Morning Overview

Army and 10 defense giants sprint through a ‘right to integrate’ hackathon to make their weapons systems talk to each other

Engineers from 10 of the largest U.S. defense contractors sat shoulder to shoulder with Army software teams in late spring 2026 for a timed hackathon with a single, blunt objective: prove that a tank built by one company can pass targeting data to a missile launcher built by another, without custom patches, phone calls, or prayer.

The sprint, organized under the Army’s “right to integrate” initiative, is the service’s most visible attempt yet to crack a problem that has plagued the Pentagon for decades. American weapons platforms are powerful individually, but many still cannot share information across vendor lines because each manufacturer designs its own proprietary data formats and interfaces. In a war against a networked adversary such as China or Russia, those digital seams could cost lives.

The legal lever behind the hackathon

The Army is not asking nicely. It has a statute on its side. 10 U.S.C. Section 4401, published by the Office of the Law Revision Counsel, requires major defense acquisition programs to adopt a modular open systems approach, or MOSA. That means documented interfaces, government-accessible technical data, and architectures designed so that subsystems from different vendors can be swapped in or out.

The law has been on the books for years, but enforcement has been uneven. Contractors can comply on paper while keeping critical interface details locked behind intellectual property claims. The hackathon was designed as a stress test: put the statute’s promises under a stopwatch and see what actually works when live systems try to exchange sensor tracks, fire-control messages, and position data.

Backing up the statute, the Tri-Service MOSA Memo, signed jointly by the Army, Navy, and Air Force, and the Office of the Under Secretary of Defense for Research and Engineering’s implementation guide lay out what “open” means in contract language. Both documents, referenced in federal solicitations on SAM.gov, define interface specifications, data-rights expectations, and testing standards. For contractors, these are not suggestions. Solicitations increasingly list MOSA compliance as a scored evaluation factor, meaning firms that cannot demonstrate interoperability risk losing bids.

What the hackathon was trying to solve

Picture a forward observer spotting an enemy artillery battery. The observer’s sensor feed comes from Vendor A. The fire-direction center runs software from Vendor B. The launcher waiting to shoot belongs to Vendor C. Today, bridging those three systems often requires middleware kludges, manual re-keying of coordinates, or liaison officers relaying data by voice. Each handoff adds seconds. In a contested environment where counter-battery radar can pinpoint a firing position in under a minute, seconds determine who survives.

The hackathon compressed that problem into a controlled setting. Teams had to demonstrate cross-vendor data exchanges across realistic tactical scenarios, exposing where message formats clashed, where security protocols blocked handshakes, and where latency made the connection operationally useless even if it technically worked.

The exercise fits within the Pentagon’s broader Joint All-Domain Command and Control, or JADC2, vision, which aims to connect sensors and shooters across every service branch and domain. The Army’s own contribution to JADC2, previously tested during Project Convergence field experiments, depends on exactly the kind of plug-and-play integration the hackathon targeted.

Who was in the room

The Army has described the participants as 10 leading defense companies, but as of June 2026, no official roster has been published. The likeliest candidates, based on the scale of Army platform contracts and prior MOSA-related work, include firms such as Lockheed Martin, RTX (formerly Raytheon Technologies), General Dynamics, Northrop Grumman, L3Harris Technologies, and BAE Systems. Without a confirmed list, however, that remains informed speculation rather than verified fact.

The absence of named participants matters. Interoperability is partly a technical challenge and partly a business one. Companies that have built competitive moats around proprietary data links have financial reasons to slow-walk open standards. Knowing which firms showed up, and which did not, would tell analysts a great deal about where the industry’s resistance lines are drawn.

What we still do not know

Several gaps remain in the public record:

  • Outcomes: No after-action report, prototype demonstration video, or technical evaluation from the hackathon has appeared in public acquisition records. It is unclear whether teams achieved real-time data exchanges or simply cataloged the barriers that remain.
  • Funding: The Defense Department’s top-line modernization budget is public, but the specific dollars allocated to MOSA enforcement and integration testing have not been broken out in available documents. Without dedicated funding, open-architecture mandates risk becoming unfunded requirements that contractors can defer.
  • Industry reaction: No participating company has issued a public statement about technical breakthroughs, integration challenges, or concerns about intellectual property exposure. That silence leaves a one-sided narrative in which the Army’s goals are visible but industry’s posture is opaque.

These are not minor footnotes. The difference between a successful demonstration and a frustrating stalemate would shape how aggressively the Army writes interoperability requirements into its next generation of contracts.

Why the stakes keep climbing

China’s People’s Liberation Army has spent the past decade building what it calls a “system of systems” approach to warfare, linking sensors, command nodes, and strike platforms across domains. Russia, despite setbacks in Ukraine, continues to invest in integrated air defense networks that force attackers to coordinate across multiple sensor and jammer types. Both adversaries are betting that networked forces multiply combat power faster than any single platform upgrade can.

The United States fields the world’s most advanced individual weapons systems, but if those systems cannot talk to each other without bespoke integration contracts that take years to negotiate, the network advantage shifts to adversaries that designed interoperability in from the start. That strategic math is what gives the “right to integrate” initiative its political momentum inside the Pentagon and on Capitol Hill.

What comes next for contractors and policymakers

For defense firms, the practical takeaway is immediate. Engineering teams should map their current product lines against the Tri-Service MOSA Memo and the OUSD(R&E) implementation guide, identifying which subsystems already expose well-documented interfaces and which remain tightly coupled or proprietary. Business development teams should expect future solicitations to demand evidence of live interoperability testing, not just paper assertions of MOSA compliance. Companies that get ahead of that curve could turn open architecture into a selling point; those that resist may find themselves locked out of competitions they once dominated.

For congressional overseers and acquisition officials, the hackathon’s missing details are not academic. They are leading indicators of whether the Pentagon will use its statutory authority aggressively to pry open closed architectures or settle for incremental progress negotiated one program at a time. Pressing for a published after-action report, a confirmed participant list, and a dedicated budget line for integration testing would convert the “right to integrate” from a bold slogan into a measurable program with accountability attached.

Until those details surface, the hackathon stands as both a promising signal and an incomplete story. The law is clear. The strategic need is urgent. The question is whether the defense industrial base can rewire itself fast enough to match both.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.