AMU Cyber & AI Editor's Pick Original

NSA Speaker Rob Joyce Offers Cybersecurity Insights at DEF CON 26

Get started on your cybersecurity degree at American Military University.

By James Lint
Senior Editor forInCyberDefense and Contributor, In Homeland Security

Rob Joyce, the Senior Advisor for Cybersecurity Strategy at the National Security Agency (NSA), was an interesting kickoff speaker for DEF CON 26. He has attended this hacker’s convention for many years. Joyce attended this year’s conference not only to give his talk but also for recruitment purposes.

Information Technology Is a Worldwide Game Changer, Joyce Says

Information technology is a worldwide game changer and is increasing the number of people online, according to Joyce. In 2017, 4.16 billion people (54% of the global population) were online.

While social media sites such as Facebook and Twitter encouraged the development of online communities, the growth of Bitcoin and other cryptocurrencies, the Internet of Things (IoT) and cloud computing have accelerated the evolution and increased online communities. Consequently, there have been more cybersecurity hacking incidents.

Major cybersecurity incidents have included:

  • The Office of Personnel Management database hack between 2014-15 by Chinese actors
  • The attack on Ukraine’s electrical grid in 2016
  • The WannaCry ransomware attack from North Korea that knocked out computers in 150 countries in 24 hours in 2017
  • The Russian cyber attack on the 2018 Winter Olympics, which took Internet and Wi-Fi access and the Olympics website down for 12 hours

Joyce Reviews Today’s Cyber Threats

Joyce discussed the current threats that are affecting the U.S. and cyber security domains. He noted that high-end cyber threat activity continues to become more sophisticated, while the level of expertise required for hacking has decreased.

This change is due to new Internet tools that have become easier for hackers to use. Joyce noted that hacking has clearly moved from mere exploitation to active disruption of operations and organizations.

Many of the Chinese hacks were not attacks to destroy or even disrupt systems. Instead, Joyce observed, the Chinese hacks were intended as cyberespionage.

An interesting area that Joyce examined was the growing use of information operations using cyber intrusions to spread misinformation. Cyber intrusions into social media platforms have been used to create additional followers or fake accounts. This practice allows threat actors to push a storyline or create malicious propaganda campaigns, as we’ve seen during election cycles.

Joyce Offered Prediction on Where Cybersecurity Is Going in the Future

As a result of Joyce’s speech, some attendees explored career opportunities with NSA. This agency is continuing to incorporate innovative technology in cyber defense, such as analytics tools and the knowledge gained from them.

NSA also collaborates with the Department of Homeland Security to pass along cyber threats to the affected industries. In the future, Joyce predicted, there will be more communication between agencies and other organizations to stop cyber threats to the United States.

Conferences Such As DEF CON 26 Provide Unique Window into Government Agencies

Normally, you do not encounter NSA personnel unless you reside in the Washington, D.C., metro area. However, DEF CON 26, provides a unique opportunity to talk to, ask questions of and learn from senior government officials, including those from NSA.

About the Author

James R. Lint retired as the (GG-15) civilian director for intelligence and security, G2, U.S. Army Communications Electronics Command. James has been involved in cyberespionage events from just after the turn of the century in Korea supporting 1st Signal Brigade to the DHS Office of Intelligence and Analysis as the first government cyber intelligence analyst. He has 38 years of experience in military intelligence with the U.S. Marine Corps, U.S. Army, government contracting and civil service.

Additionally, James started the Lint Center for National Security Studies, a nonprofit charity that recently awarded its 51st scholarship for national security students and professionals. James was also elected as the 2015 national vice president for the Military Intelligence Corps Association. He has also served in the Department of Energy’s S&S Security Office after his active military career in the Marine Corps for seven years and 14 years in the Army. His military assignments include South Korea, Germany and Cuba, in addition to numerous CONUS locations. In 2017, he was appointed to the position of Adjutant for The American Legion, China Post 1. James has authored a book published in 2013, “Leadership and Management Lessons Learned,” a book published in 2016 “8 Eyes on Korea, A Travel Perspective of Seoul, Korea,” and a new book in 2017 Secrets to Getting a Federal Government Job.”

Wes O'Donnell

Wes O’Donnell is an Army and Air Force veteran and writer covering military and tech topics. As a sought-after professional speaker, Wes has presented at U.S. Air Force Academy, Fortune 500 companies, and TEDx, covering trending topics from data visualization to leadership and veterans’ advocacy. As a filmmaker, he directed the award-winning short film, “Memorial Day.”

Comments are closed.