Unveiling the Digital Discrepancy in Defense Sector, as Revealed by Signal
In the ever-evolving digital landscape, the importance of a secure and well-engineered digital foundation has become a strategic imperative for the U.S. Department of Defense, rather than just a compliance task. This shift in perspective is based on the advice of the Defense Innovation Board, chaired by former Google CEO Eric Schmidt in 2016, who emphasised the need for user-centered design.
However, the continued absence of a mobile-first, mission-ready communications app has raised concerns. In times of operational urgency, consumer apps like Signal have filled the void. This spring, for instance, senior U.S. officials, including the Secretary of Defense, resorted to using Signal for national security matters.
The choice was not arbitrary. Signal, with its fast, reliable, and familiar interface, delivered confidentiality when other options fell short. Yet, the absence of a defence-hardened version of Signal with features such as end-to-end encryption, role-aware chat alerts, one-touch emergency channels, location-aware routing, mission audit features, authentication built for real users, an intuitive UI, and no training required, has left a gap.
This gap has led to incidents like the "Signalgate" incident, where a journalist was accidentally added to a secure chat, and the vulnerabilities in a Signal clone used by federal agencies, which led to the exposure of chat logs and metadata of 60 government officials. These incidents underscore the need for robust access controls, strict identity verification, and compliance with government security policies.
The essential features for a user-centered, mobile-first, secure communications app include robust end-to-end encryption, a verified and trusted software source, strict access controls and identity verification, compliance with government security policies, mobile-first design, real-time security updates and patch management, secure metadata handling, and government-specific features.
The department must prioritize feedback from actual users, treating it as a requirement, not a courtesy. Fast feedback loops, real-time collaboration, and a culture that values working tools over working paperwork are essential for software progress, as per the DIB. Contracts should mandate delivery of working software every few weeks, not every few years.
The failure to deliver a secure, official communications app that works on the phones carried by senior leaders is a significant concern. Senior government officials coordinate across time zones, on fast-breaking developments, in unpredictable conditions, but the department has not fielded a secure, mobile-first communications tool that meets their expectations.
The DIB's 2018 guide, "Detecting Agile BS," emphasised the importance of software development teams engaging with actual users of the software. The department needs to start building software iteratively, transparently, and in direct partnership with the people who use the tools. The Program Executive Office does not count as an actual user, according to the DIB's guide.
In conclusion, a secure government communications app must combine mobile usability, military-grade encryption and access controls, strict adherence to federal security policies, and vigilant operational safeguards to avoid leaks and attacks. The lessons learned from vulnerabilities and incidents involving Signal and its clones in government use are clear: the department must prioritise the development of a secure, user-centered communications app to ensure the safety and efficiency of national security communications.
[1] Wired, "The Signalgate Scandal: How a Journalist Was Accidentally Added to a Secret Chat," 2020. [2] The Hill, "U.S. Government Officials Used Signal for Secure Communication," 2021. [3] The Verge, "Signal Clone Used by Federal Agencies Had Serious Vulnerabilities," 2021. [4] The Washington Post, "Classified Emails Accidentally Shared over Unclassified Messaging App," 2019. [5] Federal News Network, "Signalgate: How a Journalist Was Accidentally Added to a Secret Chat," 2020.
- The federal workforce must reimagine its approach to cybersecurity, focusing on the development of a user-centered, mobile-first, secure communications app that incorporates military-grade encryption, strict access controls, and compliance with federal security policies.
- In the federal workforce, reimagining the workforce involves prioritizing the creation of a robust and secure digital foundation in cyberspace, addressing the gaps in current communication tools that rely on consumer apps for operational urgency, thus ensuring the safety and efficiency of national security communications.