Virtual Library

Our virtual library is an online repository of all of the reports, papers, and briefings that IST has produced, as well as works that have influenced our thinking.

Submit your Content

Reports

Nuclear Command, Control, and Communications (NC3): A Primer on Strategic Warning, Decision Support, and Adaptive Targeting Subsystems 

Alice Saltini, Sylvia Mishra, Philip Reiner

viewpdf

Reports

Securing the Signal: Mitigation Strategies to Strengthen Crisis Communication Channels

Christian Steins

viewpdf

Reports

Strengthening Nuclear Crisis Communications: Steps to Implement Mesh Networks to Enhance Resilience & Security

Christian Steins

viewpdf

Reports

Enhancing Cyber Resilience through Insurance: Revisiting Anti-Bundling Regulation

Sophia Mauro and Taylor Grossman

viewpdf

Op-ed

ROOST Reminds Us Why Open Source Tools Matter

view

Reports

Navigating AI Compliance, Part 2: Risk Mitigation Strategies for Safeguarding Against Future Failures

Mariami Tkeshelashvili, Tiffany Saade

viewpdf

Reports

Deterring the Abuse of U.S. IaaS Products: Recommendations for a Consortium Approach

Steve Kelly, Tiffany Saade

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Hedges, Technology, and the Future of Proliferation

Leah Walker and Vipin Narang

EVENT DESCRIPTION

When states seek to bolster their own security, they often consider some degree of nuclear weapons development along the way. More than just “sprinting for a bomb,” states have many paths and degrees of proliferation options available to them. As a central force in informing and enabling those options, technology holds a special role in nuclear proliferation. Whether it’s advanced engineering technologies that enable a faster or quieter development process, or the digital technologies that support a more theoretical “hedging” approach, leaders should take special note of how available and emerging technologies shape the proliferation landscape.

In his new book, Seeking the Bomb, MIT’s Vipin Narang breaks down these various options and pathways toward nuclear-backed security. On February 15, 2022, IST’s Leah Walker hosted a conversation with Dr. Narang for an incisive look at his findings and an open conversation about the prospects for nuclear proliferators and the nonproliferation regime in the years to come.