Jason Healey is an American senior research scholar and adjunct professor at the School of International and Public Affairs, Columbia University.[1] He is also a senior fellow with the Cyber Statecraft Initiative at the Atlantic Council, where he was the program's founding director.[2] He has published many academic articles, essays, and books on the topic of cyber security and has advised on security measures for corporate, government, and military institutions. He has been identified as the first historian of cyber conflict.

Jason Healey
BornRhode Island
OccupationSenior Research Scholar, Columbia SIPA
CitizenshipUnited States
EducationUS Air Force Academy (BA)
Johns Hopkins University (MA)
James Madison University (MS)
SubjectCyber security
Cyber policy
Notable worksA Fierce Domain, Cyber Conflict 1986 to 2012
Cyber Security Policy Guidebook
Website
twitter.com/Jason_Healey

History edit

Healey was born and raised in Rhode Island, and at 17, joined the United States Air Force.[3] He graduated from the United States Air Force Academy in 1991 and was commissioned as an officer. Initially trained as a fighter pilot, Healey transitioned to signals intelligence and in 1998, began working at The Pentagon, implementing a computer network defense system.[3] During his Air Force career, Jason was awarded two Meritorious Service Medals for his contributions to cyber security.[4] Healey later received a master's degree in Information Security from James Madison University.[3][4]

Work in cybersecurity and cyber policy edit

Healey's career has focused principally on cyber policy, its implementation, and addressing responses to security threats. In Hong Kong, as vice president at Goldman Sachs, he developed a crisis-response system to address incidents across Asia.[5][6] He has also worked at The White House as the director for cyber infrastructure protection. He is currently a board member on the Cyber Conflict Studies Association and the Military Cyber Professionals Association.[4] The extent of his work has led one magazine to refer to Healey as the first historian of cyber conflict.[3]

Healey is a frequent public commentator[7][8] and has written many articles[9][10] on malware threats and cyber policy. Healey has discussed the potential advantages and disadvantages of the United States launching cyber-based attacks.[11] In regards to such an offensive on Syria, he stated that "you no longer have to drop physical bombs and kill people... it can be targeted, non-lethal microforce", but surmised that due to past leaks of the United States' involvement in Stuxnet, government agencies may have decided against it.[12] Healey has also commented on the Heartbleed bug, noting the discrepancy between the National Security Agency's stated priority of defense and its failure to expose the bug when it was found, and he said that the organization would be "shredded by the computer security community" for this failure.[13] In 2013, Healey took a critical stance on the state of mass surveillance in the United States. He predicted that U.S. interests abroad would suffer "deep and long term damage" if the administration failed to find alternatives to spying conducted by the National Security Agency.[14]

In 2012, Healey published the first comprehensive history of cyber-conflict, A Fierce Domain, Cyber Conflict 1986 to 2012,[15] positing that confrontations within cyberspace have established a new kind of conflict, with new characteristics. He explores this development through historical studies, beginning with the KGB's 1986 hacking initiative to steal military plans from the U.S. in what is referred to as the Cuckoo's Egg Case.[3][16] The book was positively reviewed[17] and has been referred to as a "definitive historical record of cyber conflict."[18]

In March 2014, Forbes identified Healey as one of twenty cyber policy experts to follow on Twitter.[19]

Publications edit

  • Cyber Security Policy Guidebook (2012), co-author, published by John Wiley & Sons (ISBN 9781118241325)
  • A Fierce Domain, Cyber Conflict 1986 to 2012 (2013), author, published by the Cyber Conflict Studies Association (ISBN 9780989327404)

References edit

  1. ^ "Jason Healey". sipa.columbia.edu. Retrieved August 31, 2019.
  2. ^ "Jason Healey".
  3. ^ a b c d e Vitaliev, Vitali (December 16, 2013). "Interview with Jason Healey". E&T Magazine. The Institution of Engineering and Technology. Retrieved August 31, 2019.
  4. ^ a b c Balaban, David (June 3, 2013). "Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey from the Atlantic Council". Privacy PC. Retrieved August 31, 2019.
  5. ^ "2015 International Cyber Risk Management Conference" (PDF). ICRMC. Retrieved 10 June 2021. Healey worked twice for Goldman Sachs. First to anchor their team for responding to cyber-attacks and later as an executive director in Hong Kong to manage Asia-wide business continuity.
  6. ^ "Freeman Spogli Institute for International Studies - Faculty and Researchers". Stanford. Retrieved 10 June 2021. Healey created the first cyber incident response team for Goldman Sachs and later oversaw the bank's crisis management and business continuity in Hong Kong.
  7. ^ Wood, Molly (July 9, 2013). "Tech companies look to stay ahead of hackers". Marketplace.org. Retrieved August 31, 2019.
  8. ^ Hoffman, Karen Epper (February 3, 2014). "Advanced malware: The growing cyber menace". SC Magazine. Retrieved August 31, 2019.
  9. ^ Healey, Jason (2011). "The Spectrum of National Responsibility for Cyberattacks". Brown Journal of World Affairs. 18 (1): 57–69.
  10. ^ Healey, Jason (2011). "Four ways to address cyberconflict – and how analytics can help" (PDF). Journal of Advanced Analytics: 32–34. Archived from the original (PDF) on March 3, 2016. Retrieved August 31, 2019.
  11. ^ Gjelten, Tom (February 11, 2013). "Pentagon Goes On The Offensive Against Cyberattacks". Morning Edition. NPR. Retrieved August 31, 2019.
  12. ^ Todd, Brian (February 28, 2014). "Syria: U.S. Cyber-Strike". The Situation Room. CNN. Retrieved August 31, 2019.
  13. ^ "NSA said to have exploited Heartbleed bug, exposing consumers". NY Daily News. April 12, 2014. Retrieved August 31, 2019.
  14. ^ Strohm, Chris; Gaouette, Nicole (November 6, 2013). "Lawmakers Spurn Obama Bid to Preserve NSA Data Gathering". Bloomberg News. Retrieved August 31, 2019.
  15. ^ Healey, Jason (2013). A Fierce Domain, Cyber Conflict 1986 to 2012. Cyber Conflict Studies Association. ISBN 978-0989327404.
  16. ^ "Jason Healey: A Fierce Domain". Pritzker Military Presents. Pritzker Military Museum & Library. April 10, 2014. Retrieved August 31, 2019.
  17. ^ "Digital doomsters". The Economist. The Economist Newspaper Limited. June 29, 2013. Retrieved August 31, 2019.
  18. ^ Gourley, Bob (September 29, 2017). "A Fierce Domain: Conflict in Cyberspace, 1986 to 2012". CTOvision.com. Retrieved August 31, 2019.
  19. ^ Stiennon, Richard (March 26, 2014). "20 Cyber Policy Experts To Follow On Twitter". Forbes. Retrieved August 31, 2019.

External links edit