive order strengthening the cybersecurity federal networks and criticale infrastructure. among other items action against botnets -- botnets and other threats. botnet attacks can be extremely damaging at and the put the brr internet at risk as well as its users. commerce and homeland security west i website about actions that could be taken by stakeholders recognizing we cannot solve this problem through government regulation. earlier the department issued a draft report on enhancing
7:37 am
resilience against botnets. we provide an open process digital gadgets in the report and what you think those of you who participated. the report outlined positive vision for theut future as wells five couple ventricles that would improve the internet. it suggests supporting activities to be undertaken by both government and privateer sector actors. botnet attacks are a global problem. no single government or sector can solve it in isolation. really any solution will require the entire ecosystem acting in concert. we're not starting from scratch. there are tools available today that can mitigate these threads that they are not widely used. changing this will require more education as well as an alignment of market incentives that will find the sweet spot between security and convenience. behind the scenes there was a lot of collaboration. combined with essential input from the private sector we know there's a common understanding about what we need to do and what we need to go to make this
7:38 am
future a reality. if you haven't already i encourage you to read the report and please provide feedback. you can find the request on our website. there will be a workshop hosted by department of commerce next month and commerce will incorporate all the comments received into the report for delivering it to the president in may. there's a side note, just like to express our proud i am of the work of everybody at ntia on this report. it really was an effort that took a lot of doing by folks across all different agencies and as the one who is now getting see the fruits of their labor as the administrator i'm incredibly proud of the hard work they've done an outreach of putting together a quality product. and it failed effort commerce has been working to foster more secured secure internet of things in private. last year stakeholderss in one f the open multi-stakeholder processes develop documents on i.t. security and patching. some great products came out of that process including
7:39 am
high-level specification of the components of an iot secretly update and suggestion for how manufacturers communicate patches to consumers. we will engage with the iot and security committees to promote the principles and thes ideas. this year we will be working software component transparency with a particular eye towards third components. most modern software as you know is not written a completely from scratch. but includes existing components, modules and library from open-source and commercial software world. products are being developed quickly and in a dynamic marketplace. it could be a challenge to track the use of all of the separate components. the growth of the internet makes this challenge all the more difficult. in addition to the increased number of devices, more traditional vendors are assuming the role of software developers to add smart features to existing products. while the majority of libraries and components do not have known vulnerabilities, some do in the
7:40 am
ship quantity of software means products will ship with vulnerabilities or out of it components. transparency can be a very important tool. you can reward vendors the that demonstrate the secure development process and help defenders understand how to respond and prioritize during an incident. you can't protect what you don't know about. with respect to 5g last you the president made it clear 5g network security is a critical element of our national security. with the proliferation of devices of the internet of things is bringing, security of both the device and the network itself would be important to ensuring that only our national leadership in wireless but also to ensuring access to vital part of our national economy. ntia will continue work with our colleagues across the federal government to coordinate a national strategy on spectrum access and work with the private sector to ensure the standards process for 5g continues to promote our national interest and security. today's coverage is a good opportunity to reflect on what issues matter to you most. everyone has perspectives that
7:41 am
can enrich the work that ntia is doing and we urge you to reach out to the staff who will be here throughout the day and have conversations about the things you think we should be working on. we want to hear from you. what you know what you think is important and we want to be able to help you and the industry to continue to thrive. thank you for your time. [applause] >> good morning my name is rachel the cost. i am the director of the congressional challenge. it's a national contest which encourages kids to learn to code
7:42 am
and create apps pick in the past three years on behalf of congress we've inspired over 8000 students in 42 states to learn to code and rebuilding the pipeline of domestic coders who will be equipped with the skills required for the jobs of the future. so i'm here to introduce homeland security deputy secretary elaine duke. she was previously acting secretary of homeland security from july to december of last year. she is an accomplished public servant with over three decades ntof experience, and deputy secretary duke has served as member of homeland security advisory council and strategic advisor to government check and services coalition. so please welcome deputy
7:43 am
secretary duke. [applause] >> good morning, everyone. it's really an honor to be here at state of the net. it is though a little funny for me when i think about being here speaking in front of this group that are here for the state of the net conference. i am a grandmother who likes janend austen novels and just gt a twitter account last week. so we'll see what i can do to give you some information about dhs and where we are with the state of the net, but hopefully we will be useful to those of you here in the room today. as everyone points out, everyone it's an internet stakeholder, even if they don't knowak it ye. i'm learning it more and more each day. that's what brings me here today, have the internet has increasingly connecting us with
7:44 am
our threats and homeland security, specifically terrorists are using the internet to recruit and radicalize and share information for do-it-yourself mass murder. nearly every terrorist plot we uncovered today has a digital dimension. to give youou a sense of the sce of that problem the fbi has said there are currently 1000 homegrown terrorist investigations across the 50 states, and 1000 isis-related investigations. some of these overlap, but still the scale is alarming. and those are just the suspects we know about. it's like living among potential landmines. in both the recent terrorist attack in new york, the attempted port authority bus station bomber and the halloween attack with a rental truck, the attackers were appearing to be inspired in part by online
7:45 am
terrorist propaganda. it is becoming a very, very common tale, and attack happens, we reviewed the suspects electronic and social media, and we find radical earnings, jihadist connections, beheading videos and more. to be very clear the internet itself is not the problem. terrorist use social media for the same reason anyone use social media. it's an easy way to get connected. that technology that is helping elbusinesses thrive and families stay in touch is of the same technology that's helping terrorists inspired at broadband speeds. you can think of it like fire. fire to cook for dinner or waterhouse. it could also in golf communities and leave lifelong scars like it just recently did in california. it's important note also that the internet itself does not cause radicalization, though does a disservice catalyst. internet and mobile
7:46 am
communication technology just make the radicalization process faster and easier, and can accelerate the path to violence. while isis isn't the first or only terrorist group to have a presence online, their groundbreaking use of open social media platforms has forced all of us to confront the challenging issue with clear eyes. there are a lot of thorny issues with combining -- combating violent radicalization online. issues surrounding the terms of service, content removal versus monitoring, the role of private companies in confronting this national security problem, and the role of the government in challenging terrorist narratives. these issues are further complicated as terrorists move from open channels to encrypted or closed ones. before we think of what we can do to combat terrorists use of the internet, we have to
7:47 am
acknowledge three facts. the first is the legal framework of the united states and the constitution that we in the federal government have sworn to protect and defend. in the united states ideology, regardless of the cause of support is protected by the first amendment. congress shall make no law abridging the freedom of speech or that of the press. in practice, that means that merely advocating political or social positions, strong rhetoric, or the philosophic embrace of violent tactics may be protected by the constitution. constitution. just looking at isis propaganda or visiting a neo-nazi website does not constitute illegal activity in our country. of course while the government may not be able to take action against specific content, this does not preclude social media companies from taking action.
7:48 am
the second fact is that current removal is a short-term and difficult system to automate when your target proliferates at high volumes at that constantly changing media and speed. around the world, internet users upload more than 400 hours of content every minute. that's a lot to sift through for our companies.if additionally, two-thirds of the terrorist content is reshared within the first two hours of its lifecycle. the good news here is that the government and technology are developing tools that automatically detect and flag terrorist content, , and there e indications that technical solutions will be among the most effective ways to manage the volume. however, as extremist groups migrate to encrypted messaging platforms, monitoring becomes more difficult. so while the content removal is an important part of the
7:49 am
response, they cannot be the entire response. the third fact is that any long-term response must acknowledge that there are various audiences at play, and each have different informationn needs. some individuals are already mobilized to violence. some are radicalize but have not yet taken steps towards violence. other people want to actively refute terrorist propaganda. and then there's the majority of people who just want to go about their daily lives without the threat of terrorism. there is no one answer, there is no one silver bullet, but we at the different of homeland security are surgically focused on the terrorism prevention, try to prevent and unity in the process of radicalization. and because so much of the radicalization is tied to the internet and because the internet knows no borders, we are actively trying to prevent both international and domestic terrorist from radicalizing and
7:50 am
recruitingng people to violence. through social media, social science research, and the whole body of knowledge we know that it's not a linear process. there are a number of root causes and drivers. domestically, we've approached terrorism prevention in a range of ways. today i had to tell the little bit about how we're trying to challenge terrorist narratives, share information and catalyze nongovernmental solutions. first, challenginged narratives. the response entails directly or providing alternative options. through the internationally recognized private-public partnership known as peer-to-peer, calendaring extremism program, we've engaged with young people internationally. peer to peer challenge teams from colleges and universities to develop and implement social media programs targeting the narrative and online recruiters of violent extremism. we recognize the need for more
7:51 am
resources into space, so when july the department of homeland security office of terrorism prevention partnerships awarded 26 grants to community based organizations. at least have a dozen ofns the awardees will have a robust online presence, including pushing back against the messagessh of isis and other terrorist recruiters and radicalizers. for example, one project is developing an application that will put high-quality video editing tools tips on digital marketing and relevant research finding on radicalization and equipment in the hands of thousands. this will help make the creation of countermessages of viral practice and will add to the peer to peer work that i mentioned earlier. while we are limited in what we can do domestically in the counter narrative space, calendaring narratives is an important part of our terrorism
7:52 am
prevention strategy. i am excited to see the grant awardees move their ideas from application into action, and then monitoring the results. our second broad category of terrorism prevention is information sharing, and dhs has done a lot of work in this space over thepa last year. we want to expand the anderson of violent radicalism and vterrorist recruitment so more people can identify it, and more importantly, where people can prevent m it. this includes tools such as developing social media community awareness briefings to rep technology sector become aware of terrorist recruitment online so they can catalyze efforts to counter it. it also includes conferences such as the digital forum on terrorism prevention that dhs cosponsored last september. at the digital forum experts from government, the tech industry, maybe many of you,
7:53 am
startups and community organizations gathered together to share information and showcase technologies andfo techniques to counter the use of terrorist social media. across the u.s. government, dhs also administratively houses an interagency task force to increase information sharing on terrorism prevention with other agencies, including the national counterterrorism center, the fbi, and department of justice. that wide range of stakeholders brings me to our third category of prevention,th catalyzing nongovernmentt solutions. with apologies to the state of the net i want to their fries your model. everyone is a terrorism prevention stakeholders, even if they don't know it yet.w we believe that in combining the talents of communities coming gao's and the technology sector, we can drive non-governmental responses to terrorist recruitment and r radicalization that are authentic, more scalable and more sustainable.
7:54 am
we can create and disseminate more powerful counter narratives and alternative narratives. the truth is the government doesn't have great credibility in the online space. for good reasons i believe. we arend too old, too big and to square. we need credible voices especially for our community partners. so it's important that we help empower those groups with the information, hardships and resources they need to be successful. this is not ainer fight dhs or e u.s. government can do on their own. our enemies are dispersed and they are crowdsourcing their activities. fortunately, our allies are fighting with us in the same space. in the past year there's been tremendous progress, particularly in the technology center. last july the united kingdom home secretary amber rudd and i travel to silicon valley to meet with the newly launched global
7:55 am
internet forum on counterterrorism, rgi sct. the j sct led by facebook, microsoft, youtube and twitter is the first time major companies have come together to work on research and technology techniques in thiss area. moreover, they are committed to helping smaller companies that may not have the same resources to tackle terrorism prevention online. i am very, very encouraged by theam work of gisct to counter this incredibly dangerous problem. we hope more companies will consider engaging with us to help stop terrorism here and abroad because terrorists radicalization makes the world and more dangerous place for each one of us. we also know that other countries share our concerns. at the 72nd united nations general assembly this year, uk prime minister, italian prime minister, and the french president address world leaders on this topic, along with our
7:56 am
acting deputy secretary at the time, clare grady. and in october i joined my international counterpart at the g7 meeting in italy to discuss how to prevent terrorist use of thees internet with the participation of theat private sector, and interesting enough private sector attended with us. this this is a true government private industry collaboration in countering terrorism on the internet. our new secretary nielsen is continuing this robust engagement, and soon she will be traveling to silicon valley for our second meeting with gisct, along with uk home secretary amber red. we were also cohost the second digital forum on terroris prevention, also in silicon valley in february. some of the topics on the agenda will be innovation in counter messaging, content takedown, and online to off-line interventions. the third item is important
7:57 am
because it's not enough to push back against terrorist messaging. we have to ensure organizations are trying to develop off ramps for people at risk for radicalization to mobilization to violence. these off ramps need to be developed in partnership with local organizations mirroring methods proven and related fields like domestic violence and suicide prevention. as ie said before we the government cannot do this alone. i'm very proud of the real rols has played in terrorism prevention so far, and countering the terrorist use of the internet but our work and your work is not yet done. preventing terrorism will remain core to the mission of the department but we are very interested work with partner such as you from all corners ofs the world to make it a safer place for each one of us. help us. please work with us. i know there are members of my staff from the office of terrorism prevention partnerships here today. they are raising their hands and
7:58 am
they are anxious to hear from you throughout the conference, and let us know. michael brown who raised his hand from the task force. i don't mean to frighten you, please believe me when i tell you this is urgent. each morning we sit through our intelligence briefings and i'm here today with the urgency and a purpose. right now in some dark corner of the internet that are step-by-step instructions on how to build a bomb with items you can pick up w in any hardware store. right now a terrorist recruiter with hate in his heart is feeding allies to a confused teenager he found earlier. right now someone in the country is being tested. do they become a soldier for the caliphate, or do they turn away? but working together we can change the outcome, and we can e change lives. we are all terrorist prevention stakeholders, even if we don't know it yet.r thank you. [applause]
7:59 am
[inaudible conversations] >> thanks, tim. so i am very happy to be today to introduce amy webb. amy's title time as i understaa quantitative futurist so she totally has the most interesting title of anybody in this room. she founded the future today institute and she teaches at in wide use stern school of business or she studies have technology and science will disrupt business and ignite geopoliticalil change. where she got universities, industry and governments on how to navigate that change. she explores a range of intriguing ideas like what she calls quote fair and equal codebase, , safeguards against e dangers of online buyers.


info Stream Only

Uploaded by TV Archive on