Publications

Curriculum Vitae

Books

In progress: Age of Deception: The Intelligence Logic Cybersecurity from Bletchley Park to Quantum Computing

Jon R. Lindsay, Information Technology and Military Power (Ithaca: Cornell University Press, Forthcoming)

Jon R. Lindsay and Erik Gartzke, eds., Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press, 2019)

Jon R. Lindsay, Tai Ming Cheung, Derek Reveron, eds., China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (New York: Oxford University Press, 2015)

Articles & Book Chapters

Jon R. Lindsay, “Cyber Espionage,” in The Oxford Handbook of Cyber Security, ed. Paul Cornish (New York: Oxford University Press, Forthcoming)

Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence, From Practice to Theory,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019).

Jon R. Lindsay and Erik Gartzke, “The Analytic Potential of Cross-Domain Deterrence,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019)

Erik Gartzke and Jon R. Lindsay, “The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence,” in Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations, ed. Herb Lin and Amy Zegart (Washington, DC: Brookings, 2018)

Jon R. Lindsay and Erik Gartzke, “Coercion through Cyberspace: The Stability-Instability Paradox Revisited,” with Erik Gartzke, in Coercion: The Power to Hurt in International Politics, ed. Kelly Greenhill and Peter J. P. Krause (New York: Oxford University Press, 2018)

Jon R. Lindsay, “Target Practice: The Amplifying Bias of Data Friction in Counterterrorism,” Science, Technology, and Human Values 42, No. 6 (2017): 1061-1099

Jon R. Lindsay, “Restrained by Design: The Political Economy of Cybersecurity,” Digital Policy, Regulation and Governance 19, no. 6 (2017): 493-514

Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence and Cybersecurity: The Consequences of Complexity,” with Erik Gartzke, in US National Cybersecurity: International Politics, Concepts and Organization, ed. Damien van Puyvelde, Aaron F. Brantley (New York: Routledge, 2017)

Erik Gartzke and Jon R. Lindsay, “Thermonuclear Cyberwar,” with Erik Gartzke, Journal of Cybersecurity 3, No. 1 (2017): 37-48

Erik Gartzke and Jon R. Lindsay, “Windows on Submarines: The Dynamics of Deception in the Cyber and Maritime Domains,” with Erik Gartzke, in Issues in Maritime Cyber Security, ed. Joseph DiRenzo III, Nicole K. Drumhiller and Fred S. Roberts (Washington, DC: Westphalia Press, 2017)

Jon R. Lindsay, “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence against Cyberattack,Journal of Cybersecurity 1, No. 1 (2015), 53-67.

Erik Gartzke and Jon R. Lindsay, “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,Security Studies 24, no. 2 (2015): 316-348

Stephan Haggard and Jon R. Lindsay, “North Korea and the Sony Hack: Exporting Instability through Cyberspace,” East-West Center AsiaPacific Issues No. 117 (May 2015)

Jon R. Lindsay, “The Impact of China on Cybersecurity: Fiction and Friction,” International Security 39, no. 3 (Winter 2014/2015): 7–47.

Jon R. Lindsay, “Introduction—China and Cybersecurity: Controversy and Context," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Jon R. Lindsay and Tai Ming Cheung, “From Espionage to Innovation: Acquisition, Absorption, and Application," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Jon R. Lindsay and Derek Reveron, “Conclusion—The Rise of China and the Future of Cybersecurity," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)

Jon R. Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2013): 365-404

Jon R. Lindsay, “Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations,” Journal of Strategic Studies 36, no. 3 (2013): 422–453.

Jon R. Lindsay and Roger Petersen, “Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009,CIWAG Case Study Series 2011-2012, ed. Andrea Dew and Marc Genest (Newport, RI: US Naval War College, Center for Irregular Warfare and Armed Groups, 2012)

Jon R. Lindsay, “War Upon the Map: User Innovation in American Military Software,” Technology and Culture 51, no. 3 (2010): 619-651

Staci Strobl and Jon R. Lindsay, “Lost in Transition: Khobar Towers and the Ambiguities of Terrorism in the 1990s,” in A New Understanding of Terrorism: Case Studies and Analysis, ed. Maria Haberfeld and Agostino von Hassell (New York: Springer, 2009)

Other Writing

Review of Robert Mandell, Global Data Shock: Strategic Ambiguity, Deception, and Surprise in an Age of Information Overload in Perspectives on Politics (forthcoming)

Review of Lindsey O’Rourke, Covert Regime Change: America’s Secret Cold War, H-Diplo ISSF Roundtable (forthcoming)

“Cyber Operations and Nuclear Weapons,” Nautilus Institute for Security and Sustainability, 20 June 2019

Review of Peter F. Cowhey and Jonathan D. Aronson, Digital DNA: Disruption and the Challenges for Global Governance in Perspectives on Politics in Perspectives on Politics 16, no. 4 (December 2018)

Review of Ben Buchanan, The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations in International Security Studies Forum, H-Diplo ISSF Roundtable 10-6 (19 January 2018)

“Russia and the 2016 U.S. Presidential Election,” H-Diplo ISSF Roundtable 1-7 (26 March 2017)

“The U.S. wants to stop North Korean missiles before they launch. That may not be a great idea.” With Erik Gartzke, The Monkey Cage, The Washington Post, 15 March 2017

Review of Brandon Valeriano and Ryan C. Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System in International Security Studies Forum, H-Diplo ISSF Roundtable 9-7 (5 December 2016)

Review of Monroe E. Price, Free Expression, Globalism and the New Strategic Communication in Perspectives on Politics 14, no. 4 ( December 2016): 1275-1277

“Why Isn’t There More Scholarly Evaluation of U.S. Wars?” H-Diplo ISSF Roundtable 13 (March 2016)

“Correspondence: Debating the Chinese Cyber Threat,” with Joel Brenner, International Security 40, no. 1 (Summer 2015)

“Correspondence: A Cyber Disagreement,” with Lucas Kello, International Security 39, no. 2 (Fall 2014): 181–92.

"Correspondence: Assessing the Synergy Thesis in Iraq," with John Hagan, Joshua Kaiser, Anna Hanson, Austin G. Long, Stephen Biddle, Jeffrey A. Friedman, and Jacob N. Shapiro, International Security vol. 37, no. 4 (Spring 2013): 173–198