A federal oversight review has raised significant concerns about the handling of sensitive military information inside the Department of Defense after an internal watchdog concluded that Defense Secretary Pete Hegseth used an encrypted civilian messaging app to relay operational details about a planned strike on Houthi militants in Yemen. The findings, shared with congressional leaders and later confirmed by individuals familiar with the report, outline a series of missteps that investigators say exposed American personnel and active military operations to unnecessary risk.
The controversy stems from a series of Signal messages sent earlier this year during preparations for a U.S. airstrike targeting Houthi forces aligned with Iran. According to the watchdog’s assessment, Hegseth communicated detailed information about aircraft launch schedules, drone positioning and strike timing through Signal, a platform not approved for classified or sensitive operational communications. Although Signal is widely used for its encryption features, the Pentagon maintains strict requirements for the transmission of classified material, and the app is not among the tools authorized for real-time discussions of active military targeting or troop movement.
The investigation noted that some of the messages discussed the precise moment bombs would be released and included updates about the movements of F-18 fighter jets assigned to the mission. Officials reviewing the incident emphasized that this level of operational detail, if intercepted or exposed through unauthorized access or simple human error, could have compromised both the mission and the safety of the service members involved.
Concerns escalated earlier this year when it became known that a journalist had inadvertently been added to a Signal group that included senior national security officials. That group had also discussed sensitive planning details connected to military actions in Yemen. Hegseth later created an additional Signal group containing a mix of Defense Department personnel and individuals outside government service, including family members. Investigators determined that strike-related updates were shared there as well, further widening the circle of recipients and amplifying security concerns.
Hegseth’s position grants him broad authority over classification decisions, but the report underscores that such authority does not exempt officials from established communication protocols designed to safeguard national security. The inspector general found that the use of an unapproved platform disregarded departmental policy and failed to protect information that adversaries could exploit. The report also warned that such decisions could erode confidence in the Pentagon’s internal information-security practices at a time when cyber threats are increasingly sophisticated and adversarial surveillance capabilities continue to expand.
Lawmakers from both parties had previously requested a formal investigation after initial media reports exposed the existence of the Signal chats. The inspector general’s findings have now renewed calls for accountability and for clearer standards governing communication technologies used at the highest levels of government. Several elected officials have cautioned that ignoring established protocols risks creating a precedent in which convenience overshadows security, potentially placing U.S. forces in harm’s way.
A redacted version of the watchdog’s report is expected to be released publicly in the coming weeks. Its findings are likely to fuel continued debate over how senior officials manage electronic communications during national security events and whether the existing rules governing classified information require modernization. For now, the report serves as a reminder that even well-intentioned decisions inside the chain of command can carry far-reaching consequences when they intersect with matters of operational secrecy and military safety.

