Hegseth's Signal Intel on Yemen Strikes Traced to Central Command
Information shared by Pete Hegseth on Signal regarding U.S. strikes in Yemen originated from Central Command, sources familiar with the matter revealed. The details, initially shared in group chats by the defense secretary, have raised concerns about information security. Investigations are underway to determine how the sensitive data was leaked and to prevent future breaches. The incident highlights the potential risks associated with using messaging apps for official communication.
Details about U.S. military strikes in Yemen, which Fox News host Pete Hegseth shared on the Signal messaging app, can be traced back to Central Command, according to two individuals with direct knowledge of the conversations. The information, initially disseminated by the defense secretary within two separate group chats, quickly made its way outside of official channels.
The leak has sparked internal reviews focusing on information security protocols within the Department of Defense. Officials are attempting to pinpoint the exact source of the leak and assess the potential damage caused by the unauthorized disclosure of sensitive military information. Concerns have been raised about the use of unsecured messaging platforms for official communication, particularly when discussing ongoing military operations. This incident underscores the importance of adhering to strict security measures to protect classified information and maintain operational integrity. The investigation is ongoing, and further details are expected to emerge as the review progresses.
The leak has sparked internal reviews focusing on information security protocols within the Department of Defense. Officials are attempting to pinpoint the exact source of the leak and assess the potential damage caused by the unauthorized disclosure of sensitive military information. Concerns have been raised about the use of unsecured messaging platforms for official communication, particularly when discussing ongoing military operations. This incident underscores the importance of adhering to strict security measures to protect classified information and maintain operational integrity. The investigation is ongoing, and further details are expected to emerge as the review progresses.