Another Leak Rocks Pentagon: Pete Hegseth’s Signal App Usage Exposed — Spokesperson Fires Back

Mounting Attacks via Media Leaks Signal a Coordinated Effort to Undermine Trump’s Defense Secretary

Yet another day brings yet another anonymously sourced leak targeting Defense Secretary Pete Hegseth—this time alleging unauthorized use of the encrypted messaging app Signal on government computers inside the Pentagon. The latest barrage, published by the Washington Post and amplified by NBC News, continues a pattern of coordinated leaks seemingly designed to chip away at Hegseth’s credibility and derail his aggressive pro-America defense agenda.

What’s the Allegation This Time?

According to the Washington Post, Hegseth allegedly installed the Signal app on his Pentagon desktop—supposedly to get around the building’s notorious lack of cell phone reception and better coordinate with White House officials and Central Command.

The story claims:

  • The app was “cloned” from his personal phone.

  • A second Pentagon computer also had Signal installed.

  • The goal was faster communication on sensitive issues, especially concerning Iran-backed Houthi targets in Yemen.

The Post cites three unnamed sources and claims Hegseth’s chief of staff, Joe Kasper—who recently resigned amid the leak probe—was involved in this effort.

Official Response: Categorical Denial

Hegseth spokesman Sean Parnell swiftly pushed back, stating unequivocally:

“Secretary Hegseth has never used and does not currently use Signal on his government computer.”

This direct rebuttal aligns with Hegseth’s broader stance—that these leaks are part of a calculated smear campaign engineered by entrenched elements in the Pentagon bureaucracy and their media allies.

Backstory: A Targeted Campaign?

This isn’t the first leak—and likely won’t be the last.

The saga began when The Atlantic’s Jeffrey Goldberg bizarrely claimed he was “accidentally” added to a Signal chat between Trump-era officials discussing military operations. This, followed by internal leaks to the Wall Street Journal, NBC News, and now the Washington Post, suggests a slow-drip narrative coordinated to keep Hegseth’s team on defense.

Three aides have already been terminated, and more probes are reportedly underway.

Notably, information in the Signal chats reportedly originated from Army Gen. Michael Erik Kurilla of U.S. Central Command and was shared securely—raising questions about whether sharing summarized versions internally constitutes any violation at all, or whether this is political theater disguised as national security concern.

The Real Scandal: Selective Leaking & Weaponized Bureaucracy

The irony is glaring: the real national security breach may not be encrypted messages between trusted defense officials, but rather the constant, targeted leaking of sensitive information to partisan media outlets. This drip-feed campaign not only undermines public trust, but potentially compromises operational readiness.

On Fox & Friends earlier this week, Hegseth slammed the anonymous leakers, saying:

“This is the same media that peddled the Russia hoax. These are the same deep state games. We’re not backing down.”

Conclusion: A Power Struggle Disguised as Journalism

Make no mistake—this is about power. With a fiercely loyal Secretary of Defense pushing bold reforms and aligning closely with President Trump’s America First doctrine, the bureaucracy is fighting back. And they’re using their oldest weapon: anonymous leaks to friendly press.

Whether it’s Signal, cell service workarounds, or “cloned” apps, the substance is less important than the narrative being spun. And the real threat isn’t what’s on a secure chat—it’s who’s leaking it, and why.

Related posts

Eric Sparks Third Term Frenzy with Bold New Merch and “Never Say Never” Message

Radical Leftist Violence Explodes on Campus as TPUSA Students Targeted in Brutal Assaults

Vatican Power Struggle Erupts as Cardinal Convicted of Fraud Demands Role in Electing Next Pope