Press "Enter" to skip to content

Shadow IT at the Top: War Plans on Signal Show Why Cyber Rules Without Consequences Don’t Work

In a significant security breach, senior members of the Trump administration, including Vice President JD Vance and Defense Secretary Pete Hegseth, shared top-secret military plans regarding U.S. attacks on the Houthi group in Yemen through the commercial encrypted messaging app Signal. The breach was revealed when journalist Jeffrey Goldberg discovered he was part of a group chat that included key cabinet members discussing sensitive information. The National Security Council has confirmed the authenticity of the message chain, prompting calls for an immediate investigation.

The Washington Post highlights the growing popularity of Signal among federal government workers and military planners during the Trump administration. The app, favored by high-profile figures like Elon Musk and foreign dissidents, has gained traction for its strong privacy features. As of March 2025, a significant number of federal employees have adopted Signal.

In his reporting, Goldberg wrote “I have never seen a breach quite like this,” noting that the officials may have violated federal policy and law by texting each other on an app that is not authorized for classified discussions.

Why do we care?

This isn’t a politics podcast.  This story has a cybersecurity angle. 

“It has made us look weak to our adversaries,” the California congressman Ro Khanna told the Guardian. “We need to take cybersecurity far more seriously and I look forward to leading on that.”

Policy breaches are common in cybersecurity, but this crosses into federal law, not just corporate rules.  If top U.S. officials violate actual federal laws governing classified communications without swift and visible accountability, what message does that send to employees, contractors, and even corporate leaders trying to uphold internal policy frameworks?

This isn’t a case of someone ignoring a security awareness training. There are federal statutes — including the Espionage Act and Presidential Records Act — that govern how classified information must be handled. This is a classic case of Shadow IT at the executive level — a perennial challenge in enterprise environments. If federal cabinet officials ignore protocol because the tools are more convenient, what message does that send to lower-level staff, contractors, and international partners? IT leaders need to ask themselves: Are our most powerful users undermining the very controls we’ve built?

You can’t reasonably expect employees to treat an internal “no personal devices for work communication” rule seriously if cabinet officials can discuss war plans on a consumer app without consequences.

The Post notes a growing use of Signal among government workers. That’s not inherently the problem — Signal can be used for unclassified communication, and it’s far better than SMS or email for those purposes. But this event draws a false equivalency between secure tools and secure behavior.    The U.S. government maintains secure communication protocols — including classified networks — specifically designed to protect sensitive data. Signal is not part of this approved infrastructure.  The story here isn’t that Signal is insecure — it’s that the process around its use is insecure.

If federal leaders face no legal or professional consequences for mishandling classified information, the idea of accountability for internal security policies becomes performative.

The worst-case scenario is that this becomes a footnote — an “oops” that’s politically shrugged off.  If that happens, Policy fatigue deepens. Employees see policies as compliance theater.  Shadow IT expands. People follow convenience over protocol.   Insider threat models fail.  Because the threat is leadership.   And leadership doesn’t spend money on security they don’t value.  

For security leaders, this is a reminder: policy without accountability is noise. Review your executive communication protocols, reinforce escalation procedures, and ensure leadership understands they’re not exempt from security controls — they set the tone.