U.S. Security Officials Allegedly Used Personal Gmail Accounts for Sensitive Government Tasks, Report Claims
U.S. national security officials have allegedly utilized their personal Gmail accounts to handle official government affairs, including the dissemination of sensitive military data — a practice that heightens significant cybersecurity concerns. Among those named is National Security Advisor Michael Waltz, a pivotal figure in the recent “Signalgate” scandal.
As reported by The Washington Post, members of the National Security Council (NSC) communicated with colleagues at various federal agencies via their personal Gmail accounts rather than secure government systems. This implies that potentially classified or sensitive data was stored in personal inboxes, which do not have the strong safeguards provided by official federal communication channels.
The report emphasizes that Waltz received work-related documents and scheduling details through his personal Gmail. More shockingly, a senior aide to Waltz reportedly used Gmail to partake in extensive discussions with other government officials concerning delicate military positions and advanced weaponry connected to an ongoing conflict.
This revelation comes on the heels of last week’s disclosure of a Signal group chat involving high-ranking U.S. officials — including Waltz — during which military operations, such as plans for bombing Yemen, were deliberated. Typically, such sensitive data is conveyed in person or through secure governmental networks like the Secret Internet Protocol Router Network (SIPRNet), rather than through standard email services.
Although scheduling information may not be viewed as serious as military strategies, experts caution that even this kind of information could be manipulated by malicious actors to target officials or disrupt their operations.
The NSC has refuted the report. NSC spokesperson Brian Hughes acknowledged that while Waltz might have occasionally received work-related emails on his personal account, he asserted that his official government email was copied on such emails to ensure proper record-keeping. Nonetheless, this does not tackle the fundamental issue of sensitive information being compromised via unsecured channels.
“Waltz didn’t and wouldn’t send classified information on an open account,” Hughes told The Washington Post.
Despite this defense, the incident contributes to a burgeoning list of digital security failures associated with Waltz. In just the past week, multiple reports have emerged linking him to cybersecurity lapses, including the exposure of his personal contact information, passwords, and even his Venmo transaction details online. Sources also informed The Washington Post that Waltz frequently copied and pasted data from his schedule into Signal messages.
Waltz was instrumental in the Signal chat controversy, having included The Atlantic’s editor-in-chief Jeffrey Goldberg in the group where U.S. officials were reportedly discussing military maneuvers. After the leak, several members of the chat — including Waltz — had their private information exposed online.
Given Waltz’s history with digital security, the new accusations regarding his Gmail usage have not come as a shock to many observers. However, despite rising concerns, there seem to be no immediate repercussions for his behavior. The White House has continued to back Waltz, with Press Secretary Karoline Leavitt stating that the “case has been closed” regarding Signalgate. President Donald Trump also supported Waltz, expressing doubt that an apology was warranted and describing Waltz as “doing his best.”
The ongoing disclosures raise broader questions about cybersecurity protocols within the federal government and the potential dangers posed by the use of unsecured communication methods for official tasks.