Open links in new tab
  1. 2026 National Defense Strategy

    Jan 23, 2026 · Rather than protect and advance Americans’ interests, they opened our borders, forgot the wisdom of the Monroe Doctrine, ceded influence in our hemisphere, and outsourced America’s …

  2. Aug 28, 2025 · Purpose. To direct the Secretary of the Army (SecArmy) to disestablish the Joint Counter-small Unmanned Aircraft Systems (C-sUAS) Office (JCO) and to establish a Joint …

  3. China’s record of canceling defense and military engagements in response to perceived offenses or heightened tensions suggests that China views defense and military engagements as a tool to …

  4. Jan 12, 2026 · Executing a set of "Pace-Setting Projects" (PSPs) that will demonstrate the accelerated pace of execution, focus, and ethos we need to stay ahead. The PSPs will also serve as tangible, …

  5. Nov 10, 2025 · Executive Order (E.O.) 14265, Modernizing Defense Acquisitions and Spurring Innovation in the Industrial Base, directed the Department to prepare this strategy, consistent with …

  6. November 14, 2025 The 57th Republic of Korea (ROK) - United States (U.S.) Security Consultative Meeting (SCM) was held in Seoul, on November 4, 2025. ROK Minister of National Defense Ahn …

  7. Jan 12, 2026 · The Defense Advanced Research Projects Agency (DARPA) creates and prevents strategic surprise through technology innovation - demonstrating what is possible before adversaries …

  8. Intelligence Oversight Directorate - U.S. Department of Defense

    The duties and obligations placed on DoW intelligence organizations to protect the rights of individuals arise from the U.S. Constitution and Executive Order 12333 as implemented by DoD Manual …

  9. A self-assessment 2 there are system two types or organization is the term for the activity performed by an entity to evaluate its own of assessments: as defined in 32 CFR § 170.15 to 32 CFR § 170.18. …

  10. This advisory notifies NSS owners, operators, and vendors of future requirements for QR algorithms for NSS. These algorithms (also referred to as post-quantum algorithms) are analyzed as being secure …