Watch live: Hegseth, Joint Chiefs of Staff chair testify before Senate on Defense budget
Defense Secretary Pete Hegseth and Joint Chiefs of Staff Chair Dan Caine will testify Tuesday morning before the Senate Appropriations Committee on the Defense Department's fiscal 2026 budget request.
The hearing comes as the administration has faced criticism over the deployment of troops to Los Angeles amid protests over local immigration raids. Hegseth testified before the House on Tuesday.
The budget request includes a 13 percent spending increase focused on investments to 'strengthen the safety, security, and sovereignty of the homeland; deter Chinese aggression in the Indo-Pacific; and revitalize the U.S. defense industrial base.'
The event is scheduled to begin at 10 a.m. EDT.
Watch the live video above.
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Boston Globe
2 hours ago
- Boston Globe
China unleashes hackers against its friend Russia, seeking war secrets
Advertisement China is far wealthier than Russia and has plenty of homegrown scientific and military expertise, but Chinese military experts often lament that Chinese troops lack battlefield experience. Experts say that China sees the war in Ukraine as a chance to collect information about modern warfare tactics, Western weaponry, and what works against them. 'China likely seeks to gather intelligence on Russia's activities, including on its military operation in Ukraine, defense developments, and other geopolitical maneuvers,' said Che Chang, a researcher with TeamT5. It is unclear how successful these attempts have been, partly because Russian officials have never publicly acknowledged these intrusions. But a classified counterintelligence document from Russia's domestic security agency, known as the FSB, makes clear that intelligence officials are concerned. The document, obtained by The New York Times, says that China is seeking Russian defense expertise and technology and is trying to learn from Russia's military experience in Ukraine. The document refers to China as an 'enemy.' Advertisement With Putin largely cut off from the West, his country has come to rely on China to buy its oil and sell it technology that is essential to its war effort. Moscow and Beijing have formed a bloc against Washington and its allies, alarming Western leaders. The FSB document presents a more complicated relationship than the 'no-limits' partnership that Xi and Putin describe. Allies have been known to spy on one another, but the extent of China's hacking activities against Russia suggests both a higher level of mutual distrust and a reluctance by the Kremlin to share all that it is learning on the battlefield in Ukraine. Drone warfare and software are of particular interest to China, the document says. 'The war in Ukraine fundamentally shifted intelligence priorities for both countries,' said Itay Cohen, a senior researcher with cybersecurity firm Palo Alto Networks who has followed Chinese hacking groups for years. Experts say, and the document indicates, that China wants to learn from Russia's war experience to bolster its own preparedness for potential future conflicts. Taiwan, in particular, is a major potential flashpoint with the West. One Chinese government-funded group has targeted Rostec, the powerful Russian state-owned defense conglomerate, seeking information on satellite communications, radar and electronic warfare, according to Palo Alto Networks. Others have used malicious files, intended to exploit vulnerabilities in Microsoft Word, to penetrate Russian aviation industry targets and state bodies. Advertisement Messages seeking comment were left with the Kremlin and the Chinese Embassy in Moscow. Not all Chinese hacking groups operate at the behest of the government. But security experts have seen evidence of government ties. Russian cybersecurity firm Positive Technologies, for example, said in 2023 that cyberattacks had been mounted on several Russian targets, including in the aerospace, private security, and defense sectors. The attackers used a tool known as Deed RAT, which is widely deployed by Chinese state-sponsored hackers. Cybersecurity experts say Deed RAT is considered 'proprietary' among these groups and is not available for purchase on the dark web like other malware tools. That has enabled state-backed hacking groups in China to use it more widely because it is tough for their adversaries to find a way to combat the malware. Chinese state-sponsored hacking groups have often targeted international companies and government institutions, including in the United States and Europe. But hacking groups appear to have become more interested in Russian targets after the country's February 2022 invasion of Ukraine. Chang said he and his colleagues tracked several Chinese hacking groups targeting Russia. Among them was one of the country's most active hacking groups, known as Mustang Panda. Little is known about Mustang Panda's origins or where it operates inside China, according to researchers who have studied the group. Its activities often accompanied China's Belt and Road economic development initiative, according to Rafe Pilling, director of threat intelligence at security firm Sophos. As China invested in development projects in West Africa and Southeast Asia, he said, hacking soon followed. That is most likely because China invests in countries where it has political and economic interests, which motivates state-sponsored hackers, Pilling said. Advertisement After Russia invaded Ukraine, TeamT5 said that Mustang Panda expanded its scope to target governmental organizations in Russia and the European Union. Pilling, who has been monitoring Mustang Panda's activities for several years, says he suspects that the group is backed by China's Ministry of State Security, its main intelligence body. The ministry supports threat groups that attack targets around the world, he said. In 2022, Mustang Panda targeted Russian military officials and border guard units near the Siberian border with China. 'The targeting we've observed tends to be political and military intelligence-gathering,' Pilling said. That is true of all Chinese hacking groups targeting Russia, he said. 'I think of them as being one of the main tools that the Chinese state has for gathering political and economic intelligence.' Mustang Panda has also attracted the attention of US authorities. In January, the Justice Department and the FBI said that Mustang Panda's malware had infected thousands of computer systems, seeking to steal information. Many of the targets were American, but the malware was also found on computers belonging to Chinese dissidents and European and Asian governments, according to a federal indictment. The indictment makes clear that the United States believes that Mustang Panda is a state-sponsored group. Other Chinese groups have targeted Russia, too. Chang said his team was following another threat group, Slime19, that is continuously targeting the Russian government, energy, and defense sectors. In agreements in 2009 and 2015, China and Russia promised not to carry out cyberattacks targeting each other. But even at the time, analysts suggested that the announcement was largely symbolic. Chinese hacking in Russia did not begin with the war in Ukraine. A 2021 cyberattack, for example, targeted Russian submarine designers. But experts say the war prompted a spike in computer intrusions. Advertisement 'The activity — we saw it immediately in the months following Russia's full-scale invasion of Ukraine,' Cohen said. 'Even though the public narrative was of close ties between Russia and China.' This article originally appeared in


Newsweek
5 hours ago
- Newsweek
Trump TikTok Executive Order Sparks MAGA Backlash: 'Brazenly Illegal'
Based on facts, either observed and verified firsthand by the reporter, or reported and verified from knowledgeable sources. Newsweek AI is in beta. Translations may contain inaccuracies—please refer to the original content. President Donald Trump's decision to extend the deadline for TikTok's parent company, ByteDance, to sell its United States operations has provoked an intense backlash from prominent conservative voices. The new executive order, signed on Thursday, grants ByteDance an additional 90 days, until September 17, 2025, to divest TikTok or face a ban. Why It Matters Thursday's extension marked the third time Trump has delayed enforcement. The first came via executive order on January 20, his first day in office, after the platform briefly went dark when a national ban approved by Congress and upheld by the U.S. Supreme Court took effect. The second extension came in April, when White House officials believed they were close to a deal to spin off TikTok into a new U.S.-owned company. The agreement ultimately collapsed after China withdrew following Trump's tariff announcement. What To Know With each new extension, a U.S. ban on TikTok seems increasingly unlikely in the near future. But the decision to keep the app running by executive order has sparked criticism, even from some of the president's own allies. "This is lawless—nothing in statute or otherwise permits the President to extend the deadline like this," Heath Mayo, founder of conservative group Principles First, wrote on X, formerly Twitter. National Review journalist Charles C. W. Cooke called the move "brazenly illegal," while conservative commentator Guy Benson was even more direct: "This is illegal." Even those generally aligned with Trump's policy goals took issue with the method. "Um there's nothing in the law (or the Constitution) that allows for this," wrote Jonah Goldberg, co-founder of conservative news outlet The Dispatch, on X. The inaction is also prompting unease on Capitol Hill. Mississippi Republican Senator Roger Wicker, the ranking member of the Senate Armed Services Committee, told the Washington Examiner that he was "not overly delighted" about the delay. "I don't think it's a good idea," Wicker said. "I think there is growing frustration," Illinois Republican Representative Darin LaHood, who serves on both the House Intelligence Committee and the Select Committee on China, told the Examiner. "The national security concerns and vulnerabilities are still there, and they have not gone away. I would argue they've almost become more enhanced in many ways." The administration has defended the delay as part of a larger diplomatic and strategic approach to U.S.-China relations. Trump told reporters on Thursday he would "probably" extend the ban and suggested he would need approval from Chinese President Xi Jinping. Americans are now more divided on how to handle TikTok than they were two years ago. While lawmakers largely agreed, passing the law with overwhelming bipartisan support in the House (360–58) and Senate (79–18) last year, the public has begun to take a different view. The original deadline was set for January 19. A recent Pew Research Center survey found that approximately one-third of Americans supported a TikTok ban, down from 50 percent in March 2023. Roughly one-third said they would oppose a ban, and a similar percentage said they were unsure. Among those who said they supported banning the social media platform, about 8 in 10 cited concerns over users' data security being at risk as a major factor in their decision, according to the report. Photo illustration of the TikTok logo on a phone screen backed by the American flag. Photo illustration of the TikTok logo on a phone screen backed by the American flag. Photo byWhat People Are Saying President Donald Trump, Thursday on Truth Social: "I've just signed the executive order extending the deadline for the TikTok closing by 90 days (September 17, 2025). Thank you for your attention to this matter!" Senator Mark Warner, a Democrat from Virginia, told the Associated Press: "An executive order can't sidestep the law, but that's exactly what the president is trying to do." What Happens Next For now, TikTok continues to function for its 170 million users in the U.S., and tech giants Apple, Google, and Oracle were persuaded to continue offering and supporting the app, on the promise that the Justice Department would not use the law to seek potentially steep fines against them.


Forbes
5 hours ago
- Forbes
Gen. Erik ‘Gorilla' Kurilla—Not Pete Hegseth—Leading U.S. Military On Iran
Defense Secretary Pete Hegseth has reportedly deferred authority on the U.S. military's involvement in the Middle East to Gen. Erik Kurilla, the U.S. Central Command chief known as 'The Gorilla' who served earlier tours in Iraq and Afghanistan and an Iran hawk, who has pressed for a more aggressive response in the region. Kurilla, appointed as the head of U.S. Central Command by Joe Biden, has become the apparent go-to ... More advisor for the Trump administration in the Middle East. Kurilla, a Biden appointee, has become the leading adviser on the Middle East over other Department of Defense officials, and he has held an audience with President Donald Trump more than any other general, Politico reported, citing unnamed former and current defense officials. Hegseth has yet to turn down a request from Kurilla for more military assets in the Middle East, including new fighter planes, a person familiar with their dynamic told Politico, despite resistance to sending more weapons from Gen. Dan Caine, Chairman of the Joint Chiefs of Staff, and the Pentagon's policy chief Elbridge Colby. Dan Caldwell, a former adviser to Hegseth, told 'Breaking Points' that Kurilla has a 'fundamentally different view on the importance of the Middle East' than other officials in the Trump administration, adding Kurilla likely believes a 'military campaign against Iran will not be as costly as others.' Caldwell suggested Kurilla was likely becoming more vocal as his three-year tenure as CENTCOM chief nears its end. Pentagon spokesperson Sean Parnell disputed Hegseth's deference to Kurilla, telling Politico in a statement Hegseth 'empowers all of his combatant commanders the same way, by decentralizing command and harnessing their real-world expertise,' while another defense official said Kurilla and Caine have a 'hand in glove relationship.' During a congressional hearing earlier this month, Kurilla said he presented a 'wide range of options' to Hegeth and Trump to prevent Iran from developing nuclear weapons. When asked if CENTCOM would respond with overwhelming force if Iran failed to give up its nuclear program, Kurilla responded, 'Yes.' Kurilla was the subject of a U.S. Army-led investigation after he allegedly pushed a subordinate service member during a trip to the Middle East in 2024. Three unnamed U.S. officials told NBC News that Kurilla allegedly shoved an airman when Kurilla was asked to sit down during a flight to Israel. CENTCOM said at the time that officials were not aware of an investigation into Kurilla. Kurilla, 59, is an Elk River, Minnesota, native who was commissioned into the U.S. Army as an infantry officer in 1988, according to CENTCOM. A West Point graduate, Kurilla was deployed to Panama in 1989, the Gulf War in 1990, and to Haiti, Bosnia and Kosovo in the 1990s. He has been awarded two Purple Hearts and a Bronze Star with valor in 2005 for leading U.S. troops in Iraq. Kurilla was nominated to lead CENTCOM under President Joe Biden in 2022, after previously commanding the 82nd Airborne Division and serving as CENTCOM's chief of staff.