Shane Harris
👤 PersonAppearances Over Time
Podcast Appearances
What I'm afraid this episode will show to those foreign spy agencies is that that work of spying on our officials might be easier than they had thought it would be. And I don't think we should presume for a minute that all of the phones that were used in this signal chain are 100% secure. I'm not saying I know them not to be, but I would not presume that they are.
I think that there is kind of a pattern of sloppy behavior by senior members of the administration with... wie sie Briefungen mit den Leuten, die sie um sie herum haben, machen, und ob diese Leute die entsprechenden Kommunikationssysteme, die sie benutzen, gereinigt haben. Ich denke nicht, dass wir diese Signalgruppe als Ein-und-ein-Gruppe beurteilen sollten.
I think that there is kind of a pattern of sloppy behavior by senior members of the administration with... wie sie Briefungen mit den Leuten, die sie um sie herum haben, machen, und ob diese Leute die entsprechenden Kommunikationssysteme, die sie benutzen, gereinigt haben. Ich denke nicht, dass wir diese Signalgruppe als Ein-und-ein-Gruppe beurteilen sollten.
I think that there is kind of a pattern of sloppy behavior by senior members of the administration with... wie sie Briefungen mit den Leuten, die sie um sie herum haben, machen, und ob diese Leute die entsprechenden Kommunikationssysteme, die sie benutzen, gereinigt haben. Ich denke nicht, dass wir diese Signalgruppe als Ein-und-ein-Gruppe beurteilen sollten.
Ich denke, dass dies ein Illustrativ eines Behalts und einer Praxis ist, das wir in Januar gesehen haben, seit Präsident Trump im Einsatz war.
Ich denke, dass dies ein Illustrativ eines Behalts und einer Praxis ist, das wir in Januar gesehen haben, seit Präsident Trump im Einsatz war.
Ich denke, dass dies ein Illustrativ eines Behalts und einer Praxis ist, das wir in Januar gesehen haben, seit Präsident Trump im Einsatz war.
We've talked before and I've written before about the counterintelligence and security risks that happen or get created when people from the Doge service start barging into agencies and mucking about in computer systems that they don't really understand and the way that they can expose information or make it more vulnerable.
We've talked before and I've written before about the counterintelligence and security risks that happen or get created when people from the Doge service start barging into agencies and mucking about in computer systems that they don't really understand and the way that they can expose information or make it more vulnerable.
We've talked before and I've written before about the counterintelligence and security risks that happen or get created when people from the Doge service start barging into agencies and mucking about in computer systems that they don't really understand and the way that they can expose information or make it more vulnerable.
So I think about that and other threads that I'm kind of pulling on and say the way to think about the Houthi PC small group signal scandal is as part of a whole pattern of behavior, not as something that happened in isolation.
So I think about that and other threads that I'm kind of pulling on and say the way to think about the Houthi PC small group signal scandal is as part of a whole pattern of behavior, not as something that happened in isolation.
So I think about that and other threads that I'm kind of pulling on and say the way to think about the Houthi PC small group signal scandal is as part of a whole pattern of behavior, not as something that happened in isolation.
Thank you for having me, Claudine.
Thank you for having me, Claudine.
Thank you for having me, Claudine.
I mean, what they do is talk about who we're going to bomb and why should we bomb them. They don't do it on signal. And the initial presentation of this that Jeff gave to me, I thought, well, this sounds crazy. Why would they be that reckless? Why would the National Security Advisor set up a group, call it, you know, P.C. Huthi Group, And then start adding these people.
I mean, what they do is talk about who we're going to bomb and why should we bomb them. They don't do it on signal. And the initial presentation of this that Jeff gave to me, I thought, well, this sounds crazy. Why would they be that reckless? Why would the National Security Advisor set up a group, call it, you know, P.C. Huthi Group, And then start adding these people.
I mean, what they do is talk about who we're going to bomb and why should we bomb them. They don't do it on signal. And the initial presentation of this that Jeff gave to me, I thought, well, this sounds crazy. Why would they be that reckless? Why would the National Security Advisor set up a group, call it, you know, P.C. Huthi Group, And then start adding these people.
And it was actually kind of baffling, too, because, again, if this was a hoax, somebody was going to really great lengths to do it, which could happen. I mean, you know, sophisticated operations do happen in the intelligence world. And the question was, of course, like, why? To what end? So where is this going?