Skip to content
Sign Up for Our Newsletter
About
Close About
Open About
About the Institute for Security and Technology
Our Team
Board Of Directors
Careers
Contact Us
Featured Events
Cyber Policy Awards
Critical Effect DC
Projects
Close Projects
Open Projects
AI and NC3
Pioneering action-oriented efforts to explore how advanced AI capabilities will be integrated into nuclear command, control, and communications
AI Antitrust and National Security
Exploring how to more effectively account for national security considerations in AI antitrust cases while respecting precedent, scope, and the core principles of antitrust law
AI Risk Reduction Initiative
Assessing the emerging risks and opportunities of AI foundation models and developing risk reduction strategies
AI Chip Export Control Initiative
Safeguarding U.S. national competitiveness by closing critical compliance and enforcement gaps
AI Risk Barometer
Measuring national security professionals’ perceptions of AI futures through a technically-informed survey
CATALINK
Preventing the onset or escalation of conflict by building a resilient global communications system
Energy FIRST
Powering U.S. and allied security & prosperity through a resilient energy future
Ransomware Task Force (RTF)
Combating the ransomware threat with a cross-sector approach
Religious Voices and Responsible AI
Engaging religious communities on safe and beneficial AI
SL5 Task Force
Strengthening AI security through a multistakeholder approach
UnDisruptable27
Driving more resilient lifeline critical infrastructure for our communities
All Projects
» Explore all of IST's projects, past and current
Focus Areas
Future of Digital Security
Geopolitics of Technology
Innovation and Catastrophic Risk
Events
Insights
Contact
Search
Donate
Archive
control
Blog
The New Nuclear Age: At the Precipice of Armageddon – IST Hosts Book Talk with Author Ankit Panda
IST’s Nuclear Policy team hosted international security expert and author Ankit Panda in Palo Alto to learn more about his latest book unpacking the trilateral nuclear competition between the United States, China, and Russia. IST CEO Philip Reiner sat down for a fireside chat with Ankit, highlighting in their discussion the need to collectively identify political and technical solutions to address the nexus of emerging technologies and the new nuclear age.
AI
,
and communications
,
artificial inteligence
,
China
,
control
,
NC3
,
nuclear
,
nuclear command
,
nuclear risk
,
Russia
,
United States
November 17, 2025
Report
AI-NC3 Integration in an Adversarial Context: Strategic Stability Risks and Confidence Building Measures
AI-NC3 Integration in an Adversarial Context aims to examine the strategic stability risks posed by integrating AI technologies into nuclear command, control and communications systems across the globe.
and communications
,
artificial intelligence
,
confidence-building measures
,
control
,
NC3
,
nuclear command
February 27, 2023
Report
Forecasting the AI and Nuclear Landscape
This report, the product of a partnership between IST and Metaculus, aims to assess the risks of escalation between the U.S. and China, including by the integration of AI into NC3.
AI
,
China
,
command
,
communications
,
control
,
Innovation and Catastrophic Risk
,
nuclear
September 21, 2022
Report
Building Communications Norms Across Nuclear C2
Dr. Salma Shaheen stresses the importance of establishing new norms, constructing new practices, and securing reliant communications between nuclear-armed states before a potential crisis. Shaheen reaffirms the need for a direct communication link between global leaders to facilitate quick and efficient communications between nuclear-armed states — a capability she cites as essential for escalation control and nuclear weapons reduction, with a direct impact on crisis aversion and thus global security.
CATALINK
,
communication
,
control
,
crisis
,
crisis management
,
escalation
,
history
,
hotlines
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapon
,
nuclear-use
,
secure communications
November 24, 2020
Report
Formal Methods for NC3 Systems
What if we told you there is a very concrete way of updating and securing the most complex NC3 systems? Adam Wick makes the case for future NC3 protocol descriptions "to include not only a broad description of the protocol and its goals, but also an executable specification of the protocol. He continues, "Given the sensitivity of these systems, we believe that the use of proof is critical."
communication
,
control
,
crisis management
,
formal methods
,
mathematics
,
NC3
,
nuclear
,
nuclear security
,
nuclear weapons
,
nuclear-use
September 17, 2020
AAR
,
Report
NC3 Systems and Strategic Stability: A Global Overview
In a conventional conflict between the United States and China or Russia, each belligerent might attack the other's command, control, communication, and intelligence (C3I) capabilities to gain a war-fighting advantage. However, because a number of...
cold war
,
command
,
communication
,
control
,
emerging technologies
,
NC3
,
NPT
,
nuclear
,
PALS
,
permissive action link
,
stability
,
strategic
May 6, 2019
Report
NC3 in a Multipolar Nuclear World: Big Structures and Large Processes
In this essay, Paul Bracken analyzes the big structures and large processes of nuclear multipolarity. A framework for analyzing this global system is developed, one made up of national command and control plus the "system dynamics" of their interlinked behavior. The paper underscores how advanced technologies — cyberwar, drones, and anti-satellite weapons (ASAT) — affects NC3.
anti-satellite
,
cold war
,
command
,
communication
,
control
,
cyberwar
,
drones
,
Europe
,
missile defense
,
NATO
,
NC3
,
Non-Proliferation
,
nuclear
,
stability
,
strategic
,
Strategy
,
weapon
May 14, 2019
Report
U.S. Nuclear Command and Control for the 21st Century
Dr. John Harvey calls for fixing the legacy NC2 system, including the so-called “thin line” architecture, to address Cold War-era nuclear scenarios which have not yet gone away, developing an NC2 concept and associated architecture to address “modern” nuclear conflict, and generating a plan to field it over the next 10-15 years.
21st century
,
alert posture
,
cold war
,
command
,
communication
,
conflict
,
control
,
deterrence
,
NC2
,
NC3
,
nuclear
,
resilience
,
stability
,
strategic
,
Strategy
,
sustainment
May 23, 2019
Report
Security at Extreme Scales
In Security at Extreme Scales, Eric Grosse argues, "Much of the security progress over the past decade has been at large-scale, finding and patching vulnerabilities in widely used applications or defending networks of millions of machines containing high-value data. The lessons there may help military systems, but for the very highest security needs such as NC3, we ought to return to basics and harden small-scale systems. And we ought to do it as a joint effort, even between adversaries."
complexity
,
control
,
large-scale
,
NC3
,
nuclear
,
scale
,
stability
,
users
,
vulnerability
May 30, 2019
Report
France: Nuclear Command, Control, and Communications
Benoît Pelopidas outlines what is known about French NC3, reviewing the primacy of presidential nuclear authority, the nuclear chain of command, civilian control over the arsenal, tension between legitimacy and robustness of the chain of command, the role of military authority in the launch order, inadequate code transfer, and accidents and close calls. He concludes: “Beyond the problems of arbitrariness, mismanagement, incidents and accidents outlined above, there are key components of the French nuclear command and control system about which we either do not know much or have partial and conflicting accounts.”
command
,
communication
,
control
,
France
,
key
,
local control
,
NATO
,
nuclear
,
SSL
,
stability
June 13, 2019
Report
Cyber Operations and Nuclear Weapons
In Cyber Operations and Nuclear Weapons, Jon Lindsay argues that "offensive cyber operations targeting NC3 introduce a number of under-appreciated risks of organizational breakdown, decision making confusion, and rational miscalculation in a nuclear crisis.”
accidental launch
,
arms control
,
attack vector
,
complexity
,
computer
,
control
,
counterattack
,
counterintelligence
,
countermeasure
,
crisis
,
crytographic
,
cyber
,
digital
,
electronic warfare
,
escalation
,
NC3
,
reconnaissance
,
redundant
,
retaliation
,
software
,
stability
,
Stuxnet
,
supercomputer
June 20, 2019
Report
Command and Control of Nuclear Weapons in India
M.V. Ramana and Lauren Borja analyze the state of nuclear command and control in India, concluding that the state of Indian NC3 “has been shaped by an ongoing rivalry between civilian authorities and the military."
accident
,
communication
,
control
,
decision-making
,
defense
,
delivery vehicle
,
deterrence
,
early warning
,
India
,
military
,
NC3
,
nuclear
,
Pakistan
,
stability
,
submarine
,
survivability
,
United States
,
wargaming
August 1, 2019
Report
Nuclear Command, Control, and Communications: U.S. Country Profile
In "Nuclear Command, Control, and Communications: U.S. Country Profile," Jeffrey Larsen argues that, for the last 75 years, the deterrence forces of the United States have relied on the credible threat of nuclear weapons use to prevent adversarial attacks.
authority
,
C2
,
command
,
communication
,
control
,
deterrence
,
NC3
,
nuclear
,
policy
,
president
,
stability
,
strategic
,
Strategy
,
United States
,
US
,
World War II
August 22, 2019
Search
Search