A top Pentagon nuclear official was caught on undercover video casually revealing classified national security information to a stranger in a public restaurant, raising serious questions about judgment and security protocols at the highest levels of military intelligence.
Shocking Security Breach Captured on Camera
Andrew Hugg, Chief of Chemical Nuclear Surety at the Pentagon, disclosed sensitive information about U.S. nerve agents, nuclear operations, and military strikes during what he believed was a private dinner date. The O’Keefe Media Group released footage Tuesday showing Hugg confirming that a U.S. Army chemist recently died from exposure to chemical weapons the military still maintains. Hugg described how nuclear launch decisions are made in real time and acknowledged U.S. airstrikes killed children in Iran, dismissing it as collateral damage.
Official Placed on Administrative Leave
Pentagon officials moved swiftly after the video surfaced. Hugg was escorted from the Pentagon building within hours of the footage going public and placed on administrative leave pending investigation. During the recorded conversation, Hugg even appeared aware of counterintelligence risks, asking his date if she was a spy while commenting that pretty women are often used to extract intelligence. He told the undercover journalist that Ukrainians have used U.S. taxpayer funds to purchase mansions and revealed details about potential plans to target Iran’s next supreme leader.
National Security Implications
The breach represents a significant failure in security protocols for personnel with access to the nation’s most sensitive military secrets. Hugg held responsibility for nuclear and chemical safety across the Department of Defense, giving him access to information that enemy intelligence services spend billions trying to obtain. The incident raises broader concerns about vetting procedures and ongoing monitoring of officials with top-secret clearances. Defense officials have not commented on whether other personnel may have been compromised or what additional security measures might be implemented following this breach.
