Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Analysis
Explore our research
Search
Filters
Analysis Type
Pillar / Project
Source
Topics
Author
Year
Report
DPRK’s NC3 System
Dr. Myeongguk Cheon describes what is known about North Korea’s NC3 system. Cheon concludes, “Regarding the DPRK’s NC3 system, however, many questions remain unanswered, even though it is clearly identified who has the final approval authority and what forces operates delivery systems for the employment of nuclear weapons.”
artillery
,
assembly
,
atomic bomb
,
authority
,
autocracy
,
delegation
,
delivery system
,
explosion
,
fiber-optic
,
military
,
NC3
,
New Year
,
North Korea
,
nuclear
,
South Korea
,
submarine
June 6, 2019
Report
An Examination of the US NC3 Industrial and Innovation Base
Colonel Elvert Gardner examines the U.S. industrial and innovation base, identifying key factors that may militate against innovation and against timely and efficient supply in the US industrial base.
Aquisition
,
cybersecurity
,
Department of Defense
,
DOD
,
human capital
,
industrial base
,
innovation
,
modernization
,
National Defense Authorization Act
,
national security
,
nuclear
,
stability
,
supply chain
,
United States
June 20, 2019
Report
Cyber Operations and Nuclear Weapons
In Cyber Operations and Nuclear Weapons, Jon Lindsay argues that "offensive cyber operations targeting NC3 introduce a number of under-appreciated risks of organizational breakdown, decision making confusion, and rational miscalculation in a nuclear crisis.”
accidental launch
,
arms control
,
attack vector
,
complexity
,
computer
,
control
,
counterattack
,
counterintelligence
,
countermeasure
,
crisis
,
crytographic
,
cyber
,
digital
,
electronic warfare
,
escalation
,
NC3
,
reconnaissance
,
redundant
,
retaliation
,
software
,
stability
,
Stuxnet
,
supercomputer
June 20, 2019
Report
Russia’s NC3 and Early Warning Systems
Leonid Ryabikhin argues that distrust, misunderstanding and concern prevail in US/NATO and Russia relations, increasing the risk of unintended or accidental conflict. He concludes, "The absence of contacts between the United States and Russian military and the failure to reach new agreements while existing agreements collapse worsens an already dangerous situation."
ballistic missile
,
biological
,
early warning
,
Ministry of Defence
,
modernization
,
NC3
,
nuclear
,
nuclear forces
,
radar
,
reduction
,
Russia
,
Soviet Union
,
stability
,
submarine
,
superpower
July 11, 2019
Report
Nuclear Command, Control, and Communications Systems of the People’s Republic of China
Fiona Cunningham describes the origins of China’s NC3 system and its primary role in supporting China’s land-based missile force. She outlines recent developments including mobility, “informatization” and automation of parts of the NC3 system, pending deployment of nuclear missile submarines, early warning systems, evolving organizational structure, and cultural factors that shape China’s NC3 system and its orientation towards negative versus positive control.
arms race
,
China
,
crisis instability
,
emergency
,
escalation
,
modernization
,
NC3
,
nuclear
,
red line
,
stability
July 18, 2019
Report
An Engineering Perspective on Avoiding Inadvertent Nuclear War
In "An Engineering Perspective on Avoiding Inadvertent Nuclear War," Nancy Leveson argues that using conservative techniques and avoiding unnecessarily complex software in critical functions in NC3 systems circumvented nuclear catastrophe in the past. She calls for a new approach that avoids gratuitous complexity; emphasizes less, not more technology; and improves NC3 systems.
AI
,
aircraft
,
aviation
,
complexity
,
human operator
,
inoperability
,
interconnection
,
interdependency
,
isolation
,
NC3
,
nuclear
,
software
,
spacecraft
,
Systems Theory
July 25, 2019
Previous
Page
1
…
Page
21
Page
22
Page
23
Page
24
Page
25
…
Page
29
Next
Report
Modulating Trust
Social trust – trust in other people and institutions – is critical to the DCDI problem set. But trust is not always beneficial. Although trust in technology can facilitate economic transactions, it can also diminish our capacity for skepticism. Consumers tend to prefer to use technologies that they trust, and sellers and developers of technology find more success when there is more trust in their systems. Yet trust placed too freely in technologies can also generate vulnerabilities for those same consumers–to identity theft, to addiction, to misinformation, and to fraud.
democracy
,
Geopolitics of Technology
,
cognition
,
attention
,
DCDI
,
misinformation
,
trust
,
fraud
,
social trust
Report
Exploiting Emotions
Digital systems exploit and manipulate emotions by design. Emotions prompt people to use digital tools, engage with content, products, and services, respond to advertisements, stay on or return to digital platforms, and even take action offline as a result of online experience. The design of the digital environment, especially its visual nature, also heightens user emotions, often creating an addictive cycle. Because emotions affect how we process, engage with, and often act upon information, they play a central role in the relationship between digital tools and democracy.
democracy
,
Geopolitics of Technology
,
cognition
,
attention
,
DCDI
,
memory
,
reasoning
,
social
,
addictive
,
networks
Report
Rewired: How digital technologies shape cognition and democracy
The Digital Cognition & Democracy Initiative is investigating how digital technologies affect human cognition, and what those effects mean for democracy. Rewired by Leah Walker examines different key themes that have emerged in our DCDI research and working meetings with coalition members. This series is meant to illustrate the depth of the digitally influenced cognition problem, and illuminate how we are thinking about these issues.
democracy
,
Geopolitics of Technology
,
cognition
,
attention
,
DCDI
,
memory
,
reasoning
,
trust
,
emotions
,
critical thinking
,
friction
,
information overload
In the News
,
Podcasts
Philip Reiner on Nuclear Command, Control, and Communications
Philip Reiner joined Gus Docker, host of the Future of Life Institute podcast, to talk about how nuclear command and control systems work, how they might fail, and what can be done to improve them.
NC3
,
Innovation and Catastrophic Risk
Search
Search
MENU
HOME PAGE
About
FAQ
Our Team
Insights
Events
Analysis
Podcasts
The CATALINK Brief
Why crisis communications?
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe