Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Reports

Combatting Ransomware: A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force

viewpdf

Reports

Future Digital Threats to Democracy – Trends and Drivers

Vera Zakem, Alexa Wehsener, Nina M. Miller

viewpdf

Reports

Hotline Between Two Koreas: Status, Limitations and Future Tasks

Dr. Chung-in Moon and Boo Seung-Chan

viewpdfpodcast icon

Reports

Building Communications Norms Across Nuclear C2

Dr. Salma Shaheen

viewpdf

Reports

Nuclear Hotlines: Origins, Evolution, Applications

Steven E. Miller

viewpdfpodcast icon

Reports

Formals Methods for NC3 Systems

Adam Wick

viewpdfpodcast icon

Reports

Pay Attention

Alexa Wehsener

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT
Playing now

Virtual Event and Live Q&A with Mr. Nand Mulchandani, Acting Director of the U.S. Department of Defense Joint Artificial Intelligence Center

Nuclear Command, Control, and Communications: U.S. Country Profile

Jeffrey Larsen

SUMMARY

For the past 75 years, Jeffrey Larsen argues that the deterrence forces of the United States have relied on the credible threat of nuclear weapons use to prevent adversarial attacks. As part of his explanation, a vital piece of the U.S. deterrence mission is ensuring NC3 provides the links between nuclear forces and presidential authority under all conditions. U.S. NC3 systems today face multiple challenges after more than two decades of neglect of its nuclear forces and NC3 infrastructure.

In this essay, Jeffrey Larsen reviews the legacy NC3 system of the United States now in the midst of a sea-change. He concludes: “The need to ensure robust existing capabilities for the current system, plus the desire to create a new system that is more than a simple modernization of existing capabilities, in a world facing more diverse threats, all while harnessing the value-added of new technologies, means that the NC3 system twenty years hence may bear little resemblance to its current arrangement.”

download pdf