- Secretary Pete Hegseth used Signal app extensively for sensitive military discussions.
- His preference for Signal over secure Pentagon systems caused issues for aides.
- Sensitive info, including military ops, was shared on the app.
- Aides had to leave desks to access Signal due to poor Pentagon cellphone service.
- Hegseth allowed a top aide to post on his Signal account using his personal phone.
- Some officials switched to TeleMessage, but it’s now down due to a hack.
The Extent of Signal Usage
Secretary Pete Hegseth’s use of the Signal app for military discussions was far more widespread than earlier thought. According to a recent report, Hegseth relied heavily on the app for day-to-day operations, often ignoring the Pentagon’s secure communication systems. This practice not only raised eyebrows but also created challenges for his aides.
Signal is known for its encryption and privacy features, making it a popular choice for secure conversations. However, Hegseth’s over-reliance on the app caused significant disruption. His aides often had to step away from their desks just to find a spot in the Pentagon with decent cellphone service. This was necessary because the Pentagon’s building has spotty phone coverage, making it difficult to stay connected.
Who Was Involved?
Hegseth’s Signal chats included a wide range of individuals. Members of his security detail, personal office staff, and even public-affairs aides were part of these conversations. This extensive use of the app meant that many people had access to sensitive information, which has now become a major concern.
In one notable case, Hegseth instructed his aides via Signal to inform foreign governments about an ongoing military operation. The app was also used to discuss media appearances, foreign travel plans, and other unclassified but sensitive matters. This raises questions about the security of such information and whether it was appropriate to share it on a non-governmental platform.
Sharing Access to His Phone
The report also revealed that Hegseth gave his personal phone to one of his top aides, Marine Col. Ricky Buria, to manage his Signal account. This means that Buria was responsible for posting updates and messages on behalf of the Secretary. While this might have been convenient, it also increases the risk of sensitive information being mishandled or leaked.
The Switch to TeleMessage
In recent weeks, some national security officials from the Trump administration have started using TeleMessage, a modified version of Signal. TeleMessage is designed to keep records of conversations and comply with federal transparency laws. However, this service is now facing its own security issues. TeleMessage has reportedly been hacked, leading to a temporary shutdown of the platform.
This development adds another layer of complexity to the situation. If TeleMessage, which was supposed to be a more secure alternative, is vulnerable to hacking, it could have serious implications for the security of sensitive government communications.
What’s Next?
The revelations about Hegseth’s use of Signal and the subsequent switch to TeleMessage have raised serious concerns about communication security within the Pentagon. As the situation continues to unfold, one thing is clear: the way sensitive information is handled needs to be reexamined to prevent future leaks and ensure national security.
The use of non-governmental messaging apps for official business is a risky practice that could have far-reaching consequences. While apps like Signal and TeleMessage offer privacy and convenience, they may not be the best choice for handling sensitive military and government information. The Pentagon and other government agencies may need to revisit their communication policies to strike a balance between security and convenience.
In the meantime, the investigation into the TeleMessage hack and the broader “Signalgate” controversy is likely to continue making headlines. As more details emerge, it will be important to assess how these communication practices impact national security and what steps are being taken to address these vulnerabilities.
Stay tuned for further updates as this story continues to develop.