Jeffrey Carr has been an internationally-known cybersecurity adviser, author, and researcher since 2006. He invented REDACT, the world’s first global R&D database and search engine to assist companies in identifying which intellectual property is of value to foreign governments. He is the founder and organizer of Suits & Spooks (now Safe House Global), a “collision” event to discuss hard challenges in the national security space.
Jeffrey has contracted with the CIA’s Open Source Center’s Eurasia Desk as a Russia SME (2010), and has provided cyber intelligence briefings to the DIA, the FBI, and the Chief of Naval Operations Strategic Study Group. He has been a frequent lecturer at the U.S. Air Force Institute of Technology and the U.S. Army War College, and was a technical peer reviewer for Tallinn 2.0, the second edition of the Tallinn Manual on the International Law Applicable To Cyber Operations.
Jeffrey’s book ‘Inside Cyber Warfare: Mapping the Cyber Underworld” has been published in two editions (2009 and 2011) by O’Reilly Media and continues to be used as a textbook in many university and military academy classrooms. Jeffrey is honored to be a Ponemon Research Distinguished Fellow, and a WikiStrat senior analyst.
Here is where you can read about the research that will be going into the third edition of Inside Cyber Warfare, including the cyber attacks of the current Russia-Ukraine War and the breaches of Russian government agencies carried out by cyber units of Ukraine’s Defense Intelligence Service.
Cyber Security Expert Says Ukrainian Hackers Are Breaking Into Russian Networks
March 25, 2022 NBC News
Interview on Times Radio Breakfast Show w/ Aasmah Mir and Luke Jones about Ukraine’s Defense Intelligence Service Cyber Operations against Russia. Begins at 00:25:00.
Mar 16, 2022 Times Radio
In a first, Ukraine leaks Russian intellectual property as an act of war
Mar 11, 2022 SC Media
Navigating PIPL: European businesses plot their next steps into China
Jan 27, 2022 Computer Weekly
China could spy on Army with TikTok – ‘There’s literally a hashtag!’
Nov 27, 2021 Express UK
If China were to spy on the US military on TikTok: three different defense scenarios
Nov 25, 2021 Cyber News
In Ukraine, a Malware Expert Who Could Blow the Whistle on Russian Hacking
Aug 16, 2017 New York Times
D-Day In Kyiv: My experience working with Ukraine’s Offensive Cyber team
Mar 22, 2022 O’Reilly Radar
Under What Circumstances May Civilian Hackers Be Targeted For Killing?
Sep 1, 2016 European Cybersecurity Journal, Vol 2, Issue 3
Responsible Attribution: A Prerequisite For Accountability
2014 The Tallinn Papers, No. 6
The Classification of Valuable Data in an Assumption of Breach Paradigm
Mar 2014 Georgetown Journal of International Affairs
The Misunderstood Acronym: Why Cyber Weapons aren’t WMD
Sep 1, 2013 Bulletin of the Atomic Scientists
Intelligence Preparation of the Information and Communications Environment
2012 Air & Space Power Journal Vol. 24, No. 3
A Privacy Blowback Is Coming For FAANG Stocks
Sep 10, 2019 SeekingAlpha.com
Helios And Matheson Called The Wrong Data Play
August 8, 2018 SeekingAlpha.com
Netflix, Facebook, And 11 Others Flunked Their GDPR Privacy Assessments
December 11, 2018 SeekingAlpha blog