Jason Healey
{{Short description|American scholar of cybersecurity}}
{{Infobox writer
| name = Jason Healey
| image = File:Jason Healey.jpg
| image_caption = Healey in June 2018
| native_name =
| native_name_lang =
| pseudonym =
| birth_name =
| birth_date =
| birth_place = Rhode Island
| occupation = Senior Research Scholar, Columbia SIPA
| citizenship = United States
| education = US Air Force Academy (BA)
Johns Hopkins University (MA)
James Madison University (MS)
| subject = Cyber security
Cyber policy
| notableworks = A Fierce Domain, Cyber Conflict 1986 to 2012
Cyber Security Policy Guidebook
| website = {{URL|https://twitter.com/Jason_Healey}}
}}
Jason Healey is an American senior research scholar and adjunct professor at the School of International and Public Affairs, Columbia University.{{cite web |url=https://sipa.columbia.edu/faculty-research/faculty-directory/jason-healey |title=Jason Healey |website=sipa.columbia.edu |access-date=August 31, 2019}} He is also a senior fellow with the Cyber Statecraft Initiative at the Atlantic Council, where he was the program's founding director.{{Cite web|url=https://www.atlanticcouncil.org/expert/jason-healey/|title = Jason Healey}} He has published many academic articles, essays, and books on the topic of cyber security and has advised on security measures for corporate, government, and military institutions. He has been identified as the first historian of cyber conflict.
History
Healey was born and raised in Rhode Island, and at 17, joined the United States Air Force.{{cite web |last=Vitaliev |first=Vitali |title=Interview with Jason Healey |url=https://eandt.theiet.org/content/articles/2013/12/interview-with-jason-healey/ |date=December 16, 2013 |work=E&T Magazine |publisher=The Institution of Engineering and Technology |access-date=August 31, 2019}} He graduated from the United States Air Force Academy in 1991 and was commissioned as an officer. Initially trained as a fighter pilot, Healey transitioned to signals intelligence and in 1998, began working at The Pentagon, implementing a computer network defense system. During his Air Force career, Jason was awarded two Meritorious Service Medals for his contributions to cyber security.{{cite web |first=David |last=Balaban |url=http://privacy-pc.com/interviews/why-is-cyber-conflicts-amnesia-dangerous-interview-with-jason-healey-from-the-atlantic-council.html |title=Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey from the Atlantic Council |publisher=Privacy PC |date=June 3, 2013 |access-date=August 31, 2019}} Healey later received a master's degree in Information Security from James Madison University.
Work in cybersecurity and cyber policy
Healey's career has focused principally on cyber policy, its implementation, and addressing responses to security threats. In Hong Kong, as vice president at Goldman Sachs, he developed a crisis-response system to address incidents across Asia.{{cite web |title=2015 International Cyber Risk Management Conference |url=https://usa-canada.icrmc.com/wp-content/uploads/sites/1/2017/09/ICRMC2015_Brochure.pdf |publisher=ICRMC |access-date=10 June 2021 |quote=Healey worked twice for Goldman Sachs. First to anchor their team for responding to cyber-attacks and later as an executive director in Hong Kong to manage Asia-wide business continuity.}}{{cite web |title=Freeman Spogli Institute for International Studies - Faculty and Researchers |url=https://fsi.stanford.edu/people/jason-healey |publisher=Stanford |access-date=10 June 2021 |quote=Healey created the first cyber incident response team for Goldman Sachs and later oversaw the bank’s crisis management and business continuity in Hong Kong.}} He has also worked at The White House as the director for cyber infrastructure protection. He is currently a board member on the Cyber Conflict Studies Association and the Military Cyber Professionals Association. The extent of his work has led one magazine to refer to Healey as the first historian of cyber conflict.
Healey is a frequent public commentator{{cite web |last=Wood |first=Molly |url=https://www.marketplace.org/2013/07/09/tech-companies-look-stay-ahead-hackers/ |title=Tech companies look to stay ahead of hackers |publisher=Marketplace.org |date=July 9, 2013 |access-date=August 31, 2019}}{{cite web |first=Karen Epper |last=Hoffman |url=https://www.scmagazine.com/home/security-news/features/advanced-malware-the-growing-cyber-menace/ |title=Advanced malware: The growing cyber menace |work=SC Magazine |date=February 3, 2014 |access-date=August 31, 2019}} and has written many articles{{cite journal |last=Healey |first=Jason |title=The Spectrum of National Responsibility for Cyberattacks |journal=Brown Journal of World Affairs |year=2011 |volume=18 |issue=1 |pages=57–69}}{{cite journal |last=Healey |first=Jason |title=Four ways to address cyberconflict – and how analytics can help |journal=Journal of Advanced Analytics |date=2011 |pages=32–34 |url=http://www.sas.com/news/intelligence_quarterly/q411.pdf |access-date=August 31, 2019 |url-status=dead |archive-url=https://web.archive.org/web/20160303231949/http://www.sas.com/news/intelligence_quarterly/q411.pdf |archive-date=March 3, 2016}} on malware threats and cyber policy. Healey has discussed the potential advantages and disadvantages of the United States launching cyber-based attacks.{{cite web |last=Gjelten |first=Tom |title=Pentagon Goes On The Offensive Against Cyberattacks |url=https://www.npr.org/2013/02/11/171677247/pentagon-goes-on-the-offensive-against-cyber-attacks |date=February 11, 2013 |work=Morning Edition |publisher=NPR |access-date=August 31, 2019}} In regards to such an offensive on Syria, he stated that "you no longer have to drop physical bombs and kill people... it can be targeted, non-lethal microforce", but surmised that due to past leaks of the United States' involvement in Stuxnet, government agencies may have decided against it.{{cite news |last=Todd |first=Brian |title=Syria: U.S. Cyber-Strike |url=https://www.cnn.com/videos/bestoftv/2014/02/28/exp-tsr-todd-syria-us-cyber-strike.cnn |date=February 28, 2014 |work=The Situation Room |publisher=CNN |access-date=August 31, 2019}} Healey has also commented on the Heartbleed bug, noting the discrepancy between the National Security Agency's stated priority of defense and its failure to expose the bug when it was found, and he said that the organization would be "shredded by the computer security community" for this failure.{{cite news |title=NSA said to have exploited Heartbleed bug, exposing consumers |url=https://www.nydailynews.com/news/national/nsa-knew-heartbleed-web-flaw-article-1.1754163 |access-date=August 31, 2019 |newspaper=NY Daily News |date=April 12, 2014}} In 2013, Healey took a critical stance on the state of mass surveillance in the United States. He predicted that U.S. interests abroad would suffer "deep and long term damage" if the administration failed to find alternatives to spying conducted by the National Security Agency.{{cite news |title=Lawmakers Spurn Obama Bid to Preserve NSA Data Gathering |url=https://www.bloomberg.com/news/articles/2013-11-06/lawmakers-spurn-obama-bid-to-preserve-nsa-data-gathering |access-date=August 31, 2019 |newspaper=Bloomberg News |date=November 6, 2013 |last1=Strohm |first1=Chris |last2=Gaouette |first2=Nicole}}
In 2012, Healey published the first comprehensive history of cyber-conflict, A Fierce Domain, Cyber Conflict 1986 to 2012,{{cite book |title=A Fierce Domain, Cyber Conflict 1986 to 2012 |last=Healey |first=Jason |publisher=Cyber Conflict Studies Association |year=2013 |isbn=978-0989327404}} positing that confrontations within cyberspace have established a new kind of conflict, with new characteristics. He explores this development through historical studies, beginning with the KGB's 1986 hacking initiative to steal military plans from the U.S. in what is referred to as the Cuckoo's Egg Case.{{cite web |title=Jason Healey: A Fierce Domain |url=http://www.pritzkermilitary.org/whats_on/pritzker-military-presents/jason-healey-fierce-domain/ |date=April 10, 2014 |work=Pritzker Military Presents |publisher=Pritzker Military Museum & Library |access-date=August 31, 2019}} The book was positively reviewed{{cite news |title=Digital doomsters |url=https://www.economist.com/books-and-arts/2013/06/29/digital-doomsters |newspaper=The Economist |publisher=The Economist Newspaper Limited |access-date=August 31, 2019 |date=June 29, 2013}} and has been referred to as a "definitive historical record of cyber conflict."{{cite web |last=Gourley |first=Bob |title=A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 |url=https://ctovision.com/fierce-domain-conflict-cyberspace/ |date=September 29, 2017 |work=CTOvision.com |access-date=August 31, 2019}}
In March 2014, Forbes identified Healey as one of twenty cyber policy experts to follow on Twitter.{{cite web |first=Richard |last=Stiennon |url=https://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/ |title=20 Cyber Policy Experts To Follow On Twitter |work=Forbes |date=March 26, 2014 |access-date=August 31, 2019}}
Publications
- Cyber Security Policy Guidebook (2012), co-author, published by John Wiley & Sons ({{ISBN|9781118241325}})
- A Fierce Domain, Cyber Conflict 1986 to 2012 (2013), author, published by the Cyber Conflict Studies Association ({{ISBN|9780989327404}})
References
{{reflist|30em}}
External links
- {{Twitter}}
- [http://www.pritzkermilitary.org/whats_on/citizen-soldier/technology-military-intelligence-and-cyber-warfare/ The Next Battlefield: On Cyber War] at the Pritzker Military Museum & Library recorded on September 26, 2014
- {{C-SPAN|70288}}
{{Authority control}}
{{DEFAULTSORT:Healey, Jason}}
Category:Year of birth missing (living people)
Category:James Madison University alumni
Category:People from Rhode Island
Category:United States Air Force officers
Category:Writers about computer security
Category:Computer security academics
Category:United States Air Force Academy alumni
Category:Columbia School of International and Public Affairs faculty