A recent data breach involving TeleMessage, a messaging platform utilized by various U.S. government agencies, has revealed communications metadata from over 60 federal officials. This group includes disaster response teams, diplomatic personnel, and even an employee from the White House. Experts caution that this could present a serious counterintelligence threat.
The Data breach was first identified on the leak site Distributed Denial of Secrets (a U.S. nonprofit dedicated to archiving hacked and leaked documents for the public good). Initially, it was associated with a communication from former Trump national security adviser Mike Waltz. However, a more thorough investigation indicates a broader compromise of government personnel and agencies than was previously recognized.
The reviewed cache contains messages intercepted during a roughly 24-hour period that concluded on May 4. Although many messages are incomplete and not overtly sensitive, the implications of the leak extend beyond the content itself.
Security experts assert that the real danger lies in the metadata, or the “who, when, and where” of these discussions. Even without classified information, such data can create a comprehensive picture of government activities and relationships.
“Even if you don’t have the content, that’s a top-tier intelligence access,” said Jake Williams, a former NSA cyber operator and now VP of research at Hunter Strategy.
This is the type of data that nation-state actors aspire to.
Among the leaked discussions were clear logistics talks regarding high-level government travel, including one Signal group chat titled “POTUS | ROME-VATICAN | PRESS GC,” and another mentioning a U.S. delegation visit to Jordan.
TeleMessage, a messaging service focused on compliance that modifies encrypted applications like Signal for federal recordkeeping purposes, had quietly established a presence within several federal agencies. However, that presence is currently under scrutiny, and the app has been taken offline since May 5 “as a precaution.”
Smarsh, based in Portland and the owner of TeleMessage, has not replied to numerous requests for comments. It has also not provided clarity on how many agencies were using the service at the time of the security breach.
Contracting documents indicate that TeleMessage was utilized by agencies such as the State Department, the Department of Homeland Security (DHS), and the Centers for Disease Control and Prevention (CDC). While the CDC informed Media that it had tested the app in 2024 and subsequently discontinued its use, the status of relationships with other agencies remains uncertain.
Also read: Viksit Workforce for a Viksit Bharat
Do Follow: The Mainstream formerly known as CIO News LinkedIn Account | The Mainstream formerly known as CIO News Facebook | The Mainstream formerly known as CIO News Youtube | The Mainstream formerly known as CIO News Twitter |The Mainstream formerly known as CIO News Whatsapp Channel | The Mainstream formerly known as CIO News Instagram
About us:
The Mainstream formerly known as CIO News is a premier platform dedicated to delivering latest news, updates, and insights from the tech industry. With its strong foundation of intellectual property and thought leadership, the platform is well-positioned to stay ahead of the curve and lead conversations about how technology shapes our world. From its early days as CIO News to its rebranding as The Mainstream on November 28, 2024, it has been expanding its global reach, targeting key markets in the Middle East & Africa, ASEAN, the USA, and the UK. The Mainstream is a vision to put technology at the center of every conversation, inspiring professionals and organizations to embrace the future of tech.