Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
crisis
Report
Hotline Between Two Koreas: Status, Limitations and Future Tasks
In this paper, Moon Chung-in and Boo Seung-Chan provide historical context on the hotlines linking South and North Korea and point to the lessons that can be learned from the decades-long effort.
CATALINK
,
communication
,
communication link
,
crisis
,
crisis management
,
escalation
,
history
,
hotlines
,
Innovation and Catastrophic Risk
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear weapon states
,
nuclear weapons
,
nuclear-use
,
secure communications
December 17, 2020
Report
Building Communications Norms Across Nuclear C2
Dr. Salma Shaheen stresses the importance of establishing new norms, constructing new practices, and securing reliant communications between nuclear-armed states before a potential crisis. Shaheen reaffirms the need for a direct communication link between global leaders to facilitate quick and efficient communications between nuclear-armed states — a capability she cites as essential for escalation control and nuclear weapons reduction, with a direct impact on crisis aversion and thus global security.
CATALINK
,
communication
,
control
,
crisis
,
crisis management
,
escalation
,
history
,
hotlines
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear-use
,
secure communications
November 24, 2020
Report
Nuclear Hotlines: Origins, Evolution, Applications
Dr. Steven E. Miller gives an overview of experiences to-date with nuclear hotlines. He reviews the history of the US-Russia hotline, describes the ways that hotlines can be used or misused, and charts how the hotline concept has evolved and propagated to help states manage international crises. Hotlines are important, if imperfect, tools for avoiding nuclear conflict.
CATALINK
,
crisis
,
crisis management
,
de-escalation
,
escalation
,
history
,
hotlines
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear-use
,
secure communications
October 28, 2020
Report
Cyber Operations and Nuclear Weapons
In Cyber Operations and Nuclear Weapons, Jon Lindsay argues that "offensive cyber operations targeting NC3 introduce a number of under-appreciated risks of organizational breakdown, decision making confusion, and rational miscalculation in a nuclear crisis.”
accidental launch
,
arms control
,
attack vector
,
complexity
,
computer
,
control
,
counterattack
,
counterintelligence
,
countermeasure
,
crisis
,
crytographic
,
cyber
,
digital
,
electronic warfare
,
escalation
,
NC3
,
reconnaissance
,
redundant
,
retaliation
,
software
,
stability
,
Stuxnet
,
supercomputer
June 20, 2019
Search
Search
MENU
HOME PAGE
About
FAQ
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe