Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
nuclear security
Event
October 23, 2025 2:00 pm
Book Talk | The New Nuclear Age: At the Precipice of Armageddon
In a world with increasing nuclear dyads, can emerging technologies make us safer – or are we opening Pandora's Box? Join IST in Palo Alto, CA or virtually for a book talk with Ankit Panda.
AI
,
China
,
international security
,
NC3
,
nuclear
,
nuclear dyad
,
nuclear security
,
Russia
October 6, 2025
Report
Hotline Between Two Koreas: Status, Limitations and Future Tasks
In this paper, Moon Chung-in and Boo Seung-Chan provide historical context on the hotlines linking South and North Korea and point to the lessons that can be learned from the decades-long effort.
CATALINK
,
communication
,
communication link
,
crisis
,
crisis management
,
escalation
,
history
,
hotlines
,
Innovation and Catastrophic Risk
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear weapon states
,
nuclear weapons
,
nuclear-use
,
secure communications
December 17, 2020
Report
Building Communications Norms Across Nuclear C2
Dr. Salma Shaheen stresses the importance of establishing new norms, constructing new practices, and securing reliant communications between nuclear-armed states before a potential crisis. Shaheen reaffirms the need for a direct communication link between global leaders to facilitate quick and efficient communications between nuclear-armed states — a capability she cites as essential for escalation control and nuclear weapons reduction, with a direct impact on crisis aversion and thus global security.
CATALINK
,
communication
,
control
,
crisis
,
crisis management
,
escalation
,
history
,
hotlines
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear-use
,
secure communications
November 24, 2020
Report
Nuclear Hotlines: Origins, Evolution, Applications
Dr. Steven E. Miller gives an overview of experiences to-date with nuclear hotlines. He reviews the history of the US-Russia hotline, describes the ways that hotlines can be used or misused, and charts how the hotline concept has evolved and propagated to help states manage international crises. Hotlines are important, if imperfect, tools for avoiding nuclear conflict.
CATALINK
,
crisis
,
crisis management
,
de-escalation
,
escalation
,
history
,
hotlines
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear-use
,
secure communications
October 28, 2020
Report
Formal Methods for NC3 Systems
What if we told you there is a very concrete way of updating and securing the most complex NC3 systems? Adam Wick makes the case for future NC3 protocol descriptions "to include not only a broad description of the protocol and its goals, but also an executable specification of the protocol. He continues, "Given the sensitivity of these systems, we believe that the use of proof is critical."
communication
,
control
,
crisis management
,
formal methods
,
mathematics
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapons
,
nuclear-use
September 17, 2020
Search
Search