Find us on
Cybersecurity and CyberWar: What Everyone Needs to Know
National Security Implications of "Big Data" Surveillance
Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
"Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata
Keynote: Securing IT in Healthcare: Part III
ISTS Information Pamphlet
The news this last year alleging large-scale government surveillance of "big metadata" of ordinary citizens raises issues at the forefront of security, technology, and society. ISTS is pleased to welcome four leading thinkers here, speaking on various perspectives for the speaker series "Surveillance in the Age of Big Data".
April 2 - Edward Felten, Princeton University
May 7 - Daniel Weitzner, MIT
May 14 - John DeLong, National Security Agency
May 28 - Radu Sion, Stony Brook University and Private Machines, Inc.
For an overview of the series see the Dartmouth Now article NSA Surveillance Program Prompts Spring Speaker Series.
"Dartmouth's Sergey Bratus is on a mission to protect the Internet from cyber attacks and other criminal enterprises. It's a big job." Thus begins the recent article from Dartmouth Now about Dr. Sergey Bratus, Research Assistant Professor in the Department of Computer Science. Click on the title to read the full article: Dartmouth Researcher Tackles Ubiquitous Internet Insecurity.
ISTS and the Neukom Institute offer leave-term funding each term to support an undergraduate, or graduate student, in pursuing an unpaid internship with a non-profit.
|Ajay Kannan '15|
Ajay Kannan '15 is a Computer Science, Math, and Economics major from Maryland who is interested in technology's use pertaining to global health. This winter, he will be interning at the Little Devices Lab at MIT, which focuses on affordable health, medical technology, and DIY innovation. The Little Devices Lab works with communities all over the world to design medical technology that can be built out of local materials. During his time there, he will be helping to design and implement one of the current technological initiatives of the lab.
|Henry Joyce '17|
Henry Joyce '17 will be interning with agricultural economist Dr. Luis Crouch through the International Development Group (IDG), part of the non-profit RTI, International, based in Washington, DC. He will assist in the development of a model of the world agro-economy in order to allow "what if" analyses regarding the impact of agricultural policies on production, income distribution, prices, nutrition status, and trade. The final part of the project will entail travel to the Dominican Republic to work with el Centro para el Desarrolllo Agropecuario y Forestal (CEDAF). CEDAF is a private non-profit organization that promotes sustainable development of the Dominican Republic's agricultural and forestry sectors. The goal of the travel is to establish the reach and limitations of the model by "fitting" it to a particular country.
|Professor Smith with a cantenna
Photo by Eli Burakian '00
With the start of the fall term at Dartmouth, directorship of the Institute for Security, Technology, and Society transitioned from Denise Anthony, Associate Professor of Sociology, to Sean Smith, Professor of Computer Science.
A computer scientist with extensive expertise in information security, Professor Smith came to Dartmouth in 2000 from IBM. "An integral part of ISTS since its inception, Professor Smith's research spans a wide variety of subjects, from protection of the power grid to healthcare IT security to the psychology of misperception and how it relates to IT security. His efforts always have been at the leading edge of security research. I am extremely pleased that Professor Smith has accepted the directorship of ISTS," said Dartmouth Provost Martin Wybourne.
Photo by Eli Burakian '00
Former ISTS Director and current PI of the Trustworthy Health and Wellness (THaW) project, David Kotz, has been appointed to the Government Accountability Office's Health IT Policy Committee. Comptroller General of the GAO, Gene Dodaro announced the appointment and noted that Professor Kotz will fill the privacy and security expertise role on the committee. In the GAO press release Dodaro stated, "In developing policy for health information technology, it's important to take into account expertise related to privacy and security and to health care research as well as the views of health care workers who are the users of HIT."
In September 2013, a joint team comprised of ISTS affiliates and Clemson University researchers were awarded $1.5M over three years to further their research on mobile health technology. Awarded by the National Science Foundation's Computer Systems Research program, the Dartmouth portion of the project, called "Amulet", is led by Former ISTS Director and Champion International Professor of Computer Science David Kotz. Clemson's team is led by former ISTS postdoctoral fellow Jacob Sorber.
As described on their website, the Amulet project team "envisions a simple wristband that you can wear anywhere, any time, in any activity, which helps you monitor and manage your health. Unlike popular fitness trackers, this wristband talks to your other health and fitness devices, so they know it's you using them – and gives you a quick and easy way to approve the transfer of health information from one device to another or to your health record. It can help track your use of medications and remind you when it's time for the next dose. And, the wristband can provide critical health data to responders if you experience a medical emergency. It works with health-related apps on your smartphone or even on your smart television – but only when you and your Amulet are present and give permission."
Read more on the Amulet website.
Trustworthy Health and Wellness (THaW). This NSF-funded, Frontier-level project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud-based services. THaW is developing methods to authenticate clinical staff to tablet computers in a continuous and unobtrusive way, and to provide patients a usable way to control the information that mobile sensors collect about them.
Trustworthy Cyber Infrastructure for the Power Grid (TCIPG). As noted on the TCIPG website, "Researchers from the University of Illinois at Urbana-Champaign, Dartmouth College, Cornell University, the University of California at Davis, and Washington State University are together addressing the challenge of how to protect the nation's power grid by significantly improving the way the power grid infrastructure is built, making it more secure, reliable, and safe." This project is funded by the Department of Energy.
|Professor Locasto works with SISMAT students
Photo by Nick Gannon '15
Secure Information Systems Mentoring and Training (SISMAT). ISTS ran the SISMAT program for the sixth time this summer. The program aims to meet regional and national needs through a program of mentoring and training in cybersecurity.
ISTS - Neukom Internship Grants. ISTS and the Neukom Institute collaborate to offer leave-term funding each term to support an undergraduate, or graduate student, in pursuing an unpaid internship with a non-profit.
A video released by Dartmouth provides an overview of the cutting edge research and education and outreach efforts at the Institute for Security, Technology, and Society (ISTS). These efforts are designed to address the most critical issues affecting information security and privacy and the societal impact of information and communication technologies (ICTs) in an increasingly networked world.
View the slideshow at Flickr
Last Updated: 3/26/14