
Hackers breached Telemessage, a communications app used by President Trump’s advisor Mike Waltz, exposing messages from over 60 U.S. government employees including Secret Service and FEMA personnel in a major security compromise.
Key Takeaways
- Telemessage, a communication tool used by government officials, has suspended all services after a significant data breach compromised a day’s worth of messages from U.S. officials.
- Over 60 government employees had their communications exposed, including members of FEMA, Secret Service, disaster responders, customs officials, and diplomatic staffers.
- The Cybersecurity and Infrastructure Security Agency (CISA) has recommended discontinuing use of Telemessage until further notice.
- Multiple federal agencies including Customs and Border Protection have paused their use of the app while investigations continue.
- The breach represents a potential counterintelligence risk as metadata from official communications could be exploited for espionage purposes.
Massive Government Data Breach Compromises Official Communications
In a troubling development for national security, Telemessage, a secure messaging application used by high-ranking government officials including President Trump’s advisor Mike Waltz, has suffered a significant data breach. The hack exposed a day’s worth of communications from dozens of federal employees across multiple agencies. Telemessage, which provides archiving services for government communications to meet compliance requirements, has completely suspended its operations while investigations into the breach continue.
According to Reuters, who reviewed the leaked data provided by transparency group Distributed Denial of Secrets, over 60 government users were identified in the compromised information. The affected personnel included disaster responders, customs officials, U.S. diplomatic staff, a White House staffer, and members of the Secret Service. While initial reviews suggest no clearly classified information was exposed, the breach still represents a significant security failure for an application trusted with government communications.
“Following the detection of a cyber incident, CBP immediately disabled Telemessage as a precautionary measure. The investigation into the scope of the breach is ongoing,” according to the Department of Homeland Security.
Federal Agencies Scramble to Contain Fallout
Multiple federal agencies have contracts with Telemessage, including the State Department, Department of Homeland Security, and the Centers for Disease Control and Prevention. In the wake of the breach, the Cybersecurity and Infrastructure Security Agency (CISA) has recommended that all federal agencies discontinue use of the application unless specific mitigating instructions are provided. This has left numerous government departments scrambling to find alternative secure communication methods.
Smarsh, the company that owns Telemessage, has engaged external cybersecurity experts to investigate the incident. “Out of an abundance of caution, all Telemessage services have been temporarily suspended,” a spokesperson for Smarsh stated. The company has provided little additional information about the extent of the breach or how it occurred, raising questions about the security protocols that were in place to protect sensitive government communications.
Counterintelligence Concerns Mount as Investigation Continues
Security experts warn that even without access to classified information, the breach poses significant counterintelligence risks. The metadata associated with the communications—including who was talking to whom, when they were communicating, and about what general topics—could provide valuable intelligence to foreign adversaries. This type of information can be used to map relationships, track movements of government officials, and potentially identify vulnerabilities that could be exploited.
The Secret Service and FEMA are both conducting reviews of the situation. FEMA has stated there is no evidence that their information was compromised, but the investigation is ongoing. The White House has acknowledged the incident but has declined to comment specifically on its use of Telemessage or the potential security implications of the breach. President Trump’s office has similarly not issued any statement regarding the incident.
History of Security Concerns
This is not the first time that secure messaging applications used by administration officials have come under scrutiny. Mike Waltz previously faced criticism during what became known as “Signal Gate,” when concerns were raised about his use of the Signal messaging app. Telemessage gained attention after Waltz was photographed using it during a cabinet meeting, highlighting the ongoing challenges of balancing convenience with security in government communications.
The Telemessage application uses encryption similar to Signal but allows for chat backups for compliance purposes—a feature that may have created the vulnerability exploited by hackers. This incident underscores the difficult balance between regulatory compliance, which requires message archiving, and robust security, which typically favors end-to-end encryption with no stored data. As investigations continue, questions remain about whether government communications protocols will need a complete overhaul to prevent future breaches.