Pentagon Skips Probe on Hegseth’s Yemen Strike Plans Leak via Signal

ago 14 hours
Pentagon Skips Probe on Hegseth’s Yemen Strike Plans Leak via Signal

The Pentagon has opted against investigating the leak of sensitive military information linked to Defense Secretary Pete Hegseth. This decision raises questions about national security concerns stemming from Hegseth’s use of the messaging app Signal. Sources indicate that Hegseth never authorized an internal assessment, which is typically conducted after unauthorized disclosures of classified information.

Lack of Routine Investigation

Usually, a routine investigation would follow any unauthorized release of sensitive defense information. This process aims to assess potential damage to sources and methods or ongoing military operations. However, according to multiple sources, Hegseth did not initiate any assessment regarding the Signal disclosures.

Shift in Focus

After the details from the Signal messages were revealed, Hegseth redirected his efforts towards internally investigating suspected leakers from his own team. Reports suggest he even mentioned using polygraph tests on defense officials suspected of leaking information.

Recent Watchdog Report Findings

Days before the Pentagon’s decision to forgo an investigation, an internal watchdog report highlighted that Hegseth’s actions might have endangered American troops. The report pointed out that sensitive plans targeting Houthi rebels in Yemen were shared inappropriately. Despite significant implications, the Pentagon did not conduct a damage assessment despite expectations from various officials.

  • Hegseth’s use of Signal raised concerns regarding operational security.
  • Information disclosed matched classified documents previously marked sensitive.
  • No findings of improper handling of classified material led to the refusal of an investigation.

Implications of the Incident

Hegseth contends he was “totally exonerated” by the watchdog report, despite its limited scope and lack of cooperation from him. Various experts suggest that a damage assessment should have been conducted, focusing on risks associated with the breach rather than personal culpability.

Standard Protocols for Damage Assessments

Typically, such assessments are based on:

  • The extent of classified information leaked.
  • The intelligence value to adversaries.
  • Potential systemic vulnerabilities revealed by the incident.

In this case, the Pentagon did not reach out to intelligence agencies like the FBI for additional evaluations of the potential risks. This unusual lack of action follows previous norms where other administrations would have scrutinized such breaches thoroughly.

Consequences for Hegseth and the Pentagon

Hegseth has broad authority to declassify information but reportedly did not follow the necessary protocols in this instance. While he claims to have declassified sensitive information, no formal documentation supports this assertion.

In the wake of this incident, experts argue that the failure to conduct a damage assessment could affect future military operations. This situation serves as a reminder that unauthorized disclosures of sensitive information can have far-reaching consequences on national security.