Hello, everyone. It is my pleasure and my privilege to be up here at this podium at the internet education foundations 14th annual state of the net conference. My name is emery rone, a fellow at the internet law frame work for early career professionals, started by our Parent Organization and im hereto interview right, im in the other room next to cspan well be pulling down panelists throughout the day and talking about what is the most important issues facing the state of the net. I hope to speak with as many of you as possible that sit on all the panels. As you know, we have fascinating topics and incredible speakers and the state of the net has never been more important than it is right now. With that in mind, id like to bring to the stage the astandpoint secretary, and david rhettle. [applause] well, thanks for that introduction and its great to be here again at the state of the net. And especially thank you for inviteing me and congratulations on the Exciting Program youve put together again this year. Id like to two items on the agenda quick, that stands out to me. The excellent Cyber Security panel, and a discussion between rob mcdowell and my former boss chairman greg walton. Both things im looking forward to later in the day. For my time id like to lay out Early International priorities in the new administration. We plan to be aggressive in advocating interest in values in ourengagement across the globe at i can, itu and others. And discuss the department of commercial Cyber Security work toimprove the security net of things and administrations plan to counter the threat of bot nets. The internet has become what it is today in part because of a longstanding bipartisan concensus of multistakeholder policy making and development. The idea that all should participate in transparent decision makingprocess. We must continue to fight for this principle and for an internet thats golf vens between collaboration between all stake holders. Right now, ntia has two priorities. The preservation of the who is service, one of the pressing issues related to icahn the last several months. If you dont know much about the service, its a valuable actual for governments, businesses, intellectual Property Rights holders and Internet Users around the world. Put simply, who is it the serviceprovides easily Accessible Information about entities that purchase and manage domain names. This information is often the starting point for Law Enforcement agencies when investigating malicious Online Activity and for private sector and government actors seeking to protect Critical Systems from dangerous cyber attacks, which are becoming more frequent all the time. Bot nets, we know those rely on who is to do their work effectively. Who is, valuable is information for safe have i internet consumers making sure the website theyre using is legitimate. Its a simple service, but its the cornerstone of trust and accountability on the internet. Those of you who participate in ican know who is is under constant review for years and essential character has not changed much since its inception in the early 80s. The utility remains critically important for those who rely upon it. The last few months the service of essential character has been threatened. In response to the European Unions general Data Protection regulation,ican assessed the rule and given limited personal information for users who register internet doemains. Many european officials have noted only limited changes to who is would be necessary to achieve gdpr compliance. Still there are some who are trying to take advantage of the situation by arguing that we should erect barriers to the quickly and easily accessible who is information. And some have argued the service must go dark and become a relic of the internet history. Today id like to be clear, the who is service can and should retain its essential character while complying with National Security laws. For anyone in the u. S. Who may be persuaded by those calling for drasstic change. The second area is the itus treaty making conference, the plenty pod as we love to call it, scheduled for this october. I believe the United States needs to press for change in the itu, including establishing effective membership oversight over the finances. This is particularly important given the United States is currently one of the two largest donors to the union, an and we need to fight against efforts to an i aggressive effort tomove it beyond and know Cyber Security matters. We need an itu in the area of Radio Communications and fosters, rather than hinders policies for telecom, particularly in developing countries. As many of you know, the itu has five positions. Fosters, rather than hinders it brings connectivity to parts of the world that has societal benefits. Martin is a veteran of the process and im certain that doreen would make an outstanding director of the sector. There are four areas where we think are especially important. Flow oft is the free information, second is the multistakeholder approach to internet governance, third is privacy and security, force is emerging technology. The free flow of Information Online is a bedrock american principle. To information and freedom of expression are basic human rights. Governments around the world are increasingly blocking access to websites and content, curtailing online freedoms are even shutting down the internet entirely. Governments are imposing topdown, heavyhanded intergovernmental regulation of the internet. We have seen Court Rulings that have forced American Companies to remove information that would have been considered protected speech in the United States. These restrictions threaten Economic Growth and societal education benefits of the internet. The second focus area, how can we continue to support and promote the multistakeholder approach to internet governments . Are there any other Domain Name System related activities that we should pursue . These are the kinds of questions we want to hear from our stakeholders. We plan to continue our longstanding engagement in the Internet Governance Forum at united nations. There is always room for improvement. He will seek input on the opportunities that we face. Awareness. E national we want to know what we can do to help lower barriers to participation. Third, we want to know how to leverage our references to sure up on my privacy. I will talk about private secret work in a moment. Areas wheredentify the department can be impactful. And tia as commerce has led the u. S. Government when it comes to new and emerging technologies. That leadership requires continued engagement from american industry and from all of you. Order to ensure that american entrepreneurs are able to take risks and find Global Markets for the Digital Products and services, we need to make to that were treading the. On such issues of artificial we are looking for industry to help us make the right choices. As many of you know, the president issued an executive order on strengthening the Cyber Security of federal networks and critical infrastructure. It sought to promote action against botnets. Botnet attack can be extremely damaging and put the broader internet at risk. Wereepartment of commerce asked to identify actions i can be taken by stakeholders, recognizing that we cannot solve this problem through government regulation. The departments issued a draft report on enhancing resilience against botnets. We relied on an open process to generate ideas in the report. I want to thank those of you who participated. The report outlines the positive vision for the future, as well as five, trickles that would improve the resilience of the internet. Activities to be taken by government and private users. Are a global problem. No cigar government can solve it in isolation. Any solution will require the entire ecosystem. We are not starting from scratch. There are tools available today that can mitigate this. They are not widely is. Jing jing changing this will require market incentive that will find the street spot sweet spot between marketing and convenience. We now know that there is a common understanding of how low we need to do and where we need to go to make this positive future a reality. If you have not already come i encourage you to read the report and please provide feedback. You can find it on our website. There will be a workshop hosted by the department of commerces month. We will incorporate all of the comments received in the report for delivering it to the president in may. I would like to express how proud i am of the work that everyone has done on this report. It was an effort that took a lot of doing by folks across all agencies. As the one who is now getting to see the fruits of their labor, im incredibly proud of the hard work they have done in putting together a quality product. Commerce has been working to foster a more secure internet environment. Developed a series of documents on iot security and patching. Two great products and out of the process, including a highlevel specification and suggestions for how manufacturers can communicate punch ability to communicate consumers. This year we will be working on Software Component transparency with a particular eye towards thirdparty components used in iot devices. Most modern software is not written from scratch but includes existing components, modules, and libraries from the open source. Products are being developed quickly and in a genetic marketplace. It can be a challenge to track the use of all of the separate components. The growth of the internet makes this challenge all the more difficult. In addition to the increased number of devices, or traditional vendors are assuming the role of Software Developers to add smart features to existing products. Of librariesority and components do not have known for abilities, some do. The sheer quantity of Software Means that products will ship with vulnerabilities. Can be a very important tool here. A camerawork vendors that demonstrate a secure Development Process and help Defenders Know how to respond and prioritize during an incident. You cannot protect if you do not know about it. With respect to 5g, the president made it clear that five G Network Security is a critical element of her National Security. The networkn itself will be important to ensuring our National Leadership in wireless but also to ensuring access to a vital part of our national economy. We will continue to work with our colleagues across the federal government to coordinate a National Spectrum access. Todays conference is a Good Opportunity to reflect on what issues matter to you most. Everyone here today has perspectives that can enrich the work that were doing to get urge you to reach out to our staff. Will be here throughout the day. Have conversations about the things we should be working on. We want to hear from you. We want to know what you think is important. We want to be able to help the industry thrive. They queue for your time. Thank you for your time. [applause] good morning. My name is rachel. I am the director of the challenge. Al ap it encourages kids to learn how to code and create apps. 8000ve inspired over students in a 42 states to learn to code. We are building the pipeline of domestic coders for the they will be equipped with the skills required for the jobs of the future. Im here to introduce homeland elainey deputy secretary duke. She was previously acting secretary of Homeland Security from julydecember of last year. She is an accomplished Public Servant with over three decades of experience. As member ofd Homeland SecurityAdvisory Council and Strategic Advisor to government tech and services coalition. Please welcome secretary deputy secretary duke. [applause] good morning everyone. It is an honor to be here. It is a little funny for me. I think about being here, speaking in front of this group that are here for this state of the net conference. Likes grandmother who jane austen novels and just got a twitter account last week. [laughter] we will see what i can do to give you some information about vhs and where we are the state of the neck. Hopefully it will be useful to those of you here in the room today. Everyone points out, everyone at the internet stakeholder is an internet stakeholder even if they do not know it yet. That is what brings me your today. Is the internet has an increasingly connecting us with our threats. Specifically, terrorists are using the internet to recruit and radicalize and share information for doityourself mass murderer. Werly every terrorist plot uncovered today has a digital dimension. To give you a sense of the scale of that problem, the fbi has said that there were currently 1000 home grown terrorist investigations across the 50 states. And 1000 isis related investigations. Some of these overlap. The scale is alarming. Those are just at the suspect we know about. It is like living among potential landmines. Recent terrorist attack in new york, the attempted Port Authority bomber, and the halloween attack with a rental truck, the attackers were appearing to be inspired in part by online terrorist propaganda. It is becoming a very, very common tale. We reviewed their electronics and social media and find radical learning, jihadist connections, beheading videos, and more. To be clear, the internet itself is not the problem. Terrorists use social media for the same reason anyone uses it. It is an easy way to get connected. The technology that is helping businesses thrive and family stay in touch is the same technology that is helping inspire at broadband speeds. You can think of it like fire. , it can cook your dinner can also engulf communities and leave lifelong scars like it just recently did in california. That theortant to note internet itself does not cause a radicalization. It does appear to serve as a catalyst. Internet and mobile Communications Technology just makes the radicalization process faster and easier and can accelerate the path to violence. First ors is not the only terrorist group to have a presence online, their groundbreaking use of open social media platforms has forced all of us to confront the challenging issues with clear eyes. There are a lot of issues with combining violent combating violent radicalism online. Issues surrounding the terms of theice, content removal, role of private companies, and the role of the government in challenging terrorist narratives. These issues are for the collocated as terrorists move from open channels to encrypted or closed once. Before we think about all he can do to combat terrorist use of the internet, we have to knowledge three facts. The first is the Legal Framework of the United States and the constitution that we come in the federal government, have sworn to protect and defend. States, regardless of the cause it is for, it is protected by the first amendment. Congress shall make no law abridging the freedoms of speech or of that of the press. In practice, that means that merely advocating political or , strongositions rhetoric, or the philosophic embrace of violent tactics may be protected by the constitution. Propagandag at isis or visiting a neonazi website does not constitute a legal andand illegal activity illegal activity. This is not preclude social Media Companies from taking action. Current removal is a shortterm and difficult system to automate. When your target proliferates at high volume and constantly changing media and feet speed. Internet users upload more than 400 hours of content every minute. That is a lot to sift through for our companies. Two thirds of the terrorist content is reshared within the first two hours of its lifecycle. The good news here is that the government and technologies are developing tools that automatically detect and black terrorist content. There are indications that Technical Solutions be among the most effective ways to manage the volume. Toextremist groups migrate encrypted messaging platforms, monitoring becomes more difficult. Removal is anent important part of the response, it cannot be the entire response. The third fact is that any longterm response must acknowledge that there are various audiences at play. Each have different information needs. Some individuals are already mobilized to violence. Some are radicalized but have not yet taken steps towards violence. Other people want to actively refute terrorist propaganda. Then there are the majority of people who just want to go about their daily lives without the threat of terrorism. There is no one answer. There is no one silver bullet. We are surgically focused on the terrorism prevention, trying to prevent and intervene in the process of radicalization. Because so much of it is tied to the internet, because the internet knows no border, we are actively trying to prevent those international and domestic terrorists from radicalizing and people to violence through social media, social science research, and the whole body of knowledge. We know it is not a linear process. There are a number of root causes. We have approached terrorism a range of ways. Im here to tell you a little bit about how we are trying to challenge terrorist narratives and catalyze government solutions. The response entails either challenging narratives directly or providing alternative options. Through the International Recognized privatepublic partnership known as peertopeer, countering program, we have engaged with young people internationally. Teams from colleges and universities develop an internet social media programs targeting the narrative and online marketers of violent extremism. We recognize the need for more of the space. Department of Homeland Security 26 grants grants to communitybased organizations. Half a dozen of the awardees will have a robust online presence, including pushing back against the messages of isis and other terrorist recruiters and radicalized. For this will let add to the peertopeer work i mentioned earlier. Is anring narratives important part of our terrorist prevention strategy. I am pleased to say the grantee move their ideas into action and monitoring the results. Pieces information system. Dhs has done a lot of work in this race. We want to understand violent radicalism and terrorist recruitment so more people can identify it and prevent it. This includes tools such as developing social media and briefing on how the community has become aware online. It includes conferences such as the digital form on terrorism dhsion that dss sponsored. Many of you, startups, organizations gathered together to Showcase Technology end techniques to counter the use of terrorist social media. Across the government, dhs houses an Interagency Task force to increase information sharing with other agencies, including the National Counterterrorism center, the fbi, and the department of justice. The wide range of stakeholders bring me to the third category, nongovernment solutions. I want to perforation or motto everyone is a terrorism prevention stakeholder, even if they do not know it yet, and we believe that. We can drive nongovernmental responses to terrorism recruitment that are more scalable and sustainable. Have counter narratives and alternative narratives. The government does not have much credibility in the online space. Big, tooo old, too square. We need credible voices, especially from our community partners. Toimportant or partner. Fight dh or the u. S. Government can win on its own. Our enemies are diverse and crowdsourcing. Fortunately, our allies are fighting with us in the same space. In the pasture there has been tremendous progress in terrorism prevention. Homejuly, United Kingdom secretary and myself traveled to Silicon Valley to meet with the newly launched global forum on international terrorism. By facebook, microsoft, youtube, and twitter, is the first time Major Companies have come together to work on research and Tech Knowledge he tech meeks in this techniques in this area. Moreover, they are dedicated to tackle Small Companies this online. I am very encouraged by their work to counter this dangerous problem. We help more problems will be solved by engaging against this problem here and abroad because terrorist radicalization makes the world more dangerous ways for each of us. Other countries share our concern. , a tie theminister prime minister, and the french resident addressed World Leaders deputy topic along with secretary claire brady. I joined my International Counterpart in italy to discuss how to prevent terrorism on the internet with the participation of the private sector and interestingly enough, this was a private Industry Collaboration in countering terrorism on the internet. Secretary nielsen is continuing this and will be traveling to Silicon Valley for our secretary second meeting. To the seconds digital form on terrorism prevention in Silicon Valley in february. Some topics will be counter takedown, and onlineoffline intervention. But not enough, to push back against terrorist messaging. With to make sure they are developing off ramps. Need to beps developed in partnership with local organizations mirroring methods proven and related fields like Domestic Violence and suicide prevention. We the government cannot do this alone. I am prodded the role dhs has anded so far but our work your work is not yet done. Preventing terrorism will remain a priority and we are interested in working with partners from all over the world. Help us, please work with us. I know there are members of my , they are today raising their hand here, and they are interested in hearing from you throughout the conference. Brown is here from the cba task force. I dont mean to frighten you, but this is urgent. Each morning we sit through the intelligence briefing and im here today with urgency and purpose. Right now in the dark corners of the internet there are stepbystep instructions on how to build a bomb with items you can pick up in any hardware store. Right now, i terrorist recruiter with hate and his heart is feeding lies to a confused teenager he found earlier. Right now, someone in the country is deciding, do they become as soldier for the caliphate or turn away . We can change the outcome and change lives. We are all terrorist prevention stakeholders, even if we do not know it yet. Thank you. [applause] condenser now, a look at Technology Trends with amy west. Security policy. This is from the state of the net conference. It