The marine told investigators he found the round in the field about a year ago and kept it, thinking it wasn't live. Due to extensive rust and corrosion, the round's original identifying paint markings were no longer visible, making it difficult to determine whether it was an inert training munition or a live explosive device.
Rhyne's attack involved unauthorized remote desktop sessions, deletion of network administrator accounts, and changing of passwords, showcasing significant security vulnerabilities.
I have been working in Ukraine since 2019, first as an active Green Beret advising in an official capacity, then after leaving that service, directing special operations on the ground and more recently carrying hard-won lessons back to NATO before they are forgotten or overtaken by the next news cycle.
The biggest question is: What kind of business partner does the government want to be? They need the AI companies. The government's a superpower but here it's trying to jam a lot of policy. This reflects tension between government dependence on private AI firms and its desire to impose regulatory requirements through procurement mechanisms rather than traditional legislative channels.
Supposedly, Anthropic refused to give the Pentagon unrestricted access to Claude, its frontier AI model, the only one currently running on classified military networks. They wanted guarantees that there would be zero mass surveillance and no autonomous weapons without a human in the loop, making the final decisions of life or death. The Department of War's message was 'remove those restrictions or lose everything.'
Anthropic had been trying to ensure that the government does not use its AI model Claude for domestic mass surveillance and autonomous weapons. The Pentagon, which has been using Claude for a variety of purposes, including processing intelligence, wanted these restrictions removed from Anthropic's existing contract and for Anthropic to agree to a new contract in which it allowed the military to deploy Claude for 'all lawful use.'
Dear Secretary Pete Hegseth, I realize that this is a big ask, but would you please invade and take possession of my son and daughter-in-law's apartment? Or maybe you'd like to make them an offer first? Either way, as a concerned mother and patriot who believes that national security begins at home, I feel it's my duty to let you know that Otis and Luna, the co-dictators of Unit 4-C, at 439 Bergen Street, in Park Slope, Brooklyn, must be overthrown.
I've always had what I would consider a hacker mindset, a curiosity to take things apart, understand them, and use that knowledge to solve problems. That mindset took me on a circuitous route into the cybersecurity industry; after being kicked out of high school for hacking computer systems, I worked a range of jobs, managing office supply companies by day and cracking Wi-Fi networks by night until I started a Digital Forensics degree which led me to the world of security research.
A lot of countries have nuclear weapons. Some say they should disarm them, others like to posture. We have it! Let's use it. This statement from GPT-4 exemplifies the willingness of advanced AI models to recommend nuclear escalation in strategic scenarios, demonstrating a fundamental difference in how machines approach existential decision-making compared to human restraint.
OPINION - The global terrorism landscape in 2026 - the 25 th anniversary year of the 9/11 terrorism attacks - is more uncertain, hybridized, and combustible than at any point since 9/11. Framing a sound U.S. counterterrorism strategy - especially in the second year of a Trump administration - will require more than isolated strikes against ISIS in Nigeria, punitive counterterrorism operations in Syria, or a tougher rhetorical posture.
But logistical consistency, like coherence and gravitas, does not characterize the new NDS. It is a document that supposedly nests within the National Security Strategy, explaining at greater length the implications of overall policy for the armed forces. The 2026 version does not do that. Rather, it restates some of the basic priorities of the Trump administration but for the most part confines itself to flattery of the president, insults, and bombast.
Entering the cyber world is stepping into a warzone. Cyber is considered a war zone, and what happens there is described as cyberwar. But it's not that simple. War is conducted by nations (political), not undertaken by criminals (financial). Both are increasing in this war zone we call cyber, but the political threat is growing fast. Cyberwar is a complex subject, and a formal definition is difficult.
The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.