Signal Group Chat Leaks: U.S. Secretary of Defense Lays Out Sensitive Details of Planned Airstrikes

Published on: March 26, 2025 at 9:48 PM
An F/A-18E Super Hornet, attached to Strike Fighter Squadron (VFA) 143, launches from the flight deck of the Nimitz-class aircraft carrier USS Harry S. Truman (CVN 75) during flight operations in the U.S. Central Command area of responsibility. (Official U.S. Navy photo). Inset: Part of the Signal group chat, as seen in screenshots by Jeffrey Goldberg. (Image credit: The Atlantic)

Aircraft and weapon types, launch times, and the estimated strike windows were all included in the latest screenshots released by Jeffrey Goldberg of The Atlantic, who was inadvertently added to a group chat of government officials.

In a follow up article to the initial bombshell report about The Atlantic editor-in-chief Jeffrey Goldberg’s inclusion in a group chat of top U.S. officials, we can now see specifically how the planned operation was described by U.S. Secretary of Defense Pete Hegseth.

Hegseth writes:

“TIME NOW (1144et): Weather is FAVORABLE. Just CONFIRMED w/CENTCOM we are a GO for mission launch.”

“1215et: F-18s LAUNCH (1st strike package)”

These F/A-18s (Hegseth used the designation F-18, which is not used officially) would have launched from the USS Harry S. Truman (CVN 75). Alongside these F/A-18s, which may have been a mix of single seat F/A-18E and twin seat F/A-18F Super Hornets, it is almost certain the carrier would have launched E-2D Hawkeye and EA-18G Growler aircraft to support the strike package.

The Hawkeye would provide military and political commanders with a better picture of the battlespace as the operation unfolded, while also directing the strike package itself and increasing their situational awareness. With the AN/APS-145 radar of the Hawkeye active and scanning the airspace, there would be less need for the Super Hornets themselves to utilize their own radars and give away their positions.

EA-18G Growlers would monitor hostile radar emissions and, if necessary, neutralize any threat using electronic countermeasures or anti-radiation missiles. Land-based aircraft from U.S. bases across the Middle East would also have been available for support operations. As we detailed in reporting on Operation Neptune Spear, there are many layers involved in these military operations beyond the primary package itself.

“1345: ‘Trigger Based’ F-18 1st Strike Window Starts (Target Terrorist is @ his Known Location so SHOULD BE ON TIME – also, Strike Drones Launch (MQ-9s)”

‘Trigger based’ means this timing is subject to certain conditions being met. Most likely, given the section about the target’s present location, part of the trigger was the confirmation that the intended targeted individual was at the location they planned to strike. This means we know this specific strike package was targeted at an individual person and not equipment or operation locations.

Confirmation on the target’s location would require some degree of ongoing intelligence, surveillance, and reconnaissance (ISR) capability over the target. One of the most common platforms to use for persistent ISR in uncontested airspace is the MQ-9 Reaper, later mentioned as ‘strike drones’. An unarmed or lightly armed Reaper (allowing greater endurance) may have been providing ISR over the target prior to more heavily armed aircraft being launched.

A U.S. Air Force MQ-9 Reaper remotely piloted aircraft equipped with external fuel tanks and armed with munitions sits in a hanger prior to Intelligence, Surveillance, and Reconnaissance operations at Ali Al Salem Air Base, Kuwait, July 23, 2019. (U.S. Air Force Photo by Tech. Sgt. Michael Mason)

It is also possible that more advanced ISR capabilities, be they aircraft-based or space-based, might have been used. Operations of stealthy unmanned aerial vehicles (UAVs) like the RQ-170 Sentinel or the unacknowledged ‘RQ-180’ are not discussed in the public realm, but based on previous leaks and also on prior U.S. operational practice we can assume these advanced capabilities are available in the region.

Whether these would be used in a lower threat airspace environment like Yemen, rather than for ISR missions against nation state level opponents, is unclear. However, as multiple MQ-9 Reapers have been shot down by Houthi forces they may have been deployed as a more survivable option.

Alternatively, the source of intelligence may have been via human intelligence, or HUMINT, through a source on the ground inside Yemen.

“1410: More F-18s LAUNCH (2nd strike package)

1415: Strike Drones on Target (THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP, pending earlier ‘Trigger Based’ targets)”

More F/A-18 Super Hornets now launch from the Truman. Armed MQ-9 Reapers reach their target points. The Reapers’ mission has no trigger requirements, so Hegseth clarifies that 1415 would be the first definite time for weapon launch. This is providing that the F/A-18s launched earlier had not already released their weapons.

Interestingly, this timeframe provides only 30 minutes for the MQ-9 Reapers assigned to carry out airstrikes to arrive on target after launch. While the aircraft are based nearby, including in Djibouti, the transit speed of an MQ-9 is not particularly fast. This may mean there is an MQ-9 operating location even closer to Yemen.

“1536 F-18 2nd Strike Starts – also, first sea-based Tomahawks launched.
MORE TO FOLLOW (per timeline)”

Truman’s second wave of aircraft will now begin striking their assigned targets while U.S. Navy vessels launch BGM-109 Tomahawk cruise missiles. Footage from the USS Gettysburg (CG 64), a Ticonderoga class guided missile cruiser, was released showing these missiles launching from the ship’s Mark 41 vertical launch system (VLS) silos. Other ships, such as the Arleigh Burke class destroyers that make up the bulk of the Truman’s escort may also have fired their missiles.

Current U.S. Navy VLS loadouts in this region will be a delicately weighted balance of offensive and defensive capabilities. In Tomahawk strikes during previous conflicts, we have seen ships launching salvos up to 30 missiles or perhaps more. Now, with the very real threat of attack by cruise and ballistic missiles, as well as attack drones, a greater requirement for anti-air missiles is clear.

“We are currently clean on OPSEC”

This reference to OPSEC, or operational security, is likely clarifying that the details of the mission has not been compromised in a way that would prohibit it from taking place. Obviously, at this point, the U.S. officials in the group chat were unaware of the presence of a civilian journalist.

Part of the Signal group chat, as seen in screenshots by Jeffrey Goldberg. (Image credit: The Atlantic)

National Security Adviser Michael Waltz, a former special forces officer in the U.S. Army, then provided an update on the results of a portion of the strikes. He claimed they had a “positive ID” on their target walking into a building, and that the building had now “collapsed” as a result of the attack. In rough terms, providing the group chat with a battle damage assessment, or BDA.

Celebratory messages then arrived from U.S. Vice President JD Vance, Secretary of State Marco Rubio, White House Chief of Staff Susie Wiles, and others.

Unprecedented Leak

We have never before seen such recent direct communications between U.S. government officials regarding ongoing military operations, and perhaps we never will again. One reason why this is the case is that usually this information would be confined to a Sensitive Compartmentalized Information Facility or SCIF. These are secure spaces where classified materials can be handled and discussed. They may be a room inside a building, or even an entire building itself.

Personal devices, such as phones, tablets, laptops, are not permitted inside a SCIF. This means, in theory, there should be a permanent and physical air gap between any sensitive information and these devices.

It is clear to see why, therefore, much furore has erupted over the use of an app-based messaging service to discuss these plans. We do not know exactly what level of classification applied to this information in practice, but online commentary suggests it would likely warrant a SECRET or TOP SECRET marking.

Signal is a messaging service with tens of millions of monthly users. While it was already known that the app is used extensively by politicians and those who work with them, in this use it should primarily be used for non-sensitive communications.

The AES-256 encryption used to provide end to end encryption for the messaging service is sufficient for the transmission of TOP SECRET level information, according to the U.S. government, but this does not protect information from hacking attacks against a user’s device itself. Should one individual’s device be compromised, whoever has compromised the phone can in theory access their messages and any of the group chats they are in.

Top level politicians and officials are, of course, prime targets for foreign intelligence agencies who spend large amounts of time and money devising ways to infiltrate these devices.

We do not know whether this is the first time Signal has been used for such communications, as the only reason this instance has become public knowledge is through the inclusion of Goldberg in the chat. Prior to this story, the U.S. Department of Defense (DoD) issued a warning to its staff that Russian intelligence agencies had been exploiting Signal’s linked device feature to compromise messages.

The initial reports were discussed before the Senate Intelligence Committee on Mar. 25. Calls for a full, independent investigation into the leaks have come from both Democrat and Republican politicians, as well as many in the fields of defense, security, and intelligence. Multiple members of Congress have additionally called for Hegseth and Waltz, the two members of the chat who posted the intricate details of the operation, to resign.

Share This Article
Follow:
Kai is an aviation enthusiast and freelance photographer and writer based in Cornwall, UK. They are a graduate of BA (Hons) Press & Editorial Photography at Falmouth University. Their photographic work has been featured by a number of nationally and internationally recognised organisations and news publications, and in 2022 they self-published a book focused on the history of Cornwall. They are passionate about all aspects of aviation, alongside military operations/history, international relations, politics, intelligence and space.
5 Comments