Skip to Content

NSA Hacking Chief: Internet of Things Security Keeps Me Up at Night

The leader of the National Security Agency’s hackers says that putting industrial control systems online has made America less secure.
January 28, 2016

The trend to connect devices such as air conditioners and door locks to the Internet is making life easier for the National Security Agency’s hackers—but also keeping their boss awake at night.

Rob Joyce, chief of the NSA’s Tailored Access Operations unit, leads what is likely the best resourced group of hackers in the world. They are tasked with infiltrating computer networks to gather foreign intelligence, and also with probing U.S. government networks to improve their security.

Speaking in San Francisco Wednesday about how nation-backed teams like his operate, Joyce said that the so-called “Internet of things” is a major boon when the TAO group needs to attack a target. He singled out heating and cooling systems as examples of Internet-connected devices that offer national-level hackers a route into organizations that computer network administrators often overlook. Joyce spoke at the Enigma security conference.

However, Joyce also said that the poor security of such devices is one of his primary concerns when it comes to the safety of U.S. networks.

In recent years researchers have found that hundreds of thousands of industrial and commercial control systems—referred to as SCADA systems—have been blithely hooked up to the Internet without proper protections, including power plants and other critical infrastructure (see “What Happened When One Man Pinged the Whole Internet”).

“SCADA security is something that keeps me up at night,” said Joyce. He suggested that it might need new ideas from academia, which works on more fundamentally new ideas than industry, to improve the situation.

Nicholas Weaver, a computer security researcher at the International Computer Science Institute in Berkeley, California, who attended Joyce’s talk, said that he had correctly highlighted a significant problem, and an area where scary discoveries are easily made but possible solutions very scarce. “I don’t do SCADA research because I like to sleep at night,” said Weaver.

Researchers that do work on SCADA security have found evidence that there are groups trawling the Internet looking for industrial systems to infiltrate (see “Chinese Hacking Team Caught Taking Over Decoy Water Plant”). A recent report by the Nuclear Threat Initiative said that many nuclear power and weapons facilities are not adequately protected against computer-based attacks.

Keep Reading

Most Popular

DeepMind’s cofounder: Generative AI is just a phase. What’s next is interactive AI.

“This is a profound moment in the history of technology,” says Mustafa Suleyman.

What to know about this autumn’s covid vaccines

New variants will pose a challenge, but early signs suggest the shots will still boost antibody responses.

Human-plus-AI solutions mitigate security threats

With the right human oversight, emerging technologies like artificial intelligence can help keep business and customer data secure

Next slide, please: A brief history of the corporate presentation

From million-dollar slide shows to Steve Jobs’s introduction of the iPhone, a bit of show business never hurt plain old business.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.