"To accelerate current weapons development timelines, DARPA is considering an alternative development paradigm to increase the nation's magazine depth and breadth."
Number one is speed takes priority over perfection. We can iterate to get to operational capability. And the second is that early soldier feedback is critical in order to make sure we're getting the right technology for the future fight, and then we want to be able to prove the demand signal before we spend big dollars on programs.
CENTCOM's Task Force Scorpion Strike-for the first time in history-is using one-way attack drones in combat during Operation Epic Fury. These low-cost drones, modeled after Iran's Shahed drones, are now delivering American-made retribution.
Early on a spring morning, camouflaged trucks carrying the US-made terminal high-altitude area defense (THAAD) missile-defence system rolled into Seongju, as the country's government ignored protests from locals who said the deployment would make them a target for Pyongyang's ballistic missiles. The conservative government in Seoul, backed by Washington, insisted that Thaad was the most effective way to locate and destroy North Korean missiles before they threatened the South and the 28,500 US troops stationed there.
If Washington respects our country's current status as stipulated in the Constitution and withdraws its hostile policy there is no reason why we cannot get along well with the United States. Our status as a nuclear-armed country plays an important role in deterring enemies' potential threats and maintaining regional stability.
Much like the war in Ukraine, future battlefields could be drowning in electronic interference, so the US Army stress-tested new command-and-control tech against that threat. The need to maintain connections between command and deployed weapons and crews, or reestablish those links when they're lost, is shaping how soldiers train on the service's Next Generation Command and Control, a new software-driven system that's being developed for the Army.
Attackers place malicious QR codes in high-traffic areas, often disguised as legitimate promotional materials or utility services. Physical mail containing QR codes purporting to be from legitimate services, particularly effective for package delivery and financial service scams. While QR codes represent a small percentage, their unique evasion capabilities and growing adoption rates make them vectors with huge latent potential.
The report catalogues a relentless barrage of cyber operations, most by state-sponsored groups, against EU and US industrial supply chains. It suggests the range of targets for these hackers has grown to encompass the broader industrial base of the US and Europe from German aerospace firms to UK carmakers. State-linked hackers have long targeted the global defence industry, but Luke McNamara, an analyst for Google's threat intelligence group, said they had seen more personalised and direct to individual targeting of employees.
South Korea hosts about 28,500 US troops in combined defence against North Korea's military threat and Seoul has raised its defence budget by 7.5% for this year. South Korea is capable of taking primary responsibility for deterring North Korea with critical but more limited US support, said the National Defense Strategy, a document that guides the Pentagon's policies. This shift in the balance of responsibility is consistent with America's interest in updating US force posture on the Korean Peninsula, the document added.
OPINION - The 2026 National Defense Strategy (NDS) follows closely the 2025 National Security Strategy, as it should. It also falls in line with the Department of Defense's narrative and the actions they have taken regarding priorities. The NDS has four lines of effort: Defending the U.S. Homeland - Homeland defense is the top priority, with the Western Hemisphere elevated above other regions. This includes border security, open lines of transportation (Panama Canal and Greenland), counter-narcotics operations, and countering adversary influence.