Episodes
Edward Felten presents the first talk in the speaker series "Surveillance in the Age of Big Data", co-sponsored by ISTS and the Computer Science Colloquium. The National Security Agency is collecting data about a substantial fraction of all domestic phone calls. This talk will examine several technical tradeoffs surrounding the phone data program. How effective is such a program likely to be in identifying potential terrorists or clearing up false suspicion? How easily can enemies evade the...
Published 04/07/14
Extending Our Understanding of Human Behavior Through Continuous Sensing Wednesday, October 23, 2013 at 4:15pm Location: 006 Steele Deepak Ganesan Associate Professor, University of Massachusetts, Amherst Co-sponsored by ISTS and the Computer Science Colloquium Abstract Deepak Ganesan Our ability to continuously monitor activities, health, and lifestyles of individuals using sensors has reached unprecedented levels --- on-body sensors enable continuous sensing of our physiological signals,...
Published 10/23/13
Securing IT in Healthcare: Part III May 17, 2013 Panel 4: Challenges in Securing mHealth Infrastructure Panel Abstract When developing mobile health technology, who is the adversary? What are the most important concerns in developing mHealth technology that can be trusted by healthy individuals, patients, family members, clinical staff, employers, researchers, and payers? In this panel we heard from those who design and build mHealth technology as well as those with experience deploying...
Published 05/17/13
Securing IT in Healthcare: Part III May 17, 2013 Panel 2: Evolving Business Models in mHealth Panel Abstract How are device manufacturers, new service providers, and existing EHR players building business models for mHealth? What are the opportunities for home or long-term care, including remote service from hospitals (e.g., for chronic care or surgery recovery)? What is the role/opportunity for mainstream EHR players and how will data collected from a wide-range of mobile devices be...
Published 05/17/13
Securing IT in Healthcare: Part III May 17, 2013 Panel 1: Intersection of mHealth and Behavioral Health Panel Abstract This panel discussed the potential for mHealth in an evolving healthcare context in the U.S., with a particular focus on the role that mHealth approaches may have in healthcare delivery systems which integrate physical and behavioral healthcare. The panel also discussed models for deploying mHealth tools in healthcare systems to increase the quality and reach of...
Published 05/17/13
Securing IT in Healthcare: Part III May 17, 2013 Panel 3: Opportunities for mHealth in the Developing World Panel Abstract Mobile technology provides tremendous opportunities to make health and wellness more accessible to billions of people in developing countries. In this panel we heard from a mix of technology developers, health practitioners, and public-health officials who are pioneers in this space. We discussed technical and infrastructural challenges, sustainable business models,...
Published 05/17/13
Securing IT in Healthcare: Part III Wendy Nilsen, Ph.D. is a Health Scientist Administrator at the NIH Office of Behavioral and Social Sciences Research (OBSSR). Wendy's scientific focus is on the science of human behavior and behavior change, including: utilizing mobile technology to better understand and improve health, adherence, the mechanisms of behavior change and behavioral interventions in complex patients in primary care. More specifically, her efforts in mobile and wireless health...
Published 05/17/13
Securing IT in Healthcare: Part III KEYNOTE- May 16, 2013 Patricia Mechael Patty Mechael Dr. Patricia Mechael is the Executive Director of the mHealth Alliance, which is hosted by the United Nations Foundation. Patty has been actively involved in global health for 15 years with field experience in over 30 countries, primarily in Africa, the Middle East and Asia. She has worked with a broad range of institutions on research, program design and implementation, strategic planning and policy...
Published 05/16/13
This video provides an overview of the cutting edge research and the education and outreach the Institute for Security, Technology, and Society (ISTS) at Dartmouth College leads to address the most critical issues affecting information security and privacy and the societal impact of information and communication technologies (ICTs) in an increasingly networked world.
Published 04/24/13
C10M: Defending the Internet at scale. At talk given at Dartmouth College by Robert David Graham. March 4, 2013
Published 03/29/13
Given by Matthew Green, Johns Hopkins University
Published 02/19/13
As smart grid technologies are increasingly deployed there remains a concern that the unintended consequences of unconsidered event scenarios could result in a more brittle infrastructure. New single points of failure could be introduced that have far-reaching consequences. The best approach to mitigating such issues was discussed by Jeff Dagle of the Pacific Northwest National Laboratory on January 23, 2013 at Dartmouth. The talk was co-sponsored by ISTS and the Department of Computer...
Published 01/23/13
Sam Gustman, Chief Technology Officer of the USC Shoah Foundation Institute, spoke at Dartmouth on October 26, 2012. The Shoah Foundation is the custodian of the Visual History Archive, a collection of 51,696 audiovisual testimonies from Holocaust survivors and other witnesses. Mr. Gustman discussed the archive’s founding and resources, including how their systems and processes are now used by the USC Digital Repository to provide cloud services to collections from around the world. The talk...
Published 10/26/12
Christena Nippert-Eng, Professor and Chair of the Department of Sociology at Illinois Institute of Technology, visited Dartmouth September 26, 2012 to discuss issues regarding privacy that rose out the research for her book Islands of Privacy (2010, University of Chicago Press) and her current work on privacy socialization. The talk was co-sponsored by ISTS and the Sociology Department’s Reitman/DeGrange Memorial Lecture.
Published 09/26/12
Associate Professor of Computer Science at the University of Memphis, Santosh Kumar, spoke at Dartmouth May 23, 2012. Professor Kumar spoke about the development of Autosense, a comprehensive suite of wearable sensors designed to collect multiple physiological indices of stress and addictive behavior (e.g., ECG, Respiration, Alcohol, etc.) and Fieldstream, a software framework on the mobile phone that collects and reports on the physiological measurements from AutoSense sensors. The talk was...
Published 05/23/12
Ill-informed lawmakers and policymakers, rather than true experts, are addressing issues of cybersecurity and are focused on the wrong issues. This was the message presented April 26, 2012 by Gary McGraw, Chief Technology Officer of Cigital, Inc. and a leading authority on software security. The talk was co-sponsored by ISTS and the War and Peace Studies Program of the Dickey Center for International Understanding.
Published 04/26/12
A presentation by Travis Goodspeed given to Computer Science 258 Course (Advanced Operating Systems) at Dartmouth College on Feb 22, 2012.
Published 02/22/12
Jeffrey P. Bigham, Assistant Professor in the Department of Computer Science at the University of Rochester, gave a talk on November 15, 2011 that was co-sponsored by the CS Colloquium and ISTS. Dr. Bigham’s works spans Access Technology, Human Computation, and Intelligent User Interfaces. He discussed approaches to crowdsourcing that work in real-time to assist people with disabilities in their everyday lives.
Published 11/15/11
How can the US prevent a major cyber attack, and how should it respond to one? Are there policy models from other realms that we can draw upon to develop a strategy for cyber defense, cyber deterrence, or cyber offensives? And how important is cyber defense for national security in the 21st Century? These and other questions were considered by experts in cyber security and defense policy on October 20, 2011 as they discussed one of the major emerging security challenges of the new century....
Published 10/20/11
Sergey Bratus of Dartmouth and Edmond Rogers of the University of Illinois at Urbana-Champaign, both affiliated with the Trustworthy Cyber Infrastructure for the Power Grid (TCIPG, http://tcipg.org) project, spoke at TROOPERS 2011 (http://troopers.de), an IT Security conference held in Heidelberg, Germany on April 30, 2011. They described what a real-world large power company's SCADA/control network looks like, what it takes to fuzz-test real-world SCADA equipment, and why such testing is...
Published 04/30/11
Andrew Odlyzko from the School of Mathematics, University of Minnesota, gave a presentation April 13, 2011. His talk, co-sponsored by ISTS and the Department of Computer Science Colloquium, considered the role of economics, sociology, and psychology, as well as technology, in improving network security.
Published 04/13/11
Katholieke Universiteit Leuven’s Len Sassaman and independent researcher Meredith L. Patterson spoke at Dartmouth on February 17, 2011. They discussed the craft of finding weaknesses in computer programs and systems and how this is taught, including how classic case studies in software vulnerabilities can be reduced to familiar principles of the formal languages and computation theory and the implications of this reduction for the future of the current Internet protocols and the design of...
Published 02/17/11
James Oakley and Sergey Bratus of Dartmouth College spoke at Shmoocon 2011, the hacker/infosec conference in Washington, DC, on January 29, 2011. They discussed how the exception handling mechanism present in all recent GCC-compiled executables is based on the DWARF standard. It is ubiquitously used but not well understood, and contains a Turing-complete bytecode virtual machine. They showed how this bytecode can be changed to contain a Trojan payload with no native binary code.
Published 01/29/11
Ryan Speers and Ricky Melgares of the Dartmouth College Trust Lab presented at ShmooCon 2011, the annual East Coast hacker convention. They discussed which proposed wireless sensor network attacks actually work on ZigBee, and provided proof of concept implementations of theoretical attacks. They presented a tool that autonomously discovers and profiles networks in real time, gathering as much information over time about a network and its devices, their relationships, and traffic flows among...
Published 01/29/11