Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Past Talks

Dr. Liz Bowman

Dr. Elizabeth Bowman
U.S. Army Research Laboratory
Artificial Intelligence, Machine Learning and Information: Army Social Computing Research
Tuesday, December 5th
Haldeman 041 Kreindler Conference Room
4:00 PM

Dr. Fabio Pierazzi

Dr. Fabio Pierazzi
Royal Holloway University of London
Network Security Analytics for Detection of Advanced Cyberattacks
Tuesday, November 28th
Sudikoff Trust Lab (L045)
12:30 PM

V.S. Subrahmanian

V.S. Subrahmanian
Dartmouth Distinguished Professor in Cybersecurity, Technology, and Society
Bots, Socks, and Vandals
Tuesday, November 14th
Carson L01
5:00 PM 

Rand Beers

Rand Beers ('64)
Big Data, the Internet, and Social Media:  The Road to the November 2016 Election
Wednesday, November 8th
Haldeman 41 (Kreindler Conference Hall)
4:30 PM 

Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
S
udikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

Sal Stolfo

Salvatore J. Stolfo 
Columbia University
A Brief History of Symbiote Defense
Tuesday, October 31st
Rockefeller 003
5:00 PM

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu
HomeEvents >

Cyber Operations and National Security: A Panel Discussion

Thursday, October 20th
Co-sponsored with the War and Peace Studies Program of the Dickey Center for International Understanding 

Abstract

cyberops panelOperation Shady RAT. Stuxnet. Conficker. International and National Strategies for Cybersecurity. Cyber Czars and Cyber Commands. Digital Pearl Harbors and Cyber Maginot Lines.

How can the US prevent a major cyber attack, and how should it respond to one? Are there policy models from other realms that we can draw upon to develop a strategy for cyber defense, cyber deterrence, or cyber offensives? And how important is cyber defense for national security in the 21st Century? Is cyber war likely to be a means of decisive conflict in the coming decades, or simply one of the many tools of influence and statecraft in international politics? When historians write about conflict in the 21st Century, will cyber operations be a headline or a footnote?

Join us to listen to experts in cyber security and defense policy as they discuss one of the major emerging security challenges of the new century.

Panelists

libicki

Martin Libicki has been a senior management scientist at RAND since 1998, focusing on the impacts of information technology on national and domestic security. Most recently, he authored Cyberdeterrence and Cyberwar, and co-authored What Should be Classified?  Other work was on the subjects of international demographics, multi-factor authentication, organizing the Air Force for cyberwar, exploiting cell phones in counter-insurgency, how insurgencies end, DARPA's Terrorism Information Awareness program, and the FBI's information security program. Prior employment includes 12 years at the National Defense University, three years on the Navy Staff as program sponsor for industrial preparedness, and three years as a policy analyst for the GAO.

lin

Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. These studies include a 1996 study on national cryptography policy (Cryptography's Role in Securing the Information Society), a 1999 study of Defense Department systems for command, control, communications, computing, and intelligence (Realizing the Potential of C4I: Fundamental Challenges), a 2007 study on cybersecurity research (Toward a Safer and More Secure Cyberspace), a 2009 study on offensive information warfare (Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities), and a 2010 study on cyber deterrence (Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy).  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

lindsayJon Lindsay hails from San Diego, where he is a postdoctoral scholar at the University of California Institute on Global Conflict and Cooperation. He holds a Ph.D. in political science (security studies) from the Massachusetts Institute of Technology and an M.S. in computer science from Stanford University. His research examines the effects of emerging information technology on bureaucratic behavior and military power, the strategic use of cyberspace, and the conduct of irregular warfare. He has served as a U.S. naval intelligence officer with air targeting and special operations units in Europe, Latin America, and Iraq.

Moderator

pressDaryl G. Press is Associate Professor in the Department of Government, Dartmouth College. He received a Ph.D. in Political Science from the Massachusetts Institute of Technology, and a B.A. from the University of Chicago.

Professor Press is the author of Calculating Credibility: How Leaders Assess Military Threats, a book on decision-making during crises (Cornell University Press, 2005). He has published scholarly articles in International Security, Security Studies, and China Security, as well as articles for a wider audience in Foreign Affairs, the Atlantic Monthly, and the New York Times. Professor Press has worked as a consultant for the RAND Corporation and the U.S. Department of Defense, and is a research affiliate at the Security Studies Program at MIT. He also serves as an Associate Editor at the Journal International Security. Professor Press is currently writing a book (with Keir Lieber, Georgetown University) on nuclear deterrence - during the Cold War and the future - as well as a series of articles (with Eugene Gholz, UT Austin) on energy and security. 

Video and Slides from the Panel Discussion

Herb Lin's Slides

Last Updated: 7/29/13