this post was submitted on 27 Mar 2025
132 points (100.0% liked)

politics

22612 readers
4709 users here now

Welcome to the discussion of US Politics!

Rules:

  1. Post only links to articles, Title must fairly describe link contents. If your title differs from the site’s, it should only be to add context or be more descriptive. Do not post entire articles in the body or in the comments.

Links must be to the original source, not an aggregator like Google Amp, MSN, or Yahoo.

Example:

  1. Articles must be relevant to politics. Links must be to quality and original content. Articles should be worth reading. Clickbait, stub articles, and rehosted or stolen content are not allowed. Check your source for Reliability and Bias here.
  2. Be civil, No violations of TOS. It’s OK to say the subject of an article is behaving like a (pejorative, pejorative). It’s NOT OK to say another USER is (pejorative). Strong language is fine, just not directed at other members. Engage in good-faith and with respect! This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban.
  3. No memes, trolling, or low-effort comments. Reposts, misinformation, off-topic, trolling, or offensive. Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.
  4. Vote based on comment quality, not agreement. This community aims to foster discussion; please reward people for putting effort into articulating their viewpoint, even if you disagree with it.
  5. No hate speech, slurs, celebrating death, advocating violence, or abusive language. This will result in a ban. Usernames containing racist, or inappropriate slurs will be banned without warning

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.

That's all the rules!

Civic Links

Register To Vote

Citizenship Resource Center

Congressional Awards Program

Federal Government Agencies

Library of Congress Legislative Resources

The White House

U.S. House of Representatives

U.S. Senate

Partnered Communities:

News

World News

Business News

Political Discussion

Ask Politics

Military News

Global Politics

Moderate Politics

Progressive Politics

UK Politics

Canadian Politics

Australian Politics

New Zealand Politics

founded 2 years ago
MODERATORS
 

Summary:


Private contact details of the most important security advisers to U.S. President Donald Trump can be found on the internet. DER SPIEGEL reporters were able to find mobile phone numbers, email addresses and even some passwords belonging to the top officials.

To do so, the reporters used commercial people search engines along with hacked customer data that has been published on the web. Those affected by the leaks include National Security Adviser Mike Waltz, Director of National Intelligence Tulsi Gabbard and Secretary of Defense Pete Hegseth.

Most of these numbers and email addresses are apparently still in use, with some of them linked to profiles on social media platforms like Instagram and LinkedIn. They were used to create Dropbox accounts and profiles in apps that track running data. There are also WhatsApp profiles for the respective phone numbers and even Signal accounts in some cases.

As such, the reporting has revealed an additional grave, previously unknown security breach at the highest levels in Washington. Hostile intelligence services could use this publicly available data to hack the communications of those affected by installing spyware on their devices. It is thus conceivable that foreign agents were privy to the Signal chat group in which Gabbard, Waltz and Hegseth discussed a military strike.


top 11 comments
sorted by: hot top controversial new old
[–] [email protected] 30 points 6 days ago (4 children)

Malcolm Nance (veteran of US intelligence) discussed the Signal breach here: https://www.youtube.com/watch?v=MERwAvesX9o

It's not just conceivable, it's almost guaranteed that non-US powers were listening in. These people are either incredibly stupid (and have the Dunning-Kruger over-confidence to match) or they are traitors to the US.

[–] [email protected] 13 points 6 days ago (1 children)

Malcolm Nalcom

I'm sorry, this is a real person's name?

[–] [email protected] 4 points 6 days ago (1 children)

Apologies! Don't know what happened there... it's Malcolm Nance.

[–] [email protected] 2 points 6 days ago

Damn, I was hoping it was real lol

[–] [email protected] 7 points 6 days ago

Either way, the US citizens are the ones who get fucked in the end.

[–] [email protected] 3 points 6 days ago (1 children)

It’s not just conceivable, it’s almost guaranteed that non-US powers were listening in.

I don't have time to watch a 30+ minute video, but that statement is valid. I've posted about this a couple times in the last two days. The Pentagon put out warnings about Signal use more than a year ago. Google put out a strong warning back in February.

The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app's legitimate "linked devices" feature that enables Signal to be used on multiple devices concurrently. Because linking an additional device typically requires scanning a quick-response (QR) code, threat actors have resorted to crafting malicious QR codes that, when scanned, will link a victim's account to an actor-controlled Signal instance. If successful, future messages will be delivered synchronously to both the victim and the threat actor in real-time, providing a persistent means to eavesdrop on the victim's secure conversations without the need for full-device compromise.

Signal security relies on user competence. The user has to be savvy enough to not fall for phishing attempts. All it would take is for one of the morons to have scanned such a QR code for that whole chat to have been compromised. I would bet big money that at least one of these fools had already done so.

[–] [email protected] 3 points 6 days ago

Signal security relies on user competence. The user has to be savvy enough to not fall for phishing attempts. All it would take is for one of the morons to have scanned such a QR code for that whole chat to have been compromised. I would bet big money that at least one of these fools had already done so.

Considering one of the participants of that Signal chat (Witkoff) was in Russia at the time, I think you would win that bet.

[–] [email protected] 2 points 6 days ago

Well if they weren’t listening before, certainly they will now. What the fuck are they going to do to reassure the American people that they aren’t fucking this up? They can’t because they are. That’s ACTUALLY scary.

[–] [email protected] 22 points 6 days ago

My wife is calling this "WhiskeyLeaks". LOL.

[–] [email protected] 19 points 6 days ago

"Today, we are issuing an arrest warrant for Jeffrey Goldberg, the so-called "Signal Hacker" who infiltrated a classified group chat, gathered military information regarding operations in Yemen, and put our servicepeople at risk by publishing that information online. The Signal information he leaked has been directly tied to the release of personal information of many top United States officials and has endangered national security. He and other editors of The Atlantic are being charged with disseminating personal information of public officials, Conspiracy against the United States, and Treason. We are currently awaiting word from them to negotiate the terms of their surrender."

-- Trump, by the time they're done spinning this.

Mark my words. This or something close to it will be the GOP position within 72 hours.

[–] [email protected] 8 points 6 days ago

Who needs security vetting procedure, amirite? The president said they're cool, and who's more trustworthy than the president???