Digital media, security expert talks cyber-security concerns following U.S. capitol breach

Much more than just windows, furniture and doorways could have been damaged when rioters stormed the U.S. Capitol Wednesday.Photos and video show people roaming freely in congressional offices and documents scattered everywhere.Even laptops, still nowhere to be found…Sen. Jeff Merkley, of Oregon, was one of the lucky ones to get his back.”People smashed into the door of my Capitol office and threw things on the floor and the laptop disappeared off the table. The Capitol police were able to track its signal and recovered it,” Merkley said.The many devices rioters had access to is raising real concerns about cyber-security and what private information could have been compromised.”You can only imagine that having any sort of information, personal information, on those people can be leveraged in a lot of scary and terrifying ways,” Andrew Zolides, assistant professor of digital media at Xavier University, said. “Certainly some form of an audit, for lack of a better word, of any sort of device in that building is sort of required.”Zolides said that includes computers, cell phones, modems, internet lines and servers — those behind the scenes devices where all networks are built.He also said reframing digital protocols will probably be necessary.”I certainly believe at the very least there are going to be some new rules about leaving devices behind or creating some remote shut downs that you can sort of wipe a device if it’s no longer in your physical possession,” Zolides said.

Much more than just windows, furniture and doorways could have been damaged when rioters stormed the U.S. Capitol Wednesday.

Photos and video show people roaming freely in congressional offices and documents scattered everywhere.

Even laptops, still nowhere to be found…

Sen. Jeff Merkley, of Oregon, was one of the lucky ones to get his back.

“People smashed into the door of my Capitol office and threw things on the floor and the laptop disappeared off the table. The Capitol police were able to track its signal and recovered it,” Merkley said.

The many devices rioters had access to is raising real concerns about cyber-security and what private information could have been compromised.

“You can only imagine that having any sort of information, personal information, on those people can be leveraged in a lot of scary and terrifying ways,” Andrew Zolides, assistant professor of digital media at Xavier University, said. “Certainly some form of an audit, for lack of a better word, of any sort of device in that building is sort of required.”

Zolides said that includes computers, cell phones, modems, internet lines and servers — those behind the scenes devices where all networks are built.

He also said reframing digital protocols will probably be necessary.

“I certainly believe at the very least there are going to be some new rules about leaving devices behind or creating some remote shut downs that you can sort of wipe a device if it’s no longer in your physical possession,” Zolides said.

(Excerpt) Read more Here | 2021-01-10 04:58:00
Image credit: source

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.