Sensitive docs including WH floor plans shared with thousands: Report
Ella Greene April 21, 2025 0
- A new report has revealed that Biden and Trump administration officials unintentionally shared some potentially classified documents with thousands of federal employees. The report from The Washington Post on Sunday indicates that career employees at the General Services Administration were to blame for the security breach.
- An investigation into the matter is reportedly ongoing.
- The documents, shared with more than 11,200 employees, reportedly included White House floor plans and banking information for a vendor who worked with the Trump administration.
Full Story
The Biden and Trump administrations erroneously shared sensitive files with thousands of federal employees, including potentially classified White House floor plans. The discovery, uncovered by The Washington Post, found the breach through an internal records review.
Who is to blame?
Published on Sunday, April 20, the report reveals that workers at the General Services Administration (GSA), which handles most administrative and IT support for the federal government, were at fault for sharing the sensitive documents.
The mistake led to a “cybersecurity incident report” and probe. According to the report, career GSA workers unintentionally shared a Google Drive folder holding sensitive files with more than 11,200 GSA employees.
What documents were shared?
The documents shared reportedly include a blueprint plan of a blast door for the White House Visitor Center and bank account information for a person who helped the Trump administration with a press conference.
The documents did not detail whether the White House floor plans and banking account information were classified information, but 9 of 15 documents were designated as “controlled unclassified information,” which means the information must still be internally safeguarded. The Washington Post also reports that at least 10 of the files allowed GSA workers to edit information within the documents.
Another week another leak?
As Straight Arrow News previously reported, it’s the latest security breach for the Trump administration following top U.S. defense officials mistakenly adding the editor-in-chief of the Atlantic to a group chat, in which airstrike plans in Yemen were shared, and a fresh report that Defense Secretary Pete Hegseth sent strike information to family members and his personal attorney. Hegseth spoke to reporters at the White House on Monday, April 21, about the leaks.
“You know, what a big surprise that a bunch of leakers get fired, and suddenly a bunch of hit pieces come out from the same media that pedaled the Russia hoax,” Hegseth said. “See, this is what the media does. They take anonymous sources from disgruntled former employees and then they try to slash and burn people and ruin their reputations. Not going to work with me.”
President Donald Trump’s national security adviser and his staff also reportedly used Gmail for government communications, which cybersecurity experts say is not a secure channel to discuss federal matters.
A multi-year issue?
The latest case, however, spanned at least four years, indicating a history of improper handling of sensitive files by both the Biden and Trump administrations. The revelations come after a special counsel found in 2024 that former President Joe Biden improperly stored classified papers in his home. The Google Drive documents were reportedly shared at least as early as 2021, and have continued into the Trump administration, with one file shared as recently as the week of April 13.
Is the issue being addressed?
Neither the White House nor the GSA have commented on the report.
The GSA’s Office of the Inspector General just gained knowledge of the improper dissemination of the files during the week of April 13, amid a security audit of the agency’s use of Google Drive, but found as of Thursday, April 17, that the file-share settings on the documents had been changed and were no longer accessible to more than 11,000 employees who previously had access, according to the report. The GSA IT team reportedly tried to reach the owner of the files but has yet to receive a response, while an investigation into the security breach continues.
Related Stories
Ella Rae Greene, Editor In Chief
Ella Greene
Ella and the staff at Clear Media Project (CMP) curate these articles.
Unless otherwise noted CMP does not write these articles.
The views, thoughts, and opinions expressed in the articles published on this blog belong solely to the original authors and do not necessarily reflect the views of the blog owner. The blog owner does not claim ownership of the content shared by contributors and is not responsible for any inaccuracies, errors, or omissions.
All rights and credits goes to its rightful owners. No Copyright Infringement is intended. If you believe any content infringes on your rights, please contact us for review and potential removal.