you're reading...
Politics, Congress, Investigation, Republicans, FBI, internet, health, Economy, Education, Wikipedia, local news, Press Release, Justice Department, Democrats, meta, Fraud, National News, Environment

PRESS RELEASE: Attorney General Loretta E. Lynch Delivers Remarks at RSA Conference on Cybersecurity

Attorney General Loretta E. Lynch Delivers Remarks at RSA Conference on Cybersecurity

San Francisco, CA United States ~ Tuesday, March 1, 2016
Remarks as prepared for delivery

Good afternoon, and thank you for that warm welcome. I want to thank the organizers of this conference for making this important gathering possible. It is a pleasure and a privilege to share this room with so many innovative professionals and knowledgeable security specialists. I am excited to have the opportunity to speak with you today. Twenty-five years ago – long before words like “smartphone” and “WiFi” became part of our everyday vocabulary – the RSA Conference was founded on the belief that technological innovation presents not only extraordinary opportunities, but also unprecedented challenges – and that overcoming those challenges would require bold thinking and close cooperation. In the quarter century since that inaugural meeting, the RSA Conference has played a key role in spurring groundbreaking conversations, catalyzing new ideas, and forging the lasting partnerships that ensure our capacity for developing technology is matched by our ability to protect it.

Of course, as long as humans have shared information with one another, other humans have sought to block, steal, and tamper with that data. But information – and the technology that stores and transports it – has never been more important to our society, and so the task of securing it has never been more urgent, or more challenging. Today, we rely on digital technology for functions as routine as watching movies and buying groceries, and as consequential as distributing electricity and directing our military – and in the years to come, our use of this technology will only grow and develop further. We are in the midst of an exciting and revolutionary transformation that is undoubtedly making our lives more convenient and our society more efficient. But it has also opened new avenues for a variety of wrongdoers, from thieves and hackers to terrorists, other violent extremists, and state-sponsored actors. These criminals rely on virtual methods to inflict material damage – and as several high-profile incidents have reminded us in recent years, online adversaries pose significant threats to our personal privacy, our economic property, and even our national security.

As the cabinet agency entrusted with the enforcement of America’s laws, the protection of the American people, and the defense of American ideals, the Department of Justice has a special responsibility to address these threats, and we’re working on a number of fronts to meet the law enforcement challenges of the 21st century. We have used a host of tools, including criminal prosecution, sanctions, designations, and diplomatic options. The FBI’s Cyber Division investigates and monitors digital intrusions and security risks around the clock, and each of its 56 field offices operates a Cyber Task Force to help bolster our resilience at the state and local levels. The bureau also leads the 19-agency National Cyber Investigative Joint Task Force, which President Obama established in 2009 to coordinate the government’s response to online dangers. Each of the 93 United States Attorneys – from every state and territory – prosecutes cyber crimes and interfaces with corporations and public assets on cybersecurity and preventing cyber intrusions. Our Criminal Division recently formed a cybersecurity unit staffed by experienced prosecutors knowledgeable in the law, policy, and practice of cybercrime prevention. The National Security Division has created the nation-wide NSCS Network, which consists of over 100 specially trained federal prosecutors in every jurisdiction, who combat online threats to our national security. And our Bureau of Alcohol, Tobacco, Firearms, and Explosives has created an Internet Investigations Center where federal agents and lawyers work to counter illegal online firearms trafficking.

These are just a few of the ways that we’re investigating and disrupting a wide range of cybercrimes and threats. But the Internet doesn’t stop at the water’s edge; it crosses borders and transcends boundaries, which is why we are committed to working closely with our partners overseas to promote global cybersecurity. One of our most invaluable allies in that effort is the European Cybercrime Center, or EC3 – the European Union’s central cybercrime coordinating body. In November 2014, we joined with EC3 to launch Operation Onymous, which shuttered a number of so-called “dark market websites” peddling drugs, weapons, stolen credit card data, fake passports, and computer-hacking tools. This past July, we joined with EC3 to shut down the Darkode hacking forum – an underground site where hackers bought, sold, and traded malicious software, botnets, intrusion tools, and stolen personal information. That operation, spearheaded by the U.S. Department of Justice and EC3, involved a coalition of 20 nations, and led to the charge, arrest, or search of 70 Darkode members and associates around the world. We continue to work with EC3 and other international organizations to root out dangerous hackers, data thieves, and other malicious actors who seek to breach secure spaces of the Internet for their own destructive purposes.

Beyond our focus on specific cases, we’re also working to adapt international criminal justice processes to function more efficiently and effectively in the digital age. Recently, for example, we have been working to find ways to streamline the way we and our allies can access electronic evidence across borders. When our allies investigate criminal activities abroad, they increasingly require access to electronic evidence from American companies that are providing internet communications services to their citizens and residents. Our companies may face conflicting legal obligations when those governments require them to disclose electronic information that U.S. law prevents them from disclosing. In addition to harming our allies’ efforts to investigate terrorism and other serious crimes, this puts our companies in a difficult position: either they comply with a foreign order, and risk a violation of American law – or they refuse to comply, and risk a violation of foreign law. We have given a great deal of thought to how we can alleviate these burdens, advance public safety, and protect privacy and civil liberties.

Today, I am pleased to report that we have begun negotiations with the United Kingdom to establish a new framework that would permit UK authorities to access electronic communications directly from American companies where the investigation targets accounts not used by Americans or people in the United States. To qualify, the UK government would have to agree to a number of provisions designed to protect privacy and fundamental rights, and a UK order would have to comply with UK law. This agreement would release American companies from conflicting legal obligations in clearly and carefully defined circumstances. It would help one of our oldest and closest allies perform high-priority criminal investigations that keep its citizens safe – and many of which, in our age of transnational crime and terrorism, also further American interests. It would provide reciprocal benefits for U.S. government requests to UK companies, which could help U.S. investigations in the years ahead. And, if it proves successful, it could be replicated with other countries, if – and only if – their laws adequately protect privacy and civil liberties, potentially encouraging other nations to improve their laws and enhance privacy protections in order to obtain the benefits of this arrangement.

This new framework would require action from Congress in order to take effect, and we will continue to engage with communications companies, civil society groups, and academics as we move forward. But based on our conversations and collaboration so far, I am hopeful that we can take an important step forward that benefits security, commerce, international cooperation, and privacy.

Of course, our partnerships are not limited to government agencies. In addition to standing alongside our global counterparts, we’re committed to working closely with the private sector – particularly tech leaders right here at home. Even over the last few years, we’ve used those partnerships to protect information systems and address cyber threats. From our groundbreaking Coreflood operation – in which we were able to free hundreds of thousands of computers from criminal control with the help of private experts and additional network security companies – to our takedown of the infamous financial botnet known as GameOver Zeus, we have consistently worked side-by-side with private-sector security experts like the people in this room to halt technologically sophisticated crimes and bring perpetrators to justice. We have also created new channels for information sharing and cooperation with the private sector to help us detect, deter, and disrupt cyber threats. Cases like the Sony intrusion, in which we publicly named – for the first time – the nation-state responsible for a destructive attack on an American company – demonstrate the power of reporting.

The Justice Department’s relationships in this area form an important part of our ability to do our best work. There is no doubt that America’s technology sector represents one of the greatest repositories of ingenuity and innovation in history, and those of us responsible for protecting the American people in a time of increasingly sophisticated threats would be remiss if we did not seek the assistance of experts like the ones gathered in this room. That’s why we’re reaching out and collaborating with you and your companies in a number of ways, including through the FBI’s InfraGard partnership; the National Cyber Investigative Joint Task Force’s regular consultations with the private sector; and my own frequent meetings with industry leaders to identify emerging threats, and, whenever possible, to devise productive solutions to pressing issues.

In fact, just last week, the Department of Justice hosted a group of experts from some of America’s foremost tech companies for a discussion about how we can work together to more effectively counter violent extremism. That conversation followed a number of other gatherings that examined ways to deny criminals and terrorists the safe harbors they seek in the recesses of the Internet and hidden corners of our networks. As you know, the Going Dark problem is a very real threat to law enforcement’s mission to protect public safety and ensure that criminals are caught and held accountable. We owe it to victims and to the public whose safety we must protect to ensure we have done everything under the law to fully investigate terrorist attacks and criminal activity on American soil.

That is a goal that I know we all share. I know that neither our technology companies nor their leaders have any sympathy for the terrorists or criminals who target Americans. And the Department of Justice will never sacrifice the safety of the American people or the ideals that we all cherish. As recent events have made clear, the stakes aren’t theoretical; they bear directly upon our public safety and our national security. That’s why conversations like this one are so important: they help us “connect to protect” American infrastructure, American networks, American values, and American lives. I want you to know how much I appreciate your support in that endeavor, and I look forward to continuing a frank dialogue and a fruitful partnership with this industry in the months ahead.

Of course, we won’t always find ourselves on the same side of every issue – after all, the challenges raised by modern technology are complex, and I have no illusions that they will soon become any simpler. As we venture further into the digital age, the questions we grapple with will only become more difficult, more intricate, and more intertwined. In order to surmount the obstacles we will surely encounter, we don’t necessarily have to be locked in perpetual and perfect agreement – but we do have to be engaged in open dialogue, so that we can draw upon each other’s resources, hear each other’s concerns, and learn from each other’s perspectives. That’s how we spur new ideas, forge better solutions, and find the way forward. That’s how we strengthen our defenses, prevent damaging crimes, and bring wrongdoers to justice. And that’s how we move closer to our shared goal of ensuring that as the American people reap the benefits of innovation, they continue to enjoy the full protection of the law.

That goal will remain one of my top priorities as long as I am Attorney General, and I will continue to rely on your vision, your commitment, and your cooperation in the months ahead. I am confident that together, we can achieve a future that is brighter, safer, and more prosperous for every American. Thank you.



Most of the information you will see comes from some Federal/state Government documents or Federal/State Governm Agency. -----------------------------------------------The fellow that can only see a week ahead is always the popular fellow, for he is looking with the crowd. But the one that can see years ahead, he has a telescope but he can't make anybody believe that he has it. ~~~~Will Rogers __The woman who follows the crowd will usually go no further than the crowd. The woman who walks alone is likely to find herself in places no one has ever been before.~ Albert Einstein ~"I never work better than when I am inspired by anger; for when I am angry, I can write, pray, and preach well, for then my whole temperament is quickened, my understandingsharpen​ed, and all mundane vexations and temptations depart.” ~Dr. Martin Luther King Jr. _________________________________________________________________________________________ ~"The bosom of America is open to receive not only the Opulent and respectable Stranger, but the oppressed and persecuted of all Nations and Religions; whom we shall welcome to a participation of all our rights and privileges, if by decency and propriety of conduct they appear to merit the enjoyment".~___________________________________ George Washington, Address to the Members of the Volunteer Association of Ireland, December 2, 1783 Fredericacade@gmail.com


No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)

Blog Stats #

  • 859,512 hits

Frederica Cade’s Archives

Recent Post

August 2016
« Jul   Sep »

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)

Politics, local News, National News, Foreign news, Congress, President, Government, Economics, Analysis, Art, Health,Investigation, FBI, Justice Department, Fraud, Press Releases, Health Care, News Releases, Law, and History Tags

2012 Elections Affordable Care Act Alabama Albuquerque ALEC Alexandria American Legislative Exchange Council AMERICAN LEGISLATIVE EXCHANGE COUNCIL (ALEC) Analysis Arizona Atlanta Attorney General Eric Holder California charter schools Chicago Congress Connecticut Democrats Deputy Attorney General James M. Cole Donald Trump Economics Economy Education Environ Environme Environmen Environment EPA FBI Federal Election Commission (FEC) Florida fraud FreedomWorks General Georgia Governor Nikki Haley Grover Norquist Hammond Health Health Care Heritage Foundation HHS Secretary Kathleen Sebelius Hillary Clinton History https://fredericacade.wordpress.com https://fredericacade.wordpress.com/wp-admin/edit.php?category_name=politics-congress-investigation-republicans-fbi-internet-health-economy-education-wikipedia-local-news-press-release-justice-departm Idaho Illinois Inc. Indiana Internet Investigation Iowa IRS jobs Jr. Justice Department Kansas Kara Pally Keystone XL Knoxville Koch Koch Brothers Koch Industries Laws local news Louisiana Maryland Massachusetts Matte Kibbe Memphis meta Miami Michigan Minnesota Mississippi Missouri Mitt Romney Montana Nashville National News Nebraska New Jersey New Mexico News New York Nikki Haley North Carolina Ohio Oklahoma Oregon outsourcing Paul Ryan Pennsylvania Philadelphia Politics President President Obama Press Release Public Schools Puerto Rico record Republicans Rhode Island South Carolina South Dakota Sr. Tennessee Texas Top Story TransCanada Vincent Sheheen Virginia Voting Rights Act Voting Rights Act of 1965 WASHINGTON Washington D.C. West Virginia Wikipedia Wisconsin

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)

Follow me on Twitter

Frederica Cade’s Blog (Politics, News, Analysis, Investigation, Press Releases, Education, Economics, Internet, News Releases, Featured stories, Fraud, and History, U.S. Laws, Posted stories, Index of reports, meta,Home page)