• Publications
  • Influence
Stuxnet and the Limits of Cyber Warfare
Stuxnet, the computer worm which disrupted Iranian nuclear enrichment in 2010, is the first instance of a computer network attack known to cause physical damage across international boundaries. SomeExpand
Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace
It is widely believed that cyberspace is offense dominant because of technical characteristics that undermine deterrence and defense. This argument mistakes the ease of deception on the Internet forExpand
The Determinants of Disaster Vulnerability: Achieving Sustainable Mitigation through Population Health
The growing appreciation of mitigation is highlighting theneed to develop a better understanding of what makes some people more vulnerable tothe impacts of a disaster. Health researchers have asked aExpand
The Impact of China on Cybersecurity: Fiction and Friction
  • J. Lindsay
  • Political Science
  • International Security
  • 18 February 2015
Exaggerated fears about the paralysis of digital infrastructure and the loss of competitive advantage contribute to a spiral of mistrust in U.S.-China relations. In every category of putative ChineseExpand
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack
  • J. Lindsay
  • Psychology, Computer Science
  • J. Cybersecur.
  • 1 September 2015
TLDR
A formal model is used to explain why there are many low-value anonymous attacks but few high-value ones, showing how different assumptions about the scaling of exploitation and retaliation costs lead to different degrees of coverage and effectiveness for deterrence by denial and punishment. Expand
Deploying NMD: not whether, but how
The United States will deploy a national missile defence (NMD) system within the next decade. The question is no longer, therefore, whether to build an NMD system, but how to do so without making theExpand
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizesExpand
Thermonuclear cyberwar
TLDR
To reduce the risk of crisis miscalculation, states should improve rather than degrade mutual understanding of their nuclear deterrents, and strategic stability in nuclear dyads should be a function of relative offensive and defensive cyber capacity. Expand
Target Practice
The nineteenth-century strategist Carl von Clausewitz describes “fog” and “friction” as fundamental features of war. Military leverage of sophisticated information technology in the twenty-firstExpand
Correspondence: Assessing the Synergy Thesis in Iraq
Americans are inclined to remember their nation’s wars victoriously. “Let it be remembered,” President Barack Obama told the Minneapolis American Legion veterans of the Vietnam War on August 30,Expand
...
1
2
3
4
5
...