On January 6, 2021, his followers <br><br>Donald Trump They attacked the Capitol and ransacked some of its offices, while they remained on its premises for more than two hours before being removed.
Apart from vandalism, however, there is information about theft of objects and devices, such as his computer of the senator Jeff Merkley.
Although most of them invaders have been found, it is extremely difficult to find out what exactly they did during their hours in the Capitol and consequently in what information, documents, codes gained access. Although only a small number of building appliances are believed to have been breached, the sensitive nature of the information they contain can be a major risk factor for safety.
The situation is worse than initially presented. According to their schedule USA Today, Congress returned at 8 p.m. of 6th January. Obviously, there was no way to completely replace thousands of machines in such a short time. Therefore, from that moment until now, members and staff use digital Appliances which may have been violated. This means that all communications, files and network connections to and from the Capitol may also have been compromised.
The fact that so many people had access to the Capitol area unattended also raises suspicions that some of them may not have been Americans. It is very possible that people from other nations interfered with the protesters in order to gain physical access to places and machines that would otherwise be impossible. In fact, given recent attacks by countries such as Russia, it is not uncommon for malicious agents to gain access to the Capitol's systems with all that entails for its security.
It is possible that the intruders opened the machines and even placed extra discs inside them, which were then sealed. With a powerful screwdriver, it is possible to open a computer tower, to install one USB stick to an open inner door and seal within a minute or two. This may never be detected.
What should be done?
There are some best practices that can reduce the risk. Micro-segmentation of the network can prevent malware from passing through the zones, for example. However, no security practice based on network can not completely mitigate a physical attack.
All machinery in the Capitol must be scanned. Any desktop computer that is not hermetically sealed must be opened and carefully inspected internally. USB drives must be locked so that personnel cannot connect random USB drives. The building must be scanned repeatedly in each room.
Congressional staff should also be trained on best practices, even if extra time is needed.
Any digital device inside the building should be considered suspicious. It is important to maintain a strong security situation even after testing and scanning active machines, because we must be wary of delayed threats and hidden attacks, waiting for the opportunity to allow access to third parties.
Finally, all those involved in the attack, especially those who broke into the building, risk being prosecuted to the fullest extent of the law and possibly even being accused of violating the espionage law.