
Hackers have breached secure communications used by over 60 U.S. government officials, exposing sensitive messages that may become a counterintelligence goldmine for America’s adversaries.
Key Takeaways
- A cyberattack on Telemessage has compromised communications from more than 60 U.S. government officials, including members of FEMA, Secret Service, and White House staff.
- Telemessage has suspended all services since May 5th while Smarsh, its parent company, investigates the breach with external cybersecurity support.
- The messaging platform gained public attention after former Trump aide Mike Waltz was photographed using it during a cabinet meeting.
- Federal agencies including Customs and Border Protection have disabled Telemessage as a precautionary measure during the ongoing investigation.
- Security experts warn that even without obviously sensitive content, the metadata from these communications presents significant counterintelligence risks.
Government Communications Exposed in Major Breach
The messaging platform Telemessage, a communication service used by National Security Advisor Mike Waltz and numerous federal agencies, has fallen victim to a sophisticated cyberattack that exposed conversations from dozens of government officials. The breach has compromised communications from more than 60 government users, including disaster responders, customs officials, U.S. diplomatic staff, a White House staffer, and members of the Secret Service. The attack raises serious concerns about the security of official communications and the potential intelligence value of the captured data, even if obviously classified information wasn’t immediately identified.
Federal agencies have taken swift action in response to the breach. Customs and Border Protection immediately disabled Telemessage, while the Cybersecurity and Infrastructure Security Agency (CISA) has recommended discontinuing its use across government unless specific mitigating instructions are provided. The Secret Service and FEMA are conducting thorough reviews of the situation, though FEMA has stated there’s currently no evidence that sensitive information was compromised. The incident has prompted a wholesale suspension of Telemessage services since May 5th, with no timeline announced for restoration.
Security Failures and Counterintelligence Concerns
“Following the detection of a cyber incident, CBP immediately disabled Telemessage as a precautionary measure. The investigation into the scope of the breach is ongoing,” according to the Department of Homeland Security.
The messaging service first caught public attention after National Security Advisor Mike Waltz was photographed using it during a cabinet meeting. This scrutiny comes on the heels of the “Signal Gate” controversy, where Waltz faced criticism for his previous use of Signal, another encrypted messaging app. Telemessage was apparently adopted as an alternative that could meet both security requirements and federal record-keeping obligations. The platform uses encryption similar to Signal but allows for chat backups to ensure compliance with government archival requirements.
Security experts warn that even without obviously sensitive content in the leaked messages, the metadata alone poses significant counterintelligence risks. The captured data could potentially reveal patterns of communication, relationships between officials, and insights into government operations that foreign intelligence services could exploit. Some messages contained information about travel plans for senior officials, which could be valuable intelligence for adversaries planning surveillance or other operations.
Investigation and Response
Smarsh, the company that owns Telemessage, has engaged an external cybersecurity firm to support its investigation of the breach. “Is investigating a potential security incident. Upon detection, we acted quickly to contain it and engaged an external cybersecurity firm to support our investigation,” Out of an abundance of caution, all Telemessage services have been temporarily suspended” Stated Smarsh.
The White House has acknowledged the incident but has not commented on its use of Telemessage or what security measures are now being implemented to protect sensitive communications. Attempts to get explanations from Waltz or administration officials have been met with silence, raising questions about transparency in the handling of the breach. The incident has revealed that several U.S. government agencies have contracts with Telemessage, including the State Department, Department of Homeland Security, and CDC, though the latter found the platform unsuitable for their specific needs.
This breach represents yet another security challenge for the administration as it works to enhance America’s cybersecurity posture while facing increasingly sophisticated threats from foreign actors. The ongoing investigation will determine the full extent of the compromised data and what additional measures need to be implemented to prevent similar breaches in the future. For now, government officials who relied on Telemessage must find alternative secure communication methods that satisfy both security and regulatory requirements.