{"id":5014,"date":"2017-02-17T14:25:33","date_gmt":"2017-02-17T18:25:33","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5014"},"modified":"2020-06-04T20:52:56","modified_gmt":"2020-06-04T20:52:56","slug":"encrypted-apps-leaking-information","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/encrypted-apps-leaking-information\/","title":{"rendered":"White House Staff Using Secretive Encrypted Apps to Leak Information about the Current Trump Administration"},"content":{"rendered":"<p><img loading=\"lazy\" class=\" wp-image-5018 alignleft\" src=\"\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2017\/02\/Tweet-300x108.jpg\" alt=\"\" width=\"458\" height=\"165\" srcset=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2017\/02\/Tweet-300x108.jpg 300w, https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2017\/02\/Tweet.jpg 994w\" sizes=\"(max-width: 458px) 100vw, 458px\" \/>President Donald Trump stated in an animated press conference on February 16, 2017 that his \u201cadministration is running like a fine-tuned machine.\u201d<br \/>\nThe number of leaks plaguing the current administration, and the information being leaked, paint a different story. A transcript of his telephone conversation with Australian Prime Minister Malcolm Turnbull revealed that Trump was incensed by an Obama agreement to take in refugees, and told the Prime Minister that this was <a href=\"http:\/\/nypost.com\/2017\/02\/01\/trump-blasted-australian-prime-minister-during-worst-call-by-far\/\">\u201cthe worst call by far\u201d<\/a> he\u2019s had with world leaders. Trump reportedly yelled at Turnbull and hung up on him after just 25 minutes, though the conversation was scheduled to last an hour.<br \/>\nThe leaks range from serious domestic and international policy matters, to more embarrassing insider accounts of what it\u2019s like to work in the White House under this new administration.<\/p>\n<blockquote><p>The Twitter account <a href=\"https:\/\/twitter.com\/roguepotusstaff\">Rogue POTUS<\/a> describes itself as \u201cThe unofficial resistance team inside the White House\u201d<\/p><\/blockquote>\n<p>and says they \u201cpull back the curtain to expose the real workings inside this disastrous, frightening Administration.\u201d After his press conference on February 16, the account tweeted \u201cPOTUS says he \u201cowned them\u201d regarding press conference. However, was not amused afterward when someone pointed out Obama&#8217;s 332 in 2012.\u201d<br \/>\nThe account is also soliciting leaks publicly. They posted a tweet quoting user Katie McAllister (@Katiemca), who tweeted \u201cFor anyone ready to leak information on Trump, <a href=\"https:\/\/twitter.com\/RoguePOTUSStaff\">@RoguePOTUSStaff<\/a>\u201d.<\/p>\n<blockquote><p>Many of the <a href=\"https:\/\/www.wired.com\/2017\/02\/white-house-encryption-confide-app\/\">White House Staffers<\/a> are using a mobile application called <a href=\"https:\/\/getconfide.com\/faq\">Confide<\/a> to communicate about leaking information.<\/p><\/blockquote>\n<p>Confide is an encrypted messaging application\u2014a secretive and private way to send messages on mobile devices. It features disappearing messages and prevents users from screenshotting messages in order to minimize the digital paper trail of the communication. And its use has \u201cspiked\u201d since the start of the new Trump Administration, according to Confide\u2019s co-founder and president, who said they\u2019ve seen an <a href=\"http:\/\/fortune.com\/2017\/02\/16\/donald-trump-confide-secret-chat\/\">\u201cenormous spike\u201d<\/a> in usage and engagement.<br \/>\nConfide was founded in 2013, and was in fact made for this purpose\u2014to provide executives a way to <a href=\"https:\/\/www.wired.com\/2017\/02\/white-house-encryption-confide-app\/\">\u201cto trade gossip and talk shop.\u201d<\/a> Messages automatically self-destruct, so they\u2019re not saved and subject to later discovery. Other mobile applications like Snapchat also have disappearing message features, but Confide is unique. It\u2019s the only secure messaging app whose encryption is closed source and proprietary, which means that \u201cno one outside the company knows what\u2019s going on under the hood of the app.\u201d<br \/>\nWithin the context of the White House, use of the app to leak information about the administration may have some particularly serious legal implications.\u00a0David Vladeck, a communications and technology law researcher at Georgetown Law School said its use by Staffers \u201craises very disturbing questions about compliance with the Presidential Records Act specifically, and more broadly the Federal Records Act[.]\u201d These laws, he says, are intended to prevent our nation\u2019s history from being lost or manufactured.<br \/>\nIn contrast, according to an article posted by Above the Law (a website popular among law students that features candid and anecdotal information about a variety of legal topics) titled \u201c<a href=\"http:\/\/abovethelaw.com\/2017\/02\/white-house-staff-probably-violating-the-presidential-records-act-and-i-probably-dont-care\/\">White House Staff Probably Violating The Presidential Records Act, And I Probably Don\u2019t Care<\/a>,\u201d violating the act isn\u2019t that big of a deal. The Act basically says White House Staff \u201ccan\u2019t throw away their work\u201d but it doesn\u2019t \u201creally define any\u00a0<em>punishments<\/em>\u00a0for violators.\u201d (The article also says that Trump is probably violating this act every time he deletes one of his tweets. <a href=\"http:\/\/www.nydailynews.com\/news\/politics\/trump-deleted-tweets-violate-presidential-records-act-article-1.2952416\">The New York Daily<\/a> News similarly raised another interesting question about the Presidential Records Act and the implications of using social media to communicate, asking whether the President violates the PRA every time he deletes a tweet because of a misspelled word.)<br \/>\nEven if violating the PRA isn\u2019t a big deal, if Staffers are using Confide to violate the more serious federal criminal laws on destroying federal records, they would certainly face more serious penalties, including prison time. Certainly, there is no shortage of political drama with the new Administration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>President Donald Trump stated in an animated press conference on February 16, 2017 that his \u201cadministration is running like a fine-tuned machine.\u201d The number of leaks plaguing the current administration, and the information being leaked, paint a different story. A transcript of his telephone conversation with Australian Prime Minister Malcolm Turnbull revealed that Trump was <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/encrypted-apps-leaking-information\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5015,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5014"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5014"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5014\/revisions"}],"predecessor-version":[{"id":7108,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5014\/revisions\/7108"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/5015"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}