Skip to main content

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events  

Jenna Weins

Leveraging Data Across Time and Space to Build Predictive Models for Healthcare-Associated Infections
Jenna Wiens
The University of Michigan
Oct 31, 2014
1:45pm - 006 Steele 

cybersec awareness month

My Computer Ate My Data, Changed My Students' Grades and Stole My Money
OR
What all faculty need to know about securing their information
DCAL, 102 Baker Library
Nov 4, 2014 12-1:30pm
Registration required

 

 

 

Recent Talks  

Radu Sion

Computation Privacy and Regulatory Compliance Mechanisms for the Cloud
Radu Sion
Stony Brook University and Private Machines Inc.
May 28, 2013

mechael youtube

Keynote: Securing IT in Healthcare: Part III
Patty Mechael
mHealth Alliance
May 16, 2013

 

Newsletter 

ists newsletter fall 2013

 

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents >

Cyber Operations and National Security: A Panel Discussion

Thursday, October 20th
Co-sponsored with the War and Peace Studies Program of the Dickey Center for International Understanding 

Abstract

cyberops panelOperation Shady RAT. Stuxnet. Conficker. International and National Strategies for Cybersecurity. Cyber Czars and Cyber Commands. Digital Pearl Harbors and Cyber Maginot Lines.

How can the US prevent a major cyber attack, and how should it respond to one? Are there policy models from other realms that we can draw upon to develop a strategy for cyber defense, cyber deterrence, or cyber offensives? And how important is cyber defense for national security in the 21st Century? Is cyber war likely to be a means of decisive conflict in the coming decades, or simply one of the many tools of influence and statecraft in international politics? When historians write about conflict in the 21st Century, will cyber operations be a headline or a footnote?

Join us to listen to experts in cyber security and defense policy as they discuss one of the major emerging security challenges of the new century.

Panelists

libicki

Martin Libicki has been a senior management scientist at RAND since 1998, focusing on the impacts of information technology on national and domestic security. Most recently, he authored Cyberdeterrence and Cyberwar, and co-authored What Should be Classified?  Other work was on the subjects of international demographics, multi-factor authentication, organizing the Air Force for cyberwar, exploiting cell phones in counter-insurgency, how insurgencies end, DARPA's Terrorism Information Awareness program, and the FBI's information security program. Prior employment includes 12 years at the National Defense University, three years on the Navy Staff as program sponsor for industrial preparedness, and three years as a policy analyst for the GAO.

lin

Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. These studies include a 1996 study on national cryptography policy (Cryptography's Role in Securing the Information Society), a 1999 study of Defense Department systems for command, control, communications, computing, and intelligence (Realizing the Potential of C4I: Fundamental Challenges), a 2007 study on cybersecurity research (Toward a Safer and More Secure Cyberspace), a 2009 study on offensive information warfare (Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities), and a 2010 study on cyber deterrence (Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy).  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

lindsayJon Lindsay hails from San Diego, where he is a postdoctoral scholar at the University of California Institute on Global Conflict and Cooperation. He holds a Ph.D. in political science (security studies) from the Massachusetts Institute of Technology and an M.S. in computer science from Stanford University. His research examines the effects of emerging information technology on bureaucratic behavior and military power, the strategic use of cyberspace, and the conduct of irregular warfare. He has served as a U.S. naval intelligence officer with air targeting and special operations units in Europe, Latin America, and Iraq.

Moderator

pressDaryl G. Press is Associate Professor in the Department of Government, Dartmouth College. He received a Ph.D. in Political Science from the Massachusetts Institute of Technology, and a B.A. from the University of Chicago.

Professor Press is the author of Calculating Credibility: How Leaders Assess Military Threats, a book on decision-making during crises (Cornell University Press, 2005). He has published scholarly articles in International Security, Security Studies, and China Security, as well as articles for a wider audience in Foreign Affairs, the Atlantic Monthly, and the New York Times. Professor Press has worked as a consultant for the RAND Corporation and the U.S. Department of Defense, and is a research affiliate at the Security Studies Program at MIT. He also serves as an Associate Editor at the Journal International Security. Professor Press is currently writing a book (with Keir Lieber, Georgetown University) on nuclear deterrence - during the Cold War and the future - as well as a series of articles (with Eugene Gholz, UT Austin) on energy and security. 

Video and Slides from the Panel Discussion

Herb Lin's Slides

Last Updated: 7/29/13