5 C
London
Saturday, April 25, 2026
Home Blog

Iran condemns ‘illegal’ US seizure of vessel allegedly carrying dialysis supplies

0
iran-condemns-‘illegal’-us-seizure-of-vessel-allegedly-carrying-dialysis-supplies
Iran condemns ‘illegal’ US seizure of vessel allegedly carrying dialysis supplies

Iran’s mission to the United Nations on Friday condemned the reported seizure of a commercial vessel by the US in the Sea of Oman, Anadolu reports.

“The US attack and illegal seizure of Iran’s commercial vessel ‘Toska,’ and the taking of its crew hostage on 19 April in the Sea of Oman—while carrying critical dialysis supplies and medical equipment—constitutes a flagrant breach of international law, including the peremptory prohibition of aggression, human rights and the right to life,” the mission said on US social media platform X.

The mission argued the incident directly threatened civilian health and survival.

“This coercive and unlawful act endangers lives, undermines freedom of navigation, and places vulnerable patients at grave risk. The perpetrators must be held accountable,” it said.

Earlier this week, the mission sent a letter to UN Secretary-General Antonio Guterres and the presidency of the UN Security Council addressing the issue.

UN spokesman Stephane Dujarric told reporters on Friday that the UN has “no particular information” on what was in the ship.

“But what we have seen, and we’re concerned about, is continued seizures of vessels by both the Islamic Republic of Iran and the US in the Strait,” Dujarric said.

The continued closure of the Strait of Hormuz is having a humanitarian impact on Iran and other countries in the Gulf, he said, adding: “That’s why we want to see the Strait reopen.”

Palantir Is Helping Trump’s IRS Conduct “Massive-Scale” Data Mining

0
palantir-is-helping-trump’s-irs-conduct-“massive-scale”-data-mining
Palantir Is Helping Trump’s IRS Conduct “Massive-Scale” Data Mining


military contractor Palantir is helping the IRS analyze dozens of different data sets on Americans to investigate a broad range of financial crimes, according to records shared with The Intercept.

Since 2018, the Internal Revenue Service’s Criminal Investigation division has used Palantir’s Lead and Case Analytics platform to aggregate and analyze a sprawling list of sensitive federal databases and data sets.

Public records detailing Palantir’s IRS contract, obtained by the nonprofit watchdog group American Oversight and shared exclusively with The Intercept, reveal the immense volume of data plugged into the military contractor’s software. The LCA uses both Palantir’s Gotham and Foundry applications to facilitate “analysis of massive-scale data to find the needle in the hay stack,” the contract paperwork says.

Documents indicate the IRS has paid Palantir over $130 million for these services to date.

Palantir’s LCA is ostensibly directed toward cracking down on fraud, money laundering, and other financial crimes. According to a 2024 agency privacy impact assessment, IRS “Special agents and investigative analysts … utilize the platform to find, analyze, and visualize connections between disparate sets of data to generate leads, identify schemes, uncover tax fraud, and conduct money laundering and forfeiture investigative activities.”

The IRS use of the software, launched under Trump’s first term and expanded under Biden, is now in the hands of an IRS Criminal Investigations office that has drastically scaled back its pursuit of tax cheats and pivoted, under Trump’s direction, toward investigating “left-leaning groups,” the Wall Street Journal reported in October.

“The real concern is the consolidation of vast amounts of sensitive personal data into a single system with minimal transparency — especially one built and operated by a contractor like Palantir, whose business model is premised on integrating data and expanding surveillance capabilities,” American Oversight director Chioma Chukwu said in a statement to The Intercept. “Its platforms have been used in deeply troubling contexts, from immigration enforcement to predictive policing, with persistent concerns about overreach, bias, and weak oversight.”

Palantir did not respond to a request for comment, nor did the IRS.

“The real concern is the consolidation of vast amounts of sensitive personal data into a single system with minimal transparency — especially one built and operated by a contractor like Palantir.”

The contract documents reviewed by The Intercept reveal that these “disparate sets of data” are vast. Palantir’s LCA allows the IRS to quickly search and visualize “connections from millions of records with thousands of links” between databases maintained by the IRS and other federal agencies. According to the contract documents, this data includes individual tax form and tax returns as well as Affordable Care Act data, bank statements, and transactions, and “all available” data compiled by the Treasury Department’s Financial Crimes Enforcement Network.

Its view apparently extends to cryptocurrencies including bitcoin, Ethereum, Litecoin, and Ripple. “The application would sit on top of a singular repository of identified wallets from seized servers utilizing dark web data obtained from exchangers such as Coinbase,” the documents note.

The program places an emphasis on mapping social relationships between the targets of an investigation. That includes analyzing a “network of people and the relationships and communications between them,” such as “calls, texts, [and] emails events.” The use of “IP address analysis” within LCA allows the IRS to “Identify suspects more easily” and “Establish (new) relationships among actors.”

These investigative functions are continuously updated, the materials say, through ongoing close work between Palantir engineers and IRS personnel.

The intermingling of sensitive data on millions of Americans comes at a time of increased global skepticism and opposition toward Palantir, which, despite its military-intelligence origins, has a thriving business with civilian agencies like the IRS. The use of Palantir software at the U.K.’s National Health Service, for example, has created an ongoing political controversy across Britain, while a similar contract with the New York City public hospital network was recently canceled following public protest.

The contract is also active at a time when IRS Criminal Investigations has been coopted to aid in the broader Trump administration’s aggressive agenda. In July, ProPublica reported that the agency was working with U.S. Immigration and Customs Enforcement to provide “on demand” data to accelerate deportations. Last year, the New York Times reported that Palantir, founded by Trump ally Peter Thiel, was central to an administration effort to increase data-sharing across federal agencies.

“The question isn’t just what it can do — it’s who it will be used against.”

The company’s right-wing politics and eagerness to facilitate U.S. and Israeli military aggression abroad, NSA global surveillance, and ICE deportations has also made many weary of its access to incredibly sensitive personal data. A recent post on the company’s Palantir’s X account summarizing a book by CEO Alex Karp triggered an immediate backlash from those unnerved by the manifesto’s fascistic bent. The bullet points extolled the virtue of arms manufacturing, argued the Axis powers were unfairly punished after World War II, called for a reinstatement of the draft, condemned cultural pluralism, and claimed that wealthy elites are unfairly persecuted.

“When the government can map relationships, track behavior, and generate investigative leads across data sets at this scale, the question isn’t just what it can do — it’s who it will be used against,” Chukwu said. “Entrusting that infrastructure to a company known for opaque, security-state deployments only heightens those risks.”

Claude Mythos crosses an AI point of no return

0
claude-mythos-crosses-an-ai-point-of-no-return
Claude Mythos crosses an AI point of no return

The limit of what artificial intelligence can achieve, known as frontier AI, has crossed another threshold. AI can now plan and execute sophisticated cyber operations with minimal guidance at speeds far beyond human capability.

That, at least, is the evidence from an independent test of Claude Mythos Preview, the latest and most advanced model in the Claude family of AI systems, developed by US tech firm Anthropic. Similar to ChatGPT, these can understand and generate human-like text, analyze information, and solve complex problems.

The finance sector is alarmed. It relies on highly interconnected digital systems that are especially attractive targets for sophisticated cyber-attacks. A successful breach could disrupt payments, freeze access to funds, and erode public trust in the banking system.

Major UK and US banks are preparing controlled trials under strict safeguards. They will be granted secure, supervised access to the Mythos Preview model in isolated environments, to evaluate its ability to detect vulnerabilities in their systems while minimising any risk of misuse. It’s a bit like dangerous viruses being examined in high-security laboratories.

The UK’s AI Security Institute, a research organisation within the government’s Department for Science, Innovation and Technology, has already tested Mythos Preview on a demanding benchmark known as The Last Ones.

As the name suggests, this series of challenges has been designed as the final hurdle AI systems need to complete before being deemed able to fully automate complex, real-world cyber-attacks from start to finish.

In the controlled test, Mythos Preview autonomously surfaced thousands of “zero day” vulnerabilities – flaws unknown even to the software’s own developers – across every major operating system and popular web browser. Some of these had remained undetected for up to 27 years, even though the software had been carefully checked millions of times.

Under controlled conditions, a skilled human operator would typically need around 20 hours to complete the exercise. In ten independent runs, Mythos achieved full success three times, making this preview version the first AI model to solve the entire attack chain end-to-end.

The results show genuine autonomous chaining of complex sequential actions. Mythos Preview thus represents a major leap in the ability of an AI to act as a truly autonomous agent, planning and executing complex, multi-step tasks over extended periods with minimal human intervention.

But the significance of this technological breakthrough extends well beyond cyber-attacks. The same capability could soon allow AI to autonomously manage software development, scientific research, supply chains or financial operations.

Mythos Preview signals a shift from powerful assistant to genuinely autonomous operator, with wide-reaching implications across many industries.

The dual-use dilemma

Rather than releasing it publicly, Anthropic has so far restricted access through its Project Glasswing, an initiative that gives selected technology companies and critical infrastructure providers including Apple, Google, Microsoft, Cisco and Amazon controlled access to the model.

Anthropic’s stated idea is to “to secure the world’s most critical software” by identifying and fixing security weaknesses in the operating systems, browsers and critical libraries that underpin virtually all modern digital systems, before they can be exploited. Only after that will Mythos see wider deployment as a general-purpose AI system.

Traditional vulnerability management is the process of identifying, assessing and fixing weaknesses in software and systems before attackers can exploit them – a slow, labour-intensive task performed by experts. Mythos could change this process dramatically – in both positive and negative ways.

Its emergence creates a classic dual-use dilemma: the same breakthrough that strengthens cyber defence can also lower the barrier for offensive operations.

On the positive side, it could enable defenders to discover and patch thousands of previously unknown vulnerabilities at unprecedented speed and scale, potentially making critical software far more secure and reducing the window for attacks.

Many current cybercrimes such as ransomware succeed by exploiting known or easily discoverable weaknesses in unpatched systems. These could be significantly reduced if Mythos-class models are widely used for defensive vulnerability discovery.

However, more sophisticated or targeted ransomware attacks – especially those using stolen credentials, social engineering, or already-compromised accounts – are far less likely to be affected, as they often bypass traditional software vulnerabilities altogether.

On the negative side, the same capabilities could dramatically lower the barrier for malicious actors, allowing them to find and chain weaknesses much faster than human teams. This would accelerate sophisticated cyber-attacks if the technology spreads beyond controlled environments.

There is no public evidence that Mythos Preview has reached criminal groups or nation-state adversaries – yet. But the history of cybersecurity technology suggests that well-resourced actors, either state-sponsored or criminal, may develop comparable systems or gain indirect access within the near future.

The future of cybersecurity

In the short term, governments are likely to revise their cybersecurity protocols and incident-response frameworks to incorporate mandatory AI-assisted vulnerability scanning. This would require organizations to continuously scan their systems using AI, rather than relying on occasional human checks.

While this could dramatically improve security by finding flaws faster, it is likely to raise costs significantly and carries the risk of system slowdowns, false alarms, or brief operational disruptions when fixes are applied.

Cyber insurers will almost certainly begin demanding evidence of such defenses as a condition of coverage, driving up insurance premiums, while critical-infrastructure operators accelerate deployment of automated monitoring and response systems.

This change will impact not only banks and financial institutions, but also critical infrastructure operators in energy, healthcare, telecoms and transport.

Of course, Mythos is not the final chapter. Future models developed by Anthropic and other leading AI companies are being designed to function as highly autonomous AI agents, capable of independently planning, adapting and executing long, complex sequences of tasks.

As well as discovering vulnerabilities, this could mean coordinating large-scale operations or managing sophisticated real-world workflows – all with minimal human guidance.

Moments like this demand both urgency and measured action. Careful governance, international cooperation and sustained investment in defensive applications will be essential. The genie is out of the bottle – the challenge now is ensuring it serves security rather than chaos.

Gerald Mako is research affiliate, Cambridge Central Asia Forum, University of Cambridge

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Cornbread Cake with Whipped Honey Buttercream Frosting

0
cornbread-cake-with-whipped-honey-buttercream-frosting
Cornbread Cake with Whipped Honey Buttercream Frosting

You are here: Home / Desserts / Cornbread Cake with Whipped Honey Buttercream Frosting

Introduction

This Cornbread Cake is rich, buttery, sweet, and completely unforgettable. It tastes like classic cornbread and soft white cake came together in the best possible way—then got stacked into three beautiful layers with a fluffy honey buttercream frosting.

The cake has a golden corn flavor, a moist crumb, and just enough texture from the cornmeal to remind you of homemade cornbread. The frosting is buttery, creamy, lightly sweet, and full of honey flavor. It’s a showstopping dessert that feels cozy, Southern-inspired, and perfect for celebrations.


Why You’ll Love This Cornbread Cake

  • Moist and tender thanks to butter, oil, buttermilk, and sour cream
  • Full of corn flavor from cornmeal and masa harina
  • Sweet but balanced with raw honey in both the cake and frosting
  • Perfect for gatherings because it makes a tall, impressive 3-layer cake
  • Unique dessert idea for holidays, birthdays, Thanksgiving, or Sunday dinner

What Is Cornbread Cake?

Cornbread cake is a sweet, soft layer cake inspired by classic cornbread. It has the buttery corn flavor you love, but with the light, moist texture of a dessert cake.

This version uses cornmeal for texture, masa harina for deeper corn flavor, and honey for natural sweetness. It is finished with a whipped honey buttercream frosting that tastes like sweet honey butter in frosting form.


Ingredients

For the Cake

  • ¾ cup salted butter, softened
  • 2⅓ cups granulated sugar
  • ⅔ cup pure raw honey
  • ¾ cup vegetable oil or light olive oil
  • 5 large eggs
  • 1 cup buttermilk
  • ½ cup full-fat sour cream
  • 1¼ cups all-purpose flour
  • ¾ cup masa harina corn flour
  • 1 teaspoon kosher salt
  • 1 tablespoon baking powder
  • 1½ cups yellow cornmeal

For the Honey Buttercream Frosting

  • 2 cups European-style butter, softened
  • ¾ cup pure raw honey
  • 4½ cups powdered sugar
  • 2 teaspoons cornstarch
  • ½ teaspoon kosher salt

For Serving

  • Extra honey, for drizzling
  • Polenta or cornmeal, optional garnish
  • Vanilla ice cream or whipped cream, optional

How to Make Cornbread Cake

Step 1: Prepare the Cake Pans

Preheat your oven to 325°F (165°C). Line three 9-inch cake pans with parchment paper and grease the sides well with nonstick spray.

Step 2: Make the Butter Mixture

In a large mixing bowl, beat softened butter until smooth. Add sugar and beat for about 2 minutes until light and fluffy. Mix in honey, then add oil and beat again until combined.

Step 3: Mix the Wet Ingredients

In a separate bowl, whisk eggs until smooth and slightly bubbly. Add buttermilk and sour cream, then whisk until fully combined.

Step 4: Mix the Dry Ingredients

In another bowl, sift together flour, masa harina, salt, and baking powder. Stir in the cornmeal.

Step 5: Combine the Batter

Alternate adding the wet ingredients and dry ingredients into the butter mixture. Mix just until combined. Do not overmix.

Step 6: Bake

Divide the batter evenly between the prepared pans. Bake for 28–33 minutes, rotating the pans once during baking. The cakes are done when the edges are golden and a toothpick inserted in the center comes out without wet batter.

Step 7: Cool Completely

Let the cakes cool in the pans for 10–15 minutes, then carefully turn them out onto wire racks. Cool completely before frosting.


How to Make Whipped Honey Buttercream

Beat the European-style butter until smooth and creamy. Add honey and beat until fluffy.

Add 1 cup powdered sugar, cornstarch, and salt. Mix until combined, then gradually add the remaining powdered sugar. Beat for 2–3 minutes until light, fluffy, and spreadable.

If the frosting feels too soft, add a little more powdered sugar or a small extra pinch of cornstarch.


Assembling the Cake

Place the first cake layer on a cake stand. Spread about 1½ cups frosting over the top. Add the second layer and repeat. Add the final layer, then frost the top and sides of the cake.

Drizzle with extra honey and sprinkle the edges with a little polenta or cornmeal if desired.


Tips for Success

  • Use parchment paper so the cake layers release cleanly
  • Do not overmix once the flour is added
  • Use oil in the batter for extra moisture
  • Cool cakes completely before frosting
  • European-style butter makes the frosting richer and smoother
  • Serve small slices because this cake is rich and buttery

Storage

Store the frosted cake covered at room temperature for 3–4 days.

For longer storage, freeze slices individually. Freeze uncovered for 30 minutes, then wrap well in plastic wrap and place in freezer bags. Freeze for up to 2–3 months. Thaw uncovered slightly, then loosely cover while it finishes thawing.


FAQs

Can I use regular honey instead of raw honey?

Yes. Raw honey gives a deeper flavor and thicker texture, but regular honey works well too.

Can I make this cake ahead of time?

Yes. Bake the cake layers ahead and freeze them. Make the frosting fresh on the day you plan to assemble and serve.

Can I skip masa harina?

You can replace it with more all-purpose flour, but the cake will lose some of its deep corn flavor.

What can I use instead of buttermilk?

Add 1 tablespoon lemon juice or vinegar to a measuring cup, then fill to 1 cup with milk. Let sit for a few minutes before using.

Is this cake very sweet?

It is sweet and rich, but the cornmeal, salt, and buttery frosting help balance the flavor.


Recipe Card

Cornbread Cake with Whipped Honey Buttercream Frosting

Prep Time: 30 minutes
Cook Time: 30 minutes
Total Time: 1 hour
Servings: 24 slices

Ingredients

Cake

  • ¾ cup salted butter, softened
  • 2⅓ cups granulated sugar
  • ⅔ cup honey
  • ¾ cup vegetable oil
  • 5 large eggs
  • 1 cup buttermilk
  • ½ cup full-fat sour cream
  • 1¼ cups all-purpose flour
  • ¾ cup masa harina
  • 1 teaspoon kosher salt
  • 1 tablespoon baking powder
  • 1½ cups cornmeal

Frosting

  • 2 cups European-style butter, softened
  • ¾ cup honey
  • 4½ cups powdered sugar
  • 2 teaspoons cornstarch
  • ½ teaspoon kosher salt

Instructions

  1. Preheat oven to 325°F. Line and grease three 9-inch cake pans.
  2. Beat butter until smooth. Add sugar and beat until fluffy.
  3. Mix in honey and oil.
  4. In another bowl, whisk eggs, buttermilk, and sour cream.
  5. In a separate bowl, sift flour, masa harina, salt, and baking powder. Stir in cornmeal.
  6. Alternate adding wet and dry ingredients to the butter mixture. Mix just until combined.
  7. Divide batter between pans and bake 28–33 minutes.
  8. Cool cakes completely.
  9. Beat butter for frosting until smooth. Add honey and beat until fluffy.
  10. Add powdered sugar, cornstarch, and salt. Beat until light and creamy.
  11. Layer cakes with frosting, then frost the outside.
  12. Drizzle with honey and serve.

This is who’s developing Golden Dome’s orbital interceptors—if they’re ever built

0
this-is-who’s-developing-golden-dome’s-orbital-interceptors—if-they’re-ever-built
This is who’s developing Golden Dome’s orbital interceptors—if they’re ever built

The US Space Force released a list Friday of a dozen companies working on Space-Based Interceptors for the Pentagon’s Golden Dome initiative, a multilayer defense system to shield US territory from drones and ballistic, hypersonic, and cruise missile attacks.

The roster of Golden Dome Space-Based Interceptor (SBI) contractors, some of which were previously reported, includes Anduril Industries, Booz Allen Hamilton, General Dynamics Mission Systems, GITAI USA, Lockheed Martin, Northrop Grumman, Quindar, Raytheon, Sci-Tec, SpaceX, True Anomaly, and Turion Space.

The Space Force made 20 individual awards the 12 companies in late 2025 and early 2026 using an acquisition mechanism known as Other Transaction Authority, or OTA, agreements. OTAs allow the Pentagon to bypass federal acquisition regulations and cast a wide net to attract a larger number of potential contractors, and are especially useful for rapid prototyping. That is exactly what the Space Force wants to see with the first phase of the SBI program.

The agreements have a combined value of up to $3.2 billion, and will capitalize on a mix of public and private investment to move SBIs closer to testing in low-Earth orbit.

Officials have no released details of each company’s contribution to the program, but the contractors come to the SBI program with different skill sets. The agreements are for early stage development and tech demos, not for full-scale production, which will come with a significantly higher price tag.

“No additional information will be available at this time due to operational security requirements regarding the SBI program,” the Space Force said in a statement.

The usual players

Some of the companies on the list, such as SpaceX, Lockheed Martin, and Northrop Grumman, are well known in the space industry. They seem positioned to become lead or prime contractors. Others, such as Anduril and True Anomaly, are full-stack developers that are newer to the space industry but have lofty ambitions in the national security market. Sci-Tec and Quindar have expertise in software. Turion develops space sensing technology, and GITAI USA had its start as an in-space robotics company.

Booz Allen Hamilton is best known as an integrator and data services company serving the defense sector. General Dynamics provides “critical communications and electronics” for space missions, and was already selected to develop the ground control system for the military’s network of low-Earth orbit missile tracking and data connectivity satellites, according to its website. Raytheon, also known as RTX, builds missile warning sensors, ground control software (with a not-so-stellar recent track record), and manufacturers small satellites through its subsidiary, Blue Canyon Technologies.

“Adversary capabilities are advancing rapidly, and our acquisition strategies must move even faster to counter the growing speed and maneuverability of modern missile threats,” said Col. Bryon McClain, program executive officer for space combat power at Space Systems Command.

The OTA acquisition framework for SBIs “attracted both traditional and non-traditional vendors, while harnessing American innovation, and ensuring continuous competition,” McClain said in a Space Force press release. “With the commitment and collaboration of these industry partners, the Space Force will demonstrate an initial capability in 2028.”

This infographic produced by the German Institute for International and Security Affairs illustrates the elements of a space-based missile defense system.

This infographic produced by the German Institute for International and Security Affairs illustrates the elements of a space-based missile defense system. Credit: German Institute for International and Security Affairs (SWP), 2025/CC BY 4.0

In additional to SBIs to defend against missile attacks, Golden Dome will include lower-altitude and ground-based munitions suited for taking out drones and other smaller, slower-moving aerial weapons. All of this “must be integrated with Artificial Intelligence to counter the speed, maneuverability, and lethality of the threats,” the Space Force said in a press release.

The US and Israeli war with Iran has been an acid test for missile defense. Ground- and sea-based US and Israeli interceptors have shot down thousands of missiles and drones since the first wave of Iranian ballistic missiles launched toward Israel in 2024, with a success rate of more than 90 percent. But the war has also shown that missile defenses are not impenetrable, with at least seven US service members killed by hostile action. Several key early warning radars and US military airplanes in the Gulf states have been damaged or destroyed on the ground by Iranian drone or missile strikes.

The Iran war has also diminished existing stocks of US missile interceptors, which the Pentagon plans to integrate with Golden Dome to form ground, sea, and airborne layers to go along with the space layer in low-Earth orbit. Air Force Lt. Gen. Heath Collins, director of the Missile Defense Agency, told a House subcommittee April 15 that will take a “number of years to replenish” the interceptors used in less than two months of the Iran war.

Should this be the priority?

Gen. Michael Guetlein, the Space Force general serving as director of the Golden Dome program, said replenishing the interceptors used up in the Iran war will have no schedule impact and “no direct cost impact” to Golden Dome, which the Trump administration says will cost $185 billion to develop and deploy.

Many analysts dispute the cost and schedule projections. Guetlein said outside estimates, some of which peg Golden Dome’s cost at several trillion dollars, don’t take into account what the Pentagon is actually building. However, defense officials are keeping much of the Golden Dome architecture secret, so it’s hard to know what it entails. Getting any working SBI capability into orbit in the next two-and-a-half years would require herculean efforts by the Space Force and the defense industry. Contractors would have to drastically cut down on the time it usually takes to deliver space systems of lesser complexity.

SBIs are widely seen as the most challenging and expensive element for Golden Dome. Space-based missile tracking sensors, satellite networks for targeting and data relay, and terrestrial interceptors already exist or will soon be operational. But SBIs may not be the panacea administration officials argued when President Donald Trump signed the executive order for Golden Dome in January 2025. The order has a clear requirement for the Pentagon to develop plans for the deployment of “proliferated Space-Based Interceptors capable of boost-phase intercept.”

Gen. Michael Guetlein, direct report program manager for Golden Dome for America in the Office of the Secretary of Defense, appears before the House Armed Services Strategic Forces subcommittee on April 15, 2026 in Washington, DC.

Gen. Michael Guetlein, direct report program manager for Golden Dome for America in the Office of the Secretary of Defense, appears before the House Armed Services Strategic Forces subcommittee on April 15, 2026 in Washington, DC. Credit: Luke Johnson/Getty Images

“We are so focused on affordability. If we cannot do it affordably, we will not go into production,” Guetlein said in an April 15 hearing before the House Armed Services Strategic Forces subcommittee.

“We are looking at the threats from a multi-domain perspective to make sure I have redundant capabilities and I don’t have single points of failure,” he added. “So, if boost-phase intercept from space is not affordable and scalable, we will not produce it, because we have other options to get after it.”

Boost-phase intercepts would aim to destroy a missile within a few minutes after its launch, when it is still within or close to the atmosphere. In those early minutes, the heat from the missile’s exhaust plume would make it relatively easy to detect and target, but an interceptor in orbit would require a powerful impulse to reach it. The military is also interested in using SBIs for mid-course intercepts, when a missile coasting through space, and during glide phase as they reenter the atmosphere. By then, though, a missile may have released countermeasures or multiple reentry vehicles.

Rep. Seth Moulton, D-Massachusetts, is the top Democrat on the House Strategic Forces subcommittee. He questions the promise of Golden Dome to deter future attacks, pointing to Iran’s sustained missile and drone strikes across the Middle East, despite the operational success of US and Israeli defenses.

“That basic theory seems blown out of the water by our current experience, which is that we have incredibly robust missile defense across the Middle East,” Moulton said. “We’ve been singing its praises in a very bipartisan way, and yet it has not stopped Iran in the least from shooting a lot of missiles and drones at us and our allies.”

“I think we’re talking about a regime that may be beyond deterrence,” said Marc Berkowitz, the assistant secretary of defense for space policy, referring to Iran. “They have, for decades, pursued nuclear weapons and ballistic missiles.”

The Trump administration is requesting $17 billion for Golden Dome in fiscal year 2027, which begins October 1. Nearly all of the requested funding is packaged in a reconciliation bill, not in the White House’s regular annual funding request. While Republican lawmakers still voice support for Golden Dome, there is little appetite for the partisan budget battle a party-line reconciliation bill would spark ahead of this year’s midterm elections, Politico reported Thursday.

Putting the Golden Dome funding request in a bill that may never reach the House or Senate floor is “not great signaling by this White House about the supposedly drastic need for Golden Dome,” a former defense official told Politico.

Pentagon email floats suspending Spain from NATO

0
pentagon-email-floats-suspending-spain-from-nato
Pentagon email floats suspending Spain from NATO


An internal Pentagon email outlines options for the United States to punish NATO allies it believes ​failed to support U.S. operations in the war with Iran, including suspending Spain from the alliance and reviewing the U.S. position on Britain’s claim to the Falkland Islands, a U.S. ‌official told Reuters.

The policy options are detailed in a note expressing frustration at some allies’ perceived reluctance or refusal to grant the United States access, basing and overflight rights – known as ABO – for the Iran war, said the official, who spoke on condition of anonymity to describe the email.

The email stated that ABO is “just the absolute baseline for NATO,” according to the official, who added that the options were circulating at high levels in the Pentagon.

One option in the email envisions suspending “difficult” countries from important or prestigious positions ​at NATO, the official said.

President Donald Trump has harshly criticized NATO allies for not sending their navies to help open the Strait of Hormuz, which was closed to global shipping following the start ​of the air war on February 28.

He has also declared he is considering withdrawing from the alliance.

“Wouldn’t you if you were me?” Trump asked Reuters in an April 1 ⁠interview, in response to a question about whether the U.S. pulling out of NATO was a possibility.

But the email does not suggest that the United States do so, the official said. It also does not propose ​closing bases in Europe.

The official declined to say whether the options included a widely expected U.S. drawdown of some forces from Europe, however.

Asked for comment on the email, Pentagon Press Secretary Kingsley Wilson responded: “As President Trump has said, ​despite everything that the United States has done for our NATO allies, they were not there for us.

“The War Department will ensure that the President has credible options to ensure that our allies are no longer a paper tiger and instead do their part. We have no further comment on any internal deliberations to that effect,” Wilson said.

TRUMP ADMINISTRATION SEES EUROPEAN ‘SENSE OF ENTITLEMENT’

The U.S.-Israeli war with Iran has raised serious questions about the future of the 76-year-old bloc and provoked unprecedented concern that the U.S. might ​not come to the aid of European allies should they be attacked, analysts and diplomats say.

Britain, France and others say that joining the U.S. naval blockade would amount to entering the war, but that they would be ​willing to help keep the Strait open once there was a lasting ceasefire or the conflict ended.

But Trump administration officials have stressed that NATO cannot be a one-way street.

They have expressed frustration with Spain, where the Socialist leadership said it ‌would not allow ⁠its bases or airspace to be used to attack Iran. The United States has two important military bases in Spain: Naval Station Rota and Morón Air Base.

The policy options outlined in the email would be intended to send a strong signal to NATO allies with the goal of “decreasing the sense of entitlement on the part of the Europeans,” the official said, summarizing the email.

The option to suspend Spain from the alliance would have a limited effect on U.S. military operations but a significant symbolic impact, the email argues.

The official did not disclose how the United States might pursue suspending Spain from the alliance, and Reuters could not immediately determine whether there was an existing ​mechanism at NATO to do so.

“We do not work ​off emails. We work off official documents and government ⁠positions, in this case of the United States,” Spanish Prime Minister Sanchez said when asked about the report ahead of a meeting of European Union leaders in Cyprus to discuss topics including NATO’s mutual assistance clause.

The memo also includes an option to consider reassessing U.S. diplomatic support for longstanding European “imperial possessions,” such as the Falkland Islands ​near Argentina.

The State Department’s website states that the islands are administered by the United Kingdom but are still claimed by Argentina, whose Libertarian President Javier Milei ​is a Trump ally.

Britain and ⁠Argentina fought a brief war in 1982 over the islands after Argentina made a failed bid to take them. Some 650 Argentine soldiers and 255 British troops died before Argentina surrendered.

Trump has repeatedly insulted British Prime Minister Keir Starmer, calling him cowardly because of his unwillingness to join the U.S. war with Iran, saying he was “No Winston Churchill” and describing Britain’s aircraft carriers as “toys.”

Britain initially did not grant a request from the U.S. to allow its aircraft to attack Iran ⁠from two British ​bases, but later agreed to allow defensive missions aimed at protecting residents of the region, including British citizens, amid Iranian retaliation.

Addressing reporters ​at the Pentagon earlier this month, Defense Secretary Pete Hegseth said “a lot has been laid bare” by the war with Iran, noting that Iran’s longer-range missiles cannot hit the United States but can reach Europe.

“We get questions, or roadblocks, or hesitations … You don’t have much of ​an alliance if you have countries that are not willing to stand with you when you need them,” Hegseth said.

Amazon Delivery Steals Family’s Elderly Cat – Euthanized Before Owners Can Say Goodbye

0
amazon-delivery-steals-family’s-elderly-cat-–-euthanized-before-owners-can-say-goodbye
Amazon Delivery Steals Family’s Elderly Cat – Euthanized Before Owners Can Say Goodbye


A quiet evening in Kansas City, Missouri turned into a nightmare no pet owner ever wants to live through.

A family says their beloved 16-year-old tabby, Sidney, met a heartbreaking and shocking end after being picked up and taken away by a female Amazon delivery driver — all caught on a neighbor’s doorbell camera.

According to owner Marsha Reeves, Sidney had been lounging in the driveway like he always did Monday evening when the driver pulled up to drop off a package. But instead of simply leaving, the woman allegedly stepped out, scooped up the frail cat, and drove off.

Reeves says she didn’t realize what had happened until Sidney suddenly vanished. Then came the gut punch — reviewing nearby footage that appeared to show the driver picking up the friendly tabby and loading him into her van.

“He was very much a people cat,” Reeves told Fox 4 Kansas City, explaining Sidney’s trusting nature may have sealed his fate.

But what happened next is what has left the family devastated.

Sidney, who was elderly, frail, and on a special diet and medication, was allegedly taken on a tragic journey through multiple shelters. The driver reportedly brought him first to a veterinary clinic, then to different animal organizations — including Grandview Animal Hospital and Wayside Waifs — before ultimately dropping him off at KC Pet Project.

By the time he arrived, staff determined Sidney was too weak to survive.

Without his family present — and without them even knowing where he was — the decision was made to euthanize him.

Reeves says she frantically called animal hospitals within a 10-mile radius trying to track him down, but it was too late.

The family was robbed of their final goodbye.

“I cannot even imagine what he was thinking,” she said, describing the agony of knowing her longtime companion died alone in a clinical setting instead of at home.

“He did not deserve to die on a metal table with strangers… he should have been in my arms.”

Now, the family has filed a report with the Kansas City Police Department and is demanding accountability — not just from the driver, but from Amazon itself.

“They need to face us,” Reeves said. “This has affected our entire family.”

Amazon has since issued a brief response, saying only that the company is “looking into it.”

Meanwhile, a grieving family is left with nothing but questions — and the haunting reality that a simple delivery turned into a devastating loss.

Trump feeds America’s enduring appetite for destruction

0
trump-feeds-america’s-enduring-appetite-for destruction
Trump feeds America’s enduring appetite for destruction

Donald Trump still has the capacity to shock. The American president’s unauthorized war against Iran finds him in a vicious destructive mode, recently threatening to push Iran “into the Stone Ages” and to end Iranian civilization if Iran did not agree to “unconditional surrender.”

Even as the passing weeks have left Iran still standing, Trump’s words and deeds have already inflicted severe damage on the global economy and regional peace in the Middle East.

Trump’s turn toward a wartime posture is striking, but not entirely unexpected. His second-term conduct shows a growing tendency to push an earlier taste for disruption toward outright destruction — at home and abroad.

He now routinely acts in the belief that those who dare to resist his plans deserve the severest forms of punishment that imperial presidential power can deliver. But Trump’s conduct is grounded in centuries of American experience. The US has an enduring tendency toward retribution and destruction.

Trump 2.0

Trump’s scorched-Earth proclivity was obvious before the war with Iran. Warning shots came on January 6, 2021, with the assault on both the Capitol and constitutional provisions for presidential succession. Similarly bold efforts began in 2025.

Globally, Trump has been sweeping away leaders, regimes and multilateral systems, using both military and political weaponry: the special operations extraction of Venezuelan President Nicolas Maduro, for example, as well as the launch of illegal attacks on purportedly drug-running fishing boats in the Caribbean and Eastern Pacific (now tallying more than 50 obliterating strikes and 163 deaths).

International ravaging has been a hallmark of Trump 2.0: dismantling highly integrated global trading networks; fuelling a surge in military recruits in allied countries like Canada and Denmark/Greenland; denouncing NATO.

There’s been destruction on the home front too: Elon Musk’s DOGE chain-sawed through congressionally authorized agencies and funding, for example, including the Environmental Protection Agency and 5,800 research projects at the National Institutes of Health.

The anti-woke Trump administration has eviscerated diversity, equity and inclusion programs in government, the private sector and academia. Trump has also literally bulldozed the White House East Wing.

American roots

Centuries of American history foreshadow Trump’s strategy of destruction. The precedents are complex for two reasons.

First, American personal and national interests have often mixed admirable aims with a more basic drive for wealth and power — combining genuine pursuits of democracy and civil liberties and ambitions for social welfare and community with less noble impulses.

Second, the scope and settings in which Trump-like behavior appears have changed dramatically over more than three centuries — from a chain of Atlantic colonies to a continental nation and, ultimately, a global economic, military and cultural power. Yet across these shifting arenas, similar patterns of destructive and tragic outbursts have repeatedly surfaced.

Among countless examples, the most profound involved the treatment of Indigenous populations. White colonial appetites for land and resources always paired negotiation and repression, with superior weaponry leading to episodes of genocidal annihilation when forced migrations and “reservations” were deemed insufficient.

The names of ruthless slaughters pockmark American history: the Apalachee Massacre (Florida, 1704), the Sand Creek Massacre (Colorado, 1864), the Wounded Knee Massacre (South Dakota,1890), among numerous others.

Estimates suggest that in 1492, five million Indigenous people lived in what would become American territory, declining to 300,000 by 1900.

While the histories of Canada, Mexico and broader Latin America are also replete with such tragedies, the evidence of deep and specifically American roots beneath Trump’s virulent destructive impulses is clear.

Survivors of the Wounded Knee Massacre on Capitol Hill in 1938 to testify on a proposed bill to pay Lakota survivors. Photo: AP

Slaves and free men

The history of Black Americans is another heinous example of the American capacity for carnage. The experiences of Black slaves and their descendents are soaked in blood.

Prior to the Civil War, estimates suggest the brutality of chattel labor meant life expectancy that was half that of white Americans (21 years versus 43). When freedom came, life remained perilous as violence supplemented Jim Crow segregation laws.

Black homes and businesses burned — the 1921 Tulsa massacre, for example, saw 35 square blocks of Black businesses and residential neighbourhoods destroyed. Shotguns and hanging ropes for lynchings also ended lives, stretching from the post-Reconstruction era of the 1880s to 1968.

Racialized people were the most common targets of an American appetite for total destruction — but not the only one. The US Civil War remains one of the most catastrophic in world history, with Union and Confederate deaths now estimated at 698,000.

Destruction abroad

American power in the 20th century saw the periodic unleashing of destructive impulses abroad, some within living memory. Examples include:

U.S. Marines stand around Iraqi soldiers in southern Iraq in March 2003. Photo: AP via The Conversation /Itsuo Inouye

No restraints

American episodes of wanton destruction are part of a broader global history marked by the cruelties of many nations and groups.

At the same time, US leaders and citizens have often been guided — if not fully constrained — by countervailing ideals: respect for human rights, adherence to the laws of war and a desire for the security and opportunity that peace provides.

But how strong are those restraints in 2026? And how vulnerable are hard-won ethical and political norms to Trump’s chilling rhetoric and actions, especially alongside Republican conduct in US Congress and a Supreme Court that has weakened limits on presidential power?

Rising gas prices may prove the least of the consequences.

Ronald W. Pruessen is emeritus professor of history, University of Toronto

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Evangelical Leader Hosts Jerusalem Event for President Trump, Launches Israel Billboard Campaign 

0
evangelical-leader-hosts-jerusalem-event-for-president-trump,-launches-israel-billboard-campaign 
Evangelical Leader Hosts Jerusalem Event for President Trump, Launches Israel Billboard Campaign 


Evangelical leader Mike Evans hosted an event in Jerusalem marking Israel’s seventy-eighth Independence Day in honor of Donald Trump, while launching a nationwide billboard campaign across Israel promoting the message “THE DELIVERER.” 

The event, held in Jerusalem and broadcast globally, drew hundreds of attendees, including Amir Ohana, members of the diplomatic corps, ambassadors, representatives of Israel’s Ministry of Foreign Affairs, business leaders, and public figures such as Yoseph Haddad and Nate Buzolic. Former hostages and Holocaust survivors were also present. 

Messages from Evangelical leaders worldwide were aired during the event, congratulating Israel and calling on President Trump to maintain support for the country. 

Dr. Mike Evans presents the “Hineni” Award to Yoseph Haddad.
From right to left: Maria Cristina Cevallos, Ambassador of Ecuador, Ava Atzum Arevalo, Ambassador of Guatemala, Ines Demiri, Ambassador of Kosovo, Ezra Cohen, Ambassador of Panama, Yoseph Haddad, David Brownstein, Deputy Chief of Mission, United States Embassy, Dr. Mike Evans (Roi Yehuda)

Evans said Evangelicals play a decisive role in backing President Trump politically and continue to press him to support Israel. “Evangelicals are the ones who elected President Trump, and we are the ones who stand with Israel. We will not stop pressing him to act on its behalf,” he said. 

He also addressed commentator Tucker Carlson, saying, “If you are looking for someone to blame for the pressure on President Trump, it is us, the Evangelicals. We are responsible, and we will continue to be.” 

The billboard campaign features President Trump’s image and has been placed in Jerusalem, Tel Aviv, and other cities. It is intended to express support for the president and encourage his continued leadership. 

Evans said: “No American president has stood with the State of Israel as courageously as President Trump, at significant personal and political risk. He chose principle over caution. President Trump is acting with determination despite immense pressure, including during the current election cycle.” 

He added, “I have no doubt that God protected him and prevented the assassination attempt against him on July 13, 2024, in Butler, Pennsylvania. President Trump is the greatest president in history, a defender of Israel and of the entire Western world.” 

Evans, founder of the Friends of Zion Heritage Center in Jerusalem, has led similar campaigns in recent years and organized large-scale Evangelical events supporting Israel following the October 7 attacks. 

 

 

FCC: Router ban includes portable hotspots, but not phones with hotspot features

0
fcc:-router-ban-includes-portable-hotspots,-but-not-phones-with-hotspot-features
FCC: Router ban includes portable hotspots, but not phones with hotspot features

The Federal Communications Commission clarified this week that its sweeping ban on foreign-made consumer routers also affects portable hotspot devices.

The FCC added a new section to an FAQ titled, “Is my device a consumer-grade router under the National Security Determination?” The new FAQ section says this category includes “consumer-grade portable or mobile MiFi Wi-Fi or hotspot devices for residential use.” The ban does not cover “mobile phones with hotspot features,” the FAQ says.

This means that companies making consumer hotspots need an exemption from the government to import and sell any future hotspots that haven’t previously been approved by the FCC. As with routers, devices previously approved for sale in the US can continue to be imported and sold without obtaining a special exemption.

The FCC defines routers broadly, giving the agency plenty of flexibility to include various types of consumer networking devices in the ban. When the FCC announced the ban last month, it defined routers as “consumer-grade networking devices that are primarily intended for residential use and can be installed by the customer,” and which “forward data packets, most commonly Internet Protocol (IP) packets, between networked systems.”

But while an earlier version of the FAQ stated that cellphones with mobile hotspot features were exempt, it did not specifically say that portable hotspot devices were covered by the ban. In addition to hotspot devices, the new FAQ section says the router ban applies to “consumer or small and medium-sized business routers sold or rented through retail and self-installable by end users”; “LTE/5G CPE [customer premises equipment] devices for residential use”; “residential routers installed by a professional or ISP”; and “residential gateways that combine modem and router functions.”

Netgear and Eero get exemptions

The device ban is only for consumer-grade equipment, even though network gear used by large businesses presents a natural target for foreign hackers. The new FAQ section notes that “industrial, enterprise, or military equipment” is not included.

The FCC adds that other devices not covered by the ban include analog telephone adapters with Ethernet LAN and WAN ports, femtocells, and optical network terminals. The new FAQ section was pointed out yesterday in a PCMag article.

The FCC router ban stems from a President Trump directive on reducing the use of foreign technology for national security reasons. The FCC said it will not approve new device models made at least partly outside the US unless the Department of Defense or Department of Homeland Security determines that the router does not pose national security risks.

Whether headquartered in the US or abroad, virtually every router maker will have to obtain an exemption for future devices. The various components inside routers are made in countries such as Taiwan, South Korea, Japan, and China, noted a report by the Global Electronics Association trade group.

Netgear became the first major vendor of consumer routers to obtain an exemption last week. The Amazon-owned Eero was granted an exemption this week.

0FansLike
0FollowersFollow
0FollowersFollow
0SubscribersSubscribe
- Advertisement -
Google search engine

Recent Posts