Jon R. Lindsay, Age of Deception: Cybersecurity as Secret Statecraft in Cornell Series in Security Affairs (Ithaca: Cornell University Press, 2025)
Erik Gartzke and Jon R. Lindsay, Elements of Deterrence: Strategy, Technology, Complexity in Global Politics (New York: Oxford University Press, 2024)
Jon R. Lindsay, Information Technology and Military Power in Cornell Series in Security Affairs (Ithaca: Cornell University Press, 2020)
Jon R. Lindsay and Erik Gartzke, eds., Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press, 2019)
Jon R. Lindsay, Tai Ming Cheung, Derek Reveron, eds., China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (New York: Oxford University Press, 2015)
Rex W., Douglass, Jon R. Lindsay, Erik Gartzke, Thomas Leo Scherer, and J. Andrés Gannon. “What is Escalation? Measuring Crisis Dynamics in International Relations with Human and LLM Generated Event Data.” In A Century of International Crisis Behavior, 1918-2018, edited by Kyle Beardsley, Patrick James, and Jonathan Wilkenfeld. Ann Arbor, MI: University of Michigan Press, 2026.
Jon R. Lindsay, “The More Dismal Science: Perspectives from International Relations on Military Automation.” In The Political Economy of Artificial Intelligence, Edited by Ajay Agrawal, Joshua Gans, Avi Goldfarb, and Catherine Tucker. University of Chicago Press, 2025.
Jon R. Lindsay, "Sing, Goddess, of the Wrath of AI," in Raluca Csernatoni, Dennis Broeders, Lise H. Andersen, “Myth, Power, and Agency: Rethinking Artificial Intelligence, Geopolitics and War,” Minds and Machines 35:3 (2025).
Jon R. Lindsay, “Stuxnet Revisited: From Cyber Warfare to Secret Statecraft,” Journal of Strategic Studies 48:4 (2025): 834-73.
Kendrick Kuo and Jon R. Lindsay, “Naval Kinetic Warfare and Cyber Roles,” in Chris Demchak and Sam J. Tangredi, eds., Cyber Warfare and Navies. Naval Institute Press, 2025.
Jon R. Lindsay, “Sabotage in Siberia: Operational Feasibility and Implications for Cyber Warfare,” H-Diplo|RJISSF Forum on Marc Trachtenberg, “Operation Farewell and the Siberian Pipeline Explosion: A Research Note,” 20 November 2024.
Douglass, Rex W., Thomas Leo Scherer, J. Andrés Gannon, Erik Gartzke, Jon Lindsay, Shannon Carcelli, Jonathan Wilkenfeld, et al. , “Introducing ICBe: An Event Extraction Dataset From Narratives about International Crises.” Political Science Research and Methods 12, no. 4 (2024): 729–49.
Jon R. Lindsay, “Abducted by Hackers: Using the Case of Bletchley Park to Construct a Theory of Intelligence Performance That Generalizes to Cybersecurity.” Journal of Peace Research 61, no. 1 (2024): 87–102.
J. Andres Gannon, Erik Gartzke, Jon R. Lindsay, and Peter Schramm, “The Shadow of Deterrence: Why capable actors engage in contests short of war,” Journal of Conflict Resolution 68, no. 2–3 (2024): 230–68.
Jon R. Lindsay, “The Economic Complements of AI and the Political Context of War.” In Responsible Use of AI in Military Systems, edited by Jan Maarten Schraagen, 303–17. New York: Chapman and Hall/CRC, 2024.
Jon R. Lindsay and Michael Poznansky, “The Cat in the Hat and Cyber Warfare,” in Montgomery McFate, ed., Dr. Suess and the Art of War: Secret Military Lessons. New York: Rowman Littlefield, 2024.
Jon R. Lindsay and Roger Petersen, “Anbar, 2003-2011: The Generation of a Community Mobilization Strategy,” in Petersen, Death, Dominance, and State-Building: The US in Iraq and the Future of American Military Intervention. New York, Oxford University Press, 2024.
Jon R. Lindsay, “War Is from Mars, AI Is from Venus: Rediscovering the Institutional Context of Military Automation.” Texas National Security Review 7:1 (2023).
Avi Goldfarb and Jon R. Lindsay, "Prediction and judgment: why artificial intelligence increases the importance of humans in war," International Security 46: 2 (2022): 7–50
Jon R. Lindsay, “Cyber Operations and Nuclear Escalation: A Dangerous Gamble," in Nuclear Command, Control, and Communications: A Primer on US Systems and Future Challenges, ed. J. Wirtz and Jeffrey A. Larsen (Washington, DC: Georgetown University Press, 2022): 121–44.
Jon R. Lindsay, “These Are Not the Droids You’re Looking for: Offense, Defense, and the Social Context of Quantum Cryptology," in Quantum International Relations: A Human Science for World Politics, ed. James Der Derian and Alexander Wendt (New York: Oxford University Press, 2022): 153–71.
Jon R. Lindsay, “Quantum Computing and Classical Politics: The Ambiguity of Cryptologic Advantage," in Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation, ed. Myriam Dunn-Cavelty and Andreas Wenger (London: Routledge, 2022): 80–94.
Jon R. Lindsay, "Cyber conflict vs. Cyber Command: hidden dangers in the American military solution to a large-scale intelligence problem," Intelligence and National Security 36: 2 (2021): 260-278
Lennart Maschmeyer, Ronald Deibert, and Jon R. Lindsay. “A Tale of Two Cybers: How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society,” Journal of Information Technology & Politics 18: 1 (2021): 1-20
Jon R. Lindsay, “Cyber Espionage," in The Oxford Handbook of Cybersecurity, ed. Paul Cornish (New York: Oxford University Press, 2021): 223–38.
Jon R. Lindsay and Erik Gartzke, “Politics by Many Other Means: The Comparative Strategic Advantages of Operational Domains,” Journal of Strategic Studies (Forthcoming)
Erik Gartzke and Jon R. Lindsay, “The Influence of Seapower on Politics: Domain- and Platform-Specific Attributes of Material Capabilities,” Security Studies 29: 4 (2020): 601-636
Jon R. Lindsay, “Demystifying the Quantum Threat: Infrastructure, Implementation, and Intelligence Advantage,” Security Studies 29, No. 2 (2020), 335-361
Jon R. Lindsay, “Surviving the Quantum Cryptocalypse,” Strategic Studies Quarterly 14, no. 2 (2020): 49–73.
Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence, From Practice to Theory,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019).
Jon R. Lindsay and Erik Gartzke, “The Analytic Potential of Cross-Domain Deterrence,” in Cross-Domain Deterrence: Strategy in an Era of Complexity, ed. Jon Lindsay and Erik Gartzke (New York: Oxford University Press, 2019)
Erik Gartzke and Jon R. Lindsay, “The Cyber Commitment Problem and the Destabilization of Nuclear Deterrence,” in Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations, ed. Herb Lin and Amy Zegart (Washington, DC: Brookings, 2018)
Jon R. Lindsay and Erik Gartzke, “Coercion through Cyberspace: The Stability-Instability Paradox Revisited,” with Erik Gartzke, in Coercion: The Power to Hurt in International Politics, ed. Kelly Greenhill and Peter J. P. Krause (New York: Oxford University Press, 2018)
Jon R. Lindsay, “Target Practice: The Amplifying Bias of Data Friction in Counterterrorism,” Science, Technology, and Human Values 42, No. 6 (2017): 1061-1099
Jon R. Lindsay, “Restrained by Design: The Political Economy of Cybersecurity,” Digital Policy, Regulation and Governance 19, no. 6 (2017): 493-514
Jon R. Lindsay and Erik Gartzke, “Cross-Domain Deterrence and Cybersecurity: The Consequences of Complexity,” with Erik Gartzke, in US National Cybersecurity: International Politics, Concepts and Organization, ed. Damien van Puyvelde, Aaron F. Brantley (New York: Routledge, 2017)
Erik Gartzke and Jon R. Lindsay, “Thermonuclear Cyberwar,” with Erik Gartzke, Journal of Cybersecurity 3, No. 1 (2017): 37-48
Erik Gartzke and Jon R. Lindsay, “Windows on Submarines: The Dynamics of Deception in the Cyber and Maritime Domains,” with Erik Gartzke, in Issues in Maritime Cyber Security, ed. Joseph DiRenzo III, Nicole K. Drumhiller and Fred S. Roberts (Washington, DC: Westphalia Press, 2017)
Jon R. Lindsay, “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence against Cyberattack,” Journal of Cybersecurity 1, No. 1 (2015), 53-67.
Erik Gartzke and Jon R. Lindsay, “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,” Security Studies 24, no. 2 (2015): 316-348
Stephan Haggard and Jon R. Lindsay, “North Korea and the Sony Hack: Exporting Instability through Cyberspace,” East-West Center AsiaPacific Issues No. 117 (May 2015)
Correspondence: “Debating the Chinese Cyber Threat,” with Joel Brenner, International Security 40, no. 1 (Summer 2015)
Jon R. Lindsay, “The Impact of China on Cybersecurity: Fiction and Friction,” International Security 39, no. 3 (Winter 2014/2015): 7–47.
Jon R. Lindsay, “Introduction—China and Cybersecurity: Controversy and Context," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)
Jon R. Lindsay and Tai Ming Cheung, “From Espionage to Innovation: Acquisition, Absorption, and Application," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)
Jon R. Lindsay and Derek Reveron, “Conclusion—The Rise of China and the Future of Cybersecurity," in China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, ed. Jon Lindsay, Tai Ming Cheung, Derek Reveron (New York: Oxford University Press, 2015)
Correspondence: “A Cyber Disagreement,” with Lucas Kello, International Security 39, no. 2 (Fall 2014): 181–92.
Jon R. Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2013): 365-404
Jon R. Lindsay, “Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations,” Journal of Strategic Studies 36, no. 3 (2013): 422–453.
Correspondence: “Assessing the Synergy Thesis in Iraq," with John Hagan, Joshua Kaiser, Anna Hanson, Austin G. Long, Stephen Biddle, Jeffrey A. Friedman, and Jacob N. Shapiro, International Security vol. 37, no. 4 (Spring 2013): 173–198
Jon R. Lindsay and Roger Petersen, “Varieties of Insurgency and Counterinsurgency in Iraq, 2003-2009,” CIWAG Case Study Series 2011-2012, ed. Andrea Dew and Marc Genest (Newport, RI: US Naval War College, Center for Irregular Warfare and Armed Groups, 2012)
Jon R. Lindsay, “War Upon the Map: User Innovation in American Military Software,” Technology and Culture 51, no. 3 (2010): 619-651
Staci Strobl and Jon R. Lindsay, “Lost in Transition: Khobar Towers and the Ambiguities of Terrorism in the 1990s,” in A New Understanding of Terrorism: Case Studies and Analysis, ed. Maria Haberfeld and Agostino von Hassell (New York: Springer, 2009)
Jon R. Lindsay, Review: Phil Haun, Tactical Airpower in Vietnam, in H-Diplo|RJISSF Forum (Forthcoming)
Jon R. Lindsay. Review of Escalation Dynamics in Cyberspace, by Erica D. Lonergan and Shawn W. Lonergan. Perspectives on Politics 23, no. 2 (2025),.
Erik Gartzke and Jon R. Lindsay. “The U.S. Department of Deterrence.” War on the Rocks (blog), July 22, 2024.
Jon R. Lindsay, Review of Nothing Is Beyond Our Reach: America’s Techno-Spy Empire, by Kristie Macrakis. H-Diplo|RJISSF Roundtable 15, no. 50 (April 3, 2023).
Jon R. Lindsay, Review: Robert Dover, Hacker, Influencer, Faker, Spy: Intelligence Agencies in the Digital Age, and Kenneth Payne: I, Warbot: The Dawn of Artificially Intelligent Conflict, in Journal of Military History, 87:4 (2023), 1205–8
“The 5×5—Cyber conflict in international relations: A scholar’s perspective,” Cyber statecraft initiative, Atlantic Council, 20 June 2023.
“The 5×5—Non-state armed groups in cyber conflict,” Cyber statecraft initiative, Atlantic Council, 26 October 2022.
Avi Goldfarb and Jon Lindsay, “Artificial Intelligence And the Human Context of War,” The National Interest (April 30, 2022)
Gannon, J. Andrés, Erik A. Gartzke, Jon R. Lindsay, and Peter Schram. “Why Did Russia Escalate Its Gray Zone Conflict in Ukraine?” Lawfare, January 16, 2022.
Catherine Delafield, Sarah Fishbein, Andres Gannon, Erik Gartzke,, Jon Lindsay, Peter Schram, and Estelle Shaya, “Rethinking Deterrence in Gray Zone Conflict,” e-International Relations (5 January 2022)
Jon R. Lindsay, author’s response, “Roundtable 12-9 on Information Technology and Military Power,” H-Diplo ISSF Roundtable (26 April 2021),
Jon R Lindsay, Review: Lindsey O’Rourke, Covert Regime Change: America’s Secret Cold War, H-Diplo ISSF Roundtable (5 February 2021)
Erik Gartzke and Jon R. Lindsay, “Strategic Tradeoffs in U.S. Naval Force Structure — Rule the Waves or Wave the Flag?” War on the Rocks, (1 March 2021)
Jon R Lindsay, Review: Michael Poznansky, In the Shadow of International Law: Secrecy and Regime Change in the Postwar World, H-Diplo ISSF Roundtable 12-3 (5 February 2021)
Avi Goldfarb and Jon R. Lindsay, “Artificial Intelligence in War: Human Judgment as an Organizational Strength and a Strategic Liability,” report, Brookings Institution (November 2020)
Jon R. Lindsay, “Military Organizations, Intelligence Operations, and Information Technology,” in “Policy Roundtable: Cyber Conflict as an Intelligence Contest,” Texas National Security Review 3, No. 4 (September 2020)
Erik Gartzke and Jon R. Lindsay, “Military Means and Political Ends,” Owl in the Olive Tree, The Minerva Initiative Blog, 22 June 2020
Jon R Lindsay, Roundtable: Robert Mandell, Global Data Shock: Strategic Ambiguity, Deception, and Surprise in an Age of Information Overload, H-Diplo ISSF Roundtable 11-3 (15 March 2020).
Jon Lindsay, “Why is Trump funding quantum computing research but cutting other science budgets?” The Washington Post, 13 March 2020
Jon Lindsay, Review: Robert Mandell, Global Data Shock: Strategic Ambiguity, Deception, and Surprise in an Age of Information Overload in Perspectives on Politics 18, no. 1 (March 2020), 336-337.
Jon Lindsay, “Cyber Operations and Nuclear Weapons,” Nautilus Institute for Security and Sustainability, 20 June 2019
Jon Lindsay, Review: Peter F. Cowhey and Jonathan D. Aronson, Digital DNA: Disruption and the Challenges for Global Governance in Perspectives on Politics in Perspectives on Politics 16, no. 4 (December 2018), 1139-1141.
Jon Lindsay, Roundtable: Ben Buchanan, The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations in International Security Studies Forum, H-Diplo ISSF Roundtable 10-6 (19 January 2018)
Jon Lindsay, Roundtable: “Russia and the 2016 U.S. Presidential Election,” H-Diplo ISSF Roundtable 1-7 (26 March 2017)
“The U.S. wants to stop North Korean missiles before they launch. That may not be a great idea.” With Erik Gartzke, The Washington Post, 15 March 2017
Roundtable: Brandon Valeriano and Ryan C. Maness, Cyber War versus Cyber Realities: Cyber Conflict in the International System in International Security Studies Forum, H-Diplo ISSF Roundtable 9-7 (5 December 2016)
Review: Monroe E. Price, Free Expression, Globalism and the New Strategic Communication in Perspectives on Politics 14, no. 4 (December 2016): 1275-1277
“Eye in the Sky: New War, Old Problems,” Political Violence @ A Glance, 6 April 2016
Roundtable: “Why Isn’t There More Scholarly Evaluation of U.S. Wars?” H-Diplo ISSF Roundtable 13 (March 2016)
“The Real Cyberespionage Rule: Don’t Get Caught,” Policy Forum, Asia & the Pacific Policy Society, January 2016
“Exaggerating the Chinese Cyber Threat,” Policy Brief, Belfer Center for Science and International Affairs, Harvard Kennedy School, May 2015
“Will China and America Clash in Cyberspace?” with Tai Ming Cheung, and Derek S. Reveron, The National Interest, April 12, 2015
“Is This the Best Response to China’s Cyber-Attacks?” with Robert Daly, Chen Weihua, Roger Creemers, Graham Webster, Tai Ming Cheung, ChinaFile Conversation, 19 May 2014
“China: Cyber Threat and Cyber Threatened,” with Derek Reveron, New Atlanticist Policy and Analysis Blog, 7 August 2012
Zhuge Jianwei, Gu Liang, and Duan Haixin, “Investigating China’s Online Underground Economy,” ed. Jon Lindsay, IGCC Working Paper, July 2012
“China and Cybersecurity: Political, Economic, and Strategic Dimensions,” Report from Workshops held at the University of California, San Diego, April 2012
“Defense Transparency: Seeking a Definition for a Paradoxical Concept,” UC Institute on Global Conflict and Cooperation, Defense Transparency Project Policy Brief, October 2011
“Does the ‘Surge’ Explain Iraq’s Improved Security?” MIT Center for International Studies, Audit of the Conventional Wisdom, September 2008