Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Peter Hayes
Director, Nautilus Institute for Security and Sustainability
Content
Podcast
When and Why Cede Nuclear Authority
In this segment, Dr. Vipin Narang joins Philip Reiner and Peter Hayes to challenge the delegative/assertive binary, arguing that, while conceptually important, it has hamstrung our thinking of regional powers’ NC3 by forcing them into one bin or another when it is in fact a time-dependent spectrum: all states delegate—that is, cede the ability to use nuclear weapons, irrespective of the authority to do so—at some point.
assertive
,
delegative
,
hardware
,
NC3
,
NC3 architecture
,
nuclear command
,
nuclear control
,
regional powers
,
software
September 18, 2019
Podcast
United Kingdom: Nuclear Weapon, Command, Control, and Communications
In this episode, Rear Admiral John Gower joins Philip Reiner and Peter Hayes to discuss the UK nuclear weapon command, control, and communications architecture. He goes into detail on the multiple communication paths, frequencies, fall-back systems, and encryption needed to continuously enable the UK's Prime Minister to act on a nuclear launch decision.
crisis communications
,
encryption
,
NC3
,
nuclear launch
,
nuclear weapons
,
systems
,
United Kingdom
September 12, 2019
Podcast
China, Technology, and the Security Dilemma
In this episode, Elsa Kania joins Philip Reiner and Peter Hayes to assess how emerging technologies—including artificial intelligence, cloud computing, fifth-generation telecommunications, and quantum communications—may affect China’s NC3.
5G
,
artificial inteligence
,
China
,
cloud computing
,
complexity
,
NC3
,
quantum
September 5, 2019
Podcast
Questioning Unitary Command: Nuclear Launch Authority and the N-Person Problem
In this segment, Philip Reiner and Peter Hayes are joined by Dr. Alex Wellerstein, who sketches a framework for thinking about how concentrated nuclear use authority should be at the top.
NC3
,
nuclear command
,
nuclear control
,
nuclear use authority
,
nuclear war
,
nuclear weapons states
August 8, 2019
Podcast
Deterred by the Uncertainties
In this episode, guest Fiona Cunningham joins hosts Philip Reiner and Peter Hayes to describe the origins of China’s NC3 system and its primary role in supporting China’s land-based missile force.
China
,
early warning systems
,
missile
,
NC3
,
nuclear command
,
nuclear war
,
submarines
July 29, 2019
Podcast
The Curse of Flexibility
In this segment, Nancy Leveson joins Philip Reiner and Peter Hayes to make the case that using conservative techniques and avoiding unnecessarily complex software in critical functions in NC3 systems circumvented nuclear catastrophe in the past.
complexity
,
NC3
,
nuclear command
,
risk management
,
software
July 25, 2019
Podcast
Is the Enemy in the System?
Philip Reiner and Peter Hayes sit down with Dr. Jon Lindsay, who makes the case that the cybersecurity of nuclear command, control, and communications is a pressing concern.
cyber
,
cybersecurity
,
NC3
,
nuclear command
,
nuclear war
,
offensive cyber
,
risk
June 20, 2019
Podcast
The System Can’t Be Perfect
In this podcast, Philip Reiner and Peter Hayes sit down with Dr. John Harvey, who asserts that the US NC3 system "must seek vastly improved senior leader conferencing capabilities to support decisions that go beyond what some of us call the Cold War’s “multiple choice test”—that is, which major attack option to execute."
cold war
,
conferencing
,
crisis communications
,
NC3
,
nuclear communication
May 24, 2019
Podcast
Grand Tactics and the Thin Skin of Civilization
In the first episode of The Fourth Leg, Philip Reiner and Peter Hayes sit down with Dr. Paul Bracken for an overview of NC3 tactics and global stability.
C3I
,
entanglement
,
global stability
,
inadvertent escalation
,
NC3
,
nuclear command
,
nuclear war
May 13, 2019
Previous
Page
1
Page
2
Next
Search
Search
MENU
HOME PAGE
About CATALINK
CATALINK Frequently Asked Questions
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe