CARVIEW |
https://twitter.com/jeffreycarr
Cyber warfare and intelligence expert
Areas of Expertise:
- Founder and Principal Investigator - Project Grey Goose
- Lecturer on Cyber Warfare
- Columnist for Security Focus
- Author of "Inside Cyber Warfare: Mapping the Cyber Underground".
- consulting
- speaking
- training
- writing
Biography
Books
|
Blog
Recent Posts | All O'Reilly Posts
Jeffrey blogs at:
https://intelfusion.net/wordpress/
https://oreilly.com/blogs/
The evolution of cyber attacks from 1999 to 2010
May 05 2010
Posting is going to be light this week due to my speaking engagement at the TTI/Vanguard conference in DC, but I did want to post a graphic that I created as part of tomorrow’s presentation which shows the evolution of cyber attacks in three phases. I’ll spend more time on… read moreRyan Singel speaks with Russian media about Cyber War “hoax”
April 30 2010
In a stunning display of either complete ignorance or deliberate misrepresentation, Ryan Singel of Wired’s ThreatLevel blog appears onRussia Today to explain what’s real and what’s fiction about cyber warfare. In the interview, Singel acknowledges that?”there are hackers trying to steal your email, your bank account” and that there are “chinese… read moreWhat I’ll be covering in today’s Gov 2.0 webcast
April 29 2010
I hope you can attend my O’Reilly Media Gov 2.0 webcast today (1000 Pacific) on “Preparing for a Cyber Attack“. I’ll spend about 30 minutes briefing attendees on the scope of the cyber threatscape, the 3 classes of actors involved, what the R&D priorities for the RF and PRC are… read moreUse a proxy server. Feed an Intel service.
April 28 2010
There are many government agencies both in the U.S. and around the world who restrict their employees from visiting social networking sites (SNS) through the use of a firewall filter. Anyone care to make a guess as to how that’s working? While some employees honor their organization’s policy, many are… read moreThe DNS attacks as a Tale of Geeks & Wonks
April 27 2010
Few issues highlight the eternal geek vs. wonk face-off better then a spate of DNS breakdowns we have had in recent months. Geeks think in tem of better procedures or protocols, and wonks think in terms of better policy or practice, and never the twain shall meet. As a card-carry… read moreAre you at risk for a cyber attack?
April 23 2010
In anticipation of a free Webcast that O’Reilly Media has asked me to give on April 29th entitled “Preparing for a Cyber Attack“, I’ve put together a short list of questions to help you determine if you should attend. There’s only three of them: 1. Are you employed by: a U.S.… read moreThe Hollow Men – a Cyber allegory?
April 16 2010
Shape without form, shade without colour, Paralysed force, gesture without motion; Those who have crossed With direct eyes, to death’s other Kingdom Remember us – if at all – not as lost Violent souls, but only As the hollow men The stuffed men. - excerpt from “The Hollow Men” by T.S. Elliot (1923) I’m not much for poetry, but… read moreMicrosoft denies role in closure of Stan TV by Kyrgyz Police
April 14 2010
Figure 1: Stan.TV computers seized for suspected Microsoft copyright infringement It took several days but I did receive an official response from Microsoft regarding my post “Microsoft on the wrong side of the Kyrgyzstan revolution“. According to an unnamed Microsoft spokesperson: “The raid against Stan Media was initiated by the Kyrgyz police… read moreWebinar: Where Cyberwarfare and Cybersecurity Meet
April 13 2010
I’m pleased to announce that I’ll be one of three panelists for this free Webinar sponsored by the 1105 Government Information Group. If you haven’t already registered, I believe you can do so at the above link. Here’s information on the event taken from the website: “1105 Government Information Group will… read moreMicrosoft on the wrong side of the Kyrgyzstan revolution
April 12 2010
In my earlier post on the recent Kyrgyzstan revolution, I commented on the lack of cyber attacks and what that implies for this event. Now, thanks to the help of a contact in Central Asia, I see that the Bakiev administration had effectively shut down all opposition media in the… read moreKyrgyzstan has its revolution but no cyber warfare – why?
April 08 2010
The country of Kyrgyzstan is in the midst of a revolution as former President Kurmanbek Bakiyev is in hiding and its Prime Minister and the rest of the Kyrgyzstan government has resigned. The interim government is headed by Roza Otunbaeva and a 13 member cabinet; two of whom met with… read moreAnti-Bauxite mining group in Vietnam is the focus for botnet-building malware attack
April 05 2010
McAfee recently announced that botnet-building malware discovered during its investigation into the Google attacks in December, 2009 and January, 2010 is not part of the alleged Chinese computer network exploitation (CNE) operation as originally believed. Dmitrie Alperovitch placed the blame for the mistake on a hectic atmosphere at McAfee which… read moreRecordedFuture.com and the power of 3
March 31 2010
One of the intelligence practices that GreyLogic analysts like to engage in is predicting where future threats may emerge. Prediction of future threats is part science, part art and it always finds an audience inside the Beltway ( for better or for worse). Personally, I think threat forecasts are a lot… read moreRobert Knake responds to my criticism of his essay on Cyber Terrorism
March 28 2010
On February 16, 2010, Robert Knake wrote an essay for CFR entitled “Cyberterrorism: Hype v. Fact“. I wrote a criticism of it here. I was subsequently contacted by Robert via an email. We met in Washington DC for a drink and a chat, and I enjoyed our discussion very much.… read moreMarch 28 2010
Regardless of your position on the over-hyped and under-estimated realm of cyber conflict, crime, and espionage, you probably have a few pet fallacies. I thought it might be fun, and possibly instructive, to start a conversation about them. Here are my top five. Feel free to add yours in the… read moreMarch 27 2010
1. Here’s my conference schedule through September. If you’re planning to attend any of these events, please be sure to say hello. If you’re interested in some great tips on how we collect OSINT in the Russian Federation, check out the course that some colleagues and I will be teaching… read morePurchase a signed copy of “Inside Cyber Warfare” and help a rescued animal
March 27 2010
I am auctioning off a signed copy of Inside Cyber Warfare to sell on eBay in order to raise money for the Oakland Animal Shelter. That auction will expire in about 23 hours from now. In addition, I’m offering 4 more copies, also signed, that can be purchased for a flat… read moreLarge scale defacements of Swedish websites by Turkish hacktivists
March 23 2010
Figure 1: Screenshot from 1923Turk defacement of https://www.arjeplog.se The Swedish parliament recently passed a resolution recognizing the deaths of hundreds of thousands of Armenians by the Ottoman Empire (now the nation state of Turkey) in 1915 and 1916. The Turkish government has protested the action by Sweden as well as the… read moreChinese researchers, the U.S. power grid, and plausible deniability
March 21 2010
The New York Times just ran a story on a year-old paper written by two Chinese researchers which documented a more efficient way to create a cascading failure on the Western power grid of the U.S. The focus of the article by John Markoff and David Barboza wasn’t on the… read moreMarch 20 2010
Among the InfoSec news below, you can help save an innocent life this weekend: Following up on my earlier post about these poor dogs, please donate to Friends of Oakland Animal Shelter for their medical care. And even more importantly, please consider adopting one. The Oakland shelter is over-crowded and… read moreZeuS criminals run a Poisoning the Well attack against IntelFusion and GreyLogic
March 18 2010
Figure 1: IP address of server hosting .info domains for greylogic, intelfusion, and dhsinfo On or around March 8, 2010 a member of the Russian criminal gang behind the ZeuS botnet registered the remaining available TLD’s for this blog’s name “IntelFusion”, my company’s name “GreyLogic” and DHS “DHSinfo” for use as… read moreURGENT ANNOUNCEMENT: Please Help Me Save These Dogs From Being Killed
March 17 2010
Figure 1: Click on this image to access the video file Yesterday, March 16, 23 Pit Bulls ranging from puppies to adults were rescued from a horribly abusive existence in Oakland, CA by Oakland Animal Services. That’s the good news. The bad news is that the acting director of Oakland Animal… read moreThe Alchemical Web: Bringing about Regime Change through the Internet Protocol
March 15 2010
As I mentioned last Friday, IntelFusion has been syndicated by Forbes.com. I’ll continue writing for both blogs, of course, although not all posts will be suitable for both venues. Or, as is the case today, I won’t have the time to reproduce them at both venues. Nevertheless, I think The… read moreCall for Papers: Cyber Warfare and Nation States
March 15 2010
Call for Papers Cyber Warfare and Nation States: Recent developments in offensive and defensive capabilities to advance national interests 23 September 2010, Canberra,?Australia Call for presentations open until 10 May 2010. Download?Call for Presentations. “The availability of cyber attack technologies for national purposes greatly expands the range of options available to U.S. policy makers… read moreIranian Military and Intelligence Op attacks U.S. Networks
March 14 2010
In a first for any nation, the Islamic Republic of Iran has announced that a division of its Armed Forces – the IRGC – has launched a cyber attack against an alledged U.S. spy network financed by the CIA under cover of the U.S. State Department’s International Broadcasting Bureau (IBB).… read moreDo you think that online gaming can enhance analytic performance? IARPA wants to know.
March 13 2010
World of Warcraft screenshot The Intelligence Community’s version of DARPA, known as IARPA, has issued a fascinating pre-solicitation (IARPA-RFI-10-04) which asks for a brief pager on how immersive games and virtual worlds can help overcome some of the common problems experienced by intelligence analysts, such as groupthink, premature attachment to early… read moreMarch 12 2010
Lots of cool things to share today: - I’m honored that I’ve been asked by Forbes.com to write for their new blog The Firewall. My first post is up entitled “In the Land Where Profit is King, Security Suffers“. Please check it out, and pass the word. - My blogging pal and… read moreWill the Kremlin use Information Warfare to suppress growing dissent?
March 12 2010
Figure 1: Tide of protests engulf more Russian cities Of all the countries in the world which are developing cyber capabilities, the Russian Federation leads the pack in its use of Information Warfare (the Kremlin’s terminology for cyber operations). It’s happened during the Tulip revolution in Kyrgyzstan (tomorrow, March 13, 2010… read moreThe US Army and the BEST definition of Cyberspace to date
March 12 2010
The US Army’s new?Cyberspace Operations?Concept Capability Plan?2016-2028 is an outstanding piece of work; not just because it underscores much of what I’ve been saying since 2008, but because it builds a detailed framework of cyberspace as an operating environment which will prove invaluable to every agency in the Intelligence Community… read moreFormer Director for Operations at DIA nominated to lead TSA
March 10 2010
TSA, which has seemed completely lost in the woods regarding how to accomplish its mission, will finally have the benefit of an experienced intelligence officer at the helm. The following comes from AviationNews.net: President Obama’s decision to nominate retired Army Maj. Gen. Robert Harding as TSA administrator brings the agency a… read moreYell “Chinese dissidents’ gmail hacked” and people say “huh?” Yell “Cloud” and you lose millions.
March 09 2010
While there’s far too much information about the December attacks on Google and 30+ other companies that remain unknown, consider what the following companies who were victims of these attacks have in common: Google Yahoo Adobe Intel Rackspace Juniper Networks They either provide Cloud services (Google, Yahoo, Adobe) or support them in some way, i.e.:… read moreRussian and Ukrainian criminals favor The Planet for their Web hosting
March 08 2010
James McQuaid has published an eye-opening post which graphically demonstrates what I’ve been saying ever since the first Project Grey Goose report came out in October, 2008; i.e., that the U.S. is the favored hosting provider for bad actors around the world. In this case, we’re talking about criminal enterprises… read more“Cyber War”, by any other name, is still a major f’ng problem
March 07 2010
I’m so tired of this constant back and forth bullshit over whether or not cyber war exists. It’s just a term, for better or for worse, that members of the public recognize. Whether or not the term has merit is not the point. I’ve repeatedly said that cyber war doesn’t… read moreUpdate on the “accidental shooting” of Magomed Yevloyev
March 05 2010
I couldn’t believe this story when I first read about it on August 31, 2008. In fact, I blogged about it at the time because it reminded me of the accidental shooting scene in Pulp Fiction. Here’s how RIA Novosti reported it back then: MOSCOW, August 31 (RIA Novosti) – The… read moreMarch 04 2010
Here are some of the important events of the last few days that I haven’t had time to blog about but would like to briefly share with you: The takedown of the Mariposa botnet is a wonderful case study of how the collaboration between international law enforcement agencies with the… read moreImagine if Russia or China announced a formal policy of using non-state actors in cyber deterrence
March 03 2010
As I pointed out earlier, Initiative #10 states that the U.S. will be “building an approach to cyber defense strategy that deters interference and attack in cyberspace by improving warning capabilities, articulating roles for private sector and international partners, and developing appropriate responses by both state and non-state actors.“ About a… read moreSome thoughts on the release of the Comprehensive National Cybersecurity Initiative
March 03 2010
Today’s release of the Comprehensive National Cybersecurity Initiative (CNCI) is the White House’s follow-up to the Cyberspace Policy Review of May, 2009. The delay in its release was most likely due to the delay in President Obama’s appointment of Cybersecurity Coordinator Howard Schmidt, but overall I’m happy with Schmidt’s appointment… read moreIntelFusion.net or IntelFusion.com? There is a difference.
February 28 2010
When I started this blog in March, 2007, the .com domain for IntelFusion wasn’t available, and if you clicked on it by mistake when looking for my blog, it didn’t matter because it was obvious you typed something other than IntelFusion.NET. Unfortunately, since December, 2009, that is no longer the case.… read moreA Definitive Counter Cyber Operation in 3 Easy Steps
February 26 2010
You’ve probably read Mike McConnell’s editorial in yesterday’s Washington Post “We’re losing the cyber war. Here’s the strategy to win it.” Overall, it was a pretty good article which promoted the implementation of these tactics: 1. Re-engineer the Internet to make attribution easier. 2. For irrational actors (i.e., terrorist groups), preemptively “degrade,… read moreThe Way of the Intercepting Cyber Fist
February 21 2010
A Jeet Kune Do man who says Jeet Kune Do is exclusively Jeet Kune Do is simply not with it. He is still hung up on his self-closing resistance, in this case anchored down to reactionary pattern, and naturally is still bound by another modified pattern and can move within… read moreU.S. government departments and agencies hit by the ZeuS trojan
February 19 2010
The following is a partial list of U.S. government agencies, departments, and offices which were targeted in the Zeus spear phishing attack that spoofed my email address. I pulled these names from the “Out of Office” replies that I received on the day of the attack. Since my email address… read moreIn memory of 4 slain police officers, meet ROGeR
February 18 2010
“A local breeder has donated a German shepherd puppy to the Lakewood Police Department after four officers were killed last year at a Parkland coffee shop. The 3-month-old pup has been named ROGeR, according to the department. The name contains the first letter of the last name of the officers… read moreRobert Knape’s “Cyber-terrorism Hype v Fact” is short on Facts
February 17 2010
Robert Knape is an accomplished, well-educated individual who’s a principal at Good Harbor consulting, which in my opinion is one of the better consulting firms in DC. ?For that reason, I was quite surprised by the position he took in his CFR article “Cyber-terrorism: Hype v Fact“. He focused much of… read moreStand by for cyber mayhem from Chinese Hacktivists on February 18th
February 14 2010
2010 is the Year of the Tiger and today, February 14th marks the start of the 15 day Chinese New Year celebrations. Day 5, which would be February 18th, is when President Obama meets with the Dalai Lama. I wonder who set the schedule for this because?day 5 is one… read moreCyber Intelligence through the LookingGlass
February 12 2010
I don’t know if it’s the name of the company or their product, but after watching a demo of LookingGlass’ ScoutVision platform, GreyLogic’s business focus for 2010 suddenly became crystal clear. Right now there are multiple ideas around what constitutes “cyber intelligence”. I’ve said in past posts (here and here) that… read moreCyber Warfare: Don’t inflate it. Don’t underestimate it.
February 12 2010
I was recently interviewed by Mac Slocum for an article at O’Reilly Radar which, I have to say, is a pretty damn, good interview! Thanks, Mac – you made me sound smarter than I really am – always a good thing! read moreRussian Information Security Training for 2010 and Beyond: What you need to know
February 11 2010
Information Security standards are published by the Russian Federation Ministry of Science and Education based on curriculum developed by a scientific advisory board chaired by the Federal Security Service (FSB) that includes government and academic members. This report identifies the following key areas: History of Russian IT Security Training (Post… read moreFebruary 11 2010
As you know from my previous post, a new phishing scam targeting .mil and .gov employees was sent out early yesterday morning pretending to be from me. It contained two links pretending to be Microsoft patches but actually they delivered a zbot trojan (Zeus) which frequently avoids detection by most… read moreThat email didn’t come from me
February 10 2010
I guess I should feel flattered. One of my “fans” is spoofing my greylogic.us email address. If you receive an email from me with the subject line “Russian spear phishing attack against .mil and .gov employees”, check the full headers because it didn’t come from me.?Also check the signature line.… read morePlease read James Fallows’ article “Cyber Warriors”
February 10 2010
James Fallows’ “Cyber Warriors” in The Atlantic is a must-read piece for everyone with an opinion on cyber war; particularly if you’re suffering from “Red Menace” fever. Naturally, I liked reading that the consensus of Fallows’ round table of experts including James Lewis, Mike McConnell, Ed Georgio, Eugene Spafford, and others… read moreRecent Posts | All O'Reilly Posts
Multimedia
Webcast: Preparing for a Cyber Attack
April 29, 2010
Duration: Approximately 60 minutes. Cost: Free This one-hour presentation will separate the hype from the facts regarding ongoing foreign intrusions into government networks and the targeting of government employees. It will also provide practical...
Hire Jeffrey Carr
For Inquiries Contact
Press Inquiries
Find Other Authors
Buy Now and Save
Use discount code: OPC10

All orders over $29.95 qualify for free shipping within the US. See details.

![]() ©2010, O'Reilly Media, Inc. (707) 827-7000 / (800) 998-9938 All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. |
About O'Reilly
Academic Solutions Authors Contacts Customer Service Jobs Newsletters O'Reilly Labs Press Room Privacy Policy RSS Feeds Terms of Service User Groups Writing for O'Reilly |
Content Archive Business Technology Computer Technology Microsoft Mobile Network Operating System Digital Photography Programming Software Web Web Design |
More O'Reilly Sites
O'Reilly Radar Ignite Tools of Change for Publishing Digital Media Inside iPhone makezine.com craftzine.com hackszine.com perl.com xml.com Partner Sites InsideRIA java.net O'Reilly Insights on Forbes.com |