{"id":46844,"date":"2025-03-27T17:50:38","date_gmt":"2025-03-27T21:50:38","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=46844"},"modified":"2025-03-27T17:50:38","modified_gmt":"2025-03-27T21:50:38","slug":"top-u-s-security-officials-have-even-more-data-exposed-through-public-apps-chats-and-data-leaks","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/top-u-s-security-officials-have-even-more-data-exposed-through-public-apps-chats-and-data-leaks\/","title":{"rendered":"Top U.S. Security Officials Have Even More Data Exposed Through Public Apps, Chats, and Data Leaks"},"content":{"rendered":"<p>A new investigation has revealed that personal information belonging to senior U.S. security officials \u2014 including active phone numbers, email addresses, and linked social accounts \u2014 is easily accessible online, raising concerns about national security and digital hygiene at the highest levels of government.<\/p>\n<p>According to <em>Der Spiegel<\/em>, the contact details of Trump-aligned figures such as National Security Adviser Mike Waltz, former Fox host Pete Hegseth, and Director of National Intelligence Tulsi Gabbard appeared in commercial data broker databases and previous breach dumps. Many of these phone numbers and email addresses are still active and linked to WhatsApp, Signal, Dropbox, LinkedIn, Instagram, and even fitness tracking apps.<\/p>\n<p>The exposure doesn\u2019t stop at static data. <em>Wired<\/em> reported that Mike Waltz\u2019s Venmo account was left public, revealing a network of 328 friends that included White House Chief of Staff Susie Wiles and National Security Council official Walker Barrett. While no transactions were visible, experts warn that access to social graphs alone can aid intelligence mapping and targeting by hostile actors.<\/p>\n<p>These lapses have prompted calls for a review of personal cybersecurity practices among government officials. Despite repeated warnings, many continue to use unsecured platforms or fail to lock down accounts that link directly to sensitive national security roles.<\/p>\n<p>The revelations follow an earlier controversy in which the same group of officials used a Signal group chat to coordinate potential airstrikes in Yemen. That chat inadvertently included <em>The Atlantic<\/em> editor Jeffrey Goldberg, underscoring how even encrypted tools can introduce risks if misused.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new investigation has revealed that personal information belonging to senior U.S. security officials \u2014 including active phone numbers, email addresses, and linked social accounts \u2014 is easily accessible online, raising concerns about national security and digital hygiene at the highest levels of government. According to Der Spiegel, the contact details of Trump-aligned figures such [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":46845,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58,16],"tags":[275],"class_list":["post-46844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-government-public-sector","category-security","tag-top-story"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/46844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=46844"}],"version-history":[{"count":1,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/46844\/revisions"}],"predecessor-version":[{"id":46846,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/46844\/revisions\/46846"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media\/46845"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=46844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=46844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=46844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}