Media Portfolio
I have been cited, quoted, and referenced by various outlets including The Washington Post, NBC, Bloomberg, Bloomberg Law, BBC, The Wall Street Journal, USA Today, CNN, VICE, and Newsweek.
I was included in Feedspot’s list of top 90 cybersecurity influencers on X (2026), RSA Conference Influencer eBook (Meritt Group, 2025), Who’s Who in Cybersecurity (Hardenstance, 2022), and Check Point SASE’s ranking of 200 global cybersecurity influencers (2021).
The following public portfolio brings together a selection of my published interviews, research, and commentary.
It is intended as a reference for journalists, collaborators, and readers who want to learn more about I have applied my experiences to various problems in an interdisciplinary manner.
My work reflects a consistent set of concerns: how complex systems fail, how those failures affect people with the least power to protect themselves, and what can realistically be done about it.
The approach has remained consistent across different roles and venues: to describe problems as clearly as possible, rely on evidence, and remain willing to name institutional weaknesses—even when doing so is uncomfortable or threatening to powerful interests.
Quotations and Citations
Stephen Miller Lists $3.7M Home a Month After Protesters Chalked Outside
October 17, 2025 | Newsweek
Woman’s unimpressed reaction to Trump during medal ceremony goes viral
May 21, 2025 | Daily Dot
Halliburton confirms a cyberattack forced it to take its systems offline
August 23, 2024 | CNN Business
Unmusked: How Elon Musk is Using X to Poison our Democracy
August 10, 2024 | Byline Supplement
JD Vance endorsed a book calling far-left ‘unhumans,’ and praising fascist dictators
August 8, 2024 | USA Today
“Gay furry hackers” leak revealing data from major anti-LGBTQ+ Republican think tank
July 10, 2024 | LGBTQ Nation
Top US Cyber Agency Pushing Toward First Hack Reporting Rule
October 19, 2023 | Bloomberg Law
Suspended from X.Com: The Cult of the Genius Tech Bro
September 12, 2023 | Byline Supplement
Maker Naomi Wu is Silenced by Chinese Authorities (And Why I Blame Elon Musk)
August 23, 2023 | Skepchick
Did the Chinese military launch missiles into Taiwan’s airspace?
April 18, 2023 | Radio Free Asia
Twitter Whistle-Blower Allegations Spark Concerns About National Security Risk
August 23, 2022 | Bloomberg
Your privacy is at risk now that Roe v. Wade has fallen, experts warn
June 24, 2022 | Mashable
The cost of ransomware attacks has more than doubled. Here’s how companies can prevent and plan for these attacks, according to experts
May 17, 2022 | Business Insider
Grimes Claims Responsibility for 2012 Hack of Hipster Runoff
March 24, 2022 | Engadget
Grimes Outs Herself as the Culprit Behind Music Blog Hipster Runoff’s Infamous Hack
March 24, 2022 | GQ
Grimes Admits To Hacking, Blackmailing Indie Music Blog Hipster Runoff
March 24, 2022 | Paste Magazine
Grimes Said She Orchestrated Cyberattack That Shut Down ‘Hipster Runoff’
March 24, 2022 | VICE
IRS will require taxpayers to sign up with ID.me to access their online accounts
January 24, 2022 | CBS News
IRS to Require New ID Verification
January 24, 2022 | Infosecurity Magazine
IRS to start requiring facial recognition scans to access tax returns
January 21, 2022 | FOX Business
Cancel the NYPD’s ShotSpotter Contract
December 13, 2021 | New York Daily News
Crypto Money Laundering at Moscow’s Tallest Building
November 3, 2021 | Bloomberg Businessweek
T-Mobile CEO apologizes after hacker stole millions of users’ personal information
August 27, 2021 | NBC News
What Women Talk About When Women Talk About Their Cybersecurity Jobs
September 20, 2021 | SC Media
Cyber Job Listings Excluded Colorado Workers After Salary Transparency Law
July 27, 2021 | CyberScoop News
Deleting your Clubhouse account is a nightmare, especially for sex workers
March 2, 2021 | Mashable
Slack Backtracks After DM‑Anyone Feature Enables Harassment
March 24, 2021 | Mashable
Google Boosts Android Privacy Protections in Attempt to Rival Apple
June 3, 2021 | Financial Times
Apple Warns Chinese Apps Not to Dodge Its New Privacy Rules
March 18, 2021 | Financial Times
The siege of the US Capitol was a disaster for congressional cybersecurity — and experts say Congress will likely have to wipe all its computers and rebuild from scratch
January 7, 2021 | Business Insider
Parler Wasn’t Hacked, But It’s Probably Not Safe to Use It Anyway
November 25, 2020 | Lifehacker
Twitter Exploring Adding a Dislike Button or Downvote System
November 17, 2020 | Mashable
Twitter Is Letting People Threaten Joe Biden’s Cybersecurity Expert
August 28, 2020 | VICE
Twitter DMs of Obama, Musk, and Biden Could Have Been Stolen
July 16, 2020 | Newsweek
Profile: The Biden campaign’s cybersecurity expert Jackie Singh explains how she went from self-taught hacker and military veteran to protecting the president-elect’s campaign from a ‘nightmare scenario’ cyberattack
November 25, 2020 | Business Insider
SolarWinds: Why the Sunburst Hack Is So Serious
December 15, 2020 | BBC
Russia Says SolarWinds Hack Blame May Be Trump Admin Ploy
December 24, 2020 | Newsweek
How Online Cloud Buckets Are Exposing Private Photos and Sensitive Data
December 29, 2019 | NBC News
Transcription Site Rev Leaves Customer Data Out in the Open
November 14, 2019 | OneZero
Millions of Americans’ Medical Information Is Available on the Internet
September 18, 2019 | Mother Jones
Millions of Americans’ medical records are out in the open on the internet
September 17, 2019 | Engadget
Millions of Americans’ Medical Information Is Available on the Internet
September 17, 2019 | ProPublica
Southwest Airlines Publicly Tweeted a Passenger’s Personal Flight Number—and Then Doubled Down
August 9, 2019 | Gizmodo
Capital One Hacking Suspect Showed Strange Online Behavior
July 29, 2019 | Wall Street Journal
Why This Revenge Porn Activist Is Selling Nudes to Get to DEF CON
June 18, 2019 | VICE
Hackers Baselessly Blame Women and ‘SJWs’ for End of DerbyCon
January 22, 2019 | VICE
Facebook Fires Employee Who Bragged on Tinder About His Access to User Data
May 2, 2018 | The Wall Street Journal
Facebook fires engineer accused of stalking, possibly by abusing data access
May 2, 2018 | The Guardian
Sources: Facebook Has Fired Multiple Employees for Snooping on Users
May 2, 2018 | VICE
Facebook fires engineer who allegedly used access to stalk women
April 30, 2018 | NBC News
Your Health Records Are Supposed to Be Private. They Aren’t.
December 30, 2015 | The Washington Post
Federal Privacy Law Lags Far Behind Personal‑Health Technologies
November 17, 2015 | The Washington Post
4chan Camgirl Loli‑chan Grows Up
October 9, 2013 | Miami New Times
Public Speaking
Electorette Podcast: Americans Under Surveillance, Psyop Campaigns, and Lax Privacy Laws
February 13, 2024 | Hosted by Jennifer Taylor-Skinner
Bette Dangerous Podcast – “Surveillance Panic”
November 27, 2023 | Hosted by Heidi Siegmund Cuda
Conference Keynote Presentation — The Threat Actors We Forgot to Model: Profiling Socially-Motivated Cyber Criminals
November 23, 2023 | OWASP Global AppSec 2023
MeidasTouch Network: Five Minute News and The Weekend Show — Multiple Appearances
September 24, 2023 | LIVE: Trump GETS THE GAG by Judge so WHAT’S NEXT with his Dangerous THREATS
Hosted by Anthony Davis
September 18, 2022 | Top Cybersecurity Expert EXPOSES the TRUMP and QANON Plot to Overthrow Democracy
Hosted by Anthony Davis
May 8, 2022 | Leaks aside - human rights are on the line. Analysis with Jackie Singh
Hosted by Anthony Davis
February 27, 2022 | Jackie Singh and Paul Brandus on Russia, Ukraine and SCOTUS
Hosted by Anthony Davis
Radicalized: Truth Survives Podcast — Multiple Appearances
Apr 6, 2023 | Cyberwar Inoculation with Special Guest Jackie Singh
Hosted by Heidi Cuda, Jim Stewartson, and High Fidelity
July 4, 2022 | EPISODE 31: The Unexpected Truth Behind Insider Threats, Information Security, and Fascism
Hosted by Heidi Cuda, High Fidelity, and Sean Connor
Debbie Reynolds “Data Diva” Podcast – Episode 110
December 13, 2022 | Hosted by Debbie Reynolds
Dev.to DevNews Podcast – Season 8, Episode 5
May 12, 2022 | Hosted by Saron Yitbarek and Josh Puetz
Click Here Podcast: War, Sanctions, and Crypto’s Big Moment
March 28, 2022 | Hosted by Dina Temple‑Raston
Last Week in AWS – Screaming in the Cloud
September 30, 2021 | Hosted by Corey Quinn
Credits
Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership
2020 | Wiley
The Promises and Perils of Emerging Technologies for Cybersecurity
March 22, 2017 | Congressional Committee Hearing
Cyber War in Perspective: Russian Aggression against Ukraine
2015 | NATO Cooperative Cyber Defense Center of Excellence
War Front to Store Front: Americans Rebuilding Trust and Hope in Nations Under Fire
2014 | Wiley
BlackHat USA 2010: Getting in Bed with Robin Sage
2010 | BlackHat USA
TIGR in Iraq and Afghanistan: Network‑Adaptive Distribution of Media‑Rich Tactical Data
2009 | IEEE
Advocacy
Open Letter to Columbus City Attorney Zach Klein
September 2024 | Community Letter Regarding Connor Goodwolf
Mythbusting: cybercrime versus cybersecurity
August 2022 | Internet Governance Forum
Letter to Senator Chuck Schumer Opposing EARN IT Act
March 2022 | Surveillance Technology Oversight Project
Statement: S.T.O.P. Welcomes IRS Decision to Stop Facial Recognition
February 2022 | Surveillance Technology Oversight Project
Statement: S.T.O.P. Condemns IRS Facial Recognition Requirement
January 2022 | Surveillance Technology Oversight Project
NYC Surveillance Census: Identifies 16,000+ Cameras
December 2021 | Surveillance Technology Oversight Project
Scarily Precise: Location Tracking with Ultra-Wideband
November 2021 | Surveillance Technology Oversight Project
CPRA Preliminary Rulemaking Comments
November 2021 | Surveillance Technology Oversight Project
Statement: S.T.O.P. Condemns Apple for Tracking iPhone Location When Turned Off
October 2021 | Surveillance Technology Oversight Project
Security Audit: Improving Our User Protections
August 2018 | MetaMask Blog
October 23, 2011 | Infosec Island




