Showing posts with label INTERNET. Show all posts
Showing posts with label INTERNET. Show all posts

Sunday, May 24, 2015

SECRETARY KERRY'S REMARKS ON AN OPEN AND SECURE INTERNET

FROM:  U.S. STATE DEPARTMENT
An Open and Secure Internet: We Must Have Both
Remarks
John Kerry
Secretary of State
Korea University
Seoul, South Korea
May 18, 2015

SECRETARY KERRY: (Applause.) Well, good afternoon, President Yeom. Thank you very much for a generous introduction. Distinguished guests, all, I’m delighted to be here and I want to thank the university, and particularly Park No-young, the Director of the Cyber Law Center, for inviting me to be here today. Thank you very, very much.

I also want to acknowledge somewhere – I don’t see him – but my friend, the ambassador from the United States of America – there he is right in front of me – Mark Lippert, who represents the United States here in Seoul. And he’s a special person. I’ve known him for a long time. He served in the United States Navy. He served in Afghanistan and served for the President, been an advisor to several presidents. But recently, as you all know, he displayed great grace and dignity under duress, and like all of our diplomats, whose jobs carry with them certain risks on the front lines of diplomacy, I will tell you that Mark has never wavered from his determination to do his job and to represent our country to the best of his ability – which, believe me, he does. So I’m grateful for his leadership. And, Mark, thank you for the great example you’re setting.

I’m really happy to be back here in Seoul. This is a beautiful city, and I’m struck every time I come here. I wish I had more time. Time is the enemy of those of us in diplomacy nowadays. But the United States and South Korea share a very special history, obviously, and we also share great hopes for the future. And I am very happy to be here to talk about our shared interests, though it will not just be, President Yeom, about the security; it will be about the internet itself, which is important as we think about security. It’s also, obviously, very critical as we think about the many interests that we share together, ranging from security on the Korean Peninsula, to the success of the Korea-U.S. Free Trade Agreement, to the many connections that exist between the Korean and the American peoples – including, I want you to know, a love for Psy, K-Pop, bibimbap, and Pororo, the little penguin. (Laughter.) I want you to know that my staff recommended that I walk out here this afternoon, dancing to Gangnam Style – but I told them no, that’s too 2012.

Today, it’s really more than appropriate to be here in the most wired city in the country, one of the most wired cities in the world, in order to speak with you about digital technology and about the fears and the possibilities that we associate with digital technology. And let me underscore: It’s the possibilities that should motivate us, and it’s the possibilities that bring me here today.

Now, years ago, South Korea made a conscious choice to become a global IT leader and you have delivered. As a society, you opened the door to investment, you encouraged households to sign up for broadband, you eased the transition to new technology, and you developed programs in universities just like this one to educate young people in digital skills. And I applaud you for the remarkable linkage to the military and the security side of it with the offer that you make to students who will come here, learn, and then go on to serve the country in the military for those seven years.

Today, thanks in part to President Park’s commitment to build a, quote, “creative economy,” the ROK is a virtual synonym for Internet success stories, such as the educational network service ClassTing; or the Kakao, your messenger app which is one of the fastest-growing tech firms in all of Asia; and GRobotics, a company which has revolutionized the robot industry and, incredibly, it was originally conceived by an amazing 11-year-old child. Just two weeks ago, Ambassador Lippert joined President Park at the opening of the Google Campus for startups and entrepreneurs right here in Seoul – an initiative designed to spur the exchange of ideas and digital growth in both of our countries. Now, both of our nations know and view the internet and cyber issues as part of a new frontier for our governments and peoples, and it will be one of the key areas discussed when our two presidents meet in in Washington in June.

The fact is, whichever side of the Pacific Ocean we live on, the internet today is part of almost everything that we do. And just to tell you how amazing it is, I served in the United States Senate on the Commerce Committee in 1996. I was chairman of the Communications Subcommittee when we rewrote the communications law for our country. And guess what? Barely anybody in 1996 was talking about data, and data transformation, and data management. It was all about telephony – the telephone. That’s how far we’ve traveled in 20 years.

So it matters to all of us how the technology is used and how it’s governed. That is precisely why the United States considers the promotion of an open and secure internet to be a key component of our foreign policy. It’s why we want to work with you and with international partners everywhere in order to better understand the choices that we face in managing this extraordinary resource – a resource which does present us with certain challenges even as it presents us with unprecedented opportunities.

Now, what do I mean by that?

Well, to begin with, America believes – as I know you do – that the internet should be open and accessible to everyone. We believe it should be interoperable, so it can connect seamlessly across international borders. We believe people are entitled to the same rights of free expression online as they possess offline. We believe countries should work together to deter and respond effectively to online threats. And we believe digital policy should seek to fulfill the technology’s potential as a vehicle for global stability and sustained economic development; as an innovative way to enhance the transparency of governments and hold governments accountable; and also as a means for social empowerment that is also the most democratic form of public expression ever invented.

At its best, the internet is an equal-opportunity platform from which the voice of a student can have as much reach as that of a billionaire; a chief executive may be able to be out-debated by an entry-level employee – and there’s nothing wrong with that. Most users of the internet agree, on the internet as in any other venue, the human rights of every person – including freedom of expression – should be protected and respected. The United Nations has repeatedly affirmed this view, but as we know, it is still not universally held. That means that we will continue to have important choices to make – important choices to make locally, to make in universities, to make in businesses, to make in countries, and between countries. We will have a lot of choices about technology among and between nations.

Let me tell you something: How we choose begins with what we believe. And what we believe about the internet hinges to a great extent on how we feel, each and every one of us, about freedom.

Freedom. The United States believes strongly in freedom – in freedom of expression, freedom of association, freedom of choice. But particularly, this is important with respect to freedom of expression, and you believe in that freedom of expression here in Korea. We want that right for ourselves and we want that right for others even if we don’t agree always with the views that others express. We understand that freedom of expression is not a license to incite imminent violence. It’s not a license to commit fraud. It’s not a license to indulge in libel, or sexually exploit children. No. But we do know that some governments will use any excuse that they can find to silence their critics and that those governments have responded to the rise of the internet by stepping up their own efforts to control what people read, see, write, and say.

This is truly a point of separation in our era – now, in the 21st century. It’s a point of separation between governments that want the internet to serve their citizens and those who seek to use or restrict access to the internet in order to control their citizens.

Here in the Asia Pacific, we see countries such as the ROK and Japan that are among the world’s leaders in internet access, while North Korea is at the exact opposite end of that spectrum, with the lowest rate of access in the world and the most rigid and centralized control.

No other government is as extreme as the DPRK, but there are more than a few who want to harvest the economic benefits of the internet while nevertheless closing off the avenues of political, social, and religious expression. They impose filters that eliminate broad categories of what their citizens can see and receive and transmit – and with whom ideas may be changed and shared. What’s more, the governments that have pioneered the repressive use of such technologies are quick to export their tools and methods to others, and thereby further diminish individual rights. At the same time, some governments are using the internet to track down activists and journalists who write something that they don’t like, and even reach beyond their borders in order to intimidate their critics.

My friends, this discourages free expression and it clearly seems intended to turn their part of the internet into a graveyard for new ideas – the exact opposite of what it should be, a fertile field where such ideas can blossom and grow.

Let’s be clear: Every government has a responsibility to provide security for its citizens. Yes. We all agree with that. In the United States, our efforts to do so – and the reforms that we have undertaken in the process – have been guided by our concern for individual rights and our commitment to oversight and review. Further, unlike many, we have taken steps to respect and safeguard the privacy of the citizens of other countries and to use the information that we do collect solely to address the very specific threat to the United States and to our allies. We don’t use security concerns as an excuse to suppress criticisms of our policies or to give a competitive advantage to an American company and any commercial interests at all.

Now, regrettably, it is no coincidence that many of the governments that have a poor record on internet freedom also have a questionable commitment to human rights more generally. United States policy has always been to engage with such governments to encourage reforms and to point out the contributions to prosperity that would flow from a more open approach. Regimes that practice repression typically argue that they have no obligation to justify what they do inside their own borders, but that assertion is directly contradicted by the Universal Declaration of Human Rights and by many other multilateral declarations and statements.

The fact is, an individual’s aspiration to be free may be the most single powerful force on Earth. It’s an aspiration that may be able to be slowed sometimes, maybe intimidated sometimes, it may even be eliminated temporarily by violence in certain cases. But I’m telling you its power within the human soul is so infectious that it will always resurface in one form or another, even in the most extraordinary circumstances.

And history – history has proven that again and again and again. Throughout history, we have seen that men and women will do whatever it takes to find a way to make their desire for freedom known. We saw that with the authors of the pamphlets that helped to spark the revolution that gave birth to my home country in the 1700s. We saw it with the dissidents writing newsletters and producing radio broadcasts behind the Iron Curtain during the Cold War. And we see it today, in places all over the world, where young people are challenging injustice – armed only with their smart phones.

The internet is, among many other things, an instrument of freedom. It’s a tool people resort to in response to the absence and failure or abuse of government. So of course, some leaders are afraid of it. They’re afraid of the internet in the same way that their predecessors were afraid of newspapers, books, and the radio, but even more so because in this case, because of the interactivity that allows for a free-flowing discussion and the exchange of views – activities that can, and often do, lead to change.

I say to you today, here at Korea University, that fear is misplaced, and that response is, in the end, futile. Anyone who blames the internet for the disorder or turmoil in today’s world is just not using their head to connect the dots correctly. And banning the internet in a misguided attempt to impose order will never succeed in quashing the universal desire for freedom.

Ladies and gentlemen, repression does not eliminate the speech we hate. It just forces it into other avenues – avenues that often can become more dangerous than the speech itself that people are fighting. The remedy for the speech that we do not like is more speech. It’s the credible voices of real people that must not only be enabled, but they need to be amplified.

The good news is that much of the world understands this. More and more of the world understands this. And the advocates of internet freedom and openness are speaking up. The United States is part of the Freedom Online Coalition, a 26-country group that we are actively seeking to expand. The coalition argues that narrow and distorted visions of the internet cannot be allowed to prevail. Freedom must win out over censorship. That is an important principle, but it is also a practical imperative. After all, from the dawn of history to the present day, repression hasn’t invented a thing. Freedom is how jobs are created, diseases are cured, alternative energy is harnessed, and new ways are found to feed a global population that has quadrupled in the past century and that will rise to some 9 billion people in the next 40 to 50 years. Without freedom, civilization can’t advance; it’s like a bicycle without pedals.

Remember that the internet is not just another sector of our economy. Like electricity, it is a general purpose technology that is used in thousands of different ways, streamlining everything from buying a cup of coffee to building a skyscraper. Consider what would happen if someone tried to block the flow of electricity – the lights would go out and everything would stop. In fact, when I was a lot younger, Hollywood made a movie about exactly that; it was called “The Day the Earth Stood Still.” And thank heavens they made a couple more of them so you can’t tell exactly which one I’m referring to. (Laughter.) Now, you might want to watch it, because policies that restrict online data streams have a similar effect, if perhaps not quite so dramatic.

Think, for example, of what would take place if every country imposed data localization requirements, causing information to halt and to undergo inspection whenever it reached a national border. Imagine what would happen to commerce and to the flow of information, to the simple effort to get an answer to a question at a dinner table when you’re talking with people and you want to Google something. The delays would create huge obstacles to multinational business at a time when speed is of the essence and cross-border enterprises are major engines of growth. That’s not a formula for progress; it’s a way to stop progress in its tracks.

The internet provides broadly-shared connections that are essential for modern economies to be able to grow. It’s that simple. It can help people even in remote areas take advantage of government services and make a better business decision, for example. Let me give you an example. It could make a difference to people about when you bring your crops to the market or how do you find international customers for local projects.

With digital technology, fishermen in Mozambique can keep their catch fresh in the water until they have a buyer, somewhere in another continent maybe, thus eliminating spoilage and waste.

Shopkeepers in sub-Saharan Africa have seen their incomes actually grow by using mobile banking technology to avoid local loan sharks and go directly to reputable financial institutions for emergency credit and loans.

The system becomes more accountable and more transparent and more accessible. Women entrepreneurs in Southeast Asia have formed cooperatives online that enable them to take advantage of economies of scale.

Children from Angola to India are learning more and faster through education that comes to them over the internet.

And a couple of years ago, a young engineer from Cameroon developed a computer tablet called “Cardiopad” that enables Africans to be able to have a heart examination at home and receive the diagnosis from doctors who may be hundreds of miles away. Think about that.

The examples are endless, but you get the point. I know. The internet fuels innovation that can lead to improved efficiency, improved productivity in every sector of a developing economy.

But in thinking about the internet’s promise, you have to recognize how far that potential is from being fulfilled today. Roughly three out of every five people in the world today remain without internet access – and in the poorest countries that figure can top 95 percent.

A big part of the reason is simply cost. Ask yourself: How much of your family’s income do you pay for internet access? In America, the average is 1 or 2 percent. But a typical family in some countries have to pay 10 percent for entry-level mobile broadband and roughly four times that for fixed broadband. In other words, people with low incomes can’t afford digital access. They need to earn more money. To break that circle of despair, we need to bring the costs down by getting public policies right – because money isn’t the only barrier.

There’s a reason why access is relatively high in Colombia but low in Venezuela. There’s a reason why it’s high in Malaysia but low in Cambodia; a reason why it’s high in Rwanda but low in Ethiopia. Some governments do much more than others to facilitate access for people in poor or remote areas. And the starting point is for every country to have a clear and comprehensive national broadband plan that allows for private investment, encourages competition, removes bureaucratic obstacles, and takes full advantage of shared internet services at schools, libraries, community centers, and cafes.

That’s why two years ago the United States helped create the Alliance for Affordable Internet. This broad coalition draws on expertise from governments, the private sector, and civil society to assist policy makers in expanding access while keeping prices low. It’s the right goal, and I’ll tell you, it’s also a smart goal. According to one recent European study, tripling mobile broadband penetration levels across the developing world would provide a return of as much as $17 for every $1 spent.

About 10 days ago, when I was in Kenya, I Skyped, using the internet, with a group of young Somali refugees. Most of these refugees were high school or college age kids, and yet – and yet, extraordinarily, many of them had never, ever been outside that refugee camp – ever. This, in an era of incredible globalization – they had only lived in one refugee camp. The students I spoke to wanted desperately to be able to complete their schooling. They wanted to find a job. They wanted to go on to university. They wanted to begin a career. One young woman, who is studying chemistry and biology, told me she hoped to become a doctor. Now, I’m willing to bet you that she’s never been inside a hospital. But that’s what she wanted to do – become a doctor. The irony is that, at the refugee camp, they have internet connections. Now, I can’t help but wonder whether that will be the case when they return to Somalia.

If there is any message that is going to be sent to governments by young people in the world today, it is the desire – the universal desire – for jobs, for opportunity, for education, for a future. That’s what people want. It’s what every family in the world really wants. No one is asking to be censored. No one is yearning to be told what to think and how to live. The same desires that helped South Korea embrace democracy are what sparked the beginnings of the Arab Spring; they’re what kept the pro-democracy movement alive through two decades of dictatorship in Burma; and they’re what prompted the voters of Sri Lanka and Nigeria to flock to the polls in recent months and cast their ballots for change.

So looking to the future, we have to respond to this demand for openness and opportunity by making steady progress toward closing the digital divide. And with that goal in mind, the United States State Department will soon launch a new diplomatic initiative – in combination with partner countries, development banks, engineers, and industry leaders – and we’re going to do just that: try to make it more available. You may be sure that we will be inviting your government and other representatives from this highly-connected country to help us lead and guide this effort. Because this will define the future. And this is the way we’ll address violent extremism, and failing states.

So this brings me to another issue that should concern us all, and that is governance – because even a technology founded on freedom needs rules to be able to flourish and work properly. We understand that. Unlike many models of government that are basically top-down, the internet allows all stakeholders – the private sector, civil society, academics, engineers, and governments – to all have seats at the table. And this multi-stakeholder approach is embodied in a myriad of institutions that each day address internet issues and help digital technology to be able to function.

The versatility of the current approach enables it to move both with deliberation and care on complex issues and, frankly, much more rapidly on situations that demand a rapid response. For example, we saw the community respond to the 2007 cyberattacks in Estonia in a matter of hours. And as recently as last week, it responded literally in minutes to an unexpected outage of the Amsterdam exchange, which is the second-largest internet exchange point in the world.

That’s why we have to be wary of those who claim that the system is broken or who advocate replacing it with a more centralized arrangement – where governments would have a monopoly on the decision-making. That’s dangerous. Now, I don’t know what you think, but I am confident that if we were to ask any large group of internet users anywhere in the world what their preferences are, the option “leave everything to the government” would be at the absolute bottom of the list. Because of the dynamic nature of this technology, new issues are constantly on the horizon – but the multi-stakeholder approach remains the fairest and the best, most effective way to be able to resolve those challenges.

Now, as everyone knows, it’s impossible to talk about cyber policy without talking about international peace and security. You live this truth right here in South Korea, just as we do in the United States. Both of our countries have been hit by serious cyber-attacks from state and non-state actors. Worldwide, the risk and frequency of such attacks is on the increase.

America’s policy is to promote international cyber stability. The goal is to create a climate in which all states are able to enjoy the benefits of cyberspace; all have incentives to cooperate and avoid conflict; and all have good reason not to disrupt or attack one another. To achieve this, we are seeking a broad consensus on where to draw the line between responsible and irresponsible behavior.

As I’ve mentioned, the basic rules of international law apply in cyberspace. Acts of aggression are not permissible. And countries that are hurt by an attack have a right to respond in ways that are appropriate, proportional, and that minimize harm to innocent parties. We also support a set of additional principles that, if observed, can contribute substantially to conflict prevention and stability in time of peace. We view these as universal concepts that should be appealing to all responsible states, and they are already gaining traction.

First, no country should conduct or knowingly support online activity that intentionally damages or impedes the use of another country’s critical infrastructure. Second, no country should seek either to prevent emergency teams from responding to a cybersecurity incident, or allow its own teams to cause harm. Third, no country should conduct or support cyber-enabled theft of intellectual property, trade secrets, or other confidential business information for commercial gain. Fourth, every country should mitigate malicious cyber activity emanating from its soil, and they should do so in a transparent, accountable and cooperative way. And fifth, every country should do what it can to help states that are victimized by a cyberattack.

I guarantee you if those five principles were genuinely and fully adopted and implemented by countries, we would be living in a far safer and far more confident cyberworld.

But even with these principles, ensuring international cyber stability will remain a work in progress. We still have a lot of work to do to develop a truly reliable framework – based on international law – that will effectively deter violations and minimize the danger of conflict.

To build trust, the UN Group of Governmental Experts has stressed the importance of high-level communication, transparency about national policies, dispute settlement mechanisms, and the timely sharing of information – all of them, very sound and important thoughts. The bottom line is that we who seek stability and peace in cyberspace should be clear about what we expect and intend, and those who may be tempted to cause trouble should be forewarned: they will be held accountable for their actions. The United States reserves the right to use all necessary means, including economic, trade and diplomatic tools, as appropriate in order to defend our nation and our partners, our friends, our allies. The sanctions against North Korean officials earlier this year are one example of the use of such a tool in response to DPRK's provocative, destabilizing and repressive actions, including the cyber-attack on Sony Pictures. Now, as the international community moves towards consensus about what exactly constitutes unacceptable behavior in cyberspace, more and more responsible nations need to join together to act against disruptors and rogue actors.

As we know, malicious governments are only part of the cybersecurity problem. Organized crime is active in cyberspace. So are individual con artists, unscrupulous hackers, and persons engaged in fraud. Unfortunately, the relative anonymity of the internet makes it an ideal vehicle for criminal activity – but not an excuse for working through the principles I described to finding rules of the road and working so that the internet works for everybody else. The resulting financial cost of those bad actors, the cost of cybercrime, is already enormous, but so is the loss of trust in the internet that every successful fraud or theft engenders.

And that’s precisely why the United States is working with partners on every continent to strengthen the capacity of governments to prevent cyber-crime through improved training, the right legal frameworks, information sharing, and public involvement.

The best vehicle for international cooperation in this field is the Budapest Convention on Cybercrime, which my government urges every nation to consider joining. There is no better legal framework for working across borders to define what cybercrime is and how breaches of the law should be prevented and prosecuted. We also support the G-7 24/7 Network – in which South Korea is an active participant – and that enables police and prosecutors from more than 70 countries to request rapid assistance on their investigations.

The United States is also working with partners to improve network defenses and in cooperation with other countries to respond to cyber incidents. All of this is crucial, because in an interconnected system like the internet, poor cybersecurity has the potential to increase the danger for all of us. So we have to help each other. We have to maintain direct contact between our incident response teams, invest heavily in that capacity, and build that capacity so that weak spots are turned into stronger blockages against the vulnerabilities, and ultimately, they disappear.

So to sum up, I think it is clear to all of us that the internet is not like most inventions that affect a single industry, require just a few tweaks – a little adjustment here and there – and then we can all move on. That’s not what it requires. Digital technology has led us into a whole new frontier in which we have to find our way – and there are many different dimensions to it. When I was still in the United States Senate, I introduced legislation to protect the privacy rights of individuals and I still feel very strongly about that principle. And we are working to make sure we protect the privacy of people, not just in our country but in others.

As Secretary of State, I am in charge of an organization that is the target of hacking attempts every single day – and we have to defend against those. As a diplomat, I’m constantly engaged in discussions with counterparts about how to best enhance access and how to design and enforce the right rules to protect all of us.

My meetings with the private sector, the scientific community, the civil society, all bring home to me how important it is that all stakeholders have a voice in internet governance. The very essence of this technology is its freedom and its openness, and unless we bring all the stakeholders to the table, that will be lost. And something more important than all of us will be lost with it.

We cannot let that happen. Now, as I said before, obviously, the internet is not without risk – but at the end of the day, if we restricted all technology that could possibly be used for bad purposes, we’d have to revert to the Stone Age. Throughout the global community, we need to come together around principles that will establish a solid foundation for our freedoms – principles that will protect the rights of individuals, the privacy of our citizenry, and the security of our nations – all at the same time.

So I leave you with a somewhat unusual request: Keep doing what so many of you are already doing. Speak up for an open and secure internet. Defend freedom of expression. Add to South Korea’s great reputation as a leader in digital technology. In doing so, we can be absolutely confident about the future that we will shape.

And how will we know when we finally have succeeded? When an open, secure internet is as widespread as electricity or cellphone coverage itself. When it is fully integrated into everyday life in every corner of the globe. When it is no longer contested but accepted and even taken for granted. When we reach that point – believe me: Your successors will look back at all of this debate and they will wonder how could anyone have argued the other way.

My friends, if we do all of these things, if we stick by our guns, the internet revolution that we are living today will literally define the kinds of opportunities that young people all over the world are hoping for today – help strengthen governments; provide opportunity; make us safer; bring us together; and in effect, define the future of this century. That’s the goal we’re fighting for, and we look forward to working with all of you to achieve it.

Thank you.

Sunday, March 1, 2015

NSF ON THE 'ENERGY INTERNET'

FROM:  NATIONAL SCIENCE FOUNDATION
Creating the energy Internet
How leaders in research, industry and engineering education are working to create the energy network of the future

It only takes a power outage of a few minutes in the middle of a busy workday to drive home the hazards of relying on an energy infrastructure rooted in the Industrial Age. Without the electricity delivered over the nation's power grid, commerce would grind to a halt, communication networks would fail, transportation would stop and cities would go dark.

Simply put, nothing would work.

Plus, blackouts aren't easy to contain. Because the power grid is a vast interconnected network, the failure of one part can have a cascading effect, triggering successive outages down the line.

"The power grid is based on technology from the early 20th century," says Iqbal Husain, a professor of electrical and computer engineering at North Carolina State University. "That needs to change."

Husain is director of the FREEDM Systems Center, a collaboration of leaders in research, industry and engineering education working to envision and then create the energy network of the future. With funding from the National Science Foundation (NSF) leveraged by additional industry support, the Engineering Research Center has sparked the growth of dozens of clean energy businesses in Raleigh's Research Triangle, making the region an epicenter of smart grid development.

"We're trying to create a new electric grid infrastructure that we call the energy Internet," says Alex Huang, an NC State researcher and co-inventor of a newly patented soft-switch single-stage AC-DC converter. "We're looking at the whole distribution system. That's a huge engineering system. It's very, very complex."

According to the U.S. Department of Energy, the smart grid will be more efficient and capable of meeting increased consumer demand without adding infrastructure. It also will be more intelligent, sensing system overloads and rerouting power to prevent or to minimize a potential outage. It will accept energy from virtually any fuel source and--building on NSF-funded research--offer improved security and resiliency in case of a natural disaster or threat. It also will allow real-time communication between the consumer and utility, ushering in a new era of consumer choice.

Energy innovation

From its headquarters on NC State's Centennial Campus, FREEDM (short for Future Renewable Electric Energy Delivery and Management) is coming at the challenge on many fronts, from the creation of new devices that will allow energy to flow in more than one direction to the development of the software architecture that will give the smart grid its brainpower.

The facility boasts a 1-megawatt demonstration hub and real-time digital simulation lab, as well as labs specializing in computer science, power electronics, energy storage and motor drive technology. Under the FREEDM umbrella, researchers and students are tackling more than a dozen research projects in partnership with colleagues at Arizona State University, Florida State University, Florida A&M University and Missouri University of Science and Technology.

That's just this year. In seven years, the center has launched dozens of projects in fields ranging from systems theory to intelligent energy management.

The result is one innovation after another. Researchers have developed a technique that allows a common electronic component to handle voltages almost seven times higher than existing components; created an ultra-fast fault detection, isolation and restoration system; and invented a new solid-state transformer to replace the 100-year-old electromagnetic transformer.

These innovations hold promise for making the power grid more resilient, fostering sustainable energy technologies that play an important role in the nation's energy infrastructure, and driving economic growth.

Startups spawn new technologies

For example, the startup company General Capacitor is focused on developing energy storage products based on the "ultracapacitor" discoveries made by Jim Zheng, a professor at Florida A&M University and Florida State University who serves on FREEDM's leadership team.

Zheng's ultracapacitors open the door to a new generation of energy storage technologies that can be used to help stabilize the flow of energy from renewable sources--such as solar power--into the grid. This would have the effect of making renewable sources more viable, while also making the grid itself more resilient.

For the future power grid, incorporating these new technologies will be like plugging in a lamp. The smart grid will be able to collect and process thousands or even millions of bits of data and intelligently manage the flow of power across the network, ideally doing most of its work at the edge of the grid, close to the customer. This kind of system--called distributed generation--is potentially more efficient and environmentally sustainable than the existing system.

A mile from the NC State campus in Raleigh, a startup company called GridBridge is working to commercialize FREEDM technology in the form of a smart grid router that can integrate renewables and energy storage devices, including electric vehicles, into the grid. GridBridge was funded by the NSF Small Business Innovation Research program.

"We don't expect the utility companies to rip out their existing infrastructure," says CEO Chad Eckhardt. "But they need products that can help the infrastructure operate better and more efficiently."

Another FREEDM partner, energy giant ABB, is working to perfect the technology behind microgrids, which could significantly enhance grid security and reliability.

A microgrid essentially simulates the operations of the larger grid but, as the name suggests, provides power on a smaller scale, serving a town, military base or university, for example. Microgrids can operate independently of the main grid or run parallel to it. ABB's microgrid is designed to seamlessly integrate renewables, with their fluctuating energy profiles, and output reliable power. If the main grid goes down, its microgrid system isolates itself from the larger grid and continues to provide power to its customers. When the larger grid comes back online, the connection is re-established.

"Anything that produces power could potentially be a microgrid," says Brad Luyster, vice president and general manager of ABB's Microgrid Regional Execution Center. "If the power goes off from the main grid, the microgrid has its own generation on site."

The global marketplace

GridBridge and ABB aren't the only companies in the region eyeing the opportunities for energy innovation.

A recent study identified 169 firms within the 13-county Triangle region, including 16 Fortune 500 companies, working to develop sustainable solutions to the world's energy needs. The sector, called cleantech by the industry, spans every county in the region.

Lee Anne Nance, executive director of the Research Triangle Regional Partnership, spearheads a collaborative network called the Research Triangle Cleantech Cluster that promotes the region's competitive edge in the global marketplace. Its members include some of the industry's biggest players, including Duke Energy, Siemens Energy, ABB Inc. and Schneider Electric, as well as major high-tech companies such as SAS, Cisco, Power Analytics, Sensus, Power Secure, RTI International and Field2Base.

Combined, they pack a powerful punch, employing thousands of high-skill workers and driving innovation in energy management, water, transportation, data analytics, information technology, renewable energy, electronics and engineering.

"This is a disruptive and transformational time in infrastructure delivery throughout the world, and our region is leading the way," Nance says. "We're right in the middle of the action and that's good for the economy, the people who work here and the people who live here."

-- David Hunt, North Carolina State University
Investigators
Jim Zheng
Alex Huang
Gerald Heydt
Iqbal Husain
Mariesa Crow
Steinar Dale
Chad Eckhardt
Christopher Edrington
Related Institutions/Organizations
GridBridge, Inc
North Carolina State University

Tuesday, January 6, 2015

DOJ ANNOUNCES FORMER CYBER SECURITY DIRECTOR AT HHS SENTENCED TO PRISON IN CHILD PORNOGRAPHY CASE

FROM:  U.S. JUSTICE DEPARTMENT 
Monday, January 5, 2015
Former Acting HHS Cyber Security Director Sentenced to 25 Years in Prison for Engaging in Child Pornography Enterprise
Five Others Previously Sentenced to Substantial Prison Terms for Participation in the Same Tor-Network-Based Child Pornography Website

The former acting director of cyber security at the U.S. Department of Health and Human Services was sentenced to 25 years in federal prison today for engaging in a child exploitation enterprise and related charges in connection with his membership in a Tor-network-based child pornography website.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Deborah R. Gilg of the District of Nebraska and Special Agent in Charge Thomas R. Metz of the FBI’s Omaha Division made the announcement.

“Using the same technological expertise he employed as Acting Director of Cyber Security at HHS, DeFoggi attempted to sexually exploit children and traffic in child pornography through an anonymous computer network of child predators,” said Assistant Attorney General Caldwell.  “But dangerous criminals cannot be allowed to operate on-line with impunity.  Today’s sentence shows that the Department of Justice will bring criminals and child predators to justice, even when they employ anonymous networks like Tor.”

“Today's sentence and the others imposed earlier demonstrate that those who exploit children will be aggressively pursued and prosecuted to the full extent of the law,” said U.S. Attorney Gilg.  “Those who think they are acting anonymously on the Internet will be found and held accountable.”

“The production and distribution of child pornography is one of the most saddening, tragic crimes the FBI investigates,” said Special Agent in Charge Metz.  “Today’s sentencing sends a message to those who advertise, distribute, possess, and trade child pornography that the FBI will look for you, will find you and will make sure you are prosecuted to the fullest extent of the law.”

Timothy DeFoggi, 56, formerly of Germantown, Maryland, was convicted on Aug. 26, 2014, following a four-day jury trial before Chief U.S. District Judge Laurie Smith Camp in the District of Nebraska of engaging in a child exploitation enterprise, conspiracy to advertise and distribute child pornography and accessing a computer with intent to view child pornography.

According to evidence presented at trial, DeFoggi registered as a member of the Tor-network-based child pornography website on March 2, 2012, and maintained his membership and activity until Dec. 8, 2012, when the website was taken down by the FBI.  The website’s users utilized advanced technological means in order to undermine law enforcement’s attempts to identify them.  The website was accessible only through Tor, an Internet application specifically designed to facilitate anonymous communication.  Acting under the cloak of anonymity, users advised others on best practices to prevent detection by law enforcement, including advice about the proper use of encryption software, techniques to hide or password-protect child pornography collections, and programs to remove data from a user’s computer.

Through the website, DeFoggi accessed child pornography, solicited child pornography from other members, and exchanged private messages with other members in which he expressed an interest in the violent rape and murder of children.  DeFoggi suggested meeting one member in person to fulfill their mutual fantasies to violently rape and murder children.

DeFoggi was the sixth individual to be convicted as part of an ongoing investigation targeting three Tor-network-based child pornography websites.  The websites were run by a single administrator, Aaron McGrath, who was previously convicted in the District of Nebraska of engaging in a child exploitation enterprise in connection with his administration of the websites.  On Jan. 31, 2014, McGrath was sentenced to 20 years in prison by Senior U.S. District Judge Joseph F. Bataillon.

Four other members of the same website as DeFoggi were previously convicted and sentenced by Senior U.S. District Judge Bataillon in connection with their illegal activity on the site:

Jason Flanary, then 42, formerly of Chicago, Illinois, the Philippines, and Guam, was sentenced to 20 years in prison on June 30, 2014.

Wesley Cameron, then 22, formerly of Ashford, Alabama, was sentenced to 15 years in prison on Oct. 24, 2014.

Zackary Austin, 28, formerly of Reno, Nevada, was sentenced to 16 years in prison on Nov. 6, 2014.

Charles MacMillan, 29, formerly of Rockville, Maryland, was sentenced to 12 years in prison on Nov. 7, 2014.

These cases were brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice.  Led by U.S. Attorneys’ Offices and the Criminal Division’s Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state and local resources to better locate, apprehend and prosecute individuals who exploit children via the Internet, as well as to identify and rescue victims.  For more information about Project Safe Childhood, please visit www.projectsafechildhood.gov.

This case is a result of investigative efforts led by the FBI’s Omaha Field Office and the FBI’s Violent Crimes against Children Section, Major Case Coordination Unit, and Digital Analysis and Research Center.  The FBI was assisted in its investigation by Europol, the European Union’s law enforcement agency, as well as members of the FBI’s Violent Crimes Against Children International Task Force.  This case was prosecuted by Trial Attorneys Keith Becker and Sarah Chang of CEOS and Assistant U.S. Attorney Michael P. Norris of the District of Nebraska.

Monday, November 3, 2014

OPERATION KINGDOM CONQUEROR SENDS 11 MEN TO PRISON FOR ROLES IN CHILD EXPLOITATION

FROM:  U.S. JUSTICE DEPARTMENT 
Wednesday, October 29, 2014
Eleven Men Sentenced to Prison in Connection with International Child Exploitation Enterprise

Eleven men have been sentenced to federal prison for their roles in an international child pornography network operated online, which was targeted by state and federal investigators and prosecutors participating in Operation Kingdom Conqueror.

Assistant Attorney General Leslie R. Caldwell of the Justice Department’s Criminal Division, U.S. Attorney Michael W. Cotter of the District of Montana and Special Agent in Charge Mary Rook of the FBI’s Salt Lake City Division made the announcement.

According to court documents, in November 2009, an early participant in the conspiracy designed and created an online bulletin board that allowed members to exchange images, including child pornography.  As the conspiracy progressed, additional members contributed to the design and operations of the board.  Between Nov. 6, 2009, and March 19, 2012, members of the conspiracy used the online bulletin board to share pictures and videos of children engaged in sexually explicit conduct.  During that same time period, the participants agreed to use the online bulletin board to solicit additional images of child pornography, which they would then share and broadcast on the Internet.  Thirteen defendants have been charged and convicted for their participation in this child pornography network.

The following defendants pleaded guilty in April 2014 to conspiracy to advertise child pornography and were sentenced by U.S. District Judge Donald W. Molloy of the District of Montana:

Tony Bronson, 53, of Gary, Indiana, was sentenced to serve 224 months on Oct. 28, 2014.

Charles Crosby, 43, of Trenton, New Jersey, was sentenced to serve 210 months in prison on Oct. 23, 2014.

Steve Humiston, 57, of Tacoma, Washington, was sentenced to serve 210 months in prison and ordered to pay a $5,000 fine on Oct. 23, 2014.

John Johnson, 58, of Locust Grove, Virginia, was sentenced to serve 180 months in prison on Oct. 22, 2014.

Robert Krise, 66, of Gaithersburg, Maryland, was sentenced to serve 180 months in prison on Oct. 22, 2014.

Scott Long, 53, of Portland, Oregon, was sentenced to serve 200 months in prison on Oct. 21, 2014.

Ian Nosek, 42, of Charlottesville, Virginia, was sentenced to serve 216 months in prison on Oct. 23, 2014.

Phillip Morris, 42, of Jeffersonville, Indiana, was sentenced to serve 216 months in prison on Oct. 22, 2014.

Joseph Purificato, 23, of Mount Vernon, Missouri, was sentenced to serve 180 months in prison on Oct. 28, 2014.

Paul Wencewicz, 48, of Polson, Montana, was sentenced to serve 200 months in prison on Oct. 21, 2014.

Jeffrey Woolley, 53, of Nicholasville, Kentucky, was sentenced to serve 180 months in prison and ordered to pay a $5000 fine on Oct. 28, 2014.

All of the defendants were ordered to forfeit their computers and storage devices. Purificato received a 10-year term of supervised release following his prison sentence.  All other defendants received lifetime terms of supervised release.  All defendants are required to pay $29,859 restitution.

Two additional defendants, Joshua Peterson, 45, of Prescott, Arizona, and Steven Grovo, 35, of Shirley, Massachusetts, were found guilty of participating in a child exploitation enterprise and a conspiracy to advertise child pornography on Oct. 9, 2014.  Both men are scheduled to be sentenced on Jan. 22, 2015, in Missoula, Montana.

The investigation, referred to as Operation Kingdom Conqueror, is an ongoing cooperative effort between the Criminal Division’s Child Exploitation and Obscenity Section, FBI, Montana Department of Criminal Investigations, Helena and Polson Police Departments, Immigration and Customs Enforcement’s Homeland Security Investigations, Montana Internet Crimes Against Children Task Force, and the States of Jersey Police Department, Isle of Jersey.

Trial Attorney Maureen C. Cain of the Criminal Division’s Child Exploitation and Obscenity Section and Assistant U.S. Attorney Cyndee L. Peterson of the District of Montana prosecuted the case.

This case was initiated under the Department of Justice’s Project Safe Childhood initiative which was launched in 2006 to combat the proliferation of technology-facilitated crimes involving the sexual exploitation of children.  Through a network of federal, state, and local law enforcement agencies and advocacy organizations, Project Safe Childhood attempts to protect children by investigating and prosecuting offenders involved in child sexual exploitation.  It is implemented through partnerships including the Montana Internet Crimes Against Children (ICAC) Task Force.  The ICAC Task Force Program was created to assist state and local law enforcement agencies by enhancing their investigative response to technology facilitated crimes against children.

Saturday, October 11, 2014

BROWN DOG AND THE UNSTRUCTURED WEB

FROM:  NATIONAL SCIENCE FOUNDATION 
Brown Dog: A search engine for the other 99 percent (of data)
Illinois-led team develops tools to search the unstructured Web

We've all experienced the frustration of trying to access information on websites, only to find that we can't open the files.

"The information age has made it easy for anyone to create and share vast amounts of digital data, including unstructured collections of images, video and audio as well as documents and spreadsheets," said Kenton McHenry, who along with Jong Lee lead the Image and Spatial Data Analysis division at the National Center for Supercomputing Application (NCSA). "But the ability to search and use the contents of digital data has become exponentially more difficult."

That's because digital data is often trapped in outdated, difficult-to-read file formats and because metadata--the critical data about the data, such as when and how and by whom it was produced--is nonexistent.

Led by McHenry, a team at NCSA is working to change that. Recipients in 2013 of a $10 million, five-year award from the National Science Foundation (NSF), the team is developing software that allows researchers to manage and make sense of vast amounts of digital scientific data that is currently trapped in outdated file formats.

The NCSA team, in partnership with faculty at the University of Illinois at Urbana-Champaign, Boston University and the University of Maryland, recently demonstrated two services to make the contents of uncurated data collections accessible.

The first service, the Data Access Proxy (DAP), transforms unreadable files into readable ones by linking together a series of computing and translational operations behind the scenes.

Similar to an Internet gateway, the configuration of the Data Access Proxy would be entered into a user's machine settings and then forgotten. From then on, data requests over HTTP would first be examined by the proxy to determine if the native file format is readable on the client device. If not, the DAP would be called in the background to convert the file into the best possible format readable by the client machine.

In a demonstration at the Brown Dog Early User Workshop in July 2014, McHenry showed off the tool's ability to turn obscure file formats into ones that are more easily viewable. [Watch a video of the demo.]

The second tool, the Data Tilling Service (DTS), lets individuals search collections of data, possibly using an existing file to discover other similar files in the data. Once the machine and browser settings are configured, a search field will be appended to the browser where example files can be dropped in by the user. Doing so triggers the DTS to search the contents of all the files on a given site that are similar to the one provided by the user.

For example, while browsing an online image collection, a user could drop an image of three people into the search field, and the DTS would return images in the collection that also contain three people. If the DTS encounters a file format it is unable to parse, it will use the Data Access Proxy to make the file accessible.

The Data Tilling Service will also perform general indexing of the data and extract and append metadata to files to give users a sense of the type of data they are encountering.

McHenry likens these two services to the Domain Name Service (DNS), which makes the Internet humanly navigable by translating domain names, like CNN.com, into the numerical IP addresses needed to locate computer devices and services and the information they provide.

"The two services we're developing are like a DNS for data, translating inaccessible uncurated data into information," he said. According to IDC, a research firm, up to 90 percent of big data is "dark," meaning the contents of such files cannot be easily accessed.

Rather than starting from scratch and constructing a single all-encompassing piece of software, the NCSA team is building on previous software development work. The project aims to potentially bring together every possible source of automated help already in existence. By patching together such components, they plan to make Brown Dog the "super mutt" of software.

This effort is in line with the Data Infrastructure Building Blocks (DIBBS) program at NSF, which supports the development of McHenry's software. DIBBS aims to improve data science by supporting the development of the tools, technologies and community knowledge required to rapidly advance the field.

"Brown Dog today is developing a 'time machine' set of cyberinfrastructure tools, software and services that respond to the long-standing aspiration of many scientific, research and educational communities to effectively access, share and apply digital data and information originating in diverse sources and legacy environments in order to advance contemporary science, research and education," said Robert Chadduck, the program director at NSF who oversees the award.

Projects supported by DIBBS involve collaborations between computer scientists and researchers in other fields. The initial collaborators for the Brown Dog software were researchers in geoscience, biology, engineering and social science.

Brown Dog co-principal investigator Praveen Kumar, a professor in the department of Civil and Environmental Engineering at the University of Illinois at Urbana-Champaign and the director of the NSF-supported Critical Zone Observatory for Intensively Managed Landscapes is developing ways to exploit Brown Dog for the analysis of LIDAR data. He hopes to characterize landscape features for the study of human impact in the critical zone.

"These technologies will enable rapid investigation of large high-resolution datasets in conjunction with other data such as photographs and ground measurements for modeling and cross comparison across study sites," Kumar said.

McHenry is also a team member on a new DIBBS project that applies some of the insights from his work to data-driven discovery in materials science.

Brown Dog isn't only useful for searching the Deep Web, either. McHenry says the Brown Dog software suite could one day be used to help individuals manage their ever-growing collections of photos, videos and unstructured/uncurated data on the Web.

"Being at the University of Illinois and NCSA many of us strive to create something that will live on to have the broad impact that the NCSA Mosaic Web browser did," McHenry said, referring to the world's first Web browser, which was developed at NCSA. "It is our hope that Brown Dog will serve as the beginnings of yet another such indispensible component for the Internet of tomorrow."

-- Aaron Dubrow, NSF
Investigators
Jong Lee
Praveen Kumar
Kenton McHenry
Michael Dietze
Barbara Minsker
Related Institutions/Organizations
University of Illinois at Urbana-Champaign

Thursday, November 7, 2013

NSF EXPLORES CREATIVITY

FROM:  NATIONAL SCIENCE FOUNDATION 
Hunting the spark of creativity

In his 1937 book, "Think and Grow Rich," author Napoleon Hill identified 13 steps to success, one of which was the power of the mastermind. "No two minds ever come together without thereby creating a third, invisible, intangible force, which may be likened to a third mind," Hill wrote.

He included the step to explain a principle of achievement--the standard idea that two heads, or a group of heads, are better than one at creating innovations. More than 75 years later, new research aims to put Hill's mastermind idea on steroids.

Until recently, decision makers could only effectively harness shared creativity from relatively small mastermind groups such as boards, panels or committees. Data from these could be placed in pre-organized, well-structured and well-categorized "buckets" to extract creative knowledge.

The relatively recent growth and development of the Internet, however, along with social network technology, provides an opportunity to expand the mastermind concept to hundreds, or thousands or even hundreds of thousands of geographically distant people.

University of Cincinnati complex systems scientist Ali Minai and a team of researchers funded by the National Science Foundation (NSF) are attempting to do just that--to develop computer-based tools to mine the Internet and communities of social media for creative insights.

But first, the researchers must clearly define the highly personal subject of creativity by types, kinds and categories to successfully identify it online. In addition, they must find a way to organize large amounts of unstructured, creative data--intermixed collections of text, video, images and other information.

To do that, the researchers are examining creativity in neural networks in the human brain; social networks related to interactions among people and networks of knowledge that develop in groups. And according to some observers, if successful, the project could be a game changer.

"It could be a huge, big deal," said Penn State University's Jack Matson, author of the book "Innovate or Die: A Personal Perspective on the Art of Innovation."

"Basically, cultures are innovation driven," he said noting the market interconnectivity of nations like China and the United States. "Now that we're virtually connected, the ability to innovate is going to make or break countries and societies."

"The future of societies will depend more than ever on their innovativeness, and this will be enabled by connectivity," said Minai. "I think that Professor Matson's statement is absolutely correct. The issue is how we can exploit the immense amount of knowledge that is latent in the networks that connect us and which is growing every minute."

An interesting desire: Detecting creativity with computers

The project, "The Hunting of the Spark: A Systematic Study of Natural Creativity in Human Networks," is one of 40 projects funded in the first round of an NSF initiative that addresses extremely complicated and pressing scientific problems. Called INSPIRE, the initiative funds potentially transformative research that doesn't fit into any one, scientific field, but crosses disciplinary boundaries.

"There really is not one place in NSF for this type of research," said Betty Tuller, program director for perception, action and cognition in NSF's Social, Behavioral and Economics Sciences Directorate, which contributed to the funding. "This is especially true for research that doesn't focus on a single, specific domain but instead aims at understanding the role of human and organizational networks in creativity per se."

The team, whose research has been ongoing since September 2012, includes researchers from four universities with extensive expertise in social psychology, computational neuroscience, cognitive science, computer science, engineering and network theory.

"One of the interesting things is their desire to automatically detect creativity using a system of human-centered computing," said Kevin Crowston, a program director in NSF's division of information and intelligent systems in its Directorate for Computer and Information Science and Engineering, which also funds the research. "There is a lot of interest in computationally mining the large corpora of text data from social networks for signals of innovation. I'd like to see how this turns out."

Social networks: A better understanding

"Being able to extract ideas from social networks is very much the ultimate goal of our research, but a major issue is which real-world networks we can access for this purpose," said Minai.

In recent years, social media networks have been increasingly difficult to access. Because of structural and privacy concerns, accessing Facebook content for research purposes is extremely challenging. While Twitter is more accessible, only a fraction of the data stream can be collected and even then a lot of the data is just "noise."

These noisy data streams make the goals of the project harder to achieve. But Minai already has a group of University of Cincinnati graduate students, funded by a previous NSF grant, working to mine meaningful information from Twitter and other online sources.

He anticipates the two projects eventually will help open vast possibilities for shared creativity and innovation among the millions that use social media. He also anticipates the research could help many modern institutions, including elections, parliaments, governing boards, free markets and businesses. This is especially true of institutions that innovate using online presences.

ModCloth: An example

"Social has been a part of the 'DNA' of ModCloth since its inception," said Jennifer Grasso, director of Product Management for ModCloth. "We recognized early on that creating a social experience on and off ModCloth enables customers to feel a much closer affinity with our brand."

ModCloth is a wildly successful online retailer that credits the collaborative approach of its social media network for spurring company growth to more than $100 million in revenue in 2012. It specializes in vintage, retro-inspired and indie clothing and decor. Fast Company business magazine ranked its use of social media as 2013's fourth most innovative and ranked ModCloth as one of the top 50 most innovative companies overall.

"ModCloth allows users to post reviews for every product they purchase, and to date, 83 percent of our products have customer reviews on the site," said Grasso providing an example of how Minai and colleagues research into understanding the process of creativity, network interactions and analysis of unstructured data could benefit the company.

"These reviews are full of personal anecdotes about why an item did or didn't work. Comments about fit, quality, construction, personal style and a range of other information may be included in any given review. In customer research, we hear frequently from customers who tell us how useful these reviews are in helping them make a purchase decision.

"As a business, ModCloth could benefit from the ability to 'mine' the very varied, subjective information coming from these reviews. Are there trends we can elevate from this information around style concerns, fit issues or quality problems that can help us create a better shopping experience, sell more relevant products, or better meet our customers' needs?"

Subjective creativity: "How do we mine it?"

Grasso acknowledges, however, that creativity is incredibly subjective. She wonders, "How do we mine this type of data--not linear, not structured--and organize it into actionable insights for our business?"

She puts her finger on the nub of a major concern for the project's researchers. However, based on recent advances in computational linguistics and complex network analysis, the researchers may have a way to solve the problem. One potentially fruitful approach, they believe, is to look at structural elements within human and knowledge networks to uncover components of creativity.

The idea is to identify smaller sub-networks or modules within larger networks that people use to exchange information--that is identify modules that self-organize, carry out discrete functions and are strongly linked within themselves but weakly linked to other sub-networks in the larger group.

For example, among a group of engineering students, some may form a sub-network related to civil engineering, while others may form a module related to bioengineering. Though it may not seem like civil engineers and bioengineers have much in common, all are engineers.

Minai and team are looking for similar modules in neural networks, knowledge networks and social networks. Once these modules are identified, whether online or in person, the researchers believe they can analyze them to determine the network's inherent "meaning," or in this case, study them for constituent creativity. Being able to take raw, unorganized data and analyze it in this way could allow organized mining of large amounts of unstructured creative data.

A core concern: Catching creativity in the act

The researchers say relatively little data is available on how the creative process develops over time in real-world groups, and what the key dynamics are in producing the most innovative ideas or products. They hope the insights gained from their work will provide both a theoretical and practical basis for understanding the process of natural creativity in individuals and networks.

"A core concern of our research is the desire to catch creativity 'in the act,'" said Minai.

The researchers are using a combination of field and laboratory studies to improve their understanding. Field studies use intelligent analysis and data mining to discover natural patterns of innovation in diverse communities of test subjects, e.g., research scholars or engineers. Co-principal investigator and Stony Brook University Electrical and Computer Engineering professor Alex Doboli, who is an expert on data mining and innovation in engineering, will help develop a standard framework for such studies.

Minai and Hofstra University Computer Science professor Simona Doboli, also a co-principal investigator and an expert on brainstorming and neural networks, will generate computer models to analyze data from both laboratory groups and online sources. The models generated then will be tested more specifically in laboratory studies conducted by Paul Paulus and Jared Kenworthy, both co-principal investigators and psychology professors at the University of Texas at Arlington.

"What they're trying to do is make a fairly enormous leap in human ability to innovate by taking mass data from all these sites and trying to tweak where the innovations are, what's happening, where the trends are and how the remixing is going from culture to culture," said Matson, who recently headed a Coursera Massively Open Online Course on "Creativity, Innovation, and Change" that had more than 125,000 participants when it began in early September.

"In order for them to figure it out, it's going to take a lot of iterations, a lot of trial and error and I hope they are looking at it that way," he said.

"We would like people to see this research as an attempt to look at something that is the very essence of being human--creativity--but which is very difficult to study quantitatively," said Minai. "They should also understand that we approach this task with equal measures of excitement and humility."

Tuesday, July 10, 2012

U.S. NATIONAL SECURITY AGENCY WORKS TO ENSURE CYBERSPACE ACCESS


FROM:  AMERICAN FORCES PRESS SERVICE
NSA Chief: Cyber World Presents Opportunities, Challenges
By Jim Garamone
WASHINGTON, July 10, 2012 - Technology has opened tremendous opportunities for the world, but also poses tremendous challenges for those who work to ensure access to cyberspace, the director of the National Security Agency said here yesterday.

Army Gen. Keith B. Alexander, who also commands U.S. Cyber Command, told participants in an American Enterprise Institute seminar titled "Cybersecurity and American Power" that the capability exists today for destructive cyber attacks against critical infrastructures.

The cyber world is an increasingly important domain, the general said. In 2000, 360 million people were on the Internet. Today, more than 2.3 billion people are connected. Last year, 107 trillion emails were sent, he added, and a sign of the times is that more than 500,000 apps exist for the iPhone and 280,000 for Android smartphones.

But this tremendous opportunity for communication also presents a potential avenue of attack, Alexander said. A 2007 denial-of-service attack on Estonia virtually shut the nation down, he said, but that was just a transitory event in the evolution of cyber attacks.

"What I think we really need to be concerned about is when these transition from disruptive to destructive attacks -- and I think those are coming," he said.

A destructive attack does not simply overload computers or networks -- it destroys data or software, and systems must be replaced to return to the status quo. "We've got to consider that those are going to happen," Alexander said. "Those are coming up, and we have to be ready for that."

The general stressed that deterring cyber attacks is more difficult than nuclear deterrence, noting that nation-states, cyber criminals, hackers, activists and terrorists all pose threats. "So when you think about deterrence theory, you're not talking about just nation-on-nation deterrence theory," he said. "You have other non-nation-state actors that you now have to consider."

An attack may originate in a country, Alexander said, but no one can really tell if it's the nation, a criminal gang within the country or a lone hacker launching the attack.

Regardless of who initiates an attack, he added, the result could be the same. "You lose the financial sector or the power grid or your systems capabilities for a period of time," the general said. "It doesn't matter who did it; you still lose that. So you've got to come up with a defensive strategy that solves that, from my perspective."

The U.S. defensive strategy has to be a team approach, he said. "We want to get as many people as we can working together to solve this problem," Alexander said.
The White House has led the governmental effort, spanning the Department of Homeland Security to the Defense Department to the FBI and beyond. And any protection -- to be effective -- must include the private sector, the general told the audience. This has caused hackles to rise, he acknowledged, with critics saying such efforts are an invasion of privacy. But, Alexander said, it can be done while protecting civil liberties.

"If the critical infrastructure community is being attacked by something, we need them to tell us at network speed," the general said. "It doesn't require the government to read their mail or your mail to do that. It requires them -- the Internet service provider or that company -- to tell us that that type of event is going on at this time. And it has to be at network speed if you're going to stop it."

Cyber runs at the speed of light, Alexander noted, and human reaction times are simply not fast enough to react.

"Maybe we could do this in real time and come up with a construct [in which] you and the American people know that we're not looking at civil liberties and privacy, [but] we're actually trying to figure out when the nation is under attack and what we need to do about it," he said.

Monday, May 21, 2012

INTERNET FREEDOM AND INTERNATIONAL COMMUNICATIONS LAW


Photo:  Statue of Liberty and Coast Guard patrol.  Credit:  Wikimedia. 
FROM:  U.S. STATE DEPARTMENT
Two Cases for Internet Freedom
Remarks Philip L. Verveer
Coordinator for International Communications & Information Policy Winnik Telecom and Internet Forum
Hogan Lovells, Washington, DC
May 12, 2012
 I am very grateful to Hogan Lovells and to my friends in its communications practice for the invitation to deliver these remarks.
I first met Joel Winnik nearly 35 years ago when we both worked at the Federal Communications Commission. Joel’s many outstanding qualities are well known to his colleagues in the communications bar. But beyond those qualities, there is one thing about him that has always marked him apart for me. Joel was the first lawyer I ever met who specialized in international communications law.

In this, he was prescient. When he began practicing international communications law, the sector almost universally consisted of state-owned monopolies. There were perhaps one billion telephone connections in world. And here “telephone” is a material qualification, because apart from telex services, voice connections were about the only thing available for international communications. Some international calls went by undersea cables, some by satellite, and some by high frequency radio.

The international regulatory concerns of the day involved such things as AT&T’s preferred use of undersea cables in which it had an ownership interest rather than communications satellites in which it did not; the consequences of the Congressional decision to appoint the Communications Satellite Corporation as the chosen instrument for our participation in International satellite communications; and disputes between Western Union and the International Record Carriers, who were the international suppliers of what we now would now call ultra slow speed data service.

Although Joel died too young, he lived long enough—and he contributed to—a great transformation in international telecommunications. Today there are almost no true monopolies in telecommunications—thanks to changes in public policy around the world and to wireless technology. There are approximately eight billion connections—an astounding increase that has contributed immeasurably to the well being of the world’s population. New institutions of great significance—ICANN, IETF, the Internet Society, and the World Wide Web Consortium, among others—have come into existence. And, most remarkably, the increase in the amount of information accessible almost instantaneously to anyone with an Internet connection anywhere in the world ranges well beyond anything anyone could have imagined when Joel began practicing international communications law.

Joel’s work as a government and private attorney contributed to all of these developments. It represents a very tangible accomplishment in which Joel’s family, friends, and professional colleagues can and should take pride.

These developments continue to produce changes so fundamental in economics, politics, culture, and social relationships that we cannot hope to understand them in any comprehensive way. As Hegel said, “The owl of Minerva flies only at dusk,” and we are much closer to sunrise than to sunset.

But we do know some things. One of them—a very important thing about which we can feel very secure—is that the Internet is a great enabler of human expression, association, and assembly; and another thing—about which we can feel equally confident—is that the Internet is a great enabler of increases in material well being. One of the most important responsibilities confronting us today is assuring that these Internet-related opportunities are not impaired. This is a responsibility not just to ourselves and our descendants, but to people like Joel whose life’s work helped to provide the opportunities.

At the State Department, one aspect of this responsibility involves Internet Freedom. This is what I propose to elaborate upon.

A great deal has been and continues to be written and debated about Internet Freedom. Most of it, understandably, involves the extent of the Internet’s intrinsic utility in addressing and solving the very acute geopolitical problems of the day. One prominent example: the disputes involving the significance of the Internet in the Middle Eastern and North African political upheavals of the last eighteen months. Or, closer to home, of the never ending effort to find the optimal balance between the rights and responsibilities of individuals and the broader society in the use of the Internet. An example: the extraordinarily contentious disputes about proposed approaches to the protection of intellectual property in cyberspace. The recent books of Evgeny Morozov and Rebecca MacKinnon, among many others, provide examples.

I will prescind from these important immediate and practical concerns. Instead, I will very briefly offer my thoughts on the fundamental case for Internet freedom. Or, to say it differently, on the proposition that—explicitly or implicitly—we hold out when we address governments on the subject of Internet Freedom.

That case, of course, is not entirely divorced from considerations of utility. But, as we shall see, the assertions associated with principle are more fully developed than the assertions associated with material advantage.

The interest of Secretary Clinton and of the State Department as an institution in Internet Freedom falls squarely within the traditional functions of diplomacy. Diplomacy is conventionally said to involve three things—security, prosperity, and values. Internet Freedom addresses values and prosperity in a direct way and, we believe, through them, security.

This suggests that Internet Freedom relies on two bases—rights, specifically human rights, and economics. Both of these foster security.

Secretary Clinton has addressed Internet Freedom on several occasions. Her remarks have been wide-ranging, but they begin with the premise that freedom of expression, of association, and of assembly are fundamental human rights. They are innate. Each human being is entitled to them by virtue of being human, not by virtue of a grant from a governing authority. These rights are reflected—again, not granted, but acknowledged—in the Universal Declaration of Human Rights.

Championed by Eleanor Roosevelt, the Universal Declaration of Human Rights was adopted by the United Nations General Assembly, with eight abstentions but without dissent, in 1948. Article 19 holds that:

Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.
The right “to seek, receive and impart information and ideas through any media and regardless of frontiers” is the embodiment of the rights-based case for Internet Freedom, articulated some two decades before the concepts that, reduced to practice, became the Internet.

The Uniform Declaration is just that, a declaration. While it enjoys great moral authority, it is not binding, in the sense of international law. But the International Covenant on Civil and Political Rights, derived from the Universal Declaration, is. Adopted by the General Assembly in 1966, but also signed and ratified by most nations, with some notable exceptions, it is a binding, multilateral treaty. Article 19.2 mirrors the Universal Declaration in holding that:

Everyone shall have the right to freedom of expression; this right shall include freedom to seek, receive and impart information and ideas of all kinds, regardless of frontiers, either orally or in print, in the form of art, or through any other media of his choice.

From a juridical perspective, then, there is a compelling case for Internet Freedom grounded in human rights. The problem, of course, is that it is not enough to persuade countries that have strong reasons to interfere with Internet Freedom.

This is why the economics case for Internet Freedom—the case appealing to more immediate self-interest—is very important. And, as I am about to describe, that case is not as well developed as the rights-based case.

The economic case for Internet Freedom is grounded on at least two propositions. The first is that interfering with the use of the Internet as a commercial channel inevitably will impose costs. We might think of this as the transactional case. This raises the question of whether it is possible to interfere with the Internet as a transmitter of political and related ideas while maintaining it at full, or at least acceptable, efficiency for economic purposes. The second proposition is more fundamental. It is based on the intuition that serious reductions in the free flow of ideas will harm a society’s ability to engage in innovation and thus ultimately will handicap economic growth. We might think of this as the cultural/psychological case in the sense the effects of censorship and repression on culture and behavior.

Secretary Clinton addressed both of these matters in her second Internet Freedom speech:
Walls that divide the internet, that block political content, or ban broad categories of expression, or allow certain forms of peaceful assembly but prohibit others, or intimidate people from expressing their ideas are far easier to erect than to maintain. Not just because people using human ingenuity find ways around them and through them but because there isn’t an economic internet and a social internet and a political internet: there’s just the internet. And maintaining barriers that attempt to change this reality entails a variety of costs—moral, political, and economic. Countries may be able to absorb these costs for a time, but we believe they are unsustainable in the long run. There are opportunity costs for trying to be open for business but closed for free expression—costs to a nation’s education system, its political stability, its social mobility, and its economic potential.

In both of these propositions, we are involved in an assessment of costs and benefits. If a government’s highest priority is regime preservation, it may be willing to pay any cost to secure it. History gives us too many examples of this, but we do not need to go beyond the present case of North Korea to appreciate both that the phenomenon exists and that the willingness to pay any cost is appalling in terms of its consequences.

Fortunately, we do not have many contemporaneous examples of countries that approach the regime stability-economic growth equation with the ferocity of North Korea, but we do have many that are making a bet that they can secure the Internet’s economic benefits without incurring unacceptable costs. They do this through censorship—in the modern way through technology and in the time-tested way through intimidation.
To dilate on the use of technology, the problems for governments attempting to rely on filtering and firewalls to keep out unwanted ideas involve both effectiveness and overbreadth. The more fully the screening of information, the more certain it is that the screens will catch too much. They will exclude information that would be valuable for commercial purposes, impair marketing and sales, and complicate supply chain cooperation. It is not hard to imagine why these kinds of problems are certain to arise. If a country is intent on keeping its citizens in ignorance about matters that might seem politically unsettling, it must constantly adjust what is acceptable and what is not. Given news cycles that have been compressed to minutes by the Internet, censorship requires literally constant judgments. And if the individuals responsible for censorship face greater sanctions for errors of omission than of commission, it is inevitable that economically valuable material will be excluded.

So this is the transactional case. What of the second proposition involving culture and psychology?

There is a strong and widely held belief that Internet Freedom produces economic benefits in fundamental ways, separate and apart from its transactional value. But at least as far as I am aware, this hasn’t yet been the object of extensive scholarship. What might confirm this intuition of deeper economic benefit?

This obviously is related to the far larger matter of the prerequisites for economic growth. As it happens, we have a reasonably clear sense of what they are. Sustained economic growth requires a stable level of security where citizens have protection from violence from both internal and external sources. So a state is necessary, but so are appropriate and effective institutions. The state must be what Professors Acemoglu and Robinson in their recent book Why Nations Failcall inclusive and non-extractive. Opportunities to amass wealth must be widely available rather than limited to a small, politically powerful segment of the population. And those with governing authority must not make excessive extractions of the society’s wealth. They must not be rent seekers, pursuing the accumulation of wealth for themselves, their families, and their retainers, a phenomenon that continues to be all too prevalent in our world.

The ideal, then, involves the creation of a legal and regulatory milieu that is conducive to investment. This prototypically consists of a stable, reliable rule of law that, among other things, assures that contractual commitments are honored. The ideal also involves an autonomous judiciary for purposes of arbitration of disputes and to oversee those matters that warrant the imposition of social controls.

We need these institutional arrangements for purposes of economic growth, but there remains the interesting possibility that Internet Freedom has a critical connection to innovation—a connection that involves respect for and encouragement of personal autonomy. At the risk of intruding on the prerogatives of the tenured, I would like to propose one approach to the question based on an historical analogy. This follows the suggestion of Thomas Spavins, a valued colleague who has been providing his expert advice on all things related to the Internet.

Economic historians have addressed the question of why over the last five centuries Western Europe has experienced a great increase in wealth. One of the most prominent academicians, Joel Mokyr of Northwestern University, has produced very important insights. Professor Mokyr identifies several relevant factors. One is especially intriguing for present purposes. It involves the freedom of individuals to pursue their ideas as they wished, free from the strictures of authority. To quote Professor Mokyr, it is:
the Enlightenment notion of freedom of expression. In our age, we think of technological change as natural and obvious; indeed, we consider its absence a source of concern. Not so in the past: inventors were seen as disrespectful, rebelling against the existing order, threatening the stability of the regime and the Church, and jeopardizing employment. In the eighteenth century, this notion slowly began to give way to tolerance, to the belief that those with odd notions should be allowed to subject them to a market test. … Words like “heretic” to describe innovators began to disappear.

This insight, it seems to me, provides an entirely plausible basis for the belief that Internet Freedom leads to innovation and economic growth. Or, stated differently, that the absence of Internet Freedom diminishes a society’s economic growth. In any event, scholars would perform a material service to all of us interested in information and communications technologies if they would take up the study of Internet Freedom, either in the manner of Professor Mokyr or otherwise.

There is one more thing to consider. The Enlightenment experience had another feature that is self-evidently relevant to the Age of the Internet and the freedom to spread of its benefits. To quote Professor Mokyr again:

To bring about the progress that they envisioned—to solve pragmatic problems of industry, agriculture, medicine, and navigation—European scientists realized that they needed to accumulate a solid body of knowledge and that this required, above all, reliable communications. They churned out encyclopedias, compendiums, dictionaries, and technical volumes—the search engines of their day—in which useful knowledge was organized, cataloged, classified, and made as available as possible. … The age of Enlightenment was also the age of the “Republic of Science,” a transnational, informal community in which European scientists relied on an epistolary network to read, critique, translate, and sometimes plagiarize one another’s ideas and work. Nationality mattered little, it seemed, compared with the shared goal of human progress.
“The shared goal of human progress” seems like an appropriate place to end my speculations.

There are, then, two pillars on which Internet Freedom rests. Internet Freedom is right and it is useful. In a better world, it would be sufficient that it is right. But until human nature and this world experience improvement, it matters that Internet Freedom is useful.

I don’t have any difficulty accepting Internet Freedom’s value in the generation of wealth. But for purposes of persuading the present and future leaders of Administrations that may be less sure of this, the attention of the academy to this matter would be entirely welcome.
Thank you.

Monday, March 26, 2012

U.S. AND JAPAN ISSUE JOINT STATEMENT ON THE INTERNET ECONOMY


The following excerpt is from the Department of State 
U.S.-Japan Policy Cooperation Dialogue on the Internet Economy Third Director General-Level Meeting
Media Note Office of the Spokesperson Washington, DC
March 23, 2012
Following is the text of a joint statement issued by the United States of America and Japan at the conclusion of the United States - Japan Policy Cooperation Dialogue on the Internet Economy.
Begin Text:
On March 22 and 23, 2012, the third Director General-level meeting of the U.S.-Japan Policy Cooperation Dialogue on the Internet Economy was held in Tokyo. Hajime Tonegawa, Director General of the Global ICT Strategy Bureau, Ministry of Internal Affairs and Communications (MIC), and officials representing MIC, the IT Policy Office, the National Information Security Center, the Consumer Affairs Agency, the Ministry of Foreign Affairs, and the Ministry of Economy, Trade and Industry participated in the dialogue from Japan. Ambassador Philip Verveer and officials representing the U.S. Department of State, the Federal Communications Commission, the U.S. Department of Commerce’s National Institute of Standards and Technology, and the U.S. Department of Homeland Security participated in the dialogue from the United States. In addition, representatives from both U.S. and Japanese industry participated in some of the discussions.

Recognizing that the Internet is transforming the global economy and improving the lives of people around the world, participants from both countries concurred that close cooperation and commitment to shared values is essential. During the dialogue, participants exchanged views on important topics in Internet and information and communications technology (ICT) policy, emphasizing the need for openness, innovation, and increased opportunities for U.S. and Japanese industry.
On March 22, industry representatives from both countries submitted a “U.S.-Japan Business Dialogue on the Internet Economy Joint Statement,” which addressed the need for:
(i) Coordination on Internet policy issues;
(ii) Promotion of cloud computing services;
(iii) Continued collaboration on cyber security;
(iv) Promotion of ICT in the public sector;
(v) Coordination on disaster response;
(vi) Internet Protocol version 6 (IPv6) deployment; and
(vii) Cooperation on research development, training, and promotion of digital literacy.
Taking account of the “U.S.-Japan Business Dialogue on the Internet Economy Joint Statement,” government participants from both countries emphasized the need to ensure the free flow of information in order to foster innovation and stimulate economic growth. Participants discussed the following topics:

(1) Internet Policy Issues
(a) Participants reaffirmed the importance of the principles mentioned in the joint press statement of the 2nd Director General-level meeting last year, including:
Preserving the open and interoperable nature of the global Internet, which underpins the global free flow of data; and
Protecting Internet freedom, which includes the freedoms of expression, association, and assembly online.
To advance these principles, participants recognized the importance of:
Coordination on Internet policy issues, including Internet governance, protecting personal information, and protecting children online;
Cooperation on Internet policy issues at international and multilateral fora; and
Encouraging other countries to develop trade principles consistent with the “U.S.-Japan trade principles for ICT services,” finalized in January 2012.
(b) Recognizing the concerns of users about the proper use of personal information by ICT service providers, participants shared the view that service providers should be accountable for protecting users’ personal information, regardless of national boundaries.
Taking note that the European Union (EU) has proposed a new privacy framework, participants emphasized the importance of the Asia-Pacific Economic Cooperation (APEC) Data Privacy Subgroup, which plans to pursue international engagement, including with the EU, to promote the interoperability of regional approaches to data protection.

(2) Development of a U.S.-Japan Cloud Computing Working Group
Participants concurred that they will develop a U.S.-Japan Cloud Computing Working Group at the Director level, which will convene around fall 2012 after identifying key policy issues based on views expressed by U.S. and Japanese industry.
Participants recognized that the adoption of cloud computing services will expand business opportunities and foster economic growth. In addition, participants concurred that cloud computing technology has specific advantages in times of disaster, providing a key infrastructure to help us respond to emergencies and restore our lives.

(3) Continued Cyber Security Cooperation for Commercial Networks
Participants acknowledged the importance of improving cyber security measures, and recognized that international cooperation is imperative to addressing the issue, since cyber incidents cross our borders. Participants concurred that the U.S. and Japanese governments, private sector partners, and research institutions in the United States and Japan, should share information relating to cyber incidents and accelerate collaborative research and development in order to prevent and respond quickly to cyber incidents that may occur. In addition, participants acknowledged their commitment to greater bilateral and international cyber security collaboration.

(4) Promotion of ICT in the Public Sector
Participants recognized the importance of sharing best practices for the use of ICT – including the use of cloud computing technology – in the field of public administration, as well as public-private collaboration for open government.

(5) IPv6 Deployment
Participants recognized the importance of sharing the current status of IPv6 deployment and best practices in both countries, given that companies are beginning to deploy IPv6-based services and products. Participants concurred that they should continue to share best practices and status updates on IPv6 deployment.

(6) Cooperation on Research Development and Training
Participants concurred that they will continue to conduct joint research and development, and exchange personnel, in order to promote the research and development of the New Generation Network (NWGN) / Future Internet.

 (7) Protecting Children Online
Participants recognized the importance of protecting children online. In particular, participants concurred that public-private initiatives, voluntary industry-led efforts, and consumer and business education, are all important complements to law enforcement. Working together, these elements represent the best approach to providing a safe Internet environment for young people. Participants also concurred that further coordination would be beneficial.

(8) Mobile Broadband and Spectrum Auctions
Participants provided an update of their policies on frequency allocation for mobile broadband services and spectrum auctions, and acknowledged the importance of further information sharing.




Search This Blog

Translate

White House.gov Press Office Feed