Concerns Raised Over Army Secretary’s Use of Signal App
WASHINGTON – A Pentagon watchdog has identified potential risks caused by Army Secretary Pete Hegseth, who reportedly communicated classified information via the messaging app Signal regarding a military operation against Houthi rebels in Yemen, according to two sources familiar with the findings.
Interestingly, while Hegseth had the authority to declassify the information, the investigation revealed that he did not misuse that power, as shared by a source who requested anonymity. However, the report highlighted that Hegseth violated Pentagon policies by employing a personal device for official communications, suggesting a need for improved training across the Pentagon.
While Hegseth chose not to meet with the Pentagon inspector general, he submitted a written statement, asserting that he acted within his rights to declassify information and only conveyed details he believed wouldn’t compromise the mission.
Pressure Mounts for Investigation
The initial findings have intensified scrutiny, especially as lawmakers called for an independent review of his use of commercial applications for communication. They are also examining claims that Hegseth allegedly ordered an attack on a vessel suspected of drug smuggling in the Caribbean in September, resulting in casualties.
Hegseth characterized the strike as occurring in chaotic circumstances and defended the decision as justified, emphasizing that a higher command acted appropriately during the operation. Despite the situation, he distanced himself from the fallout of his communication methods, insisting that he didn’t share classified information.
Leak of Sensitive Details
In at least two instances, Hegseth reportedly detailed the timing of military actions, such as fighter jet launches and bomb drops, in chats that may have compromised operational security. This issue arose after journalist Jeffrey Goldberg from Atlantic was accidentally included in a conversation that involved senior officials discussing military strategies against the Houthis.
Hegseth also engaged in private chats with various individuals, including family members, to relay similar sensitive information. Although Signal provides encryption, it is not recognized for handling classified communications in the Department of Defense framework.
Regardless, Hegseth previously claimed the information in the chats was non-confidential. Some military officials disagreed, arguing there are established protocols for sharing critical details, especially before an attack.
The insights from the pentagon watchdog have created a significant stir in Congress, where members express concern that such information sharing could threaten the safety of personnel involved in sensitive operations.
Calls for Accountability
Legislators, including members from both parties, have stressed that if a junior military officer had committed such an error, it would have resulted in severe consequences. The inquiry into Hegseth was initiated by both the Senate Armed Services Committee’s top Democrats and Republicans amid growing worries from military families about strict security adherence.
The Military Context
The background of this investigation lies in military actions against the Houthis, who, in late 2023, intensified missile and drone assaults on vessels in the region. This escalation, which the Houthis framed as a response to conflict in Gaza, led to significant disruptions in trade through a vital maritime route.
Following the escalation, the U.S. initiated substantial military operations aimed at the Houthis, marking one of the most extensive naval combats since World War II.
Hegseth, in previous statements, argued that the shared information for media coordination did not meet classified standards. His remarks during a June hearing hinted at a reluctance to fully acknowledge responsibility if the inspector general found evidence of classified information sharing.


