Why security officials keep using the Signal app despite risks

When the news broke out that Trump administration officials, including former National Security Adviser Mike Waltz and Defense Minister Beit Higseth, were using commercial chat applications to exchange sensitive information, a common response among the president’s supporters that this was not news. Such applications were everywhere on Capitol Hill. They have argued the previous departments in violations similar to the traditional security protocol, they said.
Trump administration officials prefer to sign, the same commercial application that many people used in President Joe Biden administration. Hillary Clinton, who created a special email server in her home while working as Barack Obama, Minister of Foreign Affairs in 2009, the famous protocol was broken. Email messages were sent from home, using this server, which was later found on secret information, with a couple considered “Secret”.
In their defense, Al -Amin Clinton and other officials said that unintended communication methods are simply more convenient. Although the sign is now one of the best encrypted applications on the market, its real attractiveness is that it is much easier to use than the current classified government systems. Critics say that these governmental systems have failed, to develop with technological times – a point of both parties.
Why did we write this
The fracture of the protocols can stem what is classified as a mitigation attempt – or avoid a record – work connections. Whatever the motive, avoiding such rules degrades their importance in maintaining the safety of secrets.
But applications like signal are still not perfect, security experts warn. America’s opponents want the secrets and they are good at revealing them. And anything commercial and easier to use is, by default, easier to abuse. Or penetration. Or spy on.
Stephanie Bell, who taught cybersecurity and cyber security law at the American Military Academy in West Point, said that US officials are “high -value targets.” “Therefore, officials must communicate safely and protect national security information.”
Why do national security officials avoid security protocols?
There were charges of arrogance and neglect on both sides of the political corridor on this front. Analysts also see a tendency between some officials to maintain some private contacts, not only from spies but also from keeping government notebooks. Analysts say that applications such as signal have features that erase encrypted conversations after a specific period – a desirable tool if officials want to avoid federal requirements to maintain the connections to the job.
Mr. Walz, in recent days, too It seems that it is used An application called Telemessge allows the registration of communications.
“This enables compliance with the rules related to retaining federal records for the reasons for supervision, but” is bad in that it is another line of weakness. ” TELEMESSAGE, for example, all the services were suspended this week after the penetration.
Even the conscience of the National Security Protocols admit that the American -classed government regimes are not comfortable. As an American lawyer in prosecuting terrorist cases, Mrs. Bell had often stood to find safe spaces to talk about business when she traveled. In her private office, she held only sensitive talks on private phones inside areas that stiffness against eavesdropping by foreign intelligence agencies.
“Is this more complicated than bringing a laptop to a café, which I enjoy a lot, or use an application on the phone? Yes, but this is the deal,” says Ms. Bell. She adds that the security clearance means agreeing to protect information in exchange for being familiar with it. “We cannot always do things just because they are easier.”
Are the classified systems unnecessarily exhausted?
During the Cold War, sensitive, or scifs, as anti -sound rooms without windows to hold classified conversations. They are still using today. It is not allowed to enter mobile phones, and although most Scifs prevent access to the Internet, many senior officials have been installed in their homes to facilitate compliance with safety protocols after hours.
“This culture has built communications about the idea that classified communications cannot occur in these facilities, despite technological progress,” this communications culture has built this communication culture about the idea that the classified communications can only occur in these facilities, “says Richard Furno, who directs the Cybarian Security Program, graduate studies at the University of Maryland, Baltimore. He adds that the result was “bureaucratic stalemate” in the development of alternatives.
Given that the government continues to use the “designed for a different era”, it is understood that many officials who still have to drive to secure offices to use classified networks believe “there must be a better way to do this,” says Mr. Foreno.
Last month, Associated Press I mentioned Mr. Anderson says that Minister Higseth has installed an unacceptable internet line in his Pentagon’s office, bypassing security protocols, to use the sign – a common occurrence between American officials. Receiving mobile phones in the Pentagon intermittent. Mr. Higseth is said to use the line to reach the sign so that he can coordinate with the National Security Adviser.
When asked about reports that the Minister of Defense was using an unprecedented line, a Ministry of Defense spokesman said the information was “classified.”
What can be done now?
In the Biden Administration, signal chats were used repeatedly such as “Tippers”, or messages that are asking the recipient to check their classified systems. Experts say this is a reasonable way to use technology.
At the same time, driven by the ongoing events surrounding the signal, technology developers have a new defense to develop and sell safe mobile phones that prevent piracy and tracking.
Congress can also help protect classified information. Mr. Anderson says: Although the president decides what is a secret, the legislators can set clear rules on dealing with information, ensuring a “specific protocol and level of security.”
He adds that Congress can create enforcement mechanisms. These can include imposing a set of penalties, including a criminal claim.
However, observers say, even if the government introduces a new type of mobile phone or application, some officials are still looking for solutions if they really want to avoid public records.
Meanwhile, anxiety is that ignoring the long -term safety protocols degrades its importance and is exposed to the dangers who aim to protect them. Mrs. Bell says:
“With the passage of time, this eats respect for a decisive reason for these systems in the first place.”