{"id":880,"date":"2025-03-30T06:15:50","date_gmt":"2025-03-30T06:15:50","guid":{"rendered":"https:\/\/firearmupgrades.com\/?p=880"},"modified":"2025-03-30T06:15:50","modified_gmt":"2025-03-30T06:15:50","slug":"how-the-signal-chat-leak-makes-the-nsas-job-harder-foreign-policy","status":"publish","type":"post","link":"https:\/\/firearmupgrades.com\/?p=880","title":{"rendered":"How the Signal Chat Leak Makes the NSA\u2019s Job Harder \u2013 Foreign Policy"},"content":{"rendered":"<p> <br \/>\n<br \/><\/p>\n<div>\n<p>U.S. National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a U.S. attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities.<\/p>\n<p>\u201cI didn\u2019t see this loser in the group,\u201d Waltz <a href=\"https:\/\/abcnews.go.com\/Politics\/trump-admins-shifting-explanations-journalist-added-signal-chat\/story?id=120179649\">told<\/a> Fox News about <em>Atlantic<\/em> editor in chief Jeffrey Goldberg, whom Waltz <a href=\"https:\/\/www.theatlantic.com\/politics\/archive\/2025\/03\/trump-administration-accidentally-texted-me-its-war-plans\/682151\/\">invited<\/a> to the chat. \u201cWhether he did it deliberately or it happened in some other technical mean, is something we\u2019re trying to figure out.\u201d<\/p>\n<\/p><\/div>\n<div>\n<p>U.S. National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a U.S. attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities.<\/p>\n<p>\u201cI didn\u2019t see this loser in the group,\u201d Waltz <a href=\"https:\/\/abcnews.go.com\/Politics\/trump-admins-shifting-explanations-journalist-added-signal-chat\/story?id=120179649\">told<\/a> Fox News about <em>Atlantic<\/em> editor in chief Jeffrey Goldberg, whom Waltz <a href=\"https:\/\/www.theatlantic.com\/politics\/archive\/2025\/03\/trump-administration-accidentally-texted-me-its-war-plans\/682151\/\">invited<\/a> to the chat. \u201cWhether he did it deliberately or it happened in some other technical mean, is something we\u2019re trying to figure out.\u201d<\/p>\n<p>Waltz\u2019s implication that Goldberg may have hacked his way in was followed by a <a href=\"https:\/\/www.cbsnews.com\/news\/nsa-signal-app-vulnerabilities-before-houthi-strike-chat\/\">report<\/a> from CBS News that the U.S. National Security Agency (NSA) had sent out a bulletin to its employees last month warning them about a security \u201cvulnerability\u201d identified in Signal.<\/p>\n<p>The truth, however, is much more interesting. If Signal has vulnerabilities, then China, Russia, and other U.S. adversaries suddenly have a new incentive to discover them. At the same time, the NSA urgently needs to find and fix any vulnerabilities quickly as it can\u2014and similarly, ensure that commercial smartphones are free of backdoors\u2014access points that allow people other than a smartphone\u2019s user to bypass the usual security authentication methods to access the device\u2019s contents.<\/p>\n<p>That is essential for anyone who wants to keep their communications private, which should be all of us.<\/p>\n<hr class=\"thin-horizontal-rule\"\/>\n<p><span class=\"section-break-text\">It\u2019s common knowledge<\/span> that the NSA\u2019s mission is breaking into and eavesdropping on other countries\u2019 networks. (During President George W. Bush\u2019s administration, the NSA conducted warrantless taps into domestic communications as well\u2014surveillance that <a href=\"https:\/\/www.cnn.com\/2006\/POLITICS\/08\/17\/domesticspying.lawsuit\/\">several<\/a> district courts <a href=\"https:\/\/www.nytimes.com\/2010\/04\/01\/us\/01nsa.html\">ruled<\/a> to be illegal before those decisions were later <a href=\"https:\/\/edition.cnn.com\/2007\/POLITICS\/07\/06\/court.domestic.spying\/index.html\">overturned<\/a> by appeals courts. To this day, many legal experts <a href=\"https:\/\/scholarship.law.wm.edu\/cgi\/viewcontent.cgi?article=1135&amp;context=wmborj\">maintain<\/a> that the program violated federal privacy protections.) But the organization has a secondary, complementary responsibility: to protect U.S. communications from others who want to spy on them. That is to say: While one part of the NSA is listening into foreign communications, another part is stopping foreigners from doing the same to Americans.<\/p>\n<p>Those missions never contradicted during the Cold War, when allied and enemy communications were wholly separate. Today, though, everyone uses the same computers, the same software, and the same networks. That creates a tension.<\/p>\n<p>When the NSA discovers a technological vulnerability in a service such as Signal (or buys one on the thriving clandestine vulnerability market), does it exploit it in secret, or reveal it so that it can be fixed? Since at least 2014, a U.S. government interagency <a href=\"https:\/\/www.congress.gov\/crs-product\/R44827\">\u201cequities\u201d process<\/a>\u00a0has been used to decide whether it is in the national interest to take advantage of a particular security flaw, or to fix it. The trade-offs are often complicated and hard.<\/p>\n<p>Waltz\u2014along with Vice President J.D. Vance, Defense Secretary Pete Hegseth, and the other officials in the Signal group\u2014have just made the trade-offs much tougher to resolve. Signal is both widely available and widely used. Smaller governments that can\u2019t afford their own military-grade encryption use it. Journalists, human rights workers, persecuted minorities, dissidents, corporate executives, and criminals around the world use it. Many of these populations are of great interest to the NSA.<\/p>\n<p>At the same time, as we have now discovered, the app is being used for operational U.S. military traffic. So, what does the NSA do if it finds a security flaw in Signal?<\/p>\n<p>Previously, it might have preferred to keep the flaw quiet and use it to listen to adversaries. Now, if the agency does that, it risks someone else finding the same vulnerability and using it against the U.S. government. And if it was later disclosed that the NSA could have fixed the problem and didn\u2019t, then the results might be catastrophic for the agency.<\/p>\n<p>Smartphones present a similar trade-off. The biggest risk of eavesdropping on a Signal conversation comes from the individual phones that the app is running on. While it\u2019s largely unclear whether the U.S. officials involved had downloaded the app onto personal or government-issued phones\u2014although Witkoff suggested on X that the program was on his \u201c<a href=\"https:\/\/x.com\/SteveWitkoff\/status\/1904886084879720683\">personal devices<\/a>\u201d\u2014smartphones are consumer devices, not at all suitable for classified U.S. government conversations. An entire industry of spyware companies sells capabilities to remotely hack smartphones for any country willing to pay. More capable countries have more sophisticated operations. Just last year, attacks that were later attributed to China <a href=\"https:\/\/www.cnn.com\/2024\/10\/25\/politics\/chinese-hackers-targeted-trump-and-vances-phone-data\/index.html\">attempted<\/a> to access both President Donald Trump and Vance\u2019s smartphones. Previously, the FBI\u2014as well as <a href=\"https:\/\/foreignpolicy.com\/2025\/02\/25\/apple-united-kingdom-adp-back-door-less-safe\/\">law enforcement agencies in other countries<\/a>\u2014have pressured both Apple and Google to add \u201cbackdoors\u201d in their phones to more easily facilitate court-authorized eavesdropping.<\/p>\n<p>These backdoors would create, of course, another vulnerability to be exploited. A separate attack from China last year <a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/china-affiliated-actors-compromised-networks-multiple-telecom-companies-us-says-2024-11-13\/\">accessed<\/a> a similar capability built into U.S. telecommunications networks.<\/p>\n<p>The vulnerabilities equities have swung against weakened smartphone security and toward protecting the devices that senior government officials now use to discuss military secrets. That also means that they have swung against the U.S. government hoarding Signal vulnerabilities\u2014and toward full disclosure.<\/p>\n<hr class=\"thin-horizontal-rule\"\/>\n<p><span class=\"section-break-text\">This is plausibly<\/span> good news for Americans who want to talk among themselves without having anyone, government or otherwise, listen in. We don\u2019t know what pressure the Trump administration is using to make intelligence services fall into line, but it isn\u2019t crazy to <a href=\"https:\/\/www.theguardian.com\/us-news\/2024\/apr\/16\/house-fisa-government-surveillance-senate\">worry<\/a> that the NSA might again start monitoring domestic communications.<\/p>\n<p>Because of the Signal chat leak, it\u2019s less likely that they\u2019ll use vulnerabilities in Signal to do that. Equally, bad actors such as drug cartels may also feel safer using Signal. Their security against the U.S. government lies in the fact that the U.S. government shares their vulnerabilities. No one wants their secrets exposed.<\/p>\n<p>I have long advocated for a \u201cdefense dominant\u201d cybersecurity strategy. As long as smartphones are in the pocket of every government official, police officer, judge, CEO, and nuclear power plant operator\u2014and now that they are being used for what the White House now calls calls \u00a0\u201c<a href=\"https:\/\/apnews.com\/article\/trump-signal-classified-information-308e7a81d70d6233c06a1f7330ae3004\">sensitive<\/a>,\u201d if not outright classified conversations among cabinet members\u2014we need them to be as secure as possible. And that means no government-mandated backdoors.<\/p>\n<p>We may find out more about how officials\u2014including the vice president of the United States\u2014came to be using Signal on what seem to be consumer-grade smartphones, in a apparent<a href=\"https:\/\/foreignpolicy.com\/2025\/03\/25\/signalgate-trump-leak-goldberg-yemen-questions\/#:~:text=%E2%80%9CUsing%20Signal%20for,Signal%2C%E2%80%9D%20Moss%20said.\"> breach of the laws on government records<\/a>. It\u2019s unlikely that they really thought through the consequences of their actions.<\/p>\n<p>Nonetheless, those consequences are real. Other governments, possibly including U.S. allies, will now have much more incentive to break Signal\u2019s security than they did in the past, and more incentive to hack U.S. government smartphones than they did before March 24.<\/p>\n<p>For just the same reason, the U.S. government has urgent incentives to protect them.<\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/foreignpolicy.com\/2025\/03\/28\/signal-chat-leak-trump-technology-security-houthis-group-defense-nsa\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>U.S. National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a U.S. attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities. \u201cI didn\u2019t see this loser in the group,\u201d Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":{"0":"post-880","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-politcical-news"},"_links":{"self":[{"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=\/wp\/v2\/posts\/880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=880"}],"version-history":[{"count":0,"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=\/wp\/v2\/posts\/880\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=\/wp\/v2\/media\/881"}],"wp:attachment":[{"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/firearmupgrades.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}