Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Past Talks

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan




Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George


Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA

About ISTS


In 2008, ISTS led the successful application to designate Dartmouth a Center of Academic Excellence in Information Assurance Research by the National Security Agency and Department of Homeland Security. The designation has now been extended for academic years 2014-2019.

NSA Logo TC DHS Logo

The Institute for Security, Technology, and Society (ISTS) at Dartmouth College is dedicated to pursuing research and education to advance information security and privacy throughout society.

ISTS engages in interdisciplinary research, education and outreach programs that focus on information technology (IT) and its role in society, particularly the impact of IT in security and privacy broadly conceived. ISTS nurtures leaders and scholars, educates students and the community, and collaborates with its partners to develop and deploy IT, and to better understand how IT relates to socio-economic forces, cultural values and political influences. ISTS research improves our ability to:

  • Design and deploy secure, usable computer systems and protect them from tampering, disruption and attack
  • Enable people and organizations to communicate and exchange information securely and privately across networked computing devices
  • Address social, economic and policy issues that arise in the development, deployment and regulation of such information technology

Goals of ISTS

  • RESEARCH, to extend knowledge and provide insight and innovation in the area of information security
  • EDUCATION, to increase the number of students and faculty involved in technology research, and to increase community awareness of privacy and security challenges and solutions related to IT
  • OUTREACH, through collaborations that deploy technology and encourage knowledge transfer for both public and private benefit

ISTS is a member of the Institute for Information Infrastructure Protection, which is a nationwide consortium of leading cyber security research and development organizations including universities, federally funded labs and non-profit organizations.

I3P logo

ISTS is proud to be a member of the Dartmouth Centers Forum, an alliance of Dartmouth's academic centers fostering campus-wide dialogue and cooperative programming.

DCF logo

ISTS At-a-Glance

  • Founded at Dartmouth in 2000.
  • ISTS funding has supported 64 Dartmouth faculty members (tenure-track and research faculty) across every school at Dartmouth, and 21 faculty at other institutions, as well as 35 postdoctoral fellows, 150 graduate students, 160 undergraduates, and more than 200 researchers.
  • Published over 500 papers, articles and reports, and two books; Trusted Computing Platforms: Design and Application and The Craft of System Security.
  • Created several new courses for the Dartmouth curriculum, and sponsored numerous workshops and invited speakers.
  • Assisted Dartmouth faculty and researchers in winning over $20M in additional competitive funding. 
  • Engaged muitiple corporations in research projects or collaborative discussions.
  • Built and operated HEBCA (the Higher-Ed Bridge Certificate Authority).
  • Developed the leading PKI research lab in academia.
  • Conducted a national-scale Livewire cyber-exercise, involving 200 participants from 20 private-sector organizations and 14 federal agencies and 15 state and local governments in a week-long simulation of a sustained cyber attack against critical infrastructure in the United States.
  • In 2008, designated a Center of Academic Excellence in Information Assurance Research by the NSA and Department of Homeland Security and redesignated as such in 2014.
  • Annually co-sponsors, with Dartmouth's Information Technology Services, the Securing the eCampus conference, focused on information security issues in higher education.
  • Develops and runs the Secure Information Systems Mentoring and Training (SISMAT) program, an intensive two-week summer training and mentoring program for undergraduates from universities that do not offer extensive computer security coursework.

Last Updated: 8/1/17