the U.S. Department of Defense (DoD)’s inspector general (IG) publicly released a report concluding that Pete Hegseth, U.S. Secretary of Defense, risked jeopardizing a strike mission against Houthi rebels in Yemen by sending sensitive operational information over the commercial messaging app Signal on his personal cell phone.
The report said Hegseth transmitted details — including the number of aircraft involved and precise strike-times for manned U.S. aircraft — roughly two to four hours before the strikes commenced, raising the risk that adversaries could intercept the information and compromise the operation.
Background: Why It Matters
The disclosure sparked widespread concern because strike details — especially timing and aircraft numbers — are typically treated as classified. In this case, the original information came from a classified email sent by the commander of U.S. Central Command (CENTCOM), marked “SECRET/NOFORN.”
Under DoD rules, operational communications must occur over approved secure channels; transmitting such information over unapproved, commercially available apps like Signal, especially on personal devices, violates protocol — even if the person sending them has declassification authority.
This incident drew renewed attention to broader concerns about the use of personal devices and nonstandard communication apps within the Pentagon — a matter of operational security, record-keeping compliance, and accountability.
What the Report Found — Details of the Lapse
Use of Signal Before the Strike
- On March 15, Hegseth used Signal to send a “Houthi PC Small Group” chat containing details about the upcoming strike — including launch times for F-18 Hornet jets, planned waves of drone and Tomahawk strikes, and approximate weapon release times.
- The chat participants included senior Trump-administration figures such as then–national security adviser Mike Waltz and Vice President JD Vance, and — by mistake — a journalist from The Atlantic, namely Jeffrey Goldberg, who later published the controversy.
- Hegseth reportedly created another Signal chat involving family and close contacts, where he shared similar strike-related information.
Classification vs. Security Protocols
- Although Hegseth, in his written response to the investigation, said that he judged the information he shared to be “not classified” or “safely declassified,” the IG noted that the original data derived from emails that were classified “SECRET/NOFORN.”
- The IG determined that, regardless of declassification authority, transmitting sensitive operational data via an unapproved messaging app on a personal device violated DoD policy.
Risks to Operational Security
- The report warns that sharing such details so close to execution — two to four hours before strike — could have allowed enemy forces to anticipate and counter U.S. movements, potentially endangering pilots, delaying or foiling the mission, or compromising classified tactics and procedures.
- The IG expressed concern about a broader pattern within the DoD: multiple instances of using personal devices or unapproved applications for official business — especially in circumstances such as remote work or when secure communications were considered “impractical.”
Reactions and Institutional Response
Some lawmakers issued sharp criticisms. For instance, Senator Jack Reed (D-RI) said Hegseth’s conduct violated military regulations and disregarded servicemembers’ safety.
Conversely, the Republican chairman of the Senate Armed Services Committee, Roger Wicker (R-MS), argued that Hegseth acted within his declassification authority — and suggested that the findings reveal a need for improved tools to enable real-time secure communication by senior national-security officials.
Hegseth’s legal adviser, Timothy Parlatore, echoed the defense, saying the texts contained “no classified material” and that Hegseth had the explicit authority to declassify as he saw fit.
The report also recommends better training across the DoD about handling sensitive information and stricter adherence to approved communication methods.
Policy & Strategy Implications
This incident underscores the tension between operational flexibility at senior policy levels and strict adherence to security protocols. While top leaders may possess declassification authority, doing so outside established classification and recordkeeping procedures — especially using personal devices and public apps — can undermine security and accountability.
It also raises broader questions about whether current DoD infrastructure sufficiently supports secure, real-time communication for high-level officials, particularly in fast-moving conflict zones or dynamic geopolitical environments.
What’s Next
The release of the IG report could renew calls in Congress for formal disciplinary action or stricter oversight mechanisms, especially if additional similar instances come to light.
Meanwhile, the DoD may reevaluate its communication policies, potentially limiting the use of personal devices or unapproved apps even for high-level declassification decisions, or expanding secure communication tools for senior officials.
Finally, adversaries may be incentivized to exploit future lapses if confident that real-time operational details could — again — be shared in insecure ways.
Get real time update about this post category directly on your device, subscribe now.
8 comments
[…] Northrop Grumman said the use of digital engineering tools helped improve safety across manufacturing, assembly and testing phases while reducing field execution time by about 25 percent during pre-launch pathfinder operations. These tools included a digital twin of the vehicle and virtual and augmented reality simulations that helped plan factory integration and stacking operations. […]
[…] planning. Within defense, data integration and analytics tools are increasingly central to operational planning, logistics coordination, and decision […]
[…] sustainment requirements. Officials have emphasized that this stage is about reducing technical and operational risk before committing to a full […]
[…] relies heavily on reservist mobilization to sustain long-term security operations. The infusion of roughly $2 billion for reservist benefits adds to wider defense expenditures […]
[…] nations. The delivery supports Tunisia’s ability to conduct transport missions, joint exercises, security operations, and rapid response tasks in the […]
[…] Monitoring of ground lights to assess grid outages or damage after strikes.• Support to planning and assessment in large-scale operations where darkness limits other […]
[…] Hegseth’s appearance at Anduril reflects sustained senior level interest in unmanned systems that can operate in contested maritime spaces. Autonomous underwater vehicles are increasingly viewed as essential tools for intelligence gathering, surveillance, reconnaissance, and seabed operations, especially in regions where traditional manned platforms face higher operational risk. […]
[…] light tank as a multi role combat system capable of direct fire support, anti armor missions, and security operations. The combination of a light chassis with a well armed turret offers a cost effective alternative […]