Publications

Curriculum Vitae

Books

In progress: Age of Deception: Technology, Intelligence, and Control in International Relations

Jon R. Lindsay, Information Technology and Military Power (Ithaca: Cornell University Press, 2020)

Jon R. Lindsay and Erik Gartzke, eds., Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press, 2019)

Jon R. Lindsay, Tai Ming Cheung, Derek Reveron, eds., China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (New York: Oxford University Press, 2015)


Articles & Book Chapters

Jon R. Lindsay, "Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem," Intelligence and National Security (Forthcoming)

Erik Gartzke and Jon R. Lindsay, “The Influence of Seapower on Politics: Domain- and Platform-Specific Attributes of Material Capabilities,Security Studies (Forthcoming)

Lennart Maschmeyer, Ronald Diebert, and Jon R. Lindsay. “A Tale of Two Cybers: How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society,” Journal of Information Technology & Politics (Forthcoming)

Jon R. Lindsay and Erik Gartzke, “Politics by Many Other Means: The Comparative Strategic Advantages of Operational Domains,” Journal of Strategic Studies (Forthcoming)

Jon R. Lindsay, “Demystifying the Quantum Threat: Infrastructure, Implementation, and Intelligence Advantage,” Security Studies 29, No. 2 (2020), 335-361

Jon R. Lindsay, “Surviving the Quantum Cryptocalypse,” Strategic Studies Quarterly 14, no. 2 (2020): 49–73.

Jon R. Lindsay, “Cyber Espionage,” in The Oxford Handbook of Cyber Security, ed. Paul Cornish (New York: Oxford University Press, Forthcoming)

Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence, From Practice to Theory,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019).

Jon R. Lindsay and Erik Gartzke, “The Analytic Potential of Cross-Domain Deterrence,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019)

Erik Gartzke and Jon R. Lindsay, “The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence,” in Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations, ed. Herb Lin and Amy Zegart (Washington, DC: Brookings, 2018)

Jon R. Lindsay and Erik Gartzke, “Coercion through Cyberspace: The Stability-Instability Paradox Revisited,” with Erik Gartzke, in Coercion: The Power to Hurt in International Politics, ed. Kelly Greenhill and Peter J. P. Krause (New York: Oxford University Press, 2018)

Jon R. Lindsay, “Target Practice: The Amplifying Bias of Data Friction in Counterterrorism,” Science, Technology, and Human Values 42, No. 6 (2017): 1061-1099

Jon R. Lindsay, “Restrained by Design: The Political Economy of Cybersecurity,” Digital Policy, Regulation and Governance 19, no. 6 (2017): 493-514

Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence and Cybersecurity: The Consequences of Complexity,” with Erik Gartzke, in US National Cybersecurity: International Politics, Concepts and Organization, ed. Damien van Puyvelde, Aaron F. Brantley (New York: Routledge, 2017)

Erik Gartzke and Jon R. Lindsay, “Thermonuclear Cyberwar,” with Erik Gartzke, Journal of Cybersecurity 3, No. 1 (2017): 37-48

Erik Gartzke and Jon R. Lindsay, “Windows on Submarines: The Dynamics of Deception in the Cyber and Maritime Domains,” with Erik Gartzke, in Issues in Maritime Cyber Security, ed. Joseph DiRenzo III, Nicole K. Drumhiller and Fred S. Roberts (Washington, DC: Westphalia Press, 2017)

Jon R. Lindsay, “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence against Cyberattack,Journal of Cybersecurity 1, No. 1 (2015), 53-67.

Erik Gartzke and Jon R. Lindsay, “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,Security Studies 24, no. 2 (2015): 316-348

Stephan Haggard and Jon R. Lindsay, “North Korea and the Sony Hack: Exporting Instability through Cyberspace,” East-West Center AsiaPacific Issues No. 117 (May 2015)

Correspondence: “Debating the Chinese Cyber Threat,” with Joel Brenner, International Security 40, no. 1 (Summer 2015)

Jon R. Lindsay, “The Impact of China on Cybersecurity: Fiction and Friction,” International Security 39, no. 3 (Winter 2014/2015): 7–47.

Jon R. Lindsay, “Introduction—China and Cybersecurity: Controversy and Context," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Jon R. Lindsay and Tai Ming Cheung, “From Espionage to Innovation: Acquisition, Absorption, and Application," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Jon R. Lindsay and Derek Reveron, “Conclusion—The Rise of China and the Future of Cybersecurity," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Correspondence: “A Cyber Disagreement,” with Lucas Kello, International Security 39, no. 2 (Fall 2014): 181–92.

Jon R. Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2013): 365-404

Jon R. Lindsay, “Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations,” Journal of Strategic Studies 36, no. 3 (2013): 422–453.

Correspondence: “Assessing the Synergy Thesis in Iraq," with John Hagan, Joshua Kaiser, Anna Hanson, Austin G. Long, Stephen Biddle, Jeffrey A. Friedman, and Jacob N. Shapiro, International Security vol. 37, no. 4 (Spring 2013): 173–198

Jon R. Lindsay and Roger Petersen, “Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009,CIWAG Case Study Series 2011-2012, ed. Andrea Dew and Marc Genest (Newport, RI: US Naval War College, Center for Irregular Warfare and Armed Groups, 2012)

Jon R. Lindsay, “War Upon the Map: User Innovation in American Military Software,” Technology and Culture 51, no. 3 (2010): 619-651

Staci Strobl and Jon R. Lindsay, “Lost in Transition: Khobar Towers and the Ambiguities of Terrorism in the 1990s,” in A New Understanding of Terrorism: Case Studies and Analysis, ed. Maria Haberfeld and Agostino von Hassell (New York: Springer, 2009)

Other Writing

Review: Lindsey O’Rourke, Covert Regime Change: America’s Secret Cold War, H-Diplo ISSF Roundtable (forthcoming)

Why is Trump funding quantum computing research but cutting other science budgets?The Washington Post, 13 March 2020

Roundtable: Robert Mandell, Global Data Shock: Strategic Ambiguity, Deception, and Surprise in an Age of Information Overload, H-Diplo ISSF Roundtable 11-3 (15 March 2020)

Review: Robert Mandell, Global Data Shock: Strategic Ambiguity, Deception, and Surprise in an Age of Information Overload in Perspectives on Politics 18, no. 1 (March 2020), 336-337.

Cyber Operations and Nuclear Weapons,” Nautilus Institute for Security and Sustainability, 20 June 2019

Review: Peter F. Cowhey and Jonathan D. Aronson, Digital DNA: Disruption and the Challenges for Global Governance in Perspectives on Politics in Perspectives on Politics 16, no. 4 (December 2018), 1139-1141.

Roundtable: Ben Buchanan, The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations in International Security Studies Forum, H-Diplo ISSF Roundtable 10-6 (19 January 2018)

Roundtable: “Russia and the 2016 U.S. Presidential Election,” H-Diplo ISSF Roundtable 1-7 (26 March 2017)

The U.S. wants to stop North Korean missiles before they launch. That may not be a great idea.” With Erik Gartzke, The Washington Post, 15 March 2017

Roundtable: Brandon Valeriano and Ryan C. Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System in International Security Studies Forum, H-Diplo ISSF Roundtable 9-7 (5 December 2016)

Review: Monroe E. Price, Free Expression, Globalism and the New Strategic Communication in Perspectives on Politics 14, no. 4 (December 2016): 1275-1277

Eye in the Sky: New War, Old Problems,” Political Violence @ A Glance, 6 April 2016

Roundtable: “Why Isn’t There More Scholarly Evaluation of U.S. Wars?” H-Diplo ISSF Roundtable 13 (March 2016)

The Real Cyberespionage Rule: Don’t Get Caught,” Policy Forum, Asia & the Pacific Policy Society, January 2016

Exaggerating the Chinese Cyber Threat,” Policy Brief, Belfer Center for Science and International Affairs, Harvard Kennedy School, May 2015

Will China and America Clash in Cyberspace?” with Tai Ming Cheung, and Derek S. Reveron, The National Interest, April 12, 2015

Is This the Best Response to China’s Cyber-Attacks?” with Robert Daly, Chen Weihua, Roger Creemers, Graham Webster, Tai Ming Cheung, ChinaFile Conversation, 19 May 2014

“China: Cyber Threat and Cyber Threatened,” with Derek Reveron, New Atlanticist Policy and Analysis Blog, 7 August 2012

Zhuge Jianwei, Gu Liang, and Duan Haixin, “Investigating China’s Online Underground Economy,” ed. Jon Lindsay, IGCC Working Paper, July 2012

“China and Cybersecurity: Political, Economic, and Strategic Dimensions,” Report from Workshops held at the University of California, San Diego, April 2012

Defense Transparency: Seeking a Definition for a Paradoxical Concept,” UC Institute on Global Conflict and Cooperation, Defense Transparency Project Policy Brief, October 2011

Does the ‘Surge’ Explain Iraq’s Improved Security?” MIT Center for International Studies, Audit of the Conventional Wisdom, September 2008