tv David Redl Elaine Duke CSPAN January 29, 2018 9:23pm-9:56pm EST
9:23 pm
year and the years to come is whether or not he can make sure yes it is available to all but also whether it continues to enhance the freedoms and not limit our freedoms so that is what i hope you think about when you hear all the presentations today that the internet has done so well for so long and should be used for truth and to shine a light and to ensure that the american people get more information, accurate information to choose their leaders and their government and their own future, so thank you very much. enjoy the event and i appreciate being able to launch you off today. [applause]
9:24 pm
it is my pleasure and privilege to be up here at the foundations 14th annual state of the net conference. i am a fellow at the framework for the early career professionals that was started as the parent organization and i am here to ask to c-span where we will be pulling down the panelists through the day talking about the most important issues. i hope to speak with as many of you as possible. as you know we have some fascinating topics and incredible speakers and it's never been more important than it is right now. with that in mind i would like to welcome to the stage the assistant secretary of communications information for the department of commerce and administrator. thank you. [applause]
9:25 pm
thanks for the introduction and it's great to be here again. thanks for inviting me and congratulations on the program you put together this year. i'd like to take the opportunity to talk about items on the agenda but speak out to me personally as well as a discussion between bobby mcdowell and my former boss supposedly is looking forward to seeing later today. we are glad to be aggressive in advocating engagement across the globe and in other forums. click to discuss the cybersecurity work including efforts to improve the internet
9:26 pm
of things and the administration's plan to counter the threats. the intranet has become wha intt is and they long standing consensus around the principle of multi-stakeholder developme development. the idea that all should participate in the transparent decision-making process. we must continue to fight for this principle and for the open and interoperable and governed collaboration between all stakeholders. right now there are two priorities internationally, the first is the preservation of the service which has become one of the most pressing issues over the last several months. if you don't know much about the service is an incredibly valuable tool for the business , intellectual property rights holders and internet users around the world. put simply it is a service that provides easily accessible information about the purchase and have the domain names when investigatinofinvestigating male
9:27 pm
activity and the private sector and government actors seeking to protect systems from dangerous cyber attacks which are more frequent overtime. i mentioned to work on the bath mats they know those in the front lines rely on who is to do their work effectively. the information is valuable for combating infringement and the use of the property for the consumers looking to ensure the website you're using is legitimate if the cornerstone of trust and accountability on the internet. those that participate though that it is under constant review and the subject of debate for years however it is a central character that hasn't changed much since its inception in the 80s for good reason its utility remains important to those that rely upon it that over the last few months they have been threatened in response to the general data protection regulations, it initiated a process to assess how the rule
9:28 pm
could affect given that it includes limited personal information about the users to register internet domains and here are the facts. it balances the cybersecurity law enforcement and consumer protection and officials have noted only limited changes to who is would be necessary to achieve compliance. still there are some who are trying to take advantage of the argument should erect barriers. some even argue the surface must become a relic of the history. today i would like to be clear the service can and should maintain its character while complying with national privacy laws. it's in the interest of all stakeholders and for anyone in the u.s. who may be persuaded by arguments calling for drastic change please note the government expects the information to continue to be made available to the service. the second priority is making
9:29 pm
preparations for the conference scheduled for this october. i believe the united states is a press for change including establishing membership oversight of the finances. this is particularly important given that they are one of the two largest donors and we need to fight against the efforts to move beyond its limited mandate and into the cybersecurity matters. we need to effectively and efficiently put forth its functions in the area of radio communications and one that fosters rather than hinders the policies for telecom in the particular countries. as many of you know, there are five elected positions and directors of the union. i'm pleased t to reiterate the strong support for the candidacy as the director of the telecommunications development bureau.
9:30 pm
the sector brings connectivity to parts of the world better yet to realize the benefits that many of us take for granted. as a former official, veteran of the process and i am certain that dorian would make an outstanding director. moving forward, remaining committed to the committee in particular there are four areas we think are especially important. the first is the free flow of information com, second is that multi-stakeholder approach, third is privacy and security and forth is the emerging technology. the free flow of information is a bedrock american principle and basic human right. still governments around the world are increasingly blocking access to the websites and content curtailing online freedoms were shutting down the internet entirely. governments are imposing top-down heavy-handed governmental regulation of the internet and in the past few
9:31 pm
years they forced american companies to remove information that would have been considered protected speech. these restrictions threaten economic growth in the societal and educational benefits of the internet and must be imposed. the second focus area how they can continue to support and promote the stakeholder approach to governance. one priority should be are there any other domain systems that they should pursue peace or the kind of questions we want to hear from the stakeholders on. we plan to continue the long-standing engagement in for him at the united nations. the premiere of multistate corporate dialogue across cutting internet policy issues there's always room for improvement. people seek input on how we can raise national awareness on its contributions to the governance globally and we want to know what we can do to help lower the barriers to participation.
9:32 pm
we want to know how to leverage the resources to better shore up the cybersecurity and online privacy. i will speak more about this in a moment i hope to weigh in on what we are doing in the areas where the department can be even more impactful. finally, they always seek input on the work on the emerging technologies. how much has led the government when it comes to the new and emerging technologies but that requires continued engagement for the industry and from all of you. in order to ensure that american entrepreneurs are able to take risks and fight globa to fight l markets for products and services we need to make sure we are charting the right path. on such issues as artificial intelligence and we are looking for the industry to help us make the right choices in the government. as i noted cybersecurity is a key to the administration and as many of you know they issued an executive order on strengthening the networks and critical
9:33 pm
infrastructure. they sought to promote action and other automated distributed threads. attacks can be extremely damaging and the broad internet at risk as well as it users. the department of commerce and homelancommerce andhomeland secd actions taken by stakeholders, recognizing we cannot solve this problem through government regulation. so it ithough it is the departmt issued a draft report's we rely on an open and transparent process to generate the ideas and reprints and i want to thank those of you that participate. there's a vision for the future as well as the goals that would improve the resilience of the internet and also suggests the activities to be undertaken by both government and private sector actors. no single government or sector can solve it in isolation. any solution would require the entire ecosystem acting in concert but we are not starting from scratch.
9:34 pm
they are not widely used. changing this will require more awareness as well as an alignment of market incentive to find the sweet spot between security and convenience. there's a lot of collaboration between the various government agencies when it was being drafted and combined with the private sector we now know that there is a common understanding about what we need to do and where we need to go to make this a reality. if you haven't already i would encourage you to read the report and provide feedback. there will be a workshop hosted by the department next month at the national cybersecurity centric excellence to incorporate all of the comments received before delivering it to the president in may. as a side note i would like to express how proud i am of the work of everybody on this report. it was an effort that took a lot of doing by folks and as the one
9:35 pm
that is now getting to see the fruits of their labor as the administrator i'm incredibly proud of the hard work they've done to put together a quality product. congress has been working to foster the environment and late last year's stakeholders developed a series of documents on security and patching. some great products came out of the process including high-level specifications of the security update and suggestions for how manufacturers can communicate to consumers. we will continue to engage with the committees to promote the principles and the ideas in this document. this year we will be voting on a software component transparency with a particular eye towards the components used in devices. most modern software as all of you know is written completely from scratch but includes existing components, modules and libraries from the open source and commercial software world. products are being developed
9:37 pm
. they will continue to work with our colleagues across the federal government to coordinate a national strategy and will work with the you to reach out to the staff will be here throughout the day and have conversations about things you think we should be working on. we want to hear from you and what you think is important and we want to be able to help to continue to thrive. thanks for your time. [applause]
9:38 pm
good morning. my name is rachel and i am the director of the congressional challenge, a national contest that encourages kids to learn to code and create apps. in the past three years on behalf of congress we have inspired over 8,000 students in 42 states to learn to code and we are building the pipeline for those that will be equipped forh the skills required for the future. i'm here to introduce homeland security deputy secretary elaine duke. she was previously acting
9:39 pm
secretary of homeland security from july to december of last year, she's an accomplished public servant with over three decades of experience and has served as a member of the homeland security advisory council and strategic advisor to government tech and coalition services. please welcome deputy secretary duke. [applause] >> good morning everyone. it is an honor to be here. it is a little funny for me when i think about being here speaking in front of this group that are here for the state of the net conference. i am a grandmother that likes jane austen novels and just got a twitter account last week. so we will see what i can do to
9:40 pm
give you some information about dhs and where we are on the state of the net which hopefully will be useful to those of you here in the room today. as everyone points out, everyone is an internet stakeholder even if they don't know it yet. i'm learning more and more each day and that is what brings me here today, how the internet has increasingly been connecting us with threats and homeland security. specifically, parents are using the internet to recruit and radicalizing share information for do-it-yourself mass murder. nearly every terrorist plot uncovered to date has a digital dimension. to give you the sense of the scale of the problem, the fbi says there are currently 1,000 homegrown terrorist investigations across the 50 states and 1,000 isis related
9:41 pm
investigations. some of these overlap, but still the scale is alarming and those are just the suspects we know about. it's like living among potential landmines. in both recent two biggest attacks in new york, the attempted port authority bus station bomber and holocene attack with the tracks, the attackers were appearing to be inspired in part by online terrorist propaganda. it's becoming a very, very common chaos. an attack happened where they view the suspects electronics and social media and the kind of radical learnings, geologist connections, beheading videos and more. to be very clear the internet itself is not the problem. terrorists use social media for the same reason anyone uses social media. it's an easy way to get connected. the technology is helping businesses thrive and families stay in touch and it's the same
9:42 pm
technology helping the terrorist scum spider at broadband speeds. you can think of it like fire. they can cook your dinner and warm your house but also in golf communities and leave lifelong scars like it recently did in california. it's important to note also the internet itself doesn't cause radicalization though it does appear to serve as a catalyst. internet and mobile communications technology just make the radicalization process faster and easier and can accelerate the path to violence. isis isn't the first or only terrorist group to have a presence online. the groundbreaking use of open social media platforms has forced all of us to confront the challenging issues with clear eyes. there are a lot of issues when combining violent radicalism, radicalization online come issues surrounding the terms of
9:43 pm
service, content removal versus monitoring, the role of private companies and confronting this national security problem and the role of the government. these issues are further complicated as to her wrists move from open channels to encrypted or closed ones. before we think about what he can do to combat the use of the internet we have to acknowledge three facts. first is the legal framework of the united states and the constitution that we i and the federal government sworn to protect and defend. in the united states ideology, regardless of the support it's protected by the first amendment. congress shall make no law of the freedom of speech or that of the press. in practice that means that advocating political and social position, strong rhetoric or the
9:44 pm
philosophical embrace of the tactics may be protected by the constitution. just looking at this crisis cris propaganda or visiting a neo-nazi website doesn't constitute in a legal activity in the country. of course while the government may not be able to take action against specific contact this doesn't preclude social media companies from taking action. the second fact his current removal is a short-term and difficult system to automate when your target proliferates at a high volume and constantly changing media speed. around the world, internet users upload more than 400 hours of content every minute. that's a lot to sift through for the companies and additionally two thirds of the terrorist content is shared within the first two hours of its lifecycle. the good news is the government
9:45 pm
and technologies are developing tools that automatically detect and flag the terrorist content and there are indications that technical solutions will be among the most effective ways to manage the volume. however, as extremist groups migrate to the encrypted messaging platforms monitoring becomes more difficult so while the content removal is an important part of the response come it cannot be the entire response. the third fact is any long-term response must acknowledge that there are various audiences of play and each have different information needs. some individuals are already mobilized to violence, some are radicalized, but have not yet taken steps to violence. other people want to actively refute the terrorist propaganda and then there's the majority of people that want to go about their daily lives without the threat of terrorism.
9:46 pm
there is no one answer and there is no one silver bullet at the department of homeland security, we are trying to prevent and intervene in the process of radicalization and because so much is tied to the internet and the internet knows no border we are trying to prevent those international and domestic terrorists from radicalizing and recruiting through social media, social science research into the whole body of knowledge tha thae know it's not a linear process there are a number of causes and drivers domestically an we'd approach to terrorism prevention and a range of ways. today i am here to kill you a little bit about how the heart trained challenge the negatives, share information and catalyzed the nongovernment solutions. first, the challenging narrative. the response entails challenging them directly or providing alternative options.
9:47 pm
through the internationally recognized public-private partnership known as country extremism program we have engaged with young people internationally. the challenge teams stemmed from colleges and universities to implement social media programs targeting the narratives and online recruiters of the violent extremism. we recognize the need for more research so in july the department of homeland security office of tourism partnership award 26 grants to the community-based organizations. at least half a dozen will have a robust online presence including pushing back against the messages if of your that otr terrorist recruiters and radical fighters. for example, one project is developing an application that will put high-quality video editing tools, type digital
9:48 pm
marketing and relevant research findings on radicalization and recruitment in the hands of thousands. this will help make the creation of counter messages a viable practice and will add to the work i mentioned earlier. while we are limited on what we can do domestically in the counter narrative space, this is an important part of our terrorism prevention strategy. i'm excited to see the grand awardees moved their ideas from application and then monitoring the results. the second category of the prevention is information sharing and the dhs has done a lot of work in this space over the last year. we want to expand the violent radicalism in terrorist recruitment so more people can identify it and more importantly prevent it. this includes tools such as
9:49 pm
developing social media community awareness briefings to help technology sectors become aware of the recruitment online so they can catalyze efforts to counter it and also such as the digital form on the ticket was in prevention that was cosponsored last september. at the digital form from experts and community organizations gathered together to share information and showcase technologies and to counter the use of the terrorist social media. across the government, dhs also administratively housed as an interagency task force to increase information sharing on caregivers in prevention with other agencies including the counterterrorism center, the fbi and the department of justice. about a wide range of stakeholders brings me to the third category of prevention,
9:50 pm
catalyzing nongovernment solutions. with apologies to the state of the net i want to paraphrase the motto. everyone is a terrorism prevention stakeholder even if they don't know it yet. we believe that in combining the talents of communities in the technology sector that can drive on governmental responses to the terrorist recruitment and radicalization that are authentic and more sustainable. we can create and disseminate more powerful counter narratives and alternative narratives. the truth is the government doesn't have great credibility in the online space for good reason. we are too old, too big and too square. we need credible voices especially from community partners. so it's important that we help empower the groups with the information, partnerships and resources they need to be successful. this isn't a site that
9:51 pm
government can win on its own. our enemies are dispersed and crowd sourcing their activity. fortunately our allies are fighting with us in the same space. in the past years there's been tremendous progress in the prevention particularly in the technology centers. last july the united kingdom when he traveled to silicon valley to meet with a newly launched global intranet for him on counterterrorism. led by facebook, microsoft youtube and twitter it is the first time the major companies have come together to work on the research and technology techniques in this area. moreover committed to helping smaller companies that may not have the same resources to tackle the trigger was in prevention online. i am very encouraged by the work to counter this incredibly dangerous problem.
9:52 pm
we hope more companies will consider engaging with us to help stop terrorism here and abroad because terrorist radicalization makes the wor maf a more dangerous place for each one of us. we also know other countries share our concerns at the 72nd united nations general assembly this year the uk prime minister, tony and minister and french presidenpresident addressed word leaders on the topic along with our acting deputy secretary at the time and in october i joined by international counterparts at a meeting in italy to discuss how to present the best use of the internet with the participation of the private sector in the private sector and interestingly enough this is a true collaboration on counterterrorism on the internet. secretary nielsen is continuing this robust engagement and soon will be traveling to silicon
9:53 pm
valley for a second meeting along with the uk home secreta secretary. we will also cohos cohost cohoss individual for a month service in prevention also with silicon valley in february. some of the topics on the agenda will be innovation and counter messaging, contact takedown and online to off-line interventio interventions. at the third item is important because it's not enough to push back against terrorist messaging. we have to ensure organizations are trying to develop off ramps for people at risk for radicalization to mobilization to violence. these need to be developed in partnership with local organizations there during the methods proven and related fields like domestic violence and suicide prevention. as i said before, we the government cannot do this alone. i am proud of the role the dhs has played in the terrorism prevention so far and countering
9:54 pm
them about our work and/or work is not yet done. preventing the trigger for some wealthy main port of th core ton of the department that we are very interested in working with partners such as view from all corners of the world to make it a safer place for each one of us. help us, please work with us. i know ther there are members oy staff from the office of terrorism prevention partnerships here today raising their hand and anxious to hear from you throughout the conference and let us know. michael brown who raised his hand i don't mean to frighten you but please believe me when i told you this is urgent. each morning we sat through the intelligence briefings and i'm here today with urgency. right now in some dark corner of the internet there are step-by-step instructions on how to build a bomb with items you can pick up in any hardware store. right now it to the rest recruiter with hate in his heart
9:55 pm
is feeding lies to a confused teenager he found earlier. )-right-paren someone in the country is being patented do they become a soldier for the caliphate or do they turn away but working together we can change the outcome and we can change lives. we are all terrorist prevention stakeholder events we don't know it yet. thank you. [applause] i'm very happy to be here to introduce amy whose title i understand his quantitative future this so she has the most interesting title of anybody in this room. she founded the future to the institute and teachest
22 Views
IN COLLECTIONS
CSPAN2Uploaded by TV Archive on
![](http://athena.archive.org/0.gif?kind=track_js&track_js_case=control&cache_bust=2029247753)