Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies.
His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.
On January 9, 2008, President Bush signed National Security Presidential Directive (NSPD) 54 / Homeland Security Presidential Directive (HSPD) 23 which back then was classified TOP SECRET. That document was declassified with some redacted material by the NSA on June 5, 2014 thanks to an FOIA request. The purpose of… read more
Here’s my paper written for the Georgetown Journal of International Affairs (March 2014) on the importance of classifying your valuable data. The Classification of Valuable Data in an Assumption of Breach Paradigm (.pdf) Enjoy! Jeffrey Carr (CEO, Taia Global, Inc.) read more
Chances are good that you haven’t heard of S&TI. It’s not one of the INTs that IC watchers love to write about. It’s not in vogue like SIGINT and it’s definitely not as sexy as HUMINT. It is, however, what I and my fellow researchers at Taia Global have been… read more
As a cyber security author and CEO of a security consulting company, I was personally shocked by the RSA’s attitude about the alleged secret payments it received from the NSA as well as its willingness to weaken its BSAFE product; … read more
After reading about the latest British concerns over cyber espionage activities occurring seemingly at will across its classified and unclassified networks, I was happy to read about this April 1, 2009 effort by the European Commission which included the following... read more
Webcast: Preparing for a Cyber Attack April 29, 2010
This one-hour presentation will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect yourself and your organization...
"I recommend Inside Cyber Warfare for everyone, but especially for policy makers and people who talk about security."
--Michael Robinson, Digital Scofflaw
"Read this important book to get the big, unnerving picture. Then start thinkingfastof ways to better protect your computers, data, intellectual property and personal information."
--Si Dunn, Sagecreek Productions
"Most books on cyber warfare look at the subject area from a purely technical perspective. This books coverage of the macro issues associated with cyber war--including international law, involvement of organized crime, and state machinery--sets it apart from others in the field."
--Srijith Krishnan Nair, Computing Reviews
"...this short but excellent and well-written volume it is not a technologist's guide to hacking activities, nor is is it a spy novel, but it carefully and interestingly relates the dimensions of a current political and economic problem brought about by the activities of political entities, criminal and terroristic elements. It will enable the reader to become well informed about an important Technology and Public Policy issue which pervades today's headlines. "
--Ira Laefsky, Amazon.com
"This book draws the curtain on a world that has, until now, been mostly in the shadows, but will be getting more attention in the future as the outcomes of "cyberspace battles" start shaping our world as surely as the "real battles" do."
--Zeljka Zorz, Help Net Security
"The cyber world provides numerous opportunities for sharing information and networking, but it also offers an ideal space for virtually undetectable espionage and criminal activities. "
--A. Jurek, Blogcritics.org