Virtual Library

Our research repositories present a collection of open-source resources that showcase research and analysis that has directly influenced our initiatives. Non-IST publications are copyrighted by external authors not affiliated with IST.

Submit your Content

Reports

Mapping Threat Actor Behavior in the Ransomware Payment Ecosystem: A Mini-Pilot

Zoë Brammer

viewpdf

Reports

May 2023 Progress Report: Ransomware Task Force: Gaining Ground

Ransomware Task Force

viewpdf

Reports

Castles Built on Sand: Towards Securing the Open-Source Software Ecosystem

Zoë Brammer, Silas Cutler, Marc Rogers, Megan Stifel

viewpdf

Reports

Cyber Incident Reporting Framework: Global Edition

Cyber Threat Alliance, Institute for Security and Technology

viewpdf

Reports

AI-NC3 Integration in an Adversarial Context: Strategic Stability Risks and Confidence Building Measures

Alexa Wehsener, Andrew W. Reddie, Leah Walker, Philip Reiner

viewpdf

Op-ed

The Nuclear Risk Reduction Approach: A Useful Path Forward for Crisis Mitigation

Sylvia Mishra

view

Reports

Nuclear Crisis Communications: Mapping Risk Reduction Implementation Pathways

Sylvia Mishra

viewpdf

Contribute to our Library!

We also welcome additional suggestions from readers, and will consider adding further resources as so much of our work has come through crowd-sourced collaboration already. If, for any chance you are an author whose work is listed here and you do not wish it to be listed in our repository, please, let us know.

SUBMIT CONTENT

Hedges, Technology, and the Future of Proliferation

Leah Walker and Vipin Narang

EVENT DESCRIPTION

When states seek to bolster their own security, they often consider some degree of nuclear weapons development along the way. More than just “sprinting for a bomb,” states have many paths and degrees of proliferation options available to them. As a central force in informing and enabling those options, technology holds a special role in nuclear proliferation. Whether it’s advanced engineering technologies that enable a faster or quieter development process, or the digital technologies that support a more theoretical “hedging” approach, leaders should take special note of how available and emerging technologies shape the proliferation landscape.

In his new book, Seeking the Bomb, MIT’s Vipin Narang breaks down these various options and pathways toward nuclear-backed security. On February 15, 2022, IST’s Leah Walker hosted a conversation with Dr. Narang for an incisive look at his findings and an open conversation about the prospects for nuclear proliferators and the nonproliferation regime in the years to come.