As the controversy involving national cybersecurity implications expands, TeleMessage, a messaging app allegedly employed by former Trump National Security Adviser Mike Waltz and other officials, shut down its services after a data leak revealed user messages and internal infrastructure.
Breach Details and Initial Consequences
TeleMessage, created by Smarsh, a digital compliance firm headquartered in Portland, Oregon, confirmed in a public statement that it had “paused services temporarily” following allegations of unauthorized access to its systems. The perpetrator, whose name is not known, says he has broken into internal systems utilized to log and store encrypted communications. Parts of the purportedly stolen data have been given to investigative journalists at 404 Media, who wrote a report suggesting that messages were being backed up and analyzed in a way that could bypass standard end-to-end encryption protections.
A photo from a recent Trump cabinet meeting depicts Waltz openly employing TeleMessage. The photo raised eyebrows, especially after a now-notorious faux pas in which a well-known war correspondent was accidentally added to a Signal-based group chat allegedly meant to plan communication during U.S. military operations in Yemen. That group chat reportedly employed TeleMessage for compliance logging—designed to keep records consistent with federal preservation laws—but how much of its security has been compromised is now at issue.
Fallout for Federal Users and Security Experts React
Former intelligence professionals and security analysts claim that this compromise is especially worrisome since it highlights the manner in which unofficial or loosely regulated copies of secure apps, used for purposes of government compliance in many instances, might be concealed threats. TeleMessage, unlike Signal, isn’t open-source, nor does it come with FedRAMP certification, the Federal Risk and Authorization Management Program, which stipulates cybersecurity expectations for cloud-based software that is utilized by the federal government
This incident reaffirms a perilous loophole: government officials employing third-party applications that mirror encrypted systems, but with the same lack of transparency or oversight,” said Robyn Gelman, cybersecurity consultant and former NSA advisor. “Even if they have some compliance function, they can be single points of failure.
After the breach, the Department of Homeland Security (DHS) allegedly instructed all TeleMessage installations disabled on Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) devices. It happened quickly following internal analysis to suggest possible leakage of agent communication.
Smarsh Under Fire
TeleMessage’s parent company, Smarsh, has been selling its software to financial institutions, law enforcement agencies, and government bodies for years as a compliant replacement for traditional messaging applications. Although it can interface with messaging platforms such as Signal, WhatsApp, and Telegram, its primary purpose is to log and archive communications under the requirements of record-keeping regulations like the Freedom of Information Act (FOIA) and the Securities and Exchange Commission’s (SEC) regulations.
Yet critics point out that Smarsh’s overlay technique—effectively producing shadow copies of communications apps like Signal—adds multiple layers of danger and complication, especially when applied in high-security government contexts. Smarsh has not revealed how many individuals or entities were impacted by the breach, or whether any of its other products were vulnerable.
“We are collaborating with third-party cybersecurity experts and government regulators to thoroughly evaluate the scope of this incident,” the company stated in a short statement. “Our highest priority is restoring trust and integrity in service.”
Political and Legal Implications
The timing of the breach could not be more opportune. The Trump administration has been under intense scrutiny regarding digital security since assuming office, from controversies surrounding encrypted device usage to the management of sensitive information on personal apps. Waltz’s utilization of TeleMessage in a top-security meeting has now turned into a battleground for critics challenging the administration’s method of secure communication.
This is an obvious case of when political expediency outweighs secure protocols,” stated Senator Elaine McKinnon (D-MA), a member of the Senate Intelligence Committee. “We require strong enforcement of communications tools cleared under federal standards, not backdoor applications that pretend to be secure platforms without public oversight.
Legal analysts are also opining on the regulatory implications. In the event that information from federal officials was in fact breached, the incident might trigger FISMA investigations and potentially engage the Department of Justice.