Passwords and mobile numbers belonging to key members of Donald Trump’s national security team have been unearthed by the German news outlet Spiegel.de, raising serious concerns about the administration’s cybersecurity practices. The sheer volume of easily accessible personal information is alarming. Spiegel’s investigation revealed a trove of sensitive data, including mobile phone numbers, email addresses, and even some passwords, publicly available through various online sources.

This readily available information included details for high-ranking officials like National Security Adviser Mike Waltz, Director of National Intelligence Tulsi Gabbard, and Secretary of Defense Pete Hegseth. The ease with which these details were obtained is deeply troubling. The report indicates that much of this data was found through readily accessible commercial databases and leaked customer information found on the open web.

Adding to the gravity of the situation, Spiegel’s reporting connected some of these publicly available phone numbers to active Signal accounts. While it’s unclear whether the controversial Signal chat, previously reported by The Atlantic, used accounts linked to these private numbers, the fact that the numbers themselves are so easily found is undeniably problematic. Gabbard’s refusal to comment on the matter only deepens the mystery and the overall sense of unease.

The leaked information wasn’t just limited to phone numbers and email addresses. The investigation also uncovered multiple instances of passwords associated with these officials’ accounts being found in publicly available leaked databases. These passwords were linked to accounts across various platforms, including Dropbox, LinkedIn, WhatsApp, and Signal, further highlighting the extent of the security lapse.

Secretary of Defense Hegseth’s case is particularly concerning. His mobile number and private email address were remarkably easy to find via a commercial contact data provider commonly used by businesses. Furthermore, researchers discovered that Hegseth’s email address appeared in over twenty publicly accessible data leaks, some of which even included associated passwords. His reportedly recently deleted WhatsApp account, identifiable via the profile photo, also provided further evidence of the lax security measures.

National Security Adviser Waltz also had his personal information easily accessible. His mobile number could be found through a simple search on a popular US search engine, and multiple passwords linked to his email address were discovered in leaked databases. This information led directly to his profiles on platforms like Microsoft Teams, LinkedIn, WhatsApp, and Signal.

While Gabbard appears to have been more cautious, her data still showed vulnerabilities. Although seemingly more protected than her male colleagues in easily accessible commercial databases, her email address could still be found on sites like WikiLeaks and Reddit, and was included in over ten data breaches, one of which even contained a shortened version of her phone number, traceable to both WhatsApp and Signal accounts.

The overall implications of this security breach are deeply worrying. The compromised information could easily be used by hostile foreign entities to gain access to the officials’ devices, potentially compromising sensitive information and communications. The careless handling of private data by individuals holding such high-level security positions is alarming, especially considering their roles in national security policy and military strategy. The nonchalant attitude towards cybersecurity exhibited by these individuals calls into question their fitness for office. The potential consequences are severe and should be addressed immediately.