### Introduction to the 404 Media Podcast In the episode of the 404 Media Podcast, journalists Joseph, Sam Cole, Emanuel Mayberg, and Jason Kebler discuss two hacks with political relevance. The podcast focuses on investigative tech topics, where the hosts often report on significant data protection and security gaps first. ### 1. Signal Clone of the Trump Administration Was Hacked The journalists report that TeleMessage, an app used for archiving Signal messages, was hacked. This app is said to be used by high-ranking members of the Trump Administration, including Mike Waltz. "There's Mike Waltz, who apparently chats with J.D. Vance, Tulsi Gabbard, and Marco Rubio. Apparently, all members of the Trump Administration." The hack is worrisome because the hacker claims to have found the security vulnerability in just "15 to 20 minutes". ### 2. TeleMessage Undermines the Security of Signal The archiving function of TeleMessage undermines the actual purpose of Signal's end-to-end encryption. "It completely undermines the point of Signal and the reason it's the gold standard for end-to-end encryption in messaging." After the hack, TeleMessage suspended the service, and Senator Ron Wyden is now calling for an investigation by the Department of Justice. ### 3. GlobalX, an Airline for Deportations, Was Also Hacked In addition to TeleMessage, GlobalX was also hacked, an airline that carries out deportation flights for ICE. The hackers, who identified themselves as Anonymous, stole flight information and passenger lists. "We know that GlobalX was hacked because their website was disfigured. The hacktivist group Anonymous took responsibility for it in a very conspicuous manner." ### 4. The Hack Provides Evidence of Deportations The stolen data contains detailed information about deportation flights, including the names of people who were not previously publicly known. Jason Kebler verified the data: "I was able to find Kilmar Abrego Garcia on a specific flight. I was able to find some other people whose names were much less well-known." ## Breakdown The podcast provides a deep insight into the security problems of highly sensitive political communication and state deportation practices. The journalists take a clearly critical position towards the Trump Administration, but primarily from a technical and security policy perspective. It's remarkable how they portray state institutions not as neutral actors, but as error-prone organizations that, despite security requirements, have similar problems to normal users: "Government employees, they're like us." The reporting follows an investigative approach with careful verification of the data. It becomes clear that the journalists take social responsibility for their reporting by withholding technical details that could lead to further security breaches. The geopolitical dimension of the topic - foreign companies with access to US government communication - is addressed without resorting to nationalist stereotypes. The podcast illustrates how hacktivism works as a form of political protest and implicitly raises the question of the legitimacy of such actions in the face of controversial government practices. The discussion combines technical expertise with political analysis and makes complex security topics accessible to a broader audience.