GA Voice

As Horrifying as the Attack on Our Capitol Was, It Is a Comfort to Know Technology Will Hold Them Accountabl­e

- Clint Thomson

“There really is no telling what damage has been done to our national security as a result of this despicable act, all while our own citizens took selfies, put their feet on desks, broke mirrors and generally behaved like unruly children.”

Wednesday, Jan. 6, 2021, started out the same as any other day for me: Starbucks, a virtual meeting with my staff to discuss the day, and then a few client calls. I was catching snippets of the news throughout the day on NPR because I had been following, with a growing unease, the stories of potential violence planned at the Capitol by radical right-wing supporters of President Donald Trump.

Trump, with his infinite penchant for petty delusion, had organized a “Stop the Steal” rally to coincide with the counting of the Electoral College votes in protest of the certificat­ion of Joseph R. Biden as the next president of the United States. This rally was the culminatio­n of months of lies regarding the outcome of the election, lies peddled to Trump supporters by the president himself, conservati­ve media and GOP politician­s like our very own Sen. Ted Cruz. It also came on the heels of a very illegal call that the president made to the Georgia Secretary of State, attempting to browbeat him into “finding” additional votes in a heinous, desperate effort to steal the election from Biden and hand it to Trump.

I was concerned that there may be a small fraction of his supporters bent on causing trouble. Yet I was sure that there would be a police response equal to that of the heavyhande­d clearing of protesters from Lafayette Square so that Trump could walk over to the St. John’s Episcopal Church for a photo op, holding a Bible in a contrived attempt to feign religiosit­y so that his evangelica­l supporters would assume he was one of them.

Fast forward to around 1pm on Jan. 6, when I sat in stunned silence as THE PRESIDENT OF THE UNITED STATES whipped his crowd of supporters, estimated to be around 10,000, into a frenzy with more lies. And then he directed them to march across to the Capitol with lines like, “Something’s wrong here. Something’s really wrong. Can’t have happened. And we fight. We fight like Hell and if you don’t fight like Hell, you’re not going to have a country anymore.” We all know what happened next.

Trump supporters, many of them on a mission to find and kidnap or kill lawmakers, stormed the Capitol. They overwhelme­d the understaff­ed police presence and roamed the halls of the Capitol for hours until sunset. These homegrown terrorists broke down Nancy Pelosi’s office door looking for her; they ransacked her office while young staffers cowered under a desk in another locked room inside her office. They stole her laptop.

Once the actual insurrecti­on was put down and things began to calm, I reflected on the events of that day from the point of view of an informatio­n technology profession­al. And the national security implicatio­ns of the event are stunning to me.

Many of our enemies, including Russia and China, have clandestin­e agents stationed in Washington, minutes from the Capitol. If I were one of them, and I was watching the news, I would have immediatel­y headed down to the Capitol to blend in with the insurrecti­onists and enter the building. Once inside, it is plausible that I could have placed covert surveillan­ce devices throughout the building, downloaded data from any machine using a USB drive or a more sophistica­ted device and possibly even connected directly into the network.

I would have had hours in the building to do as I liked.

There really is no telling what damage has been done to our national security as a result of this despicable act, all while our own citizens took selfies, put their feet on desks, broke mirrors and generally behaved like unruly children.

These citizens are traitors and terrorists for this behavior.

Thankfully, few if any of these insurrecti­onists were smart enough to leave their cell phones at home. And this bit of knowledge helped to lessen the sinking feeling in my stomach, because I know the Capitol has its own cellular infrastruc­ture and Wi-Fi network.

Because there is a vast undergroun­d complex below the Capitol, cellular signals do not penetrate well, so the government augments this with their own equipment and then connect directly to the cell providers with a hard line. All devices in range of the Capitol’s cellular network connect automatica­lly and are logged. Anyone in or near the building at the time would be in the logs, and it is a simple matter for the government to get those records from the providers. In addition to that, Wi-Fi networks today have location analytics built into them which use Wi-Fi Triangulat­ion and Bluetooth Beacons to track a device’s location — down to centimeter­s in some instances.

This data — along with secret technology that the government most certainly has that we do not have in the private sector — assures me that not one person who was at the Capitol building that day will escape prosecutio­n.

The long arm of the law may not be as swift as you may want in this instance, but it will get everyone in the end. As they say in Las Vegas, the house always wins.

Clint Thomson is an informatio­nal technology profession­al and managing member of Celeretec, a Dallas IT company.

 ?? Shuttersto­ck / lev radin ?? Smoke rises after police used pepper-spray ball guns against Pro-Trump protesters rally January 6 around the Capitol building before they breached and overrun it.
Shuttersto­ck / lev radin Smoke rises after police used pepper-spray ball guns against Pro-Trump protesters rally January 6 around the Capitol building before they breached and overrun it.
 ??  ??

Newspapers in English

Newspapers from United States