CENTCOM escalates airstrike campaign against Houthis

CENTCOM escalates airstrike campaign against Houthis
CENTCOM escalates airstrike campaign against Houthis

U.S. Central Command (CENTCOM) has escalated its airstrike campaign against the Houthi rebels in Yemen, marking a substantial increase in both intensity and scope. The operations, initiated on March 15, 2025, have transitioned from targeting launch sites to focusing on high-ranking Houthi personnel and strategic infrastructure, including urban areas. This shift aligns with the Trump administration's objective to deter Houthi attacks on Red Sea shipping lanes and assert freedom of navigation in the region.

A civilian was killed and four injured as fourteen strikes hit the outskirts of Saada city, the provincial capital of the northwestern province of Saada, a stronghold for the Houthi movement.

Concurrently, a significant security lapse has come to light involving senior U.S. officials, including National Security Adviser Michael Waltz and Defense Secretary Pete Hegseth. The leak has raised serious concerns about the handling of classified information, prompting calls for accountability.

The incident has elicited varied reactions from political figures. Senator Ted Cruz downplayed the severity of the leak, while Democrats have expressed alarm, accusing the administration of endangering national security and mishandling classified information. The House Intelligence Committee has initiated hearings to probe the circumstances surrounding the Signal leak, with intelligence chiefs denying that classified information was improperly shared.

The intensified airstrikes and the subsequent security breach occur within a broader context of U.S. efforts to counter Houthi aggression in the Middle East. The Houthis have been implicated in attacks against commercial shipping and regional instability. The U.S. actions aim to curb these threats and assert influence in the region. However, the recent events have sparked discussions about the effectiveness and ethical considerations of such interventions, as well as the internal challenges facing the U.S. administration in managing sensitive military information.