Codify — Article

House bill creates new felony for sharing classified information via messaging apps

Creates a new offense targeting classified disclosures through mobile and desktop messaging applications — a narrow-sounding change with wide operational, legal, and First Amendment implications for cleared personnel, platforms, and the press.

The Brief

The bill inserts a new criminal offense into chapter 37 of Title 18 that targets the transmission of classified information through mobile or desktop messaging applications. It focuses on the communication channel — messaging apps — rather than on the existing body of classified-handling rules or unauthorized retention alone.

Because the proposal treats channel choice as the statutory hook, it creates immediate operational questions for cleared personnel and private-sector service providers and raises constitutional and implementation concerns for whistleblowers, journalists, and agencies responsible for classified information handling. The change is small in text but large in practical reach: it shifts how compliance, technology, and oversight interact around classified data flows.

At a Glance

What It Does

Congress would add 18 U.S.C. § 798B, making it a federal crime to "knowingly communicates, furnishes, transmits, or otherwise makes available any classified information on a mobile or desktop messaging application," punishable by a fine and up to 10 years’ imprisonment; the bill also updates the chapter table of sections. The language targets specific modes of electronic communication rather than particular categories of classified materials or authorization status.

Who It Affects

Federal employees and contractors with security clearances, private-sector cleared personnel (defense contractors, consultants), messaging-platform operators and their compliance teams, lawyers and journalists who receive classified tips, and agencies that set secure-communications policies (e.g., DoD, DNI).

Why It Matters

This creates a channel-based felony that could criminalize a range of routine or authorized exchanges if they occur over modern messaging apps, forcing agencies to rewrite secure-communications policies and pushing platforms into an enforcement role. It also raises constitutional and whistleblower questions because the text lacks carve-outs for authorized disclosures, congressional reporting, or media recipients.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill's operative change is brief: add a new criminal offense focused on messaging apps. But that brevity masks a series of downstream effects.

The statute criminalizes communicating classified information via mobile or desktop messaging applications without defining those key terms or spelling out whether authorized transmissions (for example, messages between cleared personnel using an approved app) are exempt. That omission leaves prosecutorial discretion—and defense risk—wide.

Practically, agencies will face pressure to identify which messaging platforms are "approved" for classified communications and to update training and adjudication practices. Cleared employees and contractors will need clearer rules about when an app is legally acceptable.

Platforms will confront requests from law enforcement to preserve or produce messages, and they may have to decide whether to build compliance mechanisms or block features to reduce legal exposure.From a legal standpoint the statute uses the mens rea word "knowingly," but it does not state that a defendant must know the information was classified, nor does it require intent to harm the United States. The bill also contains no carve-out for reporting to Congress, contacting counsel, or providing information to the press—gaps that could chill oversight and lawful whistleblowing.

Finally, because the text does not define "mobile or desktop messaging application," ordinary uncertainty remains about whether SMS, enterprise collaboration tools, encrypted apps, or cloud-based messaging fall inside the prohibition.

The Five Things You Need to Know

1

The bill inserts a new federal offense titled 18 U.S.C. § 798B specifically aimed at classified disclosures on "mobile or desktop messaging application.", The only mens rea in the text is "knowingly," but the statute does not require proof that the defendant knew the information was classified or intended to injure the United States.

2

The statutory verbs — "communicates, furnishes, transmits, or otherwise makes available" — are broad and likely to cover one-to-one chats, group threads, file attachments, and public posts made through messaging-app features.

3

The bill contains no express exceptions or safe harbors for authorized official transmissions, disclosures to Congress, communications to counsel, or disclosures to the press or designated oversight bodies.

4

The statutory language is silent on definitions (it does not define "mobile or desktop messaging application"), leaving uncertainty about whether SMS, enterprise collaboration tools (e.g.

5

Slack, Teams), encrypted apps (e.g.

6

Signal), or social platforms with messaging features are covered.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 1

Short title

Provides the bill's formal name (HOUTHI PC SMALL GROUP Act of 2025). This is purely stylistic and has no substantive legal effect, but the acronym used in the heading signals the author’s framing and may appear in committee materials and debate.

Section 2(a) — New 18 U.S.C. § 798B

Creates the messaging-app disclosure offense

Adds a single-sentence offense making it unlawful for anyone who "knowingly communicates, furnishes, transmits, or otherwise makes available any classified information on a mobile or desktop messaging application." The mechanics matter: the provision targets the medium (messaging apps) and uses expansive verbs that can sweep in transmissions ranging from direct messages and file shares to group chats and app-based posting features. The statute pairs a knowledge requirement with no further mens rea qualifier, and it contains no affirmative exceptions or process for determining whether a communication was authorized.

Section 2(b) — Clerical amendment

Updates chapter table of sections

Inserts a new table entry after § 798A to reflect the new § 798B. This is a bookkeeping change that ensures users of the U.S. Code can locate the new offense under chapter 37; it signals that Congress intends this to sit alongside other wartime or national-security disclosure offenses, which affects interpretive context in prosecutions and defense strategy.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Justice across all five countries.

Explore Justice in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • Department of Defense, intelligence, and other national-security agencies — benefit from an additional statutory tool to deter and prosecute unauthorized leaks on popular messaging channels and from leverage to press platforms for compliance.
  • Security-conscious cleared employers (defense contractors) — can point to a statutory prohibition when enforcing internal policies and seeking to limit employee use of unmanaged messaging apps for classified material.
  • Compliance and risk teams at large platforms — gain statutory clarity that could justify building or expanding content-preservation, subpoena, and moderation workflows to limit liability and support law enforcement requests.

Who Bears the Cost

  • Cleared federal employees and contractors — face heightened criminal risk for cross-app or off-channel communications, and will need more stringent training and policies to avoid exposure.
  • Messaging-platform operators (including small app developers) — bear compliance costs, legal exposure to preservation/production requests, and potential pressure to alter features or routing to avoid being a conduit for classified disclosures.
  • Journalists, whistleblowers, and legal counsel — encounter increased legal risk and chilling effects because the bill lacks explicit protections for disclosures to the press, reporting to Congress, or communications with lawyers; these actors could face criminal investigations when messaging apps are used.
  • Courts and prosecutors — the broad and undefined language will generate litigation over definitions, mens rea, and constitutional challenges, increasing judicial and prosecutorial workload and creating uncertain precedents.

Key Issues

The Core Tension

The central trade-off is straightforward but hard: protect classified information by criminalizing its transmission over ubiquitous messaging channels, or preserve channels for whistleblowing, journalistic reporting, and routine authorized communications. The bill favors security by targeting the medium, but that choice risks overbreadth, chilling lawful disclosure, and imposing heavy operational and legal costs on cleared personnel, platforms, and oversight institutions without clear, statutory safeguards.

The bill is short and simple on its face but creates several substantial implementation puzzles. First, the omission of definitions means parties will litigate (or require agency guidance on) what counts as a "mobile or desktop messaging application." Is carrier SMS covered?

Do enterprise collaboration suites and hybrid messaging/collaboration platforms qualify? Does a social network's direct-message function trigger the statute?

These questions determine the law's real-world footprint but are left to later interpretation.

Second, the statute's lone mens rea term — "knowingly" — creates ambiguity about what knowledge the government must prove. Prosecutors may argue the requirement is satisfied where a defendant knew they were sending the particular content; defenses will press that the government must show awareness that the content was classified.

The lack of express exceptions for authorized disclosures, congressional reporting, or communications to counsel or the press raises both a constitutional free-speech problem and a policy problem: the risk of chilling legitimate oversight and whistleblowing could be acute, especially when secure agency channels are limited or impractical.

Finally, the bill pushes technical enforcement burdens onto platforms without providing standards for compelled assistance, and it could encourage invasive investigative techniques (device searches, compelled decryption, or metadata collection) to prove transmissions occurred. That dynamic invites Fourth Amendment arguments and forces platforms into a fraught position balancing user privacy, encryption policies, and legal compliance.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.