Hegseth allegedly used a commercial internet line to access the Signal app, raising security concerns
Defence Secretary Pete Hegseth is at the centre of a security controversy following reports that he used a personal computer in his Pentagon office to access the Signal app, connected to the internet via an unsecured “dirty line.” This incident raises serious concerns about a potential Pete Hegseth Signal Leak, as the use of this unprotected connection could expose sensitive information.
A “dirty line” is a commercial internet connection that bypasses the Pentagon’s secure unclassified (NIPR) and classified (SIPR) networks. These lines lack the robust firewall protections found on government systems, making them more susceptible to being monitored, especially if sensitive communications occur.
According to two sources close to the matter, Hegseth specifically requested the installation of this unsecured internet line to use the Signal app, which is often used for encrypted communication. Signal is known for its privacy features, but its use on a commercial line without proper security measures has raised alarm among defence officials.
The existence of the “dirty line” and Hegseth’s use of Signal on it could potentially compromise sensitive communications, critics argue. The connection, while providing access to apps like Signal, opens up the possibility of monitoring and interception of information, posing a risk to national security.
Despite these concerns, a Pentagon spokesperson responded by saying that the use of communication systems by the Defence Secretary is classified. They also reiterated that Hegseth has “never used and does not currently use Signal on his government computer,” distancing him from any direct misuse of government equipment.
This issue gained attention after Hegseth was linked to sharing information about military operations, including alleged airstrike plans against Houthi militants in Yemen, via Signal. On Tuesday, he strongly denied that any classified war plans were leaked and insisted that the information shared over the app was unclassified and intended for informal coordination with close personal contacts, including his wife, brother, and personal attorney.
“I look at war plans every single day. What was shared over Signal then and now, however you characterise it, was informal unclassified coordination,” Hegseth defended during an interview on “Fox & Friends.” He added that the shared details were related to media coordination and other non-sensitive matters, rather than classified military strategy.
However, the presence of family members and personal associates in the Signal group chat, including Hegseth’s wife, raised questions about the appropriateness of sharing any government-related information with non-official parties. These discussions were not conducted through secure government channels, further complicating the narrative of what transpired.
In his interview, Hegseth dismissed the accusations and claimed that former staffers were responsible for leaking information, accusing them of attempting to sabotage the Trump administration’s agenda. He also alleged that they were leaking information to the media, but provided no clear evidence to support these claims.
Sources familiar with the Signal chat confirmed that Hegseth had set up the group during his Senate confirmation process, in what appears to be a more informal setting. The chat included family members and friends, none of whom were part of the government apparatus. It remains unclear why sensitive discussions related to military matters, even if unclassified, were shared in such a manner.
The controversy surrounding Hegseth’s actions adds another layer of scrutiny to his role within the Pentagon, especially after recent allegations about information leaks from his office. As the investigation into the matter continues, questions regarding the security protocols around the use of communication apps like Signal in sensitive government settings are likely to intensify.