Skip to content
View in the app

A better way to browse. Learn more.

Thailand News and Discussion Forum | ASEANNOW

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

Pete Hegseth, Mike Waltz, Tulsi Gabbard: Private Data and Passwords Found Online

Featured Replies

  • Popular Post

https://www.spiegel.de/international/world/pete-hegseth-mike-waltz-tulsi-gabbard-private-data-and-passwords-of-senior-u-s-security-officials-found-online-a-14221f90-e5c2-48e5-bc63-10b705521fb7

 

Private contact details of the most important security advisers to U.S. President Donald Trump can be found on the internet. DER SPIEGEL reporters were able to find mobile phone numbers, email addresses and even some passwords belonging to the top officials.

 

To do so, the reporters used commercial people search engines along with hacked customer data that has been published on the web. Those affected by the leaks include National Security Adviser Mike Waltz, Director of National Intelligence Tulsi Gabbard and Secretary of Defense Pete Hegseth.

 

Most of these numbers and email addresses are apparently still in use, with some of them linked to profiles on social media platforms like Instagram and LinkedIn. They were used to create Dropbox accounts and profiles in apps that track running data. There are also WhatsApp profiles for the respective phone numbers and even Signal accounts in some cases.

 

As such, the reporting has revealed an additional grave, previously unknown security breach at the highest levels in Washington. Hostile intelligence services could use this publicly available data to hack the communications of those affected by installing spyware on their devices. It is thus conceivable that foreign agents were privy to the Signal chat group in which Gabbard, Waltz and Hegseth discussed a military strike.

 

Numbers Linked to Signal Accounts

 

It remains unclear, however, whether this extremely problematic chat was conducted using Signal accounts linked to the private telephone numbers of the officials involved. Tulsi Gabbard has declined to comment. DER SPIEGEL reporting has demonstrated, though, that privately used and publicly accessible telephone numbers belonging to her and Waltz are, in fact, linked to Signal accounts.

 

The U.S. newsmagazine The Atlantic revealed on Monday that Gabbard, Waltz and Hegseth, along with CIA Director John Ratcliffe and additional officials, discussed an imminent military strike against the Houthi militia in Yemen in a Signal chat. The information shared among the participants included intelligence information and precise attack plans. According to the Atlantic, Waltz added the editor-in-chief of the magazine, Jeffrey Goldberg, to the chat group. Precisely why he did so remains unclear.

 

The White House confirmed the scandal after the fact. Trump insisted that it did not include classified content, a question that is of particular relevance since members of the U.S. government are not permitted to share such information over Signal. The U.S. special envoy for Ukraine and the Middle East, Steve Witkoff, was even in Russia while participating in the chat group.

 

DER SPIEGEL was able to find some of the contact information for Gabbard, Hegseth and Waltz in commercial databases, while other information was in so-called password leaks, which are hardly a rarity on the internet. One example is the 2019 discovery by Troy Hunt, who found 773 million email addresses and more than 21 million passwords in a hacker forum.

 

Since then, there have been numerous additional leaks. Criminals are constantly compiling new collections from hacks, usually to sell them on forums.

 

It was particularly easy for DER SPIEGEL reporters to discover Hegseth’s mobile number and email address. They turned to a commercial provider of contact information that is primarily used by companies for sales, marketing and recruitment.

 

DER SPIEGEL sent the provider a link to Hegseth’s LinkedIn profile and received a Gmail address and a mobile phone number in return, in addition to other information. A search of leaked user data revealed that the email address and, in some cases, even the password associated with it, could be found in over 20 publicly accessible leaks. Using publicly available information, it was possible to verify that the email address was used just a few days ago.

 

The mobile number provided, meanwhile, led to a WhatsApp account that Hegseth apparently only recently deleted. The profile photo showed a shirtless Hegseth in a baseball cap and necklace. Comparisons with other photos of the U.S. secretary of defense using facial recognition software were able to confirm that the photo on the WhatsApp profile was indeed Hegseth.

 

Several Passwords in Leaked Database

 

Waltz’s mobile number and email address could be found using the same service provider. The mobile phone number could even be found using a people search engine popular in the U.S. DER SPIEGEL reporters were also able to find several passwords for Waltz’s email address in leaked databases. The information also led to Waltz’s profiles for Microsoft Teams, LinkedIn, WhatsApp and Signal.

 

National Intelligence Director Gabbard was seemingly more careful with her data than her two male colleagues. She apparently had her own data blocked in the commercial contact search engines that contained the data of Hegseth and Waltz. But her email address was to be found on WikiLeaks and Reddit.

 

Gabbard’s email address is available in more than 10 leaks. One of those also contains a partial telephone number, which, when completed, leads to an active WhatsApp account and a Signal profile.

 

"Exposed data from top politicians can be used by hackers to launch convincing phishing attacks and gain access to devices and various services such as email, chat tools and PayPal,” says Donald Ortmann, a specialist in information security, information procurement and social engineering. He supports companies and authorities following cyberattacks.

 

"In addition, deepfake attacks using images and sound available online can be launched to participate in virtual meetings,” says Ortmann. Compromised accounts also enable hackers to "install malware, monitor communications and attempt political blackmail.”

 

Two Check Marks

 

To protect the private contact information of the U.S. politicians, DER SPIEGEL is not publishing the telephone numbers, email addresses and passwords it found. Furthermore, no tests were performed to determine if the passwords for the email addresses are still active. DER SPIEGEL informed Gabbard, Hegseth and Waltz of its findings.

 

The U.S. Defense Department did not respond to a request for comment. A spokesperson for the National Security Council indicated that the passwords and accounts of Michael Waltz, the national security adviser, had been changed before he joined Congress in 2019.

 

Personal inquiries sent by DER SPIEGEL to the leaked WhatsApp and Signal accounts belonging to Waltz were delivered, according to the confirmation function. His WhatsApp profile photo showed Waltz with two other people in front of a U.S. flag. Shortly after the inquiries were sent, Waltz’s accounts were apparently deactivated; the WhatsApp chat with DER SPIEGEL disappeared.

 

The office of the national intelligence director stated that Tulsi Gabbard’s private data was leaked almost 10 years ago, that she hadn’t used the relevant platforms for several years and that she had changed her passwords several times.

 

DER SPIEGEL reporting, however, found that the private Google account belonging to Gabbard was used as recently as around two weeks ago. Messages sent by DER SPIEGEL to her leaked WhatsApp and Signal accounts were also apparently delivered. Two check marks appeared after they were sent.

  • Replies 116
  • Views 4.3k
  • Created
  • Last Reply

Top Posters In This Topic

Most Popular Posts

  • Tulski Gabbardnik cannot stop lying.  

  • It is believed that he was also drunk when he was sending out all those attack plan texts over Signal. He is surely the biggest existential threat now to US National security. 

  • They'd know that an attack was coming. They'd know when the attack was coming. They'd know what weapons were going to be used.   Please stop making a fool of yourself. It's embarra

Posted Images

  • Popular Post
11 minutes ago, RSD1 said:

The office of the national intelligence director stated that Tulsi Gabbard’s private data was leaked almost 10 years ago, that she hadn’t used the relevant platforms for several years and that she had changed her passwords several times.

 

DER SPIEGEL reporting, however, found that the private Google account belonging to Gabbard was used as recently as around two weeks ago. Messages sent by DER SPIEGEL to her leaked WhatsApp and Signal accounts were also apparently delivered. Two check marks appeared after they were sent.

Tulski Gabbardnik cannot stop lying.

 

  • Author
  • Popular Post
7 minutes ago, bamnutsak said:

Senator Tammy Duckworth roasted Pete "Happy Hour" Hegseth by calling hiim an effing liar.

 

https://thehill.com/homenews/senate/5215911-duckworth-pete-hegseth-is-a-f-ing-liar/

 

 


It is believed that he was also drunk when he was sending out all those attack plan texts over Signal. He is surely the biggest existential threat now to US National security. 

  • Popular Post

This statement will haunt hegseth...when he's not drunk.

 

 

 

Gm98jjWWsAAPn4z.png

  • Popular Post

I don't suppose Moscow has all these leaks and listens in to these open discussions? Nah.

  • Popular Post

When you appointment unqualified political hacks to these critical positions this is what you get.

  • Popular Post

It's becoming increasingly apparent just how incredibly sloppy and hugely ignorant this sorry administration is. Generally when you hire from the bottom of the barrel this is the kind of result you get.

 

Will somebody please share the contact information of these officials many of us would like to give them a piece of our mind. Especially Hegseth. He was the worst appointment for his position, in history. He should have stuck with his lower level Fox News position. 

  • Popular Post

What were the passwords  ...12345

Only the best will be given positions ... what a bunch of clowns 🤡

 

regards worgeordie

  • Popular Post

The whole lot of them are in over their heads ( cabinet ), 😄 only 60 days in....let's see if things tighten up, I would imagine if capable of doing so, US military personal won't be compromised in the future......  

  • Popular Post
31 minutes ago, Real Name Hidden said:

When you appointment unqualified political hacks to these critical positions this is what you get.

This is what you get when you have the CIA,FBI,NSA , MOSSAD

and god knows who else working against you!

  • Popular Post
3 minutes ago, johng said:

This is what you get when you have the CIA,FBI,NSA , MOSSAD

and god knows who else working against you!

 

And away we go, it's always someone else's fault.

The FBI, CIA, NSA and Mossad had nothing to do with the call. Nor did they tell the participants to use a nonsecure  unauthorized means of communication. There were secure government channel options.

And why are you even  bringing mossad into this? Why would Israel want anything to happen to its  strongest ally? Without Trump, Netanyahu is finished.

  • Popular Post
1 hour ago, bamnutsak said:

Senator Tammy Duckworth roasted Pete "Happy Hour" Hegseth by calling hiim an effing liar.

 

https://thehill.com/homenews/senate/5215911-duckworth-pete-hegseth-is-a-f-ing-liar/

 

 

Pete "Happy Hour" Hegseth.😄 I like that but prefer Pete "OPSEC" Hegseth as he's drunk some of the time but a muppet all of the time.

 

PS. Tammy for prez!

  • Popular Post
6 minutes ago, Patong2021 said:

Why would Israel want anything to happen to its  strongest ally

Lets wait and see  but in the meantime are you familiar with the USS Liberty "incident" ?

 

1 hour ago, RSD1 said:


It is believed that he was also drunk when he was sending out all those attack plan texts over Signal. He is surely the biggest existential threat now to US National security. 

Wow! Love to see you back this one up. Drunk? Like the see the proof of this. As for attack plans/battle plans/war plans call them what you like can you share those leaks please. Love to see them. Battle plans are very detailed. As of yet I have seen nothing resembling a battle plan.

  • Popular Post
1 minute ago, johng said:

Lets wait and see  but in the meantime are you familiar with the USS Liberty "incident" ?

 

That was the lizard people!

1 hour ago, Purdey said:

I don't suppose Moscow has all these leaks and listens in to these open discussions? Nah.

No Telegram no problem, no WeChat no problem.

They don't have TikTok?

:biggrin:

  • Popular Post
2 minutes ago, dinsdale said:

Wow! Love to see you back this one up. Drunk? Like the see the proof of this. As for attack plans/battle plans/war plans call them what you like can you share those leaks please. Love to see them. Battle plans are very detailed. As of yet I have seen nothing resembling a battle plan.

BS. Battle plans don't have to be detailed at all. "I'll smack you in the face 5 minutes from now" is a battle plan and Pete "OPSEC" Hegseth was way more detailed than that.

  • Popular Post
4 minutes ago, dinsdale said:

Wow! Love to see you back this one up. Drunk? Like the see the proof of this. As for attack plans/battle plans/war plans call them what you like can you share those leaks please. Love to see them. Battle plans are very detailed. As of yet I have seen nothing resembling a battle plan.

See no evil?  

 

Why would you want to see proof?  For any who even vaguely pays attention there has been piles and piles of proof often in his own words on tape of Trumps zillion lies and that after 9 years  was not enough to convince the cult he is a liar...one of the few true things he said is he could shoot someone in times square and not lose any (cult votes).

 

Attack plans?  surely you jest?  Do you have google or a tv?

 

If it walks like a duck and quacks like a duck it is likely a duck.

  • Popular Post
26 minutes ago, johng said:

This is what you get when you have the CIA,FBI,NSA , MOSSAD

and god knows who else working against you!

 

  Congratulations.  You win the internet today for the most ridiculous post.  Maybe ever.

 

  Yes, the CIA, FBI, NSA, and MOSSAD all forced these fools to post classified war plans to a journalist.

 

  Put down the bong, hightimes.  

  • Popular Post
1 hour ago, spidermike007 said:

Especially Hegseth. He was the worst appointment for his position, in history.

He isn’t the only one.

Fair to say most of them are including Trump himself.

 

They aren’t too bright the Americans.

Voted for the idiot once I could understand they made a mistake.

But then re-elected him. 
Dumb as rocks.

  • Popular Post
14 minutes ago, pomchop said:

If it walks like a duck and quacks like a duck it is likely a duck.

What do get when you cross Donald Trump with a duck? 

  • Popular Post

Although nobody expects any accountability, Trump and his fascist friends will gradually come to the realization that the American people aren't quite as stupid as they believe. Pretty much everyone in the US is either friendly with or related to a person who has served in some capacity within the US military, and if you randomly asked ANY of those people, they would tell you that 

all of those sycophants running those departments should be fired and charged with disclosing top secret information. 

The penalties for disclosing Top Secret information outside approved US government channels include fines of up to US$250K and ten years in prison, under section 798 of Title 18, the United States Code federal criminal code."
 
The Teflon Don is an expert at wiggling out of tricky situations, but I'm not convinced he and his moronic officials will get away with this one. 
All reactions:
44
 
 
  • Popular Post
2 hours ago, RSD1 said:

Hostile intelligence services could use this publicly available data to hack the communications of those affected by installing spyware on their devices. It is thus conceivable that foreign agents were privy to the Signal chat group in which Gabbard, Waltz and Hegseth discussed a military strike.

 

You can be assured that the word could is a bit misplaced in this context, and that hostile intelligence service HAVE used that data, and most likely have even more data than what Der Spiegel could find.

  • Author
  • Popular Post
55 minutes ago, dinsdale said:

Wow! Love to see you back this one up. Drunk? Like the see the proof of this. As for attack plans/battle plans/war plans call them what you like can you share those leaks please. Love to see them. Battle plans are very detailed. As of yet I have seen nothing resembling a battle plan.


Following is the information regarding the Signal group text messages published by The Atlantic. These messages, sent by Defense Secretary Pete Hegseth, contain specific operational details about U.S. military strikes against Houthi targets in Yemen. Below is a summary of the key messages attributed to Hegseth, based on the available sources, which outline the attack plans:

 

1. Message at 11:44 a.m. ET (March 15, 2025)

Text: “TEAM UPDATE: TIME NOW (1144et): Weather is FAVORABLE. Just CONFIRMED w/CENTCOM we are a GO for mission launch.”

 

Translation and Breakdown:

 

“TEAM UPDATE”: Indicates this is a status report intended for a group, likely including advisers or confidants Hegseth was briefing outside official channels.

“TIME NOW (1144et)”: Specifies the exact time of the update—11:44 a.m. Eastern Time—serving as a timestamp for operational synchronization.

“Weather is FAVORABLE”: Weather conditions (e.g., visibility, wind, cloud cover) are suitable for the planned air and missile strikes. Weather is critical for aviation and precision-guided munitions, suggesting conditions won’t delay the mission.

“Just CONFIRMED w/CENTCOM”: Hegseth has directly communicated with U.S. Central Command (CENTCOM), the military command overseeing operations in the Middle East, including Yemen. This implies he received real-time authorization or updates from the operational authority.

“we are a GO for mission launch”: The mission has been officially approved to proceed (“green light”). In military terms, “go/no-go” is a decision point; here, it’s a “go,” meaning all prerequisites (e.g., intelligence, logistics, weather) are met.

 

Definition in Context: This is the initial confirmation of the strike’s feasibility and authorization. It sets the stage for the detailed timeline that follows, showing Hegseth’s access to high-level decision-making and his intent to relay this to the group.

 

2. Timeline Message – 1345 (1:45 p.m. ET)

Text: “1345: ‘Trigger Based’ F-18 1st Strike Window Starts (Target Terrorist is @ his Known Location so SHOULD BE ON TIME – also, Strike Drones Launch (MQ-9s))”

 

Translation and Breakdown:

 

“1345”: The military uses a 24-hour clock; this is 1:45 p.m. ET, marking the start of the first operational phase.

“‘Trigger Based’”: Indicates the strike is contingent on a specific condition or event (the “trigger”), likely the confirmed presence of the target. This suggests flexibility—if the trigger isn’t met, the strike might shift.

“F-18 1st Strike Window Starts”: F/A-18 Hornet jets, carrier-based fighter-bombers, begin their attack window at this time. A “strike window” is the timeframe during which the aircraft can engage, based on fuel, positioning, and target availability.

“Target Terrorist is @ his Known Location”: The primary target, referred to as the “Target Terrorist,” is at a predetermined site, likely identified through intelligence (e.g., signals or human intel). This is a high-value individual, possibly a Houthi leader.

“so SHOULD BE ON TIME”: Hegseth expects the strike to proceed as scheduled, barring unforeseen changes (e.g., the target moving).

“also, Strike Drones Launch (MQ-9s)”: Simultaneously, MQ-9 Reaper drones—unmanned aircraft capable of precision strikes—launch. This indicates a layered attack, combining manned jets and drones for redundancy or multiple targets.

 

Definition in Context: This outlines the opening salvo of the attack, a coordinated strike using F-18 jets and MQ-9 drones, targeting a specific individual. The “trigger-based” nature suggests real-time intelligence is driving the timing, a common tactic in counterterrorism operations.

 

3. Timeline Message – 1410 (2:10 p.m. ET)

Text: “1410: More F-18s LAUNCH (2nd strike package)”

 

Translation and Breakdown:

 

“1410”: 2:10 p.m. ET, 25 minutes after the first strike window opens.

“More F-18s LAUNCH”: A second wave of F-18 jets takes off, likely from a carrier (e.g., in the Red Sea or Arabian Sea). “Launch” here means departure from the base or carrier, not necessarily striking yet.

“(2nd strike package)”: A “strike package” is a group of aircraft and munitions tailored for a specific mission segment. This implies a phased approach—different from the first wave, possibly targeting additional sites or providing backup.

 

Definition in Context: This escalates the operation with a second wave of manned aircraft, suggesting either a broader target set or reinforcement for the initial strike. It indicates sustained pressure rather than a single hit.

 

4. Timeline Message – 1415 (2:15 p.m. ET)

Text: “1415: Strike Drones on Target (THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP, pending earlier ‘Trigger Based’ targets)”

 

Translation and Breakdown:

 

“1415”: 2:15 p.m. ET, five minutes after the second F-18 launch.

“Strike Drones on Target”: The MQ-9 drones, launched at 1:45 p.m., reach their targets and are in position to strike. “On target” means they’re over the designated area, ready to engage.

“THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP”: Hegseth emphasizes this as the guaranteed start of kinetic action (bombing), contrasting it with the earlier “trigger-based” flexibility.

“pending earlier ‘Trigger Based’ targets”: If the trigger condition was met before 2:15 p.m., bombs might have dropped earlier; otherwise, this is the fixed start time.


Definition in Context: This marks the definitive onset of the attack, with drones delivering the first confirmed strikes. It resolves the uncertainty of the “trigger-based” window, ensuring the operation is underway by this point.

 

5. Timeline Message – 1536 (3:36 p.m. ET)

Text: “1536 F-18 2nd Strike Starts – also, first sea-based Tomahawks launched”

 

Translation and Breakdown:

 

“1536”: 3:36 p.m. ET, over an hour after the first bombs drop.

“F-18 2nd Strike Starts”: The second wave of F-18s, launched at 2:10 p.m., begins engaging targets. Transit time (about 86 minutes) suggests targets are within a few hundred miles of the launch point, consistent with Yemen from a naval carrier.

“also, first sea-based Tomahawks launched”: Tomahawk cruise missiles, fired from ships or submarines (e.g., destroyers in the Red Sea), are introduced. These are long-range, precision weapons often used against fixed targets like command centers or infrastructure.


Definition in Context: This phase escalates the attack with the second F-18 wave and introduces sea-based missiles, indicating a mix of tactical (F-18s, drones) and strategic (Tomahawks) strikes. It suggests a multi-pronged assault, possibly hitting both the “Target Terrorist” and Houthi facilities.

 

6. Additional Note

Text: “We are currently clean on OPSEC”

 

Translation and Breakdown:

 

“We are currently clean”: Hegseth believes there are no security breaches or leaks compromising the mission at that moment.

“on OPSEC”: Short for “operational security,” a military principle to protect sensitive information (e.g., plans, timing) from adversaries. Ironically, this is stated while sharing details in a chat that included a journalist.

 

Definition in Context: This reflects Hegseth’s confidence that the operation remains secure, despite his own actions undermining that security by sharing specifics in an unsecured forum.

 

Overall Interpretation as “War Plans” or “Attack Plans” - These messages collectively constitute a detailed operational timeline for a military strike, specifying:


Assets: F-18 jets, MQ-9 drones, and Tomahawk missiles—standard U.S. hardware for precision strikes.

 

Timing: A phased approach from 1:45 p.m. to 3:36 p.m. ET, with contingencies (“trigger-based”) and fixed points.

 

Target: A high-value individual (“Target Terrorist”) and likely additional Houthi infrastructure (implied by Tomahawks).

 

Coordination: Direct input from CENTCOM, showing Hegseth’s role as a conduit between military command and his group.

 

These details were published by The Atlantic on March 26, 2025, in an article titled “Here Are the Attack Plans That Trump’s Advisers Shared on Signal,” authored by Jeffrey Goldberg and Shane Harris. The publication followed denials from Hegseth and other Trump administration officials, who claimed no “war plans” or classified information were shared. The Atlantic released the messages to counter these assertions, arguing that the public interest justified disclosure, especially given the administration’s attempts to downplay the incident.

 

The messages provide a real-time breakdown of the strike timeline, including aircraft types (F-18 jets, MQ-9 drones), missile systems (Tomahawks), and the targeting of a specific individual referred to as the “Target Terrorist.”

  • Popular Post
1 minute ago, RSD1 said:


Following is the information regarding the Signal group text messages published by The Atlantic. These messages, sent by Defense Secretary Pete Hegseth, contain specific operational details about U.S. military strikes against Houthi targets in Yemen. Below is a summary of the key messages attributed to Hegseth, based on the available sources, which outline the attack plans:

 

1. Message at 11:44 a.m. ET (March 15, 2025)

Text: “TEAM UPDATE: TIME NOW (1144et): Weather is FAVORABLE. Just CONFIRMED w/CENTCOM we are a GO for mission launch.”

 

Translation and Breakdown:

 

“TEAM UPDATE”: Indicates this is a status report intended for a group, likely including advisers or confidants Hegseth was briefing outside official channels.

“TIME NOW (1144et)”: Specifies the exact time of the update—11:44 a.m. Eastern Time—serving as a timestamp for operational synchronization.

“Weather is FAVORABLE”: Weather conditions (e.g., visibility, wind, cloud cover) are suitable for the planned air and missile strikes. Weather is critical for aviation and precision-guided munitions, suggesting conditions won’t delay the mission.

“Just CONFIRMED w/CENTCOM”: Hegseth has directly communicated with U.S. Central Command (CENTCOM), the military command overseeing operations in the Middle East, including Yemen. This implies he received real-time authorization or updates from the operational authority.

“we are a GO for mission launch”: The mission has been officially approved to proceed (“green light”). In military terms, “go/no-go” is a decision point; here, it’s a “go,” meaning all prerequisites (e.g., intelligence, logistics, weather) are met.

 

Definition in Context: This is the initial confirmation of the strike’s feasibility and authorization. It sets the stage for the detailed timeline that follows, showing Hegseth’s access to high-level decision-making and his intent to relay this to the group.

 

2. Timeline Message – 1345 (1:45 p.m. ET)

Text: “1345: ‘Trigger Based’ F-18 1st Strike Window Starts (Target Terrorist is @ his Known Location so SHOULD BE ON TIME – also, Strike Drones Launch (MQ-9s))”

 

Translation and Breakdown:

 

“1345”: The military uses a 24-hour clock; this is 1:45 p.m. ET, marking the start of the first operational phase.

“‘Trigger Based’”: Indicates the strike is contingent on a specific condition or event (the “trigger”), likely the confirmed presence of the target. This suggests flexibility—if the trigger isn’t met, the strike might shift.

“F-18 1st Strike Window Starts”: F/A-18 Hornet jets, carrier-based fighter-bombers, begin their attack window at this time. A “strike window” is the timeframe during which the aircraft can engage, based on fuel, positioning, and target availability.

“Target Terrorist is @ his Known Location”: The primary target, referred to as the “Target Terrorist,” is at a predetermined site, likely identified through intelligence (e.g., signals or human intel). This is a high-value individual, possibly a Houthi leader.

“so SHOULD BE ON TIME”: Hegseth expects the strike to proceed as scheduled, barring unforeseen changes (e.g., the target moving).

“also, Strike Drones Launch (MQ-9s)”: Simultaneously, MQ-9 Reaper drones—unmanned aircraft capable of precision strikes—launch. This indicates a layered attack, combining manned jets and drones for redundancy or multiple targets.

 

Definition in Context: This outlines the opening salvo of the attack, a coordinated strike using F-18 jets and MQ-9 drones, targeting a specific individual. The “trigger-based” nature suggests real-time intelligence is driving the timing, a common tactic in counterterrorism operations.

 

3. Timeline Message – 1410 (2:10 p.m. ET)

Text: “1410: More F-18s LAUNCH (2nd strike package)”

 

Translation and Breakdown:

 

“1410”: 2:10 p.m. ET, 25 minutes after the first strike window opens.

“More F-18s LAUNCH”: A second wave of F-18 jets takes off, likely from a carrier (e.g., in the Red Sea or Arabian Sea). “Launch” here means departure from the base or carrier, not necessarily striking yet.

“(2nd strike package)”: A “strike package” is a group of aircraft and munitions tailored for a specific mission segment. This implies a phased approach—different from the first wave, possibly targeting additional sites or providing backup.

 

Definition in Context: This escalates the operation with a second wave of manned aircraft, suggesting either a broader target set or reinforcement for the initial strike. It indicates sustained pressure rather than a single hit.

 

4. Timeline Message – 1415 (2:15 p.m. ET)

Text: “1415: Strike Drones on Target (THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP, pending earlier ‘Trigger Based’ targets)”

 

Translation and Breakdown:

 

“1415”: 2:15 p.m. ET, five minutes after the second F-18 launch.

“Strike Drones on Target”: The MQ-9 drones, launched at 1:45 p.m., reach their targets and are in position to strike. “On target” means they’re over the designated area, ready to engage.

“THIS IS WHEN THE FIRST BOMBS WILL DEFINITELY DROP”: Hegseth emphasizes this as the guaranteed start of kinetic action (bombing), contrasting it with the earlier “trigger-based” flexibility.

“pending earlier ‘Trigger Based’ targets”: If the trigger condition was met before 2:15 p.m., bombs might have dropped earlier; otherwise, this is the fixed start time.


Definition in Context: This marks the definitive onset of the attack, with drones delivering the first confirmed strikes. It resolves the uncertainty of the “trigger-based” window, ensuring the operation is underway by this point.

 

5. Timeline Message – 1536 (3:36 p.m. ET)

Text: “1536 F-18 2nd Strike Starts – also, first sea-based Tomahawks launched”

 

Translation and Breakdown:

 

“1536”: 3:36 p.m. ET, over an hour after the first bombs drop.

“F-18 2nd Strike Starts”: The second wave of F-18s, launched at 2:10 p.m., begins engaging targets. Transit time (about 86 minutes) suggests targets are within a few hundred miles of the launch point, consistent with Yemen from a naval carrier.

“also, first sea-based Tomahawks launched”: Tomahawk cruise missiles, fired from ships or submarines (e.g., destroyers in the Red Sea), are introduced. These are long-range, precision weapons often used against fixed targets like command centers or infrastructure.


Definition in Context: This phase escalates the attack with the second F-18 wave and introduces sea-based missiles, indicating a mix of tactical (F-18s, drones) and strategic (Tomahawks) strikes. It suggests a multi-pronged assault, possibly hitting both the “Target Terrorist” and Houthi facilities.

 

6. Additional Note

Text: “We are currently clean on OPSEC”

 

Translation and Breakdown:

 

“We are currently clean”: Hegseth believes there are no security breaches or leaks compromising the mission at that moment.

“on OPSEC”: Short for “operational security,” a military principle to protect sensitive information (e.g., plans, timing) from adversaries. Ironically, this is stated while sharing details in a chat that included a journalist.

 

Definition in Context: This reflects Hegseth’s confidence that the operation remains secure, despite his own actions undermining that security by sharing specifics in an unsecured forum.

 

Overall Interpretation as “War Plans” or “Attack Plans” - These messages collectively constitute a detailed operational timeline for a military strike, specifying:


Assets: F-18 jets, MQ-9 drones, and Tomahawk missiles—standard U.S. hardware for precision strikes.

 

Timing: A phased approach from 1:45 p.m. to 3:36 p.m. ET, with contingencies (“trigger-based”) and fixed points.

 

Target: A high-value individual (“Target Terrorist”) and likely additional Houthi infrastructure (implied by Tomahawks).

 

Coordination: Direct input from CENTCOM, showing Hegseth’s role as a conduit between military command and his group.

 

These details were published by The Atlantic on March 26, 2025, in an article titled “Here Are the Attack Plans That Trump’s Advisers Shared on Signal,” authored by Jeffrey Goldberg and Shane Harris. The publication followed denials from Hegseth and other Trump administration officials, who claimed no “war plans” or classified information were shared. The Atlantic released the messages to counter these assertions, arguing that the public interest justified disclosure, especially given the administration’s attempts to downplay the incident.

 

The messages provide a real-time breakdown of the strike timeline, including aircraft types (F-18 jets, MQ-9 drones), missile systems (Tomahawks), and the targeting of a specific individual referred to as the “Target Terrorist.”

So no coordinates or targets mentioned? Not an attack plan.

  • Author
1 hour ago, worgeordie said:

What were the passwords  ...12345


123456 - Six digits is usually preferred, but can be alternated with "abcdef" - "qwerty" is popular too. As well as "password" for both the login name and password. Another popular set of highly secure login credentials: "admin" and "admin". 

  • Author
  • Popular Post
14 minutes ago, dinsdale said:

So no coordinates or targets mentioned? Not an attack plan.


 

What’s Present:

 

    •    Timeline: A detailed sequence of events (1:45 p.m. to 3:36 p.m. ET) with specific actions (e.g., F-18 launches, drone strikes, Tomahawk deployment).
    •    Assets: Clear identification of military hardware (F-18 jets, MQ-9 drones, Tomahawks), indicating the scope and nature of the operation.
    •    Intent: The focus on a “Target Terrorist” and the multi-phase approach suggest a deliberate strike against a high-value target, likely a Houthi figure, with possible secondary objectives (implied by Tomahawks).
    •    Operational Details: Real-time updates (e.g., weather, CENTCOM confirmation) and contingencies (“trigger-based”) show active planning and execution oversight.


Is It an Attack Plan?

 

Yes, in a Broad Sense: In military parlance, an “attack plan” doesn’t always require coordinates or target names in every communication. It’s a scheme for employing forces to achieve a specific objective—here, neutralizing a terrorist via airstrikes and missiles. Hegseth’s messages outline the how (assets and timing) and when. 

  • Popular Post
2 hours ago, Peabody said:

Tulski Gabbardnik cannot stop lying.

 

That was the lamest attempt at trying to make a name sound Russian.... what a whopper. I'm sure it sounded funnier in your head.

Just as another thread says, all you have is to label everyone Nazis or Russian assets.... and look where its got you so far, you/democrats lost EVERYTHING, have no leadership, nothing, Nada,

 

Create an account or sign in to comment

Recently Browsing 0

  • No registered users viewing this page.

Account

Navigation

Search

Search

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.