• China’s massive military parade this week featured a who’s who of well-dressed dictators, a fleet of laser-armed trucks, new hypersonic weapons, beach landing craft and, of course, thousands of uniformed troops marching in intricately coordinated unison. But it left out what might be China’s most important new military asset: a growing ecosystem of small and nimble dual-use AI companies partnering with the Chinese military. 

    A new report from the Center for Security and Emerging Technology draws attention to China’s growing appetite for AI-related tech, not just from a handful of big, surveillable state-backed enterprises but from a growing cadre of relatively young outfits emerging from universities and private labs. Those partnerships make it harder for the United States to track what new weapons China is developing and prevent U.S. investors or technology collaborators from helping them. 

    A significant portion of the technology, like software for piloting drone swarms or advanced navigation systems, have both a civilian and military purpose—much like Chinese flagged fishing and “research” vessels, non-military ships that many U.S. military and national security leaders describe as China’s “maritime militia.”  

    Much of the technology listed in the report has clear applications for potentially improving the military value of a non-military ship. This includes contracts for semantic modeling software, which uses sensed data and AI to help ships understand where they are without having to rely on GPS. The capability is of limited value to commercial vessels, but high value to ships engaged in military operations. 

    A company called Beijing SOUVI Information Technology received contracts for drone control systems and intelligent sensing software that could allow a single operator with little training to steer a swarm of drones. It could also allow a Chinese navy operator to operate merchant vessels performing a coordinated operation with the Chinese military. 

    There is precedent for Chinese civilian ships conducting coordinated military maneuvers, such as in July 2023, when a group of Chinese fishing vessels effectively created a blockade around a reef in the Philippines, escorted by the Chinese navy. China’s fleet of so-called merchant craft are also working with the Chinese coast guard and navy in exercises, harassing local fishermen and potentially sabotaging undersea infrastructure from the Philippines to the seas of South America.

    Another company, called JOUAV, markets vertical takeoff and landing drones and AI software to fuse data from advanced thermal sensors. A non-military trained crew aboard a fishing vessel could easily deploy those to pick out other ships at night or in poor weather well beyond the horizon, turning the civilian ship into an ISR node. 

    One of the report’s key findings is China’s growing use of smaller “nontraditional vendors,” or NTVs. While the country’s AI tech buying is still focused primarily on large, state-owned companies and research institutions, CSET found a list of small firms, mostly founded after 2010 and marketing commercial technology with military applications, which do not report state ownership ties on their websites. These include companies like iFlytek, which makes speech translation apps; PIESAT, which sells AI-enabled geospatial data useful for live location mapping; and JOUAV. It’s a portrait of a startup ecosystem that bears many similarities to Silicon Valley.

    But while the Pentagon has spent years working to improve its ability to acquire dual-use technology and partner with startups that aren’t traditional defense contractors, CSET’s research indicates China’s reason for doing so is very different: “The vast majority of NTVs and research institutions in the dataset are not subject to U.S. sanctions.” In other words, China is working to trick consumers around the world into buying products and services that help the Chinese military grow stronger.

    The tech that these firms are selling to the Chinese military runs the gamut from geospatial intelligence to training to drones, such as the Reaper-like Tengden TB-001 “Twin-Tailed Scorpion,” one of “the first known cases in which a non-[state-owned enterprise] supplied the PLA with a complete military end-use system.” Other products have a more clear dual-use purpose. For instance: helping commercial ships use sea robots more effectively to navigate and find fish, or effectively coordinate military-style maneuvers, such as blockading, with other militia boats.

    One of the recent awards CSET tracked to PIESAT was for an “unmanned aerial vehicle virtual simulation training system,” which could serve either explicit military purposes by enabling drone operations, or more ambiguous purposes in assisting “research” vessels such as the ones increasingly showing up near Taiwan.

    While China has traditionally used just a handful of government-selected companies to build its military gear, a separate paper from the U.K’s Centre for Emerging Technology and Security notes that AI companies enjoy more leeway in building products, finding funding, and hiring workers than do other companies. 

    “China’s AI funding structure still provides opportunities for smaller companies to benefit from financial incentives. This suggests a more dynamic and layered approach to state-led AI development, which shapes the wider environment for China’s AI firms rather than mandating direct control through state ownership or funding.” 

    DeepSeek is an example of a company that flew under the radar of Chinese authorities until it was launched. That’s significant because when U.S. business and national security leaders discuss AI competition with China, they frequently point to the robustness and profitability of the U.S. tech startup space and its support for entrepreneurs as a key advantage over China’s government-controlled system. But in reality, the AI portion of the Chinese tech ecosystem is beginning to more closely resemble the United States. 

    More importantly, national security leaders are increasingly recognizing that artificial intelligence is more important than any singular weapon, as it holds the promise of making a military or weapon far more effective, at little to no cost.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The next National Defense Strategy—which was due to Defense Secretary Pete Hegseth on Aug. 31—could not come at a more critical time, as Pentagon leaders seek to manage foreign-policy challenges, a stretched defense industrial base, and rapid technological disruption.

    It would be fair to ask whether a lengthy document like the NDS still matters. After all, in just the first seven months of his second term, President Trump has ordered U.S. strikes against nuclear sites in Iran, engaged Russian President Vladimir Putin in high-stakes direct talks to seek an end to Moscow’s war in Ukraine, brandished sky-high tariffs against Beijing and dozens of other countries, sent thousands of U.S. troops to the Mexican border, deployed National Guard troops to support domestic law enforcement, unleashed a disruptive cost-cutting campaign across the U.S. government, and much more. It would be easy to conclude that these moves—in combination with public remarks from the president and other officials—have already defined the administration’s national-security priorities.

    But having spent time in the Office of the Secretary of Defense, we’ve seen firsthand that there is no substitute for comprehensive written guidance that outlines an administration’s vision for national defense. And given this administration’s unorthodox staffing and decision-making posture, a clear articulation of priorities is especially critical to the nearly 3 million military and civilian Defense Department employees worldwide.

    If written and implemented effectively, there are five key ways the next NDS could be consequential for the second Trump administration’s approach to defense.

    First, the NDS can help DoD leaders consistently prioritize threats and activities. A core feature of any NDS is its characterization of the threat environment facing the U.S. military. Its prioritization of those challenges shapes DoD’s force posture, modernization efforts, and the approach to seemingly routine activities. NDS can in turn indicate what not to prioritize and where to accept greater risk. Even in an environment where President Trump has played a uniquely personal role in the national-security decision-making process, the NDS can provide a guiding framework for officials across DoD and the U.S. military as they grapple with tough choices that do not reach a president’s desk or consider how to realize the president’s vision. For example, while the Trump administration has already indicated that protecting the U.S. homeland and deterring the People’s Republic of China will be top strategic priorities, the NDS can help determine the mechanics of tackling those challenges in practice. 

    Second, the NDS is a crucial messaging tool. As the president’s attention and messaging inevitably shifts with issues of the day, the NDS provides adversaries and allies alike with an enduring vision of the administration’s defense objections and intentions. Additionally, Congress can use the NDS to hold DoD accountable to its own stated goals and policy initiatives, with major implications for its authorities. In previous administrations, the Pentagon’s political leadership has also used the NDS to signal to the White House that they are focused on the president’s priorities. While Secretary Hegseth often uses media to publicly express his support for the president’s vision, the NDS gives him an opportunity to take his commitment one step further by incorporating it into one of the Pentagon’s core documents.

    Third, the NDS can shape how DoD interacts with allies and partners. While the Biden-era 2022 NDS identified U.S. allies and partners as America’s “greatest global strategic advantage,” the Trump administration has repeatedly called for foreign capitals to do more for their own defense. The NDS could offer greater details on what DoD expects from allies and partners in terms of defense spending, specific capabilities, and commitments to use those capabilities in support of U.S. objectives. How the strategy characterizes the value of multilateral defense cooperation and whether it seeks to sustain frameworks like NATO, AUKUS, or multilateral ties in the Indo-Pacific region will also provide a critical signal for America’s partners around the world.

    Fourth, the NDS can guide the Pentagon’s longer-term approach to long-term industrial and technological issues. The Pentagon already has a mandate from the White House to revitalize America’s maritime industrial base, reshore defense manufacturing, streamline defense acquisition processes, and promote tech innovation—along with historic amounts of funding to deliver results. But the NDS could provide greater insight into what types of capabilities, investments, workforce initiatives, co-development and co-production arrangements, and industry partnerships DoD believes are required to strengthen deterrence, readiness, and the U.S. military’s edge. How the strategy frames these issues will be especially pertinent for industry.

    Fifth, the NDS can help justify the Pentagon’s requests for resources over the next three years. As the saying goes, a vision without resources is hallucination—and the NDS is no exception. That is why the previous administration undertook deliberate efforts to connect the 2022 NDS to the defense budget requests that followed. The NDS can provide a powerful blueprint for DoD leaders to explain to Congressional appropriators why they need resources, how they’ll be used, and how specific initiatives will achieve broader strategic objectives. An NDS that mirrors the fiscal year 2026 budget request and demonstrates that defense funds will advance articulated priorities can reassure Congress that the administration’s approach is coherent, consistent, and strategic.

    President Trump continues to play a uniquely central role in national-security decision-making. DoD leaders would be well served by issuing an NDS that instructs the Pentagon how to realize the President’s vision, provides Congress a preview of the resources that will be required to achieve it, and signals to allies and adversaries the Administration’s commitment to the plan. But, as with all strategies, implementation will matter most of all.

    Lauren Speranza is a Fellow with the Transatlantic Defense and Security Program at the Center for European Policy Analysis (CEPA), and a former Special Assistant to the Secretary of Defense. Chris Estep is a Non-Resident Fellow with the Asia Program at the Foreign Policy Research Institute (FPRI), and a former Senior Advisor to the Assistant Secretary of Defense for Indo-Pacific Security Affairs. The views expressed in this article are theirs alone.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Federal agencies have deployed nearly 33,000 employees to assist Immigration and Customs Enforcement in its efforts to dramatically ramp up detention and deportation of undocumented individuals, according to a new report, significantly multiplying the number of employees working on enforcement efforts. 

    About 20,000 of those employees came from outside ICE, the Cato Institute, a libertarian-leaning think tank, found, including some agencies that have sent significant portions of their workforces to the deportation effort. ICE’s Homeland Security Investigations, which is responsible for investigating transnational crimes including drug and human trafficking, has sent more than 12,000 employees to the agency’s Enforcement and Removal Operations division. HSI as of the most recent data on ICE’s website had “more than 10,000 employees,” meaning it has both grown and sent nearly its entire workforce to assist with immigration enforcement. 

    ERO itself has around 6,000 officers on staff. 

    Many of the other employees detailed to ICE come from the Justice Department, including the Bureau of Prisons, Drug Enforcement Administration, FBI, U.S. Marshal Service and Alcohol, Tobacco, Firearms and Explosives. The State Department has sent nearly 300 Diplomatic Security staff to ERO to aid in deportation efforts, while the Internal Revenue Service has around more than 1,700 employees assisting ICE. That marks a significant ramp up from June, when Government Executive reported IRS had 250 of its agents detailed to the Homeland Security Department. 

    Other DHS components are also contributing to ICE’s immigration enforcement crackdown: Customs and Border Protection has detailed more than 5,000 employees toward the effort, while U.S. Citizenship and Immigration Services has sent more than 4,000. Government Executive previously reported USCIS staff working on refugee operations in the Refugee, Asylum and International Operations Directorate were pushed by their leadership to accept details to ICE to demonstrate their "adaptability" and to “justify our continued employment.” About one-quarter of the refugee office was detailed to ICE as of June. 

    The responsibilities of the detailees have varied. IRS agents have been authorized to make arrests for civil violations of immigration law, while USCIS employees were largely working on administrative matters like verifying an immigrant’s status or correcting information for ICE.

    Some employees temporarily assigned to ICE are serving for limited periods, such as 60 days or six months, while others, such as those from CBP, are working for the enforcement agency indefinitely. 

    DEA has assigned nearly 40% of its total employees to ICE, according to Cato’s data, while the ATF has sent nearly 30% and USMS around 20%.

    The figures showed the deployments to ICE’s enforcement office between Aug. 5 and Aug. 28. ICE has also received assistance from more than 9,000 partners at the state and local level, according to Cato’s data. 

    Trump recently signed into law the One Big Beautiful Bill Act, which provided funding for ICE to hire 10,000 new employees and CBP to hire 8,500 new staff. The administration is rescheduling training for most other federal law enforcement to prioritize its massive onboarding effort for ICE. 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The District of Columbia’s attorney general sued the Trump administration Thursday over the ongoing presence of National Guard troops in the nation’s capital, arguing the deployment amounts to a military occupation that violates the district’s right to self-rule.

    President Donald Trump’s deployment of D.C. National Guard troops and units from states outside the district  violates laws against using the military for domestic law enforcement and a 1973 federal law allowing the district to govern itself, D.C. Attorney General Brian L. Schwalb wrote in a complaint in federal court in the district.

    “No American jurisdiction should be involuntarily subjected to military occupation,” the complaint says, adding that Trump’s “command and control of out-of-state National Guard units when they are in state militia status violates the Constitution and federal law.”

    The administration’s actions, which Trump has characterized as an attempt to control crime in the city, “flout the Posse Comitatus Act,” a 19th-century law, and other sections of federal law that “enshrine the nation’s foundational prohibition on the participation of military forces in domestic law enforcement absent the most extreme exigencies, such as an invasion or rebellion,” the complaint said.

    “Defendants have established a massive, seemingly indefinite law enforcement operation in the District subject to direct military command. The danger that such an operation poses to individual liberty and democratic rule is self-evident,” the complaint said.

    Despite a Tuesday morning ruling from a federal judge in California that called Trump’s use of military personnel for law enforcement in Los Angeles illegal, the president has continued to explore further use of Guard units for what he said is crime prevention in other U.S. cities. 

    States with a military presence in the district cited in the suit are Louisiana, South Dakota, Ohio, West Virginia, Tennessee, Mississippi and South Carolina.

    This is a developing report that will be updated.

    This story was originally published by Stateline.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Online chess giant Chess.com has disclosed a data breach that compromised the personal information of 4,541 individuals, according to a filing with the Maine Attorney General’s Office.

    The cyber incident took place on June 5, 2025 and was discovered nearly two weeks later on June 19, 2025. Chess.com confirmed that the breach was the result of an external hack, where attackers gained unauthorized access to sensitive data.

    The company reported that hackers were able to obtain names and personal identifiers, though it did not provide a full breakdown of all the data elements exposed. The breach affected users across multiple regions, including one resident of Maine.

    Chess.com Response

    Chess.com began notifying impacted individuals on September 3, 2025 through written notices. To help protect its community, the company is offering 12 months of complimentary identity theft protection services.

    The notification was formally submitted by Elias Colabelli, Head of the Legal Department and Data Protection Officer at Chess.com, who emphasized that the company is strengthening its systems to prevent similar incidents in the future.

    Although the number of affected users may seem low compared to other large-scale data breaches, the incident underscores how even major online platforms remain targets for cybercriminals. With more than 150 million users worldwide, Chess.com holds a vast amount of personal data, making it a lucrative target for hackers.

    Cybersecurity experts warn that breaches of this nature can pave the way for identity theft, phishing attempts, and further fraud if stolen data circulates on underground markets.

    Chess.com has not yet disclosed whether law enforcement is involved in the investigation. The company says it continues to work on tightening security protocols and monitoring its systems closely.

    We have reached out to Chess.com for further details regarding the breach and are awaiting their response. This article will be updated as soon as new information becomes available.

    For users, the breach is a reminder to stay vigilant, monitor financial accounts, and be cautious of suspicious emails that could exploit stolen personal details.

                       Find this Story Interesting! Follow us on X, Google NewsLinkedIn, and  to Get More Instant Updates.

    Recent Data Breaches:

    1. PagerDuty Confirms Data Breach After Third-Party App Vulnerability Exposes Salesforce Data
    2. Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances
    3. Palo Alto Networks Confirms Data Breach – Hackers Stole Customer Data from Salesforce Instances
    4. Zscaler Confirms Data Breach – Hackers Compromised Salesforce Instance and Stole Customer Data



    The post Chess.com Data Breach – Hackers Breached External System and Gained Internal Access appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor called NotDoor in attacks targeting multiple companies from different sectors in NATO member countries. NotDoor “is a VBA macro for Outlook designed to monitor incoming emails for a specific trigger word,” S2 Grupo’s LAB52 threat intelligence team said. “When such an email is

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers have lifted the lid on a previously undocumented threat cluster dubbed GhostRedirector that has managed to compromise at least 65 Windows servers primarily located in Brazil, Thailand, and Vietnam. The attacks, per Slovak cybersecurity company ESET, led to the deployment of a passive C++ backdoor called Rungan and a native Internet Information Services (IIS) module

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers uncovered a sophisticated, Iran-linked spear-phishing operation that exploited a compromised Ministry of Foreign Affairs (MFA) mailbox in Oman to deliver malicious payloads to government entities worldwide. Analysts attribute the operation to the “Homeland Justice” group, believed to be aligned with Iran’s Ministry of Intelligence and Security (MOIS). Leveraging stolen diplomatic communications, encoded macros, […]

    The post Iran-Nexus Hackers Impersonate Omani MFA to Target Governments Entities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybercriminals are deploying increasingly sophisticated methods to bypass security systems, with the latest threat emerging from the advanced Tycoon phishing-as-a-service kit.

    This malicious platform has introduced novel techniques designed to obscure dangerous links, making them nearly invisible to traditional detection systems while maintaining their effectiveness against unsuspecting victims.

    The Tycoon phishing kit represents a significant evolution in email-based attacks, leveraging carefully crafted voicemail messages and fake accounting service notifications to lure targets.

    Carefully crafted and tailored voicemail messages (Source – Barracuda)

    Unlike conventional phishing campaigns that rely on obvious malicious indicators, Tycoon employs advanced URL encoding and structural manipulation techniques that fundamentally alter how links appear to both security tools and human recipients.

    Barracuda analysts identified the emergence of these sophisticated evasion tactics during recent investigations into credential-stealing campaigns.

    The researchers discovered that attackers are now combining multiple obfuscation methods to create hybrid threats that challenge existing security paradigms.

    The most concerning aspect of Tycoon’s approach involves its use of URL-encoding techniques that insert invisible spaces using the ‘%20’ code throughout web addresses.

    This method pushes malicious components beyond the scanning range of automated security systems while maintaining functional links for victims who click them.

    The technique also incorporates Unicode symbols that visually resemble standard punctuation but possess entirely different underlying code structures.

    The core innovation within Tycoon’s arsenal lies in its Redundant Protocol Prefix technique, which creates partially hyperlinked URLs containing deliberate structural inconsistencies.

    Attackers craft addresses featuring duplicate protocol declarations or missing essential components, such as incorporating two ‘https’ prefixes or omitting the standard ‘//’ separator.

    This manipulation ensures that security scanners encounter parsing errors while browsers still interpret the functional portions correctly.

    Consider this example implementation:-

    hxxps:office365Scaffidips[.]azgcvhzauig[.]es\If04

    In this structure, everything preceding the ‘@’ symbol appears legitimate to recipients, featuring trusted brand references like ‘office365’.

    However, the actual destination follows the ‘@’ symbol, directing victims to attacker-controlled infrastructure. The technique exploits browser interpretation protocols that treat pre-‘@’ content as user authentication information rather than the primary destination.

    Credential-stealing phishing page (Source – Barracuda)

    The subdomain abuse component further enhances the deception by creating seemingly legitimate Microsoft-affiliated addresses.

    While ‘office365Scaffidips’ suggests official Microsoft infrastructure, the true destination ‘azgcvhzauig.es’ represents a completely separate, malicious domain designed for credential harvesting.

    These evolving techniques demonstrate how modern phishing operations are adapting to security improvements, requiring organizations to implement multilayered defense strategies incorporating artificial intelligence and machine learning capabilities to identify these sophisticated threats effectively.

    Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    The post Tycoon Phishing Kit Employs New Technique to Hide Malicious Links appeared first on Cyber Security News.

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Under what legal auspices did the White House order Tuesday’s deadly strike on a speedboat off South America? More than 24 hours after the attack on what President Trump claims were eleven “Tren de Aragua Narcoterrorists…transporting illegal narcotics, heading to the United States,” military leaders still aren’t sure, or they’re not saying publicly just yet. 

    “Pentagon officials were still working Wednesday on what legal authority they would tell the public was used to back up the extraordinary strike in international waters,” the New York Times reported Wednesday evening. 

    “Instead of interdicting it, on the president’s orders, we blew it up,” Secretary of State Marco Rubio told reporters Wednesday when asked about the incident during a trip to Mexico City. It’s not clear from the incident video Trump shared that the U.S. military conducted any search of the boat it destroyed or the people it killed on Tuesday. 

    Rubio on Tuesday: “These particular drugs were probably headed to Trinidad or some other country in the Caribbean.”

    On Wednesday, he changed his story, telling reporters that the boat was headed for the United States but offering no evidence for this new claim. Rubio added that “the President, under his authority as Commander-in-Chief, has a right under exigent circumstances [which means a warrantless search] to eliminate imminent threats to the United States, and that’s what he did yesterday in international waters, and that’s what he intends to do” in the future. 

    Trump on Wednesday: “We have tapes of them speaking.” To our knowledge, those tapes have not been released publicly. “In fact, you see it, you see the bags of drugs all over the boat, and they were hit,” he told reporters. Bags are visible in the video, but what’s inside them is not at all clear. What’s more, the Times reported, “A Defense Department official questioned whether a boat that size could hold 11 people,” as the Trump administration alleges. 

    SecDef Hegseth: “We knew exactly who was in that boat. We know exactly what they were doing, and we knew exactly who they represented,” he said on “Fox & Friends” on Wednesday. He offered no evidence to support his claim.  

    Capitol Hill reax: “The administration has not identified the authority under which this action was taken, raising the question of its legality and constitutionality,” said Rep. Adam Smith, D-Washington. The questions this episode raises, Smith added, are “even more concerning. Does this mean Trump thinks he can use the U.S. military anywhere drugs exist, are sold, or shipped? What is the risk of dragging the United States into yet another military conflict?”

    Former Pentagon counsel Ryan Goodman effectively concurred with Smith, writing Wednesday on social media, “I worked at [the Department of Defense]. I literally cannot imagine lawyers coming up with a legal basis for [the] lethal strike of [a] suspected Venezuelan drug boat. Hard to see how this would not be ‘murder’ or war crime under international law that DoD considers applicable.”

    Colombia’s President Gustavo Petro also said it looks like “murder,” writing on social media Wednesday, “If this is true, it is a murder anywhere in the world. We have been capturing civilians who transport drugs for decades without killing them.”

    Notable: The U.S. War Crimes Act criminalizes murder, which is defined as the “act of a person who intentionally kills, or conspires or attempts to kill, or kills whether intentionally or unintentionally in the course of committing any other offense under this subsection, one or more persons taking no active part in the hostilities, including those placed out of combat by sickness, wounds, detention, or any other cause.”

    Dive deeper: Former State Department counsel Brian Finucane assessed several angles of the boat strike in an analysis piece published Wednesday in Just Security. He calls the attack “an unnecessary and performative use of the U.S. military,” and one “that is legally fraught at best,” similar to Trump’s decision to send U.S. troops into American cities like Washington, D.C., and Los Angeles. Here are a few more observations from Finucane: 

    • “The use of lethal force was used in the first resort…to send a message. Such use of lethal force raises a number of distinct legal issues.”
    • “Despite labelling the targets ‘narcoterrorists,’ there is no plausible argument under which the principle legal authority for the U.S. so-called ‘war on terror’—the 2001 Authorization for the Use of Military Force—authorizes military action against the Venezuelan criminal entity Tren de Aragua.”
    • “Drug trafficking by itself does not constitute an ‘armed attack,’ nor a threat of an imminent armed attack, for the purposes in international law. Nor does drug trafficking represent the predicate for self-defense commonly recognized as required for the invocation of self-defense under criminal law in the United States.”
    • “In my view, the U.S. attack on this supposed smuggling vessel constituted the introduction of U.S. armed forces into hostilities, triggering both the reporting requirements of the War Powers Resolution as well as its 60-day clock for withdrawing U.S. forces…U.S. armed forces were deliberately introduced into the situation with the U.S. president himself reportedly giving the order to ‘blow up’ the supposed smuggling vessel.” Read Finucane’s analysis in full, here.  

    Update: The U.S. dispatched another guided-missile cruiser to the waters around Latin America. That would be the Navy’s USS Lake Erie, which was spotted four days ago entering the Caribbean from the Pacific Ocean, via the Panama Canal. 

    Already in the region: The Wasp-class amphibious assault ship Iwo Jima and the San Antonio-class amphibious transport dock ships San Antonio and USS Fort Lauderdale. Those “are operating off the coast of Puerto Rico as sailors and Marines from the 22nd MEU take part in an amphibious landing training exercise on the southern part of that island,” Howard Altman of The War Zone reported Wednesday. 

    There are at least four more warships nearby: USS Gravely, USS Jason Dunham, USS Sampson, and the fast attack submarine USS Newport News. 

    What may lie ahead: “Anyone else trafficking in those waters who we know is a designated narco-terrorist will face the same fate” as the four-engine speedboat, Pentagon chief Hegseth told “Fox & Friends” Wednesday. “It’s important to the American people to protect our homeland and protect our hemisphere.” 


    Welcome to this Thursday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 1998, Larry Page and Sergey Brin founded Google. 

    The future of the National Guard

    After objections in Illinois, Trump says he could send National Guard troops to New Orleans, where the state’s governor is also a Republican, like Trump. “We’re making a determination now, do we go to Chicago, or do we go to a place like New Orleans?” the president told reporters Wednesday. 

    Louisiana Gov. Jeff Landry replied: “We will take President [Trump]’s help from New Orleans to Shreveport!”

    For the record: “Landry doesn’t have to wait for Trump if he wants National Guard troops in New Orleans,” the Wall Street Journal reports, citing law professor Steve Vladeck. “The governor can just call out the Louisiana national guard to perform whatever services are necessary. There’s no need for federal intervention,” Vladeck said. 

    Background: Trump’s use of National Guard and Marines in Los Angeles this past June violated the Posse Comitatus Act, a federal judge said Tuesday in a 52-page opinion (PDF). The “defendants instigated a months-long deployment of the National Guard and Marines to Los Angeles for the purpose of establishing a military presence there and enforcing federal law…There were indeed protests in LosAngeles, and some individuals engaged in violence. Yet there was no rebellion, nor was civilian law enforcement unable to respond to the protests and enforce the law.” 

    “Such conduct is a serious violation of the Posse Comitatus Act,” he wrote, and warned, “Los Angeles was the first US city where President Trump and Secretary Hegseth deployed troops, but not the last.” 

    Update: About 140 unmarked vehicles have entered the largest military installation in Illinois, Naval Station Great Lakes, located just north of Chicago, the Sun-Times reported Wednesday. Officials are also hoping to “establish a no-fly zone to keep away news helicopters and drones that aren’t already prohibited from flying in the area.”

    Context: “Trump highlighted a surge in gun violence in Chicago over the weekend, framing himself as a savior who can quickly solve an intractable problem,” the Sun-Times reports. But “The deployment, and threats of the National Guard, come as a WBEZ analysis has found that a three-month summer span saw the fewest murders in 60 years in Chicago while overall violent crime remained near its lowest point in at least four decades.”

    Additional reading: 

    Industry

    The jets were late. Lockheed got on-time bonuses anyway. The maker of F-35 jets is getting paid for on-time delivery, even though it’s not delivering the aircraft on time and without the required upgrades, a government watchdog agency said. “The F-35 program office compensated Lockheed Martin with hundreds of millions of dollars of performance incentive fees while the percentage of aircraft delivered late and the average days late grew,” according to a new report from the Government Accountability Office. Defense One’s Audrey Decker has more, here

    The infantry is getting AI tools to spot incoming threats, the Wall Street Journal reports off a $98.9 million contract between the U.S. Army and TurbineOne, a four-year-old San Francisco startup. “TurbineOne’s software runs on soldiers’ laptops, smartphones and drones, eliminating the need for a steady cloud connection. The AI application equips individual soldiers with the ability to quickly identify enemy threats, such as a drone-launch site or concealed troop position, and the context needed to decide how to respond without relying on analysts sitting miles away.” Read on, here.

    Additional reading: Oak Ridge is using diamonds to marry quantum, classical computers,” our sister site Nextgov reported Wednesday. 

    China’s military parade

    Chinese leader Xi Jinping staged a giant military parade that marked the public debut of several new weapons. Washington Post: “China’s ambitions to rival the United States militarily—and gain the edge in a potential war over Taiwan—were laid bare Wednesday when Beijing displayed a breathtaking array of advanced new weaponry…” Among them were a new ICBM, a light tank, 65-foot unmanned submarines, and more.

    Find the Post’s multimedia list of the new arms on display, here, and another one from the New York Times, here.

    Salt Typhoon update: China’s “unrestrained” hacking group may have stolen information from nearly every American, officials said. “I can’t imagine any American was spared given the breadth of the campaign,” Cynthia Kaiser, a former top official in the F.B.I.’s cyber division, who oversaw investigations into the hacking, told the New York Times. Read on, here.

    Related reading:

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶