The Pentagon’s latest report makes one thing clear: Signal protects conversations, but it was never designed to safeguard U.S. war plans — and using it that way carried real risk for American forces. This is a deeper look at the app at the center of the Pentagon’s “Signalgate” investigation and what the watchdog says went wrong.
What Signal Actually Does
Signal is one of the world’s most widely used encrypted messaging apps, favored by journalists, activists, aid workers, and privacy-conscious users. Its features include:
- End-to-end encryption for calls, messages, video, and attachments
- Minimal metadata retention, meaning Signal does not store message content on its servers
- Open-source cryptography, allowing independent auditing
- A nonprofit business model, without ads or data harvesting
For civilians, it’s a strong privacy tool. Organizations such as the Freedom of the Press Foundation and Mozilla’s “Privacy Not Included” program consistently rate Signal as one of the most secure communication apps available to the general public.
But that does not make Signal a military-grade communications system, and the gap between what Signal is built for and what the Pentagon requires is what fueled the controversy around Defense Secretary Pete Hegseth’s use of the app.
What Signal Is Not Designed For: Military OPSEC
The core misunderstanding in the public conversation is assuming “encrypted” equals “authorized for mission planning.” DoD communications rules say otherwise.
Signal’s leadership has been explicit that the app is not meant for classified operations.
In a 2023 interview with Wired, Signal CEO Meredith Whittaker made this point directly:
“Signal is designed as a privacy tool for the public. It’s not a specialized platform for classified or government use.”
That distinction matters. Signal was engineered to protect civilian conversations from corporate and criminal surveillance, not to meet the Pentagon’s layered requirements for operational security, classified transmission, or records retention.
Official DoD rules reinforce this gap
Several binding regulations apply:
- DoDI 8100.04 (DoD Unified Capabilities): Requires that only DoD-approved, DoD-managed communication systems be used to transmit DoD information. Commercial apps like Signal are not approved systems.
- DoDI 5200.48 (Controlled Unclassified Information): Prohibits transmitting CUI, which includes non-public operational details, on unapproved systems.
- DoD CIO mobile-application guidance: Warns that commercial apps “may result in unauthorized disclosure of CUI or non-public DoD information,” even if encrypted.
- Federal Records Act: Requires official communications to be preserved. Signal’s auto-deletion features prevent compliant record retention unless the user manually captures messages.
In plain language: Using a personal phone and a commercial app, even an encrypted one, violates the communication requirements for sensitive military operations. This is the policy basis behind the inspector general’s findings.
How “Signalgate” Started
The controversy dates back to March 2025, when top Trump administration national security officials coordinated aspects of U.S. strikes on Houthi forces in Yemen through a Signal group chat.
According to publicly released screenshots and reporting referenced by the inspector general:
- The group included senior officials and, by mistake, a journalist who was added to the chat.
- The conversation contained specific operational details: aircraft numbers, strike timing, and other sensitive information.
- A full transcript was later published publicly, providing foreign observers insight into real-time U.S. war planning.
Military.com previously reported that defense officials privately described the practice as reckless, and that lower-ranking troops would face severe punishment for handling operational information this way.
These warning signs would later be validated by the Pentagon watchdog.
What the New Watchdog Report Concludes
The Department of Defense inspector general released its final report on December 3, 2025. It confirms that:
1. Hegseth transmitted non-public operational information on his personal phone using Signal.
The information originated from a classified “SECRET/NOFORN” communication distributed by U.S. Central Command. Hegseth then shared portions of it in a personal group chat.
2. Signal was not an authorized system for this material.
The IG cites DoD communication policy and mobile-device rules that prohibit sharing non-public operational details via non-DoD systems.
3. His actions “created a risk to U.S. personnel and missions.”
Unauthorized transmission of timing and force-package details could have compromised the mission or endangered pilots.
4. Required records were not preserved.
Because the chats were off DoD systems and some messages were auto-deleted, investigators could not obtain a complete record.
5. Hegseth declined to provide his personal device.
Investigators relied heavily on public transcripts and screenshots.
Why Signal Is Secure, But Still Wrong for Military Ops
It’s important to separate the two truths:
Truth #1: Signal is extremely secure for civilian use.
It uses trusted encryption, retains very little user information, and is commonly chosen by people who need a reliable private-messaging tool.
Truth #2: Military OPSEC requires more than encryption.
It requires:
- Controlled servers
- DoD managed networks
- Auditing and retention
- Classified channels
- Device-level protection
- Chain-of-custody guarantees
Signal offers none of those by design and isn’t supposed to.
The IG’s findings underscore this: The problem was not Signal as a tool, but the decision to use a personal, commercial messaging app for DoD operational communication.
Why This Matters for Service Members and Families
This case reinforces rules that every service member already lives under:
- If information is operational or sensitive, it cannot be sent on personal devices or commercial apps.
- “Encrypted” does not mean “authorized.”
- Personal phones remain a major vulnerability exploited by adversaries.
- Troops have been punished for far less severe mishandling of information.
While the IG did not recommend disciplinary action for Hegseth, the report sends a clear institutional message: OPSEC rules apply at the top of the chain as much as they do at the bottom.
Sources
- Associated Press
- Defense News
- Reuters
- Breaking Defense
- Axios