Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Analysis
Explore our research
Search
Filters
Analysis Type
Pillar / Project
Source
Topics
Author
Year
Report
Building Communications Norms Across Nuclear C2
Dr. Salma Shaheen stresses the importance of establishing new norms, constructing new practices, and securing reliant communications between nuclear-armed states before a potential crisis. Shaheen reaffirms the need for a direct communication link between global leaders to facilitate quick and efficient communications between nuclear-armed states — a capability she cites as essential for escalation control and nuclear weapons reduction, with a direct impact on crisis aversion and thus global security.
CATALINK
,
communication
,
control
,
crisis
,
crisis management
,
escalation
,
history
,
hotlines
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear-use
,
secure communications
November 24, 2020
Report
Nuclear Hotlines: Origins, Evolution, Applications
Dr. Steven E. Miller gives an overview of experiences to-date with nuclear hotlines. He reviews the history of the US-Russia hotline, describes the ways that hotlines can be used or misused, and charts how the hotline concept has evolved and propagated to help states manage international crises. Hotlines are important, if imperfect, tools for avoiding nuclear conflict.
CATALINK
,
crisis
,
crisis management
,
de-escalation
,
escalation
,
history
,
hotlines
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear-use
,
secure communications
October 28, 2020
Report
Formal Methods for NC3 Systems
What if we told you there is a very concrete way of updating and securing the most complex NC3 systems? Adam Wick makes the case for future NC3 protocol descriptions "to include not only a broad description of the protocol and its goals, but also an executable specification of the protocol. He continues, "Given the sensitivity of these systems, we believe that the use of proof is critical."
communication
,
control
,
crisis management
,
formal methods
,
mathematics
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapons
,
nuclear-use
September 17, 2020
AAR
,
Report
Last Chance: Communicating at the Nuclear Brink
"Last Chance: Communicating at the Nuclear Brink" outlines a vision for a novel “hotline” system that would enable secure and verifiable communications between leaders during nuclear crises and other high-stakes scenarios.
CATALINK
,
complexity
,
crisis communications
,
hardware
,
hotline
,
nuclear
May 14, 2020
Op-ed
When machine learning comes to nuclear communication systems
In an op-ed for C4ISRNET, Philip Reiner, Alexa Wehsener and M. Nina Miller underline the importance of credible NC3 systems.
CATALINK
,
crisis communications
,
machine learning
,
NC3
,
nuclear
,
stability
April 30, 2020
Op-ed
The Real Value of Artificial Intelligence in Nuclear Command and Control
In an article in War on the Rocks, Philip Reiner and Alexa Wehsener make the case for a nuanced discussion about the integration of artificial intelligence in nuclear command, control, and communication systems.
artificial intelligence
,
machine learning
,
NC3
,
nuclear
,
stability
November 4, 2019
Previous
Page
1
…
Page
18
Page
19
Page
20
Page
21
Page
22
…
Page
29
Next
Fact Sheet
DOD Establishes the Office of Strategic Capital
On Thursday, December 1, Secretary of Defense Lloyd Austin established the Office of Strategic Capital (OSC), defining it as an “organization that will help build an enduring technological advantage by partnering with private capital providers.”
DOD
,
innovation ecosystem
,
Office of Strategic Capital
Report
To the Point of Failure: Identifying Failure Points for Crisis Communications Systems
Crisis communication systems can fail in a variety of ways. To shed light on the many different failures that degrade and undermine such systems, this report identifies four categories of pathways to failure: operational failures, adversarial failures, accidental failures and institutional failures. Each category is made up of specific types of failures, investigated in further detail in the following sections of this report.
NC3
,
nuclear risk reduction
,
nuclear crisis communications
,
points of failure
Report
Mapping the Ransomware Payment Ecosystem: A Comprehensive Visualization of the Process and Participants
Central to our ability to mitigate the threat of ransomware is the development of a common understanding of the actors, stakeholders, processes, and information, both required for and produced during the ransomware payment process. Yet, when we began this work, such a picture did not exist. We undertook this effort to fill that gap.
Ransomware
,
ransom payments
,
mapping
,
visualization
Report
Plan maestro de defensa contra los programas de secuestro
En respuesta a la acción 3.1.1 del Informe del Grupo de Trabajo sobre Programas de Secuestro, en la cual se exhorta a las organizaciones de ciberseguridad a establecer un marco claro y accionable para la mitigación, la respuesta y la recuperación ante programas de secuestro, el Grupo de Trabajo encargado de elaborar un plan de defensa contra los programas de secuestro formuló un plan maestro que abarca un subconjunto de salvaguardias esenciales de ciberhigiene seleccionadas de los controles críticos de seguridad del Centro para la Seguridad de Internet (CIS Controls®) v8.
Ransomware
,
Future of Digital Security
,
RTF
,
cyber attacks
,
Blueprint for Ransomware Defense
,
defense
Search
Search
CATALINK
Home
About
CATALINK BRIEF
FAQ
Our Team
Why do we need crisis communications?
Activities
Events
Insights
Podcasts
Press
Get In Touch