Vineyard Wind sues over federal pause | Analysis by Brian Moineau

A giant wind farm, a sudden halt, and a lawsuit: what’s really at stake with Vineyard Wind

The image of enormous turbine blades turning off the coast of Massachusetts is jarring — not because turbines are dramatic to watch, but because those blades represent a whole ecosystem of jobs, contracts, clean power and shaky politics. In mid-December the Trump administration ordered a 90‑day pause on several East Coast offshore wind projects, and Vineyard Wind — a project that was about 95% complete and already producing power — answered with a lawsuit on January 15, 2026. The developers say the government illegally froze construction; the administration cites national security concerns. The courtroom is now where the future of U.S. offshore wind will be argued.

Why this feels bigger than one construction pause

  • Vineyard Wind 1 is not a conceptual proposal — it’s a nearly finished, $4.5 billion project with 44 turbines already operating and the rest due to be completed by March 31, 2026. The pause threatens specialized vessel contracts, financing and project viability. (WBUR)
  • The administration’s stated reason is national security: classified Department of Defense material allegedly shows turbines can create radar “clutter” and obscure targets. But developers and many judges have asked for clearer, non‑classified explanations and specific mitigation pathways. (DOI; WBUR)
  • Multiple other projects — Empire Wind, Revolution Wind, Sunrise Wind and Coastal Virginia Offshore Wind — were caught in the same pause. That makes this not just a Vineyard Wind dispute but a flashpoint for federal policy toward the entire U.S. offshore wind industry. (WBUR; AP)

What Vineyard Wind says in the lawsuit

  • The complaint argues the Interior Department overstepped its legal authority and acted arbitrarily and capriciously by suspending the project without providing sufficient factual support or opportunities for meaningful consultation. Vineyard Wind seeks a temporary restraining order to restart construction immediately. (WBUR)
  • Vineyard Wind says the pause is inflicting severe daily financial losses — the company estimated roughly $2 million in losses per day — and risks losing access to a specialized installation vessel that’s contracted only through March 31, 2026. Missing that window could imperil financing and the project’s completion. (WBUR)

What the administration says and why it matters

  • The Department of the Interior (DOI) framed the action as a national‑security precaution based on classified findings from the Department of Defense. DOI described the pause as necessary to evaluate emerging risks tied to the evolving technology landscape and the proximity of large offshore wind projects to population centers. (DOI press release)
  • National‑security arguments complicate judicial review because the government can withhold classified details. Courts may review sensitive materials in camera (privately), but developers and allies argue national security should not be used as a blanket reason to halt projects that were previously vetted by the Defense Department. (WBUR; AP)

Legal and practical precedents that matter

  • Other developers have already challenged the December order in court. Judges have, in several cases, allowed construction to resume pending litigation — pointing to problems with how the pause was justified. These rulings set important precedents for Vineyard Wind’s chances. (AP; WBUR)
  • During permitting, the Department of Defense typically evaluates potential radar and operational conflicts with turbines and proposes mitigations. All five paused projects had previously received sign‑offs or mitigations from defense agencies, which strengthens the developers’ argument that the new pause is unexpected and lacks sufficient explanation. (WBUR)

Who’s affected beyond the lawyers

  • Local economies and labor: Vineyard Wind claims thousands of jobs and supplier agreements are at stake. Delays ripple to unions, fabrication yards, and port communities that built supply chains around turbine installation timelines. (WBUR)
  • Electricity supply and costs: Regional grid operators warned that delaying or canceling these projects could increase winter electricity bills and create reliability risks for New England. Vineyard Wind was forecast to deliver up to 800 megawatts — roughly 400,000 homes’ worth — when complete. (WBUR)
  • The broader clean‑energy transition: A high‑profile government halt sends a chilling signal to investors. If major projects can be stopped after permitting and construction have begun, financing for future projects becomes riskier and more expensive.

Quick policy snapshot

  • The DOI’s December 22, 2025, pause was framed as a temporary 90‑day review to address national‑security concerns flagged by the Department of Defense. (DOI press release)
  • Courts reviewing similar challenges have weighed the government’s national‑security claims against evidence of arbitrary administrative action; several judges have allowed resumption of work after finding the government’s rationale thin or inadequately supported in public filings. (AP; WBUR)

A few practical fixes that could defuse the standoff

  • Declassify or summarize key findings where possible: A narrowly tailored, redacted summary could allow developers and state regulators to understand concerns and propose mitigations without exposing sensitive military details.
  • Faster, formal mitigation pathways: If radar “clutter” is the issue, concrete steps (e.g., radar software adjustments, sensor relocation, or other tech mitigations) should be clearly defined and implemented rather than serving as a pretext for blanket halts.
  • Contract and financing protections: Policymakers could consider transitional measures to protect projects and workers while security issues are resolved — for example, temporary extensions of vessel contracts or bridge financing mechanisms.

What to watch next

  • Court rulings on Vineyard Wind’s request for injunctive relief and whether judges will require more public justification from the government.
  • Whether DOI or the Department of Defense provides more detail, even in redacted form, about the alleged national‑security risks and potential mitigations.
  • The ripple effects on financing and future lease rounds for U.S. offshore wind development if the pause remains or becomes broader policy.

Takeaways worth bookmarking

  • The Vineyard Wind lawsuit isn’t just a legal spat — it’s a test of how the U.S. balances national security, energy policy, and the business realities of large clean‑energy projects.
  • Developers and some judges say the administration’s pause lacks sufficient public justification, especially for projects that previously obtained Defense Department clearance.
  • The immediate stakes are enormous: jobs, billions of dollars already spent, grid reliability in New England, and investor confidence in the U.S. offshore wind sector.

Final thoughts

Watching turbines idle while legal briefs fly feels like watching policy and commerce collide in real time. This dispute exposes a broader tension: how to responsibly integrate national‑security prudence with urgent climate goals. The smarter path will be one that neither fetishizes secrecy nor rushes policymaking without clear facts. If the administration can present specific risks and workable mitigations, and if developers can implement them, that would be preferable to stopping projects wholesale. But if the pause is mostly symbolic politics, the long‑term damage to U.S. clean‑energy ambition could be substantial.

Sources




Related update: We recently published an article that expands on this topic: read the latest post.

FortiSIEM RCE Fixes Critical SIEM Risk | Analysis by Brian Moineau

When your SIEM becomes the attacker's foothold: Fortinet patches a dangerous FortiSIEM flaw

The idea that your security operations center could be quietly turned against you is the stuff of nightmares — and, this week, reality. Fortinet released fixes after a critical vulnerability in FortiSIEM (tracked as CVE-2025-64155) was disclosed that lets unauthenticated attackers run commands on vulnerable appliances by abusing the phMonitor service. That’s not just an issue for one box; compromise can silence logging, tamper alerts, and become a springboard for lateral movement across an organization.

Why this matters right now

  • FortiSIEM sits at the heart of many enterprises’ detection and response tooling. If attackers gain root on those appliances, defenders lose both visibility and control.
  • The flaw is an OS command injection in phMonitor (the internal TCP service that listens on port 7900) that allows unauthenticated argument injection, arbitrary file writes and ultimately remote code execution as an administrative/root user.
  • A public proof-of-concept and exploit activity have been reported, raising the urgency for operators to act quickly.

What happened (quick timeline)

  • The vulnerability CVE-2025-64155 was publicly recorded in January 2026 after coordinated research and disclosure.
  • Researchers at Horizon3.ai detailed how the phMonitor service accepts crafted TCP requests that lead to command injection and file overwrite escalation, allowing full appliance compromise. (horizon3.ai)
  • Fortinet published fixes and guidance; vendors and CERTs pushed immediate mitigation advice. The NVD entry documents the affected releases and the OS command injection nature of the flaw. (nvd.nist.gov)

Affected products and where the fix is

  • A wide range of FortiSIEM releases are affected across multiple branches (6.7.x, 7.0.x, 7.1.x, 7.2.x, 7.3.x, and 7.4.0). Some newer branches (e.g., FortiSIEM 7.5 and FortiSIEM Cloud) are not affected. Exact affected versions and fixed builds are listed in Fortinet advisories; administrators should consult vendor notes for their exact build numbers. (horizon3.ai)

Immediate actions for defenders

  • Patch immediately.
    • Apply the Fortinet fixed builds for your FortiSIEM branch as published in the vendor advisory. Patching is the only reliable fix.
  • If you cannot patch right away, restrict network access.
    • Block or firewall TCP port 7900 (phMonitor) at the perimeter and between network segments so only trusted internal hosts or specific management IPs can reach it.
  • Hunt and validate.
    • Search for unexpected changes on FortiSIEM appliances (new files, altered binaries, unusual cron jobs, disabled logging).
    • Review network logs for inbound connections to port 7900 from Internet sources or unexpected internal hosts.
  • Assume potential compromise if your appliance was exposed prior to patching.
    • FortiSIEM compromise can mean attackers have tampered with logs and alerts; treat affected systems as high-risk and perform a full incident response (forensic imaging, integrity checks, and rebuilds where necessary).

Why phMonitor flaws keep resurfacing

phMonitor is a useful internal service — it coordinates discovery, health checks, and sync tasks — but that convenience comes with risk if it accepts unauthenticated, unchecked input. Over multiple disclosure cycles, researchers have found different handlers and helper scripts that trust external input. When a security product exposes internal control channels to the network, it increases the attack surface of the defender's infrastructure. The lesson is blunt: secure-by-default services and strict input sanitization are non-negotiable in security appliances.

Practical defender checklist

  • Confirm FortiSIEM version(s) in your environment.
  • Cross-check against Fortinet published fixed-build versions and apply patches.
  • Immediately block TCP/7900 from untrusted networks; document any exceptions.
  • Run integrity checks and look for indicators of unauthorized file writes and scheduled tasks.
  • Rebuild appliances if you discover evidence of exploitation (compromise of a SIEM is high-risk).
  • Review network segmentation and make sure management interfaces and internal services are not exposed to broad networks.

What this says about vendor security

This incident is a reminder that the software defending us must itself be held to rigorous standards. Vendors need secure defaults (services bound to localhost unless explicitly required), least-privilege internal APIs, continuous fuzzing/input validation, and faster transparent communication about exposure indicators. At the same time, customers should reduce exposure of management and internal services, assume compromise where appliances were internet-reachable, and treat security infrastructure as high-value assets requiring extra hardening.

My take

A SIEM’s compromise flips the security model: tools meant to detect threats can become cover for them. CVE-2025-64155 is a textbook example of how powerful and dangerous a single injection bug can be when it lives inside a security product. Patch quickly, tighten access to internal services, and treat exposure as a severe incident — because it is.

Sources

Quantum Hardware Moves: Willow to Startup | Analysis by Brian Moineau

Google’s Willow, tiny quantum hardware, and industry moves that matter

Quantum news can feel like a parade of breakthroughs and cautious headlines — dazzling demos on one side, a long slog to useful machines on the other. This Monday’s round-up stitches together three threads that matter for researchers, builders and investors alike: Google opening Willow to UK teams, a palm‑sized device that could help scale quantum systems, and industry partnerships (including Western Digital backing Qolab) that point toward commercialization. Below I pull those stories together, explain why they’re connected, and offer a practical read on what comes next.

Why this week matters

  • Access to working hardware (like Google’s Willow) is how ideas stop being academic exercises and start becoming real experiments.
  • Miniaturized, CMOS‑friendly components could lower the cost and complexity of scaling quantum systems.
  • Partnerships between chipmakers, cloud/tech giants, and startups show the industry is moving from isolated labs toward integrated supply chains.

What Google’s Willow being offered to UK researchers actually means

Google announced a collaboration with the UK’s National Quantum Computing Centre (NQCC) to open access to its Willow processor for UK research teams. Willow — announced by Google in late 2024 and highlighted for its advances in reducing error growth as qubit grids scale — is now available by proposal through the NQCC program with grants and expert support.

Why that’s important:

  • Researchers get hands‑on time with a leading error‑mitigation architecture rather than only cloud simulators, which accelerates real‑world application discovery.
  • A government‑industry program with funding and formal review criteria increases the likelihood of focused, impact‑oriented projects (not just demo runs).
  • For Google, placing Willow in a national program builds partnerships, softens adoption friction in a key market, and seeds use cases tuned to its architecture.

Context to keep in mind:

  • Willow is a milestone in architecture and error behavior, not a magic key to all problems. It still sits far from the scale needed for tasks like breaking current public‑key cryptography — a point Google has emphasized. But hands‑on access shortens the time from “possible in principle” to “tested in practice.”

The tiny device that could help scale quantum systems

A research team supported by the U.S. Department of Energy reported a device that uses microwave vibrations to modulate laser light for trapped‑atom and trapped‑ion systems. The kicker: it’s nearly 100 times smaller than a hair, fabricated with CMOS‑compatible techniques.

Why this is a quiet but big deal:

  • Many quantum platforms still rely on bulky, power‑hungry photonics and control hardware. Shrinking control optics and modulators onto chips reduces size, power and cost — the same ingredients that scaled classical computing.
  • CMOS compatibility means existing foundries and volume processes could eventually manufacture these components, lowering barriers for startups and established fabs to participate.
  • Integrating more functions on a chip simplifies system engineering, which is essential once you aim for hundreds or thousands of qubits.

The broader implication: miniaturized, low‑power control hardware is a prerequisite for moving quantum from lab racks to datacenters and specialized edge use cases.

Microsoft + Algorithmiq: chemistry, error reduction, and practical tooling

Microsoft’s partnership with Algorithmiq focuses on fault‑tolerant methods for chemistry and drug‑discovery workflows. They’re working to achieve “chemical accuracy” while keeping resource costs (like circuit depth and measurement overhead) manageable.

Why this matters:

  • Chemistry is both a promising early application for quantum advantage and a stringent testbed: it requires high accuracy and many resources on quantum hardware.
  • Tooling that reduces measurement steps and prepares molecules efficiently will be indispensable when users transition from toy molecules to industrially relevant ones.
  • Microsoft’s cloud and developer ecosystem (Quantum Development Kit) make it practical for computational chemists to try these tools without building hardware themselves.

Western Digital backs Qolab: supply‑chain players entering quantum

Qolab, a superconducting‑qubit chip startup, received backing from Western Digital. That kind of partnership — a storage/precision‑manufacturing firm working with a quantum chip maker — highlights how classical hardware suppliers are positioning themselves in the quantum ecosystem.

Why partner with a startup?

  • Component and materials expertise (precision parts, novel materials handling, packaging) is directly transferable to quantum chip fabrication and assembly.
  • Legacy hardware suppliers bring scale, process maturity, and supply‑chain relationships that startups often lack.
  • For Western Digital, quantum tech is a strategic adjacent market; for Qolab, it’s credibility, manufacturing know‑how and potential path to scale.

Movers and shakers: talent and cross‑pollination

A quick inventory of recent hires shows the field is maturing:

  • Companies are recruiting executives with enterprise and AI go‑to‑market experience to translate lab wins into customer offerings.
  • Hiring for error correction, IT scale, and commercialization roles signals a shift from pure R&D to productization and user enablement.

This reflects an industry that must suddenly master not just physics and algorithms but also engineering, manufacturing, regulation and sales.

What this all adds up to

  • Hands‑on access programs (like Google + NQCC) accelerate application discovery and create a feedback loop between hardware, algorithms and users.
  • Small, CMOS‑compatible control components lower the cost-of-entry for building and scaling quantum systems, making wider adoption more plausible.
  • Strategic hardware partnerships and talent moves indicate that the sector is assembling the industrial stack needed to move beyond lab prototypes.

Put simply: the pieces that used to be isolated (hardware demos, algorithm papers, niche startups) are being stitched together into an industrial roadmap — modest progress each week, but steady.

My take

We’re not at the point where quantum will immediately reshape industries, but these developments show purposeful, realistic progress. Opening Willow to researchers is a smart play: it creates practical testcases, educates users, and surfaces requirements that will guide future hardware design. At the same time, the push to miniaturize control hardware and fold in classical supply‑chain partners is the quiet engineering work that will determine whether quantum stays a handful of expensive lab systems or becomes a broadly available class of specialized computers.

For anyone watching the space — researchers, engineering teams, or investors — the useful signals are less the splashy press releases and more the structural shifts: access programs, modular components that enable scale, and stronger links between startups and established manufacturers. Those are the trends that will show results over the next 3–7 years.

Practical implications

  • Researchers: apply for hardware access programs and design experiments that require real devices, not just simulators — that’s where the field will learn fastest.
  • Engineers: prioritize CMOS‑compatible approaches where possible; they’re more likely to scale and find manufacturing partners.
  • Investors and strategists: watch partnerships between classical hardware firms and quantum startups for clues about which technologies have viable paths to scale.

Further reading

  • For Google’s announcement and the NQCC call for proposals, see Google’s blog and the NQCC press page.
  • For the TipRanks roundup that inspired this post, see the original item summarizing the week’s moves and hires.

Sources




Related update: We recently published an article that expands on this topic: read the latest post.