<div id=”fb-root”/><div id=”runner-root”/><div id=”curtain” class=”curtain”/><nav class=”menu-global”><div class=”main-menu-wrapper”><div class=”menu-global__search-form hide-tablet-and-desktop”><form action=”/search/”><button type=”submit” class=”menu-global__submit fa fa-search” value=”” aria-label=”Submit”/><input name=”q” class=”menu-global__text-input” type=”text” placeholder=”Search...” aria-label=”Search”/></form></div><div class=”divider hide-tablet-and-desktop”/><div class=”divider”/><ul id=”main-menu” class=”main-menu”/></div></nav><div class=”all-content-wrapper”><div class=”main v-sep”><div class=”menu-overlay js-toggle” data-target=”body” data-share-status-id=”menu-toggle” data-toggle-class=”menu-opened”/><style_class name=”cccc” css=”background-color: blue;”/><style_css css=”.qqqq {&#10;background-color: blue;&#10;}”/><!– User Code –><a class=”skip-to-site-content content-hidden” href=”#site-content”>Skip to content</a><!– End User Code –><!– User Code –><!– Google Tag Manager (noscript) –><!– End Google Tag Manager (noscript) –><!– End User Code –><!– User Code –><div aria-label=”overlay” class=”modal-open-overlay”/><!– End User Code –><div class=”topbar_sticky_wrapper” id=”sTop_Bar_0_0_24_0_0_0_0_10″><div class=”topbar” id=”sTop_Bar_0_0_24_0_0_0_0_10_0″><div class=”topbar-row-1 container” aria-label=”” role=”” id=”sTop_Bar_0_0_24_0_0_0_0_10_0_0″><div class=”topbar-row-1-inner” id=”sTopbar_Row_1_0_0_25_0_0_0″><!– User Code –><div class=”site-title”><a class=”site-logo_link” href=”/” target=”_self”><img class=”site-logo” alt=”Logo” width=”190″ height=”57″ src=”/media-library/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy81NTk0Mjg5My9vcmlnaW4ucG5nIiwiZXhwaXJlc19hdCI6MTc5OTcwMzE5MX0.IyaPJbxdIbq0p310Ep9hIbRPip4VlP8upJ49Lf2okMU/image.png?width=380&;height=114″/></a></div><!– End User Code –><div class=”site-byline-timer-trending” id=”sTopbar_Row_1_0_0_25_0_0_0_1″><div class=”site-byline”>
Your Trusted Source for National Security News &; Analysis
</div><div class=”site-time” id=”site-time”>


May 21st, 2026 | 11:53 AM
</div><div class=”trending-links” id=”sTopbar_Row_1_0_0_25_0_0_0_1_2″><!– User Code –><div class=”trending-links-heading”>Trending:</div><!– End User Code –><div class=”mb-2 ” id=”sTopbar_Row_1_0_0_25_0_0_0_1_2_1″><div class=”posts-custom posts-custom-section section-holder clearfix” data-block=”section_3″ data-format=”posts-custom” data-source=”11f58ec016e5faae76f396d29a34af53″ data-source-type=”page” data-source-unique=”true” data-section-id=”” data-is-reordable=”false” data-using-stickers=”false” data-has-more=”false” data-attr-cache_ttl_in_seconds=”43200″ data-attr-format=”posts-custom” data-attr-posts_id=”sTopbar_Row_1_0_0_25_0_0_0_1_2_1″ data-attr-source_unique=”true” data-attr-without_current=”true” data-attr-layout_quality=”1″ data-attr-header_template=”jinja/post/custom-css.html” data-attr-node_id=”/root/blocks/block[topbar_row_1]/abtests/abtest[1]/element_wrapper/element_wrapper[1]/element_wrapper/posts-” data-attr-source=”filtered” data-attr-use_tag_image_for_lead_media=”true” data-attr-limit=”1″ data-attr-all_element_order=”body” data-attr-from_regular_sections=”editorial/announcement-bar” data-attr-layout_body=”bottom” data-attr-element_classes=”” data-attr-source_site=”parent_site”><div class=”posts-wrapper clearfix”><div class=”widget” elid=”2670999477″><article elid=”2670999477″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-HD post-2670999477″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″><div class=”body js-expandable clearfix js-listicle-body css-listicle-body-2670999477″ data-headline=”trending links”><div class=”body-description”><ul class=”list”><li><a href=”/middle-east/iran”>Iran</a></li><li><a href=”/tag/hormuz”>Hormuz</a></li><li><a href=”/tag/israel”>Israel</a></li><li><a href=”/tag/middle-east”>Middle East </a></li><li><a href=”/tag/ukraine”>Ukraine</a> </li><li><a href=”/tag/russia”>Russia</a> </li><li><a href=”/tag/tech”>Tech/Cyber</a></li></ul></div></div><span class=”” data-elid=”2670999477″ data-post-url=”https://www.thecipherbrief.com/trending-links” data-authors=”bony_rebelmouse” data-headline=”trending links” data-page-title=”trending links – The Cipher Brief”/></div></div></div></article></div></div></div></div></div></div><div class=”topbar-social-n-sign-up” id=”sTopbar_Row_1_0_0_25_0_0_0_2″><div class=”sm-mb-2″ id=”sSocial_Links_0_0_20_0_0_0″><div class=”social-links”><a class=”social-links__link share-youtube” href=”https://www.youtube.com/channel/UCEyPWPSLfrg1ue9Oq1wLr8w” target=”_blank” rel=”noopener noreferrer” aria-label=”Open youtube”><span aria-hidden=”true” class=”fa fa-youtube”/></a><a class=”social-links__link share-linkedin” href=”https://www.linkedin.com/company/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open linkedin”><span aria-hidden=”true” class=”fa fa-linkedin”/></a><a class=”social-links__link share-twitter” href=”https://x.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open twitter”><span aria-hidden=”true” class=”fa fa-twitter”/></a><a class=”social-links__link share-facebook” href=”https://www.facebook.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open facebook”><span aria-hidden=”true” class=”fa fa-facebook”/></a><a class=”social-links__link share-instagram” href=”https://www.instagram.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open instagram”><span aria-hidden=”true” class=”fa fa-instagram”/></a></div></div><div class=”auth-buttons”><a class=”btn sign-up” href=”/subscriber-plus”>Sign Up</a><button class=”btn log-in unlogged”>Log In</button></div></div><div class=”mobile-menu-search-btn-wrapper” id=”sTopbar_Row_1_0_0_25_0_0_0_3″><!– User Code –><button aria-label=”Search &; Section Navigation” title=”Search &; Section Navigation” class=”hamburger__toggle” data-toggle-class=”hamburger”><span class=”content-hidden”>Search &; Section Navigation</span></button><button title=”Open Search” class=”search_toggle” aria-label=”Search” data-toggle-class=”search”><span class=”content-hidden”>Open Search</span></button><!– End User Code –></div></div></div><div class=”topbar-row-2 container” aria-label=”main-menu” role=”navigation” id=”sTop_Bar_0_0_24_0_0_0_0_10_0_1″><div class=”navbar” id=”sNavbar_0_0_14_0_0_0″><div class=”navbar_inner” id=”sNavbar_0_0_14_0_0_0_1″><div class=”menu_items” id=”sMenu_Items_0_0_13_0_0_0_0_0″><div class=”menu_item trending-item” id=”sMenu_Items_0_0_13_0_0_0_0_0_0″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_0_0″><a class=”color-inherit” href=”” target=””>Trending</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_0_2″/></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_1″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_1_0″><a class=”color-inherit” href=”/report” target=””>Open Source Reports</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_2″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_2_0″><a class=”color-inherit” href=”/article” target=””>News &; Analysis</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_2_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_2_2_0″><a class=”list__item” href=”/africa” target=”_self”>Africa</a><a class=”list__item” href=”/asia” target=”_self”>Asia</a><a class=”list__item” href=”/europe” target=”_self”>Europe</a><a class=”list__item” href=”/americas/latin-america” target=”_self”>Latin America</a><a class=”list__item” href=”/middle-east” target=”_self”>Middle East</a><a class=”list__item” href=”/americas/north-america” target=”_self”>North America</a><a class=”list__item” href=”/tech-cyber” target=”_self”>Tech/Cyber</a></div></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_3″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_3_0″><a class=”color-inherit” href=”/columns/opinion” target=””>Opinion</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_4″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_4_0″><a class=”color-inherit” href=”/subscribe” target=””>Newsletters</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_5″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_5_0″><a class=”color-inherit” href=”/podcasts” target=””>Podcasts</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_5_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_5_2_0″><a class=”list__item” href=”/podcasts/state-secrets” target=”_self”>State Secrets</a></div></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_6″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_6_0″><a class=”color-inherit” href=”/books” target=””>Books</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_6_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_6_2_0″><a class=”list__item” href=”/book-review” target=”_self”>Book Reviews</a><a class=”list__item” href=”/columns/under-cover/author-interview” target=”_self”>Author Interviews</a><a class=”list__item” href=”/tcb-bookstore” target=”_self”>The Under/Cover Book Store</a><a class=”list__item” href=”/under-cover-reviewer-guidelines” target=”_self”>Reviewer Guidelines</a></div></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_7″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_7_0″><a class=”color-inherit” href=”/events” target=””>Events</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_8″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_8_0″><a class=”color-inherit” href=”/dead-drop” target=””>Dead Drop</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_9″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_9_0″><a class=”color-inherit” href=”https://thecipherbrief.shop/” target=”_blank”>Shop</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_10″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_10_0″><a class=”color-inherit” href=”/subscriber-plus” target=””>Subscriber+</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_10_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_10_2_0″><a class=”list__item” href=”/subscriber-plus” target=”_self”>Upgrade to Subscriber+</a><a class=”list__item” href=”/terms-of-service-and-pricing-policy” target=”_self”>Terms of Service and Pricing Policy</a></div></div></div></div></div></div><!– User Code –><button title=”Open Search” class=”search_toggle” aria-label=”Search” data-toggle-class=”search”><span class=”content-hidden”>Open Search</span></button><!– End User Code –></div></div></div><div class=”splash-a-wrapper container” id=”sTop_Bar_0_0_24_0_0_0_0_11″/><div class=”search__wrapper” id=”sTop_Bar_0_0_24_0_0_0_0_12″><!– User Code –><button class=”search-modal_close-pop-up” title=”Close Search” aria-label=”Close Search” data-toggle-class=”search”><svg xmlns=”http://www.w3.org/2000/svg” width=”32″ height=”32″ viewbox=”0 0 32 32″ fill=”none”><path d=”M23.4534 6.66663L16 14.12L8.54669 6.66663L6.66669 8.54663L14.12 16L6.66669 23.4533L8.54669 25.3333L16 17.88L23.4534 25.3333L25.3334 23.4533L17.88 16L25.3334 8.54663L23.4534 6.66663Z” fill=”white”/></svg><span class=”hidden”>close Search</span></button><!– End User Code –><div class=”search__wrapper__inner” id=”sTop_Bar_0_0_24_0_0_0_0_12_1″><div class=”search-modal-heading-wrapper”><div class=”search-modal-heading”>Search </div></div><div class=”rm-component Search_Form_outlined” data-name=”Search Form” data-skin=”outlined” data-node-id=”/root/blocks/block[top_bar]/abtests/abtest[1]/rm_tabs/rm_wrapper[1]/element_wrapper[3]/element_wrapper/create_element-” loading=”eager” data-lazy-deps=””><div class=”search-widget”><form action=”/search/” role=”search”><div class=”search-widget__group”><label for=”type-content” class=”search-widget__group-item btn”>Content <input type=”radio” id=”type-content” name=”t” class=”search-widget__radio” value=”content” checked=”True” hidden=”hidden”/></label><label for=”type-author” class=”search-widget__group-item btn”> Authors <input type=”radio” id=”type-author” name=”t” class=”search-widget__radio” value=”authors” hidden=”hidden”/></label><input name=”q” class=”js-search-input search-widget__input” type=”text” placeholder=”Enter your search phrase....” aria-label=”Enter your search phrase....” value=””/></div><button type=”submit” class=”js-search-submit search-widget__submit fa fa-search” value=”” aria-label=”Submit”/></form></div></div><div class=”search-modal-latest-stories” id=”sTop_Bar_0_0_24_0_0_0_0_12_1_2″><div id=”sTop_Bar_0_0_24_0_0_0_0_12_1_2_0″><div class=”module-headline”><h2 class=”module-headline__text h2″>
 Latest Stories
 </h2></div></div><div class=”wrapper-lazy-loading rm-lazy-load-post-lcp-wrapper next-page-wrapper” data-skl-id=”/root/blocks/block[search_modal_latest_stories]/abtests/abtest/lazyload-” data-has-more=”true” data-more-posts-exists=”true” data-posts-sources=”latest_stories-modal” data-ignore-page-number=”false”/></div></div></div><div class=”hamburger” id=”sHamburger_0_0_10_0_0_0″><div class=”hamburger_inner” id=”sHamburger_0_0_10_0_0_0_0″><div class=”hamburger__menu” id=”sHamburger_0_0_10_0_0_0_0_0″><div class=”menu_items” id=”sMenu_Items_0_0_13_0_0_0_0_0″><div class=”menu_item trending-item” id=”sMenu_Items_0_0_13_0_0_0_0_0_0″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_0_0″><a class=”color-inherit” href=”” target=””>Trending</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_0_2″/></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_1″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_1_0″><a class=”color-inherit” href=”/report” target=””>Open Source Reports</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_2″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_2_0″><a class=”color-inherit” href=”/article” target=””>News &; Analysis</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_2_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_2_2_0″><a class=”list__item” href=”/africa” target=”_self”>Africa</a><a class=”list__item” href=”/asia” target=”_self”>Asia</a><a class=”list__item” href=”/europe” target=”_self”>Europe</a><a class=”list__item” href=”/americas/latin-america” target=”_self”>Latin America</a><a class=”list__item” href=”/middle-east” target=”_self”>Middle East</a><a class=”list__item” href=”/americas/north-america” target=”_self”>North America</a><a class=”list__item” href=”/tech-cyber” target=”_self”>Tech/Cyber</a></div></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_3″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_3_0″><a class=”color-inherit” href=”/columns/opinion” target=””>Opinion</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_4″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_4_0″><a class=”color-inherit” href=”/subscribe” target=””>Newsletters</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_5″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_5_0″><a class=”color-inherit” href=”/podcasts” target=””>Podcasts</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_5_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_5_2_0″><a class=”list__item” href=”/podcasts/state-secrets” target=”_self”>State Secrets</a></div></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_6″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_6_0″><a class=”color-inherit” href=”/books” target=””>Books</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_6_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_6_2_0″><a class=”list__item” href=”/book-review” target=”_self”>Book Reviews</a><a class=”list__item” href=”/columns/under-cover/author-interview” target=”_self”>Author Interviews</a><a class=”list__item” href=”/tcb-bookstore” target=”_self”>The Under/Cover Book Store</a><a class=”list__item” href=”/under-cover-reviewer-guidelines” target=”_self”>Reviewer Guidelines</a></div></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_7″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_7_0″><a class=”color-inherit” href=”/events” target=””>Events</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_8″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_8_0″><a class=”color-inherit” href=”/dead-drop” target=””>Dead Drop</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_9″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_9_0″><a class=”color-inherit” href=”https://thecipherbrief.shop/” target=”_blank”>Shop</a></div></div><div class=”menu_item” id=”sMenu_Items_0_0_13_0_0_0_0_0_10″><div class=”text-element” id=”sMenu_Items_0_0_13_0_0_0_0_0_10_0″><a class=”color-inherit” href=”/subscriber-plus” target=””>Subscriber+</a></div><!– User Code –><span class=”dropdown-arrow”/><!– End User Code –><div class=”menu__dropdown” id=”sMenu_Items_0_0_13_0_0_0_0_0_10_2″><div class=”list” id=”sMenu_Items_0_0_13_0_0_0_0_0_10_2_0″><a class=”list__item” href=”/subscriber-plus” target=”_self”>Upgrade to Subscriber+</a><a class=”list__item” href=”/terms-of-service-and-pricing-policy” target=”_self”>Terms of Service and Pricing Policy</a></div></div></div></div></div><div class=”hamburger-social” id=”sHamburger_0_0_10_0_0_0_0_1″><div class=”text-element” id=”sHamburger_0_0_10_0_0_0_0_1_0″>For general inquiries please email
<a href=”mailto: info@thecipherbrief.com”> info@thecipherbrief.com </a></div><div class=”sm-mb-2″ id=”sSocial_Links_0_0_20_0_0_0″><div class=”social-links”><a class=”social-links__link share-youtube” href=”https://www.youtube.com/channel/UCEyPWPSLfrg1ue9Oq1wLr8w” target=”_blank” rel=”noopener noreferrer” aria-label=”Open youtube”><span aria-hidden=”true” class=”fa fa-youtube”/></a><a class=”social-links__link share-linkedin” href=”https://www.linkedin.com/company/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open linkedin”><span aria-hidden=”true” class=”fa fa-linkedin”/></a><a class=”social-links__link share-twitter” href=”https://x.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open twitter”><span aria-hidden=”true” class=”fa fa-twitter”/></a><a class=”social-links__link share-facebook” href=”https://www.facebook.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open facebook”><span aria-hidden=”true” class=”fa fa-facebook”/></a><a class=”social-links__link share-instagram” href=”https://www.instagram.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open instagram”><span aria-hidden=”true” class=”fa fa-instagram”/></a></div></div></div></div></div><!– User Code –><div class=”content-hidden” id=”site-content”/><!– End User Code –><div class=”container” id=”sTop_Bar_0_0_24_0_0_0_0_15_0″><div class=”ad-container leaderboard” id=”sTop_Bar_0_0_24_0_0_0_0_15_0_0″><a id=”sTop_Banner_Ad_0_0_23_0_0_0_0_0″ class=”display-block image-element ” href=”https://www.tcbconference.com/” target=”_blank”><img class=”image-element__img” alt=”TCB Conference Banner” width=”1301″ height=”161″ src=”https://www.thecipherbrief.com/media-library/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJlYmVsbW91c2UuaW8vZXlKaGJHY2lPaUpJVXpJMU5pSXNJblI1Y0NJNklrcFhWQ0o5LmV5SnBiV0ZuWlNJNkltaDBkSEJ6T2k4dllYTnpaWFJ6TG5KaWJDNXRjeTgyTlRRNE5qWTRPUzl2Y21sbmFXNHVjRzVuSWl3aVpYaHdhWEpsYzE5aGRDSTZNVGd5TWpNNE5ETTFOWDAud0NnRE1pRm00aWtGb09BTmJuRU50V0hCWnhCcERja1RWYkhTcURqeXFpTS9pbWcucG5nIiwiZXhwaXJlc19hdCI6MTgzNjI1NzAzN30._PR8cbe35A3iCR_1LQs5BXJmviaNZSTDGqAAyr5IM8g/tcb-conference-banner.png?width=1301&;height=161″/></a></div></div><div class=”membership-popup” aria-label=”Membership Pop-up” role=”Pop-up” id=”sMembership_pop-up_0_0_12_0_0_0″><a id=”sMembership_pop-up_0_0_12_0_0_0_0″ class=”display-block image-element “><img class=”image-element__img” alt=”cipherbrief” width=”380″ height=”114″ src=”https://www.thecipherbrief.com/media-library/cipherbrief.png?id=59779868&;width=380&;height=114″/></a><!– User Code –><button class=”membership_close-pop-up” title=”Close Pop-up” aria-label=”Close Pop-up”><svg xmlns=”http://www.w3.org/2000/svg” width=”32″ height=”32″ viewbox=”0 0 32 32″ fill=”none”><path d=”M23.4534 6.66663L16 14.12L8.54669 6.66663L6.66669 8.54663L14.12 16L6.66669 23.4533L8.54669 25.3333L16 17.88L23.4534 25.3333L25.3334 23.4533L17.88 16L25.3334 8.54663L23.4534 6.66663Z” fill=”white”/></svg><span class=”hidden”>close mebmership form</span></button><p class=”welcome-message”>Welcome! Log in to stay connected and make the most of your experience.</p><!– ><–><p class=”expired-message hidden”>
 Your membership has expired.
 <span>Renew now to continue enjoying exclusive benefits and uninterrupted access.</span></p><label for=”member-email-input” class=”signin-message”>Sign In</label><div class=”member-email-input-wrapper”><input id=”member-email-input” type=”email” size=”64″ maxlength=”64″ required=”required” value=”” placeholder=”Enter your email” onkeyup=”this.setAttribute(’value’, this.value);” pattern=”^((?:[A-Za-z0-9!#$%&;’*+\-\/=?^_`{|}~]|(?<;=^|\.)” .=””/><div id=”email-field-clean”>Input clean</div></div><!– ><–><p class=”error-message hidden”>Couldn't find an account with that email address, please sign up.</p><input type=”submit” value=”Continue” id=”member-continue-input” class=”btn”/><!– ><–><p class=”member-signup-wrapper”><input type=”submit” value=”Sign Up” id=”member-signup-input” class=”btn outlined hidden”/></p><!– ><–><button type=”submit” value=”Renew Subscription” id=”member-renew-input” class=”btn hidden”>Renew subscription</button><!– End User Code –></div><div class=”container post-page-container wide container_with_sidebar wide module desktop-small-margin” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7″><nav class=”rm-breadcrumb” aria-label=”breadcrumb”><ol class=”rm-breadcrumb__list”><li class=”rm-breadcrumb__item rm-breadcrumb__item–home_page”><a href=”https://www.thecipherbrief.com/” class=”rm-breadcrumb__link”>Home</a><span class=”rm-breadcrumb__separator” aria-hidden=”true”>>;</span></li><li class=”rm-breadcrumb__item rm-breadcrumb__item–section”><a href=”https://www.thecipherbrief.com/middle-east” class=”rm-breadcrumb__link”>Middle East</a><span class=”rm-breadcrumb__separator” aria-hidden=”true”>>;</span></li><li class=”rm-breadcrumb__item rm-breadcrumb__item–post”><a href=”https://www.thecipherbrief.com/iran-digital-targeting-infrastructure” class=”rm-breadcrumb__link”>
 
 Iran’s Digital War Machine Targeting U.S. Infrastructure
 
 
 </a><span class=”rm-breadcrumb__separator” aria-hidden=”true”>>;</span></li></ol></nav><div id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1″ class=” row-wrapper clearfix “><div class=”row px20″><div id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0″ class=”main-column col sm-mb-2 md-mb-4 s12 m12 l8″><div class=”” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_0″><div class=”mb-2 splash_post medium-large-post-headline custom-desktop-extra-large-post-headline qqq” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_0_0″><div class=”posts-custom posts-custom-section section-holder clearfix” data-block=”None” data-format=”posts-custom” data-source=”current_post” data-source-type=”current_post” data-source-unique=”true” data-section-id=”” data-is-reordable=”false” data-using-stickers=”false” data-has-more=”false” data-attr-format=”posts-custom” data-attr-posts_id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_0_0″ data-attr-layout_quality=”5″ data-attr-node_id=”/root/blocks/block[post_default_layout]/abtests/abtest[1]/rm_tabs/rm_wrapper[1]/element_wrapper/row/column[1]/choose/when[(not_is_authenticated_and_post.id_!=_2673875055_and_not_post.roar_specific_data.exclude_from_paywall)]/choose/when[(2271744428_in_post.sections_or_post.roar_specific_data.paid_content)]/element_wrapper[1]/current_post-” data-attr-layout_all_headline_tag=”h1″ data-attr-layout_all_subheadline_tag=”h2″ data-attr-all_element_order=”headline,subheadline,date,post_shares,badges,all_sections” data-attr-show_around_the_web=”true” data-attr-disable_a_tag=”true” data-attr-show_full_post_body=”true” data-attr-data-rm-advanced=”true” data-attr-use_smart_keep_reading=”true” data-attr-element_classes=”splash_post medium-large-post-headline custom-desktop-extra-large-post-headline qqq” data-attr-all_share_buttons=”Twitter,Pinterest,Linkedin,Facebook,Separator,Email,Tumblr,GooglePlus,Whatsapp,Reddit,CopyLink,Flipboard,SMS,Slack” data-attr-layout_linkedin=”active” data-attr-layout_separator=”inactive” data-attr-layout_tumblr=”inactive” data-attr-layout_googleplus=”inactive” data-attr-layout_pinterest=”active” data-attr-layout_whatsapp=”inactive” data-attr-layout_reddit=”inactive” data-attr-layout_copylink=”inactive” data-attr-layout_flipboard=”inactive” data-attr-layout_sms=”inactive” data-attr-layout_slack=”inactive” data-attr-use_tag_image_for_lead_media=”true” data-attr-layout_all_image_crop=”original” data-attr-data-rm-ecomerce=”true” data-attr-layout_subheadline=”top” data-attr-layout_headline=”top” data-attr-layout_badges=”over” data-attr-layout_post_shares=”top” data-attr-layout_email=”inactive” data-attr-layout_all_max_badges=”1″ data-attr-layout_date=”top” data-attr-load_sections=”true” data-attr-layout_all_sections=”bottom” data-attr-layout_all_date_format=”%d %B, %Y” data-attr-data-rm-collapsed=”false” data-attr-filters=”” data-attr-section_url=”” data-attr-source=”” data-attr-is_current_post=”true”><div class=”posts-wrapper clearfix”><div class=”widget post-partial tag-irgc tag-tech tag-national-security tag-cyber tag-iran” data-category=”Middle East”><article elid=”2676922384″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676922384″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″><h1 class=”widget__headline h1″><span class=”widget__headline-text custom-post-headline” data-type=”text”>
 Iran’s Digital War Machine Targeting U.S. Infrastructure
 </span></h1><div class=”widget__subheadline”><h2 class=”widget__subheadline-text h2″ data-type=”text”/><p><strong>Despite strikes on Iranian command centers, Tehran's cyber operators continue targeting U.S. healthcare, energy, water, and government systems through dispersed networks and proxy groups.</strong><strong/></p></div><div class=”social-date”><span class=”social-date__text”>21 May, 2026</span></div><div class=”widget__shares share-panel”><!– TWITTER –><button data-href=”https://twitter.com/intent/tweet?url=https://www.thecipherbrief.com/iran-digital-targeting-infrastructure&;text=Iran%27s%20Digital%20War%20Machine%20Targeting%20U.S.%20Infrastructure&;” target=”_blank” data-track-share=”Twitter” class=”share share-popup share-tw” aria-label=” Share on Twitter”><i aria-hidden=”true” class=”icons-share tw fa fa-twitter”/></button><!– PINTEREST –><button data-href=”https://pinterest.com/pin/create/button/?url=https%3A%2F%2Fwww.thecipherbrief.com%2Firan-digital-targeting-infrastructure&;media=https%3A//www.thecipherbrief.com/media-library/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82Njc3MTM4OS9vcmlnaW4uanBnIiwiZXhwaXJlc19hdCI6MTgxMzg5Nzc3N30.Dq4417MS55g06vklHm88GtHfjgbvkcbGq7WsA9W_NNU/image.jpg%3Fwidth%3D600&;description=Iran%27s%20Digital%20War%20Machine%20Targeting%20U.S.%20Infrastructure” data-track-share=”Pinterest” class=”share share-pinterest share-popup” aria-label=”Save to Pinterest”><i aria-hidden=”true” class=”icons-share pt fa fa-pinterest”/></button><!– LINKEDIN –><button data-href=”https://www.linkedin.com/shareArticle?mini=false&;url=https://www.thecipherbrief.com/iran-digital-targeting-infrastructure&;” class=”share share-popup share-linkedin” data-track-share=”Linkedin” aria-label=”Share on Linkedin”><i aria-hidden=”true” class=”icons-share fa fa-linkedin”/></button><!– FACEBOOK –><button data-href=”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.thecipherbrief.com%2Firan-digital-targeting-infrastructure%3Fxrs%3DRebelMouse_fb%26ts%3D1779357602″ data-track-share=”Facebook” class=”share share-popup share-fb” aria-label=”Share on Facebook”><i aria-hidden=”true” class=”icons-share fb fa fa-facebook”/></button></div></div><div class=”widget__head”><img src=”https://www.thecipherbrief.com/media-library/cybersecurity-photo-illustrations.jpg?id=66771389&;width=1200&;height=799″/><div class=”widget__body clearfix sm-mt-1″/></div><div class=”widget__body clearfix sm-mt-1″><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/middle-east”>Middle East</a><a href=”https://www.thecipherbrief.com/middle-east/iran”>Iran</a></div></div></div></div></article></div></div></div></div><div class=”photo-caption”><p>Flag of Iran displayed on a laptop screen and binary code displayed on a screen are seen in this multiple exposure illustration photo taken in Krakow, Poland on September 27, 2022.</p>
 
 
 (<p>Photo by Jakub Porzycki/NurPhoto via Getty Images</p>)
 
</div><div class=”post-author-list”><div class=”post-author”><div class=”author_image”><a href=”https://www.thecipherbrief.com/experts/hollie-mckay”><img lazy-loadable=”true” alt=”Hollie McKay” height=”60″ width=”60″ data-runner-src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82MTA3NDA4My9vcmlnaW4uanBnIiwiZXhwaXJlc19hdCI6MTc4MzEzNTc5MX0.CjihxArfmwIlksXy6dhIjaqjVjKJF-D5ecT3UB6O89k/img.jpg”/></a></div><div class=”author_details”><div class=”author_title”>
 By
 <a href=”https://www.thecipherbrief.com/experts/hollie-mckay” class=”author_title-underlined”>Hollie McKay</a></div><div class=”author_caption”>Contributing Cipher Brief Reporter</div><div class=”author_about_html”>Hollie McKay is a Cipher Brief contributing writer, war crimes investigator, and author of “Only Cry for the Living: Memos from Inside the ISIS Battlefield”. She previously worked as an investigative and international affairs/war correspondent for Fox News Digital for over fourteen years with a focus on war, terrorism, and crimes against humanity.</div></div></div></div></div><div class=”post-with-sticky-share” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_1″><div class=”mb-2 article post-body-wrap post-shares-mobile” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_1_0″><div class=”posts-custom posts-custom-section section-holder clearfix” data-block=”None” data-format=”posts-custom” data-source=”current_post” data-source-type=”current_post” data-source-unique=”true” data-section-id=”” data-is-reordable=”false” data-using-stickers=”false” data-has-more=”false” data-attr-format=”posts-custom” data-attr-posts_id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_1_0″ data-attr-layout_quality=”5″ data-attr-header_template=”jinja/post/custom-css.html” data-attr-node_id=”/root/blocks/block[post_default_layout]/abtests/abtest[1]/rm_tabs/rm_wrapper[1]/element_wrapper/row/column[1]/choose/when[(not_is_authenticated_and_post.id_!=_2673875055_and_not_post.roar_specific_data.exclude_from_paywall)]/choose/when[(2271744428_in_post.sections_or_post.roar_specific_data.paid_content)]/element_wrapper[2]/current_post[1]-” data-attr-layout_all_headline_tag=”h1″ data-attr-layout_all_subheadline_tag=”h2″ data-attr-all_element_order=”body” data-attr-layout_body=”bottom” data-attr-disable_a_tag=”true” data-attr-data-rm-advanced=”true” data-attr-use_smart_keep_reading=”true” data-attr-element_classes=”article post-body-wrap post-shares-mobile” data-attr-all_share_buttons=”Twitter,Pinterest,Linkedin,Facebook,Separator,Email,Tumblr,GooglePlus,Whatsapp,Reddit,CopyLink,Flipboard,SMS,Slack” data-attr-layout_linkedin=”active” data-attr-layout_separator=”inactive” data-attr-layout_tumblr=”inactive” data-attr-layout_googleplus=”inactive” data-attr-layout_pinterest=”active” data-attr-layout_whatsapp=”inactive” data-attr-layout_reddit=”inactive” data-attr-layout_copylink=”inactive” data-attr-layout_flipboard=”inactive” data-attr-layout_sms=”inactive” data-attr-layout_slack=”inactive” data-attr-use_tag_image_for_lead_media=”true” data-attr-layout_all_date_format=”%d %B, %Y” data-attr-layout_remove_image=”true” data-attr-layout_email=”inactive” data-attr-filters=”” data-attr-section_url=”” data-attr-source=”” data-attr-is_current_post=”true”><div class=”posts-wrapper clearfix”><div class=”widget post-partial tag-irgc tag-tech tag-national-security tag-cyber tag-iran” data-category=”Middle East”><article elid=”2676922384″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676922384″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__head”/><div class=”widget__body clearfix sm-mt-1″><span class=”js-scroll-trigger” data-target=”body” data-triggers=”render-rebelbar” data-toggle-class=”with-floating-shares”/><div id=”utm_campaign”/><div class=”body js-expandable clearfix js-listicle-body css-listicle-body-2676922384″ data-headline=”Iran’s Digital War Machine Targeting U.S. Infrastructure”><div class=”body-description”><div class=”widget__brief”><p>The first missile strikes hadn't even cooled before Iranian-linked hackers were moving. When the U.S. and <a href=”https://www.thecipherbrief.com/middle-east/israel”>Israel</a> launched <a href=”https://www.thecipherbrief.com/military”>military</a> operations against <a href=”https://www.thecipherbrief.com/middle-east/iran”>Iran</a> on February 28, 2026, Tehran's cyber forces answered not with silence but with a systematic campaign against American infrastructure, one that has since moved well beyond reconnaissance into confirmed, disruptive attacks on <a href=”https://www.thecipherbrief.com/americas/north-america/united-states”>United States</a> soil.</p><p>The most striking blow came on March 11, when the Handala group — widely assessed as a front for an IRGC-sponsored threat actor — hit Michigan-based medical technology giant Stryker, wiping nearly 80,000 Windows devices, stealing 50 terabytes of data, and causing severe disruptions that<a href=”https://www.hipaajournal.com/stryker-cyberattack-iran/” rel=”noopener noreferrer” target=”_blank”> <u>materially</u></a> impacted the company's first-quarter earnings. Emergency responders across Maryland lost access to the electrocardiogram transmission system used to relay patient data to hospitals. The <a href=”https://www.thecipherbrief.com/tag/fbi”>FBI</a> later seized two domains that Handala used to leak the<a href=”https://www.securityweek.com/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/” rel=”noopener noreferrer” target=”_blank”> <u>stolen</u></a> data. It was, analysts noted, only the beginning.</p></div><div class=”content-container”/><div class=”js-appear-on-expand”><template><p>Israel wiped out a major military hub in southeastern Tehran,<a href=”https://www.criticalthreats.org/analysis/iran-update-evening-special-report-march-4-2026″ rel=”noopener noreferrer” target=”_blank”> <u>hitting</u></a> a site that Western intel says was the nerve center for the <a href=”https://www.thecipherbrief.com/tag/irgc”>IRGC</a>. The facility didn't just house the Quds Force and Basij; it served as the literal “brain†for Iran's global hacking campaigns and internal security operations.</p><p>The facility coordinated intrusion campaigns against adversaries across multiple continents. Yet even as satellite imagery confirmed the compound's destruction, <a href=”https://www.thecipherbrief.com/tag/cybersecurity”>cybersecurity</a> analysts were documenting a spike in reconnaissance activity emanating from Iranian-linked networks.</p><p>Tehran's digital arsenal has proven more resilient than the bombing runs suggest. Handala — the persona behind the Stryker attack and now assessed as a front for Void Manticore, an MOIS-affiliated state<a href=”https://blog.checkpoint.com/research/what-defenders-need-to-know-about-irans-cyber-capabilities/” rel=”noopener noreferrer” target=”_blank”> <u>actor</u></a> — exemplifies exactly this. It operates as a hack-and-leak engine optimized for psychological disruption: breaking into accessible systems, wiping data, and timing the release of stolen material to maximize pressure on targets.</p><p>The earlier assassination of Deputy Intelligence Minister Seyed Yahya Hosseini Panjaki, once the man pulling the strings behind Handala and Karma Below, did not collapse the operation. Rather than dissolving, the apparatus<a href=”https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/” rel=”noopener noreferrer” target=”_blank”> <u>evolved</u></a>.</p><p>“State-aligned threat actors began utilizing out-of-band communication methods and alternative infrastructure, such as Starlink IP ranges, to bypass the degraded domestic grid,†JP Castellanos, Director of Threat Intelligence at Binary Defense, tells <em><em>The Cipher Brief</em></em>.</p><p>In simpler terms, Iranian hackers quickly shifted to alternative internet connections and encrypted communication channels that operate outside Iran's damaged infrastructure, allowing cyber operations to continue even as domestic networks faltered.</p><p><strong>Critical Infrastructure in the Crosshairs</strong></p><p>The fallout from the February strikes has moved well past network probing. Iranian-linked hackers have successfully<a href=”https://edition.cnn.com/2026/04/07/politics/iran-linked-hackers-disrupt-us-industrial-sites” rel=”noopener noreferrer” target=”_blank”> <u>targeted</u></a> and disrupted multiple U.S. <a href=”https://www.thecipherbrief.com/tag/oil”>oil</a>, gas, and water sites — forcing some facilities to abandon automated systems entirely and operate manually, triggering financial losses, and, in some cases, deploying destructive wiper malware designed to erase data from victim networks. The IRGC's CEC-affiliated group CyberAv3ngers has been confirmed<a href=”https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a” rel=”noopener noreferrer” target=”_blank”> <u>to be targeting</u></a> programmable logic controllers across U.S. government facilities, water and wastewater systems, and energy sectors — exploiting internet-facing industrial devices to create openings not just for disruption but for modifications to operating parameters with direct physical consequences. The campaign represents an escalation: where earlier Iranian cyber operations tested access, these attacks are<a href=”https://www.csis.org/analysis/iranian-cyber-threat-us-critical-infrastructure” rel=”noopener noreferrer” target=”_blank”> <u>weaponizing</u></a> it.</p><p>Past operations attributed to IRGC-affiliated hackers include the 2011–2013 distributed denial-of-service attacks against major U.S. banks that disrupted online banking services for millions of customers. There was also the 2013 intrusion into the control systems of a small dam in New York, which demonstrated that Iranian hackers could potentially manipulate physical infrastructure.</p><p>“Iranian cyber strategy has consistently prioritized the targeting of ‘low-hanging fruit' within critical infrastructure sectors where high societal impact can be achieved with relatively low-sophistication techniques,†Castellanos tells <em><em>The Cipher Brief</em></em>.</p><p>Much of this activity now comes from pro-Iran and pro-Russian hacktivist groups working in coordination. The current wave of activity suggests that Iranian operators are positioning themselves for potential retaliatory strikes, while American defense agencies operate under constrained circumstances.</p><p>“The Cybersecurity and Infrastructure Security Agency has been hampered by budget cuts, a significantly reduced workforce, and a lack of leadership over the last year,†Dave Chronister, Founder of Parameter Security, tells <em><em>The Cipher Brief</em></em>. “What makes it worse is that many of the remaining staff were effectively reassigned to support immigration enforcement operations rather than protecting critical infrastructure. That's a significant misalignment of mission at exactly the wrong moment.â€</p><p>The numbers now on record make that assessment concrete. CISA's FY2026 budget dropped to $2.4 billion, with 2,649 funded positions, down from $3.0 billion and over 4,000 positions the prior year. By January 2026, the agency had logged at least 998<a href=”https://socradar.io/blog/cisa-budget-cuts-us-cyber-defense-2026/” rel=”noopener noreferrer” target=”_blank”> <u>departures</u></a>, layoffs, and transfers since the administration took office. The Trump administration also moved to<a href=”https://federalnewsnetwork.com/cybersecurity/2025/06/house-lawmakers-cisa-budget-reprieve-comes-with-questions/” rel=”noopener noreferrer” target=”_blank”> <u>reprogram</u></a> $144 million from CISA's 2025 budget to Immigration and Customs Enforcement operations.</p><p>Now, a proposed FY2027 budget would cut an additional $707 million. During an ongoing DHS shutdown, the acting CISA director has publicly stated that the agency cannot conduct the outreach and preparatory work<a href=”https://www.csis.org/analysis/iranian-cyber-threat-us-critical-infrastructure” rel=”noopener noreferrer” target=”_blank”> <u>necessary</u></a> to counter cyber threats.</p><p>“The lapse of appropriations at CISA is impacting the depth and consistency of information sharing about Iranian cyber threats as well as coordinated planning for attacks that may occur,†Bob Kolasky, Senior Vice President at Exiger and founding<a href=”https://www.exiger.com/professionals/bob-kolasky/” rel=”noopener noreferrer” target=”_blank”> <u>director</u></a> of CISA's National Risk Management Center, tells <em><em>The Cipher Brief</em></em>.</p><div class=”embed-related”/><p><strong>Soft Targets and Hard Truths</strong></p><p>Many water utilities, hospitals, and local governments still run unpatched systems with known vulnerabilities — exactly the soft targets Iranian hackers seek.</p><p>“Generally speaking, the most significant threat right now is what we call the n-day. These are known, but unpatched vulnerabilities, and Iranian threat actors are very aggressive at trying to exploit them,†Chronister points out.</p><p>The financial sector, despite its resources and experience defending against nation-state threats, remains vulnerable.</p><p>“Of all our critical sectors, the financial system is probably best positioned to weather an escalating Iranian threat, but ‘best positioned' is not the same as immune,†Chronister says. “The sectors that keep me up at night are healthcare, industrial operations such as energy utilities, water systems, manufacturing, and non-federal government agencies. Those are the soft spots, and adversaries know it.â€</p><p>The Stryker attack put the abstract into concrete terms. When Handala hit the Michigan-based medical technology giant on March 11, Maryland emergency responders lost access to the Lifenet system used to relay electrocardiogram data to<a href=”https://edition.cnn.com/2026/03/11/politics/pro-iran-hackers-cyberattack-medical-device-maker” rel=”noopener noreferrer” target=”_blank”> <u>hospitals</u></a>, prompting a statewide alert that instructed EMS clinicians to switch to radio consultation.</p><p>The attack wiped nearly 80,000 Windows devices, stole 50 terabytes of data, and materially impacted the company's first-quarter<a href=”https://www.hipaajournal.com/stryker-cyberattack-iran/” rel=”noopener noreferrer” target=”_blank”> <u>earnings</u></a>. The FBI later seized two domains that Handala used to leak the stolen data. It is precisely the community-level harm the experts had<a href=”https://www.securityweek.com/medtech-giant-stryker-crippled-by-iran-linked-hacker-attack/” rel=”noopener noreferrer” target=”_blank”> <u>forecast</u></a> — now documented, not hypothetical.</p><p>Kolasky's assessment aligns with this hierarchy of vulnerability.</p><p>“The Iranian playbook seems to suggest taking advantage of vulnerabilities in weaker parts of critical infrastructure cyber defenses. These include under-resourced sectors such as water and wastewater, food and agriculture, government services and healthcare, as well as areas of outdated technology, which can include operational technology,†he underscores.</p><p>In a conflict scenario, Tehran aims to harm critical functions that affect daily life across American communities. Water systems are failing. Hospitals are losing access to patient records. Local government services are grinding to a halt. These scenarios represent asymmetric warfare designed to erode public confidence and create pressure on policymakers without crossing thresholds that might trigger an overwhelming military response.</p><p><strong>The Reach of Tehran's Digital Operations</strong></p><p>This geographic dispersion makes Iran's cyber apparatus resilient to kinetic strikes like the weekend bombing.</p><p>“Cyber warfare depends far more on people than on high-end equipment, which means these operations can be dispersed across dozens of physical locations, down to a single operator working from a laptop,†Chronister tells <em><em>The Cipher Brief</em></em>. “While targeted strikes no doubt disrupt Iran's overall tempo, the distributed nature of cyber makes total elimination of the apparatus virtually impossible.â€</p><p>That assessment is no longer theoretical. During the twelve-day Israel-Iran conflict in June 2025, analysts from SecurityScorecard documented over 250,000 messages exchanged across 178 active Iranian proxy and hacktivist groups — with phishing campaigns, malware delivery, and data dumps timed<a href=”https://www.nextgov.com/cybersecurity/2025/08/new-research-shows-irans-expansive-cyber-offensive-during-12-day-war-israel/407207/” rel=”noopener noreferrer” target=”_blank”> <u>precisely</u></a> to kinetic strikes. Cyberattacks surged 700% within 48 hours of the opening salvos. When Iran's domestic internet was largely cut off, operators shifted to Starlink and VSAT services to maintain<a href=”https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/” rel=”noopener noreferrer” target=”_blank”> <u>tempo</u></a>. The lesson was already written before the current conflict began.</p><p>Yet physical infrastructure still matters in the opening phases of conflict.</p><p>“Physical destruction of infrastructure such as data centers, cell phone towers, satellite communication channels, radar systems — all these systems destroyed or degraded by kinetic strike are usually high priority targets in the start of any conflict, as it prevents Iranian command and control from communication to lower echelon units,†Castellanos explains.</p><p>Essentially, destroying the communications infrastructure temporarily prevents Iranian commanders from directing their cyber operators on the ground. Nonetheless, the impact is likely to be temporary rather than decisive. Using alternative networks and encrypted channels to bypass damaged infrastructure entirely, cyber operatives quickly adapt.</p><p>“Effective cyber campaigns depend on access to technical infrastructure for carrying out attacks, personnel, and some level of command and control,†Kolasky asserts. “United States and Israeli operations have the proven ability to degrade Iran's cyber capability and seem to have done so again. The question of how resilient the Iranian cyber warfare apparatus is remains an open one, but, thus far, it seems like we have limited Iran's cyber offensive ability and, in the short term, I would expect that will remain the case.â€</p><p>In simpler terms, the strikes have disrupted Iran's ability to coordinate large-scale cyber operations for now, but it remains unclear how quickly Tehran can rebuild its offensive capabilities.</p><p>Meanwhile, Iranian operators have cultivated relationships with cybercriminal groups that provide technical services and operational cover. When Iranian-linked hackers targeted<a href=”https://www.unitedagainstnucleariran.com/history-of-iranian-cyber-attacks-and-incidents” rel=”noopener noreferrer” target=”_blank”> <u>Albanian</u></a> government networks in 2022, investigators traced the operation through multiple layers of contractors and intermediaries before establishing definitive state sponsorship.</p><p>Right now, pro-Russian hacktivist groups such as NoName057(16), the Z-Pentest Alliance and Killnet have joined with pro-Iran groups<a href=”https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/” rel=”noopener noreferrer” target=”_blank”> <u>targeting</u></a> Israel and its Western allies, launching DDoS attacks against Israeli and United States financial services in coordination with Iranian goals. These attacks aim to disrupt online banking and payment systems, creating public frustration and economic uncertainty while demonstrating Iran's ability to strike back without firing a missile.</p><p>Moreover, DieNet, a pro-Palestinian hacktivist group that emerged in March 2025 and has since claimed responsibility for DDoS attacks against U.S. energy, financial, healthcare, government, transit, and communications systems — deploying DNS amplification, TCP SYN floods, and NTP amplification in<a href=”https://www.security.com/threat-intelligence/iran-cyber-threat-activity-us” rel=”noopener noreferrer” target=”_blank”> <u>operations</u></a> that intensified following the arrest of activist Mahmoud Khalil.</p><p>“This international distribution of operations ensures that even if Iran is ‘offline' domestically, its ‘second front' in the cyber domain remains fully operational,†Castellanos tells The Cipher Brief.</p><p>Iran's malicious cyber activities are made more difficult by this operational model, which complicates attribution efforts. Iran uses proxy forces to advance its strategic objectives while maintaining an official distance from their activities as part of its regional strategy. In the cyber domain, this approach allows Iranian intelligence services to conduct operations that would be politically costly if directly attributed to Tehran.</p><p>Since the February 28 strikes, Iranian-aligned groups have claimed numerous operations across the <a href=”https://www.thecipherbrief.com/tag/middle-east”>Middle East</a> and beyond. Pro-Iran hacktivists have<a href=”https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/” rel=”noopener noreferrer” target=”_blank”> <u>targeted</u></a> energy infrastructure in Jordan, payment systems in Israel, and government portals across Gulf states. While many<a href=”https://www.fdd.org/analysis/2026/03/04/irans-pro-regime-hackers-cannot-back-up-their-claims-of-successful-cyber-attacks/” rel=”noopener noreferrer” target=”_blank”> <u>claims</u></a> remain unverified, the volume and coordination of activity suggest a systematic campaign to demonstrate continued operational capability despite the degradation of Iran's domestic infrastructure.</p><p>“It makes it very hard to identify them from a geolocation aspect, as well as identifying the fingerprint of the attack. It creates more resilience in these operations since there is no single point of infrastructure that you can attack,†Chronister tells The Cipher Brief. “It also means that as Iran's leadership withers, and there is less coordination with their various cyber forces, these groups could act on their own initiative, which will make an already complex situation even worse.â€</p><p>The loss of centralized control cuts both ways for Iran. Cyber operations conducted by dispersed groups can withstand missile strikes, but rogue proxy groups operating independently may unintentionally escalate conflicts.</p><p>Bombing a building does not stop hackers with laptops scattered across multiple countries, which highlights another fundamental challenge. Iranian cyber operatives can resume operations from new locations within hours, rendering traditional military strikes largely ineffective against digital threats.</p><p>“Like with proxy terrorist groups, Iran has the ability for a diffuse set of actors to work on behalf of the IRGC cause, but those actors are limited in the scale of what effects they can produce,†he adds. “This diffusion will allow for a continued exploitation of vulnerable systems that I would expect to be targeted for propaganda victories, to shift public opinion, and to cause harm at the community level. This necessitates broad information sharing engagement across critical infrastructure for the United States cyber defense community.â€</p><p>The threat horizon extends well beyond the immediate conflict. Analysts are now flagging two upcoming high-profile moments on the U.S. calendar, the World Cup in June and the midterm elections in November, as likely<a href=”https://www.csis.org/analysis/iranian-cyber-threat-us-critical-infrastructure” rel=”noopener noreferrer” target=”_blank”> <u>priorities</u></a> for Iranian cyber targeting. Security experts warn the tournament could see a 30 to 40 percent surge in fraud attempts, with Iranian-linked actors expected to focus specifically on airports, transportation systems, and critical infrastructure in host<a href=”https://www.ynetnews.com/tech-and-digital/article/hjmhy0br11l” rel=”noopener noreferrer” target=”_blank”> <u>cities</u></a>. Iran's track record of infiltrating U.S. systems ahead of strategic moments — elections, geopolitical flashpoints, major public events — suggests these will not be missed opportunities.</p><p>The message is clear: Iran's distributed cyber army may lack the power to cripple America's infrastructure, but it has more than enough capability to disrupt daily life — and only coordinated defense can stop it.</p><p><strong><em>The Cipher Brief is committed to publishing a range of perspectives on <a href=”https://www.thecipherbrief.com/national-security” target=”_self”>national security</a> issues submitted by deeply experienced <a href=”https://www.thecipherbrief.com/national-security” target=”_self”>national security</a> professionals. Opinions expressed are those of the author and do not represent the views or opinions of The Cipher Brief.</em></strong></p><p><strong><em>Have a perspective to share based on your experience in the <a href=”https://www.thecipherbrief.com/national-security”>national security</a> field? Send it to <a href=”mailto:Editor@thecipherbrief.com” rel=”noopener noreferrer” target=”_blank”>Editor@thecipherbrief.com</a> for publication consideration.</em></strong></p><p><strong><em>Read more expert-driven national security insights, perspective and analysis in <a href=”https://www.thecipherbrief.com/” target=”_self”>The Cipher Brief</a></em></strong></p></template></div><div class=”widget__show-more with-primary-color js-keep-reading js-page-view-and-reload-embeds”><span class=”show-more js-expand”>Keep reading...</span><span class=”show-less js-contract”>Show less</span></div></div></div><span class=”” data-elid=”2676922384″ data-post-url=”https://www.thecipherbrief.com/iran-digital-targeting-infrastructure” data-authors=”Ryan Simons” data-headline=”Iran’s Digital War Machine Targeting U.S. Infrastructure” data-page-title=”Iran’s Digital War Machine Targeting U.S. Infrastructure – The Cipher Brief”/></div></div></div></article></div></div></div></div><div class=”mb-2 splash_post article sticky-share ” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_1_1″><div class=”posts-custom posts-custom-section section-holder clearfix” data-block=”None” data-format=”posts-custom” data-source=”current_post” data-source-type=”current_post” data-source-unique=”true” data-section-id=”” data-is-reordable=”false” data-using-stickers=”false” data-has-more=”false” data-attr-format=”posts-custom” data-attr-posts_id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_1_1″ data-attr-layout_quality=”5″ data-attr-node_id=”/root/blocks/block[post_default_layout]/abtests/abtest[1]/rm_tabs/rm_wrapper[1]/element_wrapper/row/column[1]/choose/when[(not_is_authenticated_and_post.id_!=_2673875055_and_not_post.roar_specific_data.exclude_from_paywall)]/choose/when[(2271744428_in_post.sections_or_post.roar_specific_data.paid_content)]/element_wrapper[2]/current_post[2]-” data-attr-layout_all_headline_tag=”h1″ data-attr-layout_all_subheadline_tag=”h2″ data-attr-all_element_order=”post_shares” data-attr-show_around_the_web=”true” data-attr-disable_a_tag=”true” data-attr-show_full_post_body=”true” data-attr-data-rm-advanced=”true” data-attr-use_smart_keep_reading=”true” data-attr-element_classes=”splash_post article sticky-share ” data-attr-all_share_buttons=”Twitter,Pinterest,Linkedin,Facebook,Separator,Email,Tumblr,GooglePlus,Whatsapp,Reddit,CopyLink,Flipboard,SMS,Slack” data-attr-layout_linkedin=”active” data-attr-layout_separator=”inactive” data-attr-layout_tumblr=”inactive” data-attr-layout_googleplus=”inactive” data-attr-layout_pinterest=”active” data-attr-layout_whatsapp=”inactive” data-attr-layout_reddit=”inactive” data-attr-layout_copylink=”inactive” data-attr-layout_flipboard=”inactive” data-attr-layout_sms=”inactive” data-attr-layout_slack=”inactive” data-attr-use_tag_image_for_lead_media=”true” data-attr-layout_all_date_format=”%d %B, %Y” data-attr-layout_remove_image=”true” data-attr-layout_post_shares=”bottom” data-attr-layout_email=”inactive” data-attr-filters=”” data-attr-section_url=”” data-attr-source=”” data-attr-is_current_post=”true”><div class=”posts-wrapper clearfix”><div class=”widget post-partial tag-irgc tag-tech tag-national-security tag-cyber tag-iran” data-category=”Middle East”><article elid=”2676922384″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676922384″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__head”/><div class=”widget__body clearfix sm-mt-1″><div class=”widget__shares share-panel”><!– TWITTER –><button data-href=”https://twitter.com/intent/tweet?url=https://www.thecipherbrief.com/iran-digital-targeting-infrastructure&;text=Iran%27s%20Digital%20War%20Machine%20Targeting%20U.S.%20Infrastructure&;” target=”_blank” data-track-share=”Twitter” class=”share share-popup share-tw” aria-label=” Share on Twitter”><i aria-hidden=”true” class=”icons-share tw fa fa-twitter”/></button><!– PINTEREST –><button data-href=”https://pinterest.com/pin/create/button/?url=https%3A%2F%2Fwww.thecipherbrief.com%2Firan-digital-targeting-infrastructure&;media=https%3A//www.thecipherbrief.com/media-library/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82Njc3MTM4OS9vcmlnaW4uanBnIiwiZXhwaXJlc19hdCI6MTgxMzg5Nzc3N30.Dq4417MS55g06vklHm88GtHfjgbvkcbGq7WsA9W_NNU/image.jpg%3Fwidth%3D600&;description=Iran%27s%20Digital%20War%20Machine%20Targeting%20U.S.%20Infrastructure” data-track-share=”Pinterest” class=”share share-pinterest share-popup” aria-label=”Save to Pinterest”><i aria-hidden=”true” class=”icons-share pt fa fa-pinterest”/></button><!– LINKEDIN –><button data-href=”https://www.linkedin.com/shareArticle?mini=false&;url=https://www.thecipherbrief.com/iran-digital-targeting-infrastructure&;” class=”share share-popup share-linkedin” data-track-share=”Linkedin” aria-label=”Share on Linkedin”><i aria-hidden=”true” class=”icons-share fa fa-linkedin”/></button><!– FACEBOOK –><button data-href=”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.thecipherbrief.com%2Firan-digital-targeting-infrastructure%3Fxrs%3DRebelMouse_fb%26ts%3D1779357602″ data-track-share=”Facebook” class=”share share-popup share-fb” aria-label=”Share on Facebook”><i aria-hidden=”true” class=”icons-share fb fa fa-facebook”/></button></div></div></div></div></article></div></div></div></div></div><!– User Code –><div class=”body-subscription-wrapper”><div class=”white-overlay”/><div class=”subscription-container”><div class=”subscription-text”>
 Access all of The Cipher Brief's national security-focused expert insight by becoming a Cipher Brief Subscriber+
 Member.
 </div><div class=”button-group”><a href=”/subscriber-plus” class=”button btn sign-up”>Sign Up</a><a class=”button btn log-in unlogged”>Log In</a></div></div></div><!– End User Code –><div class=”container” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_4″><div class=”ad-container” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_4_0″/></div><!– User Code –><aside class=”aside-top-5-module container”><!– End User Code –><h2 class=”module__heading “>
 
 
 Top 5
 
 </h2><div class=”mb-2 five-in-a-row” id=”sAside_Top_5_module_0_0_3_0_0_3_0_0_1_0″><div class=”posts-custom posts-custom-section section-holder clearfix” data-block=”section_6″ data-format=”posts-custom” data-source=”94bcc3d73c0b56c8fe11b18378dc8922″ data-source-type=”page” data-source-unique=”true” data-section-id=”” data-is-reordable=”false” data-using-stickers=”false” data-has-more=”true” data-attr-cache_ttl_in_seconds=”300″ data-attr-format=”posts-custom” data-attr-posts_id=”sAside_Top_5_module_0_0_3_0_0_3_0_0_1_0″ data-attr-source_unique=”true” data-attr-layout_quality=”1″ data-attr-node_id=”/root/blocks/block[aside_top_5_module]/abtests/abtest[1]/choose/when[(post_page)]/choose/when[2271744428_in_post.sections]/posts-” data-attr-source=”filtered” data-attr-use_tag_image_for_lead_media=”true” data-attr-limit=”5″ data-attr-all_element_order=”headline,date,snark_line,load_sections,all_sections” data-attr-element_classes=”five-in-a-row” data-attr-layout_headline=”bottom” data-attr-layout_date=”bottom” data-attr-layout_remove_image=”true” data-attr-layout_all_date_format=”%B %d, %Y” data-attr-from_regular_sections_other_than=”editorial/non-content,podcasts,books,dead-drop,report,events,book-review” data-attr-order_period=”7d” data-attr-raw_fields=”” data-attr-from_regular_sections=”article” data-attr-order=”page-views” data-attr-without_current=”true” data-attr-layout_snark_line=”bottom” data-attr-source_site=”parent_site”><div class=”posts-wrapper clearfix”><div class=”widget tag-russia tag-war tag-china tag-ceasefire tag-iran” elid=”2676912758″><article elid=”2676912758″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676912758″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__head”/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/russia-china-keeping-iran-lethal” aria-label=”Moscow and Beijing's shadow war: How Russia and China are keeping Iran lethal” data-type=”text”>
 Moscow and Beijing's shadow war: How Russia and China are keeping Iran lethal
 </a></h2><div class=”social-date”><span class=”social-date__text”>May 19, 2026</span></div><div class=”snark-line”><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>May 19, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/hollie-mckay” data-type=”text”>Hollie McKay</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>May 19, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div></div></div></div></article></div><div class=”widget tag-china tag-intelligence tag-national-security tag-taiwan tag-russia” elid=”2676891363″><article elid=”2676891363″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676891363″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__head”/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/the-bear-and-the-dragon” aria-label=”The Bear and the Dragon: The Threat of Sino-Russian Opportunism and Intelligence Miscalculation” data-type=”text”>
 The Bear and the Dragon: The Threat of Sino-Russian Opportunism and Intelligence Miscalculation
 </a></h2><div class=”social-date”><span class=”social-date__text”>May 14, 2026</span></div><div class=”snark-line”><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>May 14, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/sean-wiswesser” data-type=”text”>Sean Wiswesser</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>May 14, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div></div></div></div></article></div><div class=”widget tag-national-security tag-politics tag-ccp” elid=”2676879654″><article elid=”2676879654″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676879654″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__head”/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/charismatic-and-a-machiavellian-meet” aria-label=”When a Charismatic and a Machiavellian Meet” data-type=”text”>
 When a Charismatic and a Machiavellian Meet
 </a></h2><div class=”social-date”><span class=”social-date__text”>May 12, 2026</span></div><div class=”snark-line”><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>May 12, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/dennis-wilder” data-type=”text”>Dennis Wilder</a></div></div><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>May 12, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/dr-ursula-m-wilder” data-type=”text”>Dr. Ursula M. Wilder</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>May 12, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div></div></div></div></article></div><div class=”widget” elid=”2676827245″><article elid=”2676827245″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676827245″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__head”/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/deep-in-cartel-country-cia-deaths-expose-fragile-u-s-mexico-security-ties” aria-label=”CIA Deaths Expose Fragile U.S.-Mexico Security Ties” data-type=”text”>
 CIA Deaths Expose Fragile U.S.-Mexico Security Ties
 </a></h2><div class=”social-date”><span class=”social-date__text”>April 29, 2026</span></div><div class=”snark-line”><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>April 29, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/elaine-shannon” data-type=”text”>Elaine Shannon</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>April 29, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/bchristian” data-type=”text”>Brad Christian</a></div></div></div></div></div></div></article></div><div class=”widget tag-chernobyl-disaster tag-nuclear-catastrophe tag-russia-under-putin tag-state-tradecraft” elid=”2676823407″><article elid=”2676823407″ data-frozen-sections=”[]” class=”clearfix image-article sm-mb-1 quality-HD post-2676823407″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__head”/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/from-chernobyl-to-ukraine-the-enduring-cost-of-kremlin-lies” aria-label=”From Chernobyl to Ukraine: The Enduring Cost of Kremlin Lies” data-type=”text”>
 From Chernobyl to Ukraine: The Enduring Cost of Kremlin Lies
 </a></h2><div class=”social-date”><span class=”social-date__text”>April 28, 2026</span></div><div class=”snark-line”><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>April 28, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/sean-wiswesser” data-type=”text”>Sean Wiswesser</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>April 28, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/bchristian” data-type=”text”>Brad Christian</a></div></div></div></div></div></div></article></div></div></div></div><!– User Code –></aside><!– End User Code –><div class=”container” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_6″><h2 class=”module__heading “>
 
 
 Related Articles
 
 </h2><div class=”load-more-scroll-wrapper” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_6_1″><div class=”mb-2 three-in-a-row” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_6_1_0″><div class=”posts-custom posts-custom-section section-holder clearfix” data-block=”section_7″ data-format=”posts-custom” data-source=”loadmore_other” data-source-type=”page” data-source-unique=”true” data-section-id=”” data-is-reordable=”false” data-using-stickers=”false” data-has-more=”true” data-attr-cache_ttl_in_seconds=”43200″ data-attr-format=”posts-custom” data-attr-posts_id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_0_0_0_0_0_6_1_0″ data-attr-source_unique=”true” data-attr-layout_quality=”5″ data-attr-node_id=”/root/blocks/block[post_default_layout]/abtests/abtest[1]/rm_tabs/rm_wrapper[1]/element_wrapper/row/column[1]/choose/when[(not_is_authenticated_and_post.id_!=_2673875055_and_not_post.roar_specific_data.exclude_from_paywall)]/choose/when[(2271744428_in_post.sections_or_post.roar_specific_data.paid_content)]/element_wrapper[4]/element_wrapper/posts-” data-attr-source=”filtered” data-attr-use_tag_image_for_lead_media=”true” data-attr-all_element_order=”badges,headline,snark_line,all_sections” data-attr-layout_headline=”bottom” data-attr-attribute_sets=”” data-attr-element_classes=”three-in-a-row” data-attr-from_regular_sections_other_than=”editorial/non-content,dead-drop,report,book-review” data-attr-limit=”6″ data-attr-layout_all_date_format=”%d %B, %Y” data-attr-layout_badges=”over” data-attr-layout_all_image_crop=”3×2″ data-attr-layout_all_sections=”bottom” data-attr-layout_snark_line=”bottom” data-attr-without_current=”true” data-attr-source_id=”loadmore_other” data-attr-raw_fields=”from_regular_sections” data-attr-from_regular_sections=”[0, 2270266960, 2270274820, 2270266981, 2270273324, 2271744428]” data-attr-from_regular_sections_of_current_post=”true” data-attr-from_regular_tags_of_current_post=”true” data-attr-from_authors_of_current_post=”true” data-attr-headline_text=”” data-attr-data-rm-collapsed=”true” data-attr-source_site=”parent_site”><div class=”posts-wrapper clearfix”><div class=”widget tag-vatican tag-foreign-policy tag-washington tag-national-security” elid=”2676909256″><article elid=”2676909256″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-HD post-2676909256″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/the-administration-needs-a-better-relationship-with-the-vatican” aria-label=”The administration needs a better relationship with the Vatican” data-type=”text”>
 The administration needs a better relationship with the Vatican
 </a></h2><div class=”snark-line”><div class=”opinion-item”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/the-administration-needs-a-better-relationship-with-the-vatican” aria-label=”The administration needs a better relationship with the Vatican” class=”rm-stats-tracked”><img role=”img” alt=”Ambassador Joseph DeTrani” aria-label=”Ambassador Joseph DeTrani” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82NTU2NDQzNi9vcmlnaW4ucG5nIiwiZXhwaXJlc19hdCI6MTgyNzIyNjU5N30.0dDedZiLy1htdgm_f8YMD4Kk1csG8GJt-2-75A14nuc/img.png” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/the-administration-needs-a-better-relationship-with-the-vatican” aria-label=”The administration needs a better relationship with the Vatican” data-type=”text”>
 The administration needs a better relationship with the Vatican
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line > .opinion-item) .widget__headline:not(.opinion) {
 display: none;
 }
 .snark-line .opinion-item + .opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3 / 2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 OPINION — President Reagan formed an alliance with Pope John Paul II in the 1980s that contributed to the dissolution of the Soviet Union in [...]
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/the-administration-needs-a-better-relationship-with-the-vatican”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>18 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/joseph-detrani” data-type=”text”>Ambassador Joseph DeTrani</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>18 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/experts/joseph-detrani”>Ambassador Joseph DeTrani</a></div></div></div></div></article></div><div class=”widget tag-washington tag-defense tag-national-security” elid=”2676891420″><article elid=”2676891420″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-HD post-2676891420″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/a-bridge-too-small-why-49-billion-cant-fix-a-1-5-trillion-problem” aria-label=”A Bridge Too Small: Why $49 Billion Can't Fix a $1.5 Trillion Problem” data-type=”text”>
 A Bridge Too Small: Why $49 Billion Can't Fix a $1.5 Trillion Problem
 </a></h2><div class=”snark-line”><div class=”opinion-item”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/a-bridge-too-small-why-49-billion-cant-fix-a-1-5-trillion-problem” aria-label=”A Bridge Too Small: Why $49 Billion Can't Fix a $1.5 Trillion Problem” class=”rm-stats-tracked”><img role=”img” alt=”Joey Gagnard” aria-label=”Joey Gagnard” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82NTUwNDc3Mi9vcmlnaW4ucG5nIiwiZXhwaXJlc19hdCI6MTgxMzgxMDIyN30.Y3LK7pu1R73tb_jVMW7ybqYW-4AL4i2u8a2U71NKuU8/img.png” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/a-bridge-too-small-why-49-billion-cant-fix-a-1-5-trillion-problem” aria-label=”A Bridge Too Small: Why $49 Billion Can't Fix a $1.5 Trillion Problem” data-type=”text”>
 A Bridge Too Small: Why $49 Billion Can't Fix a $1.5 Trillion Problem
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line > .opinion-item) .widget__headline:not(.opinion) {
 display: none;
 }
 .snark-line .opinion-item + .opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3 / 2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 Welcome to The Iron Triangle, the Cipher Brief column serving Procurement Officers tasked with buying the future, Investors funding the next [...]
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/a-bridge-too-small-why-49-billion-cant-fix-a-1-5-trillion-problem”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>14 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/joey-gagnard” data-type=”text”>Joey Gagnard</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>14 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/experts/joey-gagnard”>Joey Gagnard</a></div></div></div></div></article></div><div class=”widget tag-cia tag-intelligence tag-nga tag-artificial-intelligence tag-national-security” elid=”2676891709″><article elid=”2676891709″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-HD post-2676891709″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/case-for-analytic-tradecraft-reform” aria-label=”Sustaining Decision Advantage: The Case for Analytic Tradecraft Reform” data-type=”text”>
 Sustaining Decision Advantage: The Case for Analytic Tradecraft Reform
 </a></h2><div class=”snark-line”><div class=”opinion-item”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/case-for-analytic-tradecraft-reform” aria-label=”Sustaining Decision Advantage: The Case for Analytic Tradecraft Reform” class=”rm-stats-tracked”><img role=”img” alt=”Brian Lessenberry” aria-label=”Brian Lessenberry” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82NjczMDc4OS9vcmlnaW4uanBnIiwiZXhwaXJlc19hdCI6MTgzMDM5NDk0OX0.dePGiHgSrQ9C13yZFRmmP2NZKLgX6FK7WSaqUeI-VZE/img.jpg” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/case-for-analytic-tradecraft-reform” aria-label=”Sustaining Decision Advantage: The Case for Analytic Tradecraft Reform” data-type=”text”>
 Sustaining Decision Advantage: The Case for Analytic Tradecraft Reform
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line > .opinion-item) .widget__headline:not(.opinion) {
 display: none;
 }
 .snark-line .opinion-item + .opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3 / 2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 OPINION — In an era where warfighters and decision-makers have on-demand access to vast data holdings and AI-generated insights, the future of [...]
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/case-for-analytic-tradecraft-reform”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>14 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/brian-lessenberry” data-type=”text”>Brian Lessenberry</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>14 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div></div></div></div></article></div><div class=”widget tag-diplomacy tag-united-nations tag-north-korea tag-iran tag-nuclear-proliferation tag-nuclear-weapons” elid=”2676886902″><article elid=”2676886902″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-HD post-2676886902″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/nuclear-arms-race-is-accelerating” aria-label=”The Nuclear Arms Race Is Accelerating — and the U.N. Looks Increasingly Powerless” data-type=”text”>
 The Nuclear Arms Race Is Accelerating — and the U.N. Looks Increasingly Powerless
 </a></h2><div class=”snark-line”><div class=”opinion-item”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/nuclear-arms-race-is-accelerating” aria-label=”The Nuclear Arms Race Is Accelerating — and the U.N. Looks Increasingly Powerless” class=”rm-stats-tracked”><img role=”img” alt=”Ambassador Joseph DeTrani” aria-label=”Ambassador Joseph DeTrani” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82NTU2NDQzNi9vcmlnaW4ucG5nIiwiZXhwaXJlc19hdCI6MTgyNzIyNjU5N30.0dDedZiLy1htdgm_f8YMD4Kk1csG8GJt-2-75A14nuc/img.png” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/nuclear-arms-race-is-accelerating” aria-label=”The Nuclear Arms Race Is Accelerating — and the U.N. Looks Increasingly Powerless” data-type=”text”>
 The Nuclear Arms Race Is Accelerating — and the U.N. Looks Increasingly Powerless
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line > .opinion-item) .widget__headline:not(.opinion) {
 display: none;
 }
 .snark-line .opinion-item + .opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3 / 2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 OPINION – Last week, the 11th Review Conference of the Parties to the Treaty on the Non-Proliferation of Nuclear Weapons, currently in session at the [...]
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/nuclear-arms-race-is-accelerating”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>13 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/joseph-detrani” data-type=”text”>Ambassador Joseph DeTrani</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>13 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/experts/joseph-detrani”>Ambassador Joseph DeTrani</a></div></div></div></div></article></div><div class=”widget tag-iran tag-washington tag-diplomacy tag-war tag-pakistan” elid=”2676886905″><article elid=”2676886905″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-HD post-2676886905″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/pakistani-general-running-washingtons-backchannel-to-tehran” aria-label=”The Pakistani General Running Washington's Backchannel to Tehran” data-type=”text”>
 The Pakistani General Running Washington's Backchannel to Tehran
 </a></h2><div class=”snark-line”><div class=”opinion-item”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/pakistani-general-running-washingtons-backchannel-to-tehran” aria-label=”The Pakistani General Running Washington's Backchannel to Tehran” class=”rm-stats-tracked”><img role=”img” alt=”Javid Ahmad” aria-label=”Javid Ahmad” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82NjQzMjI1My9vcmlnaW4uanBnIiwiZXhwaXJlc19hdCI6MTgwNTI4MDI5MH0.QbOoRnlRN7J-PlBvLcKCpZ-sZEZsDrcjgwv72k1yFmQ/img.jpg” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/pakistani-general-running-washingtons-backchannel-to-tehran” aria-label=”The Pakistani General Running Washington's Backchannel to Tehran” data-type=”text”>
 The Pakistani General Running Washington's Backchannel to Tehran
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line > .opinion-item) .widget__headline:not(.opinion) {
 display: none;
 }
 .snark-line .opinion-item + .opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3 / 2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 OPINION — As Washington and Tehran edge closer to escalation, the most critical line of communication keeping the crisis from spiraling is being run [...]
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/pakistani-general-running-washingtons-backchannel-to-tehran”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>13 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/javid-ahmad” data-type=”text”>Javid Ahmad</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>13 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/alternative-perspectives”>Alternative Perspectives</a></div></div></div></div></article></div><div class=”widget tag-congress tag-military tag-national-security tag-defense” elid=”2676879078″><article elid=”2676879078″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-HD post-2676879078″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/congress-pentagons-expanding-budget” aria-label=”Congress Faces a Growing Blind Spot in the Pentagon's Expanding Budget” data-type=”text”>
 Congress Faces a Growing Blind Spot in the Pentagon's Expanding Budget
 </a></h2><div class=”snark-line”><div class=”opinion-item”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/congress-pentagons-expanding-budget” aria-label=”Congress Faces a Growing Blind Spot in the Pentagon's Expanding Budget” class=”rm-stats-tracked”><img role=”img” alt=”Walter Pincus” aria-label=”Walter Pincus” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82NTUwNDgzNC9vcmlnaW4ucG5nIiwiZXhwaXJlc19hdCI6MTgzNjM0NjU0N30.y_mymjmYU2jOL0FxlwltFVXTyZrye9ZeXKmKLXYumJM/img.png” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/congress-pentagons-expanding-budget” aria-label=”Congress Faces a Growing Blind Spot in the Pentagon's Expanding Budget” data-type=”text”>
 Congress Faces a Growing Blind Spot in the Pentagon's Expanding Budget
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line > .opinion-item) .widget__headline:not(.opinion) {
 display: none;
 }
 .snark-line .opinion-item + .opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3 / 2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 OPINION — “That brings me to a concern I want to put on the record. In addition to the billions requested for the F-35 [fighter-bomber] enterprise, [...]
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/congress-pentagons-expanding-budget”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>12 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/walter-pincus” data-type=”text”>Walter Pincus</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>12 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/experts/walter-pincus”>Walter Pincus</a><a href=”https://www.thecipherbrief.com/columns/fine-print”>Fine Print</a></div></div></div></div></article></div></div></div></div></div><div load-type=”button” class=”btn button-load-more next-page-wrapper hidden action-btn” data-loading-text=”” data-skl-id=”/root/blocks/block[post_default_layout]/abtests/abtest[1]/rm_tabs/rm_wrapper[1]/element_wrapper/row/column[1]/choose/when[(not_is_authenticated_and_post.id_!=_2673875055_and_not_post.roar_specific_data.exclude_from_paywall)]/choose/when[(2271744428_in_post.sections_or_post.roar_specific_data.paid_content)]/element_wrapper[4]/element_wrapper-” data-has-more=”true” data-more-posts-exists=”true” data-posts-sources=”loadmore_other” data-ignore-page-number=”false”>Load More</div></div></div><div id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1″ class=”sidebar sticky-wrapper col sm-mb-2 md-mb-4 s12 m12 l4″><div class=”experts-wrapper” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1_0_0″><h2 class=”module__heading “>
 
 
 The Latest
 
 </h2><div class=”mb-2 image-on-left vertical-list” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1_0_0_2_2_0″><div class=”posts-custom posts-custom-section section-holder clearfix” data-block=”section_8″ data-format=”posts-custom” data-source=”latest” data-source-type=”page” data-source-unique=”true” data-section-id=”” data-is-reordable=”false” data-using-stickers=”false” data-has-more=”true” data-attr-cache_ttl_in_seconds=”43200″ data-attr-format=”posts-custom” data-attr-posts_id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1_0_0_2_2_0″ data-attr-source_unique=”true” data-attr-without_current=”true” data-attr-layout_quality=”9″ data-attr-node_id=”/root/blocks/block[post_default_layout]/abtests/abtest[1]/rm_tabs/rm_wrapper[1]/element_wrapper/row/column[2]/if[is_mobile==false]/element_wrapper[1]/choose/otherwise/posts-” data-attr-source=”filtered” data-attr-use_tag_image_for_lead_media=”true” data-attr-all_element_order=”badges,headline,snark_line,all_sections” data-attr-layout_headline=”bottom” data-attr-attribute_sets=”” data-attr-element_classes=”image-on-left vertical-list” data-attr-from_regular_sections_other_than=”editorial/non-content,book-review,report” data-attr-limit=”3″ data-attr-layout_all_date_format=”%d %B, %Y” data-attr-layout_badges=”over” data-attr-layout_all_image_crop=”3×2″ data-attr-layout_all_sections=”bottom” data-attr-layout_snark_line=”bottom” data-attr-from_regular_sections=”column-article” data-attr-data-rm-collapsed=”true” data-attr-priority=”1″ data-attr-source_id=”latest” data-attr-source_site=”parent_site”><div class=”posts-wrapper clearfix”><div class=”widget tag-baltic-states tag-sweden tag-oil tag-nato tag-russia” elid=”2676926208″><article elid=”2676926208″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-MD post-2676926208″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/sweden-denmark-power-over-russia” aria-label=”A Tale of Two Straits: Sweden and Denmark are in a Position of Power Over Russia” data-type=”text”>
 A Tale of Two Straits: Sweden and Denmark are in a Position of Power Over Russia
 </a></h2><div class=”snark-line”><div class=”opinion-item unordered”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/sweden-denmark-power-over-russia” aria-label=”A Tale of Two Straits: Sweden and Denmark are in a Position of Power Over Russia” class=”rm-stats-tracked”><img role=”img” alt=”Joey Gagnard” aria-label=”Joey Gagnard” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82NTUwNDc3Mi9vcmlnaW4ucG5nIiwiZXhwaXJlc19hdCI6MTgxMzgxMDIyN30.Y3LK7pu1R73tb_jVMW7ybqYW-4AL4i2u8a2U71NKuU8/img.png” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/sweden-denmark-power-over-russia” aria-label=”A Tale of Two Straits: Sweden and Denmark are in a Position of Power Over Russia” data-type=”text”>
 A Tale of Two Straits: Sweden and Denmark are in a Position of Power Over Russia
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line>.opinion-item) .widget__headline:not(.opinion){
 display: none;
 }
 .snark-line .opinion-item+.opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3/2;
 object-fit: cover;
 }
 ]]></style><style><![CDATA[
 .widget__body:has(.snark-line>.opinion-item) .widget__headline:not(.opinion){
 display: none;
 }
 .snark-line .opinion-item+.opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3/2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 Two straits, six thousand kilometers apart, are defining the global balance of power in 2026. The first, Hormuz, is closed by force and heavily [...] 
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/sweden-denmark-power-over-russia”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>21 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/joey-gagnard” data-type=”text”>Joey Gagnard</a></div></div><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>21 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/nils-alstad” data-type=”text”>Nils Alstad</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>21 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/experts/joey-gagnard”>Joey Gagnard</a></div></div></div></div></article></div><div class=”widget tag-irgc tag-national-security tag-defense tag-united-kingdom tag-iran” elid=”2676922378″><article elid=”2676922378″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-MD post-2676922378″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/proscribing-irgc-make-britain-safer” aria-label=”Proscribing the IRGC Will Make Britain Safer” data-type=”text”>
 Proscribing the IRGC Will Make Britain Safer
 </a></h2><div class=”snark-line”><div class=”opinion-item unordered”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/proscribing-irgc-make-britain-safer” aria-label=”Proscribing the IRGC Will Make Britain Safer” class=”rm-stats-tracked”><img role=”img” alt=”Johnathan Hackett” aria-label=”Johnathan Hackett” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82Njc2NTA3My9vcmlnaW4uanBnIiwiZXhwaXJlc19hdCI6MTg0MDAyOTI2MH0.DBX8MYdxlA8pJqDmMSdLoiS27QCR_in-6C8lGC8kfsA/img.jpg” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/proscribing-irgc-make-britain-safer” aria-label=”Proscribing the IRGC Will Make Britain Safer” data-type=”text”>
 Proscribing the IRGC Will Make Britain Safer
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line>.opinion-item) .widget__headline:not(.opinion){
 display: none;
 }
 .snark-line .opinion-item+.opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3/2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 The United Kingdom must act to proscribe Iran's Islamic Revolutionary Guard Corps, or IRGC, before it's too late. The IRGC must be proscribed before [...] 
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/proscribing-irgc-make-britain-safer”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>21 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/johnathan-hackett” data-type=”text”>Johnathan Hackett</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>21 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/alternative-perspectives”>Alternative Perspectives</a></div></div></div></div></article></div><div class=”widget tag-intelligence tag-artificial-intelligence tag-defense” elid=”2676918199″><article elid=”2676918199″ data-frozen-sections=”[]” class=”clearfix page-article sm-mb-1 quality-MD post-2676918199″><div class=”row px10″><div class=”rm-col-center col sm-mb-1″ style=”width:100.0%;”><div class=”widget__body clearfix sm-mt-1″/><div class=”widget__body clearfix sm-mt-1″><h2 class=”widget__headline h2″><a class=”widget__headline-text custom-post-headline” href=”https://www.thecipherbrief.com/the-limits-of-human-oversight-at-machine-speed” aria-label=”The Limits of Human Oversight at Machine Speed” data-type=”text”>
 The Limits of Human Oversight at Machine Speed
 </a></h2><div class=”snark-line”><div class=”opinion-item unordered”><div class=”widget__head expert”><a href=”https://www.thecipherbrief.com/the-limits-of-human-oversight-at-machine-speed” aria-label=”The Limits of Human Oversight at Machine Speed” class=”rm-stats-tracked”><img role=”img” alt=”Michael J. Frank” aria-label=”Michael J. Frank” src=”https://assets.rebelmouse.io/eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpbWFnZSI6Imh0dHBzOi8vYXNzZXRzLnJibC5tcy82Njc2OTQxNS9vcmlnaW4uanBnIiwiZXhwaXJlc19hdCI6MTgzNTA5OTc5MH0.ihnHdLqVCNnSYi8mr4m8VO_G5zv5lSwNHggAahwpfpc/img.jpg” class=”rm-lazyloadable-image” data-adjusted-src=”true”/></a></div><h2 class=”widget__headline h2 opinion”><a class=”widget__headline-text rm-stats-tracked” href=”https://www.thecipherbrief.com/the-limits-of-human-oversight-at-machine-speed” aria-label=”The Limits of Human Oversight at Machine Speed” data-type=”text”>
 The Limits of Human Oversight at Machine Speed
 </a></h2></div><style><![CDATA[
 .widget__body:has(.snark-line>.opinion-item) .widget__headline:not(.opinion){
 display: none;
 }
 .snark-line .opinion-item+.opinion-item {
 display: none;
 }
 .widget__head.expert img {
 aspect-ratio: 3/2;
 object-fit: cover;
 }
 ]]></style><p>
 
 
 
 OPINION — Warfare has always operated at human speed, but we now have the capability to operate at machine speed. The risks are high, but so are the [...] 
 
 <a class=”more-btn compoent-otherwise” href=”https://www.thecipherbrief.com/the-limits-of-human-oversight-at-machine-speed”>More</a></p><div class=”date-expert__wrapper”><style><![CDATA[
 .snark-line:has(.date-expert__wrapper) .date-author__wrapper {
 display: none;
 }
 ]]></style><div class=”social-date”><span class=”social-date__text”>20 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/experts/michael-j-frank” data-type=”text”>Michael J. Frank</a></div></div><div class=”date-author__wrapper”><div class=”social-date”><span class=”social-date__text”>20 May, 2026</span></div><div class=”social-author clearfix”><a class=”social-author__name rm-stats-tracked” href=”https://www.thecipherbrief.com/author/ryansimons” data-type=”text”>Ryan Simons</a></div></div></div><div class=”all-related-sections”><a href=”https://www.thecipherbrief.com/alternative-perspectives”>Alternative Perspectives</a></div></div></div></div></article></div></div></div></div></div><!– User Code –><div class=”divider”/><!– End User Code –><div class=”subscribe-cta” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1_0_2_0″><!– User Code –><div class=”subscribe-cipher-logo image-element”><svg xmlns=”http://www.w3.org/2000/svg” width=”183″ height=”56″ viewbox=”0 0 183 56″ fill=”none”><g clip-path=”url(#clip0_2564_4990)”><path d=”M140.755 55.0357H134.982L134.814 54.8653V43.1823L134.982 43.0118H140.419C142.117 43.0118 143.815 43.8734 143.815 46.103C143.815 47.3054 143.305 48.3374 142.117 48.6829V48.8533C143.474 49.1989 144.157 50.2261 144.157 51.7741C144.157 54.1789 142.458 55.0404 140.76 55.0404L140.755 55.0357ZM140.077 45.0663H137.359L137.191 45.2367V47.6415L137.359 47.8119H140.077C141.097 47.8119 141.434 47.1255 141.434 46.4391C141.434 45.5823 141.092 45.0663 140.077 45.0663ZM140.077 49.8806H137.359L137.191 50.051V52.8013L137.359 52.9717H140.077C141.265 52.9717 141.775 52.4558 141.775 51.4238C141.775 50.3918 141.265 49.8758 140.077 49.8758V49.8806Z” fill=”#11151C”/><path d=”M153.49 50.0516V50.222L155.699 53.1427V54.8611L155.53 55.0315H154.51L154.169 54.8611L150.772 50.3924L150.431 50.222H148.733L148.564 50.3924V54.8611L148.396 55.0315H146.356L146.188 54.8611V43.1781L146.356 43.0077H151.961C154.337 43.0077 156.035 44.2101 156.035 46.6148C156.035 48.5036 154.847 49.706 153.486 50.0516H153.49ZM151.965 45.0669H148.737L148.569 45.2373V47.9876L148.737 48.1581H151.965C152.985 48.1581 153.664 47.8125 153.664 46.6101C153.664 45.4077 152.985 45.0622 151.965 45.0622V45.0669Z” fill=”#11151C”/><path d=”M160.283 55.0357H158.244L158.075 54.8653V43.1823L158.244 43.0118H160.283L160.452 43.1823V54.8653L160.283 55.0357Z” fill=”#11151C”/><path d=”M171.324 55.0357H163.343L163.174 54.8653V43.1823L163.343 43.0118H171.324L171.492 43.1823V44.9006L171.324 45.071H165.719L165.551 45.2415V47.6462L165.719 47.8166H170.982L171.151 47.9871V49.7054L170.982 49.8758H165.719L165.551 50.0463V52.7966L165.719 52.967H171.324L171.492 53.1374V54.8558L171.324 55.0262V55.0357Z” fill=”#11151C”/><path d=”M181.682 45.0667H176.419L176.251 45.2372V47.8171L176.419 47.9875H181.345L181.514 48.1579V49.8763L181.345 50.0467H176.419L176.251 50.2171V54.8562L176.082 55.0266H174.042L173.874 54.8562V43.1732L174.042 43.0028H181.682L181.851 43.1732V44.8916L181.682 45.062V45.0667Z” fill=”#11151C”/><path d=”M130.365 43.4097H0.166992V44.8298H130.365V43.4097Z” fill=”#11151C”/><path d=”M174.73 23.6933V24.2377L181.752 33.5302V38.9977L181.214 39.5421H177.972L176.891 38.9977L166.084 24.7821L165.004 24.233H159.6L159.062 24.7821V38.9977L158.524 39.5421H152.04L151.502 38.9977V1.8232L152.04 1.27881H169.869C177.434 1.27881 182.838 5.10372 182.838 12.7583C182.838 18.7702 179.053 22.5998 174.735 23.6933H174.73ZM169.869 7.83512H159.605L159.067 8.3795V17.1276L159.605 17.6767H169.869C173.111 17.6767 175.273 16.5832 175.273 12.7583C175.273 8.93336 173.111 7.83985 169.869 7.83985V7.83512Z” fill=”#11151C”/><path d=”M146.917 39.5468H121.523L120.98 39.0024V1.8232L121.523 1.27881H146.917L147.455 1.8232V7.29073L146.917 7.83512H129.088L128.55 8.3795V16.0341L129.088 16.5784H145.837L146.375 17.1228V22.5904L145.837 23.1395H129.088L128.55 23.6839V32.4319L129.088 32.9763H146.917L147.455 33.5254V38.993L146.917 39.5374V39.5468Z” fill=”#11151C”/><path d=”M115.329 39.5468H108.845L108.307 39.0024V23.6933L107.769 23.1489H93.182L92.644 23.6933V39.0024L92.106 39.5468H85.6218L85.0791 39.0024V1.8232L85.6218 1.27881H92.106L92.644 1.8232V16.0388L93.182 16.5832H107.769L108.307 16.0388V1.8232L108.845 1.27881H115.329L115.867 1.8232V39.0024L115.329 39.5468Z” fill=”#11151C”/><path d=”M69.0698 24.2377H58.8055L58.2675 24.7868V39.0024L57.7295 39.5468H51.2453L50.7026 39.0024V1.8232L51.2453 1.27881H69.0745C76.6394 1.27881 82.0429 5.10372 82.0429 12.7583C82.0429 20.4128 76.6394 24.2377 69.0745 24.2377H69.0698ZM69.0698 7.83512H58.8055L58.2675 8.3795V17.1276L58.8055 17.6767H69.0698C72.3119 17.6767 74.4733 16.5832 74.4733 12.7583C74.4733 8.93336 72.3119 7.83985 69.0698 7.83985V7.83512Z” fill=”#11151C”/><path d=”M45.1443 39.5468H38.6601L38.1221 39.0024V1.8232L38.6601 1.27881H45.1443L45.6823 1.8232V39.0024L45.1443 39.5468Z” fill=”#11151C”/><path d=”M34.6558 28.0676L34.1178 27.5232H27.6336L27.0956 28.0676C26.0149 31.8972 23.3108 33.5351 18.9927 33.5351C18.8945 33.5351 18.8009 33.5304 18.7026 33.5304V40.0914C18.8009 40.0914 18.8945 40.0962 18.9927 40.0962C27.6383 40.0962 33.5798 35.7221 34.6605 28.0676H34.6558Z” fill=”#11151C”/><path d=”M18.9834 0.729858C18.8852 0.729858 18.7916 0.734592 18.6934 0.734592V7.29563C18.7916 7.29563 18.8852 7.2909 18.9834 7.2909C23.3062 7.2909 26.0056 8.92879 27.0863 12.2093L27.6243 12.7584H34.1085L34.6465 12.2093C33.5705 5.10389 27.629 0.729858 18.9834 0.729858Z” fill=”#11151C”/><path d=”M12.7239 12.7776V8.56451L12.5181 8.35622H0.859656L0.653809 8.1432V5.61535L0.859656 5.40233H12.5181L12.7239 5.18931V0.980965L12.9345 0.767944H15.0163L15.2269 0.980965V12.7776L15.0163 12.9859H12.9345L12.7239 12.7776Z” fill=”#11151C”/><path d=”M0.648438 26.4484V23.9205L0.854285 23.7122H6.6835L6.89403 23.4992V17.8139L6.6835 17.6009H0.858963L0.653116 17.3879V14.86L0.858963 14.6517H15.0156L15.2262 14.86V17.3879L15.0156 17.6009H9.60279L9.39227 17.8139V23.4992L9.60279 23.7122H15.0156L15.2262 23.9205V26.4484L15.0156 26.6614H0.858963L0.653116 26.4484H0.648438Z” fill=”#11151C”/><path d=”M0.648438 39.845V29.9467L0.854285 29.7336H15.011L15.2215 29.9467V39.845L15.011 40.0581H12.9291L12.7186 39.845V32.8958L12.5127 32.6828H9.59811L9.38759 32.8958V39.4237L9.18174 39.6367H7.09988L6.89403 39.4237V32.8958L6.6835 32.6828H3.35252L3.14667 32.8958V39.845L2.94083 40.0581H0.858963L0.653116 39.845H0.648438Z” fill=”#11151C”/></g><defs><clippath id=”clip0_2564_4990″><rect width=”182.666″ height=”54.3061″ fill=”white” transform=”translate(0.166992 0.72998)”/></clippath></defs></svg></div><h3 class=”subscribe-cta__headline headline-medium”>Join the Subscriber+ Community</h3><p class=”subscribe-cta__description subheadline-small”>
 Unlock expert intelligence: your gateway to exclusive security insights trusted by global leaders
</p><a href=”/subscriber-plus” class=”subscribe-cta__button”>Subscribe+</a><!– End User Code –></div><!– User Code –><div class=”divider”/><!– End User Code –><div class=”sticky-item” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1_0_4″><div class=”ad-container vertical” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1_0_4_0″/><div class=”ad-container vertical” id=”sPost_Default_Layout_0_0_16_0_0_1_0_7_1_1_0_4_1″/></div></div></div></div></div><div class=”footer module ” id=”sFooter_0_0_7_0_0_0″><div class=”container wide footer-inner” id=”sFooter_0_0_7_0_0_0_0″><div class=”footer-inner__first” id=”sFooter_0_0_7_0_0_0_0_0″><a id=”sFooter_0_0_7_0_0_0_0_0_0″ class=”display-block image-element ” href=”/” target=”_self”><img class=”image-element__img” alt=”Logo” width=”559″ height=”167″ src=”https://www.thecipherbrief.com/media-library/logo.png?id=56523769&;width=559&;height=167″/></a><div class=”copyright desktop” id=”sFooter_0_0_7_0_0_0_0_0_1″><div class=”text-element” id=”sFooter_0_0_7_0_0_0_0_0_1_0″>© 2026 Copyright | The Cipher Brief All rights reserved.</div><div class=”list” id=”sFooter_0_0_7_0_0_0_0_0_1_1″><a class=”list__item” href=”/privacy” target=”_self”>Privacy Policy</a><a class=”list__item” href=”/terms-of-service-and-pricing-policy” target=”_self”>Terms of Service &; Pricing Policy</a></div></div></div><div class=”footer-inner__second” id=”sFooter_0_0_7_0_0_0_0_1″><div class=”footer-links” id=”sFooter_Links_0_0_8_0_0_0″><div class=”list” id=”sFooter_Links_0_0_8_0_0_0_0″><a class=”list__item” href=”/” target=”_self”>Homepage</a><a class=”list__item” href=”/about-us” target=”_self”>About Us</a><a class=”list__item” href=”/advertising-sponsorship” target=”_self”>Advertise</a><a class=”list__item” href=”/careers&#9;” target=”_self”>Careers</a><a class=”list__item” href=”/contact” target=”_self”>Contact</a><a class=”list__item” href=”/subscribe” target=”_self”>Get our Newsletter</a></div><div class=”list” id=”sFooter_Links_0_0_8_0_0_0_1″><a class=”list__item” href=”/columns/opinion” target=”_self”>Opinion</a><a class=”list__item” href=”/dead-drop” target=”_self”>The Dead Drop</a><a class=”list__item” href=”/podcasts” target=”_self”>Podcasts</a></div></div></div><div class=”footer-inner__third” id=”sFooter_0_0_7_0_0_0_0_2″><div class=”copyright mobile” id=”sFooter_0_0_7_0_0_0_0_2_0″><div class=”text-element” id=”sFooter_0_0_7_0_0_0_0_2_0_0″>© 2026 Copyright | The Cipher Brief All rights reserved.</div><div class=”list” id=”sFooter_0_0_7_0_0_0_0_2_0_1″><a class=”list__item” href=”/privacy” target=”_self”>Privacy Policy</a><a class=”list__item” href=”/terms-of-service-and-pricing-policy” target=”_self”>Terms of Service &; Pricing Policy</a></div></div><div class=”sm-mb-2″ id=”sSocial_Links_0_0_20_0_0_0″><div class=”social-links”><a class=”social-links__link share-youtube” href=”https://www.youtube.com/channel/UCEyPWPSLfrg1ue9Oq1wLr8w” target=”_blank” rel=”noopener noreferrer” aria-label=”Open youtube”><span aria-hidden=”true” class=”fa fa-youtube”/></a><a class=”social-links__link share-linkedin” href=”https://www.linkedin.com/company/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open linkedin”><span aria-hidden=”true” class=”fa fa-linkedin”/></a><a class=”social-links__link share-twitter” href=”https://x.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open twitter”><span aria-hidden=”true” class=”fa fa-twitter”/></a><a class=”social-links__link share-facebook” href=”https://www.facebook.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open facebook”><span aria-hidden=”true” class=”fa fa-facebook”/></a><a class=”social-links__link share-instagram” href=”https://www.instagram.com/thecipherbrief” target=”_blank” rel=”noopener noreferrer” aria-label=”Open instagram”><span aria-hidden=”true” class=”fa fa-instagram”/></a></div></div><!– User Code –><p class=”footer-inquiries”>
 For general inquiries please email
 <a href=”mailto:info@thecipherbrief.com”>info@thecipherbrief.com</a></p><!– End User Code –></div></div></div><!– User Code –>{{}}
<!– End User Code –></div></div>



