Jeffrey Carr

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Jeffrey Carr is a cybersecurity analyst and expert.[citation needed] He lives in Seattle, Washington.[1] He is founder and CEO of Taia Global.[2] He is also the founder and principal investigator of Project Grey Goose, an open-source investigation into cyber conflicts including the Russian cyber attacks on Georgia, the Indian Eastern Railway website defacement, and the Israeli-Hamas war in 2008 to 2009.[3] He is also a government contractor who is consulted on Russian and Chinese cyber warfare strategy and tactics.[4]



Jeffrey Carr founded Project Grey Goose on August 22, 2008. Both parts one and two of Project Grey Goose are available online.[6] Project Grey Goose was converted into Greylogic, a consulting company which provides information services to governments, in 2009.[6] Jeffrey Carr founded Taia Global in 2010. Taia Global provides physical and cyber security countermeasures to protect corporate executives and government officials.[7]

Public life[edit]


Jeffrey Carr has lectured on cyber-security issues at the Defense Intelligence Agency, U.S. Army War College, Air Force Institute of Technology, NATO’s CCDCOE Conference on Cyber Conflict, and DEF CON.[8] Many news sites have quoted him including the New York Times, Washington Post, The Guardian, BusinessWeek, WMD Insights, The Industry Standard, Info Security News[9] Parameters, and Wired.[10]


Jeffrey Carr was the author of the Intelfusion Blog until September 1, 2010. He started, but has now[when?] stopped, writing in The Firewall, a cybersecurity blog at Forbes because of disagreement.[11][12] He was also a columnist for Symantec’s Security Focus.[13] He also wrote the book Inside Cyber Warfare which was published on December 15, 2009.[14] The book documents cyber conflicts from 2002 until 2009.[14] Both General Kevin P. Chilton, Commander USSTRATCOM and his Chief of Staff MG Abraham J. Turner have endorsed this book.[15]


Jeffrey Carr does not agree with many experts about the origin of the Stuxnet worm believing it to come from China and not a joint U.S.-Israel venture. He has repeatedly presented his opinion on his blog at Forbes. He believes it is China because China has the cyber capabilities to produce the Stuxnet worm.[16] India’s satellite program was also infected with the Stuxnet worm.[17] China has cyber attacked India in the past and is engaged in a space race with India. Also, the other countries infected the most were in Asia or Eurasia and produce key resources which China needs.[16]


  1. ^ "Russia’s Silicon Valley Dreams May Threaten Cybersecurity", Centre for Counterintelligence and Security Studies News, 15 November 2010 <retrieved on February 10, 2011>
  2. ^ Taia Global,
  3. ^ "12th Annual 2009 NYS Cyber Security Conference", New York State: Office of Cyber Security.
  4. ^ O'Reilly Community, <accessed on February 10, 2011>
  5. ^ O'Reilly Community, <accessed on February 10, 2011>
  6. ^ a b "Cyber Warfare: Project Grey Goose Phase II Report on INDIA". 28 March 2009. Retrieved 8 April 2012. 
  7. ^ Taia Global Inc, <accessed on February 10, 2011>
  8. ^ O'Reilly Community, <accessed on February 10, 2011>
  9. ^ 12th Annual 2009 NYS Cyber Security Conference, New York State: Office of Cyber Security,
  10. ^ O'Reilly Radar, <accessed on February 10, 2011>
  11. ^ Forbes,
  12. ^ Greylogic
  13. ^ O'Reilly Radar,<accessed on February 10, 2011>
  14. ^ a b Library of Congress. "Inside cyber warfare". Library of Congress. Retrieved 8 April 2012. 
  15. ^ Carr, Jeffrey. "About Me". Forbes. Retrieved 8 April 2012. 
  16. ^ a b Miks, Jason, "Was China Behind Stuxnet?", The Diplomat, 21 October 3010.
  17. ^ Parashar, Sachin, "China hitting India via Net worm?", The Times of India, 11 October 2010.

External links[edit]

  • Official Twitter account
  • Carr, Jeffrey. Inside Cyber Warfare: Mapping the Cyber Underworld. Sebastopol, California: O’Reilly Media, 2009.