How the Signal Chat Leak Makes the NSA’s Job Harder

Now that everyone uses the same communications technologies, security vulnerabilities are amplified.

By , a security technologist and lecturer at the Harvard Kennedy School.
Five U.S. government officials, dressed in business formal or military attire, sit side-by-side at a long table, each in front of a microphone and a namecard. The shot is taken from slightly below the table, showing a dark room behind the officials other than bright white fluorescent lights that glare in a grid pattern overhead.
Five U.S. government officials, dressed in business formal or military attire, sit side-by-side at a long table, each in front of a microphone and a namecard. The shot is taken from slightly below the table, showing a dark room behind the officials other than bright white fluorescent lights that glare in a grid pattern overhead.
From left to right: Gen. Timothy Haugh, the director of the National Security Agency; Kash Patel, the director of the FBI; Tulsi Gabbard, the director of National Intelligence; John Ratcliffe, the director of the CIA; and Lt. Gen. Jeffrey Kruse, the director of the Defense Intelligence Agency testify before the Senate Intelligence Committee hearing in Washington on March 25. Maansi Srivastava for The Washington Post via Getty Images

U.S. National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a U.S. attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities.

“I didn’t see this loser in the group,” Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. “Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out.”

U.S. National Security Advisor Mike Waltz, who started the now-infamous group chat coordinating a U.S. attack against the Yemen-based Houthis on March 15, is seemingly now suggesting that the secure messaging service Signal has security vulnerabilities.

“I didn’t see this loser in the group,” Waltz told Fox News about Atlantic editor in chief Jeffrey Goldberg, whom Waltz invited to the chat. “Whether he did it deliberately or it happened in some other technical mean, is something we’re trying to figure out.”

Waltz’s implication that Goldberg may have hacked his way in was followed by a report from CBS News that the U.S. National Security Agency (NSA) had sent out a bulletin to its employees last month warning them about a security “vulnerability” identified in Signal.

The truth, however, is much more interesting. If Signal has vulnerabilities, then China, Russia, and other U.S. adversaries suddenly have a new incentive to discover them. At the same time, the NSA urgently needs to find and fix any vulnerabilities quickly as it can—and similarly, ensure that commercial smartphones are free of backdoors—access points that allow people other than a smartphone’s user to bypass the usual security authentication methods to access the device’s contents.

That is essential for anyone who wants to keep their communications private, which should be all of us.


It’s common knowledge that the NSA’s mission is breaking into and eavesdropping on other countries’ networks. (During President George W. Bush’s administration, the NSA conducted warrantless taps into domestic communications as well—surveillance that several district courts ruled to be illegal before those decisions were later overturned by appeals courts. To this day, many legal experts maintain that the program violated federal privacy protections.) But the organization has a secondary, complementary responsibility: to protect U.S. communications from others who want to spy on them. That is to say: While one part of the NSA is listening into foreign communications, another part is stopping foreigners from doing the same to Americans.

Those missions never contradicted during the Cold War, when allied and enemy communications were wholly separate. Today, though, everyone uses the same computers, the same software, and the same networks. That creates a tension.

When the NSA discovers a technological vulnerability in a service such as Signal (or buys one on the thriving clandestine vulnerability market), does it exploit it in secret, or reveal it so that it can be fixed? Since at least 2014, a U.S. government interagency “equities” process has been used to decide whether it is in the national interest to take advantage of a particular security flaw, or to fix it. The trade-offs are often complicated and hard.

Waltz—along with Vice President J.D. Vance, Defense Secretary Pete Hegseth, and the other officials in the Signal group—have just made the trade-offs much tougher to resolve. Signal is both widely available and widely used. Smaller governments that can’t afford their own military-grade encryption use it. Journalists, human rights workers, persecuted minorities, dissidents, corporate executives, and criminals around the world use it. Many of these populations are of great interest to the NSA.

At the same time, as we have now discovered, the app is being used for operational U.S. military traffic. So, what does the NSA do if it finds a security flaw in Signal?

Previously, it might have preferred to keep the flaw quiet and use it to listen to adversaries. Now, if the agency does that, it risks someone else finding the same vulnerability and using it against the U.S. government. And if it was later disclosed that the NSA could have fixed the problem and didn’t, then the results might be catastrophic for the agency.

Smartphones present a similar trade-off. The biggest risk of eavesdropping on a Signal conversation comes from the individual phones that the app is running on. While it’s largely unclear whether the U.S. officials involved had downloaded the app onto personal or government-issued phones—although Witkoff suggested on X that the program was on his “personal devices”—smartphones are consumer devices, not at all suitable for classified U.S. government conversations. An entire industry of spyware companies sells capabilities to remotely hack smartphones for any country willing to pay. More capable countries have more sophisticated operations. Just last year, attacks that were later attributed to China attempted to access both President Donald Trump and Vance’s smartphones. Previously, the FBI—as well as law enforcement agencies in other countries—have pressured both Apple and Google to add “backdoors” in their phones to more easily facilitate court-authorized eavesdropping.

These backdoors would create, of course, another vulnerability to be exploited. A separate attack from China last year accessed a similar capability built into U.S. telecommunications networks.

The vulnerabilities equities have swung against weakened smartphone security and toward protecting the devices that senior government officials now use to discuss military secrets. That also means that they have swung against the U.S. government hoarding Signal vulnerabilities—and toward full disclosure.


This is plausibly good news for Americans who want to talk among themselves without having anyone, government or otherwise, listen in. We don’t know what pressure the Trump administration is using to make intelligence services fall into line, but it isn’t crazy to worry that the NSA might again start monitoring domestic communications.

Because of the Signal chat leak, it’s less likely that they’ll use vulnerabilities in Signal to do that. Equally, bad actors such as drug cartels may also feel safer using Signal. Their security against the U.S. government lies in the fact that the U.S. government shares their vulnerabilities. No one wants their secrets exposed.

I have long advocated for a “defense dominant” cybersecurity strategy. As long as smartphones are in the pocket of every government official, police officer, judge, CEO, and nuclear power plant operator—and now that they are being used for what the White House now calls calls  “sensitive,” if not outright classified conversations among cabinet members—we need them to be as secure as possible. And that means no government-mandated backdoors.

We may find out more about how officials—including the vice president of the United States—came to be using Signal on what seem to be consumer-grade smartphones, in a apparent breach of the laws on government records. It’s unlikely that they really thought through the consequences of their actions.

Nonetheless, those consequences are real. Other governments, possibly including U.S. allies, will now have much more incentive to break Signal’s security than they did in the past, and more incentive to hack U.S. government smartphones than they did before March 24.

For just the same reason, the U.S. government has urgent incentives to protect them.

This post is part of FP’s ongoing coverage of the Trump transition. Follow along here.

Bruce Schneier is a security technologist and lecturer at the Harvard Kennedy School. His latest book is A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back.

Join the Conversation

Commenting on this and other recent articles is just one benefit of a Foreign Policy subscription.

Already a subscriber? .

Join the Conversation

Join the conversation on this and other recent Foreign Policy articles when you subscribe now.

Not your account?

Join the Conversation

Please follow our comment guidelines, stay on topic, and be civil, courteous, and respectful of others’ beliefs.

You are commenting as .

More from Foreign Policy

  • An illustration shows a golden Cybertruck blasting through a U.S. seal of an eagle holding arrows and laurel.
    An illustration shows a golden Cybertruck blasting through a U.S. seal of an eagle holding arrows and laurel.

    Is America a Kleptocracy?

    Here’s how life could change for the rich, poor, and everyone in between.

  • The flag of the United States in New York City on Sept. 18, 2019.
    The flag of the United States in New York City on Sept. 18, 2019.

    America Is Listing in a Gathering Storm

    Alarms are clanging at the U.S. geographic military commands around the globe.

  • U.S. President Donald Trump shakes hands with Supreme Court Chief Justice John Roberts during Trump’s inauguration in Washington, D.C.
    U.S. President Donald Trump shakes hands with Supreme Court Chief Justice John Roberts during Trump’s inauguration in Washington, D.C.

    The U.S. Judicial Crisis Is Uniquely Dangerous

    But other democracies provide a roadmap for courts to prevail over attacks from the executive branch.

  • An illustration shows a golden Newtons cradle with Elon Musk depicted on the one at left and sending a globe-motif ball swinging at right.
    An illustration shows a golden Newtons cradle with Elon Musk depicted on the one at left and sending a globe-motif ball swinging at right.

    Elon Musk’s First Principles

    The world’s richest man wants to apply the rules of physics to politics. What could go wrong?