词条 | Jeffrey Carr |
释义 |
CareerIn 2008, Carr founded Project Grey Goose, a crowd-sourced open-source intelligence effort to attribute major cyber attacks.[2][3][4] The Project soliticited the expertise of vetted volunteers, while seeking to filter out non-experts and cyber criminals. The Project's first area of research was the campaign of cyberattacks during the Russo-Georgian War.[1] In 2011, Carr created the Suits and Spooks conference series, which offered a private forum for intelligence veterans to meet with technologists, academics, hackers, and business executives. The forum was acquired by Wired Business Media in 2014.[4] Carr was the founder of now-defunct cybersecurity firms Taia Global Ltd (also founder) and GreyLogic. He later wrote about the lessons he gained from their failures.[5][1][6] Carr has lectured on cybersecurity issues at the Defense Intelligence Agency, U.S. Army War College, Air Force Institute of Technology, NATO’s CCDCOE Conference on Cyber Conflict, and DEF CON.[7] Writing and researchHe is the author of Inside Cyber Warfare: Mapping the Cyber Underworld (O'Reilly Media 2009, 2011), which analyzed cyber conflicts from 2002 until 2009.[8][9][10] In Cyber Warfare, Carr argued that international cyber attacks are predominantly deployed by non-state actors, who are sometimes encouraged and tolerated by state entities.[1] Alternately, as Carr later told the Christian Science Monitor, it is private IT infrastructure, rather than government policy, that lies at the heart of US vulnerability to international cyber attacks.[11] Jeffrey Carr has blogged about cyber security and warfare at Intelfusion.net[1][12] (until September 1, 2010) and Forbes In March 2017, Carr stated there was growing doubt in the computer security industry regarding the narrative of Russian state sponsorship of hacks associated with the 2016 US elections. Carr stated that, because the FBI relied on forensic investigations by global cybersecurity consultancy CrowdStrike, "everyone else is relying on information they provided."[18] Several notable competitors of CrowdStrike, including Symantec and FireEye examined the underlying data and endorsed CrowdStrike's conclusions.[19] Professional publications
References1. ^1 2 3 4 {{Cite book|url=https://books.google.com/books?id=S6egBgAAQBAJ|title=Cyber Warfare: A Reference Handbook: A Reference Handbook|last=Springer|first=Paul J.|date=2015-02-24|publisher=ABC-CLIO|isbn=9781610694445|location=|pages=150–151|language=en}} 2. ^{{cite web|url=http://jeffreycarr.blogspot.com/2012/05/announcing-project-grey-goose-operation.html|title=Announcing Project Grey Goose - Operation Poachers|website=Jeff Carr Blog|publisher=Blogspot.com|last1=Carr|first1=Jeff|accessdate=4 March 2017}} 3. ^{{cite journal|url=https://www.wired.com/2009/08/the-project-grey-goose-cyberwar-report/|title=The Project Grey Goose cyberwar report|journal=Wired|last1=Sterling|first1=Bruce|accessdate=4 March 2017|date=2009-08-03}} 4. ^{{Cite web|url=http://www.securityweek.com/securityweek-acquires-suits-and-spooks-security-events|title=SecurityWeek Acquires Suits and Spooks Security Events {{!}} SecurityWeek.Com|website=www.securityweek.com|language=en|access-date=2017-03-04}} 5. ^{{Cite web | url=https://medium.com/@jeffreycarr/crushing-force-as-a-change-agent-945f75a95875 | title=Crushing Force as a Change Agent| date=2016-09-22}} 6. ^{{Cite news|url=https://www.forbes.com/2010/03/03/jeffrey-carr-internet-technology-security10-cyberwar.html|title=The Real Meaning Of Cyberwarfare|last=Greenberg|first=Andy|date=2010-03-03|work=Forbes|access-date=2017-03-04|language=en}} 7. ^{{cite web|url=http://www.oreilly.com/pub/au/3720|title=Jeffrey Carr|website=O'Reilly Media|accessdate=3 November 2016}} 8. ^{{cite web|url=http://lccn.loc.gov/2010282512 |archive-url=https://archive.is/20121212032303/http://lccn.loc.gov/2010282512 |dead-url=yes |archive-date=12 December 2012 |title=Inside cyber warfare |publisher=Library of Congress |accessdate=8 April 2012 |author=Library of Congress }} 9. ^{{cite journal|last1=Marks|first1=Larry|title=Inside Cyber Warfare, Mapping the Cyber Underworld, by Carr, Jeffrey|journal=Information Security Journal: A Global Perspective|date=4 July 2013|volume=22|issue=4|pages=201–202|doi=10.1080/19393555.2013.828804|issn=1939-3555}} 10. ^{{cite book|last1=Carr|first1=Jeffrey|title=Inside Cyber Warfare: Mapping the Cyber Underworld|url=http://dl.acm.org/citation.cfm?id=1734073|website=ACM Digital Library|publisher=O'Reilly Media, Inc.|date=1 January 2009|isbn=9780596802158}} 11. ^{{Cite news|url=http://www.csoonline.com/article/3174298/security/will-a-cyber-crisis-add-to-chaos-of-trump-s-first-100-days.html|title=Will a cyber crisis add to chaos of Trump’s first 100 days?|last=Armerding|first=Taylor|work=CSO Online|access-date=2017-03-04|language=en}} 12. ^1 {{cite web|author1=Flook, Kara|title=Russia and the Cyber Threat|url=https://www.criticalthreats.org/analysis/russia-and-the-cyber-threat|website=Critical Threats|accessdate=3 March 2017|date=May 13, 2009}} 13. ^Forbes, https://www.forbes.com/sites/jeffreycarr/#7a516d094e71 14. ^{{Cite book|url=https://books.google.com/?id=YqoZBAAAQBAJ&pg=PR24&lpg=PR24&dq=jeffrey+carr+forbes+blog#v=onepage&q=jeffrey%20carr%20forbes%20blog&f=false|title=Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace|last=Shackelford|first=Scott J.|date=2014-07-10|publisher=Cambridge University Press|isbn=9781107354777|location=|pages=xxiv|language=en}} 15. ^{{Cite book|url=https://books.google.com/?id=gZMVN720YX0C&pg=PA186&lpg=PA186&dq=jeffrey+carr+forbes+blog#v=onepage&q=jeffrey%20carr%20forbes%20blog&f=false|title=Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World|last=Reveron|first=Derek S.|date=2012-09-11|publisher=Georgetown University Press|isbn=978-1589019188|location=|pages=186, 187|language=en}} 16. ^{{Cite news|url=https://www.theatlantic.com/technology/archive/2010/03/if-you-were-going-to-read-only-one-thing-about-cyber-security/38148/|title=If You Were Going to Read Only One Thing About Cyber-Security...|last=Fallows|first=James|work=The Atlantic|access-date=2017-03-04|language=en-US}} 17. ^{{Cite news|url=https://blogs.technet.microsoft.com/publicyte/2011/10/26/interview-with-cybersecurity-expert-and-suits-spooks-founder-jeffrey-carr/|title=Interview With Cybersecurity Expert And Suits & Spooks Founder Jeffrey Carr|last=|first=|date=|work=Publicyte {{!}} Microsoft Technet|access-date=2017-03-03|language=en-US}} 18. ^{{cite web |title=Were the hackers who broke into the DNC's email really Russian |url=http://www.miamiherald.com/news/nation-world/national/article140461978.html |publisher=Miami Herald |date=March 24, 2017}} 19. ^Kevin Poulsen, "How the U.S. Hobbled Its Hacking Case Against Russia and Enabled Truthers", The Daily Beast, January 6, 2017, [https://www.thedailybeast.com/how-the-us-hobbled-its-hacking-case-against-russia-and-enabled-truthers] External links
3 : Living people|O'Reilly writers|Year of birth missing (living people) |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。