Reports that a laptop from the house speaker Nancy Pelosi’s The office was stolen during the Trump riots, a supporter of the Tritol building, with some worried that the crowd might have access to important, even classified information. Fortunately this is not so – even if this computer and others had really sensitive information, which is unlikely, like any corporate asset it could almost certainly be remotely disabled.
The risk of cyber security in general from a riot is not as high as one might think, As we explained yesterday. There are several facts to keep in mind, specific to stolen or otherwise compromised hardware.
In the first place, the offices of elected officials are already public spaces in many ways. These are historic buildings through which frequent visits occur, in which meetings are held with foreign dignitaries and other politicians, and in which thousands of ordinary citizens would normally work shoulder to shoulder without any security clearance. The important work they do is largely legislative and administrative – largely public work, where the most sensitive information is exchanged, perhaps unannounced speeches and draft bills.
But recently, you may remember, most of these people were working from home. Of course, during the major event of the joint session as voters confirm, there will be more people than usual. But it was not a normal day in office by a long shot – even before hundreds of radical parties forcibly occupied the building. There is a possibility that a lot of important businesses were not being done on the desktop in these offices. The classified data resides in access-controlled SCIFs, not on random devices sitting in unsafe areas.
Actually, laptop is Reported by Reuters As has been part of a conference room’s dedicated hardware – it’s the dusty old Inspiron that stays on the A / V table so you can put your PowerPoint on it, not Pelosi’s personal computer, let alone top secret information Provide a hard line for.
Even if there was a question of unintended access, it should be noted that the federal government, as with any large company, could have a common IT department with a relatively modern provisioning structure. Like any other piece of hardware being used for official house and senate business, Pelosi Office laptops are monitored by IT and must be able to be remotely disabled or erased. The challenge for the department is which hardware really needs to be handled that way – as previously stated, there was no official plan (understandably) for the violent takeover of the Capitol Building.
In other words, it is highly likely that the theft of government computers on January 6 will result in the most inconvenience or that some informal communication with some embarrassment should become public. Staff gossip and glee, of course, both on the back and on official channels.
That said, people who attack these offices and steal that device – some on camera – already Arrested and charged. Just because theft does not present a serious security threat does not mean that it was highly illegal in many different ways.
Any cyber security officer will tell you that widespread intrusion into government contractors and accounts through solarweed breeches is by far the biggest threat. Those systems are replete with information that was never public and will provide fuel for credential-related attacks for years to come.