blogwire logo blogwire logo
  • Home
  • Information
  • Technology
  • Business
  • Entertainment
  • gaming
  • Information
  • News
  • Sports
Reading: How the Signal Chat Leak Makes the NSA’s Job Harder – Foreign Policy
BlogwireBlogwire
Font ResizerAa
  • Entertainment
  • Technology
Search
  • Homepage
  • Home
  • Features
    • Post Headers
    • Layout
  • Categories
    • Technology
    • Entertainment
    • Health
  • Categories
  • Bookmarks
  • More Foxiz
    • Blog Index
    • Sitemap
Have an existing account? Sign In
Follow US
Copyright © 2025 BlogWire. All Rights reserved
Blogwire > Blog > News > How the Signal Chat Leak Makes the NSA’s Job Harder – Foreign Policy
How the Signal Chat Leak Makes the NSA’s Job Harder – Foreign Policy
News

How the Signal Chat Leak Makes the NSA’s Job Harder – Foreign Policy

BlogWire Team
Last updated: March 29, 2025 1:08 pm
By BlogWire Team
9 Min Read
Share
SHARE

[ad_1]

U.S. National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a U.S. attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities.

“I didn’t see this loser in the group,” Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. “Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out.”

U.S. National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a U.S. attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities.

“I didn’t see this loser in the group,” Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. “Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out.”

Waltz’s implication that Goldberg may have hacked his way in was followed by a report from CBS News that the U.S. National Security Agency (NSA) had sent out a bulletin to its employees last month warning them about a security “vulnerability” identified in Signal.

The truth, however, is much more interesting. If Signal has vulnerabilities, then China, Russia, and other U.S. adversaries suddenly have a new incentive to discover them. At the same time, the NSA urgently needs to find and fix any vulnerabilities quickly as it can—and similarly, ensure that commercial smartphones are free of backdoors—access points that allow people other than a smartphone’s user to bypass the usual security authentication methods to access the device’s contents.

That is essential for anyone who wants to keep their communications private, which should be all of us.


It’s common knowledge that the NSA’s mission is breaking into and eavesdropping on other countries’ networks. (During President George W. Bush’s administration, the NSA conducted warrantless taps into domestic communications as well—surveillance that several district courts ruled to be illegal before those decisions were later overturned by appeals courts. To this day, many legal experts maintain that the program violated federal privacy protections.) But the organization has a secondary, complementary responsibility: to protect U.S. communications from others who want to spy on them. That is to say: While one part of the NSA is listening into foreign communications, another part is stopping foreigners from doing the same to Americans.

Those missions never contradicted during the Cold War, when allied and enemy communications were wholly separate. Today, though, everyone uses the same computers, the same software, and the same networks. That creates a tension.

When the NSA discovers a technological vulnerability in a service such as Signal (or buys one on the thriving clandestine vulnerability market), does it exploit it in secret, or reveal it so that it can be fixed? Since at least 2014, a U.S. government interagency “equities” process has been used to decide whether it is in the national interest to take advantage of a particular security flaw, or to fix it. The trade-offs are often complicated and hard.

Waltz—along with Vice President J.D. Vance, Defense Secretary Pete Hegseth, and the other officials in the Signal group—have just made the trade-offs much tougher to resolve. Signal is both widely available and widely used. Smaller governments that can’t afford their own military-grade encryption use it. Journalists, human rights workers, persecuted minorities, dissidents, corporate executives, and criminals around the world use it. Many of these populations are of great interest to the NSA.

At the same time, as we have now discovered, the app is being used for operational U.S. military traffic. So, what does the NSA do if it finds a security flaw in Signal?

Previously, it might have preferred to keep the flaw quiet and use it to listen to adversaries. Now, if the agency does that, it risks someone else finding the same vulnerability and using it against the U.S. government. And if it was later disclosed that the NSA could have fixed the problem and didn’t, then the results might be catastrophic for the agency.

Smartphones present a similar trade-off. The biggest risk of eavesdropping on a Signal conversation comes from the individual phones that the app is running on. While it’s largely unclear whether the U.S. officials involved had downloaded the app onto personal or government-issued phones—although Witkoff suggested on X that the program was on his “personal devices”—smartphones are consumer devices, not at all suitable for classified U.S. government conversations. An entire industry of spyware companies sells capabilities to remotely hack smartphones for any country willing to pay. More capable countries have more sophisticated operations. Just last year, attacks that were later attributed to China attempted to access both President Donald Trump and Vance’s smartphones. Previously, the FBI—as well as law enforcement agencies in other countries—have pressured both Apple and Google to add “backdoors” in their phones to more easily facilitate court-authorized eavesdropping.

These backdoors would create, of course, another vulnerability to be exploited. A separate attack from China last year accessed a similar capability built into U.S. telecommunications networks.

The vulnerabilities equities have swung against weakened smartphone security and toward protecting the devices that senior government officials now use to discuss military secrets. That also means that they have swung against the U.S. government hoarding Signal vulnerabilities—and toward full disclosure.


This is plausibly good news for Americans who want to talk among themselves without having anyone, government or otherwise, listen in. We don’t know what pressure the Trump administration is using to make intelligence services fall into line, but it isn’t crazy to worry that the NSA might again start monitoring domestic communications.

Because of the Signal chat leak, it’s less likely that they’ll use vulnerabilities in Signal to do that. Equally, bad actors such as drug cartels may also feel safer using Signal. Their security against the U.S. government lies in the fact that the U.S. government shares their vulnerabilities. No one wants their secrets exposed.

I have long advocated for a “defense dominant” cybersecurity strategy. As long as smartphones are in the pocket of every government official, police officer, judge, CEO, and nuclear power plant operator—and now that they are being used for what the White House now calls calls  “sensitive,” if not outright classified conversations among cabinet members—we need them to be as secure as possible. And that means no government-mandated backdoors.

We may find out more about how officials—including the vice president of the United States—came to be using Signal on what seem to be consumer-grade smartphones, in a apparent breach of the laws on government records. It’s unlikely that they really thought through the consequences of their actions.

Nonetheless, those consequences are real. Other governments, possibly including U.S. allies, will now have much more incentive to break Signal’s security than they did in the past, and more incentive to hack U.S. government smartphones than they did before March 24.

For just the same reason, the U.S. government has urgent incentives to protect them.

[ad_2]

Source link

You Might Also Like

Don’t Give Up on China’s Democracy Just Yet

The Ides of November: Navigating the Shifting Sands of Iraq’s 2025 Electoral Landscape

Trump and the Business of Big Law

Deputy Secretary Landau’s Meeting with Hungarian Deputy Foreign Minister Magyar

The Risks of the Latest India-Pakistan Crisis

Share This Article
Facebook Email Copy Link Print
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

More Popular

Technology

Instagram से पैसे कमायें – 10 आसान तरीके

By BlogWire Team
13 Min Read

WhatsApp Se Paise Kaise Kamaye – 2023 के नए तरीके

By BlogWire Team
Secretary of State Marco Rubio at the American Compass Fifth Anniversary Gala
News

Secretary of State Marco Rubio at the American Compass Fifth Anniversary Gala

By BlogWire Team
28 Min Read
Kaise kare

नमस्ते भारत एप्प क्या है ? नमस्ते भारत एप्प को डाउनलोड कैसे करें 

नमस्कार दोस्तों आप सभी का blogwire में स्वागत है। आज के इस डिजिटल दौर में हम…

By BlogWire Team
Technology

जल्द आ रहा है व्हाट्सएप में मल्टी-डिवाइस सपोर्ट!

व्हाट्सएप का मल्टी-डिवाइस सपोर्ट फीचर आखिरकार लॉन्च के करीब है। व्हाट्सएप कथित तौर पर काफी समय…

By BlogWire Team
Kaise kare

नमस्ते भारत एप्प क्या है ? नमस्ते भारत एप्प को डाउनलोड कैसे करें 

नमस्कार दोस्तों आप सभी का blogwire में स्वागत है। आज के इस डिजिटल दौर में हम…

By BlogWire Team
Kaise kare

WhatsApp Se Paise Kaise Kamaye – 2023 के नए तरीके

WhatsApp का इस्तेमाल चैटिंग, मीडिया शेयरिंग आदि के लिए आप सभी लोग करते होंगें, लेकिन क्या आप…

By BlogWire Team
Technology

Instagram से पैसे कमायें – 10 आसान तरीके

Instagram से पैसे कैसे कमाने :- Instagram आज के समय में बहुत ही फेमस सोशल मीडिया…

By BlogWire Team
Blogging

ब्लॉग्गिंग से पैसे कैसे कमायें | Blogging se paise kaise kamaye

Blog क्या होता है? Blog एक ऐसा Platform होता है जिसके द्वारा लोग लिखित रूप में…

By BlogWire Team

Follow us on

Facebook Instagram

Copyright © 2025 BlogWire. All Rights reserved

About us  Privacy Policy Terms and conditions  Disclaimer  Contact us  Sitemap

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?