Defense Secretary Pete Hegseth utilized an unsecured internet connection that circumvented the Pentagon’s security measures in his office to access the Signal messaging app on a personal computer, according to two sources familiar with the situation who spoke to The Associated Press.
This revelation about the unsecured connection highlights concerns that sensitive defense information may have been vulnerable to hacking or surveillance. Referred to as a ‘dirty’ internet line in the IT sector, it connects directly to the public internet, lacking the security filters and protocols that the Pentagon’s secure connections provide.
While other Pentagon offices have employed such lines, particularly to access information or websites that are typically restricted, the primary benefit is that the user remains anonymous, not appearing among the numerous IP addresses assigned to the Defense Department, as explained by a senior U.S. official knowledgeable about military network security.
However, this also increases the risk of exposure to hacking and surveillance. Furthermore, a ‘dirty’ line, similar to any public internet connection, may not comply with the recordkeeping requirements mandated by federal law, the official noted. All three sources requested anonymity to discuss this sensitive issue.
Hegseth never utilized Signal on his government computer
According to two individuals knowledgeable about the situation, Hegseth configured the Signal app in his office, which has become controversial after it was revealed that he shared sensitive information regarding a military airstrike in two group chats, each containing over a dozen participants.
One chat included his wife and brother, while the other involved top national security officials from President Donald Trump’s administration. When questioned about Hegseth’s use of Signal in his office, a chief Pentagon spokesperson, Sean Parnell, stated that the defense secretary’s communication methods are classified.
Parnell clarified, however, that the Secretary has never utilized Signal on his government computer. This incident adds to the ongoing scrutiny faced by the Pentagon, as Hegseth is under fire from both Democratic and Republican lawmakers regarding his management of sensitive data.
Additionally, he has either dismissed or reassigned several close advisors, further consolidating his inner circle amidst the recent upheaval following the dismissal of multiple senior military personnel.
Despite the controversies, Trump and other officials have expressed their unwavering support for Hegseth, attributing the leaks to disgruntled staff, with Trump labeling the reports as ‘fake news.’ Vice President JD Vance also voiced his complete confidence in Hegseth, affirming that the president and the entire team share this sentiment.
Pentagon secure communication methods
The Pentagon employs various secure communication methods for Hegseth and other military officials. The Non-classified Internet Protocol Router Network is designed for the lowest levels of sensitive information, allowing limited internet access while maintaining robust cybersecurity measures that a ‘dirty’ line lacks; however, it is not suitable for secret information.
The Secure Internet Protocol Router Network is designated for secret-level classified data. For top-secret and secret compartmentalized information, known as TS/SCI, the Joint Worldwide Intelligence Communications System is utilized.
Initially, Hegseth accessed Wi-Fi in the back area of his office for his devices, but later requested a dedicated line at his desk to use his personal computer.
At times, his desk was surrounded by three computers: one for personal use, another for classified data, and a third for sensitive defense information, as noted by both individuals.
Due to the risk of electronic surveillance, it is prohibited to have such devices within the defense secretary’s office. Key offices at the Pentagon are equipped with cabinets or drawers where staff and visitors must store their devices.
Concerns Regarding Signal Usage
Signal is a commercially available application that is not sanctioned for handling sensitive or classified information. Although it employs encryption, it remains vulnerable to hacking. While Signal provides greater security than conventional text messaging, it does not ensure complete safety.
Officials must also verify that their devices and connections are secure, according to Theresa Payton, who served as the White House chief information officer under President George W. Bush and is currently the CEO of Fortalice Solutions, a cybersecurity firm. The communications of high-ranking government officials are particularly attractive targets for adversaries such as Russia and China, Payton noted.
Earlier this year, the National Security Agency issued a warning regarding the potential for foreign hackers to attempt to exploit Signal to target government officials. Google has also cautioned users about the risks posed by Russia-aligned hackers targeting Signal users.
The Defense Department’s acting inspector general is investigating Hegseth’s use of Signal at the request of the bipartisan leadership of the Senate Armed Services Committee. Hegseth obtained information regarding the strike on Yemen’s Houthi militants last month from a secure communications channel utilized by U.S. Central Command.
He has strongly denied sharing ‘war plans’ or classified information. However, the details he shared in chats — including precise launch and bomb drop times — would have been classified and could have endangered service members, according to multiple current and former military and defense officials. The airstrike details were communicated before the pilots had launched or safely returned from their mission.
Discover more from Defence Talks | Defense News Hub, Military Updates, Security Insights
Subscribe to get the latest posts sent to your email.