1 | 1 | | IV |
---|
2 | 2 | | 119THCONGRESS |
---|
3 | 3 | | 1 |
---|
4 | 4 | | STSESSION H. RES. 265 |
---|
5 | 5 | | Condemning the Trump administration for the use of an unauthorized method |
---|
6 | 6 | | of communicating highly sensitive or potentially classified information |
---|
7 | 7 | | regarding a United States military operation via the messaging platform |
---|
8 | 8 | | ‘‘Signal’’. |
---|
9 | 9 | | IN THE HOUSE OF REPRESENTATIVES |
---|
10 | 10 | | MARCH27, 2025 |
---|
11 | 11 | | Ms. J |
---|
12 | 12 | | OHNSONof Texas (for herself, Ms. TOKUDA, Ms. NORTON, Mr. PETERS, |
---|
13 | 13 | | and Mr. J |
---|
14 | 14 | | OHNSONof Georgia) submitted the following resolution; which |
---|
15 | 15 | | was referred to the Committee on Oversight and Government Reform, |
---|
16 | 16 | | and in addition to the Committees on Foreign Affairs, Armed Services, |
---|
17 | 17 | | and Intelligence (Permanent Select), for a period to be subsequently de- |
---|
18 | 18 | | termined by the Speaker, in each case for consideration of such provisions |
---|
19 | 19 | | as fall within the jurisdiction of the committee concerned |
---|
20 | 20 | | RESOLUTION |
---|
21 | 21 | | Condemning the Trump administration for the use of an |
---|
22 | 22 | | unauthorized method of communicating highly sensitive |
---|
23 | 23 | | or potentially classified information regarding a United |
---|
24 | 24 | | States military operation via the messaging platform |
---|
25 | 25 | | ‘‘Signal’’. |
---|
26 | 26 | | Whereas Vice President J.D. Vance used an unauthorized |
---|
27 | 27 | | method of communicating highly sensitive or potentially |
---|
28 | 28 | | classified information regarding a United States military |
---|
29 | 29 | | operation via the messaging platform ‘‘Signal’’; |
---|
30 | 30 | | VerDate Sep 11 2014 22:59 Mar 27, 2025 Jkt 059200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6300 E:\BILLS\HR265.IH HR265 |
---|
31 | 31 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB 2 |
---|
32 | 32 | | •HRES 265 IH |
---|
33 | 33 | | Whereas the Secretary of Defense Pete Hegseth used an un- |
---|
34 | 34 | | authorized method of communicating highly sensitive or |
---|
35 | 35 | | potentially classified information regarding a United |
---|
36 | 36 | | States military operation via the messaging platform |
---|
37 | 37 | | ‘‘Signal’’; |
---|
38 | 38 | | Whereas the Secretary of State Marco Rubio used an unau- |
---|
39 | 39 | | thorized method of communicating highly sensitive or po- |
---|
40 | 40 | | tentially classified information regarding a United States |
---|
41 | 41 | | military operation via the messaging platform ‘‘Signal’’; |
---|
42 | 42 | | Whereas the Director of National Intelligence Tulsi Gabbard |
---|
43 | 43 | | used an unauthorized method of communicating highly |
---|
44 | 44 | | sensitive or potentially classified information regarding a |
---|
45 | 45 | | United States military operation via the messaging plat- |
---|
46 | 46 | | form ‘‘Signal’’; |
---|
47 | 47 | | Whereas Presidential Advisor Stephen Miller used an unau- |
---|
48 | 48 | | thorized method of communicating highly sensitive or po- |
---|
49 | 49 | | tentially classified information regarding a United States |
---|
50 | 50 | | military operation via the messaging platform ‘‘Signal’’; |
---|
51 | 51 | | Whereas the Assistant to the President for National Security |
---|
52 | 52 | | Affairs Mike Walz used an unauthorized method of com- |
---|
53 | 53 | | municating highly sensitive or potentially classified infor- |
---|
54 | 54 | | mation regarding a United States military operation via |
---|
55 | 55 | | the messaging platform ‘‘Signal’’; |
---|
56 | 56 | | Whereas the Secretary of the Treasury Scott Bessent used an |
---|
57 | 57 | | unauthorized method of communicating highly sensitive |
---|
58 | 58 | | or potentially classified information regarding a United |
---|
59 | 59 | | States military operation via the messaging platform |
---|
60 | 60 | | ‘‘Signal’’; |
---|
61 | 61 | | Whereas the Director of the Central Intelligence Agency John |
---|
62 | 62 | | Ratcliffe used an unauthorized method of communicating |
---|
63 | 63 | | highly sensitive or potentially classified information re- |
---|
64 | 64 | | VerDate Sep 11 2014 22:59 Mar 27, 2025 Jkt 059200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6300 E:\BILLS\HR265.IH HR265 |
---|
65 | 65 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB 3 |
---|
66 | 66 | | •HRES 265 IH |
---|
67 | 67 | | garding a United States military operation via the mes- |
---|
68 | 68 | | saging platform ‘‘Signal’’; |
---|
69 | 69 | | Whereas the National Security Council official Brian McCor- |
---|
70 | 70 | | mack used an unauthorized method of communicating |
---|
71 | 71 | | highly sensitive or potentially classified information re- |
---|
72 | 72 | | garding a United States military operation via the mes- |
---|
73 | 73 | | saging platform ‘‘Signal’’; |
---|
74 | 74 | | Whereas the White House Chief of Staff Susie Wiles used an |
---|
75 | 75 | | unauthorized method of communicating highly sensitive |
---|
76 | 76 | | or potentially classified information regarding a United |
---|
77 | 77 | | States military operation via the messaging platform |
---|
78 | 78 | | ‘‘Signal’’; |
---|
79 | 79 | | Whereas the National Security Council official Steve Witkoff |
---|
80 | 80 | | used an unauthorized method of communicating highly |
---|
81 | 81 | | sensitive or potentially classified information regarding a |
---|
82 | 82 | | United States military operation via the messaging plat- |
---|
83 | 83 | | form ‘‘Signal’’; |
---|
84 | 84 | | Whereas members of the administration may not have prop- |
---|
85 | 85 | | erly documented highly sensitive and potentially classified |
---|
86 | 86 | | information in accordance with chapters 21, 29, 31, and |
---|
87 | 87 | | 33 of title 44, United States Code (commonly known as |
---|
88 | 88 | | the Federal Records Act), enacted in 1950; |
---|
89 | 89 | | Whereas foreign adversaries have previously accessed and |
---|
90 | 90 | | consistently attempt to access highly sensitive and classi- |
---|
91 | 91 | | fied information relevant to United States National Secu- |
---|
92 | 92 | | rity, such as China’s successful 2024 attempt to infiltrate |
---|
93 | 93 | | the United States Treasury and Russia’s targeting of |
---|
94 | 94 | | United States military plans and sensitive data, notably |
---|
95 | 95 | | through operations like Moonlight Maze and espionage |
---|
96 | 96 | | activities such as the Arc Electronics case, which include |
---|
97 | 97 | | cyberattacks and illegal technology exports; |
---|
98 | 98 | | VerDate Sep 11 2014 22:59 Mar 27, 2025 Jkt 059200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6300 E:\BILLS\HR265.IH HR265 |
---|
99 | 99 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB 4 |
---|
100 | 100 | | •HRES 265 IH |
---|
101 | 101 | | Whereas top members of the administration used a publicly |
---|
102 | 102 | | available commercial platform to form a ‘‘small group’’, |
---|
103 | 103 | | communicate highly sensitive or potentially classified in- |
---|
104 | 104 | | formation, and discuss openly their intentions, at risk of |
---|
105 | 105 | | access by foreign adversaries; |
---|
106 | 106 | | Whereas the administration has in prior instances violated |
---|
107 | 107 | | Federal law and basic guidance on handling of classified |
---|
108 | 108 | | information, such as the President’s improper storage of |
---|
109 | 109 | | classified documents at ‘‘Mar-a-Lago’’; and |
---|
110 | 110 | | Whereas members of the administration discussed highly |
---|
111 | 111 | | classified information regarding a United States military |
---|
112 | 112 | | operation outside of a Sensitive Compartmented Informa- |
---|
113 | 113 | | tion Facility, also known as a SCIF: Now, therefore, be |
---|
114 | 114 | | it |
---|
115 | 115 | | Resolved, That the House of Representatives— 1 |
---|
116 | 116 | | (1) condemns the administration for risking our 2 |
---|
117 | 117 | | national security by potentially exposing highly sen-3 |
---|
118 | 118 | | sitive or potentially classified information to United 4 |
---|
119 | 119 | | States foreign adversaries like China and Russia, 5 |
---|
120 | 120 | | who have in the past have successfully accessed 6 |
---|
121 | 121 | | highly sensitive and confidential information per-7 |
---|
122 | 122 | | taining to United States national interests; 8 |
---|
123 | 123 | | (2) condemns the administration for putting 9 |
---|
124 | 124 | | American servicemembers’ lives at risk by discussing 10 |
---|
125 | 125 | | military operations in an unsecured, unclassified set-11 |
---|
126 | 126 | | ting and sharing this information with at least one 12 |
---|
127 | 127 | | nongovernmental party; 13 |
---|
128 | 128 | | VerDate Sep 11 2014 22:59 Mar 27, 2025 Jkt 059200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:\BILLS\HR265.IH HR265 |
---|
129 | 129 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB 5 |
---|
130 | 130 | | •HRES 265 IH |
---|
131 | 131 | | (3) calls on the administration to review its pro-1 |
---|
132 | 132 | | cedures and systems for the communication of clas-2 |
---|
133 | 133 | | sified information; 3 |
---|
134 | 134 | | (4) calls on the administration to investigate all 4 |
---|
135 | 135 | | communication methods being used by members of 5 |
---|
136 | 136 | | the administration and ensure they are aligned with 6 |
---|
137 | 137 | | proper procedure as it pertains to the communica-7 |
---|
138 | 138 | | tion of classified or highly sensitive information; 8 |
---|
139 | 139 | | (5) calls on the administration to initiate an in-9 |
---|
140 | 140 | | vestigation to uncover if any members of the admin-10 |
---|
141 | 141 | | istration violated any Federal laws regarding the 11 |
---|
142 | 142 | | communication of classified information; 12 |
---|
143 | 143 | | (6) calls on the administration to hold any and 13 |
---|
144 | 144 | | all members of the administration accountable to the 14 |
---|
145 | 145 | | full extent of the law if any Federal laws were vio-15 |
---|
146 | 146 | | lated by members of the administration pertaining to 16 |
---|
147 | 147 | | the communication of classified information; 17 |
---|
148 | 148 | | (7) calls on the administration to investigate on 18 |
---|
149 | 149 | | how many instances the National Security Council 19 |
---|
150 | 150 | | or any other relevant executive branch officials has 20 |
---|
151 | 151 | | used the ‘‘Signal’’ messaging service or any other 21 |
---|
152 | 152 | | messaging service application that has not been ap-22 |
---|
153 | 153 | | proved for the transmission of highly sensitive or 23 |
---|
154 | 154 | | classified information; 24 |
---|
155 | 155 | | VerDate Sep 11 2014 22:59 Mar 27, 2025 Jkt 059200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:\BILLS\HR265.IH HR265 |
---|
156 | 156 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB 6 |
---|
157 | 157 | | •HRES 265 IH |
---|
158 | 158 | | (8) calls on the administration to ensure all 1 |
---|
159 | 159 | | members of the administration are communicating 2 |
---|
160 | 160 | | highly sensitive or classified information inside a 3 |
---|
161 | 161 | | SCIF to ensure members of the administration do 4 |
---|
162 | 162 | | not endanger United States National Security by 5 |
---|
163 | 163 | | communicating classified information through im-6 |
---|
164 | 164 | | proper channels; and 7 |
---|
165 | 165 | | (9) calls on the administration to inform all 8 |
---|
166 | 166 | | members of the administration that the communica-9 |
---|
167 | 167 | | tion of classified information outside of a SCIF, is 10 |
---|
168 | 168 | | strictly prohibited and that any members of the ad-11 |
---|
169 | 169 | | ministration found to violate this procedure will be 12 |
---|
170 | 170 | | removed from office and subsequently be punished in 13 |
---|
171 | 171 | | accordance with any and all applicable laws per-14 |
---|
172 | 172 | | taining to the communication of classified informa-15 |
---|
173 | 173 | | tion. 16 |
---|
174 | 174 | | Æ |
---|
175 | 175 | | VerDate Sep 11 2014 22:59 Mar 27, 2025 Jkt 059200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6301 E:\BILLS\HR265.IH HR265 |
---|
176 | 176 | | kjohnson on DSK7ZCZBW3PROD with $$_JOB |
---|