Jason Healey

Jason Healey
Born Jason Healey
Rhode Island
Occupation Director of Cyber Statecraft Initiative, Atlantic Council
Citizenship United States
Education
Subject cyber security, cyber policy
Notable works A Fierce Domain, Cyber Conflict 1986 to 2012
Website
twitter.com/Jason_Healey

Jason Healey is a director at the Atlantic Council in charge of the Cyber Statecraft Initiative. He has published several academic articles, essays, and books on the topic of cyber security and has advised on security measures for corporate, government, and military institutions. He has been identified as the first historian of cyber conflict.

History

Healy was born and raised in Rhode Island, and at 17, joined the United States Air Force.[1] Initially training to be a fighter pilot, Healey transitioned to signals intelligence and in 1998, began working at The Pentagon to implement a computer network defense system.[1] During his Air Force career, Jason was awarded two Meritorious Service Medals based on his contributions in cyber security during his service at the Pentagon.[2] Healey later received a master's degree in Information Security from James Madison University.[1][2]

Work in cyber policy

Healey has worked in numerous settings with regard to cyber policy, its implementation, and addressing responses to security threats. In Hong Kong, he served as the vice president for Goldman Sachs where he developed a crisis-response system built to address incidents across the Asian continent. He has also worked at The White House as the Director for Cyber Infrastructure Protection. He is currently a board member on the Cyber Conflict Studies Association and the Military Cyber Professionals Association.[2] The extent of his work has led one magazine to refer to Healey as the first historian of cyber conflict.[1]

Frequently, Healey has publicly commented[3][4] and written articles[5][6] on high-profile malware threats and cyber policy. For instance, Healey has discussed the potential advantages and disadvantages of the United States launching cyber-based attacks.[7] In regards to such an offensive on Syria, he stated that "you no longer have to drop physical bombs and kill people, that it can be targeted, non-lethal microforce", but further surmised that due to past leaks of the United States' involvement in Stuxnet, relevant government agencies may have decided against it.[8] Healey has also commented on the Heartbleed bug, noting the failure of the NSA to live up to its stated priority of defense by not exposing the bug when it was found, and he said that the organization would be "shredded by the computer security community" for this failure.[9] In 2013, Healey also took a critical stance on the current state of mass surveillance in the United States. He predicted that U.S. interests abroad would suffer "deep and long term damage" given that the administration could not implement any alternatives to spying conducted by the National Security Agency.[10]

In 2012, Healey published A Fierce Domain, Cyber Conflict 1986 to 2012, which explores the idea that confrontations that have taken place within cyberspace has established a new kind of conflict. This development is explored historically, starting in 1986 with a hacking initiative planned by the KGB to steal military plans from the U.S. in what is referred to as the Cuckoo's Egg Case.[1][11] The book received a positive reception[12] and has been referred to as a definitive historical record of cyber conflict.[13]

In March 2014, Forbes Magazine identified Healey as one of twenty cyber policy experts to follow on Twitter.[14]

Publications

References

  1. 1 2 3 4 5 Vitaliev, Vitali. "Interview with Jason Healey". E&T Magazine. The Institution of Engineering and Technology. Retrieved 12 April 2014.
  2. 1 2 3 David Balaban (2013-06-03). "Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey from the Atlantic Council". Privacy PC. Retrieved 2014-04-14.
  3. Mullen, Shannon (2013-07-09). "Tech companies look to stay ahead of hackers". Marketplace.org. Retrieved 2014-04-14.
  4. Karen Epper Hoffman (2014-02-03). "Advanced malware: The growing cyber menace". SC Magazine. Retrieved 2014-04-14.
  5. Healey, Jason (2011). "The Spectrum of National Responsibility for Cyberattacks". Brown Journal of World Affairs 18 (1): 57–69.
  6. Healey, Jason (Q4, 2011). "Four ways to address cyberconflict – and how analytics can help" (PDF). Journal of Advanced Analytics: 32–34. Retrieved 14 April 2014. Check date values in: |date= (help)
  7. Gjelten, Tom. "Pentagon Goes On The Offensive Against Cyberattacks". Morning Edition. NPR. Retrieved 15 April 2014.
  8. Todd, Brian. "Syria: U.S. Cyber-Strike". The Situation Room (CNN). Retrieved 14 April 2014.
  9. Bloomberg News (12 April 2014). "NSA said to have exploited Heartbleed bug, exposing consumers". NY Daily News. Retrieved 14 April 2014.
  10. Strohm, Chris; Gaouette, Nicole (5 November 2013). "Lawmakers Spurn Obama Bid to Preserve NSA Data Gathering". Bloomberg News. Retrieved 14 April 2014.
  11. "Jason Healey: A Fierce Domain". Pritzker Military Presents. Pritzker Military Museum & Library. Retrieved 15 April 2014.
  12. "Digital doomsters". The Economist. The Economist Newspaper Limited. 29 June 2013. Retrieved 16 April 2014.
  13. Gourely, Bob. "A Fierce Domain: Conflict in Cyberspace, 1986 to 2012". CTOvision.com. Retrieved 16 April 2014.
  14. "20 Cyber Policy Experts To Follow On Twitter". Forbes. 2014-03-26. Retrieved 2014-04-14.

External links

This article is issued from Wikipedia - version of the Sunday, January 10, 2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.