Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Analysis
Explore our research
Search
Filters
Analysis Type
Pillar / Project
Source
Topics
Author
Year
Report
Pay Attention
In a joint CNAS and IST report, Alexa Wehsener analyzes the effect of digital technologies on the monetization of attention.
attention
,
cognition
,
democracy
,
digital cognition
August 19, 2020
Report
Divided Against Itself
In Divided Against Itself, an installment of the ongoing series from IST and the Center for a New American Security examining the elements and potential implications of digital threats to democracy over the next ten years, M. Nina Miller explores how new technologies can amplify divisions and erode trust in public institutions.
democracy
,
identity
,
ideology
,
polarization
July 8, 2020
Report
The AES Project: Any Lessons for NC3?
Thomas Berson details how lessons from the Advanced Encryption Standard Competition can aid the development of international NC3 components and even be mirrored in the creation of a CATALINK community.
advanced encryption standard
,
AES
,
Anagram
,
blockchain
,
CATALINK
,
cryptography
,
encryption
,
NC3
,
NIST
,
standards
June 23, 2020
Report
Hardware that is Less Untrusted: Open Source Down to the Silicon
In an essay out of the workshop "Last Chance: Communicating at the Nuclear Brink," Ron Minnich argues "We can not build on a foundation that is compromised at all levels. There is no visibility into the system's behavior. The existing model assumes perfect software: 'Trust, but don't verify." We need to start anew, from the gates, and work our way up.
CATALINK
,
central processing unit
,
chip
,
computing
,
CPU
,
firmware
,
hardware
,
IO chips
,
memory chip
,
motherboard
,
NC3
,
open-source
,
PC
,
personal computer
,
silicon
,
software
,
supply chain
,
UV
June 9, 2020
Report
Communication Disruption Attacks on NC3
In an essay out of the workshop "Last Chance: Communicating at the Nuclear Brink," Paul Bracken argues, "in a nuclear world we should be careful about attacking enemy communications because doing so leads to greater risks of uncontrolled escalation. The worst possible situation is the one the United States is now in, that is, to not be clear in our own minds about what we are doing when it comes to disrupting communications.”
CATALINK
,
communication
,
communication attacks
,
electromagnetic pulse
,
electronic warfare
,
escalation
,
military
,
NC3
,
nuclear
,
red line
,
retaliation
,
strike
,
target
,
targeting
,
United States
,
vulnerability
May 28, 2020
AAR
,
Report
NC3 Systems and Strategic Stability: A Global Overview
In a conventional conflict between the United States and China or Russia, each belligerent might attack the other's command, control, communication, and intelligence (C3I) capabilities to gain a war-fighting advantage. However, because a number of...
cold war
,
command
,
communication
,
control
,
emerging technologies
,
NC3
,
NPT
,
nuclear
,
PALS
,
permissive action link
,
stability
,
strategic
May 6, 2019
Previous
Page
1
…
Page
19
Page
20
Page
21
Page
22
Page
23
…
Page
29
Next
In the News
,
Op-ed
Democracy Gone Digital: The Election Season Online
In an op-ed for Tech Policy Press, Zoë Brammer and Philip Reiner sound the alarm based on our Digital Cognition and Democracy Initiative (DCDI) research. We need to help voters grapple with information overload and unnaturally immersive experience provoked by digital tools, they urge.
democracy
,
DCDI
,
digital cognition
,
election manipulation
Report
Cyber Incident Reporting Framework
The Framework lays out a set of model reporting formats the Cybersecurity and Infrastructure Security Agency (CISA) could use as the foundation for the cyber incident reporting.
cybersecurity
,
Ransomware
,
cyber
,
incident reporting
,
CIRCIA
Op-ed
Cyber incident reporting isn’t the problem — ignorance is
In an op-ed for The Hill, IST's Chief Strategy Officer Megan Stifel and Cyber Threat Alliance's President & CEO Michael Daniel make the case for reporting cyber incidents.
Ransomware
,
incident reporting
,
CISA
,
CIRCIA
Report
Digital Tools, Cognition, and Democracy: A Review of the Literature
This literature review supports a series examining the effects digital technologies have on the following cognitive processes: "Memory," "Attention," and "Reasoning." The broader report series includes three additional papers looking at some of the society-level cognitive and democratic impacts of technology, titled: "Modulating Trust," "Shortcutting Critical Thinking," and "Exploiting Emotions."
democracy
,
Geopolitics of Technology
,
cognition
,
attention
,
DCDI
,
memory
,
reasoning
,
emotions
,
social
Search
Search
MENU
HOME PAGE
About
FAQ
Our Team
Insights
Events
Analysis
Podcasts
The CATALINK Brief
Why crisis communications?
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe