Hegseth’s Personal Phone Use Created Vulnerabilities
The phone
number used in the Signal chat could also be found in a variety of places,
including on social media and a fantasy sports site.
Helene
CooperJulian E. BarnesEric SchmittChristiaan Triebert
By Helene
CooperJulian E. BarnesEric Schmitt and Christiaan Triebert
April 25,
2025
Updated 9:51
a.m. ET
https://www.nytimes.com/2025/04/25/us/politics/pete-hegseth-phone-signal.html
Defense
Secretary Pete Hegseth’s personal phone number, the one used in a recent Signal
chat, was easily accessible on the internet and public apps as recently as
March, potentially exposing national security secrets to foreign adversaries.
The phone
number could be found in a variety of places, including WhatsApp, Facebook and
a fantasy sports site. It was the same number through which the defense
secretary, using the Signal commercial messaging app, disclosed flight data for
American strikes on the Houthi militia in Yemen.
Cybersecurity
analysts said an American defense secretary’s communications device would
usually be among the most protected national security assets.
“There’s
zero percent chance that someone hasn’t tried to install Pegasus or some other
spyware on his phone,” Mike Casey, the former director of the National
Counterintelligence and Security Center, said in an interview. “He is one of
the top five, probably, most targeted people in the world for espionage.”
Emily
Harding, a defense and security expert at the Center for Strategic and
International Studies, added: “You just don’t want the secretary of defense’s
phone number to be out there and available to anyone.”
The chief
Pentagon spokesman, Sean Parnell, did not respond to request for comment.
Mr.
Hegseth’s use of Signal to convey details of military strikes in Yemen first
surfaced last month when the editor of The Atlantic wrote an article that said
he had been added, apparently accidentally, to an encrypted chat among senior
U.S. government officials. The New York Times reported this week that Mr.
Hegseth included sensitive information about the strikes in a Signal group chat
he set up that included his wife and brother, among others.
Soon after
the first Signal chat about Yemen became public in March, Der Spiegel, the
German news publication, found the phone numbers of Mr. Hegseth and other
senior Trump officials on the internet.
That Mr.
Hegseth’s private cellphone number was easily available through commercial
providers of contact information is not surprising, security experts said.
After all, Mr. Hegseth was a private citizen until Donald J. Trump, who was
then the president-elect, announced that he wanted the former National
Guardsman and Fox News weekend anchor to run the Pentagon, an $849
billion-a-year enterprise with close to three million employees.
It has now
become routine for government officials to keep their personal cellphones when
they enter office, several defense and security officials said in interviews.
But they are not supposed to use them for official business, as Mr. Hegseth
did.
Even
low-level government workers are instructed not to use their personal
cellphones and laptops for work-related matters, according to current and
former government officials, who spoke on the condition of anonymity to discuss
sensitive information.
For senior
national security officials, the directive is even more crucial, one former
senior Pentagon official said.
Mr. Hegseth
had a significant social media presence, a WhatsApp profile and a Facebook
page, which he still has.
On Aug. 15,
2024, he used his personal phone number to join Sleeper.com, a fantasy football
and sports betting site, using the username “PeteHegseth.” Less than two weeks
later, a phone number associated with his wife, Jennifer, also joined the site.
She was included in one of the two Signal chats about the strikes.
Mr. Hegseth
also left other digital breadcrumbs, using his phone to register for Airbnb and
Microsoft Teams, a video and communications program.
Mr.
Hegseth’s number is also linked to an email address that is in turn linked to a
Google Maps profile. Mr. Hegseth’s reviews on Google Maps include endorsements
of a dentist (“The staff is amazing”), a plumber (“Fast, honest, and quality
work”), a mural painter (“Painted 2 beautiful flags for us — spot on”) and
other businesses. (Google Maps street view blurs out Mr. Hegseth’s former
home.)
“If you use
your phone for just ordinary daily activities, you are leaving a highly, highly
visible digital pathway that even a moderately sophisticated person, let alone
a nefarious actor, can follow,” said Glenn S. Gerstell, a former general
counsel for the National Security Agency.
Government
cellphones, by contrast, are far more secure because they are fitted with
rigorous government controls meant to protect official communications.
In using
that same phone number on Signal to discuss the exact times that American
fighter pilots would take off for strikes in Yemen and other sensitive matters,
Mr. Hegseth opened himself — and, potentially the pilots — to foreign
adversaries who have demonstrated their abilities to hack into accounts of
American officials, encrypted or not, security experts said.
“Phone
numbers are like the street address that tell you what house to break into,”
said James A. Lewis, a cybersecurity expert. “Once you get the street address,
you get to the house, and there might be locks on the doors, and you ask
yourself, ‘Do I have the tools to bypass or break the locks?’”
China and
Russia do, and Iran may as well, several cybersecurity experts said.
Last year a
series of revelations showed how a sophisticated Chinese intelligence group,
called Salt Typhoon, penetrated deep into at least nine U.S. telecommunications
firms. Investigators said that among the targets were the commercial,
unencrypted phone lines used by Mr. Trump, Vice President JD Vance and top
national security officials.
Mr. Gerstell
said he had no knowledge of Mr. Hegseth’s phone or if it was subject to attack.
But personal phones are typically far more vulnerable than government-issued
phones.
“It would be
possible, with moderate difficulty for someone to take over a phone in a
surreptitious way once they had the number assuming you clicked on something
malicious,” Mr. Gerstell said. “And when really sophisticated bad guys are
involved, like Russia or China, phones can be infected even if you don’t click
on anything.”
Cybersecurity
experts said that more than 75 countries had acquired commercial spyware within
the past decade. The most sophisticated spyware tools — like Pegasus — have
“zero-click” technology, meaning they can stealthily and remotely extract
everything from a target’s mobile phone, without the user having to click on a
malicious link to give Pegasus remote access. They can turn the mobile phone
into a tracking and secret recording device, allowing the phone to spy on its
owner.
Signal is an
encrypted app, and its security for a commercial messaging service is
considered very good. But malware that installed a key logger or keystroke
capture code on a phone would allow the hacker, or nation state, to read what
someone types into a phone, even in an encrypted app, former officials said.
In the case
of Mr. Hegseth’s use of Signal to discuss the Yemen strike plans, spyware on
his phone could potentially see what he was typing or reading before he hit
“send,” because Signal is encrypted during the moments of sending and
receiving, cybersecurity experts said.
One person
familiar with the Signal conversation said that Mr. Hegseth’s aides warned him
a day or two before the Yemen strikes on March 15 not to discuss such sensitive
operational details in his group chat. That chat, while encrypted, was not
considered as secure as government channels.
It was
unclear how Mr. Hegseth responded to those warnings.
Mr. Hegseth
also had Signal set up on a computer in his office at the Pentagon so that he
could send and receive instant messages in a space where personal cellphones
are not permitted, according to two people with knowledge of the matter. He has
two computers in his office, one for personal use and one that is
government-issued, one of the people with knowledge of the matter said.
“I guarantee
you Russia and China are all over the secretary of defense’s cellphone,”
Representative Don Bacon, Republican of Nebraska, who has suggested that Mr.
Hegseth should be fired, told CNN this week.
Christiaan
Triebert reported from New York. Greg Jaffe in Washington contributed reporting
and Sheelagh McNeill contributed research.
Helene
Cooper is a Pentagon correspondent for The Times. She was previously an editor,
diplomatic correspondent and White House correspondent.
Julian E.
Barnes covers the U.S. intelligence agencies and international security matters
for The Times. He has written about security issues for more than two decades.
Eric Schmitt
is a national security correspondent for The Times, focusing on U.S. military
affairs and counterterrorism issues overseas, topics he has reported on for
more than three decades.
Christiaan
Triebert is a Times reporter working on the Visual Investigations team, a group
that combines traditional reporting with digital sleuthing and analysis of
visual evidence to verify and source facts from around the world.
Sem comentários:
Enviar um comentário