Transcript
Andrew Egger (0:00)
Hey everyone, this is Andrew Egger with the Bulwark. The Signal Gate story, believe it or not, keeps getting more bizarre, keeps getting stranger. There were a lot of questions when these stories started to drop when Jeffrey Goldberg first got added to the Signal chat about the hooties a couple of months back. What's going on with Signal? Why are they using this encrypted private app? Is it vulnerable to leaks? Is it vulnerable to these kind of OPSEC failures? Is it in keeping with federal records requirements where they need to log this stuff? We just got a brand new bit of reporting over the weekend from Joseph Cox. He's the co founder of 404 Media. He focuses on cybersecurity and the digital underground. He's here to talk about his scoop. Thanks for coming on, Joseph.
Joseph Cox (0:41)
Absolutely, thanks for having me.
Andrew Egger (0:43)
So this is such a great story. I mean, in so many ways, but one of the most. Well, let's start with the meat of it first. I mean, like, can you just talk us through what do we know about Signal and how the White House is using it today that we didn't know before you guys had this story this weekend.
Joseph Cox (0:59)
As you know, the White House is using Signal. But then what we found recently was that they use a special version or a modified version called Telemessage. And we found that because a Reuters photographer took a photo of Waltz at the recent cabinet meeting. And if you zoom in, you can see that it's a weird version of Signal. It turns out it's basically a version that copies the Signal messages from for storage later. Huh, that's pretty interesting. Also brought up even more questions of, well, how susceptible is that to being hacked? What if that is then targeted, lo and behold? I don't know, it took 48 hours, something like that. And what we have now with this reporting over the weekend is that a hacker did target Telemessage and did manage to obtain some users direct messages and group chats sent over Signal. But then also some of these other modified versions of WhatsApp and Telegram and WeChat as well. But of course, to us the Signal stuff is the most significant.
Andrew Egger (1:59)
Yeah, until we learn that Donald Trump is messaging his stockbroker on WeChat, Signal will be the main one here. I mean, this is such a fascinating story to me because I think it does answer one question that a lot of us had had lingering in the back of our minds about this Signal scandal from the beginning, which is these guys are bound by law to back this stuff up and are they just ignoring that Law. Are they just flouting it? What's going on here? And I think that. So part of the, like, one of the puzzle pieces here is, no, they don't appear to be flouting that. They appear to be using this kind of workaround system to be able to make use of the signal infrastructure while still preserving some kind of digital record. But at the same time, you open up a whole new kind of alarm bells, set of questions about the reliability of that service and the, and the, you know, how, how susceptible that is to, to, to, you know, hostile actors or just bad actors of any kind getting in there and playing around with the data. Can you just talk in a little bit more detail about what the nature of this, this breach was, that that this hacker that you were, that you were interviewing for this piece, I believe he's anonymous. Right in the piece. So what did, what did he find? And kind of what should our level of alarm be as we're thinking about our top government officials making use of this service for their internal communications?
