General Information
Details
My research focuses on emerging technology and global security, integrating insights from computer science, international relations, and science and technology studies (STS). Topics include cybersecurity, AI policy, quantum computing, nuclear command and control, space strategy, multidomain deterrence, military innovation, and intelligence studies.
I teach a course on Cyber Warfare in the security thread of the computer science degree and in the online master's program. I also teach international affairs seminars, lately with a focus on AI and national security policy.
Books:
Jon R. Lindsay, Age of Deception: Cybersecurity as Secret Statecraft (Ithaca: Cornell University Press, 2025)
Erik Gartzke and Jon R. Lindsay, Elements of Deterrence: Strategy, Technology, and Complexity in Global Politics (New York: Oxford University Press, 2024)
Jon R. Lindsay, Information Technology and Military Power (Ithaca: Cornell University Press, 2020)
Jon R. Lindsay and Erik Gartzke, eds., Cross-Domain Deterrence: Strategy in an Era of Complexity
(New York: Oxford University Press, 2019)
Jon R. Lindsay, Tai Ming Cheung, Derek Reveron, eds., China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain (New York: Oxford University Press, 2015)
Peer-reviewed Articles:
Kostyuk, Nadiya, Jon R. Lindsay, Emily Kim, Aniket Anand, Zachary Bischof, Amanda Meng, and Alberto Dainotti. Forthcoming. “Strategic Interdependence: Using Internet Outage Data to Study How Combatants Manage Collective Institutions During War.” British Journal of Political Science. Forthcoming.
Jon R. Lindsay, “Stuxnet Revisited: From Cyber Warfare to Secret Statecraft,” Journal of Strategic Studies 48:4 (2025): 834-73. https://doi.org/10.1080/01402390.2025.2481447
Jon R. Lindsay, “Sing, Goddess, of the Wrath of AI,” Minds and Machines 35:3 (2025). https://link.springer.com/article/10.1007/s11023-025-09741-0#Sec8
Douglass, Rex W., Thomas Leo Scherer, J. Andrés Gannon, Erik Gartzke, Jon Lindsay, Shannon Carcelli, Jonathan Wilkenfeld, et al. “Introducing ICBe: An Event Extraction Dataset From Narratives about International Crises.” Political Science Research and Methods 12, no. 4 (2024): 729–49. https://doi.org/10.1017/psrm.2024.17
Jon R. Lindsay. “Abducted by Hackers: Using the Case of Bletchley Park to Construct a Theory of Intelligence Performance That Generalizes to Cybersecurity.” Journal of Peace Research 61, no. 1 (2024): 87–102. https://doi.org/10.1177/00223433231217664.
J. Andres Gannon, Erik Gartzke, Jon R. Lindsay, and Peter Schramm, “The Shadow of Deterrence: Why capable actors engage in contests short of war,” Journal of Conflict Resolution 68, no. 2–3 (2024): 230–68. https://doi.org/10.1177/00220027231166345
Jon R. Lindsay, “War Is from Mars, AI Is from Venus: Rediscovering the Institutional Context of Military Automation.” Texas National Security Review 7:1 (2023). https://tnsr.org/2023/11/war-is-from-mars-ai-is-from-venus-rediscovering-the-institutional-context-of-military-automation/
Avi Goldfarb and Jon R. Lindsay, “Prediction and judgment: why artificial intelligence increases the importance of humans in war,” International Security 46, no. 3 (2022): 7-50. https://doi.org/10.1162/isec_a_00425
Jon R. Lindsay and Erik Gartzke, “Politics by Many Other Means: The Comparative Strategic Advantages of Operational Domains,” Journal of Strategic Studies 45, no. 5 (2022): 743-776 https://www.tandfonline.com/doi/full/10.1080/01402390.2020.1768372
Jon R. Lindsay, “Cyber Conflict vs. Cyber Command: Hidden Dangers in the American Military Solution to a Large-Scale Intelligence Problem,” Intelligence and National Security 36, no. 2 (2021): 260–78.https://www.tandfonline.com/doi/full/10.1080/02684527.2020.1840746
Lennart Maschmeyer, Ronald Deibert, and Jon R. Lindsay. “A Tale of Two Cybers: How Threat Reporting by Cybersecurity Firms Systematically Underrepresents Threats to Civil Society,” Journal of Information Technology & Politics 18, no. 1 (2021): 1-20 https://www.tandfonline.com/doi/full/10.1080/19331681.2020.1776658
Erik Gartzke and Jon R. Lindsay, “The Influence of Seapower on Politics: Domain- and Platform-Specific Attributes of Material Capabilities,” Security Studies 29, no. 4 (2020): 601-636, https://www.tandfonline.com/doi/full/10.1080/09636412.2020.1811450
Jon R. Lindsay, “Demystifying the Quantum Threat: Infrastructure, Implementation, and Intelligence Advantage,” Security Studies 29, No. 2 (2020), 335-361. https://www.tandfonline.com/doi/full/10.1080/09636412.2020.1722853
Jon R. Lindsay, “Surviving the Quantum Cryptocalypse,” Strategic Studies Quarterly 14, no. 2 (2020): 49–73. https://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-14_Issue-2/Lindsay.pdf
Jon R. Lindsay, “Target Practice: The Amplifying Bias of Data Friction in Counterterrorism,” Science, Technology, and Human Values 42, No. 6 (2017): 1061-1099 https://journals.sagepub.com/doi/10.1177/0162243917727353
Jon R. Lindsay, “Restrained by Design: The Political Economy of Cybersecurity,” Digital Policy, Regulation and Governance 19, no. 6 (2017): 493-514. https://www.emerald.com/insight/content/doi/10.1108/DPRG-05-2017-0023/full/html
Erik Gartzke and Jon R. Lindsay, “Thermonuclear Cyberwar,” Journal of Cybersecurity 3, No. 1 (2017): 37-48 https://academic.oup.com/cybersecurity/article/3/1/37/2996537
Jon R. Lindsay, “Tipping the Scales: The Attribution Problem and the Feasibility of Deterrence against Cyberattack,” Journal of Cybersecurity 1, No. 1 (2015), 53-67. https://academic.oup.com/cybersecurity/article/1/1/53/2354517
Erik Gartzke and Jon R. Lindsay, “Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace,” Security Studies 24, no. 2 (2015): 316-348 https://www.tandfonline.com/doi/full/10.1080/09636412.2015.1038188
Stephan Haggard and Jon R. Lindsay, “North Korea and the Sony Hack: Exporting Instability through Cyberspace,” AsiaPacific Issues No. 117 (May 2015) https://www.jstor.org/stable/resrep06456?seq=1#metadata_info_tab_contents
Jon R. Lindsay, “The Impact of China on Cybersecurity: Fiction and Friction,” International Security 39, no. 3 (Winter 2014/2015): 7–47. https://www.mitpressjournals.org/doi/abs/10.1162/ISEC_a_00189
Jon R. Lindsay, “Stuxnet and the Limits of Cyber Warfare,” Security Studies 22, no. 3 (2013): 365-404. https://www.tandfonline.com/doi/full/10.1080/09636412.2013.816122
Jon R. Lindsay, “Reinventing the Revolution: Technological Visions, Counterinsurgent Criticism, and the Rise of Special Operations,” Journal of Strategic Studies 36, no. 3 (2013): 422–453. https://www.tandfonline.com/doi/full/10.1080/01402390.2012.734252
Jon R. Lindsay, “War Upon the Map: User Innovation in American Military Software,” Technology and Culture 51, no. 3 (2010): 619-651 https://www.jstor.org/stable/40927989?seq=1#metadata_info_tab_contents