Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Reports

Combatting Ransomware: A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force

viewpdf

Reports

Future Digital Threats to Democracy – Trends and Drivers

Vera Zakem, Alexa Wehsener, Nina M. Miller

viewpdf

Reports

Hotline Between Two Koreas: Status, Limitations and Future Tasks

Dr. Chung-in Moon and Boo Seung-Chan

viewpdfpodcast icon

Reports

Building Communications Norms Across Nuclear C2

Dr. Salma Shaheen

viewpdf

Reports

Nuclear Hotlines: Origins, Evolution, Applications

Steven E. Miller

viewpdfpodcast icon

Reports

Formals Methods for NC3 Systems

Adam Wick

viewpdfpodcast icon

Reports

Pay Attention

Alexa Wehsener

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT
Playing now

Virtual Event and Live Q&A with Mr. Nand Mulchandani, Acting Director of the U.S. Department of Defense Joint Artificial Intelligence Center

NC3 Systems and Strategic Stability: A Global Overview

Insitute for Security and Technology, Nautilus Institute

SUMMARY

In a conventional conflict between the United States and China or Russia, each belligerent might attack the other’s command, control, communication, and intelligence (C3I) capabilities to gain a war-fighting advantage. However, because a number of C3I assets are dual-use, such attacks would degrade the target’s nuclear command-and-control system, creating serious risks of inadvertent escalation. Looking forward, at least four factors will influence the severity of the risks created by such entanglement.

First, geopolitical developments will have indirect effects, including altering (for better or worse) the likelihood of war, Second, improvements in nonnuclear weapons, such as the development of long-range hypersonic gliders, could increase the threat posed to nuclear C3I capabilities. Moreover, because early-warning assets involved in nuclear operations might be able to track or nuclear doctrines could change, including by increasing or reducing the role accorded to attacks on C3I assets. Finally, unilateral or cooperative risk-mitigation measures could be implemented. Unilateral measures are the most promising under current political circumstances and could be as simple as raising awareness of the risks associated with entanglement within defense and military establishments.

This paper has an accompanying Fourth Leg podcast: Grand Tactics and the Thin Skin of Civilization

download pdf