Here’s a bold statement: NASA’s internal communication systems are more complex—and potentially more revealing—than you might think. On December 19, 2025, an email was sent to all NASA employees at 8:33 am ET, inviting them to participate in an upcoming Town Hall with the NASA Administrator. But here’s where it gets intriguing: the process to join isn’t as straightforward as clicking a link. If you navigate to https://townhall.nasa.gov/vpncheck/, you’re redirected through a VPN firewall and then a NASA Access Launchpad security check—a multi-layered system designed to ensure only authorized personnel gain access. And this is the part most people miss: when submitting questions via https://nasa.cnf.io/sessions/frpn/#!/dashboard, you’re required to provide your name, email, and center affiliation. Controversially, the system doesn’t seem to verify this information rigorously—I entered my real name (hello, NASA!) and listed my center as “N/A,” and it worked without issue. Even more surprising? Each question submitted is publicly tied to the individual’s name, raising questions about privacy and transparency within the organization. I’ve shared the questions asked (with submitter names removed) on Twitter and my blog (https://nasawatch.com/ask-the-administrator/nasa-administrator-town-hall-information/), but the implications here are worth discussing. Is this system secure enough? Or does it inadvertently expose employees to unnecessary risks? Let’s dive deeper: as someone who’s navigated NASA’s systems both as an insider and an outsider—NASA Watch founder, Explorers Club Fellow, ex-NASA, journalist, and space enthusiast—I can tell you this: the balance between accessibility and security is a tightrope walk. What do you think? Does this approach strike the right balance, or is it a recipe for potential mishaps? Share your thoughts in the comments—I’m eager to hear your take on this fascinating intersection of technology, transparency, and trust.