Jeffrey Carr

Jeffrey Carr

Authority on cyber warfare and the actors who engage in it

  • @jeffreycarr
  • + Jeffrey Carr

Washington, District Of Columbia

Areas of Expertise:

  • Cyber warfare
  • cyber self defense
  • cyber intelligence
  • cyber espionage
  • cyber security
  • State and Non-State hackers
  • consulting
  • speaking
  • training
  • writing
Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.

Inside Cyber Warfare Inside Cyber Warfare
by Jeffrey Carr
Second Edition December 2011
Print: $44.99
Ebook: $38.99

Inside Cyber Warfare Inside Cyber Warfare
by Jeffrey Carr
December 2009
OUT OF PRINT

Jeffrey blogs at:




How to minimize your grad school debt

May 26 2015

This article is by staff writer Honey Smith. If you or a loved one will be headed to graduate school this fall, chances are you are worried about more than dorm survival. Instead, you may be wondering how to avoid six-digit student loan debt. It’s a valid fear — no… read more

Four short links: 26 May 2015

May 26 2015

Introduction to Keyboard Programming — what happens when you press a key. (hint: a lot) Oblique Strategies: Prompts for Programmers — Do it both ways. Very often doing it both ways is faster than analyzing which is best. Now you … read more

Four short links: 26 May 2015

May 26 2015

Introduction to Keyboard Programming — what happens when you press a key. (hint: a lot) Oblique Strategies: Prompts for Programmers — Do it both ways. Very often doing it both ways is faster than analyzing which is best. Now you … read more

Four short links: 25 May 2015

May 25 2015

Why Are Eight Bits Enough for Deep Neural Networks? (Pete Warden) — It turns out that neural networks are different. You can run them with eight-bit parameters and intermediate buffers, and suffer no noticeable loss in the final results. This … read more

Four short links: 25 May 2015

May 25 2015

Why Are Eight Bits Enough for Deep Neural Networks? (Pete Warden) — It turns out that neural networks are different. You can run them with eight-bit parameters and intermediate buffers, and suffer no noticeable loss in the final results. This … read more

Kyoto’s Nasty 22% City-Bike Hill Climb

May 24 2015

距離125mで高度上昇26m、22%の坂を頑張りました。 I went out for a long bike in the mountains of northern Kyoto on Saturday, and after 120km (75mi) of tough ups and pleasant downs with friends (that I'll write about separately), I made an attempt at a hill so steep that its name on Strava is "Nasty". It's… read more

Webcast: Preparing for a Cyber Attack
April 29, 2010
This one-hour presentation will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical advice on how to protect yourself and your organization...

"I recommend Inside Cyber Warfare for everyone, but especially for policy makers and people who talk about security."
--Michael Robinson, Digital Scofflaw

"As a guide to cyber warfare for US citizens, the book is an excellent reference..."
--Nick Dunn, BCS - The Chartered Institute for IT

"Read this important book to get the big, unnerving picture. Then start thinking–fast–of ways to better protect your computers, data, intellectual property and personal information."
--Si Dunn, Sagecreek Productions

"Most books on cyber warfare look at the subject area from a purely technical perspective. This book’s coverage of the macro issues associated with cyber war--including international law, involvement of organized crime, and state machinery--sets it apart from others in the field."
--Srijith Krishnan Nair, Computing Reviews

"The book is very well written and researched and an informative read."
--Marc Filippelli, San Francisco Book Review

"...this short but excellent and well-written volume it is not a technologist's guide to hacking activities, nor is is it a spy novel, but it carefully and interestingly relates the dimensions of a current political and economic problem brought about by the activities of political entities, criminal and terroristic elements. It will enable the reader to become well informed about an important Technology and Public Policy issue which pervades today's headlines. "
--Ira Laefsky, Amazon.com

"This book draws the curtain on a world that has, until now, been mostly in the shadows, but will be getting more attention in the future as the outcomes of "cyberspace battles" start shaping our world as surely as the "real battles" do."
--Zeljka Zorz, Help Net Security

"The cyber world provides numerous opportunities for sharing information and networking, but it also offers an ideal space for virtually undetectable espionage and criminal activities. "
--A. Jurek, Blogcritics.org