"We are currently clean on OPSEC": Why JD Can't Encrypt
Maurice Chiodo, Toni Erskine, Dennis Müller, James G. Wright
TLDR
This paper analyzes the 2025 Signalgate leak, showing how power imbalances and a false sense of security undermined Signal's encryption.
Key contributions
- Applied pi-calculus formally models the secure facility, proving it couldn't prevent the information leak.
- Power imbalances between personnel and officials compromised operational security despite using encrypted channels.
- Cryptographic tools instilled a false sense of security, leading officials to "overshare" sensitive information.
Why it matters
This paper highlights that even advanced encryption tools like Signal can fail due to socio-technical factors, not just technical flaws. It underscores how human elements, power dynamics, and a false sense of security are critical vulnerabilities in information security. This is crucial for designing more robust and user-aware security systems.
Original Abstract
We analyse the 2025 Signalgate leak of sensitive US military information by the Trump administration, addressing why confidentiality was violated (messages leaked to the press) in spite of encryption (Signal), to deepen the socio-technical considerations when designing and deploying encryption. First, we use applied pi-calculus to formally model the boutique secure facility setup requested by the US Defence Secretary, to prove that a leak would not be prevented. We then examine how using a secure channel might still not give overall information security, as, in this case, power imbalances between personnel and officials led to the application of cryptography that compromised their operational security. We look at how cryptographic tools may have instilled a false sense of security, and led officials to "overshare". We then apply this analysis to the Trump administration's general desire to burn through political, legal, and now technical process, and demonstrate geopolitical harms that may arise from such ineffective use of cryptography in a brief use case. We conclude that, even with advancements in usability of cryptographic tools, genuine message security is still out of reach of the "average user".
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.