So much this. A physical breach is a nightmare scenario for infosec.
On the off-chance that any of my followers are involved in this -- I do have some experience in scenarios like this and would be happy to help. If I can be of assistance hit me up.
Just to give folks who aren't in the field an idea what we're talking about:
- we must assume that foreign agents were among the rioters
- snooping devices can be implanted into anything with a power cord
- so every device in the capitol is now a potential foreign asset
So, just for starters:
- all computers need to be inventoried, inspected inside and out, and the OS paved/rebuilt
- keyboards, mice, &c might now have implants, they probably should be tossed (see eg keelog.com/forensic-keylo… which looks like a usb cable but is in fact a logger)
Then everything with a power source needs to be audited. This means lamps. Thermostats. Those cute little portrait lights on top of photos. The vacuum cleaner in the storage closet. Even outlets — a fav trick of one Red Team I know is a fake outlet cover that hides a mic.
I'm probably missing about a dozen things. This is off the top of my head and I suck at physical security.
Oof, via a friend who'd like to remain anon, a huge one I missed: rioters were inside the capitol long enough to re-flash the firmware on any device with writeable firmware - which these days is almost everything. Anything with a mic or camera probably needs to be tossed.
Mic, camera, or internet access.
Oh for fuck's sake, I really hope Congress was smart enough not to install any IoT crap.
Remember: the "S" in "IoT" stands for "Security"
(*not my joke, but I can no longer recall where I first heard it)
Just to give an idea of the scope of work here:
the worst PhysSec breach I handled with was when someone stole about a dozen laptops during an office party. He was inside for about 10 minutes, on security cams the whole time. That took several days to recover from.
Just to be clear: the IT breach is hilariously far from the worst to happen today. That's the attempted overthrow of our government by white supremacists, incited to violence by the president.
I'm writing about IT b/c the the other thing is just too much for me to think about rn
This is a good point, another thing I missed. I don’t know much about classified info. I’d like to assume that all would be kept in a SCIF but it occurs to be that I don’t actually know for sure that the Capitol has SCIFs (surely they do, right?)
Yes, there are SCIFs in the Capitol. That’s good, because it means the most sensitive info was contained therein, logs of what’s inside, and camera coverage showing if they’ve been breached. But if one has, it’s a whole other level of bad.
Looks like, thank goodness, things may not quite be worst-case scenario at the Capitol. Here's a good thread from someone a lot more well-informed than I am:
I'm not ashamed to admit that sometimes I miss PHP.
Over 20 years later, and still nobody's even come _close_ to PHP's ease of deployment.
This tweet brought to you by the 3 programming languages and 5 Docker images I need just to run one app.
Turns out having what I thought was a mild opinion about web app deployment was an invitation for people to yell at me, assume I'm stupid, or sell me thier Next Great Thing.
Ugh.
The thing that boggles my mind is how people just assume no nuance whatsoever. Most replies seem to think that I don't get that there are good reasons things got more complex, or that I don't know there are downsides to yolo editing in production, or etc.