Virtual Library

Our virtual library is an online repository of all of the reports, papers, and briefings that IST has produced, as well as works that have influenced our thinking.

Submit your Content

Op-ed

ROOST Reminds Us Why Open Source Tools Matter

view

Reports

Navigating AI Compliance, Part 2: Risk Mitigation Strategies for Safeguarding Against Future Failures

Mariami Tkeshelashvili and Tiffany Saade

viewpdf

Reports

Deterring the Abuse of U.S. IaaS Products: Recommendations for a Consortium Approach

Steve Kelly, Tiffany Saade

viewpdf

Podcasts

TechnologIST Talks: Looking Back and Looking Ahead: Deep Dive on the New Cybersecurity Executive Order

Carole House, Megan Stifel, and Steve Kelly

view

Podcasts

TechnologIST Talks: The Offense-Defense Balance

Philip Reiner and Heather Adkins

view

Reports

The Generative Identity Initiative: Exploring Generative AI’s Impact on Cognition, Society, and the Future

Gabrielle Tran, Eric Davis

viewpdf

Podcasts

TechnologIST Talks: A Transatlantic Perspective on Quantum Tech

Megan Stifel and Markus Pflitsch

view

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

What Do We Want From the Nuclear Command and Control System

Paul Davis

SUMMARY

In this essay, Paul Davis suggests that U.S. NC3 modernization “should place increased emphasis on assuring control, avoiding accidents, and avoiding ill-informed or unwise employment of nuclear weapons.”

The report conceptualizes desirable attributes of nuclear command, control, and communications. Much of what is ordinarily front and center in such discussions have been omitted within this report. In particular, Paul does not address the myriad of structural and technical issues associated with mod­ern­izing the system’s personnel, procedures, facilities, equipment, and communications. Instead, this report asks what core functionality should be demanded, and how those demands should differ from those of the Cold War. Doing so raises provocative issues of which readers, and practitioners, may disagree, but that point back to critical first-order questions that must be asked at the outset of reconstituting the aging NC3 architecture.

This paper is accompanied by a Fourth Leg podcast: Starting From The Beginning.

download pdf