A seemingly harmless slip-up within a private Signal group chat has triggered one of the most embarrassing national security breaches in recent U.S. history. Senior officials in the Trump administration, including Defense Secretary Pete Hegseth and Vice President JD Vance, reportedly added The Atlantic journalist Jeffrey Goldberg to a confidential Signal thread—unintentionally granting him access to sensitive military plans concerning Yemen.
The group, titled “Houthi PC small group,” was intended to coordinate messaging and planning around U.S. military operations targeting Houthi forces in Yemen. According to Goldberg, who revealed the incident in an article published by The Atlantic, he remained a passive observer in the chat for nearly an hour. During that time, he viewed messages detailing the timing, weaponry, and target specifics for airstrikes that had not yet been executed.
The revelation has sparked bipartisan concern in Washington, with lawmakers on both sides of the aisle calling for a thorough investigation into the apparent mishandling of classified information.
Officials Scramble to Contain the Fallout
In response to mounting criticism, Defense Secretary Hegseth has downplayed the incident, telling The New York Post, “Nobody was texting war plans.” He accused Goldberg of being “deceitful and highly discredited,” a statement that has only fueled further scrutiny.
Despite Hegseth’s denial, multiple sources, including the National Security Council, have confirmed that the messages were authentic and that a review is now underway. According to a report from Reuters, the administration is examining how Goldberg was added to the thread and why sensitive operational details were being shared over an app not authorized for classified communications.
Adding to the controversy, the use of Signal—a popular encrypted messaging platform—raises questions about protocol and legal compliance. While Signal is secure, it is not certified for handling classified information under federal guidelines. The U.S. government typically relies on specialized communication systems for such matters, making the breach a clear deviation from standard procedures.