|Occupation||Senior Research Scholar, Columbia SIPA|
|Subject||cyber security, cyber policy|
|Notable works||A Fierce Domain, Cyber Conflict 1986 to 2012|
Jason Healey is a Senior Research Scholar in the Faculty of International and Public Affairs and Adjunct Professor of International and Public Affairs at the School of International and Public Affairs at Columbia University. He is also a Senior Fellow with the Cyber Statecraft Initiative at the Atlantic Council where he was the program's founding director. He has published several academic articles, essays, and books on the topic of cyber security and has advised on security measures for corporate, government, and military institutions. He has been identified as the first historian of cyber conflict.
Healy was born and raised in Rhode Island, and at 17, joined the United States Air Force. Initially training to be a fighter pilot, Healey transitioned to signals intelligence and in 1998, began working at The Pentagon to implement a computer network defense system. During his Air Force career, Jason was awarded two Meritorious Service Medals based on his contributions in cyber security during his service at the Pentagon. Healey later received a master's degree in Information Security from James Madison University.
Work in cyber policy
Healey has worked in numerous settings with regard to cyber policy, its implementation, and addressing responses to security threats. In Hong Kong, he served as the vice president for Goldman Sachs where he developed a crisis-response system built to address incidents across the Asian continent. He has also worked at The White House as the Director for Cyber Infrastructure Protection. He is currently a board member on the Cyber Conflict Studies Association and the Military Cyber Professionals Association. The extent of his work has led one magazine to refer to Healey as the first historian of cyber conflict.
Frequently, Healey has publicly commented and written articles on high-profile malware threats and cyber policy. For instance, Healey has discussed the potential advantages and disadvantages of the United States launching cyber-based attacks. In regards to such an offensive on Syria, he stated that "you no longer have to drop physical bombs and kill people, that it can be targeted, non-lethal microforce", but further surmised that due to past leaks of the United States' involvement in Stuxnet, relevant government agencies may have decided against it. Healey has also commented on the Heartbleed bug, noting the failure of the NSA to live up to its stated priority of defense by not exposing the bug when it was found, and he said that the organization would be "shredded by the computer security community" for this failure. In 2013, Healey also took a critical stance on the current state of mass surveillance in the United States. He predicted that U.S. interests abroad would suffer "deep and long term damage" given that the administration could not implement any alternatives to spying conducted by the National Security Agency.
In 2012, Healey published A Fierce Domain, Cyber Conflict 1986 to 2012, which explores the idea that confrontations that have taken place within cyberspace has established a new kind of conflict. This development is explored historically, starting in 1986 with a hacking initiative planned by the KGB to steal military plans from the U.S. in what is referred to as the Cuckoo's Egg Case. The book received a positive reception and has been referred to as a definitive historical record of cyber conflict.
- Cyber Security Policy Guidebook (2012), co-author, published by John Wiley & Sons (ISBN 9781118241325)
- A Fierce Domain, Cyber Conflict 1986 to 2012 (2013), author, published by the Cyber Conflict Studies Association (ISBN 9780989327404)
- "Jason Healey | Columbia SIPA". sipa.columbia.edu. Retrieved 2019-04-20.
- Vitaliev, Vitali. "Interview with Jason Healey". E&T Magazine. The Institution of Engineering and Technology. Retrieved 12 April 2014.
- David Balaban (2013-06-03). "Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey from the Atlantic Council". Privacy PC. Retrieved 2014-04-14.
- Mullen, Shannon (2013-07-09). "Tech companies look to stay ahead of hackers". Marketplace.org. Retrieved 2014-04-14.
- Karen Epper Hoffman (2014-02-03). "Advanced malware: The growing cyber menace". SC Magazine. Retrieved 2014-04-14.
- Healey, Jason (2011). "The Spectrum of National Responsibility for Cyberattacks". Brown Journal of World Affairs. 18 (1): 57–69.
- Healey, Jason (Q4, 2011). "Four ways to address cyberconflict – and how analytics can help" (PDF). Journal of Advanced Analytics: 32–34. Retrieved 14 April 2014. Check date values in:
- Gjelten, Tom. "Pentagon Goes On The Offensive Against Cyberattacks". Morning Edition. NPR. Retrieved 15 April 2014.
- Todd, Brian. "Syria: U.S. Cyber-Strike". The Situation Room. CNN. Retrieved 14 April 2014.
- Bloomberg News (12 April 2014). "NSA said to have exploited Heartbleed bug, exposing consumers". NY Daily News. Retrieved 14 April 2014.
- Strohm, Chris; Gaouette, Nicole (5 November 2013). "Lawmakers Spurn Obama Bid to Preserve NSA Data Gathering". Bloomberg News. Retrieved 14 April 2014.
- "Jason Healey: A Fierce Domain". Pritzker Military Presents. Pritzker Military Museum & Library. Retrieved 15 April 2014.
- "Digital doomsters". The Economist. The Economist Newspaper Limited. 29 June 2013. Retrieved 16 April 2014.
- Gourely, Bob. "A Fierce Domain: Conflict in Cyberspace, 1986 to 2012". CTOvision.com. Retrieved 16 April 2014.
- "20 Cyber Policy Experts To Follow On Twitter". Forbes. 2014-03-26. Retrieved 2014-04-14.