Publications

Curriculum Vitae

Books

In progress: Age of Deception: Intelligence and Cybersecurity in International Relations

Under review: Deterrence Across Domains: Strategy, Complexity, and Constraints in the 21st Century (with Erik Gartzke)

Jon R. Lindsay, Information Technology and Military Power (Ithaca: Cornell University Press, 2020)

Jon R. Lindsay and Erik Gartzke, eds., Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press, 2019)

Jon R. Lindsay, Tai Ming Cheung, Derek Reveron, eds., China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (New York: Oxford University Press, 2015)


Articles & Book Chapters

Jon R. Lindsay, “Cyber Operations and Nuclear Escalation: A Dangerous Gamble," in Nuclear Command, Control, and Communications: A Primer on US Systems and Future Challenges, ed. J. Wirtz and Jeffrey A. Larsen (Washington, DC: Georgetown University Press, 2022): 121–44.

Jon R. Lindsay, “These Are Not the Droids You’re Looking for: Offense, Defense, and the Social Context of Quantum Cryptology," in Quantum International Relations: A Human Science for World Politics, ed. James Der Derian and Alexander Wendt (New York: Oxford University Press, 2022): 153–71.

Jon R. Lindsay, Quantum Computing and Classical Politics: The Ambiguity of Cryptologic Advantage," in Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, ed. Myriam Dunn-Cavelty and Andreas Wenger (London: Routledge, 2022): 80–94.

Avi Goldfarb and Jon R. Lindsay, "Prediction and judgment: why artificial intelligence increases the importance of humans in war," International Security 46: 2 (2022): 7–50

Jon R. Lindsay, "Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem," Intelligence and National Security 36: 2 (2021): 260-278

Lennart Maschmeyer, Ronald Deibert, and Jon R. Lindsay. “A Tale of Two Cybers: How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society,” Journal of Information Technology & Politics 18: 1 (2021): 1-20

Jon R. Lindsay, “Cyber Espionage," in The Oxford Handbook of Cybersecurity, ed. Paul Cornish (New York: Oxford University Press, 2021): 223–38.

Jon R. Lindsay and Erik Gartzke, “Politics by Many Other Means: The Comparative Strategic Advantages of Operational Domains,” Journal of Strategic Studies (Forthcoming)

Erik Gartzke and Jon R. Lindsay, “The Influence of Seapower on Politics: Domain- and Platform-Specific Attributes of Material Capabilities,Security Studies 29: 4 (2020): 601-636

Jon R. Lindsay, “Demystifying the Quantum Threat: Infrastructure, Implementation, and Intelligence Advantage,” Security Studies 29, No. 2 (2020), 335-361

Jon R. Lindsay, “Surviving the Quantum Cryptocalypse,” Strategic Studies Quarterly 14, no. 2 (2020): 49–73.

Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence, From Practice to Theory,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019).

Jon R. Lindsay and Erik Gartzke, “The Analytic Potential of Cross-Domain Deterrence,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019)

Erik Gartzke and Jon R. Lindsay, “The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence,” in Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations, ed. Herb Lin and Amy Zegart (Washington, DC: Brookings, 2018)

Jon R. Lindsay and Erik Gartzke, “Coercion through Cyberspace: The Stability-Instability Paradox Revisited,” with Erik Gartzke, in Coercion: The Power to Hurt in International Politics, ed. Kelly Greenhill and Peter J. P. Krause (New York: Oxford University Press, 2018)

Jon R. Lindsay, “Target Practice: The Amplifying Bias of Data Friction in Counterterrorism,” Science, Technology, and Human Values 42, No. 6 (2017): 1061-1099

Jon R. Lindsay, “Restrained by Design: The Political Economy of Cybersecurity,” Digital Policy, Regulation and Governance 19, no. 6 (2017): 493-514

Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence and Cybersecurity: The Consequences of Complexity,” with Erik Gartzke, in US National Cybersecurity: International Politics, Concepts and Organization, ed. Damien van Puyvelde, Aaron F. Brantley (New York: Routledge, 2017)

Erik Gartzke and Jon R. Lindsay, “Thermonuclear Cyberwar,” with Erik Gartzke, Journal of Cybersecurity 3, No. 1 (2017): 37-48

Erik Gartzke and Jon R. Lindsay, “Windows on Submarines: The Dynamics of Deception in the Cyber and Maritime Domains,” with Erik Gartzke, in Issues in Maritime Cyber Security, ed. Joseph DiRenzo III, Nicole K. Drumhiller and Fred S. Roberts (Washington, DC: Westphalia Press, 2017)

Jon R. Lindsay, “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence against Cyberattack,Journal of Cybersecurity 1, No. 1 (2015), 53-67.

Erik Gartzke and Jon R. Lindsay, “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,Security Studies 24, no. 2 (2015): 316-348

Stephan Haggard and Jon R. Lindsay, “North Korea and the Sony Hack: Exporting Instability through Cyberspace,” East-West Center AsiaPacific Issues No. 117 (May 2015)

Correspondence: “Debating the Chinese Cyber Threat,” with Joel Brenner, International Security 40, no. 1 (Summer 2015)

Jon R. Lindsay, “The Impact of China on Cybersecurity: Fiction and Friction,” International Security 39, no. 3 (Winter 2014/2015): 7–47.

Jon R. Lindsay, “Introduction—China and Cybersecurity: Controversy and Context," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Jon R. Lindsay and Tai Ming Cheung, “From Espionage to Innovation: Acquisition, Absorption, and Application," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Jon R. Lindsay and Derek Reveron, “Conclusion—The Rise of China and the Future of Cybersecurity," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Correspondence: “A Cyber Disagreement,” with Lucas Kello, International Security 39, no. 2 (Fall 2014): 181–92.

Jon R. Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2013): 365-404

Jon R. Lindsay, “Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations,” Journal of Strategic Studies 36, no. 3 (2013): 422–453.

Correspondence: “Assessing the Synergy Thesis in Iraq," with John Hagan, Joshua Kaiser, Anna Hanson, Austin G. Long, Stephen Biddle, Jeffrey A. Friedman, and Jacob N. Shapiro, International Security vol. 37, no. 4 (Spring 2013): 173–198

Jon R. Lindsay and Roger Petersen, “Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009,CIWAG Case Study Series 2011-2012, ed. Andrea Dew and Marc Genest (Newport, RI: US Naval War College, Center for Irregular Warfare and Armed Groups, 2012)

Jon R. Lindsay, “War Upon the Map: User Innovation in American Military Software,” Technology and Culture 51, no. 3 (2010): 619-651

Staci Strobl and Jon R. Lindsay, “Lost in Transition: Khobar Towers and the Ambiguities of Terrorism in the 1990s,” in A New Understanding of Terrorism: Case Studies and Analysis, ed. Maria Haberfeld and Agostino von Hassell (New York: Springer, 2009)


Other Writing

Avi Goldfarb and Jon Lindsay, “Artificial Intelligence And the Human Context of War,” The National Interest (April 30, 2022)

Gannon, J. Andrés, Erik A. Gartzke, Jon R. Lindsay, and Peter Schram. “Why Did Russia Escalate Its Gray Zone Conflict in Ukraine?” Lawfare, January 16, 2022.

Catherine Delafield, Sarah Fishbein, Andres Gannon, Erik Gartzke,, Jon Lindsay, Peter Schram, and Estelle Shaya, “Rethinking Deterrence in Gray Zone Conflict,” e-International Relations (5 January 2022)

Jon R. Lindsay, author’s response, “Roundtable 12-9 on Information Technology and Military Power,” H-Diplo ISSF Roundtable (26 April 2021),

Jon R Lindsay, Review: Lindsey O’Rourke, Covert Regime Change: America’s Secret Cold War, H-Diplo ISSF Roundtable (5 February 2021)

Erik Gartzke and Jon R. Lindsay, “Strategic Tradeoffs in U.S. Naval Force Structure — Rule the Waves or Wave the Flag?” War on the Rocks, (1 March 2021)

Jon R Lindsay, Review: Michael Poznansky, In the Shadow of International Law: Secrecy and Regime Change in the Postwar World, H-Diplo ISSF Roundtable 12-3 (5 February 2021)

Avi Goldfarb and Jon R. Lindsay, “Artificial Intelligence in War: Human Judgment as an Organizational Strength and a Strategic Liability,” report, Brookings Institution (November 2020)

Jon R. Lindsay, “Military Organizations, Intelligence Operations, and Information Technology,” in “Policy Roundtable: Cyber Conflict as an Intelligence Contest,” Texas National Security Review 3, No. 4 (September 2020)

Erik Gartzke and Jon R. Lindsay, “Military Means and Political Ends,” Owl in the Olive Tree, The Minerva Initiative Blog, 22 June 2020

Jon R Lindsay, Roundtable: Robert Mandell, Global Data Shock: Strategic Ambiguity, Deception, and Surprise in an Age of Information Overload, H-Diplo ISSF Roundtable 11-3 (15 March 2020).

Jon Lindsay, “Why is Trump funding quantum computing research but cutting other science budgets?The Washington Post, 13 March 2020

Jon Lindsay, Review: Robert Mandell, Global Data Shock: Strategic Ambiguity, Deception, and Surprise in an Age of Information Overload in Perspectives on Politics 18, no. 1 (March 2020), 336-337.

Jon Lindsay, Cyber Operations and Nuclear Weapons,” Nautilus Institute for Security and Sustainability, 20 June 2019

Jon Lindsay, Review: Peter F. Cowhey and Jonathan D. Aronson, Digital DNA: Disruption and the Challenges for Global Governance in Perspectives on Politics in Perspectives on Politics 16, no. 4 (December 2018), 1139-1141.

Jon Lindsay, Roundtable: Ben Buchanan, The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations in International Security Studies Forum, H-Diplo ISSF Roundtable 10-6 (19 January 2018)

Jon Lindsay, Roundtable: “Russia and the 2016 U.S. Presidential Election,” H-Diplo ISSF Roundtable 1-7 (26 March 2017)

The U.S. wants to stop North Korean missiles before they launch. That may not be a great idea.” With Erik Gartzke, The Washington Post, 15 March 2017

Roundtable: Brandon Valeriano and Ryan C. Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System in International Security Studies Forum, H-Diplo ISSF Roundtable 9-7 (5 December 2016)

Review: Monroe E. Price, Free Expression, Globalism and the New Strategic Communication in Perspectives on Politics 14, no. 4 (December 2016): 1275-1277

Eye in the Sky: New War, Old Problems,” Political Violence @ A Glance, 6 April 2016

Roundtable: “Why Isn’t There More Scholarly Evaluation of U.S. Wars?” H-Diplo ISSF Roundtable 13 (March 2016)

The Real Cyberespionage Rule: Don’t Get Caught,” Policy Forum, Asia & the Pacific Policy Society, January 2016

Exaggerating the Chinese Cyber Threat,” Policy Brief, Belfer Center for Science and International Affairs, Harvard Kennedy School, May 2015

Will China and America Clash in Cyberspace?” with Tai Ming Cheung, and Derek S. Reveron, The National Interest, April 12, 2015

Is This the Best Response to China’s Cyber-Attacks?” with Robert Daly, Chen Weihua, Roger Creemers, Graham Webster, Tai Ming Cheung, ChinaFile Conversation, 19 May 2014

“China: Cyber Threat and Cyber Threatened,” with Derek Reveron, New Atlanticist Policy and Analysis Blog, 7 August 2012

Zhuge Jianwei, Gu Liang, and Duan Haixin, “Investigating China’s Online Underground Economy,” ed. Jon Lindsay, IGCC Working Paper, July 2012

“China and Cybersecurity: Political, Economic, and Strategic Dimensions,” Report from Workshops held at the University of California, San Diego, April 2012

Defense Transparency: Seeking a Definition for a Paradoxical Concept,” UC Institute on Global Conflict and Cooperation, Defense Transparency Project Policy Brief, October 2011

Does the ‘Surge’ Explain Iraq’s Improved Security?” MIT Center for International Studies, Audit of the Conventional Wisdom, September 2008