Google's AI Compute Duopoly
Google controls approximately 25 percent of global AI compute capacity through 3.8 million TPUs and 1.3 million GPUs deployed across its data center footprint. Google Cloud CEO Thomas Kurian argues that demand and revenue margins justify the infrastructure spend, signaling that the company sees AI as a durable advantage rather than a cyclical investment.
The arithmetic is compelling and terrifying in equal measure. The barriers to entry in AI are no longer talent or algorithms—those are commoditized, available on GitHub. The barriers are energy, fabrication capacity, and the capital to acquire both. ASML controls the only machines that make cutting-edge semiconductors. Google controls one quarter of the capacity those chips deliver. Microsoft, Amazon, and Meta split the remainder, with the inevitable consolidation toward duopoly.
GPT-5.4 Solves the Erdős Problem
An amateur mathematician solved a 60-year-old Erdős conjecture using a single prompt to GPT-5.4 Pro, proving the system can reason through novel mathematical territory without human guidance. Terence Tao—the Fields medalist—acknowledged the result as a “nice achievement” while cautiously noting that its long-term significance remains unclear.
The relevant fact is not whether the achievement satisfies human standards of mathematical beauty or insight. The relevant fact is that a language model produced a proof using a method humans had not discovered in six decades. That represents a qualitative shift in what these systems can do when tasked with reasoning across constrained problem spaces.
Palantir's Civil Liberties Crisis
Palantir employees are openly questioning their company’s commitments to civil liberties as the Trump administration’s second term deepens relationships with ICE and the Department of Defense. Internal Slack logs and staff interviews, reported by Ars Technica, reveal a company caught between its foundational mission statements and the lucrative contract work that defines its business model.
The debate centers on a fundamental contradiction: Palantir built itself on data analytics for government agencies, but the Trump administration has weaponized those capabilities in ways that presume guilt and prioritize surveillance over due process. Employees invoking the company’s manifesto—ostensibly concerned with ethical governance—are bumping against a reality that the manifesto was always aspirational performance. Government contractors do not reject lucrative work on principle. They negotiate margins and liability.
SS7 and Diameter Vulnerabilities Enable State Surveillance
Citizen Lab researchers have documented two separate spying campaigns exploiting well-known vulnerabilities in the SS7 and Diameter protocols that underpin 2G, 3G, 4G, and 5G telecommunications networks. The campaigns use these weaknesses to track individuals’ locations across cellular networks without authorization.
The relevant fact is that these vulnerabilities are not new. They have been known for years. They are also not theoretical—they are being actively exploited by state actors against civilian populations. The gap between known vulnerability and deployed mitigation is not a policy failure or a technical oversight. It is structural. Telecommunications infrastructure was built on assumptions of trust that no longer apply. Patching those assumptions backwards is harder than building new infrastructure from scratch.
815 Security Violations, 1,032 Open Vulnerabilities: Inside DCSA's FY2025 Compliance Data
The Defense Counterintelligence and Security Agency documented 815 security violations at cleared contractor facilities during fiscal year 2025 — incidents where contractors failed to comply with National Industrial Security Program Operating Manual policies in ways that could reasonably result in the loss or compromise of classified information. As of September 2025, approximately 70 percent of those violations had been closed, with the remainder still open and averaging about 101 days since initial reporting.
DCSA Industrial Security Spending Surged to $163 Million in FY2025 — But Field Staffing Barely Moved
The Defense Counterintelligence and Security Agency spent $163.2 million on its industrial security mission in fiscal year 2025, a sharp jump from $102.8 million in FY2023 and the highest figure in the five-year period the GAO examined. But the spending increase tells only part of the story — and the more revealing part lies in where the money and personnel did not go.
From FY2021 through FY2024, total industrial security personnel remained essentially flat, ranging between 394 and 412. The FY2025 count of 479 represents a 19 percent increase over FY2024, but 42 of the 76 new positions were added at headquarters — partly to support a statutory expansion of DCSA’s entity vetting mission, not to put more boots on the ground for security reviews. Regional field personnel grew from 319 in FY2021 to 329 in FY2025, an increase of roughly 3 percent over four years.
DCSA Is Building a $163 Million NISS Replacement Without Asking the People Who Will Use It
In April 2024, DCSA began developing a replacement for NISS called NISS Increment 2, or NI2. The agency plans to spend approximately $163 million building it. NI2 is intended to deliver a multi-disciplinary risk picture across the defense industrial base, with role-based case management, automated communications, integrated analytics, and expanded access for government customers. Development is proceeding under an Agile methodology, which formally emphasizes early and continuous engagement with end users as a core principle of the approach.
DCSA's Industrial Security Data System Is Slow, Unreliable, and Universally Disliked
The National Industrial Security System — NISS — is the web-based platform DCSA uses to manage and document the industrial security activities it performs across more than 12,500 cleared contractor facilities. It is also, by the consistent account of the officials who use it daily, a system that compounds the workload it is supposed to streamline.
The list of challenges documented by the GAO, drawn from focus groups with DCSA regional personnel, interviews with military department officials, and feedback from defense industry representatives, is extensive. NISS is slow, frequently timing out or failing to save work. It experiences significant periods of total unavailability. Its search functionality requires labor-intensive manual navigation through multiple records to surface information that should be readily queryable. It lacks trend reporting capabilities, forcing officials to export raw data and construct analytic products outside the system using workarounds. It does not interoperate reliably with other key systems — including the Enterprise Mission Assurance Support Service, the NISP Contract Classification System, and the Defense Information System for Security — meaning that data must frequently be manually re-entered across platforms. Information Systems Security Professionals reported that the lack of integration between NISS and the Enterprise Mission Assurance Support Service alone doubles or triples their workload on classified IT system oversight.
DCSA's Regional Operators Lack the Analytic Tools to Properly Assess Industrial Security Risk
One of the more precise findings in the GAO’s April 2026 industrial security report is that DCSA has built risk assessment capabilities at the national level while leaving its regional operators without meaningful tools to analyze risk in their own portfolios. The gap matters because the facilities within each of DCSA’s four regions — Mid-Atlantic, Eastern, Central, and Western — have substantially different characteristics, and national-level trend data does not capture the distinctions that should drive local prioritization.
DOD Has Known About the DCSA Workforce Gap for Years and Has Not Acted
The workforce shortfall in DCSA’s industrial security mission is not a new discovery. In June 2023, DCSA’s director sent a memorandum to the Under Secretary of Defense for Intelligence and Security documenting that the agency was resourced to conduct required oversight of only 25 to 30 percent of the cleared industrial base. The memorandum offered three investment options — a 100 percent option, a 70 percent option, and a 30 percent option — each projecting the additional security violations, vulnerabilities, and undetected threats that could be identified at varying staffing levels. The 100 percent option, DCSA’s recommended proposal, called for adding 230 Industrial Security Representatives, 164 Information Systems Security Professionals, 25 field office chiefs, and 17 ISSP Team Leads across the Future Years Defense Program.