The recent signal Houthi PC small group chat scandal raises some fundamental issues that all organizations are also challenged with.
If you are not aware, Michael Waltz (Secretary of Defense) created a chat group in Signal that included Marco Antonio Rubio (secretary of state), JD Vance (VP), Tulsi Gabbard (the Director of Mational Intelligence), Scott Bessent (Treasury Secretary), Pete Hegseth, Brian Hughes (National Security Council), John Ratcliffe (Directory of CIA), plus the journalist Jeffrey Goldberg. The group included 18 people in total. The group then went on to discuss who should be point of contacts and then discussed timing, phases, and equipment to be used in a military strike.
Tuli Gabbard, John Ratcliffe, Kash Patel, and others also testified at the Senate hearing on global threats https://www.youtube.com/watch?v=OBbR9utZLLM
The Atlantic has now published the full text of the chat on Wednesday
What lessons can we learn from this incident?
The first is a challenge that we see popping up all the time. How do you know who you are talking to? Phishers frequently send out emails, text messages, and voice or video calls pretending to be the CEO or a vendor and asking for things like gift cards, or ETF payments, or update bank account numbers.
In the case of signal chat, we have a group of high-level officials who may or may not know each other, who trusted on spec that the group was real and all the participants were authorized to be part of the discussion. No one questioned who the other people were on the chat, or if they were authorized to be on the chat.
Validating the identity of an employee starts even before they are hired. There are have been a number of instances where individuals have been hired who have have either fraudulent or malicious intents, including taking on multiple jobs at the same time, farming out work to 3rd parties in cheaper countries or to gain access to sensitive systems or information. If remotely hiring, the video should be turned on during the interviews. The identity of the interviewee should be confirmed is the same as the person showing up for work. Background checks should be performed by a qualified organization to confirm identity and education. References should be checked and validated are real. Policies around work locations should be clearly defined so alerts can be set up to notify if an employee is connecting to corporate resources from an unusual location such as a different country or state.
To help employees understand where and when information should be shared a company should have an authorized communications policy that states how employees talk to each other and to people outside the company. Defining allowed technologies such as email, telephone, messaging platforms like slack. It should answer questions like “Who is authorized to send mass emails to all of the company?”, “Who is allowed to talk to the media on behalf of the company”, “When do you need to have an NDA in place before talking with customers about non public information”.
Companies should have an information classification policy. I like Salesforce’s breakdown of Public, Confidential, Restricted, and Mission Critical. Once those are defined, you can start answering questions about what the classification of data you are trying to protect is and how it should be handled.
If you have an IT or HR help desk, an employee’s identity must be validated. This could be done using an identifier in the HRIS system and asking additional questions like who the employee’s manager is. For sensitive discussions, it may require the representative to ‘call back’ the employee using a trusted number and communications tool.
Another area that is interesting about the Signal chat is that high-level officials are using Signal to communicate. From listening to the Senate Hearing, it sounds like it is a standard sanctioned tool at the CIA, but where is it allowed to be used? personal devices? Company issued devices? In Foreign Countries? What classification of information is allowed to be discussed using that tool? But most importantly how do you validate a person’s identity so you know you are talking to the right JD Vance or Tulsi Gabbard?
Within the corporate world, shadow IT can be addressed using tools that can scan for unsanctioned tools, If you use Office 365 and haven’t done so already, you should require admin consent for enterprise applications so users can not authorize an unsactioned tool to be connected to your Office 365 tenant. If possible claim your domains in tools like zoom and apple business manager so additional instances can’t be accidentally setup.
Anytime there is an incident either inside your organization or outside, it is useful to run a quick risk assessment to see if there are any lessons learned that could be applied inside your company.