Encrypted doesn’t mean secure: Lessons from the war plans group chat leak

Tom Mersman
March 26, 2025
·
14
min read

An accidental group text leak of U.S. war plans exposed more than just military secrets. It underscored the dangerous shortcomings of consumer messaging apps in government operations, and why encryption alone isn’t enough without proper identity, access control, and oversight.

A stark wake-up call

Earlier this month, a national security breach made headlines when a group chat used by U.S. officials to coordinate a military strike was inadvertently shared with an unauthorized participant. Sensitive plans for an operation in Yemen were discussed on Signal, and somehow, a reporter ended up in the mix.

There was no external hack, but the real issue is this: just because something’s “encrypted” doesn’t mean it’s secure. This breach wasn’t a tech failure, it was a human error. And it’s a wake-up call: relying on consumer messaging apps for sensitive government operations just doesn’t cut it.

Signal’s end-to-end encryption that kept eavesdroppers at bay, but the plans still leaked because an insider accidentally added a reporter. 

This underscores the key risk for defense and military organizations: relying on consumer-grade apps, even encrypted ones, can lead to critical security lapses

Encrypted vs. Secure: Mind the gap

Encryption keeps messages private, but it’s only part of the equation. True security goes beyond  confidentiality. It’s about who’s in the conversation, how their identity is verified, and whether the organization can monitor and control access. 

In other words, confidentiality (via encryption) is just one pillar of security; authentication, authorization, and auditability are equally critical to secure communications. 

The Yemen war plan leak highlights this. The encryption didn’t fail – it worked to keep outsiders from snooping. The problem was that the “outsider” in this case was invited in as an insider. 

But when consumer apps can’t verify identities or control permissions, no encryption algorithm can save you if you unintentionally hand the keys to the wrong person.

In high-stakes operations, security is about more than encryption. It’s about ensuring the right people are in the conversation, with their identities verified and permissions carefully controlled. 

“Consumer apps simply aren’t designed for that level of trust and oversight. They’re built for social chats, not classified operations.“ 

The perils of consumer apps in government operations

Despite their popularity, consumer messaging platforms like WhatsApp, Telegram, or Signal come with serious shortcomings when misused for official government and defense communication:

Lack of identity verification

Consumer apps use phone numbers or usernames, not official credentials. For example, a “John Doe” in a chat might not be the real John Doe from your agency. In the recent incident, a connection request from what appeared to be a high-ranking official’s account was enough to gain entry to a top-secret chat. 

No role-based access control

These apps have a simple “in or out” model. For instance, anyone can add someone to a sensitive chat. In a secure system, adding a participant would require validating their clearance first.

Limited admin oversight

Without admin tools, there’s no way to monitor communication in real-time. A mistake, like an unauthorized person joining a chat, could go unnoticed until it’s too late.

Compliance and legal risks

Apps like WhatsApp and Signal may not keep records needed for audits. Using them for official communications could violate laws like FOIA, leaving agencies out of compliance without realizing it.

Lack of data sovereignty

Consumer apps store data on external servers. If a device is lost or an employee leaves, retrieving or deleting sensitive data can be nearly impossible. Instead, a self-hosted platform is like having a locked safe, you control who accesses what and when.

In short, consumer messaging tools prioritize convenience for individuals, but they sacrifice the institutional control, visibility, and assurances that government agencies absolutely require. 

“Using them for coordinating something as sensitive as military actions is like using a civilian sedan in an off-road combat zone – it might get you there in mild conditions, but it’s not built for the terrain, and it will fail when you need it most.” 

Rocket.Chat Secure CommsOS™: Purpose-built for mission-critical communications

Lessons from incidents like Yemen show that messaging is mission-critical infrastructure, not a convenience. Rocket.Chat is built for high-stakes operations, and trusted by the U.S.Department of Defense, Intelligence Community, and defense contractors (full disclosure: as Rocket.Chat’s Head of FSIs, this is the space I work in every day). Whether you're managing personnel or coordinating a mission, we’ve got your back.

Own your data

  • Rocket.Chat puts you in full control of your mission-critical data and classified communications. 
    • Deploy on-premise, in a secure cloud, or in an air-gapped environment based on your mission’s security needs. 
    • Everything stays on your servers, ensuring your data is safe, isolated, and fully under your control.

  • Whether you're in a classified setting or offline, it operates entirely within your own network.
  • All data and metadata remain within your authorized boundary, providing the data sovereignty federal agencies require.

Defense-grade encryption plus access controls

Strong encryption is just the start when it comes to securing sensitive communications. 

With Rocket.Chat, you’re not locked into a rigid access system. 

  • You can create custom user roles tailored to your mission needs, giving you total control over defining roles and the scope for each operation. 
    • For example, you can create a custom role for a field officer, granting them access to real-time mission updates but restricting entry to classified strategic plans.
  • Rocket.Chat offers over 190 advanced permissions to customize who can do what within the system, which is far beyond a simple admin/user dichotomy. 

With this level of control, you can ensure that only authorized personnel access critical mission data, protecting sensitive information and ensuring it stays in the right hands - just like it should have been in the Yemen case. 

Operational oversight and compliance

In defense and military operations, you require governance guardrails which is the ability to log every action, monitor and audit all communications - that’s your safety net. 

  • Rocket.Chat’s DLP policies detect, censor, and hash sensitive information before it’s exposed. 
  • Coupled with detailed logs and audit trails, you get full oversight of all activity in your workspace. 

This prevents unauthorized leaks, internal oversharing, external interception and safeguards classified data. 

Secure interoperability with allied partners 

Secure communication shouldn’t mean being cut off from allies or other units. 

  • Rocket.Chat supports federation with protocols like Matrix, allowing secure communication between joint and coalition partners to bridge communications gaps across different agencies.
  • This ensures inter-agency chat and cross-organization coordination without relying on unsecured public networks, maintaining both security and interoperability during critical operations.

Integrate with trusted directories 

  • Rocket.Chat is built with a Zero Trust approach in mind. 
    • Every login, device, and access attempt is continuously authenticated and authorized. In the Yemen case, unauthorized users were added to critical channels, leading to confusion and misdirection.
  • Rocket.Chat eliminates this risk with strong authentication protocols, ensuring only verified personnel have access. 
    • By integrating with trusted directories like LDAP, you gain precise control over user management, ensuring only authorized personnel are added to channels. 

This prevents access errors, safeguarding against potential breaches and operational disruptions, which can be life-saving in high-stakes defense situations.

Purge or retain data per your security policies

In the Signal app, messages disappear after a set period which raises concerns over compliance with federal record-keeping laws and potentially losing critical intelligence. 

  • Rocket.Chat gives defense agencies full control with customizable data retention policies, allowing you to define retention periods for messages, files, and metadata based on security and compliance requirements. 
  • Whether for mission logs, critical intel, or after-action reports, you ensure data is securely archived and available when needed. 

This way, you avoid the risk of critical information being lost or deleted prematurely. 

Security standards for classified operations

Rocket.Chat’s IL6 ATO ensures our platform meets the highest security standards for classified communications. This means it’s approved for handling sensitive government data, including Top Secret-Level information

In addition, Rocket.Chat is Iron Bank certified which confirms that our infrastructure has been rigorously tested and hardened, passing stringent DoD security assessments. 

Our codebase and containers are fully accredited through the DoD’s Platform One process which enables rapid and secure deployment on classified networks. 

“The goal is to prevent the kind of mishap that occurred in the Yemen operation chat, without sacrificing the speed and convenience of real-time messaging that commanders and combatants need.”

The way forward: Securing the mission, end-to-end

This recent incident should be a wake-up call for government agencies and contractors: it’s time to reassess your communications posture.  

Ask yourself and your team: What messaging platforms are we using for sensitive discussions? Who controls them? Do they meet the criteria for true security, or are we skating by on consumer-grade convenience?  If the answers are uncomfortable, the risk is unacceptable.

We can’t brush off leaks like the Yemen war plans as a one-time mistake. Yes, human errors happen, but we must deploy systems that anticipate and mitigate them. 

In national security, the difference between an encrypted-but-unmanaged chat and a fully secure communications system could mean the success or failure of an operation, or even life and death for field operatives.

The solution is clear: banish unauthorized consumer apps, and provide a secure, sanctioned alternative. 

Implement a Secure CommsOS™ that covers encryption, identity assurance, access control, monitoring, and data sovereignty. Ensure it’s paired with proper training, regular audits, and drills to catch mistakes before they happen. 

In an age where foreign adversaries employ sophisticated cyber espionage, we must shore up the simple things like a random phone number slipping into a high-level strategy call. 

Take a hard look at your organization’s communication tools today. If you find gaps in security, governance, or control, act now. Adopt secure, purpose-built solutions that protect your missions. 

The technology is available; it’s up to us to use it. The war plans leak was a costly lesson, but not learning from it would be even more costly.

Get started with Rocket.Chat’s secure collaboration platform

Talk to sales

Frequently asked questions about

Tom Mersman is the Head of FSIs at Rocket.Chat, where he leads strategic initiatives focused on building strong relationships with federal systems integrators (FSIs). With deep expertise in the defense and intelligence sectors, Tom understands the unique demands of mission-critical work and the vital role secure communications play in supporting Department of Defense (DoD) projects. His work ensures that FSIs are empowered to deliver secure, reliable solutions to some of the most sensitive and impactful missions in the federal landscape.
Tom Mersman
Related Article:
Team collaboration: 5 reasons to improve it and 6 ways to master it
Want to collaborate securely with your team?
Deploy Rocket.Chat on-premise or in the cloud and keep your conversations private.
  • Digital sovereignty
  • Federation capabilities
  • Scalable and white-labeled
Talk to sales
Looking for a HIPAA-ready communications platform?
Enable patients and healthcare providers to securely communicate without exposing their data.
  • Highly scalable and secure
  • Full patient conversation history
  • HIPAA-ready
Talk to sales
The #1 communications platform for government
Deploy Rocket.Chat on-premise, in the cloud, or air-gapped environment.
  • Secure data governance and digital sovereignty
  • Trusted by State, Local, and Federal agencies across the world
  • Matrix federation capabilities for cross-agency communication
Talk to sales
Want to customize Rocket.Chat according to your own preferences?
See behind the engine and change the code how you see fit.
  • Open source code
  • Highly secure and scalable
  • Unmatched flexibility
Talk to sales
Looking for a secure collaboration platform?
Keep your conversations private while enjoying a seamless collaboration experience with Rocket.Chat.
  • End-to-end encryption
  • Cloud or on-prem deployment
  • Supports compliance with HIPAA, GDPR, FINRA, and more
Talk to sales
Want to build a highly secure in-app chat experience?
Use Rocket.Chat’s APIs, frameworks, and managed backend to build a secure in-app or live chat experience for your customers.
  • Supports compliance with HIPAA, GDPR, FINRA, and more
  • Highly secure and flexible
  • On-prem or cloud deployment
Talk to sales

Our best content, once a week

Share this on:

Get your free, personalized demo now!

Build the most secure chat experience for your team or customers

Book demo