NORTON META TAG

07 June 2025

Signal inquiry examines if Hegseth — or an aide — shared attack plans &The Real Lesson of Signalgate & Incompetent! - A Randy Rainbow Song Parody 6JUN, 24APR & 6MAI25

 

IT is hard to tell cousin Eddie of National Lampoon's Christmas Vacation from neo nazi fascist "christian" nationalist pig Sec of Defense petie patricia hegseth, isn't it? Same greasy hair, almost the same suit, both are heavy drinkers but we find out cousin Eddie is a simple but good person and we know petie is stupid and not a good person at all...


LITTLE petie (patricia) hegseth is in way over his greasy head. This magat neo-nazi fascist "christian" nationalist pig (allegedly) committed adultery (with what we do not want to know) while in the military and so should have been dishonorably discharged. But that he has possibly cheated on his spouse is enough for him to gain the admiration and trust of NOT MY pres drumpf / trump. His ignorance and incompetence will weaken and diminish the U.S. Military at a time when we need it more than ever considering the threats we face from Russia and the PRC. From the Washington Post followed by a fascinating and frightening article from Foreign Affairs and then Randy Rainbow lightens the mood .....

Signal inquiry examines if Hegseth — or an aide — shared attack plans

The Pentagon inspector general’s office, which is scrutinizing the episode, also has questioned potential witnesses about any orders to delete sensitive messages.



The Defense Department inspector general’s office is examining whether it was Defense Secretary Pete Hegseth or an aide, perhaps acting at his behest, who used Hegseth’s account on the unclassified chat application Signal to divulge detailed information about forthcoming air attacks on Yemen, according to people familiar with the Pentagon watchdog’s work and communications reviewed by The Washington Post.

The inspector general’s office also is reviewing whether Hegseth’s aides were directed to delete messages they sent through Signal to thwart the government’s recordkeeping laws, these people said. Witness interviews have been ongoing for several weeks, with the inspector general’s office seemingly trying to wrap up the review soon, they added, speaking on the condition of anonymity because the issue remains deeply sensitive.

Kingsley Wilson, a spokeswoman for Hegseth, declined to comment Friday, citing the ongoing review.

Mollie Halpern, a spokeswoman for the inspector general, said that as a matter of policy the office does not comment on ongoing reviews to protect the integrity of its work. When the review is complete, she said, the office will release unclassified portions of it to the public.

Hegseth is preparing to testify before Congress next week, his first appearance on Capitol Hill since the Signalgate affair and a rash of firings in his front office have raised questions about his judgment and the dysfunction within his inner circle of advisers. He has angrily dismissed the significance of the Signal episode and sought to downplay the upheaval at the Pentagon, saying that, despite his brief tenure in charge, staff turnover is natural and that he believes he has the right team around him now.

President Donald Trump has stood by Hegseth despite his missteps, though the White House has been frustrated by the unwanted scrutiny and officials within the Pentagon have openly speculated whether he can remain in the job. Next week’s televised hearings will be a crucial test, with Trump expected to be watching — and evaluating — the former Fox News personality’s performance.

Uproar over the Trump administration’s reliance on Signal for sensitive communication dates to March, when the Atlantic reported that its top editor had been accidentally added to a group chat in which Hegseth, Vice President JD Vance and other top officials deliberated over whether to bomb Houthi militants in Yemen and when. The chat was organized by Michael Waltz, whom Trump later removed as national security adviser.

A transcript of the chat published by the Atlantic showed that an account bearing Hegseth’s name sent a message at 11:44 a.m. Eastern time on March 15, the day of the Yemen operation, informing Waltz, Vance and numerous other administration officials of the timeline for the strikes that were scheduled to begin about two hours later.

Notably, Hegseth also disclosed the type of aircraft involved — F-18 fighter jets and MQ-9 Reaper drones — along with commanders’ intent to employ sea-based Tomahawk missiles, and the fact that one high-profile target was “at his known location.” Similar information was shared via Signal with Hegseth’s wife, who has assumed an unofficial role at the Pentagon, and his brother, who works there as a liaison from the Department of Homeland Security.

Numerous current and former U.S. military officials have said those details would have almost certainly been classified at the time. Democrats and other critics of Hegseth have complained that, had such information been intercepted by a foreign adversary and relayed to the militants, the American pilots involved in the operation could have faced grave risk.

Hegseth has repeatedly denied that the details shared in the group chat included classified information, telling reporters that his role was to provide “general updates in real time.” What he and others wrote identified “no units, no locations, no routes, no flight paths, no sources, no methods, no classified information,” he said.

Others, including retired Adm. William McRaven and retired Gen. Stanley McChrystal, both seasoned war planners with extensive combat records, have assessed in interviews that the information that was shared would have been closely guarded before the operation began.

Hegseth was so reliant on Signal that he sought to have a separate, unclassified computer installed in his Pentagon office, where personal cellphones would not be allowed, a detail first reported by The Washington Post in April. In doing so, people familiar with the issue said, Hegseth effectively “cloned” the Signal app on his personal cellphone. It is not clear whether that computer remains in Hegseth’s office.

Dan Lamothe joined The Washington Post in 2014 to cover the U.S. military. He has written about the Armed Forces since 2008, traveling extensively, embedding with five branches of service and covering combat in Afghanistan.@danlamothe

The Real Lesson of Signalgate

A Surveillance Arms Race Has Poked a Gaping Hole in National Security

April 24, 2025

In the weeks since the explosive revelation that top U.S. officials inadvertently shared attack plans in Yemen with a journalist on a Signal group chat, fresh questions about the Trump administration’s lax approach to digital security have continued to emerge. On April 20, The New York Times reported that the security breach is even worse than initially understood: Defense Secretary Pete Hegseth had also shared many of the same details about the imminent U.S. bombing strike in Yemen in a second group chat with several family members, a personal lawyer, and others, using his private phone.

The fiasco now known as Signalgate raises many urgent issues related to national security. Communicating classified information via nonapproved channels potentially violates the U.S. Espionage Act, setting messages to automatically disappear contravenes U.S. federal laws on preservation of official records, and officials’ family members and journalists should certainly not be privy to this kind of information. These are huge lapses. But by focusing on National Security Adviser Mike Waltz’s unwitting inclusion of The Atlantic’s editor in chief, Jeffrey Goldberg, in the first chat group, much of the debate has downplayed an even larger problem: the very real possibility that a foreign government or other hostile power was snooping on the devices through which those communications were taking place.

Convened by Waltz, the first Signal group included not only the defense secretary but also CIA Director John Ratcliffe, Director of National Intelligence Tulsi Gabbard, Vice President JD Vance, White House adviser Stephen Miller, and Special Envoy to the Middle East Steve Witkoff, among others. Every one of these figures is an extremely high-value target for foreign espionage. Moreover, at least some of the participants were communicating on personal electronic devices (as was the defense secretary, and at least some of the participants, in his second group chat), and several were traveling overseas at the time. Witkoff, for instance, was in Moscow (although he denies using a personal device during that leg of the trip), while Gabbard was in Southeast Asia. It is highly likely that one or more of the participants’ devices was already being targeted by a U.S. adversary armed with advanced spyware capabilities. And the compromise of just one phone is all it takes. One weak link and all of the chat groups’ discussions could be exposed.

These episodes point to a looming digital security crisis. Even as high-level officials, for convenience or other reasons, rely more on personal devices for sensitive communications, those devices have become increasingly vulnerable to targeted exploitation and surveillance. Once a device is compromised, hostile regimes and other malicious actors can spy on communications regardless of whether the information in question is encrypted. Thankfully, there are steps that the United States and other governments can take to mitigate this risk. But to do so, they must first recognize the real problem with Signalgate: how exposed sensitive communications and private information have become for anyone reliant on a modern smartphone.

MISSED SIGNALS

It is important to clarify that the security failures at the heart of Signalgate were not related to potential weak points in Signal itself. Signal is the gold standard of secure, end-to-end encrypted messaging and employs the highest standard of cryptography. Its codebase is open source and widely peer reviewed. For all these reasons, many government agencies, such the U.S. Cybersecurity and Infrastructure Security Agency, now recommend using Signal for nonclassified communications.

But that does not mean that Signal or any other app is appropriate for discussing highly sensitive plans about imminent military operations on regular, unsecured personal devices. Governments, including the United States, have developed very strict procedures for handling classified information. They require personnel to use tightly managed “work” devices to which access is strictly limited, even within the national security hierarchy. Many governments also create protocols to ensure that officials’ discussion of classified information is restricted to sensitive compartmented information facilities, known as SCIFs, which are structurally designed to prevent outside eavesdropping, guarded by sentries and other access controls, whether inside an agency’s headquarters, in mobile situations (such as in vehicles or aircraft), or in foreign embassies.

By using Signal to discuss U.S. plans for bombing Yemen, Waltz and the other 18 members of the “Houthi PC Small Group” were effectively trying to create a do-it-yourself SCIF. According to The New York Times, the information that Hegseth shared on the two group chats, including “the flight schedules for the F/A-18 Hornets targeting the Houthis in Yemen,” originated from a secure government system at the U.S. military’s Central Command, a system designed for handling classified information. As is now clear, sharing this information proved far from secure. Many of the participants presumably connected to Signal on their personal devices, as evidenced by the fact that Waltz had a journalist in his contact list and Hegseth set up his group, which included his brother, his lawyer, and his wife, before being appointed Pentagon chief. Given strict access controls that are typically implemented on devices cleared for classified communications, it is likely that many of the other senior government officials who were members of these groups were using their personal phones to connect, as well. In doing so, the Signal group members exposed the Pentagon, and the United States itself, to a slew of sophisticated digital security risks.

ENCRYPTION FRICTION

Ever since the advent of the smartphone, governments have developed capabilities to surreptitiously hack into those devices. As I described in a 2022 Foreign Affairs essay, “The Autocrat in Your iPhone,” for many intelligence services, smartphones are irresistible targets: not only do users tend to organize their communications, contacts, financial activities, and general digital presence around their personal phones, they tend to carry them wherever they go. Moreover, efforts to make messaging apps more secure have paradoxically fueled even more invasive forms of surveillance.

Traditionally, governments sought to eavesdrop on individuals by gathering data directly from the telecommunications or Internet service providers’ networks through which their communications passed. But beginning around 2013, following the Edward Snowden disclosures about U.S. government surveillance programs, robust encryption protocols began to spread to ordinary consumer communications, and users began to adopt secure applications such as Signal. That rendered the old approach less productive, pushing intelligence and law enforcement to seek ways to get inside devices themselves. Rather than try to crack advanced encryption protocols, why not find access to the unencrypted end of an end-to-end encrypted communication? To acquire the necessary technology, they turned to a growing number of private mercenary firms, such as NSO Group, a notorious Israeli firm that has over the past decade sold its spyware technology to governments around the world. Mercenary spyware firms employ highly skilled engineers to either develop in-house or purchase software vulnerabilities from gray market firms, known as exploits or zero days, of which manufacturers of consumer devices and applications are not yet aware. They or their clients then use those exploits to hack into the target’s personal phones.

The most advanced phone-hacking technology sold by mercenary firms requires no target interaction and leaves no indication that the device has been tampered with. The technology does not require targets to click on a link or download an attachment in order to trigger an infection. Instead, it takes advantage of flaws in hardware, operating systems, or apps to gain silent access to the inner workings of a device, allowing attackers to then implant their spyware surreptitiously. If the attack is successful, targets are unaware that anything about their device has been compromised and simply continue using it, but now with someone peering over their shoulder.

At their most sophisticated, tools such as NSO’s Pegasus can then offer a “god’s-eye view” of a target’s entire life. Once inside a device, a remote operator can turn on the camera, activate the microphone, and track the location of the device’s owner. The operator can look back in time, too, scrolling through camera rolls or observing previous communications to gather information on a target’s personal relationships and past activities. Most important, with this surreptitious access to the device itself, they can read messages that are end-to-end encrypted. When spyware firms boast that they can “crack” Signal, what they really mean is that they can compromise a device on which Signal is loaded.

Consider the case of Jamal Khashoggi, the Saudi journalist and Washington Post columnist who was executed in a Saudi consulate in Turkey in 2018. Before his execution, Khashoggi had been communicating for months with the exiled Saudi activist and Canadian permanent resident Omar Abdulaziz over what they assumed was a secure, end-to-end encrypted app. But research by the Citizen Lab, the research team I direct that specializes in investigating digital threats, revealed that Abdulaziz’s phone had been hacked with Pegasus, rendering both sides of the conversation completely transparent to Saudi operatives.

This mercenary spyware industry is almost entirely unregulated, and over the last decade and a half, security agencies around the world have used its wares to go on an unbridled hacking spree. Along with other groups, Citizen Lab has shown how spyware such as Pegasus has been used by governments in multiple countries to hack into the devices of political opposition members, activists, investigative journalists, and government officials themselves. Although authoritarian regimes are the most prolific abusers of such technology, our research has uncovered domestic espionage and abuse of spyware in the West, as well, including by the governments of Greece, Hungary, Italy, Mexico, Poland, and Spain.

In principle, senior U.S. government officials’ work devices are managed in accordance with NSA standards and may include NSA-developed technology that is resistant to these infections. But privacy regulations justifiably forbid the NSA from checking the personal devices of government officials—a gap in defenses obvious to any adversary armed with mercenary spyware and contemplating where to aim their precious cyber-espionage assets. Rather than try to break into an NSA-secured device, an undertaking that would be technically complex and extremely expensive, they can simply aim at the target’s personal phone. Why bother clambering over a wall topped with barbed wire when you can just stroll around it and enter through an unlocked gate? Thus, the personal device of any high-level official presents a juicy opportunity for intelligence gathering—bringing into relief the dangerous risks posed by the Houthi PC Small Group chat.

PRISONERS OF THEIR OWN DEVICES

The risks posed by using personal devices extend well beyond the threat of spyware. Most personal smartphones are loaded with apps whose underlying purpose is to harvest information about their users. Every digital scrap is sucked into a huge data vacuum: a user’s location information, WiFi networks, SIM card, and other device identifiers are routinely collected by apps and browsers and fed into a vast data bazaar. Primarily, this data is used for marketing purposes—sold to “big data” firms that target consumers with advertisements. When consumers receive advertisements for a vacation spot shortly after they were casually searching for one online, that’s today’s personal data surveillance economy at work.

But these properties also lend themselves to a more sinister application. Another mercenary surveillance industry has emerged alongside spyware, known as “advertising intelligence” or ADINT, that packages this type of advertising data on potential targets into intelligence products to help governments spy. One such firm, the U.S.-based Fog Data Science, brags in its marketing materials that it can collect “15 billion location signals each day” from “250 million devices” and “tens of thousands” of mobile apps. It touts that it can provide security agencies with the ability to see all the identifiers associated with every device active in a given location in a given time frame.

It is highly likely one of the participants’ phones was already targeted with spyware.

Although the scale of the industry is unclear because of secrecy, it is clear from their own advertising that ADINT firms can gather sweeping intelligence on particular targets of interest. Fog Data Science claims that it can track a specific device’s location history over months or even years, analyzing patterns to identify what the firm creepily calls a target’s “bed-downs.” By fusing data collected from data brokerage firms with other open-source information—including from data breaches circulating on the dark web—these advertising intelligence companies can produce extremely precise dossiers on a person’s primary residences, places of employment, known associates and relatives, medical or therapy appointments, religious affiliations, hotel rooms frequented, travel itineraries, and much more.

This kind of information can be supplied to some of the world’s most notorious despots, hostile foreign adversaries, or even organized criminal groups with the click of a purchase order. Nothing is currently stopping Iran or China from using front companies to purchase information on the detailed movements and smartphone configurations of U.S. officials or suspected intelligence officers and their families and then acting on that information as they choose.

Experiments undertaken by researchers and journalists have shown how access to these real-time data brokerages can reveal highly sensitive information about high-value government targets, including active U.S. military personnel. To get a sense of just how detailed this information can be, consider how much information journalists could uncover in the open domain about members of the Houthi PC Small Group. Investigations by Wired showed that several members, including Hegseth, Waltz, and Chief of Staff Susie Wiles, had left information about their Venmo contacts and transactions either entirely or partially public. Journalists from Der Spiegel used commercially available people-search engines and information from data breaches to reveal passwords, phone numbers, and other information linked to Dropbox, Microsoft Teams, Signal, and WhatsApp accounts owned by Gabbard, Hegseth, and Waltz.

ADINT firms can combine such openly available information with advertising data to present a detailed file on almost any target. In the case of the Signal group chats, hostile governments could have used ADINT services to map any of its participants’ locations and precise movements and then put them under physical surveillance, perhaps to gain covert access to their phones when an opportunity arises. Or such services could be used to undertake reconnaissance on the make and model of their personal devices, or those of their acquaintances, in order to target those devices for hacking using precision spyware exploits. Such detailed files could include known associates of principal targets and contain highly specific information about their habits, devices, and applications, broadening the number of potential clandestine entry points into a sensitive conversation. (Hegseth’s Signal group was reportedly created before his appointment as secretary of defense and at one point included a dozen people “from his personal and professional inner circle.”)

UNSAFE TRAVELS

One of the greatest security risks posed by personal devices occurs in a situation when they are most often used: during travel. To connect to the telecommunications network, a cellphone must first communicate with a nearby cellular tower using its built-in radio. Information from the phone’s SIM card is sent to the network for authentication. Behind the scenes, a wide variety of systems—base stations, mobile switching centers, and other infrastructure—route calls and data to and from the device. Although a plethora of fine-grained information gathered from domestic cellular networks is routinely accessed by government agencies, it is when a mobile user travels abroad that their devices may be particularly vulnerable.

When subscribers roam on another provider’s network, telecommunications companies exchange massive amounts of data every second. Telecom companies can use these signals to retrieve detailed personal information about roaming users, including when a phone number is active on a cellular network, the services they draw on, and their precise location. Access to this international signaling network was once confined to a relatively small club of mostly Western telecommunications firms, and by extension, the state intelligence agencies that colluded with those firms, either informally or through lawful access requests. But a growing number of mercenary surveillance firms have managed to acquire licenses, called global titles, or have found ways to cooperate with existing cellular service providers to enter that club. Once inside, these firms can find someone’s exact location, block or slow down their cellular services, or eavesdrop on their calls and texts. They may even be able to intercept two-factor verification codes to hack accounts or surreptitiously transmit spyware.

Many firms now market this kind of surveillance to a growing number of government agencies. A 2020 Citizen Lab report revealed that Circles, a firm that sells signaling surveillance services, had government clients in Botswana, Chile, Ecuador, El Salvador, Equatorial Guinea, Guatemala, Honduras, Indonesia, Kenya, Malaysia, Mexico, Morocco, Nigeria, Peru, Serbia, Thailand, the United Arab Emirates, Vietnam, Zambia, and Zimbabwe. Another Citizen Lab investigation revealed that between November 2019 and March 2020, millions of malicious signaling requests were sent per month from networks in Saudi Arabia to geolocate the phones of Saudi users when they traveled to the United States.

As noted, several members of the Houthi Signal group were outside the United States while participating in the group’s chats. Secretary of State Marco Rubio was in Canada; Witkoff was in Russia and Azerbaijan during part of the group’s discussions. (Witkoff denies communicating on his personal device on those trips, although he has not said whether he was carrying his personal device and whether it was turned on.) Gabbard was on a multicountry trip across Asia, including Thailand. The Royal Thai Army was once a Circles client, and a 2022 Citizen Lab investigation revealed an extensive government espionage campaign targeting Thai pro-democracy protesters and activists, at least 30 of whom had their devices infected with NSO Group’s Pegasus spyware. It would have been trivial for government clients to acquire the Signal group members’ phone numbers or other identifiers and then use malicious roaming messages to covertly track their locations in real time, disrupt their access to messaging platforms, hijack two-factor authentication checks, or inject spyware into their devices should those targets have opened a poorly encrypted website.

CONTROL OR BE CONTROLLED

Threats to the security of personal devices are made worse by the lack of effective regulation of surveillance vendors. Many of these firms employ the same type of obfuscation techniques as oligarchs and money launderers, making regulation challenging. The result is that dozens of governments and even nonstate actors now possess advanced digital surveillance capabilities that were once limited to only a few great powers and can deploy them largely in the absence of restraints. Were any of the Houthi Signal group members compromised at the time they discussed the Yemen attack plans? Frankly, it would be shocking if they were not.

One can only hope that somewhere, professionals are ensuring that the devices of top U.S. officials are free from mercenary spyware and not being tracked. For the moment, the signs are not encouraging. Instead of launching a full investigation of the security breakdown and holding those responsible to account, the Trump administration has defended the defense secretary’s use of the chat groups and continued to downplay their significance. At the same time, the administration has taken steps to weaken or dismantle government offices designed to protect the United States from foreign digital interference and cyberwarfare, shutting down the FBI’s foreign influence task force and radically downsizing the Cybersecurity and Infrastructure Security Agency, including those responsible for “red teaming” government systems. And in early April, apparently in response to a demand by the right-wing conspiracy theorist Laura Loomer, the president fired the head of the National Security Agency and U.S. Cyber Command—the top U.S. official managing the country’s cyberdefenses.

The spyware industry is almost entirely unregulated.

The consequences of this disregard for device security could soon come back to haunt the administration. To be fair, there are no easy fixes. It would be impractical, and possibly illegal in some jurisdictions, to ban government personnel from using personal devices on their own time. And the only way to truly insulate government officials from the growing number of surveillance risks would be for them to completely avoid using personal devices while they travel—another impracticality. Most government officials have found it extremely challenging to properly do their business without using personal devices in one way or another. Yet as of today, these devices—managed and secured at their user’s own discretion—remain a huge risk.

To truly address the problem, the United States and other governments will need to take a far more ambitious approach. First and foremost, Signalgate should serve as a wake-up call to rein in the mercenary surveillance industry. Governments should put in place much stronger controls for the sale and use of surveillance technology, including imposing transparency requirements and adding export regulations. Regulators must mandate stronger standards for the telecommunications sector writ large, as the United Kingdom has recently done, and hold telecommunications companies responsible for closing known loopholes in their signaling systems. Legislators must pass stricter privacy laws that prevent the unauthorized and uncontrolled sale of location data, advertising intelligence, and other personal data, and drastically improve oversight across law enforcement and intelligence agencies. Finally, law enforcement and government watchdogs must impose real penalties on those caught flouting government protocols for the handling of classified information.

The Signalgate episode is a terrible failure of operational security. But it is not a one-off mistake. It is a glimpse of a much more far-reaching crisis, one that threatens the United States and every other country that relies on the digital world in making its most important and sensitive decisions.


RONALD J. DEIBERT is Professor of Political Science and Director of the Citizen Lab at the University of Toronto Munk School of Global Affairs and Public Policy. He is the author of Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy.

Recommended



Incompetent! - A Randy Rainbow Song Parody

May 6, 2025


No comments:

Post a Comment