Recently, the editor in chief of
The Atlantic found himself in a group chat on Signal, in which president Trump's national security team discussed a military operation in Yemen. This immediately became
SignalGate.
Here I present the secure government equipment and networks that Trump's team should have used instead of Signal on their personal smartphones. It will also become clear why the Trump team prefers using Signal.
From left to right: Marco Rubio, Michael Waltz and Pete Hegseth in a secure White House conference room.
(White House photo, January 28, 2025 - click to enlarge)
The Houthi PC small group
On March 11, 2025, president Trump's national security adviser Michael Waltz initiated a group chat on the open-source encrypted messaging app
Signal to discuss planning for airstrikes on Houthi rebels in Yemen.
The chatgroup was named "Houthi PC small group", with PC apparently referring to Principals Committee, a term typically used for a gathering of senior national-security officials. This group had a total of 19 participants:
- Michael Waltz, National Security Adviser
- Brian McCormack, Chief of Staff for the National Security Council
- Alex Wong, Principal Deputy National Security Adviser
- Susie Wiles, White House Chief of Staff
- Stephen Miller, White House Deputy Chief of Staff for Policy
- JD Vance, Vice-President
- Marco Rubio, Secretary of State
- Mike Needham, Special Adviser for the Department of State
- Pete Hegseth, Secretary of Defense
- Scott Bessent, Secretary of the Treasury
- Dan Katz, Chief of Staff for the Secretary of the Treasury
- Tulsi Gabbard, Director of National Intelligence
- Joe Kent, Acting Chief of Staff for the Director of National Intelligence
- John Ratcliffe, Director of the CIA
- Walker Barrett, Staff member of the House Armed Services Committee Republicans
- Steve Witkoff, Special Envoy to the Middle East
- Jacob, function unknown
- Jeffrey Goldberg, Editor in Chief of The Atlantic
This list shows that the members of the "Houthi PC small group" were from many different government departments and agencies and that some lower-ranking officials participated as well.
This is probably one of the reasons why they used Signal: given the variety of positions, they would probably not have access to the same equipment to have a properly secured conversation.
The major US government departments and intelligence agencies have their own computer networks, usually one for unclassified and one or two for classified information:
Overview of major Homeland Security computer networks
From a briefing for Congress, July 2004
Secure computer networks
The networks of the Department of Defense (DoD) and most widely used and therefore most suitable for interagency communications. There are DoD networks for different classification levels:
NIPRNet (Non-secure Internet Protocol Router Network)
- For information classified Sensitive But Unclassified (SBU)
- Circa 4,000,000 users
SIPRNet (Secret Internet Protocol Router Network)
- For information classified Secret (S)
- Circa 500,000 users
JWICS (Joint Worldwide Intelligence Communications System)
- For information classified Top Secret/SCI (TS/SCI)
- Circa 200,000 users
Besides the unclassified network, the classified ones also offer email (in the Signal groupchat mentioned as "high side inboxes"), messaging and other collaboration tools, but they can be used for VoIP phone calls and secure video teleconferencing as well.
Operations center in the US Central Command headquarters, with computers and
VoIP phones for Unclassified (green) and Secret (red) communications.
(still from 60 Minutes, January 2021 - click to enlarge)
Secure telephone networks
The DoD also operates a secure telephone network for classified conversations, called the
Defense Red Switch Network (DRSN), also known as the Multilevel Secure Voice service. The DRSN connects the White House, all military command centers, intelligence agencies, government departments and NATO allies.
The DRSN has some special features and uses custom made telephone sets (currently the
IST-2 made by Telecore), which can be used for both secure and non-secure phone calls. These phones also have the distinctive four red buttons for
Multilevel Precedence and Preemption (MLPP).
During the attacks of September 11, 2001, the DRSN didn't function as intended and therefore a new Crisis Management System (CMS) was established. This is a dedicated Voice over IP network that connects the President, the National Security Council, Cabinet members, the Joint Chiefs of Staff, intelligence agency watch centers, and others.
The CMS uses high-end Cisco IP phones with a bright yellow bezel, which indicates that it can be used for conversations up to the level of
Top Secret/Sensitive Compartmented Information (TS/SCI).
Former secretary of defense Lloyd Austin in his Pentagon office in 2021,
with a Cisco IP phone with yellow bezel for the CMS and
an IST-2 phone with many red buttons for the DRSN.
(DoD photo - click to enlarge)
Most senior members of the "Houthi PC small group" have a phone for the CMS in their office, but their deputies, advisers and staff members usually not. So when they have to be involved in a secure phone call, that often means they have to be in the same room as their principal listening to the conversation via the speakerphone.
Also noteworthy is that not included in the Signal chatgroup were Michael E. Kurilla, commander of the US Central Command, and local commanders who led the military action in Yemen. They were likely in contact with defense secretary Hegseth via the proper channels, which would be SIPRnet or the DRSN.
Securing mobile phones
All the equipment for secure communications discussed so far are fixed/landline devices that sit on someone's desk. That's fine when working in office, but nowadays people are used to do almost everything on their smartphone.
Securing mobile communications has long been a challenge. In the first place because outside, conversations can easily be overheard. For a long time, encryption devices were large and heavy, until in 2002 the
Sectéra Secure Wireless Phone was introduced, which enabled encrypted phone calls and SMS/text messages over public networks.
Around 2010, cell phones of the GSM generation were rapidly replaced by smartphones, which became so complex that it's very difficult, if not impossible to prevent the device from being compromised by malware and/or backdoors.
Under its
Commercial Solutions for Classified (CSfC) program, the NSA tried to solve this problem by securing commercially available devices with multiple layers of protection and encryption. This resulted in the
DoD Enterprise Mobility program, which encompasses three different classification levels:
Unclassified (DMUC)
- For Samsung and Apple smartphones and tablets
- Circa 140,000 users
Secret (DMCC-S)
- For Samsung smartphones and tablets
- Circa 8000 users
Top Secret (DMCC-TS)
- For Samsung smartphones
- Circa 500 users
Overview of the DoD Enterprise Mobility program, 2022
(click here for the full document)
The Secret version (DMCC-S) became operational in 2015 and offers secure phone calls via the
CellCrypt app, access to SIPRNet email via the Outlook Web Application (OWA) and some other pre-approved apps on a Samsung smartphone or a Samsung tablet.
The DMCC-S solution has further restrictions, because in case the phone can also store classified information (data-at-rest) it may only be used in physically protected environments. On social media it was said that a conversation like in the Signal groupchat should only take place in a
Sensitive Compartmented Information Facility (SCIF), but a SCIF is only mandatory for information classified Top Secret/SCI.
The White House provides its employees with Apple iPhones without access to the iOS App Store and with all text messaging capabilities
disabled - only a few staffers in the press office had the ability to text on a limited basis.
Especially Signal's option for "disappearing messages" isn't compliant with the Presidential Records Act (PRA), which requires that all communications by and among White House staff members has to be archived.
Trump's shift to Signal
As we have seen, there are various highly secure communication channels that Trump's national security team could have used. Those who were working in their office had access to secure computer networks and a secure phone, those who were traveling (like Gabbard and Witkoff) had the option of using a DMCC-S smartphone.
However, the transition team that prepared Trump's take-over of the presidency in January 2025, deliberately
refused to use government facilities and IT systems. This was in part to avoid the mandatory record-keeping that comes with using official resources.
Instead, Trump's staffers and incoming government officials
communicated via their personal devices, often using the Signal app, and this continued after Donald J. Trump had been inaugurated as the 47th president of the United States.
Last February, political appointees at the DoD
ordered that Signal had to be installed on government phones for newly installed senior military officials: "they all use Signal and need it to communicate with the White House" - even though in the same month, the NSA had
warned against vulnerabilities in using Signal.
During a House Intelligence Committee hearing a few days ago, Trump's CIA director John Ratcliffe said that Signal is now widely used by officials and staff at his agency's headquarters: "One of the first things that happened when I was confirmed as CIA director was Signal was loaded onto my computer at the CIA as it is for most CIA officers."
NSA bulletin about Signal vulnerabilities, February 2025
(click here for the full document)
Links and sources
- The Independent: Previous administrations were wary of the messaging app Signal. Trumpworld has embraced it (March 27, 2025)
- The Atlantic: Here Are the Attack Plans That Trump’s Advisers Shared on Signal (March 26, 2025)
- The Atlantic: The Trump Administration Accidentally Texted Me Its War Plans (March 24, 2025)
- TWZ: C-17’s ‘Silver Bullet’ Airstream Trailer Pod Used By Secretary Of Defense Hegseth On First Overseas Trip (February 12, 2025)