Jason Healey

Jason Healey is a Senior Research Scholar in the Faculty of International and Public Affairs and Adjunct Professor of International and Public Affairs at the School of International and Public Affairs at Columbia University.[1] He is also a Senior Fellow with the Cyber Statecraft Initiative at the Atlantic Council, where he was the program's founding director. He has published several academic articles, essays, and books on the topic of cyber security and has advised on security measures for corporate, government, and military institutions. He has been identified as the first historian of cyber conflict.

Jason Healey
BornJason Healey
Rhode Island
OccupationSenior Research Scholar, Columbia SIPA
CitizenshipUnited States
Education
Subjectcyber security, cyber policy
Notable worksA Fierce Domain, Cyber Conflict 1986 to 2012
Website
twitter.com/Jason_Healey

History

Healey was born and raised in Rhode Island, and at 17, joined the United States Air Force.[2] Initially training to be a fighter pilot, Healey transitioned to signals intelligence and in 1998, began working at The Pentagon to implement a computer network defense system.[2] During his Air Force career, Jason was awarded two Meritorious Service Medals based on his contributions in cyber security during his service at the Pentagon.[3] Healey later received a master's degree in Information Security from James Madison University.[2][3]

Work in cyber policy

Healey has worked in numerous settings with regard to cyber policy, its implementation, and addressing responses to security threats. In Hong Kong, he served as the vice president for Goldman Sachs where he developed a crisis-response system built to address incidents across the Asian continent. He has also worked at The White House as the Director for Cyber Infrastructure Protection. He is currently a board member on the Cyber Conflict Studies Association and the Military Cyber Professionals Association.[3] The extent of his work has led one magazine to refer to Healey as the first historian of cyber conflict.[2]

Frequently, Healey has publicly commented[4][5] and written articles[6][7] on high-profile malware threats and cyber policy. For instance, Healey has discussed the potential advantages and disadvantages of the United States launching cyber-based attacks.[8] In regards to such an offensive on Syria, he stated that "you no longer have to drop physical bombs and kill people, that it can be targeted, non-lethal microforce", but further surmised that due to past leaks of the United States' involvement in Stuxnet, relevant government agencies may have decided against it.[9] Healey has also commented on the Heartbleed bug, noting the failure of the NSA to live up to its stated priority of defense by not exposing the bug when it was found, and he said that the organization would be "shredded by the computer security community" for this failure.[10] In 2013, Healey also took a critical stance on the current state of mass surveillance in the United States. He predicted that U.S. interests abroad would suffer "deep and long term damage" given that the administration could not implement any alternatives to spying conducted by the National Security Agency.[11]

In 2012, Healey published A Fierce Domain, Cyber Conflict 1986 to 2012,[12] which explores the idea that confrontations that have taken place within cyberspace has established a new kind of conflict. This development is explored historically, starting in 1986 with a hacking initiative planned by the KGB to steal military plans from the U.S. in what is referred to as the Cuckoo's Egg Case.[2][13] The book received a positive reception[14] and has been referred to as a definitive historical record of cyber conflict.[15]

In March 2014, Forbes Magazine identified Healey as one of twenty cyber policy experts to follow on Twitter.[16]

Publications

  • Cyber Security Policy Guidebook (2012), co-author, published by John Wiley & Sons (ISBN 9781118241325)
  • A Fierce Domain, Cyber Conflict 1986 to 2012 (2013), author, published by the Cyber Conflict Studies Association (ISBN 9780989327404)

References

  1. "Jason Healey". sipa.columbia.edu. Retrieved August 31, 2019.
  2. Vitaliev, Vitali (December 16, 2013). "Interview with Jason Healey". E&T Magazine. The Institution of Engineering and Technology. Retrieved August 31, 2019.
  3. Balaban, David (June 3, 2013). "Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey from the Atlantic Council". Privacy PC. Retrieved August 31, 2019.
  4. Wood, Molly (July 9, 2013). "Tech companies look to stay ahead of hackers". Marketplace.org. Retrieved August 31, 2019.
  5. Hoffman, Karen Epper (February 3, 2014). "Advanced malware: The growing cyber menace". SC Magazine. Retrieved August 31, 2019.
  6. Healey, Jason (2011). "The Spectrum of National Responsibility for Cyberattacks". Brown Journal of World Affairs. 18 (1): 57–69.
  7. Healey, Jason (2011). "Four ways to address cyberconflict – and how analytics can help" (PDF). Journal of Advanced Analytics: 32–34. Archived from the original (PDF) on March 3, 2016. Retrieved August 31, 2019.
  8. Gjelten, Tom (February 11, 2013). "Pentagon Goes On The Offensive Against Cyberattacks". Morning Edition. NPR. Retrieved August 31, 2019.
  9. Todd, Brian (February 28, 2014). "Syria: U.S. Cyber-Strike". The Situation Room. CNN. Retrieved August 31, 2019.
  10. "NSA said to have exploited Heartbleed bug, exposing consumers". NY Daily News. April 12, 2014. Retrieved August 31, 2019.
  11. Strohm, Chris; Gaouette, Nicole (November 6, 2013). "Lawmakers Spurn Obama Bid to Preserve NSA Data Gathering". Bloomberg News. Retrieved August 31, 2019.
  12. Healey, Jason (2013). A Fierce Domain, Cyber Conflict 1986 to 2012. Cyber Conflict Studies Association. ISBN 978-0989327404.
  13. "Jason Healey: A Fierce Domain". Pritzker Military Presents. Pritzker Military Museum & Library. April 10, 2014. Retrieved August 31, 2019.
  14. "Digital doomsters". The Economist. The Economist Newspaper Limited. June 29, 2013. Retrieved August 31, 2019.
  15. Gourley, Bob (September 29, 2017). "A Fierce Domain: Conflict in Cyberspace, 1986 to 2012". CTOvision.com. Retrieved August 31, 2019.
  16. Stiennon, Richard (March 26, 2014). "20 Cyber Policy Experts To Follow On Twitter". Forbes. Retrieved August 31, 2019.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.