Check out Louisville QB Tyler Shough's NFL draft resume. (1:00)
New Orleans Saints[1] coach Kellen Moore cracked open the door to quarterback speculation in February...
...
...
A whistleblower at the National Labor Relations Board reported an unusual spike in potentially sensitive data flowing out[1] of the agency’s network in early March 2025 when staffers from the Department of Government Efficiency, which goes by DOGE, were
What happens when politicians post false or toxic messages online? My team and I found evidence that suggests U.S. state legislators can increase or decrease their public visibility[1] by sharing unverified claims or using uncivil language during times of
Many bakers working at high altitudes have carefully followed a standard recipe only to reach into the oven to find a sunken cake, flat cookies or dry muffins.
Experienced mountain bakers know they need a few tricks to achieve the same results as their
Read more https://www.reutersagency.com/en/reutersbest/article/how-bond-vigilantes-could-check-trumps-power/
WASHINGTON — Defense Secretary Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his office to use the Signal messaging app[1] on a personal computer, two people familiar with the line told The Associated Press.
The existence of the unsecured internet connection is the latest revelation about Hegseth's use of the unclassified app[2] and raises the possibility that sensitive defense information could have been put at risk of potential hacking or surveillance.
Known as a “dirty" internet line by the IT industry, it connects directly to the public internet where the user's information and the websites accessed do not have the same security filters or protocols that the Pentagon's secured connections maintain.
Other Pentagon offices have used them, particularly if there’s a need to monitor information or websites that would otherwise be blocked.
But the biggest advantage of using such a line is that the user would not show up as one of the many IP addresses assigned to the Defense Department — essentially the user is masked, according to a senior U.S. official familiar with military network security.
But it also can expose users to hacking and surveillance. A “dirty” line — just like any public internet connection — also may lack the recordkeeping compliance required by federal law, the official said.
All three spoke on condition of anonymity to discuss a sensitive matter.
The two people familiar with the line said Hegseth had it set up in his office to use the Signal app[3], which has become a flashpoint following revelations that he posted sensitive details about a military airstrike in two chats[4] that each had more than a dozen people. One of the chats included his wife and brother, while the other included President Donald Trump’s top national security officials.
Asked about Hegseth’s use of Signal in his office, which was first reported by The Washington Post, chief Pentagon spokesman Sean Parnell said the defense secretary's “use of communications systems and channels is classified.”
“However, we can confirm that the Secretary has never used and does not currently use Signal on his government computer," Parnell said in a statement.
It's the latest revelation to shake the Pentagon. Besides facing questions from both Democrats and Republicans about his handling of sensitive information, Hegseth has dismissed or transferred multiple close advisers[5], tightly narrowing his inner circle and adding to the turmoil following the firings of several senior military officers[6] in recent months.
Trump and other administration officials have given Hegseth their full support. They have blamed employees they say were disgruntled for leaking information to journalists, with Trump saying this week: “It’s just fake news. They just bring up stories.”
“I have 100% confidence in the secretary,” Vice President JD Vance told reporters Wednesday about Hegseth. ”I know the president does and, really, the entire team does.”
The Pentagon has a variety of secure ways that enable Hegseth and other military leaders to communicate:
— The Non-classified Internet Protocol Router Network can handle the lowest levels of sensitive information. It allows some access to the internet but is firewalled and has levels of cybersecurity that a “dirty” line does not. It cannot handle information labeled as secret.
— The Secure Internet Protocol Router Network is used for secret-level classified information.
— The Joint Worldwide Intelligence Communications System is for top-secret and secret compartmentalized information, which is some of the highest levels of secrecy, also known as TS/SCI.
Hegseth initially was going to the back area of his office where he could access Wi-Fi to use his devices, one of the people familiar said, and then he requested a line at his desk where he could use his own computer.
That meant at times there were three computers around his desk — a personal computer; another for classified information; and a third for sensitive defense information, both people said.
Because electronic devices are vulnerable to spying, no one is supposed to have them inside the defense secretary’s office. Important offices at the Pentagon have a cabinet or drawer where staff or visitors are required to leave devices.
Signal is a commercially available app[7] that is not authorized to be used for sensitive or classified information. It's encrypted, but can be hacked.
While Signal offers more protections than standard text messaging, it’s no guarantee of security. Officials also must ensure their hardware and connections are secure, said Theresa Payton, White House chief information officer under President George W. Bush and now CEO of Fortalice Solutions, a cybersecurity firm.
The communications of senior government officials are of keen interest to adversaries like Russia or China, Payton said.
The National Security Agency issued a warning earlier this year about concerns that foreign hackers could try to target government officials using Signal. Google also advised caution about Russia-aligned hackers targeting Signal users.
Hegseth’s Signal use is under investigation[8] by the Defense Department's acting inspector general at the request of the bipartisan leadership of the Senate Armed Services Committee.
Hegseth pulled the information about the strike on Yemen’s Houthi militants last month from a secure communications channel used by U.S. Central Command. He has vehemently denied he posted “war plans” or classified information.
But the information Hegseth did post in chats — exact launch times and bomb drop times — would have been classified and could have put service members at risk, multiple current and former military and defense officials have said. The airstrike information was sent before the pilots had launched or safely returned from their mission.
___
AP reporter David Klepper in Washington contributed to this report.
© Copyright 2025 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
...
...
...
...
Check out Louisville QB Tyler Shough's NFL draft resume. (1:00)
New Orleans Saints[1] coach Kellen Moore cracked open the door to quarterback speculation in February...
The Shedeur Sanders[1] saga has gone from unexpected to inexplicable.
The former Colorado quarterback's fall out of the NFL draft's first round Thursday night was surprising.
But then came Friday night's plummet.
Widely projected as one of the top...
Read more https://www.espn.com/nfl/story/_/id/44860385/shedeur-sanders-remains-undrafted-round-3-nfl-draft
Is your green my green[1]? Probably not. What appears as pure green to me will likely look a bit yellowish or blueish to you. This is because visual systems vary from person to person. Moreover, an object’s color may appear differently[2] against different backgrounds or under different lighting.
These facts might naturally lead you to...
The detection of life beyond Earth would be one of the most profound discoveries in the history of science. The Milky Way galaxy alone hosts hundreds of millions of potentially habitable planets[1]. Astronomers are using powerful space telescopes[2] to look for molecular indicators of biology in the atmospheres of the most Earth-like of these...
Imagine a country with deep political divisions, where different groups don’t trust each other and violence seems likely. Now, imagine a flood of political images, hateful memes and mocking videos from domestic and foreign sources taking over social media. What is likely to happen next?
The widespread use of social media during times of...
The primitive hate on display in the streets around the globe cries out for a Final Solution to the Jewish Problem.
It is time to end the Jewish Problem once and for all.
Both the problem and solution are simple, and this instruction can be short.
The decision and responsibility for it are yours.
First one bank announced it will only accept digital currency.
Now the Reserve Bank of Australia has announced it is heading into digital currency.
As the moth is to the flame, so are the follies of man.
Artificial intelligence and the next level of quantum computing will render passwords and encryption efforts obsolete.
The point of having a nation of laws is twofold: (a) you know how to prosper, and (b) you know how to stay out of jail.
The persecution of President Trump has revealed a new threat of charlatan prosecutors and agency administrators cobbling together disparate statutes which the media kindly calls “innovative”, “artful” or “novel” interpretations or constructions.
But these recombinations are actually new laws because they are the nouns, adjectives, adverbs, and contexts in criminal statutes, strung together in new combinations to create newly criminalized conduct after a citizen has engaged in some conduct.
...