Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
1/14/2021 | 12:13:16 PM
I am not sure what you saw but I don't think it was not a lack of capability.
From what I saw,
  • The National Guard was told to stand down from the request made by the major of DC
  • They knew about the march to the capitol in November
  • After 5 pm, that is when most of the protection arrived from different parts of the country
  • Most of the individuals that breached the capitol were white
  • The security guards and capitol police helped the older individuals down the stairs (saws on CNN)


So let's be honest here, that building has state of the art video surveillance/cameras. They have a subway that is at a lower floor that allows congressman to travel to remote sites where they can get into their cars. 

So they knew what was going on but were told to stand down and the president (Chief Officer of the US) stated that they should march to the capitol and express their discontent with the voting process. No matter how much technology you have, it is dependent upon careful use also, security professionals had their hands in their pockets, slowly moving the crowd away from the capital.

Trump Says 'We Will Never Concede' as Mob Storms Capitol Building - The New  York Times

If this group were of color, it would have been a blood bath, so I have to respectfully disagree with your sentiments, they have the technology, they were told to stand down.



I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Incorporating a Prevention Mindset into Threat Detection and Response
Threat detection and response systems, by definition, are reactive because they have to wait for damage to be done before finding the attack. With a prevention-mindset, security teams can proactively anticipate the attacker's next move, rather than reacting to specific threats or trying to detect the latest techniques in real-time. The report covers areas enterprises should focus on: What positive response looks like. Improving security hygiene. Combining preventive actions with red team efforts.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-22
OS Command Injection in GitHub repository yogeshojha/rengine prior to 1.2.0.
PUBLISHED: 2022-05-21
Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
PUBLISHED: 2022-05-21
Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext '[email protected]\n\trole = "#admin"' value.
PUBLISHED: 2022-05-21
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
PUBLISHED: 2022-05-21
Solana solana_rbpf before 0.2.29 has an addition integer overflow via invalid ELF program headers. elf.rs has a panic via a malformed eBPF program.