• The Pentagon launched its first experimental navigation satellite in nearly 50 years, aiming to test out new technology that could shape future military GPS programs. 

    United Launch Alliance’s new Vulcan rocket launched the Navigation Technology Satellite-3 from Cape Canaveral, Florida, on Tuesday. The satellite will test new anti-spoofing signals, a steerable phased-array antenna to send signals to ground forces in high-jamming areas, and receivers to help the satellite operate without instructions from ground controllers, Joanna Hicks, a senior research aerospace engineer at the Air Force Research Laboratory, told reporters Monday ahead of the launch.

    The Pentagon and AFRL spent about $250 million to develop the NTS-3 satellite and the ground system, and L3Harris was the prime contractor for the program. 

    The satellite was built to be reprogrammed from the ground, “so we don't have to have everything planned out before we go on orbit and before we see what the threats are,” Hicks said.

    The program aims to build resiliency in the military’s GPS constellation, but also to pave the way for new position, navigating, and timing capabilities. Most of the service’s PNT satellites are in medium-Earth orbit, but NTS-3 will be sent to geostationary-Earth orbit to experiment with different positioning for the mission. 

    “One of the things that NTS-3 is testing…is the multi-orbit constellation concept. So can we receive signals from NTS-3 at GEO as well as GPS at MEO, and take advantage of all of them? Maybe in the future, we'll be able to put some of these technologies in [low-Earth orbit], for example. We don't currently have that as a planned mission, but that's something that could conceivably happen in the future,” Hicks said.

    The last experimental navigation satellite was launched almost 50 years ago, Hicks said: “At the lab, we think that we are overdue for an experiment in this area.”

    The mission was supposed to launch in 2022, but delays with ULA’s Vulcan pushed it to this year. During that downtime, Hicks said the program added capabilities and experimental signals: “We've really been able to take advantage of that and make sure that we are ready for the best possible experimental mission on orbit.”

    The team expects to start collecting data within a few weeks, and the entire mission will last about a year. AFRL doesn’t plan on using the satellite in actual operations after the year is up, but they are working with “some organizations to talk about how they might use leftover capabilities for testing,” Hicks said.

    Tuesday’s launch also marks a milestone for ULA: it’s the first national-security mission to fly on the company’s new heavy-lift Vulcan rocket. The rocket has been late to launch due to development problems and certification delays after material broke off one of the solid rocket boosters during its second flight in October. 

    Vulcan was supposed to launch four Space Force missions last year, but that was reduced to two and pushed to this year. The company aims to launch twice a month, with a combination of Vulcan and Atlas rockets, by the end of the year—facing pressure to clear a backlog of missions that have stacked up due to Vulcan delays. Tuesday’s launch is the first of 25 launches the Space Force has ordered from ULA in phase two of the National Security Space Launch program. 

    “We obviously have a backlog of missions that we're working through…I will say that we're ready and postured to launch as quickly as we can as we work through that backlog,” said Col. Jim Horne, Space Systems Command mission director. 

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Apple Podcasts

    Guest:

    • Journalist and writer Kevin Maurer, whose work focuses on U.S. special operations forces around the world.

    Read Maurer's report for Rolling Stone, “Here's What Trump's Mexico Invasion Plan Could Look Like.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • New research has uncovered Docker images on Docker Hub that contain the infamous XZ Utils backdoor, more than a year after the discovery of the incident. More troubling is the fact that other images have been built on top of these infected base images, effectively propagating the infection further in a transitive manner, Binarly REsearch said in a report shared with The Hacker News. The firmware

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Cybersecurity researchers are warning of a “significant spike” in brute-force traffic aimed at Fortinet SSL VPN devices. The coordinated activity, per threat intelligence firm GreyNoise, was observed on August 3, 2025, with over 780 unique IP addresses participating in the effort. As many as 56 unique IP addresses have been detected over the past 24 hours. All the IP addresses have been

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers, as ShinyHunters and Scattered Spider appear to be working hand in hand, new findings show. “This latest wave of ShinyHunters-attributed attacks reveals a dramatic shift in tactics, moving beyond the group’s previous credential theft and database

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The president’s Monday declaration of a “crime emergency” in Washington, D.C.—notwithstanding most crimes’ decline from a post-pandemic peak—will further entangle the U.S. military, its equipment, and technology, in law-enforcement matters. It could also expose D.C. residents and visitors to unprecedented digital surveillance, Defense One’s Patrick Tucker reports. 

    A similar turn of events happened in June 2020, when the National Guard was sent into the streets of U.S. cities amid protests of police brutality. “Stingrays” and “dirtbags” were deployed to track cellphones. And spyplanes and Predator drones traced the skies, a world away from the war zones they were built for. 

    Now, with federal agencies and entities working with military personnel under declared-emergency circumstances, new gear could enter domestic use, Tucker writes. And local officials or the civilian review boards that normally oversee police use of such technologies may lack the power to prevent or even monitor it. For example, in 2021, the D.C. government ended a facial-recognition pilot program after police used it to identify a protester at Lafayette Square. But local prohibitions don’t apply to federalized or military forces. Read more, here.

    ICYMI: Trump federalized the DC police, and declared an emergency as crime hit a 30-year low. Defense One’s sister publication, GovExec explains. The New York Times and Associated Press have more.

    Anatomy of a decision: Trump had long planned a takeover, the Washington Post reported Tuesday morning, with “an informal playbook for how he would use the powers of the presidency to take control of the District of Columbia, with options prepared for him such as deploying more federal law enforcement officers or taking over the entire municipal government.”

    Developing: Pentagon mulls military “reaction force” for civil unrest. A “Domestic Civil Disturbance Quick Reaction Force” of 600 National Guard troops—split between military bases in Alabama and Arizona—would be kept ready to deploy in as little as one hour to American cities facing protests or other unrest, according to documents reviewed by the Post’s Matt Viser, Emily Davies and Perry Stein. The documents say the cost could reach “hundreds of millions of dollars” if military aircraft and aircrews are used instead of cheaper charter aircraft.

    The proposal “represents another potential expansion of President Donald Trump’s willingness to employ the armed forces on American soil. It relies on a section of U.S. Code that allows the commander in chief to circumvent limitations on the military’s use within the United States,” the Post reports. More, here.  

    Related reading:


    Welcome to this Tuesday edition of The D Brief, a newsletter dedicated to developments affecting the future of U.S. national security, brought to you by Ben Watson with Bradley Peniston. Share your tips and feedback here. And if you’re not already subscribed, you can do that here. On this day in 2017, 32-year-old Heather Heyer was killed and nearly three dozen others were wounded at a rally of white supremacists in Charlottesville, Virginia, that turned violent when one drove his car into a crowd of counter-protesters.

    Russian troops charge ahead

    Ahead of his Friday summit with Trump in Alaska, Vladimir Putin’s invasion forces advanced another six miles or so in Ukraine’s east, toward ​​Dobropillya in Donetsk, almost fully encircling a Ukrainian logistical hub at Pokrovsk. 

    “The advance is one of the most dramatic in the last year,” Reuters reports. “Ukrainian troops must pass through a narrow 10-mile corridor to enter [Pokrovsk], leaving them vulnerable to drone attacks,” the New York Times reports.

    How it happened: “the Russians found a gap in Ukrainian lines this week after weeks of probing attacks, and then used their vast reserves of manpower to break through the lines,” a Ukrainian officer told the Wall Street Journal. Analysts at the Washington-based Institute for the Study of War noted parallels to previous recent gains for Moscow: “Russian forces used a similar tactical penetration in mid-April 2024 to facilitate the seizure of operationally significant territory northwest of Avdiivka,” ISW wrote Monday. 

    However, “It is premature to call the Russian advances in the Dobropillya area an operational-level breakthrough, though Russian forces very likely seek to mature their tactical advances into an operational-level breakthrough in the coming days,” ISW’s analysts write. “The next several days in the Pokrovsk area of operations will likely be critical for Ukraine’s ability to prevent accelerated Russian gains north and northwest of Pokrovsk.” Read more, here

    New: Officials in Ukraine have successfully tested a new direct-to-cell satellite technology from Elon Musk’s Starlink, Reuters reported Tuesday. The new gear “aims to provide reliable connectivity when terrestrial networks are unavailable, a critical asset for war-torn Ukraine where Russian attacks on infrastructure regularly disrupt communications,” the wire service explains. “Space X-owned Starlink has signed deals with telcos in 10 countries for a direct-to-cell service, with Kyivstar set to become the first operator in Europe to roll it out.” Read more, here. 

    Developing: Russia’s Geran drones are allegedly laying anti-tank mines along “an unspecified logistics route in Ukraine,” ISW warned in its Monday assessment. The War Zone has more on the video purporting to show the drones at work, here.  

    Developing: Trump says he’s preparing to discuss territorial changes for Ukraine at Friday’s summit with Putin in Alaska. “Russia has occupied a big portion of Ukraine…We’re going to try and get some of that territory back for Ukraine,” Trump told reporters Monday. Politico has a tiny bit more.And in commentary:This isn’t how wars are ended: a veteran diplomat puts Trump-Putin summit in context,” via Donald Heflin of Tufts University, speaking Monday to The Conversation.

    Pacific region

    South Korea's military is more than 20% smaller than it was six years ago, Reuters reported Sunday citing a new report from Seoul’s defense ministry. There were about 450,000 troops in uniform last month, down from 560,000 in 2019. 

    What’s going on: There are far fewer men of enlistment age across the country, and South Korea has the world’s lowest birth rate. As a result, “the military is 50,000 troops short of the number of troops adequate for maintaining defence readiness,” Reuters reports. 

    Developing: America’s acting ambassador to Seoul is visiting Hyundai’s shipyards in Ulsan with Foreign Minister Cho Hyun on Wednesday, Yonhap news agency reports. Trump is expected to meet with Seoul’s new President Lee Jae Myung in Washington on August 25. 

    China is about to merge two state-run shipbuilders to create the world’s largest, the Wall Street Journal reported Monday. The new entity is the result of combining China State Shipbuilding with another entity called China Shipbuilding Industry. The two companies totaled about 17% of the world market for shipbuilding, with an annual revenue of around $18 billion. 

    “CSSC’s main business is commercial, but it is also an important contractor for the Chinese navy,” the Journal notes. “The company it is absorbing designed and built China’s first homegrown aircraft carrier, the Shandong.”

    By the way: Two Chinese ships collided while trying to harass Philippine Coast Guard vessels in the South China Sea on Monday. A Chinese cutter and guided-missile destroyer ran into each other in a confrontation captured on video that you can see on YouTube, here. USNI News called it “one of the most severe incidents among Chinese forces to date,” and “the most severe incident to occur between the two countries since last year’s June 17th incident, when the two countries clashed at Second Thomas Shoal.” Read more, here

    Additional reading:Documents detail China's AI-powered propaganda push,” Nextgov reported Monday, citing the work of Vanderbilt University researchers. 

    Around the Defense Department

    Coast Guard commissions first new icebreaker since the 1990s, USNI News reports. The medium icebreaker USCGC Storis (WAGB-21) was commissioned Saturday in a ceremony in Juneau, Alaska, joining the only two other U.S. icebreakers: Healy (WAGB-20) and Polar Star (WAGB-10).

    The Coast Guard needs about nine to do the job properly, officials have testified. Get up to speed with the Congressional Research Service’s January report.

    Additional reading:

    Lastly today: The Air Force wants to buy two Tesla Cybertrucks for target practice. “Testing needs to mirror real world situations,” said one document cited by Fortune. “The intent of the training is to prep the units for operations by simulating scenarios as closely as possible to the real world situations.” Read on, here.

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova as part of a cyber espionage campaign designed to facilitate long-term access to target networks. “They repeatedly tried to extract the NTDS database from domain controllers — the primary repository for user password hashes and authentication data in a Windows network,”

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • Most security tools can’t see what happens inside the browser, but that’s where the majority of work, and risk, now lives. Security leaders deciding how to close that gap often face a choice: deploy a dedicated Enterprise Browser or add an enterprise-grade control layer to the browsers employees already use and trust. The Ultimate Battle: Enterprise Browsers vs. Enterprise Browser Extensions

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • The Dutch National Cyber Security Centre (NCSC-NL) has warned of cyber attacks exploiting a recently disclosed critical security flaw impacting Citrix NetScaler ADC products to breach organizations in the country. The NCSC-NL said it discovered the exploitation of CVE-2025-6543 targeting several critical organizations within the Netherlands, and that investigations are ongoing to determine the

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

  • President Trump’s declaration of a “crime emergency” in Washington, D.C., will further entwine the U.S. military—and its equipment and technology—in law-enforcement matters, and perhaps expose D.C. residents and visitors to unprecedented digital surveillance. 

    Brushing aside statistics that show violent crime in D.C. at a 30-year low, Trump on Monday described a new level of coordination between D.C. National Guard units and federal law enforcement agencies, including the FBI, ICE, and and the newly federalized D.C. police force

    “We will have full, seamless, integrated cooperation at all levels of law enforcement, and will deploy officers across the district with an overwhelming presence. You'll have more police, and you'll be so happy because you're being safe,” he said at a White House press conference. 

    Defense Secretary Pete Hegseth, standing beside Trump, promised close collaboration between the Pentagon and domestic authorities. “We will work alongside all DC police and federal law enforcement to ensure this city is safe.” 

    What comes next? The June 2020 deployment of National Guard units to work alongside D.C. police offers a glimpse: citywide use of sophisticated intelligence-gathering technologies normally reserved for foreign war zones.

    Some surveillance platforms will be relatively easy to spot, such as spy aircraft over D.C.'s closely guarded airspace. In 2020, authorities deployed an RC-26B, a military-intelligence aircraft, and MQ-9 Predator drones. The FBI contributed a Cessna 560 equipped with “dirtboxes”: devices that mimic cell towers to collect mobile data, long used by the U.S. military to track terrorist networks in the Middle East.

    Other gear will be less obvious.The 2020 protests saw expanded use of Stingrays, another type of cellular interception device. Developed to enable the military to track militants in Iraq and Afghanistan, Stingrays were used by the U.S. Secret Service in 2020 and 2021 in ways that the DHS inspector general found broke the law and policies concerning privacy and warrants. Agency officials said “exigent” circumstances justified the illicit spying.

    Now, with federal agencies and entities working with military personnel under declared-emergency circumstances, new gear could enter domestic use. And local officials or the civilian review boards that normally oversee police use of such technologies may lack the power to prevent or even monitor it. In 2021, the D.C. government ended a facial-recognition pilot program after police used it to identify a protester at Lafayette Square. But local prohibitions don’t apply to federalized or military forces. 

    Next up: AI-powered surveillance 

    How might new AI tools, and new White House measures to ease sharing across federal entities, enable surveillance targeting?

    DHS and its sub-agencies already use AI. Some tools—such as monitoring trucks or cargo at the border for contraband, mapping human trafficking and drug networks, and watching the border—serve an obvious public-safety mission. Last year, DHS used AI and other tools to identify 311 victims of sexual exploitation and to arrest suspected perpetrators. They also helps DHS counter the flow of fentanyl; last October, the agency cited AI while reporting a 50 percent increase in seizures and an 8 percent increase in arrests.

    TSA uses facial recognition across the country to match the faces and documents of airline passengers entering the United States in at least 26 airports, according to 2022 agency data. The accuracy has improved greatly in the past decade, and research suggests even better performance is possible: the National Institute of Standards and Technology has shown that some algorithms can achieve 99%-plus accuracy under ideal conditions. 

    But conditions are not always ideal, and mistakes can be costly. “There have been public reports of seven instances of mistaken arrests associated with the use of facial recognition technology, almost all involving Black individuals. The collection and use of biometric data also poses privacy risks, especially when it involves personal information that people have shared in unrelated contexts,” noted a Justice Department report in December. 

    On Monday, Trump promised that the increased federal activity would target “known gangs, drug dealers and criminal networks.” But network mapping—using digital information to identify who knows who and how—has other uses, and raises the risk of innocent people being misidentified. 

    Last week, the ACLU filed a Freedom of Information Act request concerning the use of two software tools by D.C.’s Homeland Security and Emergency Management Agency. Called Cobwebs and Tangles, the tools can reveal sensitive information about any person with just a name or email address, according to internal documents cited in the filing.

    Cobwebs shows how AI can wring new insights from existing data sources, especially when there are no rules to prohibit the gathering of large stores of data. Long before the capability existed to do it effectively, this idea was at the center of what, a decade ago, was called predictive policing

    The concept has lost favor since the 2010s, but many law-enforcement agencies still pursue versions of it. Historically, the main obstacle has been too much data, fragmented across systems and structures. DHS has legal access to public video footage, social media posts, and border and airport entry records—but until recently, these datasets were difficult to analyze in real time, particularly within legal constraints.

    That’s changing. The 2017 Modernizing Government Technology Act encouraged new software and cloud computing resources to help agencies use and share data more effectively, and in March, an executive order removed several barriers to interagency data sharing. The government has since awarded billions of dollars to private companies to improve access to internal data.

    One of those companies is Palantir, whose work was characterized by the New York Times as an effort to compile a “master list” of data on U.S. citizens. The firm disputed that in a June 9 blog post: “Palantir is a software company and, in the context of our customer engagements, operates as a ‘data processor’—our software is used by customers to manage and make use of their data.”

    In a 2019 article for the FBI training division, California sheriff Robert Davidson envisioned a scenario—now technologically feasible—in which AI analyzes body-camera imagery in real time: “Monitoring, facial recognition, gait analysis, weapons detection, and voice-stress analysis all would actively evaluate potential danger to the officer. After identification of a threat, the system could enact an automated response based on severity.”

    The data DHS collects extends well beyond matching live images to photos in a database or detecting passengers’ emotional states. ICE’s Homeland Security Investigations unit, for instance, handles large volumes of multilingual email. DHS describes its email analytics program as using machine learning “for spam classification, translation, and entity extraction (such as names, organizations, or locations).”

    Another DHS tool analyzes social-media posts to gather “open-source information on travelers who may be subject to further screening for potential violation of laws.” The tool can identify additional accounts and selectors, such as phone numbers or email addresses, according to DHS documentation.

    Meanwhile, ICE’s operational scope has expanded. The White House has increased the agency’s authority to operate in hospitals and schools, collect employment data—including on non-imigrants, such as “sponsors” of unaccompanied minors—and impose higher penalties on individuals seen as “interfering” with ICE activities. Labor leaders say they’ve been targeted for their political activism. Protesters have been charged with assaulting ICE officers or employees. ICE has installed facial-recognition apps on officers’ phones, enabling on-the-spot identification of people protesting the agency’s tactics. DHS bulletins sent to local law enforcement encourage officers to consider a wide range of normal activity, such as filming police interactions, as potential precursors to violence.

    Broad accessibility of even legally collected data raises concerns, especially in an era where AI tools can derive specific insights about people. But even before these developments, government watchdogs urged greater transparency around domestic AI use. A December report by the Government Accountability Office includes several open recommendations, mostly related to privacy protections and reporting transparency. The following month, DHS’s inspector general warned that the agency doesn’t have complete or well-resourced oversight frameworks. 

    In June, Sen. Ed Markey, D-Mass., and several co-signers wrote to the Trump White House, “In addition to these concerning uses of sentiment analysis for law enforcement purposes, federal agencies have also shown interest in affective computing and deception detection technologies that purportedly infer individuals’ mental states from measures of their facial expressions, body language, or physiological activity.” 

    The letter asks the GAO to investigate what DHS or Justice Department policies govern AI use and whether those are being followed. Markey’s office did not respond to a request for comment.

    Writing for the American Immigration Council in May, Steven Hubbard, the group’s senior data scientist, noted that of DHS’ 105 AI applications, 27 are “rights-impacting.”

    “These are cases that the OMB, under the Biden administration, identified as impacting an individual’s rights, liberty, privacy, access to equal opportunity, or ability to apply for government benefits and services,” Hubbard said.

    The White House recently replaced Biden-era guidance on AI with new rules meant to accelerate AI deployment across the federal government. While the updated guidelines retain many safety guardrails, they do include some changes, including merging “privacy-impacting” and “safety-impacting” uses of AI into a single category: “high impact.”

    The new rules also eliminate a requirement for agencies to notify people when AI tools might affect them—and to offer an opt-out.

    Precedents for this kind of techno-surveillance expansion can be found in countries rarely deemed models for U.S. policy. China and Russia have greatly expanded surveillance and policing under the auspices of security. China operates an extensive camera network in public spaces and centralizes its data to enable rapid AI analysis. Russia has followed a similar path through its “Safe Cities” program, integrating data feeds from a vast surveillance network to spot and stop crime, protests, and dissent.

    So far, the U.S. has spent less than these near-peers, as a percent of GDP, on surveillance tools, which are operated under a framework, however strained, of rule-of-law and rights protections that can mitigate the most draconian uses.

    But the distinction between the United States and China and Russia is shrinking, Nathan Wessler, deputy director with the ACLU’s Speech, Privacy, and Technology Project, said in July. “There's the real nightmare scenario, which is pervasive tracking of live or recorded video, something that, by and large, we have kept at bay in the United States. It’s the kind of thing that authoritarian regimes have invested in heavily.” 

    Wessler noted that in May, the Washington Post reported that New Orleans authorities were applying facial recognition to live video feeds. “At that scale, that [threatens to] just erase our ability to go about our lives without being pervasively identified and tracked by the government.”

    ]]>

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶

    ¶¶¶¶¶