Transcript
A (0:01)
Welcome to the New Books Network.
B (0:05)
Hello and welcome to the New Books Network. I am your host, Eleonora Matiacci, an associate professor of political science at Amherst College. Today I'm speaking with Professor John Lindsay, an associate professor at the School of Cybersecurity and Privacy at the Sam Nan School of International affairs at Georgia Tech. His research examines how technology interacts with statecraft. His new book, Age of Deception, was just published in 2025 by Cornell University Press, and it appears in the Cornell Studies in Security affairs series. John, welcome to the show.
A (0:44)
It's great to be here. Thank you.
B (0:46)
Let's start with the central paradox of your book. You argue something along the lines that cooperation makes conflict possible. In other words, you say trust in cyberspace almost enables espionage and subversion. What sparked your interest in this counterintuitive idea and what conventional wisdom about cybersecurity are you challenging?
A (1:13)
Thanks for that. So the answer to this really goes back to my first book, which was called Information Technology and Military Power. And that book was about knowledge on the battlefield. And one of the arguments in that book was that you needed institutions, which includes technology and information processes, in order for military organizations to know anything about what was happening on the battlefield. And this is a paradox, right? So it's another paradox is that military organizations depend on institutions for knowledge, but war happens in what international relations theory would call anarchy. And that's the opposite of institutions. And this is part of why war, why war is so uncertain, is that you're trying to put information institutions into an anarchic space. So I developed this theory of institutions in war. But this book, strangely enough, Information Technology and Military Power did not talk about cyber operations at all, which is maybe kind of weird because cyber operations are so prominent in modern war. So I wrote this second book not only to address that gap, but to scale it up and talk about cyber and intelligence operations more broadly. So, so it was the same idea of thinking about institutions and the way in which they can be distorted and used and misused, but at a global, indeed planetary scale. And the move of looking at information technologies, institutions allows us to bring in all of the great social science, political economy knowledge that we have about how institutions work or don't work. And when I use this word, institutions, I'm kind of thinking about this in the political science, economic sense of the rules of the game. And that means that these are human built systems of constraint, and those can be built into infrastructures that can be built into systems of law. Those can be informal norms. But these are the Systems that allow us to coordinate our behavior. They allow us to cooperate. And so organizations and states love information systems because it allows them to cooperate at scale. But if you're cooperating, right, somebody can pretend to cooperate. They can cheat, they can do a little extra on the side. And so this is this fundamental irony of the book is that the reason that we are looking at espionage and subversion at scale is that we have this world historical improvement in our ability to cooperate at scale through these systems.
