The New Architecture of Conflict: Emerging Tactics, Strategic Vulnerabilities, and the Venture-Backed Defense Paradigm

The character of warfare in the mid-2020s has undergone a qualitative leap, transitioning from the industrial-age reliance on mass, concentrated force, and geographic objectives toward a multi-domain, algorithmic paradigm defined by speed, complexity, and cognitive dominance.1 This shift is not merely an evolution of existing technology but a fundamental reconfiguration of strategic art, where the boundaries between peace and war, civilian and military, and physical and digital have become porous.2 The emergence of Mosaic Warfare (MW) represents the conceptual cornerstone of this new era, reimagining military force as a collection of modular, decentralized components—similar to the pieces of a mosaic—integrated through artificial intelligence (AI) to achieve a unified effect without the fragility of monolithic platforms.2

The Doctrine of Mosaic Warfare and Multi-Domain Complexity

Mosaic Warfare constitutes a significant doctrinal innovation developed in response to the increasingly asymmetrical and complex security environment of the post-Cold War period.2 At its core, MW rejects the traditional reliance on "exquisite" and expensive platforms, such as aircraft carriers or stealth bombers, in favor of a vast network of smaller, "attritable" systems.2 This approach prioritizes decision-making speed and complexity over sheer physical mass, seeking to overload an adversary's decision cycle—frequently referred to as the OODA loop (Observe, Orient, Decide, Act)—until their battle rhythm becomes irrelevant.2

The operational realization of this doctrine relies on the transition from linear "kill chains" to "adaptive kill webs".6 In a traditional kill chain, the sequence from target detection to engagement is sequential and fragile; if a single link is severed, the entire operation fails.6 By contrast, a kill web utilizes fused data from a distributed battle network, where multiple sensors and effectors are interconnected in a non-linear fashion.6 If a primary sensor is jammed or destroyed, the network autonomously reconfigures to find an alternative data path, ensuring the lethal application of force remains resilient under fire.6

Doctrinal Component

Traditional Warfare Model

Mosaic Warfare Model

Strategic Implication

Command Structure

Centralized, Hierarchical

Decentralized, Algorithmic

Resilience against command-node decapitation 2

Force Package

Monolithic (e.g., Carrier Strike Group)

Modular (e.g., Distributed Drone Swarms)

Higher complexity for adversary targeting 2

Decision Logic

Human-centric, Sequential

AI-enabled, Parallel

Faster tempo than human cognition allows 2

Asset Philosophy

Exquisite, Irreplaceable

Attritable, Mass-produced

Ability to sustain high losses in high-intensity conflict 5

This new tactical environment is further defined by the convergence of electronic, cyber, and information warfare.2 Cognitive Electronic Warfare (Cognitive EW) exemplifies this trend, utilizing machine learning to adapt to dynamic, frequency-hopping adversary signals in microseconds—a speed far exceeding human capability.10 As the electromagnetic spectrum becomes the backbone of multi-domain operations, the ability to achieve "spectrum superiority" in real-time is now as decisive as maintaining air or sea control.10

Deep Vulnerabilities in Global Subsea Infrastructure

The global security architecture is increasingly dependent on a "soft underbelly" of subsea infrastructure that remains both vital and profoundly exposed.11 Over 95% of the world's internet traffic and roughly $10 trillion in daily financial transactions are transmitted via a network of approximately 1.5 million kilometers of subsea fiber-optic cables.11 These seabed networks, alongside subsea pipelines and energy connectors, have become primary targets for hybrid geopolitical activity, sabotage, and covert mapping by state actors.11

The physical vulnerability of these assets is systemic. Cables are often laid along predictable, publicly disclosed routes to avoid fishing and anchoring zones, yet this transparency facilitates intentional targeting.14 In the Baltic Sea and around Taiwan, a series of suspicious breakages in 2024 and 2025 involved China- or Russia-linked vessels with opaque ownership performing maneuvers such as loitering or "dark" operations with Automatic Identification Systems (AIS) disabled.13 The use of AIS spoofing and loitering has become a standard tactic for masking state-linked sabotage as accidental maritime incidents.11

Infrastructure Layer

Physical Vulnerability

Cyber/Digital Vulnerability

Strategic Consequence

Subsea Cables

Anchoring, Trawling, Covert Cutting

Digitized Landing Station Intrusions

Global communication and financial blackout 12

Subsea Pipelines

Underwater Explosives, Sabotage

SCADA/OT System Manipulation

Energy shortages and economic destabilization 12

Landing Stations

Vulnerable Coastal Entry Points

Targeted Phishing and Network Breaches

Regional network isolation and data interception 14

Repair Capacity

Limited to ~60 Specialized Vessels

Logistics and Deployment Disruption

Prolonged outages exceeding several weeks 12

A critical, yet often overlooked, vulnerability is the global repair bottleneck.12 With only about 60 specialized cable-repair vessels operating worldwide, a coordinated attack on multiple cables in separate regions could overwhelm available capacity, leading to months of degraded connectivity.12 Furthermore, subsea pipelines—such as the Nord Stream infrastructure—demonstrate that damage to underwater energy connectors can be used as a tool of economic coercion, creating cascading failures in the energy security of entire continents.12

Public Utilities and the Fragility of the Domestic Power Grid

The vulnerability of the United States' domestic infrastructure to both cyber and physical sabotage has emerged as a top-tier national security concern.16 The electric grid, in particular, relies on a fragile foundation of Large Power Transformers (LPTs). These enormous machines, weighing up to 400 tons, are custom-engineered and almost impossible to replace on short notice.17 Current lead times for manufacturing a single LPT range from 18 months to as long as four years, and the United States maintains only a handful of domestic facilities capable of producing them.17

Physical attacks on these assets are not hypothetical; coordinated strikes on substations in North Carolina in 2022 and plots against the Baltimore-area grid in 2023 underscore the risk.17 An adversary utilizing low-technology methods—such as high-powered rifles—could target a small number of LPTs simultaneously, plunging entire regions into darkness for months.17 Such a failure would lead to the collapse of healthcare, water treatment, and transportation services, demonstrating how domestic vulnerabilities can be leveraged for strategic effect without the need for sophisticated weaponry.17

Utility Sector

Primary Threat Vector

Systemic Weakness

Impact Potential

Electric Grid

Physical Sabotage of LPTs

Lack of Domestic Manufacturing 17

Regional blackouts lasting months 17

Water Supply

Cyberattacks on IoT/PLCs

"Target Rich but Cyber Poor" 18

Public health emergency; hospital closures 19

Solar Infrastructure

Zero-Day Inverter Flaws

Distributed, Insecure-by-Design Assets 18

Grid frequency instability and disruption 20

Energy Pipelines

Ransomware/OT Malware

SCADA Network Interconnectivity 21

Fuel shortages and economic panic 20

Water utilities present a similarly fragmented and vulnerable target profile. There are approximately 150,000 water facilities in the United States, many of which utilize legacy software and internet-exposed programmable logic controllers (PLCs).18 Hackers linked to Chinese state-sponsored groups, such as Volt Typhoon and Salt Typhoon, have been identified pre-positioning within these systems, preparing for potential conflicts where digital vulnerabilities could be turned into real-world disasters.18 In one instance, a cyberattack on American Water—the nation's largest regulated water utility—forced the disconnection of customer portals and billing systems, highlighting the ease with which critical services can be disrupted.18

The Rise of the Venture-Backed Defense Industrial Base

A significant shift is occurring in the composition of the defense industrial base, characterized by the emergence of a new generation of "modern primes".24 These venture-backed companies, often referred to as the "PayPal Mafia of Defense," are challenging the dominance of traditional contractors by prioritizing software-defined capabilities and rapid, iterative development.24 Companies such as Anduril Industries, Palantir Technologies, Shield AI, and Epirus are transforming the Pentagon's approach to procurement and operational technology.24

Company

Core Operating System/Platform

Key Mission/Program

Primary Responsibility

Anduril Industries

Lattice OS

Collaborative Combat Aircraft (CCA)

Autonomous multi-domain C2 and sensing 24

Palantir Technologies

Gotham, Foundry, AIP

TITAN (Tactical Intel Targeting Node)

Data fusion, targeting, and AI infrastructure 7

Shield AI

Hivemind SDK

AI-Piloted V-BAT and F-16 Surrogates

GPS-denied autonomy and AI piloting 24

Epirus

Leonidas HPM

Software-Defined Microwave Defense

High-power microwave counter-drone systems 24

Saronic

Mirage & Cipher USVs

Unmanned Surface Vessels

Autonomous maritime domain awareness and strike 25

Saildrone

Voyager & Explorer

Autonomous Ocean Data

Long-endurance maritime ISR and oceanography 24

Hermeus

Quarterhorse

Hypersonic Flight

High-speed aircraft and rocket motor development 24

Vannevar Labs

Decoy/Signal Intelligence

AI-Driven Sensor Fusion

Software-native edge intelligence for SOF 24

Hadrian

Factory OS

Modernized Manufacturing

Resilient defense supply chain and parts production 24

These firms operate on a philosophy of "building productized stacks" rather than bespoke hardware.24 For example, Anduril's Lattice system functions as an autonomous operating system that connects third-party sensors and weapons into a unified mesh network, allowing for real-time orchestration of machine operations.7 Similarly, Shield AI’s Hivemind provides a platform-agnostic autonomy framework, enabling aircraft—from quadcopters to F-16 surrogates—to make split-second tactical decisions without human intervention.24 This cultural collision between Silicon Valley’s "run fast and break things" mentality and the Pentagon’s traditional "bespoke hardware" model is forcing an acceleration of the U.S. military’s modernization cadence.24

Disinformation: Methods, Vulnerabilities, and Cognitive Warfare

The battlespace has expanded into the cognitive domain, where information is no longer just a force multiplier but a direct weapon of war.6 Modern disinformation campaigns utilize AI-enabled tools to achieve strategic outcomes through influence operations that are incremental and non-linear.28 The ultimate goal is "cognitive dominance," which involves injecting uncertainty into an adversary's decision-making loops and fracturing societal trust.6

Current methods of disinformation are increasingly sophisticated, driven by generative AI models that produce deepfake video, audio, and synthetic identities.29 These technologies lower the entry barrier for malicious actors, allowing for the creation of believable false personas—such as fake experts, journalists, or think tanks—to lend credibility to deceptive narratives.30 Between 2019 and 2023, the volume of global deepfake videos grew by 550%, and North America saw a 2,137% increase in deepfake-related fraud attempts in 2024 alone.29

Vulnerability Profile

Primary Demographic/Target

Key Tactic Employed

Consequence/Risk

Digital Literacy Gap

Over-65 Population

Fake News Sharing (7x higher than youth)

Rapid diffusion of false political narratives 29

"Data Voids"

Users searching niche topics

Seeding search terms with disinformation

Capture of information-hungry audiences 31

Trust Scarcity

General Public/Democratic Voters

Deepfake Impersonation (e.g., NH Robocalls)

Erosion of institutional and electoral legitimacy 30

Cognitive Load

Frontline Warfighters/Decision Makers

AI-Driven "Flooding" of Info Environment

Decision paralysis and tactical miscalculation 28

The vulnerability to these tactics is skewed by demographic factors. Research indicates that Americans over the age of 65 share significantly more fake news articles than younger groups, a trend attributed to digital media literacy gaps among those who did not grow up with the internet.29 Furthermore, disinformation actors capitalize on "data voids"—information gaps where credible sources are scarce—to seed search terms and social media with coordinated narratives.31 This ensures that when individuals seek information on emerging events, they encounter fabricated content before accurate reporting can take hold.29

Evaluation of U.S. Homeland Defense and Invasion Feasibility

The 2026 National Defense Strategy (NDS) signals a fundamental pivot toward prioritizing the U.S. homeland and the Western Hemisphere, moving away from global "nation-building" efforts toward a posture of "practical realism".33 This shift is driven by the assessment that the United States faces its most dangerous security environment in history, characterized by an "invasion" of illegal migration, the threat of narcoterrorism, and the potential for domestic insurgency.33

Regarding the ability to defend against a conventional invasion, the consensus among strategic analysts is that conventional warfare—defined by large-scale territorial conquest—is effectively no longer a viable option for countries intending to harm the United States.3 The "Kinetic Paradox" in the space and naval domains reinforces this; the cost of destroying mass-produced, distributed assets (such as Starlink satellites or drone swarms) far exceeds the cost of the interceptors required to do so.35 Adversaries have therefore embraced "Stealth War" or hybrid warfare, which avoids direct combat in favor of multi-dimensional pressure campaigns involving special operations, economic coercion, and cognitive manipulation.3

Threat Assessment

Feasibility Analysis

Strategic Response/Countermeasure

Conventional Invasion

Low (Kinetic Paradox; Geographic Moats)

"Deterrence by Denial" and Sea Control 35

Hybrid/Stealth War

High (Deniable Sabotage; Cyber/Info Ops)

"Deterrence by Punishment" and Costs 3

Domestic Insurgency

Moderate (Polarization; Protests)

National Guard Deployments; MPDC Federalization 34

Narcoterrorism

High (Border Fluidity; Supply Chains)

"Monroe Doctrine" Expansion; Border Security 33

The risk of domestic instability remains a significant vulnerability. In 2025 and 2026, the deployment of National Guard troops to major U.S. cities—including Los Angeles, Memphis, and Washington, D.C.—to assist in protest suppression and deportation operations indicates an increasing reliance on the military for internal security.34 Strategic planners must now consider the potential for an "aggressive insurgent population" within the United States, which could be exploited by foreign adversaries through information warfare to further polarize society and weaken the national resolve during a crisis.34

Adjunct Technology: AI, Quantum, and Hypersonics

The United States' tactical and strategic edge is increasingly tied to "adjunct" technologies that rewrite the rules of the naval and orbital environments.39 These technologies—specifically AI, quantum computing, and hypersonics—are being integrated into a "lethal, data-driven force" that seeks decision superiority through Project Overmatch and other secret initiatives.39

Quantum computing represents a paradigm shift in problem-solving.40 Utilizing the principles of superposition and entanglement, a "q-cat" (quantum computer) can search through massive search spaces simultaneously rather than sequentially.40 This has profound implications for "Quantum Sensing," which could potentially detect the faint acoustic or thermal signatures of hostile stealth submarines that are invisible to classical sensors.39 Furthermore, the development of post-quantum cryptography (PQC) is essential to protect national security data from future quantum-enabled decryption.39

Emerging Technology

Core Capability

Military Application

AI Quantum Game Theory

Serial Interactions (SI3-CMD)

Predictive modeling of adversary COAs 8

Quantum Sensing

Real-time Transparency

Undermining Stealth and GPS-denied nav 39

Hypersonic Missiles

Standoff/Maneuverability

Rapid strike against high-value targets 24

Space Kill Webs

Systemic Degradation (OISL)

Maintaining command in contested orbits 35

DARPA's SI3-CMD (Serial Interactions in Imperfect Information Games Applied to Complex Military Decision Making) program is applying AI and game theory to wargaming and simulation.8 These algorithms seek to master "imperfect information games"—such as poker—and translate those strategies to the battlefield, where information is sequentially revealed and deception is a primary tool.8 By identifying "game-breaking" tactics through AI modification of existing simulations, the U.S. military aims to maximize the imbalance in any future conflict.4

Naval Strategy: Traditional Ship Strength vs. Drone Swarms

The U.S. Navy is currently navigating a transition from a fleet centered on large, manned surface combatants to a "hybrid manned-unmanned force".5 This strategy is a direct response to China's growing numerical and industrial advantage at sea; current projections show China's People's Liberation Army Navy (PLAN) on a trajectory to surpass the U.S. Navy in hull count within the decade.5

To counter this, the Navy is betting heavily on the "Replicator" program, which intends to field thousands of cheap, "attritable" drones by 2025 to overwhelm adversary fleets.9 These swarms of robotic warships can expand the sensing and striking capacity of a Carrier Strike Group without the massive cost and construction timelines of traditional destroyers.5 Furthermore, the Navy has begun to "gamify" warfare, utilizing off-the-shelf Xbox controllers for submarine and drone consoles to leverage the "pre-trained" talent of a gamer-native generation.9

Naval Platform Type

Cost Metric

Strategic Utility

Traditional Destroyer (DDG)

~$2 Billion per hull

Power projection; Integrated Air/Missile Defense 45

Small USV (Replicator)

~$50,000 - $500,000

Mass, Attritability, and Decoy Deployment 44

Medium USV (Sea Hunter)

Prototype/Modular

Long-endurance ISR and mothership capabilities 5

Unmanned Tanker (MQ-25)

High-Value Autonomous

Extending the reach of carrier air wings 46

A key component of this new naval art is "Defensive Swarm Logic".45 Instead of a single $2 billion destroyer attempting to intercept a swarm of incoming missiles, the ship can deploy its own defensive drone swarm.45 This swarm can split the workload: one group of drones uses laser dazzlers to blind an incoming missile's infrared seeker, another employs electronic-attack measures to seduce its radio frequency seeker, and a third deploys obscurants to mask the ship.45 This approach reduces the reliance on multimillion-dollar surface-to-air missiles for every engagement, ensuring that high-value warships do not have to leave the combat zone just to reload their magazines.45

Long-Term Strengths and Weaknesses

The long-term outlook for the United States' defense capabilities reveals a fundamental tension between technological innovation and infrastructural fragility. The U.S. possesses a significant lead in the "venture-backed arsenal," where software-native thinking is rapidly modernizing the kill chain.24 This agility in software development—exemplified by companies like Anduril and Palantir—provides a "decisive information advantage" that can adapt to new threats in days rather than decades.6

However, the U.S. remains profoundly vulnerable in its industrial and societal foundations. The 18-to-24-month lead time for grid-scale transformers and the lack of domestic manufacturing for critical infrastructure components represent a strategic liability that an adversary could exploit with minimal cost.17 Furthermore, the ongoing "cognitive epidemic" of disinformation threatens the democratic governance and social cohesion required for long-term strategic competition.29 The ultimate strength of the U.S. will depend not on its ability to win a conventional war—which is increasingly unlikely to happen—but on its ability to secure its critical networks, protect its cognitive domain, and successfully integrate its human-machine teams into a resilient, mosaic-like whole.2

Works cited

  1. Future of Multi-domain Operations and Campaigning:, accessed February 1, 2026, https://www.nids.mod.go.jp/english/event/pdf/webinar-2025-03-en.pdf
  2. MOSAIC WARFARE AS A NEW ART OF WAR?, accessed February 1, 2026, http://doi.fil.bg.ac.rs/pdf/journals/iipe_ria/2025-1195/iipe_ria-2025-76-1195-3.pdf
  3. U.S.–Venezuela Crisis of 2025: Stealth War and the Reconfiguration of Hemispheric Security - Portal Gov.br, accessed February 1, 2026, https://www.gov.br/esg/pt-br/centrais-de-conteudo/publicacoes/operacoes-conjuntas-artigos-doutrinarios/arquivos/U.S.VenezuelaCrisisof2025_StealthWarandtheReconfigurationofHemisphericSecurity.pdf
  4. Gamebreaker - DARPA, accessed February 1, 2026, https://www.darpa.mil/research/programs/gamebreaker
  5. US hoping sea drones can narrow China's naval edge - Asia Times, accessed February 1, 2026, https://asiatimes.com/2026/01/us-hoping-sea-drones-can-narrow-chinas-naval-edge/
  6. Operational Art in the Age of Battle Networks - CSIS, accessed February 1, 2026, https://www.csis.org/analysis/chapter-4-operational-art-age-battle-networks
  7. Anduril and Palantir to Accelerate AI Capabilities for National Security, accessed February 1, 2026, https://www.anduril.com/news/anduril-and-palantir-to-accelerate-ai-capabilities-for-national-security
  8. DARPA's SI3-CMD to enhance Military Decision Making through ..., accessed February 1, 2026, https://idstch.com/critical-emerging-technologies/ai-it/darpas-si3-cmd-to-enhance-military-decision-making-through-artificial-intelligence-and-computational-game-theory/
  9. A System Under Strain: The U.S. Navy - Konvoy VC, accessed February 1, 2026, https://www.konvoy.vc/newsletters/a-system-under-strain-the-u-s-navy
  10. Cognitive Electronic Warfare and the Fight for Spectrum Superiority, accessed February 1, 2026, https://parallaxresearch.org/news/blog/cognitive-electronic-warfare-and-fight-spectrum-superiority
  11. Protecting Subsea Cables: Detect to Deter, Sue to Secure - CSIS, accessed February 1, 2026, https://www.csis.org/analysis/protecting-subsea-cables-detect-deter-sue-secure
  12. Critical Undersea Infrastructure: Trends, Threats, and Risks - GSTS, accessed February 1, 2026, https://gsts.ca/resources/blog/critical-undersea-infrastructure-trends-threats-and-risks/2025/
  13. Submarine Cables Face Increasing Threats Amid Geopolitical Tensions and Limited Repair Capacity - Recorded Future, accessed February 1, 2026, https://www.recordedfuture.com/research/submarine-cables-face-increasing-threats
  14. Protection of Undersea Telecommunication Cables: Issues for Congress, accessed February 1, 2026, https://www.congress.gov/crs-product/R47648
  15. Submarine cable cybersecurity: protecting critical infrastructure - CSO Online, accessed February 1, 2026, https://www.csoonline.com/article/4099959/submarine-cable-cybersecurity-protecting-critical-infrastructure.html
  16. Subcommittee on Energy Holds Hearing on the Security of our Energy Infrastructure, Including the Electric Grid, accessed February 1, 2026, https://republicans-energycommerce.house.gov/posts/subcommittee-on-energy-holds-hearing-on-the-security-of-our-energy-infrastructure-including-the-electric-grid-1
  17. Securing America's grid through transformers and workforce ..., accessed February 1, 2026, https://breakingdefense.com/2025/11/securing-americas-grid-through-transformers-and-workforce-resilience/
  18. The State of Utility Cybersecurity in 2025 - Forescout, accessed February 1, 2026, https://www.forescout.com/blog/the-state-of-utility-cybersecurity-in-2025/
  19. Top Utilities Cyberattacks of 2025 and Their Devastating Impact on Critical Infrastructure, accessed February 1, 2026, https://asimily.com/blog/top-utilities-cyberattacks-of-2025/
  20. 2025 U.S. Infrastructure Cyberattacks Surge Amid CISA Cuts - Redbot Security, accessed February 1, 2026, https://redbotsecurity.com/u-s-infrastructure-cyberattacks-surge-cisa-cuts-spark-crisis/
  21. Cybersecurity in the Power Sector 2025: How Utilities Defend the Grid from Evolving Cyber Threats - DeepStrike, accessed February 1, 2026, https://deepstrike.io/blog/cybersecurity-in-the-power-sector-2025
  22. The Top Cyber Threats to Energy & Utilities in 2025—And How to Stay Ahead - Mattermost, accessed February 1, 2026, https://mattermost.com/blog/top-cyber-threats-to-energy-utilities-in-2025/
  23. China seeks long-term vulnerabilities in US energy systems: House panelists | Utility Dive, accessed February 1, 2026, https://www.utilitydive.com/news/china-energy-utility-cyber-threat-typhoon/806893/
  24. Venture Backed Arsenal | - pwkinternational.com, accessed February 1, 2026, https://pwkinternational.com/2025/11/18/venture-backed-arsenal/
  25. Startup Trends: 4 defense tech companies driving a new era of security technology, accessed February 1, 2026, https://forgeglobal.com/insights/startup-trends-4-defense-tech-companies-driving-a-new-era-of-security-technology/
  26. Anduril: Transforming U.S. Defense Capabilities with Advanced Technology, accessed February 1, 2026, https://www.anduril.com/
  27. Shield AI + Palantir: Mission Autonomy and C2 Working as One, accessed February 1, 2026, https://shield.ai/shield-ai-palantir-mission-autonomy-and-c2-working-as-one/
  28. The “Ins” and “Outs” of Cognitive Warfare: What's the Next Move?, accessed February 1, 2026, https://inss.ndu.edu/Media/News/Article/4217626/the-ins-and-outs-of-cognitive-warfare-whats-the-next-move/
  29. AI-driven disinformation: policy recommendations for democratic ..., accessed February 1, 2026, https://pmc.ncbi.nlm.nih.gov/articles/PMC12351547/
  30. AI-pocalypse Now? Disinformation, AI, and the Super Election Year - Munich Security Conference - Münchner Sicherheitskonferenz, accessed February 1, 2026, https://securityconference.org/en/publications/analyses/ai-pocalypse-disinformation-super-election-year/
  31. Tactics of Disinformation - CISA, accessed February 1, 2026, https://www.cisa.gov/sites/default/files/publications/tactics-of-disinformation_508.pdf
  32. AI-Generated Disinformation, Scams, and Our Vulnerable Populations | SPS Distance Learning - Northwestern University, accessed February 1, 2026, https://sites.northwestern.edu/spsdl/2025/02/27/ai-generated-disinformation-scams-and-our-vulnerable-populations/
  33. 2026 National Defense Strategy - Department of War, accessed February 1, 2026, https://media.defense.gov/2026/Jan/23/2003864773/-1/-1/0/2026-NATIONAL-DEFENSE-STRATEGY.PDF
  34. Domestic military deployments by the second Trump administration - Wikipedia, accessed February 1, 2026, https://en.wikipedia.org/wiki/2025%E2%80%932026_domestic_military_deployments_in_the_United_States
  35. ASAT-V: Kinetic and Non-Kinetic Neutralization Vectors for Mega ..., accessed February 1, 2026, https://debuglies.com/2025/12/24/asat-v-kinetic-and-non-kinetic-neutralization-vectors-for-mega-constellations/
  36. The Hybrid Threat Imperative: Deterring Russia Before it is Too Late - CEPA, accessed February 1, 2026, https://cepa.org/comprehensive-reports/the-hybrid-threat-imperative-deterring-russia-before-it-is-too-late/
  37. Adapting US Defense Strategy to Great-Power Competition - US Army War College - Publications, accessed February 1, 2026, https://publications.armywarcollege.edu/News/Display/Article/4129357/adapting-us-defense-strategy-to-great-power-competition/
  38. Global Risks 2025: A world of growing divisions, accessed February 1, 2026, https://www.weforum.org/publications/global-risks-report-2025/in-full/global-risks-2025-a-world-of-growing-divisions-c943fe3ba0/
  39. EMERGING TECHNOLOGY HORIZONS: AI, Quantum and Naval Warfare's Future - National Defense Magazine, accessed February 1, 2026, https://www.nationaldefensemagazine.org/articles/2025/10/31/emerging-technology-horizons-ai-quantum-and-naval-warfares-future
  40. The Emerging Potential for Quantum Computing in Irregular Warfare, accessed February 1, 2026, https://irregularwarfarecenter.org/publications/insights/the-emerging-potential-for-quantum-computing-in-irregular-warfare/
  41. Intelligence Report on Quantum Diplomacy in Action 2025-2026, accessed February 1, 2026, https://open-quantum-institute.cern/wp-content/uploads/2025/11/Intelligence-Report-2025.pdf
  42. SI3-CMD: Serial Interactions in Imperfect Information Games Applied to Complex Military Decision Making - DARPA, accessed February 1, 2026, https://www.darpa.mil/research/programs/serial-interactions-in-imperfect-information-games-applied-to-complex-military-decision-making
  43. The Enduring Role of Fires on the Modern Battlefield - CSIS, accessed February 1, 2026, https://www.csis.org/analysis/chapter-6-enduring-role-fires
  44. Navy ramping up sea drone arsenal as officials aim for half of the surface fleet to be unmanned by 2045 | DefenseScoop, accessed February 1, 2026, https://defensescoop.com/2026/01/15/navy-drones-surface-fleet-unmanned-systems-sna/
  45. Let Drones Play Defense | Proceedings - September 2025 Vol. 151 ..., accessed February 1, 2026, https://www.usni.org/defense_by_drones
  46. The Future of Unmanned Autonomous Vehicles in the Maritime Battlespace - Small Wars Journal, accessed February 1, 2026, https://smallwarsjournal.com/2025/11/27/unmanned-maritime-warfare/