Type to search

INTERNATIONAL NEWS

U.S. Defense Secretary Accidentally Leaks Classified Operation Against Houthis

Share

A scandal has erupted within the Trump administration following the accidental leak of classified information regarding a military operation against the Houthis in Yemen. The incident occurred when the editor of The Atlantic magazine was inadvertently included in a closed group on the Signal messaging app, where sensitive details about the upcoming strike were discussed.

In the correspondence, Defense Secretary Pete Hegseth shared comprehensive information about the attack plan just hours before it was scheduled to take place, revealing critical aspects of the operation and raising serious concerns about security at the highest levels of government.

According to the details provided by Hegseth, the discussions identified specific targets for the strikes, including command centers, weapons depots, and drone production facilities used by the Houthis, who pose a threat to shipping in the Red Sea. The correspondence also outlined the forces involved, which included aircraft from the USS Harry S. Truman, U.S. Air Force fighter jets, and attack drones stationed in the region. It specified the types of weapons that would be deployed, ranging from guided bombs to cruise missiles, and provided a precise timetable for the attack, set for March 15, 2025, at 1:45 PM ET.

This classified information, meant for a limited audience, was inadvertently shared with a member of the media, jeopardizing not only the success of the operation but also the safety of American troops.

The leak represents a significant blow to the credibility of an administration that has positioned itself as a strong opponent of terrorism. President Trump, who announced the operation through his platform Truth Social, described it as a “decisive and powerful strike” aimed at restoring freedom of navigation. However, the Signal incident has exposed vulnerabilities in internal communications, undermining confidence in the White House’s security protocols.

Tags:

You Might also Like

%d bloggers like this: