BBC News
Analysts suggest that the unauthorized sharing of classified details by President Donald Trump’s national security team via an unsecure chat application may have violated fundamental protocols.
Jeffrey Goldberg, editor-in-chief of Atlantic, revealed he was mistakenly included in a Signal group of 18 members and observed information regarding imminent U.S. operations against Houthi rebels in Yemen.
The White House has confirmed that the messages cited by the Atlantic seem to be legitimate.
Restrictions on unsecured messaging platforms
Signal, initially renowned as a tool for activists, has evolved into an informal communication platform favored by officials in Washington.
Experts on privacy and technology highlight that this widely used end-to-end encrypted app offers greater security compared to standard text messaging.
Being open-source allows independent experts to examine its code for security flaws.
However, like all messaging platforms used by valuable targets, state-sponsored hackers continuously attempt to access Signal communications. Increased efforts to infiltrate the platform by those connected to Russian intelligence have been noted by Google Threat Intelligence Group.
Although the U.S. government does not outright prohibit the app, under President Joe Biden some officials were permitted to install Signal on their White House-issued devices.
Nonetheless, they were advised to limit the app’s use and avoid sharing classified content, according to former national security officials in the Democratic administration as reported by US media.
Pentagon guidelines state that messaging applications “are NOT authorized to access, transmit, or process non-public DoD information,” according to UJ.
Signal serves as a communication tool for militaries worldwide, affirmed the app’s president, Meredith Whittaker, during a December interview with BBC News.
However, a cybersecurity expert told the BBC that sending sensitive communications via Signal presents significant risks.
“Communication channels within governmental frameworks are monitored and sufficiently secured,” stated John Wheeler from Wheelhouse Advisors, a cybersecurity consultancy.
He added that external platforms like Signal seem to lack established authorization protocols.
“Communications of such a sensitive nature should definitely adhere to stringent protocols,” Wheeler expressed to the BBC. “I was quite taken aback that they opted to utilize this kind of solution.”
He noted that this incident might prompt U.S. allies to reconsider sharing sensitive information with American representatives.
Avoid sharing classified material
Utilizing a Signal chat to disclose highly classified details and inadvertently including a journalist in the discussion could lead to potential breaches of federal laws like the Espionage Act.
The mishandling, misuse, or abuse of classified content can constitute a criminal offense; however, it remains unclear if such laws were violated in this situation.
Mara Karlin, who worked under six secretaries of state and served as assistant secretary of defense, described the leak as “stunning” and “highly unusual.”
Karlin emphasized that such discussions should occur in secure environments, such as the Pentagon or the White House Situation Room, not in a Signal group chat.
Sensitive governmental conversations are mandated to occur in a designated space called a Sensitive Compartmentalized Information Facility (SCIF), where mobile phones are generally prohibited.
The U.S. government utilizes various systems to handle classified communications, including the Joint Worldwide Intelligence Communications System (JWICS) and the Secret Internet Protocol Router (SIPR) network, which high-ranking officials can access using specially configured laptops and smartphones.
Karlin anticipates that both allies and adversaries will scrutinize this matter, questioning, “Can the U.S. government securely handle sensitive information?”
She predicts that investigations by the inspector general and Congress will ensue. “This is unprecedented,” she adds.
Samar Ali, a professor of politics and law at Vanderbilt University who previously collaborated on counter-terrorism with the Homeland Security Department during the Obama administration, remarked that the leak is “bewildering, shocking, and perilous.”
The text interaction indicates a “definitive violation of our national security statutes,” she conveyed to the BBC.
Professor Ali questions what ramifications the Trump team might face, highlighting that any similar infractions on her part would have resulted in the loss of her employment and security clearance.
Maintain adequate records
Some messages sent by National Security Adviser Michael Waltz in the Signal chat were reportedly set to vanish after one week, according to Jeffrey Goldberg’s article in the Atlantic.
If verified, this raises concerns regarding two federal statutes that mandate the retention of government records: the Presidential Records Act and the Federal Records Act.
“The law stipulates that electronic messages occurring on non-official accounts must be preserved in some manner on an official electronic record keeping platform,” explained Jason R Baron, a former director of litigation at the National Archives and Records Administration.
Such regulations would apply to Signal communications, he indicated.
Official government correspondence should either be automatically archived, or the participants must forward, copy, or preserve the exchanges.
“The pressing question is whether these correspondences were automatically archived,” Baron told the BBC. “It’s uncertain if that occurred.”
It also remained unclear if the individuals in the chat had executed any measures to preserve the records.
“We should all be wary about employing these electronic messaging applications to circumvent federal record-keeping obligations,” Baron stated.