Media Portfolio

I have been cited, quoted, and referenced by various outlets including The Washington Post, NBC, Bloomberg, Bloomberg Law, BBC, The Wall Street Journal, USA Today, CNN, VICE, and Newsweek.

About This Publication

I was included in Feedspot’s list of top 90 cybersecurity influencers on X (2026), RSA Conference Influencer eBook (Meritt Group, 2025), Who’s Who in Cybersecurity (Hardenstance, 2022), and Check Point SASE’s ranking of 200 global cybersecurity influencers (2021).

The following public portfolio brings together a selection of my published interviews, research, and commentary.

It is intended as a reference for journalists, collaborators, and readers who want to learn more about I have applied my experiences to various problems in an interdisciplinary manner.

My work reflects a consistent set of concerns: how complex systems fail, how those failures affect people with the least power to protect themselves, and what can realistically be done about it.

The approach has remained consistent across different roles and venues: to describe problems as clearly as possible, rely on evidence, and remain willing to name institutional weaknesses—even when doing so is uncomfortable or threatening to powerful interests.

Quotations and Citations

Stephen Miller Lists $3.7M Home a Month After Protesters Chalked Outside

October 17, 2025 | Newsweek

Woman’s unimpressed reaction to Trump during medal ceremony goes viral

May 21, 2025 | Daily Dot

Halliburton confirms a cyberattack forced it to take its systems offline

August 23, 2024 | CNN Business

Unmusked: How Elon Musk is Using X to Poison our Democracy

August 10, 2024 | Byline Supplement

JD Vance endorsed a book calling far-left ‘unhumans,’ and praising fascist dictators

August 8, 2024 | USA Today

“Gay furry hackers” leak revealing data from major anti-LGBTQ+ Republican think tank

July 10, 2024 | LGBTQ Nation

Top US Cyber Agency Pushing Toward First Hack Reporting Rule

October 19, 2023 | Bloomberg Law

Suspended from X.Com: The Cult of the Genius Tech Bro

September 12, 2023 | Byline Supplement

Maker Naomi Wu is Silenced by Chinese Authorities (And Why I Blame Elon Musk)

August 23, 2023 | Skepchick

Did the Chinese military launch missiles into Taiwan’s airspace?

April 18, 2023 | Radio Free Asia

Twitter Whistle-Blower Allegations Spark Concerns About National Security Risk

August 23, 2022 | Bloomberg

Your privacy is at risk now that Roe v. Wade has fallen, experts warn

June 24, 2022 | Mashable

The cost of ransomware attacks has more than doubled. Here’s how companies can prevent and plan for these attacks, according to experts

May 17, 2022 | Business Insider

Grimes Claims Responsibility for 2012 Hack of Hipster Runoff

March 24, 2022 | Engadget

Grimes Outs Herself as the Culprit Behind Music Blog Hipster Runoff’s Infamous Hack

March 24, 2022 | GQ

Grimes Admits To Hacking, Blackmailing Indie Music Blog Hipster Runoff

March 24, 2022 | Paste Magazine

Grimes Said She Orchestrated Cyberattack That Shut Down ‘Hipster Runoff’

March 24, 2022 | VICE

IRS will require taxpayers to sign up with ID.me to access their online accounts

January 24, 2022 | CBS News

IRS to Require New ID Verification

January 24, 2022 | Infosecurity Magazine

IRS to start requiring facial recognition scans to access tax returns

January 21, 2022 | FOX Business

Cancel the NYPD’s ShotSpotter Contract

December 13, 2021 | New York Daily News

Crypto Money Laundering at Moscow’s Tallest Building

November 3, 2021 | Bloomberg Businessweek

T-Mobile CEO apologizes after hacker stole millions of users’ personal information

August 27, 2021 | NBC News

What Women Talk About When Women Talk About Their Cybersecurity Jobs

September 20, 2021 | SC Media

Cyber Job Listings Excluded Colorado Workers After Salary Transparency Law

July 27, 2021 | CyberScoop News

Deleting your Clubhouse account is a nightmare, especially for sex workers

March 2, 2021 | Mashable

Slack Backtracks After DM‑Anyone Feature Enables Harassment

March 24, 2021 | Mashable

Google Boosts Android Privacy Protections in Attempt to Rival Apple

June 3, 2021 | Financial Times

Apple Warns Chinese Apps Not to Dodge Its New Privacy Rules

March 18, 2021 | Financial Times

The siege of the US Capitol was a disaster for congressional cybersecurity — and experts say Congress will likely have to wipe all its computers and rebuild from scratch

January 7, 2021 | Business Insider

Parler Wasn’t Hacked, But It’s Probably Not Safe to Use It Anyway

November 25, 2020 | Lifehacker

Twitter Exploring Adding a Dislike Button or Downvote System

November 17, 2020 | Mashable

Twitter Is Letting People Threaten Joe Biden’s Cybersecurity Expert

August 28, 2020 | VICE

Twitter DMs of Obama, Musk, and Biden Could Have Been Stolen

July 16, 2020 | Newsweek

Profile: The Biden campaign’s cybersecurity expert Jackie Singh explains how she went from self-taught hacker and military veteran to protecting the president-elect’s campaign from a ‘nightmare scenario’ cyberattack

November 25, 2020 | Business Insider

SolarWinds: Why the Sunburst Hack Is So Serious

December 15, 2020 | BBC

Russia Says SolarWinds Hack Blame May Be Trump Admin Ploy

December 24, 2020 | Newsweek

How Online Cloud Buckets Are Exposing Private Photos and Sensitive Data

December 29, 2019 | NBC News

Transcription Site Rev Leaves Customer Data Out in the Open

November 14, 2019 | OneZero

Millions of Americans’ Medical Information Is Available on the Internet

September 18, 2019 | Mother Jones

Millions of Americans’ medical records are out in the open on the internet

September 17, 2019 | Engadget

Millions of Americans’ Medical Information Is Available on the Internet

September 17, 2019 | ProPublica

Southwest Airlines Publicly Tweeted a Passenger’s Personal Flight Number—and Then Doubled Down

August 9, 2019 | Gizmodo

Capital One Hacking Suspect Showed Strange Online Behavior

July 29, 2019 | Wall Street Journal

Why This Revenge Porn Activist Is Selling Nudes to Get to DEF CON

June 18, 2019 | VICE

Hackers Baselessly Blame Women and ‘SJWs’ for End of DerbyCon

January 22, 2019 | VICE

Facebook Fires Employee Who Bragged on Tinder About His Access to User Data

May 2, 2018 | The Wall Street Journal

Facebook fires engineer accused of stalking, possibly by abusing data access

May 2, 2018 | The Guardian

Sources: Facebook Has Fired Multiple Employees for Snooping on Users

May 2, 2018 | VICE

Facebook fires engineer who allegedly used access to stalk women

April 30, 2018 | NBC News

Your Health Records Are Supposed to Be Private. They Aren’t.

December 30, 2015 | The Washington Post

Federal Privacy Law Lags Far Behind Personal‑Health Technologies

November 17, 2015 | The Washington Post

4chan Camgirl Loli‑chan Grows Up

October 9, 2013 | Miami New Times

Public Speaking

Electorette Podcast: Americans Under Surveillance, Psyop Campaigns, and Lax Privacy Laws

February 13, 2024 | Hosted by Jennifer Taylor-Skinner

Bette Dangerous Podcast – “Surveillance Panic”

November 27, 2023 | Hosted by Heidi Siegmund Cuda

Bette Dangerous
Bette Dangerous Podcast Ep71 — Surveillance Panic with Jackie Singh
***Podcasts are for Bette Dangerous members. I unlocked this interview for two weeks for all listeners. Please share with your networks, and please take out a subscription to support this work…
Listen now

Conference Keynote Presentation — The Threat Actors We Forgot to Model: Profiling Socially-Motivated Cyber Criminals

November 23, 2023 | OWASP Global AppSec 2023

Public Keynote Slides Global Appsec Dc 2023
9.85MB ∙ PDF file
Download
Download
Public Keynote Slides Global Appsec Dc 2023
9.85MB ∙ PDF file
Download
Download

MeidasTouch Network: Five Minute News and The Weekend Show — Multiple Appearances

September 24, 2023 | LIVE: Trump GETS THE GAG by Judge so WHAT’S NEXT with his Dangerous THREATS

Hosted by Anthony Davis

September 18, 2022 | Top Cybersecurity Expert EXPOSES the TRUMP and QANON Plot to Overthrow Democracy

Hosted by Anthony Davis

May 8, 2022 | Leaks aside - human rights are on the line. Analysis with Jackie Singh

Hosted by Anthony Davis

February 27, 2022 | Jackie Singh and Paul Brandus on Russia, Ukraine and SCOTUS

Hosted by Anthony Davis

Radicalized: Truth Survives Podcast — Multiple Appearances

Apr 6, 2023 | Cyberwar Inoculation with Special Guest Jackie Singh

Hosted by Heidi Cuda, Jim Stewartson, and High Fidelity

July 4, 2022 | EPISODE 31: The Unexpected Truth Behind Insider Threats, Information Security, and Fascism

Hosted by Heidi Cuda, High Fidelity, and Sean Connor

Debbie Reynolds “Data Diva” Podcast – Episode 110

December 13, 2022 | Hosted by Debbie Reynolds

Dev.to DevNews Podcast – Season 8, Episode 5

May 12, 2022 | Hosted by Saron Yitbarek and Josh Puetz

Click Here Podcast: War, Sanctions, and Crypto’s Big Moment

March 28, 2022 | Hosted by Dina Temple‑Raston

Last Week in AWS – Screaming in the Cloud

September 30, 2021 | Hosted by Corey Quinn

Credits

Tribe of Hackers Security Leaders: Tribal Knowledge from the Best in Cybersecurity Leadership

2020 | Wiley

The Promises and Perils of Emerging Technologies for Cybersecurity

March 22, 2017 | Congressional Committee Hearing

Chrg 115shrg28382
1.12MB ∙ PDF file
Download
Download

Cyber War in Perspective: Russian Aggression against Ukraine

2015 | NATO Cooperative Cyber Defense Center of Excellence

Cyberwarinperspective Full Book
2.21MB ∙ PDF file
Download
Download

War Front to Store Front: Americans Rebuilding Trust and Hope in Nations Under Fire

2014 | Wiley

BlackHat USA 2010: Getting in Bed with Robin Sage

2010 | BlackHat USA

Blackhat Usa 2010 Ryan Getting In Bed With Robin Sage V1
172KB ∙ PDF file
Download
Download

TIGR in Iraq and Afghanistan: Network‑Adaptive Distribution of Media‑Rich Tactical Data

2009 | IEEE

Tigr In Iraq And Afghanistan (2009)
2.46MB ∙ PDF file
Download
Download

Advocacy

Open Letter to Columbus City Attorney Zach Klein

September 2024 | Community Letter Regarding Connor Goodwolf

Open Letter Columbus Attorney Zach Klein
79.4KB ∙ PDF file
Download
Download

Mythbusting: cybercrime versus cybersecurity

August 2022 | Internet Governance Forum

Igf2022 Bpf Cybersecurity Cybercrime Mythbusting(draft Aug 30)
127KB ∙ PDF file
Download
Download

Letter to Senator Chuck Schumer Opposing EARN IT Act

March 2022 | Surveillance Technology Oversight Project

Statement: S.T.O.P. Welcomes IRS Decision to Stop Facial Recognition

February 2022 | Surveillance Technology Oversight Project

Statement: S.T.O.P. Condemns IRS Facial Recognition Requirement

January 2022 | Surveillance Technology Oversight Project

NYC Surveillance Census: Identifies 16,000+ Cameras

December 2021 | Surveillance Technology Oversight Project

Scarily Precise: Location Tracking with Ultra-Wideband

November 2021 | Surveillance Technology Oversight Project

2021
372KB ∙ PDF file
Download
Download

CPRA Preliminary Rulemaking Comments

November 2021 | Surveillance Technology Oversight Project

Statement: S.T.O.P. Condemns Apple for Tracking iPhone Location When Turned Off

October 2021 | Surveillance Technology Oversight Project

Security Audit: Improving Our User Protections

August 2018 | MetaMask Blog

October 23, 2011 | Infosec Island