Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
vulnerability
Podcast
Episode 44: The Truth About OT Vulnerabilities
Bryson Bort sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, to pull back the curtain on OT threat research. With a background in electrical engineering, Adam’s first job in cybersecurity was at an IT help desk. He now leads a team dedicated to identifying, analyzing, and mitigating cyber threats targeting Operational Technology (OT) environments.
critical infrastructure
,
ICS
,
Operational Technology
,
OT
,
threat hunting
,
vulnerability
May 16, 2025
Podcast
Assume Vulnerability
In this episode of The Fourth Leg, Philip Reiner and Alexa Wehsener sit down with the High Priest of Coreboot, Ron Minnich. They dive into the substance of his paper, “Hardware that is Less Untrusted: Open Source Down to the Silicon” and discuss software, firmware, and hardware vulnerabilities and the value of open source code.
firmware
,
hardware
,
open source
,
silicon
,
software
,
vulnerability
June 8, 2020
Report
Communication Disruption Attacks on NC3
In an essay out of the workshop "Last Chance: Communicating at the Nuclear Brink," Paul Bracken argues, "in a nuclear world we should be careful about attacking enemy communications because doing so leads to greater risks of uncontrolled escalation. The worst possible situation is the one the United States is now in, that is, to not be clear in our own minds about what we are doing when it comes to disrupting communications.”
CATALINK
,
communication
,
communication attacks
,
electromagnetic pulse
,
electronic warfare
,
escalation
,
military
,
NC3
,
nuclear
,
red line
,
retaliation
,
strike
,
target
,
targeting
,
United States
,
vulnerability
May 28, 2020
Report
Security at Extreme Scales
In Security at Extreme Scales, Eric Grosse argues, "Much of the security progress over the past decade has been at large-scale, finding and patching vulnerabilities in widely used applications or defending networks of millions of machines containing high-value data. The lessons there may help military systems, but for the very highest security needs such as NC3, we ought to return to basics and harden small-scale systems. And we ought to do it as a joint effort, even between adversaries."
complexity
,
control
,
large-scale
,
NC3
,
nuclear
,
scale
,
stability
,
users
,
vulnerability
May 30, 2019
Report
Counter Nuclear Command, Control and Communications
This report by Carol Ann Jones seeks to introduce the nuclear command, control, and stability framework; collect open source NC3 system information on the eight declared nuclear nations to fill in the framework; describe counter NC3 activities; and introduce a few alternate NC3 approaches that may contribute to nuclear stability.
anti-satellite
,
bias
,
C3
,
command and control
,
communication
,
complexity
,
electromagnetic pulse
,
launch authority
,
modernization
,
NC3
,
Nuclear Posture Review
,
special operation
,
stability
,
strike
,
supply chain
,
threshold
,
vulnerability
,
warhead
,
warning
November 7, 2019
Report
NC3 Insider Threats
Ron Schouten examines fundamental concepts of insider threats and provides an overview of the extent and significance of insider threats in US and other NC3 systems.
Bystander Effect
,
capability
,
chemical
,
civilian
,
classified materials
,
critical infrastructure
,
deterrence
,
espionage
,
IAEA
,
information systems
,
insider threat
,
NC3
,
nuclear
,
organizational culture
,
stability
,
threat
,
vulnerability
November 14, 2019
Search
Search
MENU
HOME PAGE
About CATALINK
CATALINK Frequently Asked Questions
The CATALINK Brief
Insights
Events
Analysis
Podcasts
Why crisis communications?
Our Team
GET IN TOUCH
Email:
[email protected]
Send us a message:
Contact
JOIN THE CATALINK MAILING LIST
First Name
Last Name
Organization
Email
Subscribe