A publicly accessible Venmo account belonging to National Security Advisor Michael Waltz revealed hundreds of his personal and professional contacts, including journalists, military officials, and lobbyists, posing a significant national security risk. This account, linked to other accounts of White House officials like Susie Wiles and Walker Barrett, exposed participants in a sensitive Signal group chat discussing a Yemen strike. Following WIRED’s inquiry, the accounts were made private. Experts cite this as part of a larger pattern of reckless behavior by senior administration officials regarding the handling of sensitive information.
Read the original article here
Mike Waltz, a national security advisor, inadvertently left his Venmo friends list public, a significant security lapse that exposed hundreds of personal and professional contacts. This oversight revealed a network of individuals including journalists, military officers, and lobbyists, information that could easily be exploited by foreign intelligence agencies or other malicious actors for various nefarious purposes.
The revelation highlights a concerning pattern of reckless behavior among high-ranking officials. The fact that this information was so readily accessible underscores a severe lack of awareness regarding basic digital security protocols at the highest levels of government. This isn’t merely an isolated incident; it points towards a broader systemic failure concerning information security within the administration.
The incident also brings to light the interconnectedness of these individuals within the administration and beyond. The public nature of Waltz’s Venmo account revealed associations with key figures like Susie Wiles, the White House chief of staff, and Walker Barrett, a National Security Council staffer, both linked to the infamous “Houthi PC small group” Signal chat. This underscores the potential for even seemingly innocuous digital footprints to expose sensitive information and network structures.
The incident is not unique. A similar lapse was previously reported involving Senator JD Vance, whose public Venmo account exposed connections to individuals affiliated with Project 2025, DOJ officials, Yale Law classmates, and far-right media personalities. These repeated occurrences strongly suggest a broader problem regarding digital security practices within governmental circles, and raise serious questions about the training and awareness of those in powerful positions.
The sheer volume of individuals exposed—hundreds of contacts—makes this security breach particularly egregious. The potential for misuse of this information is substantial, ranging from targeted disinformation campaigns to compromised operational security and even blackmail or influence peddling. This type of access could easily be leveraged for political manipulation or even national security compromises.
The widespread reactions to this news range from disbelief to outrage. Many commentators expressed bewilderment that individuals in such sensitive positions would be so careless with their online privacy. Others highlighted the sheer absurdity of the situation, pointing to the irony of individuals responsible for national security demonstrating such blatant disregard for their own. The incident has also fueled broader discussions about the intersection of technology, government, and security protocols, and the need for robust digital literacy training within government agencies.
Beyond the immediate security concerns, the incident raises significant questions about accountability and competence. The fact that such a critical security lapse occurred in the first place calls into question the vetting processes within the administration. It suggests a failure in both individual responsibility and systemic oversight. The potential for foreign intelligence services to exploit this information cannot be overstated.
Furthermore, the episode has ignited a broader conversation about the role of social media and mobile payment apps in the lives of public officials. The default settings of many applications, such as the public nature of Venmo’s friends list, are often overlooked, creating a potential risk for individuals who are unaware of the security implications. This case highlights the necessity of greater awareness and proactive measures to protect sensitive information in the digital age.
In conclusion, Mike Waltz’s inadvertently public Venmo account serves as a stark reminder of the potential dangers of neglecting basic digital security practices, particularly for individuals in positions of power. The incident not only exposes a vulnerability within the administration but also underscores a broader need for improved security protocols and increased awareness of the risks associated with public online activity, particularly within government circles. The far-reaching implications of this lapse should not be underestimated. The incident highlights the need for substantial improvements in security awareness and training at all levels of government.