Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
cyber
Report
Combating Ransomware: A Comprehensive Framework for Action
The Ransomware Task Force convened over 60 experts from industry, government, law enforcement, civil society, and international organizations to produce a comprehensive framework for action, with 48 actionable recommendations.
cyber
,
cybersecurity
,
defend
,
deter
,
protect
,
Ransomware
,
respond
April 21, 2021
Blog
The Implications of Post-COVID Tech Trends on National Security
The tech sector needs to consider national security issues when designing their products and making business-level or internal policy decisions. At the same time, the government needs to more intimately understand the business dynamics that drive corporate and product decisions.
COVID
,
cyber
,
Institute for Security and Technology
,
natsec
August 21, 2020
Podcast
Is the Enemy in the System?
Philip Reiner and Peter Hayes sit down with Dr. Jon Lindsay, who makes the case that the cybersecurity of nuclear command, control, and communications is a pressing concern.
cyber
,
cybersecurity
,
NC3
,
nuclear command
,
nuclear war
,
offensive cyber
,
risk
June 20, 2019
Report
Cyber Operations and Nuclear Weapons
In Cyber Operations and Nuclear Weapons, Jon Lindsay argues that "offensive cyber operations targeting NC3 introduce a number of under-appreciated risks of organizational breakdown, decision making confusion, and rational miscalculation in a nuclear crisis.”
accidental launch
,
arms control
,
attack vector
,
complexity
,
computer
,
control
,
counterattack
,
counterintelligence
,
countermeasure
,
crisis
,
crytographic
,
cyber
,
digital
,
electronic warfare
,
escalation
,
NC3
,
reconnaissance
,
redundant
,
retaliation
,
software
,
stability
,
Stuxnet
,
supercomputer
June 20, 2019
Report
Innovation and Adaptive Control in America’s Electric Infrastructure: Parallels to NC3
Providing unique insights into the performance of highly complex command and control systems from a radically different perspective, Mason Willrich describes how each of the major components of electricity infrastructure is interconnected and interactive with the others. How can this be illustrative for thinking about the challenges - and solutions - for nuclear command and control?
climate change
,
cyber
,
distribution
,
electric power
,
energy
,
hardware
,
infrastructure
,
interconnection
,
internet
,
nuclear
,
nuclear energy
,
power plant
,
regulation
,
sensor
,
sensors
,
software
,
stability
,
transmission
,
transportation
October 3, 2019
Report
For Better or for Worse: The Future of C3I Entanglement
James Acton evaluates the risk of inadvertent escalation arising from attacks on dual-use (nuclear and conventional warfare) command, control, communication, and intelligence (C3I) capabilities in a conventional war because such attacks would degrade the target’s nuclear command-and-control system.
anti-satellite
,
ballistic missile
,
boost-glide
,
C3I
,
capabilities
,
cyber
,
defense
,
dyad
,
early warning
,
geopolitical
,
high-precision munition
,
hypersonic
,
incidental attacks
,
intelligence
,
launch under attack
,
military
,
nuclear
,
orbits
,
radar
,
stability
,
strategic
,
war
,
warfighting
November 21, 2019
Previous
Page
1
Page
2
Page
3
Next
Search
Search
MENU
HOME PAGE
About CATALINK
CATALINK Frequently Asked Questions
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe