Bold claim: A new wave of scrutiny surrounds US defense secretary Pete Hegseth as a Pentagon watchdog warns he risked American troops by sharing information that could be intercepted by adversaries.
NBC News, citing the inspector general, reports that Mr. Hegseth also violated military rules by using a personal phone for official business. The leaked material came from a March group chat on Signal regarding an imminent strike on Houthi rebels in Yemen. Messages allegedly posted by Hegseth include: “1415: Strike drones on target (THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP).” Another note reads: “We are currently clean on OPSEC,” signaling recognition of the information’s sensitivity.
For context, an Atlantic journalist was accidentally added to the group chat and later described how top‑secret plans were shared both in advance and in real time.
From the initial Signal-gate controversy to a later second strike in the Caribbean, Hegseth’s tenure has faced ongoing questions about judgment and leadership of the world’s largest military force. Critics have already dubbed some moves, including the second strike on the incapacitated vessel, as controversial and even a potential war crime in certain quarters.
The broader crisis pattern has raised fresh doubts about whether the defense secretary can safeguard troops while navigating high-stakes decisions. The Signal-gate saga prompted bipartisan calls for his resignation, though a separate political casualty emerged: Mike Waltz, Trump’s national security adviser, who was also in the group, lost his position.
Subsequent reporting revealed that Hegseth had formed a second Signal group that included his spouse, sibling, and personal attorney, sharing many of the same details. The communications were derived from an email marked SECRET/NOFORN, indicating it should not be shared with foreign nationals.
Hegseth, who has rebranded his office as The Department of War, declined to be interviewed by investigators probing Signal-gate. In a written statement, he asserted that only information he believed would not jeopardize the mission or troops was shared. The evolving narrative raises critical questions: Is the proper balance between security and transparency being maintained at the highest levels of defense, and how should whistle-blower safeguards and accountability be applied when sensitive data is exposed? Would this kind of disclosure be treated differently under alternative leadership?