Duane Dunston
Duane Dunston
Affiliated with Computer & Digital Forensics, Computer Networking & Cybersecurity, Division of Information Technology & Science
About Duane Dunston

Duane Dunston has been in Information Security since 1997. He is also a mentor for the Vermont Cyberpatriots Program and a mentor for a cyberpatriot girl scouts troop in NY and a school in Oklahoma.

Duane has written over a dozen articles, several being published through linuxsecurity.com. He is currently researching the usability of cryptography and has created an application, h2H Messenger, that is designed to make public key infrastructure easy to use and to make enterprise use of the application more efficient. This application is currently being tested in an enterprise environment.

Duane has spoken for the Western North Carolina and Burlington, Vermont Foreign Policy Association Great Decisions series as a Guest Lecturer on Cybersecurity. He also been featured on WCAX for topics related to cybersecurity. His information security experience is from the education and government sector where he worked as an information systems security officer and computer forensics analyst for the National Oceanic and Atmospheric Administration.

He's written two novels about a computer hacker that helps law enforcement track down human traffickers, Twisted Greed and Point of Interception. Additionally, he donates 100% of the royalties from his novels to organization that support victims of human trafficking.

Duane is a volunteer security consultant with International Association of Human Traffickers and Investigators. He's working with Champlain students to develop technologies to facilitate the identification of trafficked victims.  Duane is currently  working on a cross-platform and mobile app to help identify victims of human trafficking.

Duane's interest are in risk management, security education, and using technology to promote social change. Outside of computers, he practices silversmithing and ham radio. His ham call sign is KC1BWV.

Professional Certification and Associations, and Areas of Expertise


Global Incident Analysis Center Certified Incident Handler (GCIH)


  • International Association of Human Trafficking Investigators
  • Association of Computing Machinery (ACM)
    • Special Interest Group Knowledge Discovery and Data Mining (SIGKDD)
    • Special Interest Group for Information Technology Education (SIGITE)

Areas of Expertise

  • Performing Risk Assessments
  • Security Control Auditing & Evaluation
  • Computer Incident Response
  • Secure coding
  • Intrusion Detection System monitoring and deployment
  • Designing secure computer systems and networks


  • 20th Century Lodge #682, Master Mason—Current
  • Library of Congress, Volunteer—5/2010 - 11/2010
  • Terpsicorps Theatre of Dance, Board/Treasurer—2006-2007

Recent Projects & Publications