IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

U.S. Capitol Breach Poses Information Security Risks

When the pro-Trump mob breached the U.S. Capitol building Wednesday, rioters had access to congressional offices, any computers that were left on and potentially confidential paperwork, analysts say.

A pro-Trump protestor sitting at a desk inside the U.S. Capitol after rioters forced their way in Jan. 6. The move was an attempt to disrupt the verification of presidential election results.
A pro-Trump protestor sitting at a desk inside the U.S. Capitol after rioters forced their way in Jan. 6. The move was an attempt to disrupt the verification of presidential election results.
Shutterstock/Alex Gakos
(TNS) — The pro-Trump mob at the U.S. Capitol on Wednesday that stormed the Senate floor and Capitol rotunda may have breached more than just the building’s physical security.

Photos show rioters in congressional offices, including that of House Speaker Nancy Pelosi, D-Calif. Any computers left on could be vulnerable, and so could papers — such as personal schedules or mail — that weren’t locked away, information security experts said. Sen. Jeff Merkley, D-Ore., said his office was ransacked and a laptop stolen. Officials also said multiple electronic items were taken from the building, according to CNN.

What does this mean for the security of the nation’s information? Here are insights from experts who spoke with The Los Angeles Times.

Question: Does the invasion of the Capitol pose a cybersecurity risk?

Answer: It depends. If rioters got their hands on congressional computers that were still logged in, they may have been able to access information. But if those computers were encrypted, they wouldn’t be able to get anything, said Jesse Varsalone, associate professor of computer networks and cybersecurity at University of Maryland Global Campus.

However, if a computer was encrypted but documents were left open onscreen, that information would already have been decrypted and could have been read, said Suzanne Spaulding, an adviser to Nozomi Networks and former undersecretary for the Department of Homeland Security. That means members of the mob could have snapped images of documents such as emails.

“I would not assume right off the bat that the folks who broke into the Capitol yesterday, forced their way in, had folks whose objective and skillset was to use their physical access to gain access to the IT system, to sensitive information,” she said. “But ... if someone takes a laptop, they can later decide, ‘Hey, this could be really interesting. I don’t have the skills to exploit it, but I’m going to find someone who does.’”

The theft of a laptop, as from Merkley’s office, poses special concern because the machine is part of a federal network and could help outsiders access the entire network.

“That’s the concern about a stolen laptop,” Spaulding said. “It’s not just about what’s on the laptop.”

Q: Could someone have put malware onto congressional computers?

A: It’s possible, but Varsalone said it’s probably unlikely.

“It seems they were more motivated to kind of actually derail (the electoral college vote certification), as opposed to plant something,” he said.

Q: What about sensitive or confidential documents?

A: Congressional leaders with security clearances must abide by rules intended to protect that information, Varsalone said. If such information was on a computer, it probably would be shielded with encryption.

Q: How does this situation compare with other potential threats to the nation’s information security?

A: It’s not clear yet whether Wednesday’s events included a breach of cybersecurity or information security at all, and if only one laptop was stolen, the risk may be more limited, Spaulding said.

There is no indication that any of the rioters had IT savvy or were prepared to infect congressional computers with malware, she said.

“From an IT perspective, when I look at the events of what happened yesterday and all of the incredible implications ... the IT cybersecurity concerns are not the highest on my list,” Spaulding said.

The riot at the Capitol came just weeks after a much bigger cybersecurity revelation: that an “outside nation state” suspected to be Russia had been spying on U.S. government computer networks by exploiting a vulnerability in software produced by SolarWinds, a Texas company.

The SolarWinds breach affected 18,000 of its customers, including the Treasury and Commerce departments. The FBI and the Homeland Security Department are investigating the matter, and the Homeland Security Department said last month that there was an “unacceptable risk” to the executive branch from the large-scale breach.

Q: How will this change security at the Capitol?

A: Policies will probably be reviewed, and physical security as well as computer security will probably be bolstered, Varsalone said.

“In general, a lot of government agencies tend to have a lot of really good security, and they have for years and years and years,” he said.

In this case, he said, the U.S. Capitol Police were overwhelmed by and unprepared for the size of the mob. “That’s where the real breakdown was,” he said.

The Capitol Police declined offers of help from the National Guard days before the riot and from FBI agents during the riot, according to the Associated Press. The police chief announced Thursday that he will resign.

©2021 Los Angeles Times, Distributed by Tribune Content Agency, LLC.