Skip to main content

tv   Close Up  CSPAN  April 29, 2011 7:00pm-8:00pm EDT

7:00 pm
that meant they were coming for me next, and so i beg you do not make it about you and about being right. make it about my son, and then all our children will stand a chance for being safer. >> here, here. [applause] .. as you may imagine we have a great number of questions, so i need to move on to the next, and then exits from abe who is coming -- one of our webcast audience and he asks, what relationship to your panelist see between delegitimization and the big lie of strategy in nazi germany? i am going to start with you rafael. [laughter] >> i knew it.
7:01 pm
it is a good question. i don't have an answer to all of the questions. i see the problem. >> lorna i knew you would have the answer. >> the relationship between anti-semitism -- you end up against the right of the jewish people to assist and live and that is the connection but i think it is important to understand that the short-term goal or to reduce the ability of the state of israel to act and also to reduce the freedom of expression of those friendly to israel and i know coming from you when you say you are friend of israel you have to start worrying. there are some friends in europe left and the delegitimization
7:02 pm
campaign is making it difficult for those people to stand up and defend their situation. second they think we have to go beyond the rapid reaction force mentality. whenever there is a crisis somebody has to say something about defending israel because we won't have -- but i think it is very critical. with a plan to constant and consistent way if we want to win the battle of delegitimization because unless we do that consistently every day, every single hour, instead of battling in a crisis, we are going to seem also a -- for israel and again as lorna said, we are doing this -- i'm doing this because of an altruistic sentiment. [inaudible]
7:03 pm
i am doing that because i'm defending myself. i'm defending my identity and my values. i want my son to live in peace and i will finish with a little anecdote. when i was five years old, my father brought me to a basketball match in madrid between the real madrid in the mccauley. through one does not matter right now. >> course it matters. left us be a few days or weeks i can exactly remember i was asked a school to come up to the drawing board enlist the european country so i said well i saw them a copy in the champions league in europe so i put israel, spain and france and i got in fmat. i couldn't understand why and i don't understand why people are criticizing israel is not being part of the west today. [applause]
7:04 pm
>> there are delegitimizers in everything. i don't know whether any of you are familiar with robert kehl deanie's worked. any of you want to be influential over your fellow citizen with you are an aspiring salesperson or politician you need to read it. you seriously need to read it. you only need to read the first chapter sadat worried that worry but you need to read it. because it talks about how innocent very very revolutionary world, and i don't mean the spring revolutionary i mean technological change that her parents can only -- at the amount of information that they need to stand still to exist as a human being in the modern world. and he talks about the animal kingdom's reference to a click society which is the -- another were to make a judgment that will be on the balance of your life and death literally
7:05 pm
sometimes on actually a perception with one snapshot. it is this perception and if you are confident and if you are standing with the right people and the perception is in this rapidly changing world where people decide whether they are going to give you the permission to communicate to them, whether they -- will leave the sound on world issues do in the cooking for the kids. okay, it is a confidence and it is about perception and at the moment the opposition are gaining the balance of power. and we are not aiding ourselves because all we are doing is talking about delegitimization. actually the truth is we need to be -- actually not bothering about their confidence for bothering about our lack of confidence. we have got to get back the wind in our sails. andy and we know that it is a
7:06 pm
smoke and mirrors operation that our opponents are using to protect a balance of power. .. you haven't done any polling about how they think of the middle east and israel but actually i have read here it is. and don't use the public who has a good common sense to excuse what you think and when you want to do. we need to call people's bluff. so let's sharpen our game because alex ferguson, who plays the only real game in town for those who like football [laughter]en
7:07 pm
would never entertain withoutut his own game plan.gam the opponents team was going to do but he would have his own wn strategy. so if we are going to be winning the next time we meet we will be talking about our campaign andou not their campaign of their campaign and we will be on our way to making sure we have to win back. [applause] >> our next question in a way follows upon the comment that you just need and i will direct it to you first which is what strategies do you believe will work to legitimization and the social media, talking about what's current? what should we be doing a facebook, twitter, youtube and so forth? >> first of all laura is a true zionist because this is the steward of zionism when others
7:08 pm
are talking we are doing. when there were all the controversy in the early days in the early 20th century about whether what is the political future of zionism we are building settlements, roads and so on and one thing led to another and here you have the state of israel today and by the way i think this is the ultimate answer with a formal government objective, believe it or not, to be one of the 50 leading countries in terms of quality living life. i know that many of you are still traveling on missions to israel where you go from one pocket of poverty to another area. [laughter] [applause] and by not saying there are no social problems, don't get me wrong, and then you end up in the cocktail in the king david. [laughter] but there's a different story brewing with all of its complexity. we want to be world leader.
7:09 pm
the israelis are disproportionately present at every humanity today. a relatively speaking, we are like the size of britain in terms of the technology and breakthrough ideas and many different areas so this is the real answer the end of the day, the ability to communicate the true character to the world i think is the platform and it has to do a lot with the branding is real project and many other ideas that are going on. and this, i believe, is the mainstream of the answer and we have spoken about dealing with the delegitimizes which are few and far apart and support from the liberal progressive circles, and we've spoken about all of these elements. but, if we are able to do that this will come into play in the social media. and we have so many groups out there doing the work. the conference in london is very
7:10 pm
similar in its logic to what is going to happen this coming weekend here. bringing together a diverse group of people to talk to each other. the people of the frontier, in the ground, they have the knowledge and the experience, the insight and they can share and learn from each other. and each and every one of them is a broadcasting station. and they have many friends and all sorts of communities that they talk to and communicate with. so we are able to sort of coalesce our network, educate, we get more effective, vibrant, learn faster than we will see the response, you will see us back in 2011. >> very good. i just want to follow-up on this for a moment in connection to what she was talking about earlier. and the question i have is whether the traditional media can place this whole debate and
7:11 pm
whether the media by which to, you know, contradict that or counter it. any thoughts about that? >> if you want to repeat the question, sorry. >> fair enough. you early on talked about the fact of the influence that for a sample british media has not just in britain but in the united states among elites or whatever and the impact that may have and the inference that can place the whole, you know, the size of the deal legitimization movement and whether the social media is a means by which to, you know, to counter that. >> i have to say i am by trade and i don't have a facebook site and i have never tweeted in my
7:12 pm
life. [laughter] [applause] every single campaign i have ever run has relied on one individual asking another based on the relationship and i feel we are over relying in on the idea of the viral media or the new media, and we will repaint if we don't remember as said several times it's about people, stupid, therefore you need to go out and sit to the most of the people and a smile at them. you can't tweet your way to success. [laughter] [applause] the other thing i would like you to do is to realize, and ensure that it's not about being clever. it's about being smart. the reason people want to be with you is for many reasons. it's not just because they share your political views. it's because they liked and
7:13 pm
respected as an individual. you are the "it" person, the elf a person, and we get too clever about the dynamics as human beings. and the truth is as the book really sets it from the way we respond is the scene from generation to generation and from century to century and we need to remember that first of all, nobody expects. and the most disarming thing you can do is tell somebody that you don't know because it builds trust and respect. the second thing you can tell them is that there is no good answer to a question. complexity is our friend. but all too often because we are scared, we end up trying to pretend that israel is the only perfect democracy in the world. and therefore we put ourselves outside the normal consensus and
7:14 pm
therefore people don't want to engage with us. so although you would like to talk about the new media, the truth is i think it is a red herring to what actually most of us can do. and in the in what is going to count more than anything else. and remember, in the end, the reason that you buy a diamond, house or whatever is because of the individual as well by looking into their office and i'm sure you've all got beautiful winning mize. [laughter] >> thank you. [applause] >> lorna, yet to say i'm your kind of person. i don't devotees took the jeter and i've never twittered and i'm the least technologically proficient person probably in this audience. there is a question from jonathan who is watching the
7:15 pm
webcast here in washington did to you and if i can read it, so organizations and individuals who identified themselves as pro-israel have supported sanctions against settlement construction stating that it is kind of tough love for israel. you also mentioned red lines. sanctions are red line and if so, how should pro-israel activists who believe the settlements are a part of the problem response? >> i had this coming, didn't i? >> you really did. >> one of the difficulties in responding to the d legitimization is the sophisticated manner in which its challenge to us. it is that brings forward issues where alliances can be built deep into groups that are not legitimizes as well as within israel and this is why a lot of times it's not about the issue
7:16 pm
is about the person and i know this is a complicated answer. but let me give you two examples. if the person calling for the boycott on the settlement product is an israeli, taxpaying citizen from serving in the military, living in israel, building a home in israel, then it's whether you like it or not or agree with it or not it is a legitimate act of progress because the motivation is the security of the state of israel and these are people that care deeply enough about the future of israel to make a controversial political lacked. but of those calling for a boycott on the settlement are people that promotes the once staid approach this is a euphemism for the political elimination of the state of israel and so on and it's an act of the legitimization. this is why the movement is a delegitimized movement, look at what they're singing and then
7:17 pm
you have a clear answer and the fact that the focus on softish use doesn't deny the true identity. in dillinger of these organizations are of course on the left. this is an issue that comes primarily on the left. if the answer is in my view if you want to see whether the group on the left is part of the pro-israel group even if you hate their position or not, you need to look for soft tissues, intangible issues. can you see her love for israel? can you see is real receiving the benefit of the doubt? can you see the intent to provide the context where the actions could be understood even though it's not support, just understood? is there an attempt to show that win is rell -- israel fails but when it succeeds it is a
7:18 pm
societal look success because in many cases limousine is really success is a local marginal personal success but failure on the human rights issue that is the entire society. so these are the things to tell you where does this group stand, and i know that it's not so easy but those of us that have been in this business, we can smell and we can see and approve of the putting a lot of times is. so, that is a little bit. it's not clear answer. >> thank you we are coming close to the end and i would like to pose a question to each of you if you could respond, limiting your response to two minutes and
7:19 pm
the sums of the essence of the discussion which is why is israel the only country in the world to have the right to exist which is the key point of the deal legitimization, and raw file, if i could open with you. >> for different reasons it depends on in europe we started to say in the beginning and there's a cocktail of reasons and historical reasons from the left and the right that there is the complex environment to go against israel that's why it's a multifaceted way put in question but it's like the weather, like it or not, it is what it is, and there are people, enemies of the state of israel better using all kinds of weapons, soft
7:20 pm
approaches, hard approaches, anything that comes to fight the idea of israel as a free space state of the jewish people, and the thing we have to fight. i don't want to answer into whether we are here or there will build our wall here or there because those are the decisions to be taken by the israelis because the of the political institution, democratic and the leadership's will pay a price of their own like the idea of freedom. so i think we need to focus on what we are trying to do in the focusing on the right of israel as a jewish state and avoiding the issues that are normally seen as the dates, normal dates in the space country in spain, the u.k. and here in the u.s.. but if the israeli is the only country that is put in doubt and the question continuously
7:21 pm
mightily for the jewish people listed at israel but for all of us chaim ephriam. >> thank you. >> lorna? >> i will not surprise you i agree with my eminent colleague. if with all these things it's like a nasty cocktail with all different things and it depends on where you are and whom you are which is the most preeminent reason for you being in the camp you might potentially question whether there should be a jewish state in israel, and some of it say for example in britain is because people don't understand the jews are a nation for the people. the vast majority of jews in israel or ian glenchur secular and also their awareness has risen about the result nature of the conflict with the palestinians that they think they have a choice. they think somehow there's a choice on the table that would
7:22 pm
pick the fact that the state of israel exists. and in the original funding resolution is a jewish state which they seem to have had m. nisha about and why was it easy then and it's not easy now? the truth is it is back to the same issues that people don't understand what it is to be jewish and they also do not understand what it means to us in relation for the need for us to stand side-by-side and protect and promote the state of israel because we are looking at the mirror image of ourselves, and if we deny israel and the jewish people that right then we take away our own right and it's only a matter of time. and so, it's not easy, but one of the things we base our work on in britain is the absolute
7:23 pm
non-sequitur of israel as a jewish state. it is no longer good enough to rely on the language of the homeland for the jews because the debate has changed and it doesn't mean to say that you take a position on to be or not and why he uses it. it means that it's far deeper and it's far more important to the future of the jewish people and of the free space world. >> as we say in the u.s., you are batting cleanup. [laughter] >> it is confronted% since inception and part of the diversity is the complicated story we are telling where people in the sense that we shared history and heritage and memories and destiny and care about each other with their religious or secular we are a nation that is accurate in the
7:24 pm
specific area and the land of israel where it is the great deal of the civilization. we are also religion and these negatives are baffling all the time from the first days of zionism until today. all of these places are present in the israeli public sphere. it's very, very difficult for people to put their arms around this complexity. they want to pigeonhole us as a people come as a nation and a religion and make their life simple, but we are much more complicated and it's hard to sort of put us in the box. but this is also our opportunity. because these are all different gateways to the story. not with just within israel but also within the jewish communities as these are different opportunities for the world to engage with us. one day israel will be one of the leading forces in the world in making a difference for the
7:25 pm
2 billion people in the world that are poor. we can do it. we have the technology, the resourcefulness, we have actually agreed and we can bring value to the people they're struggling with the security and water security and so on. so, what i'm saying is all of these narratives from ancient narrative's are being played out in israel today and zionism for the last 200 years and in the future and that will continue to make the life of people outside of our community difficult because they don't understand us. and therefore they are trying to make us into something simple when we are complicated. we are a mess but a mess in progress. [laughter] and this is also i believe the big opportunity within the community they would communicate as said a simple message about israel is over, but if we
7:26 pm
communicate the true story of israel about its complexity and its diversity many people can be brought on board and engaged with and i feel this is a big opportunity that is coming out of the challenge we are facing. >> thank you. [applause] >> i think that we have all found this the most enlightening and useful and frankly enjoyable discussion and i want to thank the three panelists, rauf il, lorna fitzsimons and gidi grinstein. before we conclude the program though i want we have been on the front lines with regard to, vetting and countering the the legitimization many ways not the least of which is our project interchange seminars and we have a brief video that we would like to show on the project interchange.
7:27 pm
♪ ♪
7:28 pm
♪ ♪ ♪ ♪
7:29 pm
♪ [applause] with medulla i want to think the audience watching and the audience will be watching on c-span and finally but not least the audience that just joined today in washington. thank you. the program is concluded. [applause]
7:30 pm
some ladies and gentlemen, please proceed to the breakout session listed on the back of your name tag. thank you.
7:31 pm
7:32 pm
wednesday howard schmidt white house cybersecurity coordinator and a special assistant to the president talked about the president's national security for trusted identity in cyberspace released earlier this month. this national strategy seeks to improve personal information security in cyberspace and e commerce. he made these remarks at a summit hosted by the visa credit card company. from the renaissance hotel in washington, d.c., this is half an hour. >> thank you very much. >> thanks to all of you for inviting me here today to participate in this very important event. it's wonderful to see so many people gathered in one place looking at issues i think we all not only benefit from as a
7:33 pm
society but also fully recognize there's a lot of challenges when it comes to technology and security, privacy and trust right now curious, my comments today are going to be fashioned very specifically about one narrow piece of this and i think there is no other group better positioned to help society, held the commerce and held the government in working on a common problem and i'm going to talk about the national strategy for trusted identity into cyberspace or the end stake as we know at. and of course anyone here that has ever dealt with in the government, then in the government you know there's no shortage of acronyms and i think we've figured out a few weeks ago that there's like seven or eight different things that have been in the stick and stack or something else but this one is strictly the and stick. for those of you who aren't familiar with my office, president established shortly
7:34 pm
after being inaugurated create the office of cybersecurity. and it's within the national security council and the national economic council. and i think that's one of the key things that really sets this aside from any efforts that are taking place out there is the full recognition that does encompass a set of bookends if you will that affect the economies and jobs and business e commerce specifically but also national security, homeland security, law enforcement and public safety issues we wind up dealing with. the composition of the office itself is just as unique as the title itself within the government. the office is comprised of experts across the government from the ftc to the homeland security, the department of defense and experts from nsa, the department of justice. we have a wide swath of people the bring levels of expertise.
7:35 pm
the other thing that it also gives as our needs change as specific projects we are working on, policies that are developing, we have the ability to then bring new talent to deal with new challenges. as we have seen over the past 15 months or so since we've been working in this case, we actually do have lifecycle projects. projects created, we did things necessary to create the policy, operationalize across the government and then we move on to the next issue and it doesn't involve the creation of yet another series of memos and oftentimes as we see particularly in the d.c. area sometimes you're judged on the number of memos that come out and not how much work to get accomplished and our goal was to actually move beyond creating strategies to executing things. so that brings the i think probably a nice segue to the
7:36 pm
deeper discussion about the national strategy of trusted identity in cyberspace because when we made the announcement on april 15th at a u.s. chamber of commerce event with the secretary lot, dean sperling, the president's adviser on the economy, senator mikulski there's a big group of people that we had there to talk about the national strategy for trusted identity into cyberspace and that even you was probably one of the best ones going. but also, the fact that it's in the department of commerce and led by some of the work with the national institute of standards and technology is once again a true indicator of how important this is to the economy, to businesses as well as the national security as well. when we convene that the u.s. chamber with our private sector partners in attendance, it also showed very clearly this is not a government led the effort,
7:37 pm
this is a private sector effort, and working with the private sector to create this ecosystem as we call at is key to its success. so, many of you in this room participate in some form or fashion with like consider to be an open process as we went through with the idea of creating some kind of trusted identity into cyberspace, creating a draft last summer, getting feedback from many people in the security privacy celebrities date to the citizens, you know, parent groups, to look at what is exactly we need to be putting together a strategy, what are the principles the we look at? and once we create that, could we handed off to to execute as i mentioned earlier? so, what does it mean and what is the trusten identity inslee brusquely? the meeting i had a while ago the typical answer, question and answer session we asked the question how many here have only
7:38 pm
one user id and password have to manage? and meatless to see everyone chuckled. then we got to the members of five or less and they still chuckled. we start looking at the five to ten, ten to 15, 1520, and like many of us particularly with attention for technology, we oftentimes are managing when 20 or more user id and passwords. so if you think about how your normal day starts out, and i will use as maybe a little bit abnormal but nonetheless somewhat indicative of get out, maldon some where to check and e-mails that can overnight letter does work, personal, facebook, doing something that requires me to log in using in ied and a password and then, because just the nature of the beast it happens to be the day that your pay statement comes out so you have to log in to the web site to check to make sure that worked out fine. and you go through all these
7:39 pm
iterations of logging in to things with a user id and passwords which are difficult to remember. we have a tendency as human beings to use the same ones over and over, notwithstanding all the experts say don't do that. at the very best we consolidated someone compromises the best they can do is read my on-line news service which doesn't have any financial impact through the opposite end of the spectrum if something could in turn someone's bank account. and managing those becomes problematic no matter what. and so, when we start looking to try to manage them you also have stifel we understand that in today's environment, and until we move to the i.t. environment where the computer systems are better at self healing and self preparing and configuring, self updating, we will continue to be at risk from somebody winding up with something of a computer system that would even take the best intentions we have had relative to the straub passwords
7:40 pm
and make that worth less if someone captors that while we are looking in somewhere. this is a challenge for us to deal with. the system that got us here has been rich and robust and we have had unbelievable accomplishments that the technology has given to us. what we also recognize over this time is the threat factors, the attack that we see, the bad actors if you what the have changed as well. many of us in this room probably remember the whole issue is going after the corporate networks, the university that works but what happened is we've made investments particularly in the private sector to build the resources across their as while we were moving away from everything behind the firewall and the dutch to having distributed information and having at the time of the networks and the ability for customers and business partners to come into our network and to the transactions we need to do
7:41 pm
we've also gotten better about protecting that. like anything else, they're have been incidents that have taken place where there have been successful intrusions. we learn from them and make them and we are better and move on. so what happens to the bad actors out there that recognize it's not as easy as it used to be to go after the big management works so the easy target now is the end user.com and any of those that have tried to do all of us understand education and training is part of the core of what we need to do from the cybersecurity perspective we should never be putting the end user in a position he or she has to decide is this e-mail that talks about the 2011 health benefits, is it really from a chart or not? but unfortunately that's what we face many times and those are based in many cases to capture the user id passports to give someone either access to the corporate network which is
7:42 pm
harder than it used to be or even worse, get access to your private information out there of the financial and e commerce value. when we look across the spectrum of people went at using the weak pass works. the recent industry study showed 46% of people surveyed never changed their e-mail count passwords and 71% used the same password across multiple sites including ones that have financial value. these are the things we are looking to work on with the release. when you start looking at the cost to individuals, and i think we can go out in a business perspective and look at the cost of the health task -- help desk, interaction with end-users, setup passwords and dealing with those sort of things, but if you look down to the end user the average is somewhere between
7:43 pm
$400 to $2,000 for an end user to recover from an incident in which either the credit card was compromised, the level where the identity was stolen deutsch online. what happens also, we have to wind up accounting for that cost in some way. these things do not happen in a vacuum and they do have costs associated with it and once again, it's a wide range of estimates of what it costs as businesses and government, and users, but the bottom line is we can do a lot to help reduce those costs and make the things we are trying to do more and effective. it was estimated in the justice system report from 2006 to 2008 alone, and if you think of the increase we have had on the e commerce since 2008 which has been significant, the estimate at that point to $17 billion loss for the economy and
7:44 pm
obviously none of us want to see that sustained. so where do we want to go with this? first what we want to see is an unfair but i can go to a store, i can go to a local store, an online store if i choose and get my own on-line identity for high levels of trust which is something that says i'm not a dog and here's my credit card number of other instances. but i also have the ability to use it in different formats whether it is a u.s. the device, something on my mobile device, smart card environment, soft or hard to come on a machine i want to have the choice based on my technical states and my level of concern on the type of transactions i carry the choice has got to be out there. what i entered with the system of the internet with other computers and you think about any of the things we are doing today when we talk about machine to machine authentication when there's literally no to
7:45 pm
intervention at all. i want that to be trusted. i want the computer that's acting on my behalf to actually be acting on my behalf and not something somebody has programmed into it or somehow was compromised. so when i go to why the comer web mail account for example i can do that with a level of security that's consistent with those services but the dillinger login to my bank account i may want to take out my mobile device, plunge in simple application that gives me a six digit password and i can use that as my number two login. and even if my computer is compromised the we build the ecosystem correctly, even if the system has the keystroke loggers or somehow compromised that that indeed doesn't give some of the advantage over now hijacking all plight transactions in the future. it's going to be a tough thing to do. there's going to have to be the development of new technologies, new business process he's.
7:46 pm
the bill we believe collectively the benefits that we derive from creating such an ecosystem is going to outweigh any of the learning process we need to go through. but we also need to insure it's convenient for people in the interim operative because that is one of the things that it doesn't work and family going to use it for one environment. and i think back to my own family members including myself, where i have the key chain full of the little things i scan when i go to the first restorers or when i go to my harley davidson dealership to make sure i get the bucks for what i'm doing but to make sure that we receive the benefit we have from advertising and marketing to customize things we want to do, not to short circuit but to actually enhance that. when we look at the things we are starting to do we place an secure password first and foremost. but while we are developing the ecosystem we are also looking to improve privacy.
7:47 pm
and i think every one of us in this room that's ever interact at some point is where there's a financial transaction that needs to take place particularly something on the recurring basis and not because of the work i've done over the years but i oftentimes say why do you need that in order to sell me this? why do you need all the information? what are you going to do with it, how long are you going to keep it, how was it going to be stored and protected? and oftentimes as you might imagine the answer is we don't know, it's a policy. developing the ecosystem now that builds on the basic information privacy principal that the ftc has come out with an concept with a private sector is the things we need to start looking at. so when i want to buy something that has the ability to validate that it's really me, it validates i did have creditworthy, it has the ability to see every month i will tell you this now that i agree to but
7:48 pm
that's all they need to do. and at some point we design the system correctly i say at some john sherman no longer going to do business with this company or they go out of business, whatever the circumstance maybe i have a little confidence that might data that they do have which should be minimized with no longer be accessible. i have the ability to reach in and say almighty that comes back to the. when you start looking at enhancing the privacy piece that is going to be the key part of this. and one of the things i've asked many people including all of you to the is to help build that system. we've built a system that we have concerns about the privacy and kids in principal this gives us the ability to still build something that basically accomplishes the privacy enhancing the things we have been talking about for a number of years. the other piece of the strategy
7:49 pm
and the execution of it is the off and. this isn't mandatory. this is specifically not a national id card or driver's license for the internet. it's the ability for people too often if they choose. so if i want to blog and still criticize products, i want to criticize any activity including the government, on still have the ability to do that with the level of in a devotee today. and that's critical to make sure we preserve that. and we need to make sure not only has the government we have said this is not going to become something that it's not going to be enhancing privacy and it's going to be enhancing the commerce but also making sure that we understand as we build the ecosystem, that private-sector respect that as well, that we have the ability if i want to do and interaction with a company totally anonymous and as part of the business model that i can do that, that i shouldn't have to be sort of pigeonholed into the corner.
7:50 pm
once again as when to be a challenge but we have to keep focused as we move forward on this and then we start looking at the great advances we are having with aretas cloud computing, the initiative for smart grid. look at the extensions of this national strategy to move into that area as well. and any of you that have that on your device that gives you the ability to check your alarm system at home or do your smart green or any of the things that the mobile devices give us to imagine doing that in a much more secure manner where you don't have to worry about somebody looking into your home terminal for electricity will your on vacation and your food is gone and everything else. this has to be built into the ecosystem as we move forward and once again, the private-sector is the place. the government will be the supportive role and we will do it when the mineral and health standards who missed and also benefit as a government so i
7:51 pm
hear from some government agencies when i say why can't i called and to this website and will get the data regarding any of the idea that the government has through normal day-to-day business with the government and the answer i get most often as we aren't sure that you because there's no mechanism by which we can do this trusted identity. so as we build the system lets build it to be interoperable with the government. and at the department of defense we have the cards and the civilian side of government we have the pure cards which as of the memo that went out a number of months back we now are going to require those to be used, strong authentication will be the way we do business internally not an option. so that choice has to be there. has to exist and has to be something that people are not technologists' not only are going to be able to use but they feel comfortable using and there is probably no crowd better to
7:52 pm
understand this next comment the and the people in this room and you think back to the early days of atm cards. i remember specifically my personal experience i was working undercover at the time and like many of us during that era i would have to go to the bank and stand in line with my paycheck from the city to get cash out. so not only was it an inconvenience to wait in line and build that and then two hours in line to cash a paycheck but also for some of us that created a new risk because here it is all i am flying this paycheck of around so when the first bank card cannot allow me to go to the one atm machine and like 2 miles away from where i was at midnight and get the $25 that used to last me a week, to get that out was great. but what was even better is what was federated so i could go to the bank of the other side of town and do the same and look what we've been able to do with
7:53 pm
those cards today. we continue to work on security features and fraud prevention but look what it's given us over these years. that's what we are hoping to do is build this system that gives us the same capability and robustness in the more secure manner and more privacy enhanced manner. particularly taking into account lessons that we have learned. one of the conversations i had not long ago is what some folks about the technology issues the way that can get compromised with a sure we do the next generation to do that out of it so the man in an attack will not be successful. so if somebody sitting there in the proximity reader that basically used to compromise it. that's the stuff we need to be looking at. and that is the thing we are looking for private sector to lead. not only to give the capabilities that the security and privacy enhancing pieces as well. to give the ability to do that interoperable the.
7:54 pm
so, you have helped us to where we are with the strategy but that is only part of the help we need. we need your help to execute on this. many times, creating strategies dips focus and the direction to go but what we have to do is execute on these things and we are looking for your leadership leadership,, technologies to make this real because we have to finish this job. one of the things i think collectively that we don't want to do is a year or two years down the road look back and say we had a strategy, a lot of good meetings if truth about that but we haven't made progress. now i'm very happy to say how the national program officer over the commerce already has some pilots to keep up to make this real involving state and
7:55 pm
local governments and the private-sector. we need more. we need the investments, we need the dedication to say we are going to make this better because we all benefit from it. and you get some of the data points that the secretary and my colleagues from the commerce have talked about it's just the last holiday shopping season where we had an increase of 23.7 billion i think is what the number of i was given increase in online sales just during that season. now for those of you in the d.c. area coming you recognize this past winter wasn't like the last winter we're just trying to go out and buy a pair shoes and boots you can wear in 2 feet of snow you couldn't even do that because the stores were closed. but yet we can still do that online. so, the capabilities that we have and we can continue to have, the opportunities to give us as an economy when i think about the places i've been around the world where you buy a
7:56 pm
pair of shoes and south america somewhere and although you don't get to go down there regularly you still have the ability to order a different pair of shoes and get them delivered. the benefits are great if we do it right and that is what we are looking to accomplish. so to move this forward there are currently three workshops planned and led by jimmy grant at the department of commerce to be we are looking to bring the industry private sector academia, nonprofits, the people that should care and do care about this issue. the three specific workshops planned the governments because there has to be a good governance model in place on this we don't want someone to create a business as all your personal in formation and i will make you a good identity and then of course read off and we have a bigger problem. we will make sure there's a government process in place. including taking into account how we make sure the companies are trusted, how to make sure that there's things we care
7:57 pm
about from a privacy perspective and in the building to the systems. the next thing is looking specifically at that privacy because this is the opportunity to the standards and to it and to look at technology. what are the various technologies that able to exist today but the things sitting there in somebody's brain right now and some these white board of their office wouldn't it be good if we did through whatever the food may be and yet to become an engineering or design peace. part of the purpose of the workshops is to get some consensus which is important and how we move this forward, what are the investments we need to make from the private sector and what the government can help? there is a website set up you can do to website on the commerce or white
7:58 pm
house.gov/cybersecurity and to the other one don't ever make that mistake. white house.gov/cybersecurity and you can link onto the information and there will give you more information on the date and location of the workshops but i ask you to participate in those. in closing what we can collectively do is to a better job about authenticating inappropriate online exchange less information, make sure that the information that we do exchange, we have better control over the end users and recipients to the benefit of the technology. it means creating a baseline for security, privacy and interoperable the, in a world that gives us the ability to do this on international basis to realize the benefit of that. to make sure it's an experience the end user can enjoy it's not cumbersome, it's not difficult, it's not the one where i have my
7:59 pm
family members that would know the difference between a floppy disk and a frisbee that would go out and say it's too hard for me to use because it shouldn't be that way. we need to make sure we are working together to realize this vision. when the president signed the national strategy it was the idea that this is a step forward nikki sure we are doing better things come smarter, more secure and more privacy enhanced. i ask you to do the things we are trying to do and that is to help us do your part to secure your part of cyberspace and we will all benefit from it and in particular the implementation of the strategy to trust identities in cyberspace. once again to for the opportunity to make the comments you might wish you the very best in the rest of your day. thank you.

134 Views

info Stream Only

Uploaded by TV Archive on