In a shocking revelation, The Atlantic magazine has published the exact text messages exchanged by Defence Secretary Pete Hegseth in a high-level White House group chat. These messages provide crucial details about the US strike on Houthi forces in Yemen, including the specific military hardware used and the precise timings of the attacks. This disclosure comes just hours before the strikes commenced, raising questions about the potential risks of such sensitive information being made public.
On the previous day, Director of National Intelligence Tulsi Gabbard stated that none of the material shared in the Signal chat group was classified. After careful consideration, Jeffrey Goldberg, the Editor-in-Chief of The Atlantic, made the decision to release the messages. This allows the American public to evaluate whether the information, had it fallen into the wrong hands, could have jeopardized US forces and compromised the mission's success.
The publication of these messages comes just before several members of the chat group are scheduled to testify before lawmakers. Both Gabbard and CIA Director John Ratcliffe are set to appear at the US Capitol on Wednesday morning, participating in a hearing before the House Intelligence Committee at 10:00 EDT (14:00 GMT). Their previous appearance before the Senate Intelligence Committee was marked by intense questioning, particularly from Democratic members, regarding various global threats.
In another segment of the chat published by The Atlantic, an official identified as Joe Kent, the Director of the National Counter-Terrorism Center, commented on the timing of potential strikes on Yemen. He indicated that the strikes were not time-sensitive and assured that the same options would remain available later. Additionally, he mentioned that the Israeli forces were preparing for possible retaliation from the Houthis and requested replenishment of their supplies for any necessary operations.
In response to the article, White House Press Secretary Karoline Leavitt dismissed the claims in The Atlantic as “another hoax” authored by a known critic of former President Donald Trump. Leavitt's comments did not specify whom she was targeting, as the article was co-authored by Goldberg and Shane Harris, a noted expert on US intelligence agencies. Leavitt pointed out that the article itself conceded that the chat contents did not outline war plans, yet emphasized that the administration downplayed the significance of the shared messages.
In light of the White House's denial, Jeffrey Goldberg defended his decision to publish the chat messages, stating that the assertions made by Hegseth, Gabbard, Ratcliffe, and others led him to believe that the public deserves to see the texts for themselves. Goldberg emphasized the clear public interest in revealing the nature of the information shared among senior administration figures via non-secure communication channels, especially as they attempted to diminish the importance of the messages.
The events surrounding the group chat date back to March 15, when the US executed a series of air strikes against the Houthis in Yemen. Four days prior, on March 11, Goldberg received a connection request on the encrypted messaging app Signal from an account posing as National Security Adviser Michael Waltz. Signal is favored by journalists and government officials due to its secure communication capabilities, allowing for alias creation and disappearing messages.
Goldberg reported that he was added to a Signal chat titled Houthi PC small group two days later, which included several accounts that appeared to belong to cabinet members and national security officials. Prominent names in the chat included JD Vance (the vice-president), Pete Hegseth, and John Ratcliffe, among others. Goldberg observed discussions about military targets and timings, which were later confirmed when the US conducted air strikes that matched the chat's details.
This unfolding situation raises significant questions about the balance between national security and transparency, as well as the implications of sharing sensitive information in unsecured environments.