Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Op-ed

The Nuclear Risk Reduction Approach: A Useful Path Forward for Crisis Mitigation

Sylvia Mishra

view

Reports

Nuclear Crisis Communications: Mapping Risk Reduction Implementation Pathways

Sylvia Mishra

viewpdf

Reports

Towards a Stronger Ukrainian Media Ecosystem

Leah Walker, Alexa Wehsener, Natalia Antonova

viewpdf

Op-ed

Pentagon’s Office of Strategic Capital must win over Silicon Valley

Leah Walker and Alexa Wehsener

view

Fact Sheet

DOD Establishes the Office of Strategic Capital

Strategic Balancing Initiative

viewpdf

Video

Cyber Resilience and Insurance Innovation

Blueprint for Ransomware Defense Webinar Series | Monica Shokrai, Davis Hake, Prashant Pai, and John Banghart

view

Reports

To the Point of Failure: Identifying Failure Points for Crisis Communications Systems

Leah Walker, Alexa Wehsener

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Is the Enemy in the System?

Philip Reiner and Peter Hayes with Dr. Jon Lindsay

SUMMARY

Dr. Jon Lindsay argues that: “As NC3 increasingly uses digital technologies to enhance efficiency and reliability, the cybersecurity of NC3 becomes a pressing concern. Adversaries have incentives to penetrate NC3 for intelligence in peacetime and for counterforce in wartime. Given the broad diffusion of cyber capabilities, furthermore, most nuclear-weapon states also have some ability to do so, although the operational difficulties of gaining remote access to and covert control over NC3 cannot be overstated. Offensive cyber operations targeting NC3 introduce a number of under-appreciated risks of organizational breakdown, decision making confusion, and rational miscalculation in a nuclear crisis.”

The podcast is accompanied by Dr. Jon Lindsay’s paper “Cyber Operations and Nuclear Weapons.”


The Fourth Leg is a series of podcasts focused on one of the most complex systems in the world today – nuclear command and control – and its increasingly complicated future. Within this series we go straight to the experts, across multiple sectors, to discuss the modernization of nuclear command and control systems.

Along with colleagues from the Nautilus Institute and the Preventive Defense Project, IST recently hosted over 50 international experts at Stanford University to anticipate technical challenges that will arise from the modernization of complex nuclear command and control systems. We aim to spotlight some of the vulnerabilities within a modernized NC3 system while furthering the conversation with this series.

​Keep an eye on IST, as we will begin additional podcast series in the coming months focused on how to fix the internet, AI and global stability, and other critical tech and security issues- for now, we have so much more to talk about, so let’s get started.