Security Issues in the Congress Building Raid?
Security Issues in the Congress Building Raid?

Security Issues in the Congress Building Raid?

The FBI shared intelligence of the impending threat with the US Capitol Police with the following instructions.

The uprising in the US Capitol was a published collapse of US government security. Physical and operational security policies could not protect a federal facility in the act of terrorism. However, this attack was not a surprise. On January 5, the FBI shared intelligence of the impending threat with the US Capitol Police with the following instructions:

“Not taking action based on this raw reporting without prior coordination with the FBI.” The breach caused false information to spread and miscommunication undermined confidence in the steadfastness of the US Capitol before its opening ceremony on January 20. About two months later, the Congress aims to form a commission to investigate what happened on January 6, how to prevent it from happening again, and how to remove misinformation about the uprising.

To prevent political ambitions from interfering with the investigation, many Congress members are trying to establish a bilateral commission. Such a commission has a new precedent. After the September 11 attacks, a bipartisan 9/11 Commission was established to investigate the details of these events.

Commission Recommendations

Republicans and Democrats alike agree that the 9/11 Commission has been largely successful due to its sober recommendations, such as the bipartisanism and the creation of the Office of the National Intelligence Directorate, and its sober recommendations, such as the Homeland Security Act. However, there are some disagreements between the parties over the establishment of a bipartisan commission to investigate the rebellion. These disputes center around the focal point and scope of the commission, particularly with regard to the general issue of political violence, President Donald Trump’s involvement, and misinformation and disinformation roles.

In the coming days and weeks, as Congress plans the scope of the January 6th Commission, they are seeking input from those who served on the September 11 commission. The January 6 commission will have the opportunity to: 1) ensure that appropriate persons are held responsible for the incident and 2) develop administrative policies to reduce and manage overt internal threats.

Inter-agency policies are used across 64 federal agencies to share responsibility for protecting federal facilities against terrorist acts. The Inter-Agency Security Committee (ISC) was created in response to the 1995 Oklahoma City Bombings to develop integrated policies to protect non-military federal facilities. attackers from a facility.

US Capitol’s Current Security Strategy.

Despite these efforts, loopholes still exist, and on January 6, attackers identified and exploited vulnerabilities in the US Capitol’s current security strategy. The US Capitol was designed to be an open space for visitors rather than a castle closed to the public. Procedures to protect against forced entry attacks called for the use of barricades and intrusion detection systems that create a distance between the facility and attackers. If attackers break through the barricades, there is a certain amount of time before the attacker can enter the facility.

During this appropriate period of time, security personnel have the ability to initiate countermeasures such as locking out access points or alerting their recruiting power. Why did the automatic locking system allow attackers in on January 6? Why did it take so long for the National Guard to get approval from the Pentagon on January 6? The American people deserve a commission on January 6, which publicly answers these questions and improves administrative policies that dictate the development of secret security measures.

The Closed Circuit Television (CCTV) system is a security measure that acts as the first line of defense to detect and deter threats in real time. On January 6, the CCTV system surveillance team was able to detect the attackers before they entered, like thousands of people watching the riot on social media. The images collected by the system are also used to assist the Ministry of Justice’s investigation to prosecute the relevant attackers.

CCTV system is both an operational and a physical security measure. Operating the Capitol’s CCTV system, Capitol Police must perceive attackers as threats and respond quickly before the building is breached. The physical presence of CCTV systems should be respected by attackers who understand that if they are recorded while entering the building illegally, they will be prosecuted. It cannot be denied that more policies, tools and strategies must be used to maintain such an accessible federal facility.

CCTV footage and social media posts of the uprising showed how accessible the US Capitol was via public hotspots. An access point is any entry point to the property, such as exterior doors and windows. Most of the attackers in the riot entered the Capitol Building, after entering through the outside windows, quickly passing through the front door.

As soon as the attackers entered, they managed to breach the offices of high-profile elected officials, such as Speaker of the House of Representatives Nancy Pelosi. In terms of security, protective measures are in place that can completely block or slow down attackers from entering the US Capitol. Protective measures such as multiple locking systems on doors and high-quality protective window films are just a few measures that prevent unauthorized personnel from entering a facility. Although shatterproof film was placed on the exterior windows of the US Capitol, the attackers managed to quickly enter the building due to the poor frame between the windows and the structure.

Some internal physical security measures are in place, such as card readers and pop-up firewalls, to delay attackers’ progress. An automatic locking system serves a similar purpose to quickly secure privileged locations and delay further security breaches. While it can suggest security measures on social media as a relevant public, the effectiveness of these security measures should be evaluated by security experts in the 6 January commission.

In conjunction with addressing the security issues of the US Capitol, the commission should be responsible for reassuring and informing the public, whose confidence was shaken by the uprising itself and mislead the media. Media coverage on operational and physical security provided technical details and expert opinions on security strategies to a general audience.

Overlooked Headlines

Overlooked headlines and out-of-context quotes are dangerous weapons that create an opportunity to turn real news into “fake news” or misinformation. In Fast Company’s “Black eye for security” article: Why didn’t the Capitol Police stop the rebels? “Brian Gant, an international terrorism expert working for the FBI, argued that the distance was ineffective and the attackers were too close to the facility.

“It wouldn’t take long for them to do what they just did for [the attackers] and basically gather in the Capitol Police. Later in the article, Gant accurately predicts the strong backlash in defense of the upcoming opening. “This will be considered a national security event, so all federal agencies. They will be in a task force mode as they plan with each other.

You will need to rely on manpower to secure the area, which will require all institutions to issue corpses. While the “Capitol rebellion” is a “black eye for security,” the uninterrupted opening is an example of working together to secure the US Capitol. The January 6 Commission is a necessary continuation of the federal government’s collaborative efforts to protect Americans.

To be as effective as possible, Congress should consider the following when setting up the Commission:

  • The January 6 Commission included a bipartisan group of security experts.
  • Integrating protective measures with Capitol police emergency procedures.
  • Establishing a coordinated plan to publicize the security situation in order to provide reliable information to the media.
  • Establish a standard protocol for Capitol Police risk assessment that directly takes into account operational vulnerabilities such as implicit bias.
  • It archives CCTV footage of the uprising indefinitely.

While the Department of Justice identifies and prosecutes relevant attackers, security guards, the Capitol Police, DHS, and Congress can work together and rely on the proposed January 6 Commission to dispel all media speculation about what happened on January 6, 2021. for proof. If implemented, the success of this January 6th Commission will have the opportunity to become a milestone in federal security. Congress can then introduce the laws necessary to prevent this type of attack from happening again and to restore trust among the American people.