ArXiv TLDR

"We are currently clean on OPSEC": Why JD Can't Encrypt

🐦 Tweet
2604.19711

Maurice Chiodo, Toni Erskine, Dennis Müller, James G. Wright

cs.CRcs.CYcs.HC

TLDR

This paper analyzes the 2025 Signalgate leak, showing how power imbalances and a false sense of security undermined Signal's encryption.

Key contributions

  • Applied pi-calculus formally models the secure facility, proving it couldn't prevent the information leak.
  • Power imbalances between personnel and officials compromised operational security despite using encrypted channels.
  • Cryptographic tools instilled a false sense of security, leading officials to "overshare" sensitive information.

Why it matters

This paper highlights that even advanced encryption tools like Signal can fail due to socio-technical factors, not just technical flaws. It underscores how human elements, power dynamics, and a false sense of security are critical vulnerabilities in information security. This is crucial for designing more robust and user-aware security systems.

Original Abstract

We analyse the 2025 Signalgate leak of sensitive US military information by the Trump administration, addressing why confidentiality was violated (messages leaked to the press) in spite of encryption (Signal), to deepen the socio-technical considerations when designing and deploying encryption. First, we use applied pi-calculus to formally model the boutique secure facility setup requested by the US Defence Secretary, to prove that a leak would not be prevented. We then examine how using a secure channel might still not give overall information security, as, in this case, power imbalances between personnel and officials led to the application of cryptography that compromised their operational security. We look at how cryptographic tools may have instilled a false sense of security, and led officials to "overshare". We then apply this analysis to the Trump administration's general desire to burn through political, legal, and now technical process, and demonstrate geopolitical harms that may arise from such ineffective use of cryptography in a brief use case. We conclude that, even with advancements in usability of cryptographic tools, genuine message security is still out of reach of the "average user".

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.