Jeffrey Carr

Jeffrey Carr

Authority on cyber warfare and the actors who engage in it

  • @jeffreycarr
  • + Jeffrey Carr

Washington, District Of Columbia

Areas of Expertise:

  • Cyber warfare
  • cyber self defense
  • cyber intelligence
  • cyber espionage
  • cyber security
  • State and Non-State hackers
  • consulting
  • speaking
  • training
  • writing
Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.

Inside Cyber Warfare Inside Cyber Warfare
by Jeffrey Carr
Second Edition December 2011
Print: $44.99
Ebook: $38.99

Inside Cyber Warfare Inside Cyber Warfare
by Jeffrey Carr
December 2009
Ebook: $31.99

Recent Posts | All O'Reilly Posts

Jeffrey blogs at:

Former Classified Presidential Directive to anticipate foreign cyber and tech developments

June 08 2014

On January 9, 2008, President Bush signed National Security Presidential Directive (NSPD) 54 / Homeland Security Presidential Directive (HSPD) 23 which back then was classified TOP SECRET. That document was declassified with some redacted material by the NSA on June 5, 2014 thanks to an FOIA request. The purpose of… read more

Classification of Valuable Data for Assumption of Breach

March 28 2014

Here’s my paper written for the Georgetown Journal of International Affairs (March 2014) on the importance of classifying your valuable data. The Classification of Valuable Data in an Assumption of Breach Paradigm (.pdf) Enjoy! Jeffrey Carr  (CEO, Taia Global, Inc.) read more

ODNI must improve Global R&D monitoring (our focus since 2010)

March 19 2014

Chances are good that you haven’t heard of S&TI. It’s not one of the INTs that IC watchers love to write about. It’s not in vogue like SIGINT and it’s definitely not as sexy as HUMINT. It is, however, what I and my fellow researchers at Taia Global have been… read more

The RSA/NSA controversy concerns you!

February 18 2014

As a cyber security author and CEO of a security consulting company, I was personally shocked by the RSA’s attitude about the alleged secret payments it received from the NSA as well as its willingness to weaken its BSAFE product; … read more

Why cloud services are a tempting target for attackers

December 05 2011

Before organizations embrace the efficiencies and cost savings of cloud services, they should also closely consider the security repercussions and liabilities attached to the cloud. read more

Is the European Union Finally Taking Cyber Security Seriously?

April 03 2009

After reading about the latest British concerns over cyber espionage activities occurring seemingly at will across its classified and unclassified networks, I was happy to read about this April 1, 2009 effort by the European Commission which included the following... read more

Recent Posts | All O'Reilly Posts

Webcast: Preparing for a Cyber Attack
April 29, 2010
This one-hour presentation will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect yourself and your organization...

"I recommend Inside Cyber Warfare for everyone, but especially for policy makers and people who talk about security."
--Michael Robinson, Digital Scofflaw

"As a guide to cyber warfare for US citizens, the book is an excellent reference..."
--Nick Dunn, BCS - The Chartered Institute for IT

"Read this important book to get the big, unnerving picture. Then start thinking–fast–of ways to better protect your computers, data, intellectual property and personal information."
--Si Dunn, Sagecreek Productions

"Most books on cyber warfare look at the subject area from a purely technical perspective. This book’s coverage of the macro issues associated with cyber war--including international law, involvement of organized crime, and state machinery--sets it apart from others in the field."
--Srijith Krishnan Nair, Computing Reviews

"The book is very well written and researched and an informative read."
--Marc Filippelli, San Francisco Book Review

"...this short but excellent and well-written volume it is not a technologist's guide to hacking activities, nor is is it a spy novel, but it carefully and interestingly relates the dimensions of a current political and economic problem brought about by the activities of political entities, criminal and terroristic elements. It will enable the reader to become well informed about an important Technology and Public Policy issue which pervades today's headlines. "
--Ira Laefsky,

"This book draws the curtain on a world that has, until now, been mostly in the shadows, but will be getting more attention in the future as the outcomes of "cyberspace battles" start shaping our world as surely as the "real battles" do."
--Zeljka Zorz, Help Net Security

"The cyber world provides numerous opportunities for sharing information and networking, but it also offers an ideal space for virtually undetectable espionage and criminal activities. "
--A. Jurek,