Skip to main content



Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

 ISTS logo

Securing the e-Campus 2017 - Exact time and dates TBD

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan




Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George


Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

RIOTS logo 

Professor Sean Smith, Director of the ISTS and Bill Nisen, Associate Director, spoke at the

School House residential cluster on the Internet of Risky Things  - February 21, 2017, 5:30 PM

Craig Smith




You Don't Own Your Car
Craig Smith
Tuesday May 10, 2016 
Carson L02 @4:15

David Safford


Hardware Based Security for GE's Industrial Control Systems
David Safford
GE Global Research
Tuesday May 17, 2016
Carson L02 @4:15



"It's Fine," They Said. "Just Ship It," They Said.
Dan Tentler
The Phobos Group
Tuesday April 12, 2016 
Carson L02 @4:15

Harold Thimbleby




The Best Way to Improve Healthcare is to Improve Computers
Harold Thimbleby
Swansea University
April 23, 2015

Craig Shue




Managing User-Level Compromises in Enterprise Network
Craig Shue
Worcester Polytechnic Institute
March 31, 2015



Oct news 2015


ISTS Information Pamphlet



Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
HomeEvents >

Cyber Operations and National Security: A Panel Discussion

Thursday, October 20th
Co-sponsored with the War and Peace Studies Program of the Dickey Center for International Understanding 


cyberops panelOperation Shady RAT. Stuxnet. Conficker. International and National Strategies for Cybersecurity. Cyber Czars and Cyber Commands. Digital Pearl Harbors and Cyber Maginot Lines.

How can the US prevent a major cyber attack, and how should it respond to one? Are there policy models from other realms that we can draw upon to develop a strategy for cyber defense, cyber deterrence, or cyber offensives? And how important is cyber defense for national security in the 21st Century? Is cyber war likely to be a means of decisive conflict in the coming decades, or simply one of the many tools of influence and statecraft in international politics? When historians write about conflict in the 21st Century, will cyber operations be a headline or a footnote?

Join us to listen to experts in cyber security and defense policy as they discuss one of the major emerging security challenges of the new century.



Martin Libicki has been a senior management scientist at RAND since 1998, focusing on the impacts of information technology on national and domestic security. Most recently, he authored Cyberdeterrence and Cyberwar, and co-authored What Should be Classified?  Other work was on the subjects of international demographics, multi-factor authentication, organizing the Air Force for cyberwar, exploiting cell phones in counter-insurgency, how insurgencies end, DARPA's Terrorism Information Awareness program, and the FBI's information security program. Prior employment includes 12 years at the National Defense University, three years on the Navy Staff as program sponsor for industrial preparedness, and three years as a policy analyst for the GAO.


Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. These studies include a 1996 study on national cryptography policy (Cryptography's Role in Securing the Information Society), a 1999 study of Defense Department systems for command, control, communications, computing, and intelligence (Realizing the Potential of C4I: Fundamental Challenges), a 2007 study on cybersecurity research (Toward a Safer and More Secure Cyberspace), a 2009 study on offensive information warfare (Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities), and a 2010 study on cyber deterrence (Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy).  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

lindsayJon Lindsay hails from San Diego, where he is a postdoctoral scholar at the University of California Institute on Global Conflict and Cooperation. He holds a Ph.D. in political science (security studies) from the Massachusetts Institute of Technology and an M.S. in computer science from Stanford University. His research examines the effects of emerging information technology on bureaucratic behavior and military power, the strategic use of cyberspace, and the conduct of irregular warfare. He has served as a U.S. naval intelligence officer with air targeting and special operations units in Europe, Latin America, and Iraq.


pressDaryl G. Press is Associate Professor in the Department of Government, Dartmouth College. He received a Ph.D. in Political Science from the Massachusetts Institute of Technology, and a B.A. from the University of Chicago.

Professor Press is the author of Calculating Credibility: How Leaders Assess Military Threats, a book on decision-making during crises (Cornell University Press, 2005). He has published scholarly articles in International Security, Security Studies, and China Security, as well as articles for a wider audience in Foreign Affairs, the Atlantic Monthly, and the New York Times. Professor Press has worked as a consultant for the RAND Corporation and the U.S. Department of Defense, and is a research affiliate at the Security Studies Program at MIT. He also serves as an Associate Editor at the Journal International Security. Professor Press is currently writing a book (with Keir Lieber, Georgetown University) on nuclear deterrence - during the Cold War and the future - as well as a series of articles (with Eugene Gholz, UT Austin) on energy and security. 

Video and Slides from the Panel Discussion

Herb Lin's Slides

Last Updated: 7/29/13